nvdcve-1.1-modified.json 3.9 MB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599460046014602460346044605460646074608460946104611461246134614461546164617461846194620462146224623462446254626462746284629463046314632463346344635463646374638463946404641464246434644464546464647464846494650465146524653465446554656465746584659466046614662466346644665466646674668466946704671467246734674467546764677467846794680468146824683468446854686468746884689469046914692469346944695469646974698469947004701470247034704470547064707470847094710471147124713471447154716471747184719472047214722472347244725472647274728472947304731473247334734473547364737473847394740474147424743474447454746474747484749475047514752475347544755475647574758475947604761476247634764476547664767476847694770477147724773477447754776477747784779478047814782478347844785478647874788478947904791479247934794479547964797479847994800480148024803480448054806480748084809481048114812481348144815481648174818481948204821482248234824482548264827482848294830483148324833483448354836483748384839484048414842484348444845484648474848484948504851485248534854485548564857485848594860486148624863486448654866486748684869487048714872487348744875487648774878487948804881488248834884488548864887488848894890489148924893489448954896489748984899490049014902490349044905490649074908490949104911491249134914491549164917491849194920492149224923492449254926492749284929493049314932493349344935493649374938493949404941494249434944494549464947494849494950495149524953495449554956495749584959496049614962496349644965496649674968496949704971497249734974497549764977497849794980498149824983498449854986498749884989499049914992499349944995499649974998499950005001500250035004500550065007500850095010501150125013501450155016501750185019502050215022502350245025502650275028502950305031503250335034503550365037503850395040504150425043504450455046504750485049505050515052505350545055505650575058505950605061506250635064506550665067506850695070507150725073507450755076507750785079508050815082508350845085508650875088508950905091509250935094509550965097509850995100510151025103510451055106510751085109511051115112511351145115511651175118511951205121512251235124512551265127512851295130513151325133513451355136513751385139514051415142514351445145514651475148514951505151515251535154515551565157515851595160516151625163516451655166516751685169517051715172517351745175517651775178517951805181518251835184518551865187518851895190519151925193519451955196519751985199520052015202520352045205520652075208520952105211521252135214521552165217521852195220522152225223522452255226522752285229523052315232523352345235523652375238523952405241524252435244524552465247524852495250525152525253525452555256525752585259526052615262526352645265526652675268526952705271527252735274527552765277527852795280528152825283528452855286528752885289529052915292529352945295529652975298529953005301530253035304530553065307530853095310531153125313531453155316531753185319532053215322532353245325532653275328532953305331533253335334533553365337533853395340534153425343534453455346534753485349535053515352535353545355535653575358535953605361536253635364536553665367536853695370537153725373537453755376537753785379538053815382538353845385538653875388538953905391539253935394539553965397539853995400540154025403540454055406540754085409541054115412541354145415541654175418541954205421542254235424542554265427542854295430543154325433543454355436543754385439544054415442544354445445544654475448544954505451545254535454545554565457545854595460546154625463546454655466546754685469547054715472547354745475547654775478547954805481548254835484548554865487548854895490549154925493549454955496549754985499550055015502550355045505550655075508550955105511551255135514551555165517551855195520552155225523552455255526552755285529553055315532553355345535553655375538553955405541554255435544554555465547554855495550555155525553555455555556555755585559556055615562556355645565556655675568556955705571557255735574557555765577557855795580558155825583558455855586558755885589559055915592559355945595559655975598559956005601560256035604560556065607560856095610561156125613561456155616561756185619562056215622562356245625562656275628562956305631563256335634563556365637563856395640564156425643564456455646564756485649565056515652565356545655565656575658565956605661566256635664566556665667566856695670567156725673567456755676567756785679568056815682568356845685568656875688568956905691569256935694569556965697569856995700570157025703570457055706570757085709571057115712571357145715571657175718571957205721572257235724572557265727572857295730573157325733573457355736573757385739574057415742574357445745574657475748574957505751575257535754575557565757575857595760576157625763576457655766576757685769577057715772577357745775577657775778577957805781578257835784578557865787578857895790579157925793579457955796579757985799580058015802580358045805580658075808580958105811581258135814581558165817581858195820582158225823582458255826582758285829583058315832583358345835583658375838583958405841584258435844584558465847584858495850585158525853585458555856585758585859586058615862586358645865586658675868586958705871587258735874587558765877587858795880588158825883588458855886588758885889589058915892589358945895589658975898589959005901590259035904590559065907590859095910591159125913591459155916591759185919592059215922592359245925592659275928592959305931593259335934593559365937593859395940594159425943594459455946594759485949595059515952595359545955595659575958595959605961596259635964596559665967596859695970597159725973597459755976597759785979598059815982598359845985598659875988598959905991599259935994599559965997599859996000600160026003600460056006600760086009601060116012601360146015601660176018601960206021602260236024602560266027602860296030603160326033603460356036603760386039604060416042604360446045604660476048604960506051605260536054605560566057605860596060606160626063606460656066606760686069607060716072607360746075607660776078607960806081608260836084608560866087608860896090609160926093609460956096609760986099610061016102610361046105610661076108610961106111611261136114611561166117611861196120612161226123612461256126612761286129613061316132613361346135613661376138613961406141614261436144614561466147614861496150615161526153615461556156615761586159616061616162616361646165616661676168616961706171617261736174617561766177617861796180618161826183618461856186618761886189619061916192619361946195619661976198619962006201620262036204620562066207620862096210621162126213621462156216621762186219622062216222622362246225622662276228622962306231623262336234623562366237623862396240624162426243624462456246624762486249625062516252625362546255625662576258625962606261626262636264626562666267626862696270627162726273627462756276627762786279628062816282628362846285628662876288628962906291629262936294629562966297629862996300630163026303630463056306630763086309631063116312631363146315631663176318631963206321632263236324632563266327632863296330633163326333633463356336633763386339634063416342634363446345634663476348634963506351635263536354635563566357635863596360636163626363636463656366636763686369637063716372637363746375637663776378637963806381638263836384638563866387638863896390639163926393639463956396639763986399640064016402640364046405640664076408640964106411641264136414641564166417641864196420642164226423642464256426642764286429643064316432643364346435643664376438643964406441644264436444644564466447644864496450645164526453645464556456645764586459646064616462646364646465646664676468646964706471647264736474647564766477647864796480648164826483648464856486648764886489649064916492649364946495649664976498649965006501650265036504650565066507650865096510651165126513651465156516651765186519652065216522652365246525652665276528652965306531653265336534653565366537653865396540654165426543654465456546654765486549655065516552655365546555655665576558655965606561656265636564656565666567656865696570657165726573657465756576657765786579658065816582658365846585658665876588658965906591659265936594659565966597659865996600660166026603660466056606660766086609661066116612661366146615661666176618661966206621662266236624662566266627662866296630663166326633663466356636663766386639664066416642664366446645664666476648664966506651665266536654665566566657665866596660666166626663666466656666666766686669667066716672667366746675667666776678667966806681668266836684668566866687668866896690669166926693669466956696669766986699670067016702670367046705670667076708670967106711671267136714671567166717671867196720672167226723672467256726672767286729673067316732673367346735673667376738673967406741674267436744674567466747674867496750675167526753675467556756675767586759676067616762676367646765676667676768676967706771677267736774677567766777677867796780678167826783678467856786678767886789679067916792679367946795679667976798679968006801680268036804680568066807680868096810681168126813681468156816681768186819682068216822682368246825682668276828682968306831683268336834683568366837683868396840684168426843684468456846684768486849685068516852685368546855685668576858685968606861686268636864686568666867686868696870687168726873687468756876687768786879688068816882688368846885688668876888688968906891689268936894689568966897689868996900690169026903690469056906690769086909691069116912691369146915691669176918691969206921692269236924692569266927692869296930693169326933693469356936693769386939694069416942694369446945694669476948694969506951695269536954695569566957695869596960696169626963696469656966696769686969697069716972697369746975697669776978697969806981698269836984698569866987698869896990699169926993699469956996699769986999700070017002700370047005700670077008700970107011701270137014701570167017701870197020702170227023702470257026702770287029703070317032703370347035703670377038703970407041704270437044704570467047704870497050705170527053705470557056705770587059706070617062706370647065706670677068706970707071707270737074707570767077707870797080708170827083708470857086708770887089709070917092709370947095709670977098709971007101710271037104710571067107710871097110711171127113711471157116711771187119712071217122712371247125712671277128712971307131713271337134713571367137713871397140714171427143714471457146714771487149715071517152715371547155715671577158715971607161716271637164716571667167716871697170717171727173717471757176717771787179718071817182718371847185718671877188718971907191719271937194719571967197719871997200720172027203720472057206720772087209721072117212721372147215721672177218721972207221722272237224722572267227722872297230723172327233723472357236723772387239724072417242724372447245724672477248724972507251725272537254725572567257725872597260726172627263726472657266726772687269727072717272727372747275727672777278727972807281728272837284728572867287728872897290729172927293729472957296729772987299730073017302730373047305730673077308730973107311731273137314731573167317731873197320732173227323732473257326732773287329733073317332733373347335733673377338733973407341734273437344734573467347734873497350735173527353735473557356735773587359736073617362736373647365736673677368736973707371737273737374737573767377737873797380738173827383738473857386738773887389739073917392739373947395739673977398739974007401740274037404740574067407740874097410741174127413741474157416741774187419742074217422742374247425742674277428742974307431743274337434743574367437743874397440744174427443744474457446744774487449745074517452745374547455745674577458745974607461746274637464746574667467746874697470747174727473747474757476747774787479748074817482748374847485748674877488748974907491749274937494749574967497749874997500750175027503750475057506750775087509751075117512751375147515751675177518751975207521752275237524752575267527752875297530753175327533753475357536753775387539754075417542754375447545754675477548754975507551755275537554755575567557755875597560756175627563756475657566756775687569757075717572757375747575757675777578757975807581758275837584758575867587758875897590759175927593759475957596759775987599760076017602760376047605760676077608760976107611761276137614761576167617761876197620762176227623762476257626762776287629763076317632763376347635763676377638763976407641764276437644764576467647764876497650765176527653765476557656765776587659766076617662766376647665766676677668766976707671767276737674767576767677767876797680768176827683768476857686768776887689769076917692769376947695769676977698769977007701770277037704770577067707770877097710771177127713771477157716771777187719772077217722772377247725772677277728772977307731773277337734773577367737773877397740774177427743774477457746774777487749775077517752775377547755775677577758775977607761776277637764776577667767776877697770777177727773777477757776777777787779778077817782778377847785778677877788778977907791779277937794779577967797779877997800780178027803780478057806780778087809781078117812781378147815781678177818781978207821782278237824782578267827782878297830783178327833783478357836783778387839784078417842784378447845784678477848784978507851785278537854785578567857785878597860786178627863786478657866786778687869787078717872787378747875787678777878787978807881788278837884788578867887788878897890789178927893789478957896789778987899790079017902790379047905790679077908790979107911791279137914791579167917791879197920792179227923792479257926792779287929793079317932793379347935793679377938793979407941794279437944794579467947794879497950795179527953795479557956795779587959796079617962796379647965796679677968796979707971797279737974797579767977797879797980798179827983798479857986798779887989799079917992799379947995799679977998799980008001800280038004800580068007800880098010801180128013801480158016801780188019802080218022802380248025802680278028802980308031803280338034803580368037803880398040804180428043804480458046804780488049805080518052805380548055805680578058805980608061806280638064806580668067806880698070807180728073807480758076807780788079808080818082808380848085808680878088808980908091809280938094809580968097809880998100810181028103810481058106810781088109811081118112811381148115811681178118811981208121812281238124812581268127812881298130813181328133813481358136813781388139814081418142814381448145814681478148814981508151815281538154815581568157815881598160816181628163816481658166816781688169817081718172817381748175817681778178817981808181818281838184818581868187818881898190819181928193819481958196819781988199820082018202820382048205820682078208820982108211821282138214821582168217821882198220822182228223822482258226822782288229823082318232823382348235823682378238823982408241824282438244824582468247824882498250825182528253825482558256825782588259826082618262826382648265826682678268826982708271827282738274827582768277827882798280828182828283828482858286828782888289829082918292829382948295829682978298829983008301830283038304830583068307830883098310831183128313831483158316831783188319832083218322832383248325832683278328832983308331833283338334833583368337833883398340834183428343834483458346834783488349835083518352835383548355835683578358835983608361836283638364836583668367836883698370837183728373837483758376837783788379838083818382838383848385838683878388838983908391839283938394839583968397839883998400840184028403840484058406840784088409841084118412841384148415841684178418841984208421842284238424842584268427842884298430843184328433843484358436843784388439844084418442844384448445844684478448844984508451845284538454845584568457845884598460846184628463846484658466846784688469847084718472847384748475847684778478847984808481848284838484848584868487848884898490849184928493849484958496849784988499850085018502850385048505850685078508850985108511851285138514851585168517851885198520852185228523852485258526852785288529853085318532853385348535853685378538853985408541854285438544854585468547854885498550855185528553855485558556855785588559856085618562856385648565856685678568856985708571857285738574857585768577857885798580858185828583858485858586858785888589859085918592859385948595859685978598859986008601860286038604860586068607860886098610861186128613861486158616861786188619862086218622862386248625862686278628862986308631863286338634863586368637863886398640864186428643864486458646864786488649865086518652865386548655865686578658865986608661866286638664866586668667866886698670867186728673867486758676867786788679868086818682868386848685868686878688868986908691869286938694869586968697869886998700870187028703870487058706870787088709871087118712871387148715871687178718871987208721872287238724872587268727872887298730873187328733873487358736873787388739874087418742874387448745874687478748874987508751875287538754875587568757875887598760876187628763876487658766876787688769877087718772877387748775877687778778877987808781878287838784878587868787878887898790879187928793879487958796879787988799880088018802880388048805880688078808880988108811881288138814881588168817881888198820882188228823882488258826882788288829883088318832883388348835883688378838883988408841884288438844884588468847884888498850885188528853885488558856885788588859886088618862886388648865886688678868886988708871887288738874887588768877887888798880888188828883888488858886888788888889889088918892889388948895889688978898889989008901890289038904890589068907890889098910891189128913891489158916891789188919892089218922892389248925892689278928892989308931893289338934893589368937893889398940894189428943894489458946894789488949895089518952895389548955895689578958895989608961896289638964896589668967896889698970897189728973897489758976897789788979898089818982898389848985898689878988898989908991899289938994899589968997899889999000900190029003900490059006900790089009901090119012901390149015901690179018901990209021902290239024902590269027902890299030903190329033903490359036903790389039904090419042904390449045904690479048904990509051905290539054905590569057905890599060906190629063906490659066906790689069907090719072907390749075907690779078907990809081908290839084908590869087908890899090909190929093909490959096909790989099910091019102910391049105910691079108910991109111911291139114911591169117911891199120912191229123912491259126912791289129913091319132913391349135913691379138913991409141914291439144914591469147914891499150915191529153915491559156915791589159916091619162916391649165916691679168916991709171917291739174917591769177917891799180918191829183918491859186918791889189919091919192919391949195919691979198919992009201920292039204920592069207920892099210921192129213921492159216921792189219922092219222922392249225922692279228922992309231923292339234923592369237923892399240924192429243924492459246924792489249925092519252925392549255925692579258925992609261926292639264926592669267926892699270927192729273927492759276927792789279928092819282928392849285928692879288928992909291929292939294929592969297929892999300930193029303930493059306930793089309931093119312931393149315931693179318931993209321932293239324932593269327932893299330933193329333933493359336933793389339934093419342934393449345934693479348934993509351935293539354935593569357935893599360936193629363936493659366936793689369937093719372937393749375937693779378937993809381938293839384938593869387938893899390939193929393939493959396939793989399940094019402940394049405940694079408940994109411941294139414941594169417941894199420942194229423942494259426942794289429943094319432943394349435943694379438943994409441944294439444944594469447944894499450945194529453945494559456945794589459946094619462946394649465946694679468946994709471947294739474947594769477947894799480948194829483948494859486948794889489949094919492949394949495949694979498949995009501950295039504950595069507950895099510951195129513951495159516951795189519952095219522952395249525952695279528952995309531953295339534953595369537953895399540954195429543954495459546954795489549955095519552955395549555955695579558955995609561956295639564956595669567956895699570957195729573957495759576957795789579958095819582958395849585958695879588958995909591959295939594959595969597959895999600960196029603960496059606960796089609961096119612961396149615961696179618961996209621962296239624962596269627962896299630963196329633963496359636963796389639964096419642964396449645964696479648964996509651965296539654965596569657965896599660966196629663966496659666966796689669967096719672967396749675967696779678967996809681968296839684968596869687968896899690969196929693969496959696969796989699970097019702970397049705970697079708970997109711971297139714971597169717971897199720972197229723972497259726972797289729973097319732973397349735973697379738973997409741974297439744974597469747974897499750975197529753975497559756975797589759976097619762976397649765976697679768976997709771977297739774977597769777977897799780978197829783978497859786978797889789979097919792979397949795979697979798979998009801980298039804980598069807980898099810981198129813981498159816981798189819982098219822982398249825982698279828982998309831983298339834983598369837983898399840984198429843984498459846984798489849985098519852985398549855985698579858985998609861986298639864986598669867986898699870987198729873987498759876987798789879988098819882988398849885988698879888988998909891989298939894989598969897989898999900990199029903990499059906990799089909991099119912991399149915991699179918991999209921992299239924992599269927992899299930993199329933993499359936993799389939994099419942994399449945994699479948994999509951995299539954995599569957995899599960996199629963996499659966996799689969997099719972997399749975997699779978997999809981998299839984998599869987998899899990999199929993999499959996999799989999100001000110002100031000410005100061000710008100091001010011100121001310014100151001610017100181001910020100211002210023100241002510026100271002810029100301003110032100331003410035100361003710038100391004010041100421004310044100451004610047100481004910050100511005210053100541005510056100571005810059100601006110062100631006410065100661006710068100691007010071100721007310074100751007610077100781007910080100811008210083100841008510086100871008810089100901009110092100931009410095100961009710098100991010010101101021010310104101051010610107101081010910110101111011210113101141011510116101171011810119101201012110122101231012410125101261012710128101291013010131101321013310134101351013610137101381013910140101411014210143101441014510146101471014810149101501015110152101531015410155101561015710158101591016010161101621016310164101651016610167101681016910170101711017210173101741017510176101771017810179101801018110182101831018410185101861018710188101891019010191101921019310194101951019610197101981019910200102011020210203102041020510206102071020810209102101021110212102131021410215102161021710218102191022010221102221022310224102251022610227102281022910230102311023210233102341023510236102371023810239102401024110242102431024410245102461024710248102491025010251102521025310254102551025610257102581025910260102611026210263102641026510266102671026810269102701027110272102731027410275102761027710278102791028010281102821028310284102851028610287102881028910290102911029210293102941029510296102971029810299103001030110302103031030410305103061030710308103091031010311103121031310314103151031610317103181031910320103211032210323103241032510326103271032810329103301033110332103331033410335103361033710338103391034010341103421034310344103451034610347103481034910350103511035210353103541035510356103571035810359103601036110362103631036410365103661036710368103691037010371103721037310374103751037610377103781037910380103811038210383103841038510386103871038810389103901039110392103931039410395103961039710398103991040010401104021040310404104051040610407104081040910410104111041210413104141041510416104171041810419104201042110422104231042410425104261042710428104291043010431104321043310434104351043610437104381043910440104411044210443104441044510446104471044810449104501045110452104531045410455104561045710458104591046010461104621046310464104651046610467104681046910470104711047210473104741047510476104771047810479104801048110482104831048410485104861048710488104891049010491104921049310494104951049610497104981049910500105011050210503105041050510506105071050810509105101051110512105131051410515105161051710518105191052010521105221052310524105251052610527105281052910530105311053210533105341053510536105371053810539105401054110542105431054410545105461054710548105491055010551105521055310554105551055610557105581055910560105611056210563105641056510566105671056810569105701057110572105731057410575105761057710578105791058010581105821058310584105851058610587105881058910590105911059210593105941059510596105971059810599106001060110602106031060410605106061060710608106091061010611106121061310614106151061610617106181061910620106211062210623106241062510626106271062810629106301063110632106331063410635106361063710638106391064010641106421064310644106451064610647106481064910650106511065210653106541065510656106571065810659106601066110662106631066410665106661066710668106691067010671106721067310674106751067610677106781067910680106811068210683106841068510686106871068810689106901069110692106931069410695106961069710698106991070010701107021070310704107051070610707107081070910710107111071210713107141071510716107171071810719107201072110722107231072410725107261072710728107291073010731107321073310734107351073610737107381073910740107411074210743107441074510746107471074810749107501075110752107531075410755107561075710758107591076010761107621076310764107651076610767107681076910770107711077210773107741077510776107771077810779107801078110782107831078410785107861078710788107891079010791107921079310794107951079610797107981079910800108011080210803108041080510806108071080810809108101081110812108131081410815108161081710818108191082010821108221082310824108251082610827108281082910830108311083210833108341083510836108371083810839108401084110842108431084410845108461084710848108491085010851108521085310854108551085610857108581085910860108611086210863108641086510866108671086810869108701087110872108731087410875108761087710878108791088010881108821088310884108851088610887108881088910890108911089210893108941089510896108971089810899109001090110902109031090410905109061090710908109091091010911109121091310914109151091610917109181091910920109211092210923109241092510926109271092810929109301093110932109331093410935109361093710938109391094010941109421094310944109451094610947109481094910950109511095210953109541095510956109571095810959109601096110962109631096410965109661096710968109691097010971109721097310974109751097610977109781097910980109811098210983109841098510986109871098810989109901099110992109931099410995109961099710998109991100011001110021100311004110051100611007110081100911010110111101211013110141101511016110171101811019110201102111022110231102411025110261102711028110291103011031110321103311034110351103611037110381103911040110411104211043110441104511046110471104811049110501105111052110531105411055110561105711058110591106011061110621106311064110651106611067110681106911070110711107211073110741107511076110771107811079110801108111082110831108411085110861108711088110891109011091110921109311094110951109611097110981109911100111011110211103111041110511106111071110811109111101111111112111131111411115111161111711118111191112011121111221112311124111251112611127111281112911130111311113211133111341113511136111371113811139111401114111142111431114411145111461114711148111491115011151111521115311154111551115611157111581115911160111611116211163111641116511166111671116811169111701117111172111731117411175111761117711178111791118011181111821118311184111851118611187111881118911190111911119211193111941119511196111971119811199112001120111202112031120411205112061120711208112091121011211112121121311214112151121611217112181121911220112211122211223112241122511226112271122811229112301123111232112331123411235112361123711238112391124011241112421124311244112451124611247112481124911250112511125211253112541125511256112571125811259112601126111262112631126411265112661126711268112691127011271112721127311274112751127611277112781127911280112811128211283112841128511286112871128811289112901129111292112931129411295112961129711298112991130011301113021130311304113051130611307113081130911310113111131211313113141131511316113171131811319113201132111322113231132411325113261132711328113291133011331113321133311334113351133611337113381133911340113411134211343113441134511346113471134811349113501135111352113531135411355113561135711358113591136011361113621136311364113651136611367113681136911370113711137211373113741137511376113771137811379113801138111382113831138411385113861138711388113891139011391113921139311394113951139611397113981139911400114011140211403114041140511406114071140811409114101141111412114131141411415114161141711418114191142011421114221142311424114251142611427114281142911430114311143211433114341143511436114371143811439114401144111442114431144411445114461144711448114491145011451114521145311454114551145611457114581145911460114611146211463114641146511466114671146811469114701147111472114731147411475114761147711478114791148011481114821148311484114851148611487114881148911490114911149211493114941149511496114971149811499115001150111502115031150411505115061150711508115091151011511115121151311514115151151611517115181151911520115211152211523115241152511526115271152811529115301153111532115331153411535115361153711538115391154011541115421154311544115451154611547115481154911550115511155211553115541155511556115571155811559115601156111562115631156411565115661156711568115691157011571115721157311574115751157611577115781157911580115811158211583115841158511586115871158811589115901159111592115931159411595115961159711598115991160011601116021160311604116051160611607116081160911610116111161211613116141161511616116171161811619116201162111622116231162411625116261162711628116291163011631116321163311634116351163611637116381163911640116411164211643116441164511646116471164811649116501165111652116531165411655116561165711658116591166011661116621166311664116651166611667116681166911670116711167211673116741167511676116771167811679116801168111682116831168411685116861168711688116891169011691116921169311694116951169611697116981169911700117011170211703117041170511706117071170811709117101171111712117131171411715117161171711718117191172011721117221172311724117251172611727117281172911730117311173211733117341173511736117371173811739117401174111742117431174411745117461174711748117491175011751117521175311754117551175611757117581175911760117611176211763117641176511766117671176811769117701177111772117731177411775117761177711778117791178011781117821178311784117851178611787117881178911790117911179211793117941179511796117971179811799118001180111802118031180411805118061180711808118091181011811118121181311814118151181611817118181181911820118211182211823118241182511826118271182811829118301183111832118331183411835118361183711838118391184011841118421184311844118451184611847118481184911850118511185211853118541185511856118571185811859118601186111862118631186411865118661186711868118691187011871118721187311874118751187611877118781187911880118811188211883118841188511886118871188811889118901189111892118931189411895118961189711898118991190011901119021190311904119051190611907119081190911910119111191211913119141191511916119171191811919119201192111922119231192411925119261192711928119291193011931119321193311934119351193611937119381193911940119411194211943119441194511946119471194811949119501195111952119531195411955119561195711958119591196011961119621196311964119651196611967119681196911970119711197211973119741197511976119771197811979119801198111982119831198411985119861198711988119891199011991119921199311994119951199611997119981199912000120011200212003120041200512006120071200812009120101201112012120131201412015120161201712018120191202012021120221202312024120251202612027120281202912030120311203212033120341203512036120371203812039120401204112042120431204412045120461204712048120491205012051120521205312054120551205612057120581205912060120611206212063120641206512066120671206812069120701207112072120731207412075120761207712078120791208012081120821208312084120851208612087120881208912090120911209212093120941209512096120971209812099121001210112102121031210412105121061210712108121091211012111121121211312114121151211612117121181211912120121211212212123121241212512126121271212812129121301213112132121331213412135121361213712138121391214012141121421214312144121451214612147121481214912150121511215212153121541215512156121571215812159121601216112162121631216412165121661216712168121691217012171121721217312174121751217612177121781217912180121811218212183121841218512186121871218812189121901219112192121931219412195121961219712198121991220012201122021220312204122051220612207122081220912210122111221212213122141221512216122171221812219122201222112222122231222412225122261222712228122291223012231122321223312234122351223612237122381223912240122411224212243122441224512246122471224812249122501225112252122531225412255122561225712258122591226012261122621226312264122651226612267122681226912270122711227212273122741227512276122771227812279122801228112282122831228412285122861228712288122891229012291122921229312294122951229612297122981229912300123011230212303123041230512306123071230812309123101231112312123131231412315123161231712318123191232012321123221232312324123251232612327123281232912330123311233212333123341233512336123371233812339123401234112342123431234412345123461234712348123491235012351123521235312354123551235612357123581235912360123611236212363123641236512366123671236812369123701237112372123731237412375123761237712378123791238012381123821238312384123851238612387123881238912390123911239212393123941239512396123971239812399124001240112402124031240412405124061240712408124091241012411124121241312414124151241612417124181241912420124211242212423124241242512426124271242812429124301243112432124331243412435124361243712438124391244012441124421244312444124451244612447124481244912450124511245212453124541245512456124571245812459124601246112462124631246412465124661246712468124691247012471124721247312474124751247612477124781247912480124811248212483124841248512486124871248812489124901249112492124931249412495124961249712498124991250012501125021250312504125051250612507125081250912510125111251212513125141251512516125171251812519125201252112522125231252412525125261252712528125291253012531125321253312534125351253612537125381253912540125411254212543125441254512546125471254812549125501255112552125531255412555125561255712558125591256012561125621256312564125651256612567125681256912570125711257212573125741257512576125771257812579125801258112582125831258412585125861258712588125891259012591125921259312594125951259612597125981259912600126011260212603126041260512606126071260812609126101261112612126131261412615126161261712618126191262012621126221262312624126251262612627126281262912630126311263212633126341263512636126371263812639126401264112642126431264412645126461264712648126491265012651126521265312654126551265612657126581265912660126611266212663126641266512666126671266812669126701267112672126731267412675126761267712678126791268012681126821268312684126851268612687126881268912690126911269212693126941269512696126971269812699127001270112702127031270412705127061270712708127091271012711127121271312714127151271612717127181271912720127211272212723127241272512726127271272812729127301273112732127331273412735127361273712738127391274012741127421274312744127451274612747127481274912750127511275212753127541275512756127571275812759127601276112762127631276412765127661276712768127691277012771127721277312774127751277612777127781277912780127811278212783127841278512786127871278812789127901279112792127931279412795127961279712798127991280012801128021280312804128051280612807128081280912810128111281212813128141281512816128171281812819128201282112822128231282412825128261282712828128291283012831128321283312834128351283612837128381283912840128411284212843128441284512846128471284812849128501285112852128531285412855128561285712858128591286012861128621286312864128651286612867128681286912870128711287212873128741287512876128771287812879128801288112882128831288412885128861288712888128891289012891128921289312894128951289612897128981289912900129011290212903129041290512906129071290812909129101291112912129131291412915129161291712918129191292012921129221292312924129251292612927129281292912930129311293212933129341293512936129371293812939129401294112942129431294412945129461294712948129491295012951129521295312954129551295612957129581295912960129611296212963129641296512966129671296812969129701297112972129731297412975129761297712978129791298012981129821298312984129851298612987129881298912990129911299212993129941299512996129971299812999130001300113002130031300413005130061300713008130091301013011130121301313014130151301613017130181301913020130211302213023130241302513026130271302813029130301303113032130331303413035130361303713038130391304013041130421304313044130451304613047130481304913050130511305213053130541305513056130571305813059130601306113062130631306413065130661306713068130691307013071130721307313074130751307613077130781307913080130811308213083130841308513086130871308813089130901309113092130931309413095130961309713098130991310013101131021310313104131051310613107131081310913110131111311213113131141311513116131171311813119131201312113122131231312413125131261312713128131291313013131131321313313134131351313613137131381313913140131411314213143131441314513146131471314813149131501315113152131531315413155131561315713158131591316013161131621316313164131651316613167131681316913170131711317213173131741317513176131771317813179131801318113182131831318413185131861318713188131891319013191131921319313194131951319613197131981319913200132011320213203132041320513206132071320813209132101321113212132131321413215132161321713218132191322013221132221322313224132251322613227132281322913230132311323213233132341323513236132371323813239132401324113242132431324413245132461324713248132491325013251132521325313254132551325613257132581325913260132611326213263132641326513266132671326813269132701327113272132731327413275132761327713278132791328013281132821328313284132851328613287132881328913290132911329213293132941329513296132971329813299133001330113302133031330413305133061330713308133091331013311133121331313314133151331613317133181331913320133211332213323133241332513326133271332813329133301333113332133331333413335133361333713338133391334013341133421334313344133451334613347133481334913350133511335213353133541335513356133571335813359133601336113362133631336413365133661336713368133691337013371133721337313374133751337613377133781337913380133811338213383133841338513386133871338813389133901339113392133931339413395133961339713398133991340013401134021340313404134051340613407134081340913410134111341213413134141341513416134171341813419134201342113422134231342413425134261342713428134291343013431134321343313434134351343613437134381343913440134411344213443134441344513446134471344813449134501345113452134531345413455134561345713458134591346013461134621346313464134651346613467134681346913470134711347213473134741347513476134771347813479134801348113482134831348413485134861348713488134891349013491134921349313494134951349613497134981349913500135011350213503135041350513506135071350813509135101351113512135131351413515135161351713518135191352013521135221352313524135251352613527135281352913530135311353213533135341353513536135371353813539135401354113542135431354413545135461354713548135491355013551135521355313554135551355613557135581355913560135611356213563135641356513566135671356813569135701357113572135731357413575135761357713578135791358013581135821358313584135851358613587135881358913590135911359213593135941359513596135971359813599136001360113602136031360413605136061360713608136091361013611136121361313614136151361613617136181361913620136211362213623136241362513626136271362813629136301363113632136331363413635136361363713638136391364013641136421364313644136451364613647136481364913650136511365213653136541365513656136571365813659136601366113662136631366413665136661366713668136691367013671136721367313674136751367613677136781367913680136811368213683136841368513686136871368813689136901369113692136931369413695136961369713698136991370013701137021370313704137051370613707137081370913710137111371213713137141371513716137171371813719137201372113722137231372413725137261372713728137291373013731137321373313734137351373613737137381373913740137411374213743137441374513746137471374813749137501375113752137531375413755137561375713758137591376013761137621376313764137651376613767137681376913770137711377213773137741377513776137771377813779137801378113782137831378413785137861378713788137891379013791137921379313794137951379613797137981379913800138011380213803138041380513806138071380813809138101381113812138131381413815138161381713818138191382013821138221382313824138251382613827138281382913830138311383213833138341383513836138371383813839138401384113842138431384413845138461384713848138491385013851138521385313854138551385613857138581385913860138611386213863138641386513866138671386813869138701387113872138731387413875138761387713878138791388013881138821388313884138851388613887138881388913890138911389213893138941389513896138971389813899139001390113902139031390413905139061390713908139091391013911139121391313914139151391613917139181391913920139211392213923139241392513926139271392813929139301393113932139331393413935139361393713938139391394013941139421394313944139451394613947139481394913950139511395213953139541395513956139571395813959139601396113962139631396413965139661396713968139691397013971139721397313974139751397613977139781397913980139811398213983139841398513986139871398813989139901399113992139931399413995139961399713998139991400014001140021400314004140051400614007140081400914010140111401214013140141401514016140171401814019140201402114022140231402414025140261402714028140291403014031140321403314034140351403614037140381403914040140411404214043140441404514046140471404814049140501405114052140531405414055140561405714058140591406014061140621406314064140651406614067140681406914070140711407214073140741407514076140771407814079140801408114082140831408414085140861408714088140891409014091140921409314094140951409614097140981409914100141011410214103141041410514106141071410814109141101411114112141131411414115141161411714118141191412014121141221412314124141251412614127141281412914130141311413214133141341413514136141371413814139141401414114142141431414414145141461414714148141491415014151141521415314154141551415614157141581415914160141611416214163141641416514166141671416814169141701417114172141731417414175141761417714178141791418014181141821418314184141851418614187141881418914190141911419214193141941419514196141971419814199142001420114202142031420414205142061420714208142091421014211142121421314214142151421614217142181421914220142211422214223142241422514226142271422814229142301423114232142331423414235142361423714238142391424014241142421424314244142451424614247142481424914250142511425214253142541425514256142571425814259142601426114262142631426414265142661426714268142691427014271142721427314274142751427614277142781427914280142811428214283142841428514286142871428814289142901429114292142931429414295142961429714298142991430014301143021430314304143051430614307143081430914310143111431214313143141431514316143171431814319143201432114322143231432414325143261432714328143291433014331143321433314334143351433614337143381433914340143411434214343143441434514346143471434814349143501435114352143531435414355143561435714358143591436014361143621436314364143651436614367143681436914370143711437214373143741437514376143771437814379143801438114382143831438414385143861438714388143891439014391143921439314394143951439614397143981439914400144011440214403144041440514406144071440814409144101441114412144131441414415144161441714418144191442014421144221442314424144251442614427144281442914430144311443214433144341443514436144371443814439144401444114442144431444414445144461444714448144491445014451144521445314454144551445614457144581445914460144611446214463144641446514466144671446814469144701447114472144731447414475144761447714478144791448014481144821448314484144851448614487144881448914490144911449214493144941449514496144971449814499145001450114502145031450414505145061450714508145091451014511145121451314514145151451614517145181451914520145211452214523145241452514526145271452814529145301453114532145331453414535145361453714538145391454014541145421454314544145451454614547145481454914550145511455214553145541455514556145571455814559145601456114562145631456414565145661456714568145691457014571145721457314574145751457614577145781457914580145811458214583145841458514586145871458814589145901459114592145931459414595145961459714598145991460014601146021460314604146051460614607146081460914610146111461214613146141461514616146171461814619146201462114622146231462414625146261462714628146291463014631146321463314634146351463614637146381463914640146411464214643146441464514646146471464814649146501465114652146531465414655146561465714658146591466014661146621466314664146651466614667146681466914670146711467214673146741467514676146771467814679146801468114682146831468414685146861468714688146891469014691146921469314694146951469614697146981469914700147011470214703147041470514706147071470814709147101471114712147131471414715147161471714718147191472014721147221472314724147251472614727147281472914730147311473214733147341473514736147371473814739147401474114742147431474414745147461474714748147491475014751147521475314754147551475614757147581475914760147611476214763147641476514766147671476814769147701477114772147731477414775147761477714778147791478014781147821478314784147851478614787147881478914790147911479214793147941479514796147971479814799148001480114802148031480414805148061480714808148091481014811148121481314814148151481614817148181481914820148211482214823148241482514826148271482814829148301483114832148331483414835148361483714838148391484014841148421484314844148451484614847148481484914850148511485214853148541485514856148571485814859148601486114862148631486414865148661486714868148691487014871148721487314874148751487614877148781487914880148811488214883148841488514886148871488814889148901489114892148931489414895148961489714898148991490014901149021490314904149051490614907149081490914910149111491214913149141491514916149171491814919149201492114922149231492414925149261492714928149291493014931149321493314934149351493614937149381493914940149411494214943149441494514946149471494814949149501495114952149531495414955149561495714958149591496014961149621496314964149651496614967149681496914970149711497214973149741497514976149771497814979149801498114982149831498414985149861498714988149891499014991149921499314994149951499614997149981499915000150011500215003150041500515006150071500815009150101501115012150131501415015150161501715018150191502015021150221502315024150251502615027150281502915030150311503215033150341503515036150371503815039150401504115042150431504415045150461504715048150491505015051150521505315054150551505615057150581505915060150611506215063150641506515066150671506815069150701507115072150731507415075150761507715078150791508015081150821508315084150851508615087150881508915090150911509215093150941509515096150971509815099151001510115102151031510415105151061510715108151091511015111151121511315114151151511615117151181511915120151211512215123151241512515126151271512815129151301513115132151331513415135151361513715138151391514015141151421514315144151451514615147151481514915150151511515215153151541515515156151571515815159151601516115162151631516415165151661516715168151691517015171151721517315174151751517615177151781517915180151811518215183151841518515186151871518815189151901519115192151931519415195151961519715198151991520015201152021520315204152051520615207152081520915210152111521215213152141521515216152171521815219152201522115222152231522415225152261522715228152291523015231152321523315234152351523615237152381523915240152411524215243152441524515246152471524815249152501525115252152531525415255152561525715258152591526015261152621526315264152651526615267152681526915270152711527215273152741527515276152771527815279152801528115282152831528415285152861528715288152891529015291152921529315294152951529615297152981529915300153011530215303153041530515306153071530815309153101531115312153131531415315153161531715318153191532015321153221532315324153251532615327153281532915330153311533215333153341533515336153371533815339153401534115342153431534415345153461534715348153491535015351153521535315354153551535615357153581535915360153611536215363153641536515366153671536815369153701537115372153731537415375153761537715378153791538015381153821538315384153851538615387153881538915390153911539215393153941539515396153971539815399154001540115402154031540415405154061540715408154091541015411154121541315414154151541615417154181541915420154211542215423154241542515426154271542815429154301543115432154331543415435154361543715438154391544015441154421544315444154451544615447154481544915450154511545215453154541545515456154571545815459154601546115462154631546415465154661546715468154691547015471154721547315474154751547615477154781547915480154811548215483154841548515486154871548815489154901549115492154931549415495154961549715498154991550015501155021550315504155051550615507155081550915510155111551215513155141551515516155171551815519155201552115522155231552415525155261552715528155291553015531155321553315534155351553615537155381553915540155411554215543155441554515546155471554815549155501555115552155531555415555155561555715558155591556015561155621556315564155651556615567155681556915570155711557215573155741557515576155771557815579155801558115582155831558415585155861558715588155891559015591155921559315594155951559615597155981559915600156011560215603156041560515606156071560815609156101561115612156131561415615156161561715618156191562015621156221562315624156251562615627156281562915630156311563215633156341563515636156371563815639156401564115642156431564415645156461564715648156491565015651156521565315654156551565615657156581565915660156611566215663156641566515666156671566815669156701567115672156731567415675156761567715678156791568015681156821568315684156851568615687156881568915690156911569215693156941569515696156971569815699157001570115702157031570415705157061570715708157091571015711157121571315714157151571615717157181571915720157211572215723157241572515726157271572815729157301573115732157331573415735157361573715738157391574015741157421574315744157451574615747157481574915750157511575215753157541575515756157571575815759157601576115762157631576415765157661576715768157691577015771157721577315774157751577615777157781577915780157811578215783157841578515786157871578815789157901579115792157931579415795157961579715798157991580015801158021580315804158051580615807158081580915810158111581215813158141581515816158171581815819158201582115822158231582415825158261582715828158291583015831158321583315834158351583615837158381583915840158411584215843158441584515846158471584815849158501585115852158531585415855158561585715858158591586015861158621586315864158651586615867158681586915870158711587215873158741587515876158771587815879158801588115882158831588415885158861588715888158891589015891158921589315894158951589615897158981589915900159011590215903159041590515906159071590815909159101591115912159131591415915159161591715918159191592015921159221592315924159251592615927159281592915930159311593215933159341593515936159371593815939159401594115942159431594415945159461594715948159491595015951159521595315954159551595615957159581595915960159611596215963159641596515966159671596815969159701597115972159731597415975159761597715978159791598015981159821598315984159851598615987159881598915990159911599215993159941599515996159971599815999160001600116002160031600416005160061600716008160091601016011160121601316014160151601616017160181601916020160211602216023160241602516026160271602816029160301603116032160331603416035160361603716038160391604016041160421604316044160451604616047160481604916050160511605216053160541605516056160571605816059160601606116062160631606416065160661606716068160691607016071160721607316074160751607616077160781607916080160811608216083160841608516086160871608816089160901609116092160931609416095160961609716098160991610016101161021610316104161051610616107161081610916110161111611216113161141611516116161171611816119161201612116122161231612416125161261612716128161291613016131161321613316134161351613616137161381613916140161411614216143161441614516146161471614816149161501615116152161531615416155161561615716158161591616016161161621616316164161651616616167161681616916170161711617216173161741617516176161771617816179161801618116182161831618416185161861618716188161891619016191161921619316194161951619616197161981619916200162011620216203162041620516206162071620816209162101621116212162131621416215162161621716218162191622016221162221622316224162251622616227162281622916230162311623216233162341623516236162371623816239162401624116242162431624416245162461624716248162491625016251162521625316254162551625616257162581625916260162611626216263162641626516266162671626816269162701627116272162731627416275162761627716278162791628016281162821628316284162851628616287162881628916290162911629216293162941629516296162971629816299163001630116302163031630416305163061630716308163091631016311163121631316314163151631616317163181631916320163211632216323163241632516326163271632816329163301633116332163331633416335163361633716338163391634016341163421634316344163451634616347163481634916350163511635216353163541635516356163571635816359163601636116362163631636416365163661636716368163691637016371163721637316374163751637616377163781637916380163811638216383163841638516386163871638816389163901639116392163931639416395163961639716398163991640016401164021640316404164051640616407164081640916410164111641216413164141641516416164171641816419164201642116422164231642416425164261642716428164291643016431164321643316434164351643616437164381643916440164411644216443164441644516446164471644816449164501645116452164531645416455164561645716458164591646016461164621646316464164651646616467164681646916470164711647216473164741647516476164771647816479164801648116482164831648416485164861648716488164891649016491164921649316494164951649616497164981649916500165011650216503165041650516506165071650816509165101651116512165131651416515165161651716518165191652016521165221652316524165251652616527165281652916530165311653216533165341653516536165371653816539165401654116542165431654416545165461654716548165491655016551165521655316554165551655616557165581655916560165611656216563165641656516566165671656816569165701657116572165731657416575165761657716578165791658016581165821658316584165851658616587165881658916590165911659216593165941659516596165971659816599166001660116602166031660416605166061660716608166091661016611166121661316614166151661616617166181661916620166211662216623166241662516626166271662816629166301663116632166331663416635166361663716638166391664016641166421664316644166451664616647166481664916650166511665216653166541665516656166571665816659166601666116662166631666416665166661666716668166691667016671166721667316674166751667616677166781667916680166811668216683166841668516686166871668816689166901669116692166931669416695166961669716698166991670016701167021670316704167051670616707167081670916710167111671216713167141671516716167171671816719167201672116722167231672416725167261672716728167291673016731167321673316734167351673616737167381673916740167411674216743167441674516746167471674816749167501675116752167531675416755167561675716758167591676016761167621676316764167651676616767167681676916770167711677216773167741677516776167771677816779167801678116782167831678416785167861678716788167891679016791167921679316794167951679616797167981679916800168011680216803168041680516806168071680816809168101681116812168131681416815168161681716818168191682016821168221682316824168251682616827168281682916830168311683216833168341683516836168371683816839168401684116842168431684416845168461684716848168491685016851168521685316854168551685616857168581685916860168611686216863168641686516866168671686816869168701687116872168731687416875168761687716878168791688016881168821688316884168851688616887168881688916890168911689216893168941689516896168971689816899169001690116902169031690416905169061690716908169091691016911169121691316914169151691616917169181691916920169211692216923169241692516926169271692816929169301693116932169331693416935169361693716938169391694016941169421694316944169451694616947169481694916950169511695216953169541695516956169571695816959169601696116962169631696416965169661696716968169691697016971169721697316974169751697616977169781697916980169811698216983169841698516986169871698816989169901699116992169931699416995169961699716998169991700017001170021700317004170051700617007170081700917010170111701217013170141701517016170171701817019170201702117022170231702417025170261702717028170291703017031170321703317034170351703617037170381703917040170411704217043170441704517046170471704817049170501705117052170531705417055170561705717058170591706017061170621706317064170651706617067170681706917070170711707217073170741707517076170771707817079170801708117082170831708417085170861708717088170891709017091170921709317094170951709617097170981709917100171011710217103171041710517106171071710817109171101711117112171131711417115171161711717118171191712017121171221712317124171251712617127171281712917130171311713217133171341713517136171371713817139171401714117142171431714417145171461714717148171491715017151171521715317154171551715617157171581715917160171611716217163171641716517166171671716817169171701717117172171731717417175171761717717178171791718017181171821718317184171851718617187171881718917190171911719217193171941719517196171971719817199172001720117202172031720417205172061720717208172091721017211172121721317214172151721617217172181721917220172211722217223172241722517226172271722817229172301723117232172331723417235172361723717238172391724017241172421724317244172451724617247172481724917250172511725217253172541725517256172571725817259172601726117262172631726417265172661726717268172691727017271172721727317274172751727617277172781727917280172811728217283172841728517286172871728817289172901729117292172931729417295172961729717298172991730017301173021730317304173051730617307173081730917310173111731217313173141731517316173171731817319173201732117322173231732417325173261732717328173291733017331173321733317334173351733617337173381733917340173411734217343173441734517346173471734817349173501735117352173531735417355173561735717358173591736017361173621736317364173651736617367173681736917370173711737217373173741737517376173771737817379173801738117382173831738417385173861738717388173891739017391173921739317394173951739617397173981739917400174011740217403174041740517406174071740817409174101741117412174131741417415174161741717418174191742017421174221742317424174251742617427174281742917430174311743217433174341743517436174371743817439174401744117442174431744417445174461744717448174491745017451174521745317454174551745617457174581745917460174611746217463174641746517466174671746817469174701747117472174731747417475174761747717478174791748017481174821748317484174851748617487174881748917490174911749217493174941749517496174971749817499175001750117502175031750417505175061750717508175091751017511175121751317514175151751617517175181751917520175211752217523175241752517526175271752817529175301753117532175331753417535175361753717538175391754017541175421754317544175451754617547175481754917550175511755217553175541755517556175571755817559175601756117562175631756417565175661756717568175691757017571175721757317574175751757617577175781757917580175811758217583175841758517586175871758817589175901759117592175931759417595175961759717598175991760017601176021760317604176051760617607176081760917610176111761217613176141761517616176171761817619176201762117622176231762417625176261762717628176291763017631176321763317634176351763617637176381763917640176411764217643176441764517646176471764817649176501765117652176531765417655176561765717658176591766017661176621766317664176651766617667176681766917670176711767217673176741767517676176771767817679176801768117682176831768417685176861768717688176891769017691176921769317694176951769617697176981769917700177011770217703177041770517706177071770817709177101771117712177131771417715177161771717718177191772017721177221772317724177251772617727177281772917730177311773217733177341773517736177371773817739177401774117742177431774417745177461774717748177491775017751177521775317754177551775617757177581775917760177611776217763177641776517766177671776817769177701777117772177731777417775177761777717778177791778017781177821778317784177851778617787177881778917790177911779217793177941779517796177971779817799178001780117802178031780417805178061780717808178091781017811178121781317814178151781617817178181781917820178211782217823178241782517826178271782817829178301783117832178331783417835178361783717838178391784017841178421784317844178451784617847178481784917850178511785217853178541785517856178571785817859178601786117862178631786417865178661786717868178691787017871178721787317874178751787617877178781787917880178811788217883178841788517886178871788817889178901789117892178931789417895178961789717898178991790017901179021790317904179051790617907179081790917910179111791217913179141791517916179171791817919179201792117922179231792417925179261792717928179291793017931179321793317934179351793617937179381793917940179411794217943179441794517946179471794817949179501795117952179531795417955179561795717958179591796017961179621796317964179651796617967179681796917970179711797217973179741797517976179771797817979179801798117982179831798417985179861798717988179891799017991179921799317994179951799617997179981799918000180011800218003180041800518006180071800818009180101801118012180131801418015180161801718018180191802018021180221802318024180251802618027180281802918030180311803218033180341803518036180371803818039180401804118042180431804418045180461804718048180491805018051180521805318054180551805618057180581805918060180611806218063180641806518066180671806818069180701807118072180731807418075180761807718078180791808018081180821808318084180851808618087180881808918090180911809218093180941809518096180971809818099181001810118102181031810418105181061810718108181091811018111181121811318114181151811618117181181811918120181211812218123181241812518126181271812818129181301813118132181331813418135181361813718138181391814018141181421814318144181451814618147181481814918150181511815218153181541815518156181571815818159181601816118162181631816418165181661816718168181691817018171181721817318174181751817618177181781817918180181811818218183181841818518186181871818818189181901819118192181931819418195181961819718198181991820018201182021820318204182051820618207182081820918210182111821218213182141821518216182171821818219182201822118222182231822418225182261822718228182291823018231182321823318234182351823618237182381823918240182411824218243182441824518246182471824818249182501825118252182531825418255182561825718258182591826018261182621826318264182651826618267182681826918270182711827218273182741827518276182771827818279182801828118282182831828418285182861828718288182891829018291182921829318294182951829618297182981829918300183011830218303183041830518306183071830818309183101831118312183131831418315183161831718318183191832018321183221832318324183251832618327183281832918330183311833218333183341833518336183371833818339183401834118342183431834418345183461834718348183491835018351183521835318354183551835618357183581835918360183611836218363183641836518366183671836818369183701837118372183731837418375183761837718378183791838018381183821838318384183851838618387183881838918390183911839218393183941839518396183971839818399184001840118402184031840418405184061840718408184091841018411184121841318414184151841618417184181841918420184211842218423184241842518426184271842818429184301843118432184331843418435184361843718438184391844018441184421844318444184451844618447184481844918450184511845218453184541845518456184571845818459184601846118462184631846418465184661846718468184691847018471184721847318474184751847618477184781847918480184811848218483184841848518486184871848818489184901849118492184931849418495184961849718498184991850018501185021850318504185051850618507185081850918510185111851218513185141851518516185171851818519185201852118522185231852418525185261852718528185291853018531185321853318534185351853618537185381853918540185411854218543185441854518546185471854818549185501855118552185531855418555185561855718558185591856018561185621856318564185651856618567185681856918570185711857218573185741857518576185771857818579185801858118582185831858418585185861858718588185891859018591185921859318594185951859618597185981859918600186011860218603186041860518606186071860818609186101861118612186131861418615186161861718618186191862018621186221862318624186251862618627186281862918630186311863218633186341863518636186371863818639186401864118642186431864418645186461864718648186491865018651186521865318654186551865618657186581865918660186611866218663186641866518666186671866818669186701867118672186731867418675186761867718678186791868018681186821868318684186851868618687186881868918690186911869218693186941869518696186971869818699187001870118702187031870418705187061870718708187091871018711187121871318714187151871618717187181871918720187211872218723187241872518726187271872818729187301873118732187331873418735187361873718738187391874018741187421874318744187451874618747187481874918750187511875218753187541875518756187571875818759187601876118762187631876418765187661876718768187691877018771187721877318774187751877618777187781877918780187811878218783187841878518786187871878818789187901879118792187931879418795187961879718798187991880018801188021880318804188051880618807188081880918810188111881218813188141881518816188171881818819188201882118822188231882418825188261882718828188291883018831188321883318834188351883618837188381883918840188411884218843188441884518846188471884818849188501885118852188531885418855188561885718858188591886018861188621886318864188651886618867188681886918870188711887218873188741887518876188771887818879188801888118882188831888418885188861888718888188891889018891188921889318894188951889618897188981889918900189011890218903189041890518906189071890818909189101891118912189131891418915189161891718918189191892018921189221892318924189251892618927189281892918930189311893218933189341893518936189371893818939189401894118942189431894418945189461894718948189491895018951189521895318954189551895618957189581895918960189611896218963189641896518966189671896818969189701897118972189731897418975189761897718978189791898018981189821898318984189851898618987189881898918990189911899218993189941899518996189971899818999190001900119002190031900419005190061900719008190091901019011190121901319014190151901619017190181901919020190211902219023190241902519026190271902819029190301903119032190331903419035190361903719038190391904019041190421904319044190451904619047190481904919050190511905219053190541905519056190571905819059190601906119062190631906419065190661906719068190691907019071190721907319074190751907619077190781907919080190811908219083190841908519086190871908819089190901909119092190931909419095190961909719098190991910019101191021910319104191051910619107191081910919110191111911219113191141911519116191171911819119191201912119122191231912419125191261912719128191291913019131191321913319134191351913619137191381913919140191411914219143191441914519146191471914819149191501915119152191531915419155191561915719158191591916019161191621916319164191651916619167191681916919170191711917219173191741917519176191771917819179191801918119182191831918419185191861918719188191891919019191191921919319194191951919619197191981919919200192011920219203192041920519206192071920819209192101921119212192131921419215192161921719218192191922019221192221922319224192251922619227192281922919230192311923219233192341923519236192371923819239192401924119242192431924419245192461924719248192491925019251192521925319254192551925619257192581925919260192611926219263192641926519266192671926819269192701927119272192731927419275192761927719278192791928019281192821928319284192851928619287192881928919290192911929219293192941929519296192971929819299193001930119302193031930419305193061930719308193091931019311193121931319314193151931619317193181931919320193211932219323193241932519326193271932819329193301933119332193331933419335193361933719338193391934019341193421934319344193451934619347193481934919350193511935219353193541935519356193571935819359193601936119362193631936419365193661936719368193691937019371193721937319374193751937619377193781937919380193811938219383193841938519386193871938819389193901939119392193931939419395193961939719398193991940019401194021940319404194051940619407194081940919410194111941219413194141941519416194171941819419194201942119422194231942419425194261942719428194291943019431194321943319434194351943619437194381943919440194411944219443194441944519446194471944819449194501945119452194531945419455194561945719458194591946019461194621946319464194651946619467194681946919470194711947219473194741947519476194771947819479194801948119482194831948419485194861948719488194891949019491194921949319494194951949619497194981949919500195011950219503195041950519506195071950819509195101951119512195131951419515195161951719518195191952019521195221952319524195251952619527195281952919530195311953219533195341953519536195371953819539195401954119542195431954419545195461954719548195491955019551195521955319554195551955619557195581955919560195611956219563195641956519566195671956819569195701957119572195731957419575195761957719578195791958019581195821958319584195851958619587195881958919590195911959219593195941959519596195971959819599196001960119602196031960419605196061960719608196091961019611196121961319614196151961619617196181961919620196211962219623196241962519626196271962819629196301963119632196331963419635196361963719638196391964019641196421964319644196451964619647196481964919650196511965219653196541965519656196571965819659196601966119662196631966419665196661966719668196691967019671196721967319674196751967619677196781967919680196811968219683196841968519686196871968819689196901969119692196931969419695196961969719698196991970019701197021970319704197051970619707197081970919710197111971219713197141971519716197171971819719197201972119722197231972419725197261972719728197291973019731197321973319734197351973619737197381973919740197411974219743197441974519746197471974819749197501975119752197531975419755197561975719758197591976019761197621976319764197651976619767197681976919770197711977219773197741977519776197771977819779197801978119782197831978419785197861978719788197891979019791197921979319794197951979619797197981979919800198011980219803198041980519806198071980819809198101981119812198131981419815198161981719818198191982019821198221982319824198251982619827198281982919830198311983219833198341983519836198371983819839198401984119842198431984419845198461984719848198491985019851198521985319854198551985619857198581985919860198611986219863198641986519866198671986819869198701987119872198731987419875198761987719878198791988019881198821988319884198851988619887198881988919890198911989219893198941989519896198971989819899199001990119902199031990419905199061990719908199091991019911199121991319914199151991619917199181991919920199211992219923199241992519926199271992819929199301993119932199331993419935199361993719938199391994019941199421994319944199451994619947199481994919950199511995219953199541995519956199571995819959199601996119962199631996419965199661996719968199691997019971199721997319974199751997619977199781997919980199811998219983199841998519986199871998819989199901999119992199931999419995199961999719998199992000020001200022000320004200052000620007200082000920010200112001220013200142001520016200172001820019200202002120022200232002420025200262002720028200292003020031200322003320034200352003620037200382003920040200412004220043200442004520046200472004820049200502005120052200532005420055200562005720058200592006020061200622006320064200652006620067200682006920070200712007220073200742007520076200772007820079200802008120082200832008420085200862008720088200892009020091200922009320094200952009620097200982009920100201012010220103201042010520106201072010820109201102011120112201132011420115201162011720118201192012020121201222012320124201252012620127201282012920130201312013220133201342013520136201372013820139201402014120142201432014420145201462014720148201492015020151201522015320154201552015620157201582015920160201612016220163201642016520166201672016820169201702017120172201732017420175201762017720178201792018020181201822018320184201852018620187201882018920190201912019220193201942019520196201972019820199202002020120202202032020420205202062020720208202092021020211202122021320214202152021620217202182021920220202212022220223202242022520226202272022820229202302023120232202332023420235202362023720238202392024020241202422024320244202452024620247202482024920250202512025220253202542025520256202572025820259202602026120262202632026420265202662026720268202692027020271202722027320274202752027620277202782027920280202812028220283202842028520286202872028820289202902029120292202932029420295202962029720298202992030020301203022030320304203052030620307203082030920310203112031220313203142031520316203172031820319203202032120322203232032420325203262032720328203292033020331203322033320334203352033620337203382033920340203412034220343203442034520346203472034820349203502035120352203532035420355203562035720358203592036020361203622036320364203652036620367203682036920370203712037220373203742037520376203772037820379203802038120382203832038420385203862038720388203892039020391203922039320394203952039620397203982039920400204012040220403204042040520406204072040820409204102041120412204132041420415204162041720418204192042020421204222042320424204252042620427204282042920430204312043220433204342043520436204372043820439204402044120442204432044420445204462044720448204492045020451204522045320454204552045620457204582045920460204612046220463204642046520466204672046820469204702047120472204732047420475204762047720478204792048020481204822048320484204852048620487204882048920490204912049220493204942049520496204972049820499205002050120502205032050420505205062050720508205092051020511205122051320514205152051620517205182051920520205212052220523205242052520526205272052820529205302053120532205332053420535205362053720538205392054020541205422054320544205452054620547205482054920550205512055220553205542055520556205572055820559205602056120562205632056420565205662056720568205692057020571205722057320574205752057620577205782057920580205812058220583205842058520586205872058820589205902059120592205932059420595205962059720598205992060020601206022060320604206052060620607206082060920610206112061220613206142061520616206172061820619206202062120622206232062420625206262062720628206292063020631206322063320634206352063620637206382063920640206412064220643206442064520646206472064820649206502065120652206532065420655206562065720658206592066020661206622066320664206652066620667206682066920670206712067220673206742067520676206772067820679206802068120682206832068420685206862068720688206892069020691206922069320694206952069620697206982069920700207012070220703207042070520706207072070820709207102071120712207132071420715207162071720718207192072020721207222072320724207252072620727207282072920730207312073220733207342073520736207372073820739207402074120742207432074420745207462074720748207492075020751207522075320754207552075620757207582075920760207612076220763207642076520766207672076820769207702077120772207732077420775207762077720778207792078020781207822078320784207852078620787207882078920790207912079220793207942079520796207972079820799208002080120802208032080420805208062080720808208092081020811208122081320814208152081620817208182081920820208212082220823208242082520826208272082820829208302083120832208332083420835208362083720838208392084020841208422084320844208452084620847208482084920850208512085220853208542085520856208572085820859208602086120862208632086420865208662086720868208692087020871208722087320874208752087620877208782087920880208812088220883208842088520886208872088820889208902089120892208932089420895208962089720898208992090020901209022090320904209052090620907209082090920910209112091220913209142091520916209172091820919209202092120922209232092420925209262092720928209292093020931209322093320934209352093620937209382093920940209412094220943209442094520946209472094820949209502095120952209532095420955209562095720958209592096020961209622096320964209652096620967209682096920970209712097220973209742097520976209772097820979209802098120982209832098420985209862098720988209892099020991209922099320994209952099620997209982099921000210012100221003210042100521006210072100821009210102101121012210132101421015210162101721018210192102021021210222102321024210252102621027210282102921030210312103221033210342103521036210372103821039210402104121042210432104421045210462104721048210492105021051210522105321054210552105621057210582105921060210612106221063210642106521066210672106821069210702107121072210732107421075210762107721078210792108021081210822108321084210852108621087210882108921090210912109221093210942109521096210972109821099211002110121102211032110421105211062110721108211092111021111211122111321114211152111621117211182111921120211212112221123211242112521126211272112821129211302113121132211332113421135211362113721138211392114021141211422114321144211452114621147211482114921150211512115221153211542115521156211572115821159211602116121162211632116421165211662116721168211692117021171211722117321174211752117621177211782117921180211812118221183211842118521186211872118821189211902119121192211932119421195211962119721198211992120021201212022120321204212052120621207212082120921210212112121221213212142121521216212172121821219212202122121222212232122421225212262122721228212292123021231212322123321234212352123621237212382123921240212412124221243212442124521246212472124821249212502125121252212532125421255212562125721258212592126021261212622126321264212652126621267212682126921270212712127221273212742127521276212772127821279212802128121282212832128421285212862128721288212892129021291212922129321294212952129621297212982129921300213012130221303213042130521306213072130821309213102131121312213132131421315213162131721318213192132021321213222132321324213252132621327213282132921330213312133221333213342133521336213372133821339213402134121342213432134421345213462134721348213492135021351213522135321354213552135621357213582135921360213612136221363213642136521366213672136821369213702137121372213732137421375213762137721378213792138021381213822138321384213852138621387213882138921390213912139221393213942139521396213972139821399214002140121402214032140421405214062140721408214092141021411214122141321414214152141621417214182141921420214212142221423214242142521426214272142821429214302143121432214332143421435214362143721438214392144021441214422144321444214452144621447214482144921450214512145221453214542145521456214572145821459214602146121462214632146421465214662146721468214692147021471214722147321474214752147621477214782147921480214812148221483214842148521486214872148821489214902149121492214932149421495214962149721498214992150021501215022150321504215052150621507215082150921510215112151221513215142151521516215172151821519215202152121522215232152421525215262152721528215292153021531215322153321534215352153621537215382153921540215412154221543215442154521546215472154821549215502155121552215532155421555215562155721558215592156021561215622156321564215652156621567215682156921570215712157221573215742157521576215772157821579215802158121582215832158421585215862158721588215892159021591215922159321594215952159621597215982159921600216012160221603216042160521606216072160821609216102161121612216132161421615216162161721618216192162021621216222162321624216252162621627216282162921630216312163221633216342163521636216372163821639216402164121642216432164421645216462164721648216492165021651216522165321654216552165621657216582165921660216612166221663216642166521666216672166821669216702167121672216732167421675216762167721678216792168021681216822168321684216852168621687216882168921690216912169221693216942169521696216972169821699217002170121702217032170421705217062170721708217092171021711217122171321714217152171621717217182171921720217212172221723217242172521726217272172821729217302173121732217332173421735217362173721738217392174021741217422174321744217452174621747217482174921750217512175221753217542175521756217572175821759217602176121762217632176421765217662176721768217692177021771217722177321774217752177621777217782177921780217812178221783217842178521786217872178821789217902179121792217932179421795217962179721798217992180021801218022180321804218052180621807218082180921810218112181221813218142181521816218172181821819218202182121822218232182421825218262182721828218292183021831218322183321834218352183621837218382183921840218412184221843218442184521846218472184821849218502185121852218532185421855218562185721858218592186021861218622186321864218652186621867218682186921870218712187221873218742187521876218772187821879218802188121882218832188421885218862188721888218892189021891218922189321894218952189621897218982189921900219012190221903219042190521906219072190821909219102191121912219132191421915219162191721918219192192021921219222192321924219252192621927219282192921930219312193221933219342193521936219372193821939219402194121942219432194421945219462194721948219492195021951219522195321954219552195621957219582195921960219612196221963219642196521966219672196821969219702197121972219732197421975219762197721978219792198021981219822198321984219852198621987219882198921990219912199221993219942199521996219972199821999220002200122002220032200422005220062200722008220092201022011220122201322014220152201622017220182201922020220212202222023220242202522026220272202822029220302203122032220332203422035220362203722038220392204022041220422204322044220452204622047220482204922050220512205222053220542205522056220572205822059220602206122062220632206422065220662206722068220692207022071220722207322074220752207622077220782207922080220812208222083220842208522086220872208822089220902209122092220932209422095220962209722098220992210022101221022210322104221052210622107221082210922110221112211222113221142211522116221172211822119221202212122122221232212422125221262212722128221292213022131221322213322134221352213622137221382213922140221412214222143221442214522146221472214822149221502215122152221532215422155221562215722158221592216022161221622216322164221652216622167221682216922170221712217222173221742217522176221772217822179221802218122182221832218422185221862218722188221892219022191221922219322194221952219622197221982219922200222012220222203222042220522206222072220822209222102221122212222132221422215222162221722218222192222022221222222222322224222252222622227222282222922230222312223222233222342223522236222372223822239222402224122242222432224422245222462224722248222492225022251222522225322254222552225622257222582225922260222612226222263222642226522266222672226822269222702227122272222732227422275222762227722278222792228022281222822228322284222852228622287222882228922290222912229222293222942229522296222972229822299223002230122302223032230422305223062230722308223092231022311223122231322314223152231622317223182231922320223212232222323223242232522326223272232822329223302233122332223332233422335223362233722338223392234022341223422234322344223452234622347223482234922350223512235222353223542235522356223572235822359223602236122362223632236422365223662236722368223692237022371223722237322374223752237622377223782237922380223812238222383223842238522386223872238822389223902239122392223932239422395223962239722398223992240022401224022240322404224052240622407224082240922410224112241222413224142241522416224172241822419224202242122422224232242422425224262242722428224292243022431224322243322434224352243622437224382243922440224412244222443224442244522446224472244822449224502245122452224532245422455224562245722458224592246022461224622246322464224652246622467224682246922470224712247222473224742247522476224772247822479224802248122482224832248422485224862248722488224892249022491224922249322494224952249622497224982249922500225012250222503225042250522506225072250822509225102251122512225132251422515225162251722518225192252022521225222252322524225252252622527225282252922530225312253222533225342253522536225372253822539225402254122542225432254422545225462254722548225492255022551225522255322554225552255622557225582255922560225612256222563225642256522566225672256822569225702257122572225732257422575225762257722578225792258022581225822258322584225852258622587225882258922590225912259222593225942259522596225972259822599226002260122602226032260422605226062260722608226092261022611226122261322614226152261622617226182261922620226212262222623226242262522626226272262822629226302263122632226332263422635226362263722638226392264022641226422264322644226452264622647226482264922650226512265222653226542265522656226572265822659226602266122662226632266422665226662266722668226692267022671226722267322674226752267622677226782267922680226812268222683226842268522686226872268822689226902269122692226932269422695226962269722698226992270022701227022270322704227052270622707227082270922710227112271222713227142271522716227172271822719227202272122722227232272422725227262272722728227292273022731227322273322734227352273622737227382273922740227412274222743227442274522746227472274822749227502275122752227532275422755227562275722758227592276022761227622276322764227652276622767227682276922770227712277222773227742277522776227772277822779227802278122782227832278422785227862278722788227892279022791227922279322794227952279622797227982279922800228012280222803228042280522806228072280822809228102281122812228132281422815228162281722818228192282022821228222282322824228252282622827228282282922830228312283222833228342283522836228372283822839228402284122842228432284422845228462284722848228492285022851228522285322854228552285622857228582285922860228612286222863228642286522866228672286822869228702287122872228732287422875228762287722878228792288022881228822288322884228852288622887228882288922890228912289222893228942289522896228972289822899229002290122902229032290422905229062290722908229092291022911229122291322914229152291622917229182291922920229212292222923229242292522926229272292822929229302293122932229332293422935229362293722938229392294022941229422294322944229452294622947229482294922950229512295222953229542295522956229572295822959229602296122962229632296422965229662296722968229692297022971229722297322974229752297622977229782297922980229812298222983229842298522986229872298822989229902299122992229932299422995229962299722998229992300023001230022300323004230052300623007230082300923010230112301223013230142301523016230172301823019230202302123022230232302423025230262302723028230292303023031230322303323034230352303623037230382303923040230412304223043230442304523046230472304823049230502305123052230532305423055230562305723058230592306023061230622306323064230652306623067230682306923070230712307223073230742307523076230772307823079230802308123082230832308423085230862308723088230892309023091230922309323094230952309623097230982309923100231012310223103231042310523106231072310823109231102311123112231132311423115231162311723118231192312023121231222312323124231252312623127231282312923130231312313223133231342313523136231372313823139231402314123142231432314423145231462314723148231492315023151231522315323154231552315623157231582315923160231612316223163231642316523166231672316823169231702317123172231732317423175231762317723178231792318023181231822318323184231852318623187231882318923190231912319223193231942319523196231972319823199232002320123202232032320423205232062320723208232092321023211232122321323214232152321623217232182321923220232212322223223232242322523226232272322823229232302323123232232332323423235232362323723238232392324023241232422324323244232452324623247232482324923250232512325223253232542325523256232572325823259232602326123262232632326423265232662326723268232692327023271232722327323274232752327623277232782327923280232812328223283232842328523286232872328823289232902329123292232932329423295232962329723298232992330023301233022330323304233052330623307233082330923310233112331223313233142331523316233172331823319233202332123322233232332423325233262332723328233292333023331233322333323334233352333623337233382333923340233412334223343233442334523346233472334823349233502335123352233532335423355233562335723358233592336023361233622336323364233652336623367233682336923370233712337223373233742337523376233772337823379233802338123382233832338423385233862338723388233892339023391233922339323394233952339623397233982339923400234012340223403234042340523406234072340823409234102341123412234132341423415234162341723418234192342023421234222342323424234252342623427234282342923430234312343223433234342343523436234372343823439234402344123442234432344423445234462344723448234492345023451234522345323454234552345623457234582345923460234612346223463234642346523466234672346823469234702347123472234732347423475234762347723478234792348023481234822348323484234852348623487234882348923490234912349223493234942349523496234972349823499235002350123502235032350423505235062350723508235092351023511235122351323514235152351623517235182351923520235212352223523235242352523526235272352823529235302353123532235332353423535235362353723538235392354023541235422354323544235452354623547235482354923550235512355223553235542355523556235572355823559235602356123562235632356423565235662356723568235692357023571235722357323574235752357623577235782357923580235812358223583235842358523586235872358823589235902359123592235932359423595235962359723598235992360023601236022360323604236052360623607236082360923610236112361223613236142361523616236172361823619236202362123622236232362423625236262362723628236292363023631236322363323634236352363623637236382363923640236412364223643236442364523646236472364823649236502365123652236532365423655236562365723658236592366023661236622366323664236652366623667236682366923670236712367223673236742367523676236772367823679236802368123682236832368423685236862368723688236892369023691236922369323694236952369623697236982369923700237012370223703237042370523706237072370823709237102371123712237132371423715237162371723718237192372023721237222372323724237252372623727237282372923730237312373223733237342373523736237372373823739237402374123742237432374423745237462374723748237492375023751237522375323754237552375623757237582375923760237612376223763237642376523766237672376823769237702377123772237732377423775237762377723778237792378023781237822378323784237852378623787237882378923790237912379223793237942379523796237972379823799238002380123802238032380423805238062380723808238092381023811238122381323814238152381623817238182381923820238212382223823238242382523826238272382823829238302383123832238332383423835238362383723838238392384023841238422384323844238452384623847238482384923850238512385223853238542385523856238572385823859238602386123862238632386423865238662386723868238692387023871238722387323874238752387623877238782387923880238812388223883238842388523886238872388823889238902389123892238932389423895238962389723898238992390023901239022390323904239052390623907239082390923910239112391223913239142391523916239172391823919239202392123922239232392423925239262392723928239292393023931239322393323934239352393623937239382393923940239412394223943239442394523946239472394823949239502395123952239532395423955239562395723958239592396023961239622396323964239652396623967239682396923970239712397223973239742397523976239772397823979239802398123982239832398423985239862398723988239892399023991239922399323994239952399623997239982399924000240012400224003240042400524006240072400824009240102401124012240132401424015240162401724018240192402024021240222402324024240252402624027240282402924030240312403224033240342403524036240372403824039240402404124042240432404424045240462404724048240492405024051240522405324054240552405624057240582405924060240612406224063240642406524066240672406824069240702407124072240732407424075240762407724078240792408024081240822408324084240852408624087240882408924090240912409224093240942409524096240972409824099241002410124102241032410424105241062410724108241092411024111241122411324114241152411624117241182411924120241212412224123241242412524126241272412824129241302413124132241332413424135241362413724138241392414024141241422414324144241452414624147241482414924150241512415224153241542415524156241572415824159241602416124162241632416424165241662416724168241692417024171241722417324174241752417624177241782417924180241812418224183241842418524186241872418824189241902419124192241932419424195241962419724198241992420024201242022420324204242052420624207242082420924210242112421224213242142421524216242172421824219242202422124222242232422424225242262422724228242292423024231242322423324234242352423624237242382423924240242412424224243242442424524246242472424824249242502425124252242532425424255242562425724258242592426024261242622426324264242652426624267242682426924270242712427224273242742427524276242772427824279242802428124282242832428424285242862428724288242892429024291242922429324294242952429624297242982429924300243012430224303243042430524306243072430824309243102431124312243132431424315243162431724318243192432024321243222432324324243252432624327243282432924330243312433224333243342433524336243372433824339243402434124342243432434424345243462434724348243492435024351243522435324354243552435624357243582435924360243612436224363243642436524366243672436824369243702437124372243732437424375243762437724378243792438024381243822438324384243852438624387243882438924390243912439224393243942439524396243972439824399244002440124402244032440424405244062440724408244092441024411244122441324414244152441624417244182441924420244212442224423244242442524426244272442824429244302443124432244332443424435244362443724438244392444024441244422444324444244452444624447244482444924450244512445224453244542445524456244572445824459244602446124462244632446424465244662446724468244692447024471244722447324474244752447624477244782447924480244812448224483244842448524486244872448824489244902449124492244932449424495244962449724498244992450024501245022450324504245052450624507245082450924510245112451224513245142451524516245172451824519245202452124522245232452424525245262452724528245292453024531245322453324534245352453624537245382453924540245412454224543245442454524546245472454824549245502455124552245532455424555245562455724558245592456024561245622456324564245652456624567245682456924570245712457224573245742457524576245772457824579245802458124582245832458424585245862458724588245892459024591245922459324594245952459624597245982459924600246012460224603246042460524606246072460824609246102461124612246132461424615246162461724618246192462024621246222462324624246252462624627246282462924630246312463224633246342463524636246372463824639246402464124642246432464424645246462464724648246492465024651246522465324654246552465624657246582465924660246612466224663246642466524666246672466824669246702467124672246732467424675246762467724678246792468024681246822468324684246852468624687246882468924690246912469224693246942469524696246972469824699247002470124702247032470424705247062470724708247092471024711247122471324714247152471624717247182471924720247212472224723247242472524726247272472824729247302473124732247332473424735247362473724738247392474024741247422474324744247452474624747247482474924750247512475224753247542475524756247572475824759247602476124762247632476424765247662476724768247692477024771247722477324774247752477624777247782477924780247812478224783247842478524786247872478824789247902479124792247932479424795247962479724798247992480024801248022480324804248052480624807248082480924810248112481224813248142481524816248172481824819248202482124822248232482424825248262482724828248292483024831248322483324834248352483624837248382483924840248412484224843248442484524846248472484824849248502485124852248532485424855248562485724858248592486024861248622486324864248652486624867248682486924870248712487224873248742487524876248772487824879248802488124882248832488424885248862488724888248892489024891248922489324894248952489624897248982489924900249012490224903249042490524906249072490824909249102491124912249132491424915249162491724918249192492024921249222492324924249252492624927249282492924930249312493224933249342493524936249372493824939249402494124942249432494424945249462494724948249492495024951249522495324954249552495624957249582495924960249612496224963249642496524966249672496824969249702497124972249732497424975249762497724978249792498024981249822498324984249852498624987249882498924990249912499224993249942499524996249972499824999250002500125002250032500425005250062500725008250092501025011250122501325014250152501625017250182501925020250212502225023250242502525026250272502825029250302503125032250332503425035250362503725038250392504025041250422504325044250452504625047250482504925050250512505225053250542505525056250572505825059250602506125062250632506425065250662506725068250692507025071250722507325074250752507625077250782507925080250812508225083250842508525086250872508825089250902509125092250932509425095250962509725098250992510025101251022510325104251052510625107251082510925110251112511225113251142511525116251172511825119251202512125122251232512425125251262512725128251292513025131251322513325134251352513625137251382513925140251412514225143251442514525146251472514825149251502515125152251532515425155251562515725158251592516025161251622516325164251652516625167251682516925170251712517225173251742517525176251772517825179251802518125182251832518425185251862518725188251892519025191251922519325194251952519625197251982519925200252012520225203252042520525206252072520825209252102521125212252132521425215252162521725218252192522025221252222522325224252252522625227252282522925230252312523225233252342523525236252372523825239252402524125242252432524425245252462524725248252492525025251252522525325254252552525625257252582525925260252612526225263252642526525266252672526825269252702527125272252732527425275252762527725278252792528025281252822528325284252852528625287252882528925290252912529225293252942529525296252972529825299253002530125302253032530425305253062530725308253092531025311253122531325314253152531625317253182531925320253212532225323253242532525326253272532825329253302533125332253332533425335253362533725338253392534025341253422534325344253452534625347253482534925350253512535225353253542535525356253572535825359253602536125362253632536425365253662536725368253692537025371253722537325374253752537625377253782537925380253812538225383253842538525386253872538825389253902539125392253932539425395253962539725398253992540025401254022540325404254052540625407254082540925410254112541225413254142541525416254172541825419254202542125422254232542425425254262542725428254292543025431254322543325434254352543625437254382543925440254412544225443254442544525446254472544825449254502545125452254532545425455254562545725458254592546025461254622546325464254652546625467254682546925470254712547225473254742547525476254772547825479254802548125482254832548425485254862548725488254892549025491254922549325494254952549625497254982549925500255012550225503255042550525506255072550825509255102551125512255132551425515255162551725518255192552025521255222552325524255252552625527255282552925530255312553225533255342553525536255372553825539255402554125542255432554425545255462554725548255492555025551255522555325554255552555625557255582555925560255612556225563255642556525566255672556825569255702557125572255732557425575255762557725578255792558025581255822558325584255852558625587255882558925590255912559225593255942559525596255972559825599256002560125602256032560425605256062560725608256092561025611256122561325614256152561625617256182561925620256212562225623256242562525626256272562825629256302563125632256332563425635256362563725638256392564025641256422564325644256452564625647256482564925650256512565225653256542565525656256572565825659256602566125662256632566425665256662566725668256692567025671256722567325674256752567625677256782567925680256812568225683256842568525686256872568825689256902569125692256932569425695256962569725698256992570025701257022570325704257052570625707257082570925710257112571225713257142571525716257172571825719257202572125722257232572425725257262572725728257292573025731257322573325734257352573625737257382573925740257412574225743257442574525746257472574825749257502575125752257532575425755257562575725758257592576025761257622576325764257652576625767257682576925770257712577225773257742577525776257772577825779257802578125782257832578425785257862578725788257892579025791257922579325794257952579625797257982579925800258012580225803258042580525806258072580825809258102581125812258132581425815258162581725818258192582025821258222582325824258252582625827258282582925830258312583225833258342583525836258372583825839258402584125842258432584425845258462584725848258492585025851258522585325854258552585625857258582585925860258612586225863258642586525866258672586825869258702587125872258732587425875258762587725878258792588025881258822588325884258852588625887258882588925890258912589225893258942589525896258972589825899259002590125902259032590425905259062590725908259092591025911259122591325914259152591625917259182591925920259212592225923259242592525926259272592825929259302593125932259332593425935259362593725938259392594025941259422594325944259452594625947259482594925950259512595225953259542595525956259572595825959259602596125962259632596425965259662596725968259692597025971259722597325974259752597625977259782597925980259812598225983259842598525986259872598825989259902599125992259932599425995259962599725998259992600026001260022600326004260052600626007260082600926010260112601226013260142601526016260172601826019260202602126022260232602426025260262602726028260292603026031260322603326034260352603626037260382603926040260412604226043260442604526046260472604826049260502605126052260532605426055260562605726058260592606026061260622606326064260652606626067260682606926070260712607226073260742607526076260772607826079260802608126082260832608426085260862608726088260892609026091260922609326094260952609626097260982609926100261012610226103261042610526106261072610826109261102611126112261132611426115261162611726118261192612026121261222612326124261252612626127261282612926130261312613226133261342613526136261372613826139261402614126142261432614426145261462614726148261492615026151261522615326154261552615626157261582615926160261612616226163261642616526166261672616826169261702617126172261732617426175261762617726178261792618026181261822618326184261852618626187261882618926190261912619226193261942619526196261972619826199262002620126202262032620426205262062620726208262092621026211262122621326214262152621626217262182621926220262212622226223262242622526226262272622826229262302623126232262332623426235262362623726238262392624026241262422624326244262452624626247262482624926250262512625226253262542625526256262572625826259262602626126262262632626426265262662626726268262692627026271262722627326274262752627626277262782627926280262812628226283262842628526286262872628826289262902629126292262932629426295262962629726298262992630026301263022630326304263052630626307263082630926310263112631226313263142631526316263172631826319263202632126322263232632426325263262632726328263292633026331263322633326334263352633626337263382633926340263412634226343263442634526346263472634826349263502635126352263532635426355263562635726358263592636026361263622636326364263652636626367263682636926370263712637226373263742637526376263772637826379263802638126382263832638426385263862638726388263892639026391263922639326394263952639626397263982639926400264012640226403264042640526406264072640826409264102641126412264132641426415264162641726418264192642026421264222642326424264252642626427264282642926430264312643226433264342643526436264372643826439264402644126442264432644426445264462644726448264492645026451264522645326454264552645626457264582645926460264612646226463264642646526466264672646826469264702647126472264732647426475264762647726478264792648026481264822648326484264852648626487264882648926490264912649226493264942649526496264972649826499265002650126502265032650426505265062650726508265092651026511265122651326514265152651626517265182651926520265212652226523265242652526526265272652826529265302653126532265332653426535265362653726538265392654026541265422654326544265452654626547265482654926550265512655226553265542655526556265572655826559265602656126562265632656426565265662656726568265692657026571265722657326574265752657626577265782657926580265812658226583265842658526586265872658826589265902659126592265932659426595265962659726598265992660026601266022660326604266052660626607266082660926610266112661226613266142661526616266172661826619266202662126622266232662426625266262662726628266292663026631266322663326634266352663626637266382663926640266412664226643266442664526646266472664826649266502665126652266532665426655266562665726658266592666026661266622666326664266652666626667266682666926670266712667226673266742667526676266772667826679266802668126682266832668426685266862668726688266892669026691266922669326694266952669626697266982669926700267012670226703267042670526706267072670826709267102671126712267132671426715267162671726718267192672026721267222672326724267252672626727267282672926730267312673226733267342673526736267372673826739267402674126742267432674426745267462674726748267492675026751267522675326754267552675626757267582675926760267612676226763267642676526766267672676826769267702677126772267732677426775267762677726778267792678026781267822678326784267852678626787267882678926790267912679226793267942679526796267972679826799268002680126802268032680426805268062680726808268092681026811268122681326814268152681626817268182681926820268212682226823268242682526826268272682826829268302683126832268332683426835268362683726838268392684026841268422684326844268452684626847268482684926850268512685226853268542685526856268572685826859268602686126862268632686426865268662686726868268692687026871268722687326874268752687626877268782687926880268812688226883268842688526886268872688826889268902689126892268932689426895268962689726898268992690026901269022690326904269052690626907269082690926910269112691226913269142691526916269172691826919269202692126922269232692426925269262692726928269292693026931269322693326934269352693626937269382693926940269412694226943269442694526946269472694826949269502695126952269532695426955269562695726958269592696026961269622696326964269652696626967269682696926970269712697226973269742697526976269772697826979269802698126982269832698426985269862698726988269892699026991269922699326994269952699626997269982699927000270012700227003270042700527006270072700827009270102701127012270132701427015270162701727018270192702027021270222702327024270252702627027270282702927030270312703227033270342703527036270372703827039270402704127042270432704427045270462704727048270492705027051270522705327054270552705627057270582705927060270612706227063270642706527066270672706827069270702707127072270732707427075270762707727078270792708027081270822708327084270852708627087270882708927090270912709227093270942709527096270972709827099271002710127102271032710427105271062710727108271092711027111271122711327114271152711627117271182711927120271212712227123271242712527126271272712827129271302713127132271332713427135271362713727138271392714027141271422714327144271452714627147271482714927150271512715227153271542715527156271572715827159271602716127162271632716427165271662716727168271692717027171271722717327174271752717627177271782717927180271812718227183271842718527186271872718827189271902719127192271932719427195271962719727198271992720027201272022720327204272052720627207272082720927210272112721227213272142721527216272172721827219272202722127222272232722427225272262722727228272292723027231272322723327234272352723627237272382723927240272412724227243272442724527246272472724827249272502725127252272532725427255272562725727258272592726027261272622726327264272652726627267272682726927270272712727227273272742727527276272772727827279272802728127282272832728427285272862728727288272892729027291272922729327294272952729627297272982729927300273012730227303273042730527306273072730827309273102731127312273132731427315273162731727318273192732027321273222732327324273252732627327273282732927330273312733227333273342733527336273372733827339273402734127342273432734427345273462734727348273492735027351273522735327354273552735627357273582735927360273612736227363273642736527366273672736827369273702737127372273732737427375273762737727378273792738027381273822738327384273852738627387273882738927390273912739227393273942739527396273972739827399274002740127402274032740427405274062740727408274092741027411274122741327414274152741627417274182741927420274212742227423274242742527426274272742827429274302743127432274332743427435274362743727438274392744027441274422744327444274452744627447274482744927450274512745227453274542745527456274572745827459274602746127462274632746427465274662746727468274692747027471274722747327474274752747627477274782747927480274812748227483274842748527486274872748827489274902749127492274932749427495274962749727498274992750027501275022750327504275052750627507275082750927510275112751227513275142751527516275172751827519275202752127522275232752427525275262752727528275292753027531275322753327534275352753627537275382753927540275412754227543275442754527546275472754827549275502755127552275532755427555275562755727558275592756027561275622756327564275652756627567275682756927570275712757227573275742757527576275772757827579275802758127582275832758427585275862758727588275892759027591275922759327594275952759627597275982759927600276012760227603276042760527606276072760827609276102761127612276132761427615276162761727618276192762027621276222762327624276252762627627276282762927630276312763227633276342763527636276372763827639276402764127642276432764427645276462764727648276492765027651276522765327654276552765627657276582765927660276612766227663276642766527666276672766827669276702767127672276732767427675276762767727678276792768027681276822768327684276852768627687276882768927690276912769227693276942769527696276972769827699277002770127702277032770427705277062770727708277092771027711277122771327714277152771627717277182771927720277212772227723277242772527726277272772827729277302773127732277332773427735277362773727738277392774027741277422774327744277452774627747277482774927750277512775227753277542775527756277572775827759277602776127762277632776427765277662776727768277692777027771277722777327774277752777627777277782777927780277812778227783277842778527786277872778827789277902779127792277932779427795277962779727798277992780027801278022780327804278052780627807278082780927810278112781227813278142781527816278172781827819278202782127822278232782427825278262782727828278292783027831278322783327834278352783627837278382783927840278412784227843278442784527846278472784827849278502785127852278532785427855278562785727858278592786027861278622786327864278652786627867278682786927870278712787227873278742787527876278772787827879278802788127882278832788427885278862788727888278892789027891278922789327894278952789627897278982789927900279012790227903279042790527906279072790827909279102791127912279132791427915279162791727918279192792027921279222792327924279252792627927279282792927930279312793227933279342793527936279372793827939279402794127942279432794427945279462794727948279492795027951279522795327954279552795627957279582795927960279612796227963279642796527966279672796827969279702797127972279732797427975279762797727978279792798027981279822798327984279852798627987279882798927990279912799227993279942799527996279972799827999280002800128002280032800428005280062800728008280092801028011280122801328014280152801628017280182801928020280212802228023280242802528026280272802828029280302803128032280332803428035280362803728038280392804028041280422804328044280452804628047280482804928050280512805228053280542805528056280572805828059280602806128062280632806428065280662806728068280692807028071280722807328074280752807628077280782807928080280812808228083280842808528086280872808828089280902809128092280932809428095280962809728098280992810028101281022810328104281052810628107281082810928110281112811228113281142811528116281172811828119281202812128122281232812428125281262812728128281292813028131281322813328134281352813628137281382813928140281412814228143281442814528146281472814828149281502815128152281532815428155281562815728158281592816028161281622816328164281652816628167281682816928170281712817228173281742817528176281772817828179281802818128182281832818428185281862818728188281892819028191281922819328194281952819628197281982819928200282012820228203282042820528206282072820828209282102821128212282132821428215282162821728218282192822028221282222822328224282252822628227282282822928230282312823228233282342823528236282372823828239282402824128242282432824428245282462824728248282492825028251282522825328254282552825628257282582825928260282612826228263282642826528266282672826828269282702827128272282732827428275282762827728278282792828028281282822828328284282852828628287282882828928290282912829228293282942829528296282972829828299283002830128302283032830428305283062830728308283092831028311283122831328314283152831628317283182831928320283212832228323283242832528326283272832828329283302833128332283332833428335283362833728338283392834028341283422834328344283452834628347283482834928350283512835228353283542835528356283572835828359283602836128362283632836428365283662836728368283692837028371283722837328374283752837628377283782837928380283812838228383283842838528386283872838828389283902839128392283932839428395283962839728398283992840028401284022840328404284052840628407284082840928410284112841228413284142841528416284172841828419284202842128422284232842428425284262842728428284292843028431284322843328434284352843628437284382843928440284412844228443284442844528446284472844828449284502845128452284532845428455284562845728458284592846028461284622846328464284652846628467284682846928470284712847228473284742847528476284772847828479284802848128482284832848428485284862848728488284892849028491284922849328494284952849628497284982849928500285012850228503285042850528506285072850828509285102851128512285132851428515285162851728518285192852028521285222852328524285252852628527285282852928530285312853228533285342853528536285372853828539285402854128542285432854428545285462854728548285492855028551285522855328554285552855628557285582855928560285612856228563285642856528566285672856828569285702857128572285732857428575285762857728578285792858028581285822858328584285852858628587285882858928590285912859228593285942859528596285972859828599286002860128602286032860428605286062860728608286092861028611286122861328614286152861628617286182861928620286212862228623286242862528626286272862828629286302863128632286332863428635286362863728638286392864028641286422864328644286452864628647286482864928650286512865228653286542865528656286572865828659286602866128662286632866428665286662866728668286692867028671286722867328674286752867628677286782867928680286812868228683286842868528686286872868828689286902869128692286932869428695286962869728698286992870028701287022870328704287052870628707287082870928710287112871228713287142871528716287172871828719287202872128722287232872428725287262872728728287292873028731287322873328734287352873628737287382873928740287412874228743287442874528746287472874828749287502875128752287532875428755287562875728758287592876028761287622876328764287652876628767287682876928770287712877228773287742877528776287772877828779287802878128782287832878428785287862878728788287892879028791287922879328794287952879628797287982879928800288012880228803288042880528806288072880828809288102881128812288132881428815288162881728818288192882028821288222882328824288252882628827288282882928830288312883228833288342883528836288372883828839288402884128842288432884428845288462884728848288492885028851288522885328854288552885628857288582885928860288612886228863288642886528866288672886828869288702887128872288732887428875288762887728878288792888028881288822888328884288852888628887288882888928890288912889228893288942889528896288972889828899289002890128902289032890428905289062890728908289092891028911289122891328914289152891628917289182891928920289212892228923289242892528926289272892828929289302893128932289332893428935289362893728938289392894028941289422894328944289452894628947289482894928950289512895228953289542895528956289572895828959289602896128962289632896428965289662896728968289692897028971289722897328974289752897628977289782897928980289812898228983289842898528986289872898828989289902899128992289932899428995289962899728998289992900029001290022900329004290052900629007290082900929010290112901229013290142901529016290172901829019290202902129022290232902429025290262902729028290292903029031290322903329034290352903629037290382903929040290412904229043290442904529046290472904829049290502905129052290532905429055290562905729058290592906029061290622906329064290652906629067290682906929070290712907229073290742907529076290772907829079290802908129082290832908429085290862908729088290892909029091290922909329094290952909629097290982909929100291012910229103291042910529106291072910829109291102911129112291132911429115291162911729118291192912029121291222912329124291252912629127291282912929130291312913229133291342913529136291372913829139291402914129142291432914429145291462914729148291492915029151291522915329154291552915629157291582915929160291612916229163291642916529166291672916829169291702917129172291732917429175291762917729178291792918029181291822918329184291852918629187291882918929190291912919229193291942919529196291972919829199292002920129202292032920429205292062920729208292092921029211292122921329214292152921629217292182921929220292212922229223292242922529226292272922829229292302923129232292332923429235292362923729238292392924029241292422924329244292452924629247292482924929250292512925229253292542925529256292572925829259292602926129262292632926429265292662926729268292692927029271292722927329274292752927629277292782927929280292812928229283292842928529286292872928829289292902929129292292932929429295292962929729298292992930029301293022930329304293052930629307293082930929310293112931229313293142931529316293172931829319293202932129322293232932429325293262932729328293292933029331293322933329334293352933629337293382933929340293412934229343293442934529346293472934829349293502935129352293532935429355293562935729358293592936029361293622936329364293652936629367293682936929370293712937229373293742937529376293772937829379293802938129382293832938429385293862938729388293892939029391293922939329394293952939629397293982939929400294012940229403294042940529406294072940829409294102941129412294132941429415294162941729418294192942029421294222942329424294252942629427294282942929430294312943229433294342943529436294372943829439294402944129442294432944429445294462944729448294492945029451294522945329454294552945629457294582945929460294612946229463294642946529466294672946829469294702947129472294732947429475294762947729478294792948029481294822948329484294852948629487294882948929490294912949229493294942949529496294972949829499295002950129502295032950429505295062950729508295092951029511295122951329514295152951629517295182951929520295212952229523295242952529526295272952829529295302953129532295332953429535295362953729538295392954029541295422954329544295452954629547295482954929550295512955229553295542955529556295572955829559295602956129562295632956429565295662956729568295692957029571295722957329574295752957629577295782957929580295812958229583295842958529586295872958829589295902959129592295932959429595295962959729598295992960029601296022960329604296052960629607296082960929610296112961229613296142961529616296172961829619296202962129622296232962429625296262962729628296292963029631296322963329634296352963629637296382963929640296412964229643296442964529646296472964829649296502965129652296532965429655296562965729658296592966029661296622966329664296652966629667296682966929670296712967229673296742967529676296772967829679296802968129682296832968429685296862968729688296892969029691296922969329694296952969629697296982969929700297012970229703297042970529706297072970829709297102971129712297132971429715297162971729718297192972029721297222972329724297252972629727297282972929730297312973229733297342973529736297372973829739297402974129742297432974429745297462974729748297492975029751297522975329754297552975629757297582975929760297612976229763297642976529766297672976829769297702977129772297732977429775297762977729778297792978029781297822978329784297852978629787297882978929790297912979229793297942979529796297972979829799298002980129802298032980429805298062980729808298092981029811298122981329814298152981629817298182981929820298212982229823298242982529826298272982829829298302983129832298332983429835298362983729838298392984029841298422984329844298452984629847298482984929850298512985229853298542985529856298572985829859298602986129862298632986429865298662986729868298692987029871298722987329874298752987629877298782987929880298812988229883298842988529886298872988829889298902989129892298932989429895298962989729898298992990029901299022990329904299052990629907299082990929910299112991229913299142991529916299172991829919299202992129922299232992429925299262992729928299292993029931299322993329934299352993629937299382993929940299412994229943299442994529946299472994829949299502995129952299532995429955299562995729958299592996029961299622996329964299652996629967299682996929970299712997229973299742997529976299772997829979299802998129982299832998429985299862998729988299892999029991299922999329994299952999629997299982999930000300013000230003300043000530006300073000830009300103001130012300133001430015300163001730018300193002030021300223002330024300253002630027300283002930030300313003230033300343003530036300373003830039300403004130042300433004430045300463004730048300493005030051300523005330054300553005630057300583005930060300613006230063300643006530066300673006830069300703007130072300733007430075300763007730078300793008030081300823008330084300853008630087300883008930090300913009230093300943009530096300973009830099301003010130102301033010430105301063010730108301093011030111301123011330114301153011630117301183011930120301213012230123301243012530126301273012830129301303013130132301333013430135301363013730138301393014030141301423014330144301453014630147301483014930150301513015230153301543015530156301573015830159301603016130162301633016430165301663016730168301693017030171301723017330174301753017630177301783017930180301813018230183301843018530186301873018830189301903019130192301933019430195301963019730198301993020030201302023020330204302053020630207302083020930210302113021230213302143021530216302173021830219302203022130222302233022430225302263022730228302293023030231302323023330234302353023630237302383023930240302413024230243302443024530246302473024830249302503025130252302533025430255302563025730258302593026030261302623026330264302653026630267302683026930270302713027230273302743027530276302773027830279302803028130282302833028430285302863028730288302893029030291302923029330294302953029630297302983029930300303013030230303303043030530306303073030830309303103031130312303133031430315303163031730318303193032030321303223032330324303253032630327303283032930330303313033230333303343033530336303373033830339303403034130342303433034430345303463034730348303493035030351303523035330354303553035630357303583035930360303613036230363303643036530366303673036830369303703037130372303733037430375303763037730378303793038030381303823038330384303853038630387303883038930390303913039230393303943039530396303973039830399304003040130402304033040430405304063040730408304093041030411304123041330414304153041630417304183041930420304213042230423304243042530426304273042830429304303043130432304333043430435304363043730438304393044030441304423044330444304453044630447304483044930450304513045230453304543045530456304573045830459304603046130462304633046430465304663046730468304693047030471304723047330474304753047630477304783047930480304813048230483304843048530486304873048830489304903049130492304933049430495304963049730498304993050030501305023050330504305053050630507305083050930510305113051230513305143051530516305173051830519305203052130522305233052430525305263052730528305293053030531305323053330534305353053630537305383053930540305413054230543305443054530546305473054830549305503055130552305533055430555305563055730558305593056030561305623056330564305653056630567305683056930570305713057230573305743057530576305773057830579305803058130582305833058430585305863058730588305893059030591305923059330594305953059630597305983059930600306013060230603306043060530606306073060830609306103061130612306133061430615306163061730618306193062030621306223062330624306253062630627306283062930630306313063230633306343063530636306373063830639306403064130642306433064430645306463064730648306493065030651306523065330654306553065630657306583065930660306613066230663306643066530666306673066830669306703067130672306733067430675306763067730678306793068030681306823068330684306853068630687306883068930690306913069230693306943069530696306973069830699307003070130702307033070430705307063070730708307093071030711307123071330714307153071630717307183071930720307213072230723307243072530726307273072830729307303073130732307333073430735307363073730738307393074030741307423074330744307453074630747307483074930750307513075230753307543075530756307573075830759307603076130762307633076430765307663076730768307693077030771307723077330774307753077630777307783077930780307813078230783307843078530786307873078830789307903079130792307933079430795307963079730798307993080030801308023080330804308053080630807308083080930810308113081230813308143081530816308173081830819308203082130822308233082430825308263082730828308293083030831308323083330834308353083630837308383083930840308413084230843308443084530846308473084830849308503085130852308533085430855308563085730858308593086030861308623086330864308653086630867308683086930870308713087230873308743087530876308773087830879308803088130882308833088430885308863088730888308893089030891308923089330894308953089630897308983089930900309013090230903309043090530906309073090830909309103091130912309133091430915309163091730918309193092030921309223092330924309253092630927309283092930930309313093230933309343093530936309373093830939309403094130942309433094430945309463094730948309493095030951309523095330954309553095630957309583095930960309613096230963309643096530966309673096830969309703097130972309733097430975309763097730978309793098030981309823098330984309853098630987309883098930990309913099230993309943099530996309973099830999310003100131002310033100431005310063100731008310093101031011310123101331014310153101631017310183101931020310213102231023310243102531026310273102831029310303103131032310333103431035310363103731038310393104031041310423104331044310453104631047310483104931050310513105231053310543105531056310573105831059310603106131062310633106431065310663106731068310693107031071310723107331074310753107631077310783107931080310813108231083310843108531086310873108831089310903109131092310933109431095310963109731098310993110031101311023110331104311053110631107311083110931110311113111231113311143111531116311173111831119311203112131122311233112431125311263112731128311293113031131311323113331134311353113631137311383113931140311413114231143311443114531146311473114831149311503115131152311533115431155311563115731158311593116031161311623116331164311653116631167311683116931170311713117231173311743117531176311773117831179311803118131182311833118431185311863118731188311893119031191311923119331194311953119631197311983119931200312013120231203312043120531206312073120831209312103121131212312133121431215312163121731218312193122031221312223122331224312253122631227312283122931230312313123231233312343123531236312373123831239312403124131242312433124431245312463124731248312493125031251312523125331254312553125631257312583125931260312613126231263312643126531266312673126831269312703127131272312733127431275312763127731278312793128031281312823128331284312853128631287312883128931290312913129231293312943129531296312973129831299313003130131302313033130431305313063130731308313093131031311313123131331314313153131631317313183131931320313213132231323313243132531326313273132831329313303133131332313333133431335313363133731338313393134031341313423134331344313453134631347313483134931350313513135231353313543135531356313573135831359313603136131362313633136431365313663136731368313693137031371313723137331374313753137631377313783137931380313813138231383313843138531386313873138831389313903139131392313933139431395313963139731398313993140031401314023140331404314053140631407314083140931410314113141231413314143141531416314173141831419314203142131422314233142431425314263142731428314293143031431314323143331434314353143631437314383143931440314413144231443314443144531446314473144831449314503145131452314533145431455314563145731458314593146031461314623146331464314653146631467314683146931470314713147231473314743147531476314773147831479314803148131482314833148431485314863148731488314893149031491314923149331494314953149631497314983149931500315013150231503315043150531506315073150831509315103151131512315133151431515315163151731518315193152031521315223152331524315253152631527315283152931530315313153231533315343153531536315373153831539315403154131542315433154431545315463154731548315493155031551315523155331554315553155631557315583155931560315613156231563315643156531566315673156831569315703157131572315733157431575315763157731578315793158031581315823158331584315853158631587315883158931590315913159231593315943159531596315973159831599316003160131602316033160431605316063160731608316093161031611316123161331614316153161631617316183161931620316213162231623316243162531626316273162831629316303163131632316333163431635316363163731638316393164031641316423164331644316453164631647316483164931650316513165231653316543165531656316573165831659316603166131662316633166431665316663166731668316693167031671316723167331674316753167631677316783167931680316813168231683316843168531686316873168831689316903169131692316933169431695316963169731698316993170031701317023170331704317053170631707317083170931710317113171231713317143171531716317173171831719317203172131722317233172431725317263172731728317293173031731317323173331734317353173631737317383173931740317413174231743317443174531746317473174831749317503175131752317533175431755317563175731758317593176031761317623176331764317653176631767317683176931770317713177231773317743177531776317773177831779317803178131782317833178431785317863178731788317893179031791317923179331794317953179631797317983179931800318013180231803318043180531806318073180831809318103181131812318133181431815318163181731818318193182031821318223182331824318253182631827318283182931830318313183231833318343183531836318373183831839318403184131842318433184431845318463184731848318493185031851318523185331854318553185631857318583185931860318613186231863318643186531866318673186831869318703187131872318733187431875318763187731878318793188031881318823188331884318853188631887318883188931890318913189231893318943189531896318973189831899319003190131902319033190431905319063190731908319093191031911319123191331914319153191631917319183191931920319213192231923319243192531926319273192831929319303193131932319333193431935319363193731938319393194031941319423194331944319453194631947319483194931950319513195231953319543195531956319573195831959319603196131962319633196431965319663196731968319693197031971319723197331974319753197631977319783197931980319813198231983319843198531986319873198831989319903199131992319933199431995319963199731998319993200032001320023200332004320053200632007320083200932010320113201232013320143201532016320173201832019320203202132022320233202432025320263202732028320293203032031320323203332034320353203632037320383203932040320413204232043320443204532046320473204832049320503205132052320533205432055320563205732058320593206032061320623206332064320653206632067320683206932070320713207232073320743207532076320773207832079320803208132082320833208432085320863208732088320893209032091320923209332094320953209632097320983209932100321013210232103321043210532106321073210832109321103211132112321133211432115321163211732118321193212032121321223212332124321253212632127321283212932130321313213232133321343213532136321373213832139321403214132142321433214432145321463214732148321493215032151321523215332154321553215632157321583215932160321613216232163321643216532166321673216832169321703217132172321733217432175321763217732178321793218032181321823218332184321853218632187321883218932190321913219232193321943219532196321973219832199322003220132202322033220432205322063220732208322093221032211322123221332214322153221632217322183221932220322213222232223322243222532226322273222832229322303223132232322333223432235322363223732238322393224032241322423224332244322453224632247322483224932250322513225232253322543225532256322573225832259322603226132262322633226432265322663226732268322693227032271322723227332274322753227632277322783227932280322813228232283322843228532286322873228832289322903229132292322933229432295322963229732298322993230032301323023230332304323053230632307323083230932310323113231232313323143231532316323173231832319323203232132322323233232432325323263232732328323293233032331323323233332334323353233632337323383233932340323413234232343323443234532346323473234832349323503235132352323533235432355323563235732358323593236032361323623236332364323653236632367323683236932370323713237232373323743237532376323773237832379323803238132382323833238432385323863238732388323893239032391323923239332394323953239632397323983239932400324013240232403324043240532406324073240832409324103241132412324133241432415324163241732418324193242032421324223242332424324253242632427324283242932430324313243232433324343243532436324373243832439324403244132442324433244432445324463244732448324493245032451324523245332454324553245632457324583245932460324613246232463324643246532466324673246832469324703247132472324733247432475324763247732478324793248032481324823248332484324853248632487324883248932490324913249232493324943249532496324973249832499325003250132502325033250432505325063250732508325093251032511325123251332514325153251632517325183251932520325213252232523325243252532526325273252832529325303253132532325333253432535325363253732538325393254032541325423254332544325453254632547325483254932550325513255232553325543255532556325573255832559325603256132562325633256432565325663256732568325693257032571325723257332574325753257632577325783257932580325813258232583325843258532586325873258832589325903259132592325933259432595325963259732598325993260032601326023260332604326053260632607326083260932610326113261232613326143261532616326173261832619326203262132622326233262432625326263262732628326293263032631326323263332634326353263632637326383263932640326413264232643326443264532646326473264832649326503265132652326533265432655326563265732658326593266032661326623266332664326653266632667326683266932670326713267232673326743267532676326773267832679326803268132682326833268432685326863268732688326893269032691326923269332694326953269632697326983269932700327013270232703327043270532706327073270832709327103271132712327133271432715327163271732718327193272032721327223272332724327253272632727327283272932730327313273232733327343273532736327373273832739327403274132742327433274432745327463274732748327493275032751327523275332754327553275632757327583275932760327613276232763327643276532766327673276832769327703277132772327733277432775327763277732778327793278032781327823278332784327853278632787327883278932790327913279232793327943279532796327973279832799328003280132802328033280432805328063280732808328093281032811328123281332814328153281632817328183281932820328213282232823328243282532826328273282832829328303283132832328333283432835328363283732838328393284032841328423284332844328453284632847328483284932850328513285232853328543285532856328573285832859328603286132862328633286432865328663286732868328693287032871328723287332874328753287632877328783287932880328813288232883328843288532886328873288832889328903289132892328933289432895328963289732898328993290032901329023290332904329053290632907329083290932910329113291232913329143291532916329173291832919329203292132922329233292432925329263292732928329293293032931329323293332934329353293632937329383293932940329413294232943329443294532946329473294832949329503295132952329533295432955329563295732958329593296032961329623296332964329653296632967329683296932970329713297232973329743297532976329773297832979329803298132982329833298432985329863298732988329893299032991329923299332994329953299632997329983299933000330013300233003330043300533006330073300833009330103301133012330133301433015330163301733018330193302033021330223302333024330253302633027330283302933030330313303233033330343303533036330373303833039330403304133042330433304433045330463304733048330493305033051330523305333054330553305633057330583305933060330613306233063330643306533066330673306833069330703307133072330733307433075330763307733078330793308033081330823308333084330853308633087330883308933090330913309233093330943309533096330973309833099331003310133102331033310433105331063310733108331093311033111331123311333114331153311633117331183311933120331213312233123331243312533126331273312833129331303313133132331333313433135331363313733138331393314033141331423314333144331453314633147331483314933150331513315233153331543315533156331573315833159331603316133162331633316433165331663316733168331693317033171331723317333174331753317633177331783317933180331813318233183331843318533186331873318833189331903319133192331933319433195331963319733198331993320033201332023320333204332053320633207332083320933210332113321233213332143321533216332173321833219332203322133222332233322433225332263322733228332293323033231332323323333234332353323633237332383323933240332413324233243332443324533246332473324833249332503325133252332533325433255332563325733258332593326033261332623326333264332653326633267332683326933270332713327233273332743327533276332773327833279332803328133282332833328433285332863328733288332893329033291332923329333294332953329633297332983329933300333013330233303333043330533306333073330833309333103331133312333133331433315333163331733318333193332033321333223332333324333253332633327333283332933330333313333233333333343333533336333373333833339333403334133342333433334433345333463334733348333493335033351333523335333354333553335633357333583335933360333613336233363333643336533366333673336833369333703337133372333733337433375333763337733378333793338033381333823338333384333853338633387333883338933390333913339233393333943339533396333973339833399334003340133402334033340433405334063340733408334093341033411334123341333414334153341633417334183341933420334213342233423334243342533426334273342833429334303343133432334333343433435334363343733438334393344033441334423344333444334453344633447334483344933450334513345233453334543345533456334573345833459334603346133462334633346433465334663346733468334693347033471334723347333474334753347633477334783347933480334813348233483334843348533486334873348833489334903349133492334933349433495334963349733498334993350033501335023350333504335053350633507335083350933510335113351233513335143351533516335173351833519335203352133522335233352433525335263352733528335293353033531335323353333534335353353633537335383353933540335413354233543335443354533546335473354833549335503355133552335533355433555335563355733558335593356033561335623356333564335653356633567335683356933570335713357233573335743357533576335773357833579335803358133582335833358433585335863358733588335893359033591335923359333594335953359633597335983359933600336013360233603336043360533606336073360833609336103361133612336133361433615336163361733618336193362033621336223362333624336253362633627336283362933630336313363233633336343363533636336373363833639336403364133642336433364433645336463364733648336493365033651336523365333654336553365633657336583365933660336613366233663336643366533666336673366833669336703367133672336733367433675336763367733678336793368033681336823368333684336853368633687336883368933690336913369233693336943369533696336973369833699337003370133702337033370433705337063370733708337093371033711337123371333714337153371633717337183371933720337213372233723337243372533726337273372833729337303373133732337333373433735337363373733738337393374033741337423374333744337453374633747337483374933750337513375233753337543375533756337573375833759337603376133762337633376433765337663376733768337693377033771337723377333774337753377633777337783377933780337813378233783337843378533786337873378833789337903379133792337933379433795337963379733798337993380033801338023380333804338053380633807338083380933810338113381233813338143381533816338173381833819338203382133822338233382433825338263382733828338293383033831338323383333834338353383633837338383383933840338413384233843338443384533846338473384833849338503385133852338533385433855338563385733858338593386033861338623386333864338653386633867338683386933870338713387233873338743387533876338773387833879338803388133882338833388433885338863388733888338893389033891338923389333894338953389633897338983389933900339013390233903339043390533906339073390833909339103391133912339133391433915339163391733918339193392033921339223392333924339253392633927339283392933930339313393233933339343393533936339373393833939339403394133942339433394433945339463394733948339493395033951339523395333954339553395633957339583395933960339613396233963339643396533966339673396833969339703397133972339733397433975339763397733978339793398033981339823398333984339853398633987339883398933990339913399233993339943399533996339973399833999340003400134002340033400434005340063400734008340093401034011340123401334014340153401634017340183401934020340213402234023340243402534026340273402834029340303403134032340333403434035340363403734038340393404034041340423404334044340453404634047340483404934050340513405234053340543405534056340573405834059340603406134062340633406434065340663406734068340693407034071340723407334074340753407634077340783407934080340813408234083340843408534086340873408834089340903409134092340933409434095340963409734098340993410034101341023410334104341053410634107341083410934110341113411234113341143411534116341173411834119341203412134122341233412434125341263412734128341293413034131341323413334134341353413634137341383413934140341413414234143341443414534146341473414834149341503415134152341533415434155341563415734158341593416034161341623416334164341653416634167341683416934170341713417234173341743417534176341773417834179341803418134182341833418434185341863418734188341893419034191341923419334194341953419634197341983419934200342013420234203342043420534206342073420834209342103421134212342133421434215342163421734218342193422034221342223422334224342253422634227342283422934230342313423234233342343423534236342373423834239342403424134242342433424434245342463424734248342493425034251342523425334254342553425634257342583425934260342613426234263342643426534266342673426834269342703427134272342733427434275342763427734278342793428034281342823428334284342853428634287342883428934290342913429234293342943429534296342973429834299343003430134302343033430434305343063430734308343093431034311343123431334314343153431634317343183431934320343213432234323343243432534326343273432834329343303433134332343333433434335343363433734338343393434034341343423434334344343453434634347343483434934350343513435234353343543435534356343573435834359343603436134362343633436434365343663436734368343693437034371343723437334374343753437634377343783437934380343813438234383343843438534386343873438834389343903439134392343933439434395343963439734398343993440034401344023440334404344053440634407344083440934410344113441234413344143441534416344173441834419344203442134422344233442434425344263442734428344293443034431344323443334434344353443634437344383443934440344413444234443344443444534446344473444834449344503445134452344533445434455344563445734458344593446034461344623446334464344653446634467344683446934470344713447234473344743447534476344773447834479344803448134482344833448434485344863448734488344893449034491344923449334494344953449634497344983449934500345013450234503345043450534506345073450834509345103451134512345133451434515345163451734518345193452034521345223452334524345253452634527345283452934530345313453234533345343453534536345373453834539345403454134542345433454434545345463454734548345493455034551345523455334554345553455634557345583455934560345613456234563345643456534566345673456834569345703457134572345733457434575345763457734578345793458034581345823458334584345853458634587345883458934590345913459234593345943459534596345973459834599346003460134602346033460434605346063460734608346093461034611346123461334614346153461634617346183461934620346213462234623346243462534626346273462834629346303463134632346333463434635346363463734638346393464034641346423464334644346453464634647346483464934650346513465234653346543465534656346573465834659346603466134662346633466434665346663466734668346693467034671346723467334674346753467634677346783467934680346813468234683346843468534686346873468834689346903469134692346933469434695346963469734698346993470034701347023470334704347053470634707347083470934710347113471234713347143471534716347173471834719347203472134722347233472434725347263472734728347293473034731347323473334734347353473634737347383473934740347413474234743347443474534746347473474834749347503475134752347533475434755347563475734758347593476034761347623476334764347653476634767347683476934770347713477234773347743477534776347773477834779347803478134782347833478434785347863478734788347893479034791347923479334794347953479634797347983479934800348013480234803348043480534806348073480834809348103481134812348133481434815348163481734818348193482034821348223482334824348253482634827348283482934830348313483234833348343483534836348373483834839348403484134842348433484434845348463484734848348493485034851348523485334854348553485634857348583485934860348613486234863348643486534866348673486834869348703487134872348733487434875348763487734878348793488034881348823488334884348853488634887348883488934890348913489234893348943489534896348973489834899349003490134902349033490434905349063490734908349093491034911349123491334914349153491634917349183491934920349213492234923349243492534926349273492834929349303493134932349333493434935349363493734938349393494034941349423494334944349453494634947349483494934950349513495234953349543495534956349573495834959349603496134962349633496434965349663496734968349693497034971349723497334974349753497634977349783497934980349813498234983349843498534986349873498834989349903499134992349933499434995349963499734998349993500035001350023500335004350053500635007350083500935010350113501235013350143501535016350173501835019350203502135022350233502435025350263502735028350293503035031350323503335034350353503635037350383503935040350413504235043350443504535046350473504835049350503505135052350533505435055350563505735058350593506035061350623506335064350653506635067350683506935070350713507235073350743507535076350773507835079350803508135082350833508435085350863508735088350893509035091350923509335094350953509635097350983509935100351013510235103351043510535106351073510835109351103511135112351133511435115351163511735118351193512035121351223512335124351253512635127351283512935130351313513235133351343513535136351373513835139351403514135142351433514435145351463514735148351493515035151351523515335154351553515635157351583515935160351613516235163351643516535166351673516835169351703517135172351733517435175351763517735178351793518035181351823518335184351853518635187351883518935190351913519235193351943519535196351973519835199352003520135202352033520435205352063520735208352093521035211352123521335214352153521635217352183521935220352213522235223352243522535226352273522835229352303523135232352333523435235352363523735238352393524035241352423524335244352453524635247352483524935250352513525235253352543525535256352573525835259352603526135262352633526435265352663526735268352693527035271352723527335274352753527635277352783527935280352813528235283352843528535286352873528835289352903529135292352933529435295352963529735298352993530035301353023530335304353053530635307353083530935310353113531235313353143531535316353173531835319353203532135322353233532435325353263532735328353293533035331353323533335334353353533635337353383533935340353413534235343353443534535346353473534835349353503535135352353533535435355353563535735358353593536035361353623536335364353653536635367353683536935370353713537235373353743537535376353773537835379353803538135382353833538435385353863538735388353893539035391353923539335394353953539635397353983539935400354013540235403354043540535406354073540835409354103541135412354133541435415354163541735418354193542035421354223542335424354253542635427354283542935430354313543235433354343543535436354373543835439354403544135442354433544435445354463544735448354493545035451354523545335454354553545635457354583545935460354613546235463354643546535466354673546835469354703547135472354733547435475354763547735478354793548035481354823548335484354853548635487354883548935490354913549235493354943549535496354973549835499355003550135502355033550435505355063550735508355093551035511355123551335514355153551635517355183551935520355213552235523355243552535526355273552835529355303553135532355333553435535355363553735538355393554035541355423554335544355453554635547355483554935550355513555235553355543555535556355573555835559355603556135562355633556435565355663556735568355693557035571355723557335574355753557635577355783557935580355813558235583355843558535586355873558835589355903559135592355933559435595355963559735598355993560035601356023560335604356053560635607356083560935610356113561235613356143561535616356173561835619356203562135622356233562435625356263562735628356293563035631356323563335634356353563635637356383563935640356413564235643356443564535646356473564835649356503565135652356533565435655356563565735658356593566035661356623566335664356653566635667356683566935670356713567235673356743567535676356773567835679356803568135682356833568435685356863568735688356893569035691356923569335694356953569635697356983569935700357013570235703357043570535706357073570835709357103571135712357133571435715357163571735718357193572035721357223572335724357253572635727357283572935730357313573235733357343573535736357373573835739357403574135742357433574435745357463574735748357493575035751357523575335754357553575635757357583575935760357613576235763357643576535766357673576835769357703577135772357733577435775357763577735778357793578035781357823578335784357853578635787357883578935790357913579235793357943579535796357973579835799358003580135802358033580435805358063580735808358093581035811358123581335814358153581635817358183581935820358213582235823358243582535826358273582835829358303583135832358333583435835358363583735838358393584035841358423584335844358453584635847358483584935850358513585235853358543585535856358573585835859358603586135862358633586435865358663586735868358693587035871358723587335874358753587635877358783587935880358813588235883358843588535886358873588835889358903589135892358933589435895358963589735898358993590035901359023590335904359053590635907359083590935910359113591235913359143591535916359173591835919359203592135922359233592435925359263592735928359293593035931359323593335934359353593635937359383593935940359413594235943359443594535946359473594835949359503595135952359533595435955359563595735958359593596035961359623596335964359653596635967359683596935970359713597235973359743597535976359773597835979359803598135982359833598435985359863598735988359893599035991359923599335994359953599635997359983599936000360013600236003360043600536006360073600836009360103601136012360133601436015360163601736018360193602036021360223602336024360253602636027360283602936030360313603236033360343603536036360373603836039360403604136042360433604436045360463604736048360493605036051360523605336054360553605636057360583605936060360613606236063360643606536066360673606836069360703607136072360733607436075360763607736078360793608036081360823608336084360853608636087360883608936090360913609236093360943609536096360973609836099361003610136102361033610436105361063610736108361093611036111361123611336114361153611636117361183611936120361213612236123361243612536126361273612836129361303613136132361333613436135361363613736138361393614036141361423614336144361453614636147361483614936150361513615236153361543615536156361573615836159361603616136162361633616436165361663616736168361693617036171361723617336174361753617636177361783617936180361813618236183361843618536186361873618836189361903619136192361933619436195361963619736198361993620036201362023620336204362053620636207362083620936210362113621236213362143621536216362173621836219362203622136222362233622436225362263622736228362293623036231362323623336234362353623636237362383623936240362413624236243362443624536246362473624836249362503625136252362533625436255362563625736258362593626036261362623626336264362653626636267362683626936270362713627236273362743627536276362773627836279362803628136282362833628436285362863628736288362893629036291362923629336294362953629636297362983629936300363013630236303363043630536306363073630836309363103631136312363133631436315363163631736318363193632036321363223632336324363253632636327363283632936330363313633236333363343633536336363373633836339363403634136342363433634436345363463634736348363493635036351363523635336354363553635636357363583635936360363613636236363363643636536366363673636836369363703637136372363733637436375363763637736378363793638036381363823638336384363853638636387363883638936390363913639236393363943639536396363973639836399364003640136402364033640436405364063640736408364093641036411364123641336414364153641636417364183641936420364213642236423364243642536426364273642836429364303643136432364333643436435364363643736438364393644036441364423644336444364453644636447364483644936450364513645236453364543645536456364573645836459364603646136462364633646436465364663646736468364693647036471364723647336474364753647636477364783647936480364813648236483364843648536486364873648836489364903649136492364933649436495364963649736498364993650036501365023650336504365053650636507365083650936510365113651236513365143651536516365173651836519365203652136522365233652436525365263652736528365293653036531365323653336534365353653636537365383653936540365413654236543365443654536546365473654836549365503655136552365533655436555365563655736558365593656036561365623656336564365653656636567365683656936570365713657236573365743657536576365773657836579365803658136582365833658436585365863658736588365893659036591365923659336594365953659636597365983659936600366013660236603366043660536606366073660836609366103661136612366133661436615366163661736618366193662036621366223662336624366253662636627366283662936630366313663236633366343663536636366373663836639366403664136642366433664436645366463664736648366493665036651366523665336654366553665636657366583665936660366613666236663366643666536666366673666836669366703667136672366733667436675366763667736678366793668036681366823668336684366853668636687366883668936690366913669236693366943669536696366973669836699367003670136702367033670436705367063670736708367093671036711367123671336714367153671636717367183671936720367213672236723367243672536726367273672836729367303673136732367333673436735367363673736738367393674036741367423674336744367453674636747367483674936750367513675236753367543675536756367573675836759367603676136762367633676436765367663676736768367693677036771367723677336774367753677636777367783677936780367813678236783367843678536786367873678836789367903679136792367933679436795367963679736798367993680036801368023680336804368053680636807368083680936810368113681236813368143681536816368173681836819368203682136822368233682436825368263682736828368293683036831368323683336834368353683636837368383683936840368413684236843368443684536846368473684836849368503685136852368533685436855368563685736858368593686036861368623686336864368653686636867368683686936870368713687236873368743687536876368773687836879368803688136882368833688436885368863688736888368893689036891368923689336894368953689636897368983689936900369013690236903369043690536906369073690836909369103691136912369133691436915369163691736918369193692036921369223692336924369253692636927369283692936930369313693236933369343693536936369373693836939369403694136942369433694436945369463694736948369493695036951369523695336954369553695636957369583695936960369613696236963369643696536966369673696836969369703697136972369733697436975369763697736978369793698036981369823698336984369853698636987369883698936990369913699236993369943699536996369973699836999370003700137002370033700437005370063700737008370093701037011370123701337014370153701637017370183701937020370213702237023370243702537026370273702837029370303703137032370333703437035370363703737038370393704037041370423704337044370453704637047370483704937050370513705237053370543705537056370573705837059370603706137062370633706437065370663706737068370693707037071370723707337074370753707637077370783707937080370813708237083370843708537086370873708837089370903709137092370933709437095370963709737098370993710037101371023710337104371053710637107371083710937110371113711237113371143711537116371173711837119371203712137122371233712437125371263712737128371293713037131371323713337134371353713637137371383713937140371413714237143371443714537146371473714837149371503715137152371533715437155371563715737158371593716037161371623716337164371653716637167371683716937170371713717237173371743717537176371773717837179371803718137182371833718437185371863718737188371893719037191371923719337194371953719637197371983719937200372013720237203372043720537206372073720837209372103721137212372133721437215372163721737218372193722037221372223722337224372253722637227372283722937230372313723237233372343723537236372373723837239372403724137242372433724437245372463724737248372493725037251372523725337254372553725637257372583725937260372613726237263372643726537266372673726837269372703727137272372733727437275372763727737278372793728037281372823728337284372853728637287372883728937290372913729237293372943729537296372973729837299373003730137302373033730437305373063730737308373093731037311373123731337314373153731637317373183731937320373213732237323373243732537326373273732837329373303733137332373333733437335373363733737338373393734037341373423734337344373453734637347373483734937350373513735237353373543735537356373573735837359373603736137362373633736437365373663736737368373693737037371373723737337374373753737637377373783737937380373813738237383373843738537386373873738837389373903739137392373933739437395373963739737398373993740037401374023740337404374053740637407374083740937410374113741237413374143741537416374173741837419374203742137422374233742437425374263742737428374293743037431374323743337434374353743637437374383743937440374413744237443374443744537446374473744837449374503745137452374533745437455374563745737458374593746037461374623746337464374653746637467374683746937470374713747237473374743747537476374773747837479374803748137482374833748437485374863748737488374893749037491374923749337494374953749637497374983749937500375013750237503375043750537506375073750837509375103751137512375133751437515375163751737518375193752037521375223752337524375253752637527375283752937530375313753237533375343753537536375373753837539375403754137542375433754437545375463754737548375493755037551375523755337554375553755637557375583755937560375613756237563375643756537566375673756837569375703757137572375733757437575375763757737578375793758037581375823758337584375853758637587375883758937590375913759237593375943759537596375973759837599376003760137602376033760437605376063760737608376093761037611376123761337614376153761637617376183761937620376213762237623376243762537626376273762837629376303763137632376333763437635376363763737638376393764037641376423764337644376453764637647376483764937650376513765237653376543765537656376573765837659376603766137662376633766437665376663766737668376693767037671376723767337674376753767637677376783767937680376813768237683376843768537686376873768837689376903769137692376933769437695376963769737698376993770037701377023770337704377053770637707377083770937710377113771237713377143771537716377173771837719377203772137722377233772437725377263772737728377293773037731377323773337734377353773637737377383773937740377413774237743377443774537746377473774837749377503775137752377533775437755377563775737758377593776037761377623776337764377653776637767377683776937770377713777237773377743777537776377773777837779377803778137782377833778437785377863778737788377893779037791377923779337794377953779637797377983779937800378013780237803378043780537806378073780837809378103781137812378133781437815378163781737818378193782037821378223782337824378253782637827378283782937830378313783237833378343783537836378373783837839378403784137842378433784437845378463784737848378493785037851378523785337854378553785637857378583785937860378613786237863378643786537866378673786837869378703787137872378733787437875378763787737878378793788037881378823788337884378853788637887378883788937890378913789237893378943789537896378973789837899379003790137902379033790437905379063790737908379093791037911379123791337914379153791637917379183791937920379213792237923379243792537926379273792837929379303793137932379333793437935379363793737938379393794037941379423794337944379453794637947379483794937950379513795237953379543795537956379573795837959379603796137962379633796437965379663796737968379693797037971379723797337974379753797637977379783797937980379813798237983379843798537986379873798837989379903799137992379933799437995379963799737998379993800038001380023800338004380053800638007380083800938010380113801238013380143801538016380173801838019380203802138022380233802438025380263802738028380293803038031380323803338034380353803638037380383803938040380413804238043380443804538046380473804838049380503805138052380533805438055380563805738058380593806038061380623806338064380653806638067380683806938070380713807238073380743807538076380773807838079380803808138082380833808438085380863808738088380893809038091380923809338094380953809638097380983809938100381013810238103381043810538106381073810838109381103811138112381133811438115381163811738118381193812038121381223812338124381253812638127381283812938130381313813238133381343813538136381373813838139381403814138142381433814438145381463814738148381493815038151381523815338154381553815638157381583815938160381613816238163381643816538166381673816838169381703817138172381733817438175381763817738178381793818038181381823818338184381853818638187381883818938190381913819238193381943819538196381973819838199382003820138202382033820438205382063820738208382093821038211382123821338214382153821638217382183821938220382213822238223382243822538226382273822838229382303823138232382333823438235382363823738238382393824038241382423824338244382453824638247382483824938250382513825238253382543825538256382573825838259382603826138262382633826438265382663826738268382693827038271382723827338274382753827638277382783827938280382813828238283382843828538286382873828838289382903829138292382933829438295382963829738298382993830038301383023830338304383053830638307383083830938310383113831238313383143831538316383173831838319383203832138322383233832438325383263832738328383293833038331383323833338334383353833638337383383833938340383413834238343383443834538346383473834838349383503835138352383533835438355383563835738358383593836038361383623836338364383653836638367383683836938370383713837238373383743837538376383773837838379383803838138382383833838438385383863838738388383893839038391383923839338394383953839638397383983839938400384013840238403384043840538406384073840838409384103841138412384133841438415384163841738418384193842038421384223842338424384253842638427384283842938430384313843238433384343843538436384373843838439384403844138442384433844438445384463844738448384493845038451384523845338454384553845638457384583845938460384613846238463384643846538466384673846838469384703847138472384733847438475384763847738478384793848038481384823848338484384853848638487384883848938490384913849238493384943849538496384973849838499385003850138502385033850438505385063850738508385093851038511385123851338514385153851638517385183851938520385213852238523385243852538526385273852838529385303853138532385333853438535385363853738538385393854038541385423854338544385453854638547385483854938550385513855238553385543855538556385573855838559385603856138562385633856438565385663856738568385693857038571385723857338574385753857638577385783857938580385813858238583385843858538586385873858838589385903859138592385933859438595385963859738598385993860038601386023860338604386053860638607386083860938610386113861238613386143861538616386173861838619386203862138622386233862438625386263862738628386293863038631386323863338634386353863638637386383863938640386413864238643386443864538646386473864838649386503865138652386533865438655386563865738658386593866038661386623866338664386653866638667386683866938670386713867238673386743867538676386773867838679386803868138682386833868438685386863868738688386893869038691386923869338694386953869638697386983869938700387013870238703387043870538706387073870838709387103871138712387133871438715387163871738718387193872038721387223872338724387253872638727387283872938730387313873238733387343873538736387373873838739387403874138742387433874438745387463874738748387493875038751387523875338754387553875638757387583875938760387613876238763387643876538766387673876838769387703877138772387733877438775387763877738778387793878038781387823878338784387853878638787387883878938790387913879238793387943879538796387973879838799388003880138802388033880438805388063880738808388093881038811388123881338814388153881638817388183881938820388213882238823388243882538826388273882838829388303883138832388333883438835388363883738838388393884038841388423884338844388453884638847388483884938850388513885238853388543885538856388573885838859388603886138862388633886438865388663886738868388693887038871388723887338874388753887638877388783887938880388813888238883388843888538886388873888838889388903889138892388933889438895388963889738898388993890038901389023890338904389053890638907389083890938910389113891238913389143891538916389173891838919389203892138922389233892438925389263892738928389293893038931389323893338934389353893638937389383893938940389413894238943389443894538946389473894838949389503895138952389533895438955389563895738958389593896038961389623896338964389653896638967389683896938970389713897238973389743897538976389773897838979389803898138982389833898438985389863898738988389893899038991389923899338994389953899638997389983899939000390013900239003390043900539006390073900839009390103901139012390133901439015390163901739018390193902039021390223902339024390253902639027390283902939030390313903239033390343903539036390373903839039390403904139042390433904439045390463904739048390493905039051390523905339054390553905639057390583905939060390613906239063390643906539066390673906839069390703907139072390733907439075390763907739078390793908039081390823908339084390853908639087390883908939090390913909239093390943909539096390973909839099391003910139102391033910439105391063910739108391093911039111391123911339114391153911639117391183911939120391213912239123391243912539126391273912839129391303913139132391333913439135391363913739138391393914039141391423914339144391453914639147391483914939150391513915239153391543915539156391573915839159391603916139162391633916439165391663916739168391693917039171391723917339174391753917639177391783917939180391813918239183391843918539186391873918839189391903919139192391933919439195391963919739198391993920039201392023920339204392053920639207392083920939210392113921239213392143921539216392173921839219392203922139222392233922439225392263922739228392293923039231392323923339234392353923639237392383923939240392413924239243392443924539246392473924839249392503925139252392533925439255392563925739258392593926039261392623926339264392653926639267392683926939270392713927239273392743927539276392773927839279392803928139282392833928439285392863928739288392893929039291392923929339294392953929639297392983929939300393013930239303393043930539306393073930839309393103931139312393133931439315393163931739318393193932039321393223932339324393253932639327393283932939330393313933239333393343933539336393373933839339393403934139342393433934439345393463934739348393493935039351393523935339354393553935639357393583935939360393613936239363393643936539366393673936839369393703937139372393733937439375393763937739378393793938039381393823938339384393853938639387393883938939390393913939239393393943939539396393973939839399394003940139402394033940439405394063940739408394093941039411394123941339414394153941639417394183941939420394213942239423394243942539426394273942839429394303943139432394333943439435394363943739438394393944039441394423944339444394453944639447394483944939450394513945239453394543945539456394573945839459394603946139462394633946439465394663946739468394693947039471394723947339474394753947639477394783947939480394813948239483394843948539486394873948839489394903949139492394933949439495394963949739498394993950039501395023950339504395053950639507395083950939510395113951239513395143951539516395173951839519395203952139522395233952439525395263952739528395293953039531395323953339534395353953639537395383953939540395413954239543395443954539546395473954839549395503955139552395533955439555395563955739558395593956039561395623956339564395653956639567395683956939570395713957239573395743957539576395773957839579395803958139582395833958439585395863958739588395893959039591395923959339594395953959639597395983959939600396013960239603396043960539606396073960839609396103961139612396133961439615396163961739618396193962039621396223962339624396253962639627396283962939630396313963239633396343963539636396373963839639396403964139642396433964439645396463964739648396493965039651396523965339654396553965639657396583965939660396613966239663396643966539666396673966839669396703967139672396733967439675396763967739678396793968039681396823968339684396853968639687396883968939690396913969239693396943969539696396973969839699397003970139702397033970439705397063970739708397093971039711397123971339714397153971639717397183971939720397213972239723397243972539726397273972839729397303973139732397333973439735397363973739738397393974039741397423974339744397453974639747397483974939750397513975239753397543975539756397573975839759397603976139762397633976439765397663976739768397693977039771397723977339774397753977639777397783977939780397813978239783397843978539786397873978839789397903979139792397933979439795397963979739798397993980039801398023980339804398053980639807398083980939810398113981239813398143981539816398173981839819398203982139822398233982439825398263982739828398293983039831398323983339834398353983639837398383983939840398413984239843398443984539846398473984839849398503985139852398533985439855398563985739858398593986039861398623986339864398653986639867398683986939870398713987239873398743987539876398773987839879398803988139882398833988439885398863988739888398893989039891398923989339894398953989639897398983989939900399013990239903399043990539906399073990839909399103991139912399133991439915399163991739918399193992039921399223992339924399253992639927399283992939930399313993239933399343993539936399373993839939399403994139942399433994439945399463994739948399493995039951399523995339954399553995639957399583995939960399613996239963399643996539966399673996839969399703997139972399733997439975399763997739978399793998039981399823998339984399853998639987399883998939990399913999239993399943999539996399973999839999400004000140002400034000440005400064000740008400094001040011400124001340014400154001640017400184001940020400214002240023400244002540026400274002840029400304003140032400334003440035400364003740038400394004040041400424004340044400454004640047400484004940050400514005240053400544005540056400574005840059400604006140062400634006440065400664006740068400694007040071400724007340074400754007640077400784007940080400814008240083400844008540086400874008840089400904009140092400934009440095400964009740098400994010040101401024010340104401054010640107401084010940110401114011240113401144011540116401174011840119401204012140122401234012440125401264012740128401294013040131401324013340134401354013640137401384013940140401414014240143401444014540146401474014840149401504015140152401534015440155401564015740158401594016040161401624016340164401654016640167401684016940170401714017240173401744017540176401774017840179401804018140182401834018440185401864018740188401894019040191401924019340194401954019640197401984019940200402014020240203402044020540206402074020840209402104021140212402134021440215402164021740218402194022040221402224022340224402254022640227402284022940230402314023240233402344023540236402374023840239402404024140242402434024440245402464024740248402494025040251402524025340254402554025640257402584025940260402614026240263402644026540266402674026840269402704027140272402734027440275402764027740278402794028040281402824028340284402854028640287402884028940290402914029240293402944029540296402974029840299403004030140302403034030440305403064030740308403094031040311403124031340314403154031640317403184031940320403214032240323403244032540326403274032840329403304033140332403334033440335403364033740338403394034040341403424034340344403454034640347403484034940350403514035240353403544035540356403574035840359403604036140362403634036440365403664036740368403694037040371403724037340374403754037640377403784037940380403814038240383403844038540386403874038840389403904039140392403934039440395403964039740398403994040040401404024040340404404054040640407404084040940410404114041240413404144041540416404174041840419404204042140422404234042440425404264042740428404294043040431404324043340434404354043640437404384043940440404414044240443404444044540446404474044840449404504045140452404534045440455404564045740458404594046040461404624046340464404654046640467404684046940470404714047240473404744047540476404774047840479404804048140482404834048440485404864048740488404894049040491404924049340494404954049640497404984049940500405014050240503405044050540506405074050840509405104051140512405134051440515405164051740518405194052040521405224052340524405254052640527405284052940530405314053240533405344053540536405374053840539405404054140542405434054440545405464054740548405494055040551405524055340554405554055640557405584055940560405614056240563405644056540566405674056840569405704057140572405734057440575405764057740578405794058040581405824058340584405854058640587405884058940590405914059240593405944059540596405974059840599406004060140602406034060440605406064060740608406094061040611406124061340614406154061640617406184061940620406214062240623406244062540626406274062840629406304063140632406334063440635406364063740638406394064040641406424064340644406454064640647406484064940650406514065240653406544065540656406574065840659406604066140662406634066440665406664066740668406694067040671406724067340674406754067640677406784067940680406814068240683406844068540686406874068840689406904069140692406934069440695406964069740698406994070040701407024070340704407054070640707407084070940710407114071240713407144071540716407174071840719407204072140722407234072440725407264072740728407294073040731407324073340734407354073640737407384073940740407414074240743407444074540746407474074840749407504075140752407534075440755407564075740758407594076040761407624076340764407654076640767407684076940770407714077240773407744077540776407774077840779407804078140782407834078440785407864078740788407894079040791407924079340794407954079640797407984079940800408014080240803408044080540806408074080840809408104081140812408134081440815408164081740818408194082040821408224082340824408254082640827408284082940830408314083240833408344083540836408374083840839408404084140842408434084440845408464084740848408494085040851408524085340854408554085640857408584085940860408614086240863408644086540866408674086840869408704087140872408734087440875408764087740878408794088040881408824088340884408854088640887408884088940890408914089240893408944089540896408974089840899409004090140902409034090440905409064090740908409094091040911409124091340914409154091640917409184091940920409214092240923409244092540926409274092840929409304093140932409334093440935409364093740938409394094040941409424094340944409454094640947409484094940950409514095240953409544095540956409574095840959409604096140962409634096440965409664096740968409694097040971409724097340974409754097640977409784097940980409814098240983409844098540986409874098840989409904099140992409934099440995409964099740998409994100041001410024100341004410054100641007410084100941010410114101241013410144101541016410174101841019410204102141022410234102441025410264102741028410294103041031410324103341034410354103641037410384103941040410414104241043410444104541046410474104841049410504105141052410534105441055410564105741058410594106041061410624106341064410654106641067410684106941070410714107241073410744107541076410774107841079410804108141082410834108441085410864108741088410894109041091410924109341094410954109641097410984109941100411014110241103411044110541106411074110841109411104111141112411134111441115411164111741118411194112041121411224112341124411254112641127411284112941130411314113241133411344113541136411374113841139411404114141142411434114441145411464114741148411494115041151411524115341154411554115641157411584115941160411614116241163411644116541166411674116841169411704117141172411734117441175411764117741178411794118041181411824118341184411854118641187411884118941190411914119241193411944119541196411974119841199412004120141202412034120441205412064120741208412094121041211412124121341214412154121641217412184121941220412214122241223412244122541226412274122841229412304123141232412334123441235412364123741238412394124041241412424124341244412454124641247412484124941250412514125241253412544125541256412574125841259412604126141262412634126441265412664126741268412694127041271412724127341274412754127641277412784127941280412814128241283412844128541286412874128841289412904129141292412934129441295412964129741298412994130041301413024130341304413054130641307413084130941310413114131241313413144131541316413174131841319413204132141322413234132441325413264132741328413294133041331413324133341334413354133641337413384133941340413414134241343413444134541346413474134841349413504135141352413534135441355413564135741358413594136041361413624136341364413654136641367413684136941370413714137241373413744137541376413774137841379413804138141382413834138441385413864138741388413894139041391413924139341394413954139641397413984139941400414014140241403414044140541406414074140841409414104141141412414134141441415414164141741418414194142041421414224142341424414254142641427414284142941430414314143241433414344143541436414374143841439414404144141442414434144441445414464144741448414494145041451414524145341454414554145641457414584145941460414614146241463414644146541466414674146841469414704147141472414734147441475414764147741478414794148041481414824148341484414854148641487414884148941490414914149241493414944149541496414974149841499415004150141502415034150441505415064150741508415094151041511415124151341514415154151641517415184151941520415214152241523415244152541526415274152841529415304153141532415334153441535415364153741538415394154041541415424154341544415454154641547415484154941550415514155241553415544155541556415574155841559415604156141562415634156441565415664156741568415694157041571415724157341574415754157641577415784157941580415814158241583415844158541586415874158841589415904159141592415934159441595415964159741598415994160041601416024160341604416054160641607416084160941610416114161241613416144161541616416174161841619416204162141622416234162441625416264162741628416294163041631416324163341634416354163641637416384163941640416414164241643416444164541646416474164841649416504165141652416534165441655416564165741658416594166041661416624166341664416654166641667416684166941670416714167241673416744167541676416774167841679416804168141682416834168441685416864168741688416894169041691416924169341694416954169641697416984169941700417014170241703417044170541706417074170841709417104171141712417134171441715417164171741718417194172041721417224172341724417254172641727417284172941730417314173241733417344173541736417374173841739417404174141742417434174441745417464174741748417494175041751417524175341754417554175641757417584175941760417614176241763417644176541766417674176841769417704177141772417734177441775417764177741778417794178041781417824178341784417854178641787417884178941790417914179241793417944179541796417974179841799418004180141802418034180441805418064180741808418094181041811418124181341814418154181641817418184181941820418214182241823418244182541826418274182841829418304183141832418334183441835418364183741838418394184041841418424184341844418454184641847418484184941850418514185241853418544185541856418574185841859418604186141862418634186441865418664186741868418694187041871418724187341874418754187641877418784187941880418814188241883418844188541886418874188841889418904189141892418934189441895418964189741898418994190041901419024190341904419054190641907419084190941910419114191241913419144191541916419174191841919419204192141922419234192441925419264192741928419294193041931419324193341934419354193641937419384193941940419414194241943419444194541946419474194841949419504195141952419534195441955419564195741958419594196041961419624196341964419654196641967419684196941970419714197241973419744197541976419774197841979419804198141982419834198441985419864198741988419894199041991419924199341994419954199641997419984199942000420014200242003420044200542006420074200842009420104201142012420134201442015420164201742018420194202042021420224202342024420254202642027420284202942030420314203242033420344203542036420374203842039420404204142042420434204442045420464204742048420494205042051420524205342054420554205642057420584205942060420614206242063420644206542066420674206842069420704207142072420734207442075420764207742078420794208042081420824208342084420854208642087420884208942090420914209242093420944209542096420974209842099421004210142102421034210442105421064210742108421094211042111421124211342114421154211642117421184211942120421214212242123421244212542126421274212842129421304213142132421334213442135421364213742138421394214042141421424214342144421454214642147421484214942150421514215242153421544215542156421574215842159421604216142162421634216442165421664216742168421694217042171421724217342174421754217642177421784217942180421814218242183421844218542186421874218842189421904219142192421934219442195421964219742198421994220042201422024220342204422054220642207422084220942210422114221242213422144221542216422174221842219422204222142222422234222442225422264222742228422294223042231422324223342234422354223642237422384223942240422414224242243422444224542246422474224842249422504225142252422534225442255422564225742258422594226042261422624226342264422654226642267422684226942270422714227242273422744227542276422774227842279422804228142282422834228442285422864228742288422894229042291422924229342294422954229642297422984229942300423014230242303423044230542306423074230842309423104231142312423134231442315423164231742318423194232042321423224232342324423254232642327423284232942330423314233242333423344233542336423374233842339423404234142342423434234442345423464234742348423494235042351423524235342354423554235642357423584235942360423614236242363423644236542366423674236842369423704237142372423734237442375423764237742378423794238042381423824238342384423854238642387423884238942390423914239242393423944239542396423974239842399424004240142402424034240442405424064240742408424094241042411424124241342414424154241642417424184241942420424214242242423424244242542426424274242842429424304243142432424334243442435424364243742438424394244042441424424244342444424454244642447424484244942450424514245242453424544245542456424574245842459424604246142462424634246442465424664246742468424694247042471424724247342474424754247642477424784247942480424814248242483424844248542486424874248842489424904249142492424934249442495424964249742498424994250042501425024250342504425054250642507425084250942510425114251242513425144251542516425174251842519425204252142522425234252442525425264252742528425294253042531425324253342534425354253642537425384253942540425414254242543425444254542546425474254842549425504255142552425534255442555425564255742558425594256042561425624256342564425654256642567425684256942570425714257242573425744257542576425774257842579425804258142582425834258442585425864258742588425894259042591425924259342594425954259642597425984259942600426014260242603426044260542606426074260842609426104261142612426134261442615426164261742618426194262042621426224262342624426254262642627426284262942630426314263242633426344263542636426374263842639426404264142642426434264442645426464264742648426494265042651426524265342654426554265642657426584265942660426614266242663426644266542666426674266842669426704267142672426734267442675426764267742678426794268042681426824268342684426854268642687426884268942690426914269242693426944269542696426974269842699427004270142702427034270442705427064270742708427094271042711427124271342714427154271642717427184271942720427214272242723427244272542726427274272842729427304273142732427334273442735427364273742738427394274042741427424274342744427454274642747427484274942750427514275242753427544275542756427574275842759427604276142762427634276442765427664276742768427694277042771427724277342774427754277642777427784277942780427814278242783427844278542786427874278842789427904279142792427934279442795427964279742798427994280042801428024280342804428054280642807428084280942810428114281242813428144281542816428174281842819428204282142822428234282442825428264282742828428294283042831428324283342834428354283642837428384283942840428414284242843428444284542846428474284842849428504285142852428534285442855428564285742858428594286042861428624286342864428654286642867428684286942870428714287242873428744287542876428774287842879428804288142882428834288442885428864288742888428894289042891428924289342894428954289642897428984289942900429014290242903429044290542906429074290842909429104291142912429134291442915429164291742918429194292042921429224292342924429254292642927429284292942930429314293242933429344293542936429374293842939429404294142942429434294442945429464294742948429494295042951429524295342954429554295642957429584295942960429614296242963429644296542966429674296842969429704297142972429734297442975429764297742978429794298042981429824298342984429854298642987429884298942990429914299242993429944299542996429974299842999430004300143002430034300443005430064300743008430094301043011430124301343014430154301643017430184301943020430214302243023430244302543026430274302843029430304303143032430334303443035430364303743038430394304043041430424304343044430454304643047430484304943050430514305243053430544305543056430574305843059430604306143062430634306443065430664306743068430694307043071430724307343074430754307643077430784307943080430814308243083430844308543086430874308843089430904309143092430934309443095430964309743098430994310043101431024310343104431054310643107431084310943110431114311243113431144311543116431174311843119431204312143122431234312443125431264312743128431294313043131431324313343134431354313643137431384313943140431414314243143431444314543146431474314843149431504315143152431534315443155431564315743158431594316043161431624316343164431654316643167431684316943170431714317243173431744317543176431774317843179431804318143182431834318443185431864318743188431894319043191431924319343194431954319643197431984319943200432014320243203432044320543206432074320843209432104321143212432134321443215432164321743218432194322043221432224322343224432254322643227432284322943230432314323243233432344323543236432374323843239432404324143242432434324443245432464324743248432494325043251432524325343254432554325643257432584325943260432614326243263432644326543266432674326843269432704327143272432734327443275432764327743278432794328043281432824328343284432854328643287432884328943290432914329243293432944329543296432974329843299433004330143302433034330443305433064330743308433094331043311433124331343314433154331643317433184331943320433214332243323433244332543326433274332843329433304333143332433334333443335433364333743338433394334043341433424334343344433454334643347433484334943350433514335243353433544335543356433574335843359433604336143362433634336443365433664336743368433694337043371433724337343374433754337643377433784337943380433814338243383433844338543386433874338843389433904339143392433934339443395433964339743398433994340043401434024340343404434054340643407434084340943410434114341243413434144341543416434174341843419434204342143422434234342443425434264342743428434294343043431434324343343434434354343643437434384343943440434414344243443434444344543446434474344843449434504345143452434534345443455434564345743458434594346043461434624346343464434654346643467434684346943470434714347243473434744347543476434774347843479434804348143482434834348443485434864348743488434894349043491434924349343494434954349643497434984349943500435014350243503435044350543506435074350843509435104351143512435134351443515435164351743518435194352043521435224352343524435254352643527435284352943530435314353243533435344353543536435374353843539435404354143542435434354443545435464354743548435494355043551435524355343554435554355643557435584355943560435614356243563435644356543566435674356843569435704357143572435734357443575435764357743578435794358043581435824358343584435854358643587435884358943590435914359243593435944359543596435974359843599436004360143602436034360443605436064360743608436094361043611436124361343614436154361643617436184361943620436214362243623436244362543626436274362843629436304363143632436334363443635436364363743638436394364043641436424364343644436454364643647436484364943650436514365243653436544365543656436574365843659436604366143662436634366443665436664366743668436694367043671436724367343674436754367643677436784367943680436814368243683436844368543686436874368843689436904369143692436934369443695436964369743698436994370043701437024370343704437054370643707437084370943710437114371243713437144371543716437174371843719437204372143722437234372443725437264372743728437294373043731437324373343734437354373643737437384373943740437414374243743437444374543746437474374843749437504375143752437534375443755437564375743758437594376043761437624376343764437654376643767437684376943770437714377243773437744377543776437774377843779437804378143782437834378443785437864378743788437894379043791437924379343794437954379643797437984379943800438014380243803438044380543806438074380843809438104381143812438134381443815438164381743818438194382043821438224382343824438254382643827438284382943830438314383243833438344383543836438374383843839438404384143842438434384443845438464384743848438494385043851438524385343854438554385643857438584385943860438614386243863438644386543866438674386843869438704387143872438734387443875438764387743878438794388043881438824388343884438854388643887438884388943890438914389243893438944389543896438974389843899439004390143902439034390443905439064390743908439094391043911439124391343914439154391643917439184391943920439214392243923439244392543926439274392843929439304393143932439334393443935439364393743938439394394043941439424394343944439454394643947439484394943950439514395243953439544395543956439574395843959439604396143962439634396443965439664396743968439694397043971439724397343974439754397643977439784397943980439814398243983439844398543986439874398843989439904399143992439934399443995439964399743998439994400044001440024400344004440054400644007440084400944010440114401244013440144401544016440174401844019440204402144022440234402444025440264402744028440294403044031440324403344034440354403644037440384403944040440414404244043440444404544046440474404844049440504405144052440534405444055440564405744058440594406044061440624406344064440654406644067440684406944070440714407244073440744407544076440774407844079440804408144082440834408444085440864408744088440894409044091440924409344094440954409644097440984409944100441014410244103441044410544106441074410844109441104411144112441134411444115441164411744118441194412044121441224412344124441254412644127441284412944130441314413244133441344413544136441374413844139441404414144142441434414444145441464414744148441494415044151441524415344154441554415644157441584415944160441614416244163441644416544166441674416844169441704417144172441734417444175441764417744178441794418044181441824418344184441854418644187441884418944190441914419244193441944419544196441974419844199442004420144202442034420444205442064420744208442094421044211442124421344214442154421644217442184421944220442214422244223442244422544226442274422844229442304423144232442334423444235442364423744238442394424044241442424424344244442454424644247442484424944250442514425244253442544425544256442574425844259442604426144262442634426444265442664426744268442694427044271442724427344274442754427644277442784427944280442814428244283442844428544286442874428844289442904429144292442934429444295442964429744298442994430044301443024430344304443054430644307443084430944310443114431244313443144431544316443174431844319443204432144322443234432444325443264432744328443294433044331443324433344334443354433644337443384433944340443414434244343443444434544346443474434844349443504435144352443534435444355443564435744358443594436044361443624436344364443654436644367443684436944370443714437244373443744437544376443774437844379443804438144382443834438444385443864438744388443894439044391443924439344394443954439644397443984439944400444014440244403444044440544406444074440844409444104441144412444134441444415444164441744418444194442044421444224442344424444254442644427444284442944430444314443244433444344443544436444374443844439444404444144442444434444444445444464444744448444494445044451444524445344454444554445644457444584445944460444614446244463444644446544466444674446844469444704447144472444734447444475444764447744478444794448044481444824448344484444854448644487444884448944490444914449244493444944449544496444974449844499445004450144502445034450444505445064450744508445094451044511445124451344514445154451644517445184451944520445214452244523445244452544526445274452844529445304453144532445334453444535445364453744538445394454044541445424454344544445454454644547445484454944550445514455244553445544455544556445574455844559445604456144562445634456444565445664456744568445694457044571445724457344574445754457644577445784457944580445814458244583445844458544586445874458844589445904459144592445934459444595445964459744598445994460044601446024460344604446054460644607446084460944610446114461244613446144461544616446174461844619446204462144622446234462444625446264462744628446294463044631446324463344634446354463644637446384463944640446414464244643446444464544646446474464844649446504465144652446534465444655446564465744658446594466044661446624466344664446654466644667446684466944670446714467244673446744467544676446774467844679446804468144682446834468444685446864468744688446894469044691446924469344694446954469644697446984469944700447014470244703447044470544706447074470844709447104471144712447134471444715447164471744718447194472044721447224472344724447254472644727447284472944730447314473244733447344473544736447374473844739447404474144742447434474444745447464474744748447494475044751447524475344754447554475644757447584475944760447614476244763447644476544766447674476844769447704477144772447734477444775447764477744778447794478044781447824478344784447854478644787447884478944790447914479244793447944479544796447974479844799448004480144802448034480444805448064480744808448094481044811448124481344814448154481644817448184481944820448214482244823448244482544826448274482844829448304483144832448334483444835448364483744838448394484044841448424484344844448454484644847448484484944850448514485244853448544485544856448574485844859448604486144862448634486444865448664486744868448694487044871448724487344874448754487644877448784487944880448814488244883448844488544886448874488844889448904489144892448934489444895448964489744898448994490044901449024490344904449054490644907449084490944910449114491244913449144491544916449174491844919449204492144922449234492444925449264492744928449294493044931449324493344934449354493644937449384493944940449414494244943449444494544946449474494844949449504495144952449534495444955449564495744958449594496044961449624496344964449654496644967449684496944970449714497244973449744497544976449774497844979449804498144982449834498444985449864498744988449894499044991449924499344994449954499644997449984499945000450014500245003450044500545006450074500845009450104501145012450134501445015450164501745018450194502045021450224502345024450254502645027450284502945030450314503245033450344503545036450374503845039450404504145042450434504445045450464504745048450494505045051450524505345054450554505645057450584505945060450614506245063450644506545066450674506845069450704507145072450734507445075450764507745078450794508045081450824508345084450854508645087450884508945090450914509245093450944509545096450974509845099451004510145102451034510445105451064510745108451094511045111451124511345114451154511645117451184511945120451214512245123451244512545126451274512845129451304513145132451334513445135451364513745138451394514045141451424514345144451454514645147451484514945150451514515245153451544515545156451574515845159451604516145162451634516445165451664516745168451694517045171451724517345174451754517645177451784517945180451814518245183451844518545186451874518845189451904519145192451934519445195451964519745198451994520045201452024520345204452054520645207452084520945210452114521245213452144521545216452174521845219452204522145222452234522445225452264522745228452294523045231452324523345234452354523645237452384523945240452414524245243452444524545246452474524845249452504525145252452534525445255452564525745258452594526045261452624526345264452654526645267452684526945270452714527245273452744527545276452774527845279452804528145282452834528445285452864528745288452894529045291452924529345294452954529645297452984529945300453014530245303453044530545306453074530845309453104531145312453134531445315453164531745318453194532045321453224532345324453254532645327453284532945330453314533245333453344533545336453374533845339453404534145342453434534445345453464534745348453494535045351453524535345354453554535645357453584535945360453614536245363453644536545366453674536845369453704537145372453734537445375453764537745378453794538045381453824538345384453854538645387453884538945390453914539245393453944539545396453974539845399454004540145402454034540445405454064540745408454094541045411454124541345414454154541645417454184541945420454214542245423454244542545426454274542845429454304543145432454334543445435454364543745438454394544045441454424544345444454454544645447454484544945450454514545245453454544545545456454574545845459454604546145462454634546445465454664546745468454694547045471454724547345474454754547645477454784547945480454814548245483454844548545486454874548845489454904549145492454934549445495454964549745498454994550045501455024550345504455054550645507455084550945510455114551245513455144551545516455174551845519455204552145522455234552445525455264552745528455294553045531455324553345534455354553645537455384553945540455414554245543455444554545546455474554845549455504555145552455534555445555455564555745558455594556045561455624556345564455654556645567455684556945570455714557245573455744557545576455774557845579455804558145582455834558445585455864558745588455894559045591455924559345594455954559645597455984559945600456014560245603456044560545606456074560845609456104561145612456134561445615456164561745618456194562045621456224562345624456254562645627456284562945630456314563245633456344563545636456374563845639456404564145642456434564445645456464564745648456494565045651456524565345654456554565645657456584565945660456614566245663456644566545666456674566845669456704567145672456734567445675456764567745678456794568045681456824568345684456854568645687456884568945690456914569245693456944569545696456974569845699457004570145702457034570445705457064570745708457094571045711457124571345714457154571645717457184571945720457214572245723457244572545726457274572845729457304573145732457334573445735457364573745738457394574045741457424574345744457454574645747457484574945750457514575245753457544575545756457574575845759457604576145762457634576445765457664576745768457694577045771457724577345774457754577645777457784577945780457814578245783457844578545786457874578845789457904579145792457934579445795457964579745798457994580045801458024580345804458054580645807458084580945810458114581245813458144581545816458174581845819458204582145822458234582445825458264582745828458294583045831458324583345834458354583645837458384583945840458414584245843458444584545846458474584845849458504585145852458534585445855458564585745858458594586045861458624586345864458654586645867458684586945870458714587245873458744587545876458774587845879458804588145882458834588445885458864588745888458894589045891458924589345894458954589645897458984589945900459014590245903459044590545906459074590845909459104591145912459134591445915459164591745918459194592045921459224592345924459254592645927459284592945930459314593245933459344593545936459374593845939459404594145942459434594445945459464594745948459494595045951459524595345954459554595645957459584595945960459614596245963459644596545966459674596845969459704597145972459734597445975459764597745978459794598045981459824598345984459854598645987459884598945990459914599245993459944599545996459974599845999460004600146002460034600446005460064600746008460094601046011460124601346014460154601646017460184601946020460214602246023460244602546026460274602846029460304603146032460334603446035460364603746038460394604046041460424604346044460454604646047460484604946050460514605246053460544605546056460574605846059460604606146062460634606446065460664606746068460694607046071460724607346074460754607646077460784607946080460814608246083460844608546086460874608846089460904609146092460934609446095460964609746098460994610046101461024610346104461054610646107461084610946110461114611246113461144611546116461174611846119461204612146122461234612446125461264612746128461294613046131461324613346134461354613646137461384613946140461414614246143461444614546146461474614846149461504615146152461534615446155461564615746158461594616046161461624616346164461654616646167461684616946170461714617246173461744617546176461774617846179461804618146182461834618446185461864618746188461894619046191461924619346194461954619646197461984619946200462014620246203462044620546206462074620846209462104621146212462134621446215462164621746218462194622046221462224622346224462254622646227462284622946230462314623246233462344623546236462374623846239462404624146242462434624446245462464624746248462494625046251462524625346254462554625646257462584625946260462614626246263462644626546266462674626846269462704627146272462734627446275462764627746278462794628046281462824628346284462854628646287462884628946290462914629246293462944629546296462974629846299463004630146302463034630446305463064630746308463094631046311463124631346314463154631646317463184631946320463214632246323463244632546326463274632846329463304633146332463334633446335463364633746338463394634046341463424634346344463454634646347463484634946350463514635246353463544635546356463574635846359463604636146362463634636446365463664636746368463694637046371463724637346374463754637646377463784637946380463814638246383463844638546386463874638846389463904639146392463934639446395463964639746398463994640046401464024640346404464054640646407464084640946410464114641246413464144641546416464174641846419464204642146422464234642446425464264642746428464294643046431464324643346434464354643646437464384643946440464414644246443464444644546446464474644846449464504645146452464534645446455464564645746458464594646046461464624646346464464654646646467464684646946470464714647246473464744647546476464774647846479464804648146482464834648446485464864648746488464894649046491464924649346494464954649646497464984649946500465014650246503465044650546506465074650846509465104651146512465134651446515465164651746518465194652046521465224652346524465254652646527465284652946530465314653246533465344653546536465374653846539465404654146542465434654446545465464654746548465494655046551465524655346554465554655646557465584655946560465614656246563465644656546566465674656846569465704657146572465734657446575465764657746578465794658046581465824658346584465854658646587465884658946590465914659246593465944659546596465974659846599466004660146602466034660446605466064660746608466094661046611466124661346614466154661646617466184661946620466214662246623466244662546626466274662846629466304663146632466334663446635466364663746638466394664046641466424664346644466454664646647466484664946650466514665246653466544665546656466574665846659466604666146662466634666446665466664666746668466694667046671466724667346674466754667646677466784667946680466814668246683466844668546686466874668846689466904669146692466934669446695466964669746698466994670046701467024670346704467054670646707467084670946710467114671246713467144671546716467174671846719467204672146722467234672446725467264672746728467294673046731467324673346734467354673646737467384673946740467414674246743467444674546746467474674846749467504675146752467534675446755467564675746758467594676046761467624676346764467654676646767467684676946770467714677246773467744677546776467774677846779467804678146782467834678446785467864678746788467894679046791467924679346794467954679646797467984679946800468014680246803468044680546806468074680846809468104681146812468134681446815468164681746818468194682046821468224682346824468254682646827468284682946830468314683246833468344683546836468374683846839468404684146842468434684446845468464684746848468494685046851468524685346854468554685646857468584685946860468614686246863468644686546866468674686846869468704687146872468734687446875468764687746878468794688046881468824688346884468854688646887468884688946890468914689246893468944689546896468974689846899469004690146902469034690446905469064690746908469094691046911469124691346914469154691646917469184691946920469214692246923469244692546926469274692846929469304693146932469334693446935469364693746938469394694046941469424694346944469454694646947469484694946950469514695246953469544695546956469574695846959469604696146962469634696446965469664696746968469694697046971469724697346974469754697646977469784697946980469814698246983469844698546986469874698846989469904699146992469934699446995469964699746998469994700047001470024700347004470054700647007470084700947010470114701247013470144701547016470174701847019470204702147022470234702447025470264702747028470294703047031470324703347034470354703647037470384703947040470414704247043470444704547046470474704847049470504705147052470534705447055470564705747058470594706047061470624706347064470654706647067470684706947070470714707247073470744707547076470774707847079470804708147082470834708447085470864708747088470894709047091470924709347094470954709647097470984709947100471014710247103471044710547106471074710847109471104711147112471134711447115471164711747118471194712047121471224712347124471254712647127471284712947130471314713247133471344713547136471374713847139471404714147142471434714447145471464714747148471494715047151471524715347154471554715647157471584715947160471614716247163471644716547166471674716847169471704717147172471734717447175471764717747178471794718047181471824718347184471854718647187471884718947190471914719247193471944719547196471974719847199472004720147202472034720447205472064720747208472094721047211472124721347214472154721647217472184721947220472214722247223472244722547226472274722847229472304723147232472334723447235472364723747238472394724047241472424724347244472454724647247472484724947250472514725247253472544725547256472574725847259472604726147262472634726447265472664726747268472694727047271472724727347274472754727647277472784727947280472814728247283472844728547286472874728847289472904729147292472934729447295472964729747298472994730047301473024730347304473054730647307473084730947310473114731247313473144731547316473174731847319473204732147322473234732447325473264732747328473294733047331473324733347334473354733647337473384733947340473414734247343473444734547346473474734847349473504735147352473534735447355473564735747358473594736047361473624736347364473654736647367473684736947370473714737247373473744737547376473774737847379473804738147382473834738447385473864738747388473894739047391473924739347394473954739647397473984739947400474014740247403474044740547406474074740847409474104741147412474134741447415474164741747418474194742047421474224742347424474254742647427474284742947430474314743247433474344743547436474374743847439474404744147442474434744447445474464744747448474494745047451474524745347454474554745647457474584745947460474614746247463474644746547466474674746847469474704747147472474734747447475474764747747478474794748047481474824748347484474854748647487474884748947490474914749247493474944749547496474974749847499475004750147502475034750447505475064750747508475094751047511475124751347514475154751647517475184751947520475214752247523475244752547526475274752847529475304753147532475334753447535475364753747538475394754047541475424754347544475454754647547475484754947550475514755247553475544755547556475574755847559475604756147562475634756447565475664756747568475694757047571475724757347574475754757647577475784757947580475814758247583475844758547586475874758847589475904759147592475934759447595475964759747598475994760047601476024760347604476054760647607476084760947610476114761247613476144761547616476174761847619476204762147622476234762447625476264762747628476294763047631476324763347634476354763647637476384763947640476414764247643476444764547646476474764847649476504765147652476534765447655476564765747658476594766047661476624766347664476654766647667476684766947670476714767247673476744767547676476774767847679476804768147682476834768447685476864768747688476894769047691476924769347694476954769647697476984769947700477014770247703477044770547706477074770847709477104771147712477134771447715477164771747718477194772047721477224772347724477254772647727477284772947730477314773247733477344773547736477374773847739477404774147742477434774447745477464774747748477494775047751477524775347754477554775647757477584775947760477614776247763477644776547766477674776847769477704777147772477734777447775477764777747778477794778047781477824778347784477854778647787477884778947790477914779247793477944779547796477974779847799478004780147802478034780447805478064780747808478094781047811478124781347814478154781647817478184781947820478214782247823478244782547826478274782847829478304783147832478334783447835478364783747838478394784047841478424784347844478454784647847478484784947850478514785247853478544785547856478574785847859478604786147862478634786447865478664786747868478694787047871478724787347874478754787647877478784787947880478814788247883478844788547886478874788847889478904789147892478934789447895478964789747898478994790047901479024790347904479054790647907479084790947910479114791247913479144791547916479174791847919479204792147922479234792447925479264792747928479294793047931479324793347934479354793647937479384793947940479414794247943479444794547946479474794847949479504795147952479534795447955479564795747958479594796047961479624796347964479654796647967479684796947970479714797247973479744797547976479774797847979479804798147982479834798447985479864798747988479894799047991479924799347994479954799647997479984799948000480014800248003480044800548006480074800848009480104801148012480134801448015480164801748018480194802048021480224802348024480254802648027480284802948030480314803248033480344803548036480374803848039480404804148042480434804448045480464804748048480494805048051480524805348054480554805648057480584805948060480614806248063480644806548066480674806848069480704807148072480734807448075480764807748078480794808048081480824808348084480854808648087480884808948090480914809248093480944809548096480974809848099481004810148102481034810448105481064810748108481094811048111481124811348114481154811648117481184811948120481214812248123481244812548126481274812848129481304813148132481334813448135481364813748138481394814048141481424814348144481454814648147481484814948150481514815248153481544815548156481574815848159481604816148162481634816448165481664816748168481694817048171481724817348174481754817648177481784817948180481814818248183481844818548186481874818848189481904819148192481934819448195481964819748198481994820048201482024820348204482054820648207482084820948210482114821248213482144821548216482174821848219482204822148222482234822448225482264822748228482294823048231482324823348234482354823648237482384823948240482414824248243482444824548246482474824848249482504825148252482534825448255482564825748258482594826048261482624826348264482654826648267482684826948270482714827248273482744827548276482774827848279482804828148282482834828448285482864828748288482894829048291482924829348294482954829648297482984829948300483014830248303483044830548306483074830848309483104831148312483134831448315483164831748318483194832048321483224832348324483254832648327483284832948330483314833248333483344833548336483374833848339483404834148342483434834448345483464834748348483494835048351483524835348354483554835648357483584835948360483614836248363483644836548366483674836848369483704837148372483734837448375483764837748378483794838048381483824838348384483854838648387483884838948390483914839248393483944839548396483974839848399484004840148402484034840448405484064840748408484094841048411484124841348414484154841648417484184841948420484214842248423484244842548426484274842848429484304843148432484334843448435484364843748438484394844048441484424844348444484454844648447484484844948450484514845248453484544845548456484574845848459484604846148462484634846448465484664846748468484694847048471484724847348474484754847648477484784847948480484814848248483484844848548486484874848848489484904849148492484934849448495484964849748498484994850048501485024850348504485054850648507485084850948510485114851248513485144851548516485174851848519485204852148522485234852448525485264852748528485294853048531485324853348534485354853648537485384853948540485414854248543485444854548546485474854848549485504855148552485534855448555485564855748558485594856048561485624856348564485654856648567485684856948570485714857248573485744857548576485774857848579485804858148582485834858448585485864858748588485894859048591485924859348594485954859648597485984859948600486014860248603486044860548606486074860848609486104861148612486134861448615486164861748618486194862048621486224862348624486254862648627486284862948630486314863248633486344863548636486374863848639486404864148642486434864448645486464864748648486494865048651486524865348654486554865648657486584865948660486614866248663486644866548666486674866848669486704867148672486734867448675486764867748678486794868048681486824868348684486854868648687486884868948690486914869248693486944869548696486974869848699487004870148702487034870448705487064870748708487094871048711487124871348714487154871648717487184871948720487214872248723487244872548726487274872848729487304873148732487334873448735487364873748738487394874048741487424874348744487454874648747487484874948750487514875248753487544875548756487574875848759487604876148762487634876448765487664876748768487694877048771487724877348774487754877648777487784877948780487814878248783487844878548786487874878848789487904879148792487934879448795487964879748798487994880048801488024880348804488054880648807488084880948810488114881248813488144881548816488174881848819488204882148822488234882448825488264882748828488294883048831488324883348834488354883648837488384883948840488414884248843488444884548846488474884848849488504885148852488534885448855488564885748858488594886048861488624886348864488654886648867488684886948870488714887248873488744887548876488774887848879488804888148882488834888448885488864888748888488894889048891488924889348894488954889648897488984889948900489014890248903489044890548906489074890848909489104891148912489134891448915489164891748918489194892048921489224892348924489254892648927489284892948930489314893248933489344893548936489374893848939489404894148942489434894448945489464894748948489494895048951489524895348954489554895648957489584895948960489614896248963489644896548966489674896848969489704897148972489734897448975489764897748978489794898048981489824898348984489854898648987489884898948990489914899248993489944899548996489974899848999490004900149002490034900449005490064900749008490094901049011490124901349014490154901649017490184901949020490214902249023490244902549026490274902849029490304903149032490334903449035490364903749038490394904049041490424904349044490454904649047490484904949050490514905249053490544905549056490574905849059490604906149062490634906449065490664906749068490694907049071490724907349074490754907649077490784907949080490814908249083490844908549086490874908849089490904909149092490934909449095490964909749098490994910049101491024910349104491054910649107491084910949110491114911249113491144911549116491174911849119491204912149122491234912449125491264912749128491294913049131491324913349134491354913649137491384913949140491414914249143491444914549146491474914849149491504915149152491534915449155491564915749158491594916049161491624916349164491654916649167491684916949170491714917249173491744917549176491774917849179491804918149182491834918449185491864918749188491894919049191491924919349194491954919649197491984919949200492014920249203492044920549206492074920849209492104921149212492134921449215492164921749218492194922049221492224922349224492254922649227492284922949230492314923249233492344923549236492374923849239492404924149242492434924449245492464924749248492494925049251492524925349254492554925649257492584925949260492614926249263492644926549266492674926849269492704927149272492734927449275492764927749278492794928049281492824928349284492854928649287492884928949290492914929249293492944929549296492974929849299493004930149302493034930449305493064930749308493094931049311493124931349314493154931649317493184931949320493214932249323493244932549326493274932849329493304933149332493334933449335493364933749338493394934049341493424934349344493454934649347493484934949350493514935249353493544935549356493574935849359493604936149362493634936449365493664936749368493694937049371493724937349374493754937649377493784937949380493814938249383493844938549386493874938849389493904939149392493934939449395493964939749398493994940049401494024940349404494054940649407494084940949410494114941249413494144941549416494174941849419494204942149422494234942449425494264942749428494294943049431494324943349434494354943649437494384943949440494414944249443494444944549446494474944849449494504945149452494534945449455494564945749458494594946049461494624946349464494654946649467494684946949470494714947249473494744947549476494774947849479494804948149482494834948449485494864948749488494894949049491494924949349494494954949649497494984949949500495014950249503495044950549506495074950849509495104951149512495134951449515495164951749518495194952049521495224952349524495254952649527495284952949530495314953249533495344953549536495374953849539495404954149542495434954449545495464954749548495494955049551495524955349554495554955649557495584955949560495614956249563495644956549566495674956849569495704957149572495734957449575495764957749578495794958049581495824958349584495854958649587495884958949590495914959249593495944959549596495974959849599496004960149602496034960449605496064960749608496094961049611496124961349614496154961649617496184961949620496214962249623496244962549626496274962849629496304963149632496334963449635496364963749638496394964049641496424964349644496454964649647496484964949650496514965249653496544965549656496574965849659496604966149662496634966449665496664966749668496694967049671496724967349674496754967649677496784967949680496814968249683496844968549686496874968849689496904969149692496934969449695496964969749698496994970049701497024970349704497054970649707497084970949710497114971249713497144971549716497174971849719497204972149722497234972449725497264972749728497294973049731497324973349734497354973649737497384973949740497414974249743497444974549746497474974849749497504975149752497534975449755497564975749758497594976049761497624976349764497654976649767497684976949770497714977249773497744977549776497774977849779497804978149782497834978449785497864978749788497894979049791497924979349794497954979649797497984979949800498014980249803498044980549806498074980849809498104981149812498134981449815498164981749818498194982049821498224982349824498254982649827498284982949830498314983249833498344983549836498374983849839498404984149842498434984449845498464984749848498494985049851498524985349854498554985649857498584985949860498614986249863498644986549866498674986849869498704987149872498734987449875498764987749878498794988049881498824988349884498854988649887498884988949890498914989249893498944989549896498974989849899499004990149902499034990449905499064990749908499094991049911499124991349914499154991649917499184991949920499214992249923499244992549926499274992849929499304993149932499334993449935499364993749938499394994049941499424994349944499454994649947499484994949950499514995249953499544995549956499574995849959499604996149962499634996449965499664996749968499694997049971499724997349974499754997649977499784997949980499814998249983499844998549986499874998849989499904999149992499934999449995499964999749998499995000050001500025000350004500055000650007500085000950010500115001250013500145001550016500175001850019500205002150022500235002450025500265002750028500295003050031500325003350034500355003650037500385003950040500415004250043500445004550046500475004850049500505005150052500535005450055500565005750058500595006050061500625006350064500655006650067500685006950070500715007250073500745007550076500775007850079500805008150082500835008450085500865008750088500895009050091500925009350094500955009650097500985009950100501015010250103501045010550106501075010850109501105011150112501135011450115501165011750118501195012050121501225012350124501255012650127501285012950130501315013250133501345013550136501375013850139501405014150142501435014450145501465014750148501495015050151501525015350154501555015650157501585015950160501615016250163501645016550166501675016850169501705017150172501735017450175501765017750178501795018050181501825018350184501855018650187501885018950190501915019250193501945019550196501975019850199502005020150202502035020450205502065020750208502095021050211502125021350214502155021650217502185021950220502215022250223502245022550226502275022850229502305023150232502335023450235502365023750238502395024050241502425024350244502455024650247502485024950250502515025250253502545025550256502575025850259502605026150262502635026450265502665026750268502695027050271502725027350274502755027650277502785027950280502815028250283502845028550286502875028850289502905029150292502935029450295502965029750298502995030050301503025030350304503055030650307503085030950310503115031250313503145031550316503175031850319503205032150322503235032450325503265032750328503295033050331503325033350334503355033650337503385033950340503415034250343503445034550346503475034850349503505035150352503535035450355503565035750358503595036050361503625036350364503655036650367503685036950370503715037250373503745037550376503775037850379503805038150382503835038450385503865038750388503895039050391503925039350394503955039650397503985039950400504015040250403504045040550406504075040850409504105041150412504135041450415504165041750418504195042050421504225042350424504255042650427504285042950430504315043250433504345043550436504375043850439504405044150442504435044450445504465044750448504495045050451504525045350454504555045650457504585045950460504615046250463504645046550466504675046850469504705047150472504735047450475504765047750478504795048050481504825048350484504855048650487504885048950490504915049250493504945049550496504975049850499505005050150502505035050450505505065050750508505095051050511505125051350514505155051650517505185051950520505215052250523505245052550526505275052850529505305053150532505335053450535505365053750538505395054050541505425054350544505455054650547505485054950550505515055250553505545055550556505575055850559505605056150562505635056450565505665056750568505695057050571505725057350574505755057650577505785057950580505815058250583505845058550586505875058850589505905059150592505935059450595505965059750598505995060050601506025060350604506055060650607506085060950610506115061250613506145061550616506175061850619506205062150622506235062450625506265062750628506295063050631506325063350634506355063650637506385063950640506415064250643506445064550646506475064850649506505065150652506535065450655506565065750658506595066050661506625066350664506655066650667506685066950670506715067250673506745067550676506775067850679506805068150682506835068450685506865068750688506895069050691506925069350694506955069650697506985069950700507015070250703507045070550706507075070850709507105071150712507135071450715507165071750718507195072050721507225072350724507255072650727507285072950730507315073250733507345073550736507375073850739507405074150742507435074450745507465074750748507495075050751507525075350754507555075650757507585075950760507615076250763507645076550766507675076850769507705077150772507735077450775507765077750778507795078050781507825078350784507855078650787507885078950790507915079250793507945079550796507975079850799508005080150802508035080450805508065080750808508095081050811508125081350814508155081650817508185081950820508215082250823508245082550826508275082850829508305083150832508335083450835508365083750838508395084050841508425084350844508455084650847508485084950850508515085250853508545085550856508575085850859508605086150862508635086450865508665086750868508695087050871508725087350874508755087650877508785087950880508815088250883508845088550886508875088850889508905089150892508935089450895508965089750898508995090050901509025090350904509055090650907509085090950910509115091250913509145091550916509175091850919509205092150922509235092450925509265092750928509295093050931509325093350934509355093650937509385093950940509415094250943509445094550946509475094850949509505095150952509535095450955509565095750958509595096050961509625096350964509655096650967509685096950970509715097250973509745097550976509775097850979509805098150982509835098450985509865098750988509895099050991509925099350994509955099650997509985099951000510015100251003510045100551006510075100851009510105101151012510135101451015510165101751018510195102051021510225102351024510255102651027510285102951030510315103251033510345103551036510375103851039510405104151042510435104451045510465104751048510495105051051510525105351054510555105651057510585105951060510615106251063510645106551066510675106851069510705107151072510735107451075510765107751078510795108051081510825108351084510855108651087510885108951090510915109251093510945109551096510975109851099511005110151102511035110451105511065110751108511095111051111511125111351114511155111651117511185111951120511215112251123511245112551126511275112851129511305113151132511335113451135511365113751138511395114051141511425114351144511455114651147511485114951150511515115251153511545115551156511575115851159511605116151162511635116451165511665116751168511695117051171511725117351174511755117651177511785117951180511815118251183511845118551186511875118851189511905119151192511935119451195511965119751198511995120051201512025120351204512055120651207512085120951210512115121251213512145121551216512175121851219512205122151222512235122451225512265122751228512295123051231512325123351234512355123651237512385123951240512415124251243512445124551246512475124851249512505125151252512535125451255512565125751258512595126051261512625126351264512655126651267512685126951270512715127251273512745127551276512775127851279512805128151282512835128451285512865128751288512895129051291512925129351294512955129651297512985129951300513015130251303513045130551306513075130851309513105131151312513135131451315513165131751318513195132051321513225132351324513255132651327513285132951330513315133251333513345133551336513375133851339513405134151342513435134451345513465134751348513495135051351513525135351354513555135651357513585135951360513615136251363513645136551366513675136851369513705137151372513735137451375513765137751378513795138051381513825138351384513855138651387513885138951390513915139251393513945139551396513975139851399514005140151402514035140451405514065140751408514095141051411514125141351414514155141651417514185141951420514215142251423514245142551426514275142851429514305143151432514335143451435514365143751438514395144051441514425144351444514455144651447514485144951450514515145251453514545145551456514575145851459514605146151462514635146451465514665146751468514695147051471514725147351474514755147651477514785147951480514815148251483514845148551486514875148851489514905149151492514935149451495514965149751498514995150051501515025150351504515055150651507515085150951510515115151251513515145151551516515175151851519515205152151522515235152451525515265152751528515295153051531515325153351534515355153651537515385153951540515415154251543515445154551546515475154851549515505155151552515535155451555515565155751558515595156051561515625156351564515655156651567515685156951570515715157251573515745157551576515775157851579515805158151582515835158451585515865158751588515895159051591515925159351594515955159651597515985159951600516015160251603516045160551606516075160851609516105161151612516135161451615516165161751618516195162051621516225162351624516255162651627516285162951630516315163251633516345163551636516375163851639516405164151642516435164451645516465164751648516495165051651516525165351654516555165651657516585165951660516615166251663516645166551666516675166851669516705167151672516735167451675516765167751678516795168051681516825168351684516855168651687516885168951690516915169251693516945169551696516975169851699517005170151702517035170451705517065170751708517095171051711517125171351714517155171651717517185171951720517215172251723517245172551726517275172851729517305173151732517335173451735517365173751738517395174051741517425174351744517455174651747517485174951750517515175251753517545175551756517575175851759517605176151762517635176451765517665176751768517695177051771517725177351774517755177651777517785177951780517815178251783517845178551786517875178851789517905179151792517935179451795517965179751798517995180051801518025180351804518055180651807518085180951810518115181251813518145181551816518175181851819518205182151822518235182451825518265182751828518295183051831518325183351834518355183651837518385183951840518415184251843518445184551846518475184851849518505185151852518535185451855518565185751858518595186051861518625186351864518655186651867518685186951870518715187251873518745187551876518775187851879518805188151882518835188451885518865188751888518895189051891518925189351894518955189651897518985189951900519015190251903519045190551906519075190851909519105191151912519135191451915519165191751918519195192051921519225192351924519255192651927519285192951930519315193251933519345193551936519375193851939519405194151942519435194451945519465194751948519495195051951519525195351954519555195651957519585195951960519615196251963519645196551966519675196851969519705197151972519735197451975519765197751978519795198051981519825198351984519855198651987519885198951990519915199251993519945199551996519975199851999520005200152002520035200452005520065200752008520095201052011520125201352014520155201652017520185201952020520215202252023520245202552026520275202852029520305203152032520335203452035520365203752038520395204052041520425204352044520455204652047520485204952050520515205252053520545205552056520575205852059520605206152062520635206452065520665206752068520695207052071520725207352074520755207652077520785207952080520815208252083520845208552086520875208852089520905209152092520935209452095520965209752098520995210052101521025210352104521055210652107521085210952110521115211252113521145211552116521175211852119521205212152122521235212452125521265212752128521295213052131521325213352134521355213652137521385213952140521415214252143521445214552146521475214852149521505215152152521535215452155521565215752158521595216052161521625216352164521655216652167521685216952170521715217252173521745217552176521775217852179521805218152182521835218452185521865218752188521895219052191521925219352194521955219652197521985219952200522015220252203522045220552206522075220852209522105221152212522135221452215522165221752218522195222052221522225222352224522255222652227522285222952230522315223252233522345223552236522375223852239522405224152242522435224452245522465224752248522495225052251522525225352254522555225652257522585225952260522615226252263522645226552266522675226852269522705227152272522735227452275522765227752278522795228052281522825228352284522855228652287522885228952290522915229252293522945229552296522975229852299523005230152302523035230452305523065230752308523095231052311523125231352314523155231652317523185231952320523215232252323523245232552326523275232852329523305233152332523335233452335523365233752338523395234052341523425234352344523455234652347523485234952350523515235252353523545235552356523575235852359523605236152362523635236452365523665236752368523695237052371523725237352374523755237652377523785237952380523815238252383523845238552386523875238852389523905239152392523935239452395523965239752398523995240052401524025240352404524055240652407524085240952410524115241252413524145241552416524175241852419524205242152422524235242452425524265242752428524295243052431524325243352434524355243652437524385243952440524415244252443524445244552446524475244852449524505245152452524535245452455524565245752458524595246052461524625246352464524655246652467524685246952470524715247252473524745247552476524775247852479524805248152482524835248452485524865248752488524895249052491524925249352494524955249652497524985249952500525015250252503525045250552506525075250852509525105251152512525135251452515525165251752518525195252052521525225252352524525255252652527525285252952530525315253252533525345253552536525375253852539525405254152542525435254452545525465254752548525495255052551525525255352554525555255652557525585255952560525615256252563525645256552566525675256852569525705257152572525735257452575525765257752578525795258052581525825258352584525855258652587525885258952590525915259252593525945259552596525975259852599526005260152602526035260452605526065260752608526095261052611526125261352614526155261652617526185261952620526215262252623526245262552626526275262852629526305263152632526335263452635526365263752638526395264052641526425264352644526455264652647526485264952650526515265252653526545265552656526575265852659526605266152662526635266452665526665266752668526695267052671526725267352674526755267652677526785267952680526815268252683526845268552686526875268852689526905269152692526935269452695526965269752698526995270052701527025270352704527055270652707527085270952710527115271252713527145271552716527175271852719527205272152722527235272452725527265272752728527295273052731527325273352734527355273652737527385273952740527415274252743527445274552746527475274852749527505275152752527535275452755527565275752758527595276052761527625276352764527655276652767527685276952770527715277252773527745277552776527775277852779527805278152782527835278452785527865278752788527895279052791527925279352794527955279652797527985279952800528015280252803528045280552806528075280852809528105281152812528135281452815528165281752818528195282052821528225282352824528255282652827528285282952830528315283252833528345283552836528375283852839528405284152842528435284452845528465284752848528495285052851528525285352854528555285652857528585285952860528615286252863528645286552866528675286852869528705287152872528735287452875528765287752878528795288052881528825288352884528855288652887528885288952890528915289252893528945289552896528975289852899529005290152902529035290452905529065290752908529095291052911529125291352914529155291652917529185291952920529215292252923529245292552926529275292852929529305293152932529335293452935529365293752938529395294052941529425294352944529455294652947529485294952950529515295252953529545295552956529575295852959529605296152962529635296452965529665296752968529695297052971529725297352974529755297652977529785297952980529815298252983529845298552986529875298852989529905299152992529935299452995529965299752998529995300053001530025300353004530055300653007530085300953010530115301253013530145301553016530175301853019530205302153022530235302453025530265302753028530295303053031530325303353034530355303653037530385303953040530415304253043530445304553046530475304853049530505305153052530535305453055530565305753058530595306053061530625306353064530655306653067530685306953070530715307253073530745307553076530775307853079530805308153082530835308453085530865308753088530895309053091530925309353094530955309653097530985309953100531015310253103531045310553106531075310853109531105311153112531135311453115531165311753118531195312053121531225312353124531255312653127531285312953130531315313253133531345313553136531375313853139531405314153142531435314453145531465314753148531495315053151531525315353154531555315653157531585315953160531615316253163531645316553166531675316853169531705317153172531735317453175531765317753178531795318053181531825318353184531855318653187531885318953190531915319253193531945319553196531975319853199532005320153202532035320453205532065320753208532095321053211532125321353214532155321653217532185321953220532215322253223532245322553226532275322853229532305323153232532335323453235532365323753238532395324053241532425324353244532455324653247532485324953250532515325253253532545325553256532575325853259532605326153262532635326453265532665326753268532695327053271532725327353274532755327653277532785327953280532815328253283532845328553286532875328853289532905329153292532935329453295532965329753298532995330053301533025330353304533055330653307533085330953310533115331253313533145331553316533175331853319533205332153322533235332453325533265332753328533295333053331533325333353334533355333653337533385333953340533415334253343533445334553346533475334853349533505335153352533535335453355533565335753358533595336053361533625336353364533655336653367533685336953370533715337253373533745337553376533775337853379533805338153382533835338453385533865338753388533895339053391533925339353394533955339653397533985339953400534015340253403534045340553406534075340853409534105341153412534135341453415534165341753418534195342053421534225342353424534255342653427534285342953430534315343253433534345343553436534375343853439534405344153442534435344453445534465344753448534495345053451534525345353454534555345653457534585345953460534615346253463534645346553466534675346853469534705347153472534735347453475534765347753478534795348053481534825348353484534855348653487534885348953490534915349253493534945349553496534975349853499535005350153502535035350453505535065350753508535095351053511535125351353514535155351653517535185351953520535215352253523535245352553526535275352853529535305353153532535335353453535535365353753538535395354053541535425354353544535455354653547535485354953550535515355253553535545355553556535575355853559535605356153562535635356453565535665356753568535695357053571535725357353574535755357653577535785357953580535815358253583535845358553586535875358853589535905359153592535935359453595535965359753598535995360053601536025360353604536055360653607536085360953610536115361253613536145361553616536175361853619536205362153622536235362453625536265362753628536295363053631536325363353634536355363653637536385363953640536415364253643536445364553646536475364853649536505365153652536535365453655536565365753658536595366053661536625366353664536655366653667536685366953670536715367253673536745367553676536775367853679536805368153682536835368453685536865368753688536895369053691536925369353694536955369653697536985369953700537015370253703537045370553706537075370853709537105371153712537135371453715537165371753718537195372053721537225372353724537255372653727537285372953730537315373253733537345373553736537375373853739537405374153742537435374453745537465374753748537495375053751537525375353754537555375653757537585375953760537615376253763537645376553766537675376853769537705377153772537735377453775537765377753778537795378053781537825378353784537855378653787537885378953790537915379253793537945379553796537975379853799538005380153802538035380453805538065380753808538095381053811538125381353814538155381653817538185381953820538215382253823538245382553826538275382853829538305383153832538335383453835538365383753838538395384053841538425384353844538455384653847538485384953850538515385253853538545385553856538575385853859538605386153862538635386453865538665386753868538695387053871538725387353874538755387653877538785387953880538815388253883538845388553886538875388853889538905389153892538935389453895538965389753898538995390053901539025390353904539055390653907539085390953910539115391253913539145391553916539175391853919539205392153922539235392453925539265392753928539295393053931539325393353934539355393653937539385393953940539415394253943539445394553946539475394853949539505395153952539535395453955539565395753958539595396053961539625396353964539655396653967539685396953970539715397253973539745397553976539775397853979539805398153982539835398453985539865398753988539895399053991539925399353994539955399653997539985399954000540015400254003540045400554006540075400854009540105401154012540135401454015540165401754018540195402054021540225402354024540255402654027540285402954030540315403254033540345403554036540375403854039540405404154042540435404454045540465404754048540495405054051540525405354054540555405654057540585405954060540615406254063540645406554066540675406854069540705407154072540735407454075540765407754078540795408054081540825408354084540855408654087540885408954090540915409254093540945409554096540975409854099541005410154102541035410454105541065410754108541095411054111541125411354114541155411654117541185411954120541215412254123541245412554126541275412854129541305413154132541335413454135541365413754138541395414054141541425414354144541455414654147541485414954150541515415254153541545415554156541575415854159541605416154162541635416454165541665416754168541695417054171541725417354174541755417654177541785417954180541815418254183541845418554186541875418854189541905419154192541935419454195541965419754198541995420054201542025420354204542055420654207542085420954210542115421254213542145421554216542175421854219542205422154222542235422454225542265422754228542295423054231542325423354234542355423654237542385423954240542415424254243542445424554246542475424854249542505425154252542535425454255542565425754258542595426054261542625426354264542655426654267542685426954270542715427254273542745427554276542775427854279542805428154282542835428454285542865428754288542895429054291542925429354294542955429654297542985429954300543015430254303543045430554306543075430854309543105431154312543135431454315543165431754318543195432054321543225432354324543255432654327543285432954330543315433254333543345433554336543375433854339543405434154342543435434454345543465434754348543495435054351543525435354354543555435654357543585435954360543615436254363543645436554366543675436854369543705437154372543735437454375543765437754378543795438054381543825438354384543855438654387543885438954390543915439254393543945439554396543975439854399544005440154402544035440454405544065440754408544095441054411544125441354414544155441654417544185441954420544215442254423544245442554426544275442854429544305443154432544335443454435544365443754438544395444054441544425444354444544455444654447544485444954450544515445254453544545445554456544575445854459544605446154462544635446454465544665446754468544695447054471544725447354474544755447654477544785447954480544815448254483544845448554486544875448854489544905449154492544935449454495544965449754498544995450054501545025450354504545055450654507545085450954510545115451254513545145451554516545175451854519545205452154522545235452454525545265452754528545295453054531545325453354534545355453654537545385453954540545415454254543545445454554546545475454854549545505455154552545535455454555545565455754558545595456054561545625456354564545655456654567545685456954570545715457254573545745457554576545775457854579545805458154582545835458454585545865458754588545895459054591545925459354594545955459654597545985459954600546015460254603546045460554606546075460854609546105461154612546135461454615546165461754618546195462054621546225462354624546255462654627546285462954630546315463254633546345463554636546375463854639546405464154642546435464454645546465464754648546495465054651546525465354654546555465654657546585465954660546615466254663546645466554666546675466854669546705467154672546735467454675546765467754678546795468054681546825468354684546855468654687546885468954690546915469254693546945469554696546975469854699547005470154702547035470454705547065470754708547095471054711547125471354714547155471654717547185471954720547215472254723547245472554726547275472854729547305473154732547335473454735547365473754738547395474054741547425474354744547455474654747547485474954750547515475254753547545475554756547575475854759547605476154762547635476454765547665476754768547695477054771547725477354774547755477654777547785477954780547815478254783547845478554786547875478854789547905479154792547935479454795547965479754798547995480054801548025480354804548055480654807548085480954810548115481254813548145481554816548175481854819548205482154822548235482454825548265482754828548295483054831548325483354834548355483654837548385483954840548415484254843548445484554846548475484854849548505485154852548535485454855548565485754858548595486054861548625486354864548655486654867548685486954870548715487254873548745487554876548775487854879548805488154882548835488454885548865488754888548895489054891548925489354894548955489654897548985489954900549015490254903549045490554906549075490854909549105491154912549135491454915549165491754918549195492054921549225492354924549255492654927549285492954930549315493254933549345493554936549375493854939549405494154942549435494454945549465494754948549495495054951549525495354954549555495654957549585495954960549615496254963549645496554966549675496854969549705497154972549735497454975549765497754978549795498054981549825498354984549855498654987549885498954990549915499254993549945499554996549975499854999550005500155002550035500455005550065500755008550095501055011550125501355014550155501655017550185501955020550215502255023550245502555026550275502855029550305503155032550335503455035550365503755038550395504055041550425504355044550455504655047550485504955050550515505255053550545505555056550575505855059550605506155062550635506455065550665506755068550695507055071550725507355074550755507655077550785507955080550815508255083550845508555086550875508855089550905509155092550935509455095550965509755098550995510055101551025510355104551055510655107551085510955110551115511255113551145511555116551175511855119551205512155122551235512455125551265512755128551295513055131551325513355134551355513655137551385513955140551415514255143551445514555146551475514855149551505515155152551535515455155551565515755158551595516055161551625516355164551655516655167551685516955170551715517255173551745517555176551775517855179551805518155182551835518455185551865518755188551895519055191551925519355194551955519655197551985519955200552015520255203552045520555206552075520855209552105521155212552135521455215552165521755218552195522055221552225522355224552255522655227552285522955230552315523255233552345523555236552375523855239552405524155242552435524455245552465524755248552495525055251552525525355254552555525655257552585525955260552615526255263552645526555266552675526855269552705527155272552735527455275552765527755278552795528055281552825528355284552855528655287552885528955290552915529255293552945529555296552975529855299553005530155302553035530455305553065530755308553095531055311553125531355314553155531655317553185531955320553215532255323553245532555326553275532855329553305533155332553335533455335553365533755338553395534055341553425534355344553455534655347553485534955350553515535255353553545535555356553575535855359553605536155362553635536455365553665536755368553695537055371553725537355374553755537655377553785537955380553815538255383553845538555386553875538855389553905539155392553935539455395553965539755398553995540055401554025540355404554055540655407554085540955410554115541255413554145541555416554175541855419554205542155422554235542455425554265542755428554295543055431554325543355434554355543655437554385543955440554415544255443554445544555446554475544855449554505545155452554535545455455554565545755458554595546055461554625546355464554655546655467554685546955470554715547255473554745547555476554775547855479554805548155482554835548455485554865548755488554895549055491554925549355494554955549655497554985549955500555015550255503555045550555506555075550855509555105551155512555135551455515555165551755518555195552055521555225552355524555255552655527555285552955530555315553255533555345553555536555375553855539555405554155542555435554455545555465554755548555495555055551555525555355554555555555655557555585555955560555615556255563555645556555566555675556855569555705557155572555735557455575555765557755578555795558055581555825558355584555855558655587555885558955590555915559255593555945559555596555975559855599556005560155602556035560455605556065560755608556095561055611556125561355614556155561655617556185561955620556215562255623556245562555626556275562855629556305563155632556335563455635556365563755638556395564055641556425564355644556455564655647556485564955650556515565255653556545565555656556575565855659556605566155662556635566455665556665566755668556695567055671556725567355674556755567655677556785567955680556815568255683556845568555686556875568855689556905569155692556935569455695556965569755698556995570055701557025570355704557055570655707557085570955710557115571255713557145571555716557175571855719557205572155722557235572455725557265572755728557295573055731557325573355734557355573655737557385573955740557415574255743557445574555746557475574855749557505575155752557535575455755557565575755758557595576055761557625576355764557655576655767557685576955770557715577255773557745577555776557775577855779557805578155782557835578455785557865578755788557895579055791557925579355794557955579655797557985579955800558015580255803558045580555806558075580855809558105581155812558135581455815558165581755818558195582055821558225582355824558255582655827558285582955830558315583255833558345583555836558375583855839558405584155842558435584455845558465584755848558495585055851558525585355854558555585655857558585585955860558615586255863558645586555866558675586855869558705587155872558735587455875558765587755878558795588055881558825588355884558855588655887558885588955890558915589255893558945589555896558975589855899559005590155902559035590455905559065590755908559095591055911559125591355914559155591655917559185591955920559215592255923559245592555926559275592855929559305593155932559335593455935559365593755938559395594055941559425594355944559455594655947559485594955950559515595255953559545595555956559575595855959559605596155962559635596455965559665596755968559695597055971559725597355974559755597655977559785597955980559815598255983559845598555986559875598855989559905599155992559935599455995559965599755998559995600056001560025600356004560055600656007560085600956010560115601256013560145601556016560175601856019560205602156022560235602456025560265602756028560295603056031560325603356034560355603656037560385603956040560415604256043560445604556046560475604856049560505605156052560535605456055560565605756058560595606056061560625606356064560655606656067560685606956070560715607256073560745607556076560775607856079560805608156082560835608456085560865608756088560895609056091560925609356094560955609656097560985609956100561015610256103561045610556106561075610856109561105611156112561135611456115561165611756118561195612056121561225612356124561255612656127561285612956130561315613256133561345613556136561375613856139561405614156142561435614456145561465614756148561495615056151561525615356154561555615656157561585615956160561615616256163561645616556166561675616856169561705617156172561735617456175561765617756178561795618056181561825618356184561855618656187561885618956190561915619256193561945619556196561975619856199562005620156202562035620456205562065620756208562095621056211562125621356214562155621656217562185621956220562215622256223562245622556226562275622856229562305623156232562335623456235562365623756238562395624056241562425624356244562455624656247562485624956250562515625256253562545625556256562575625856259562605626156262562635626456265562665626756268562695627056271562725627356274562755627656277562785627956280562815628256283562845628556286562875628856289562905629156292562935629456295562965629756298562995630056301563025630356304563055630656307563085630956310563115631256313563145631556316563175631856319563205632156322563235632456325563265632756328563295633056331563325633356334563355633656337563385633956340563415634256343563445634556346563475634856349563505635156352563535635456355563565635756358563595636056361563625636356364563655636656367563685636956370563715637256373563745637556376563775637856379563805638156382563835638456385563865638756388563895639056391563925639356394563955639656397563985639956400564015640256403564045640556406564075640856409564105641156412564135641456415564165641756418564195642056421564225642356424564255642656427564285642956430564315643256433564345643556436564375643856439564405644156442564435644456445564465644756448564495645056451564525645356454564555645656457564585645956460564615646256463564645646556466564675646856469564705647156472564735647456475564765647756478564795648056481564825648356484564855648656487564885648956490564915649256493564945649556496564975649856499565005650156502565035650456505565065650756508565095651056511565125651356514565155651656517565185651956520565215652256523565245652556526565275652856529565305653156532565335653456535565365653756538565395654056541565425654356544565455654656547565485654956550565515655256553565545655556556565575655856559565605656156562565635656456565565665656756568565695657056571565725657356574565755657656577565785657956580565815658256583565845658556586565875658856589565905659156592565935659456595565965659756598565995660056601566025660356604566055660656607566085660956610566115661256613566145661556616566175661856619566205662156622566235662456625566265662756628566295663056631566325663356634566355663656637566385663956640566415664256643566445664556646566475664856649566505665156652566535665456655566565665756658566595666056661566625666356664566655666656667566685666956670566715667256673566745667556676566775667856679566805668156682566835668456685566865668756688566895669056691566925669356694566955669656697566985669956700567015670256703567045670556706567075670856709567105671156712567135671456715567165671756718567195672056721567225672356724567255672656727567285672956730567315673256733567345673556736567375673856739567405674156742567435674456745567465674756748567495675056751567525675356754567555675656757567585675956760567615676256763567645676556766567675676856769567705677156772567735677456775567765677756778567795678056781567825678356784567855678656787567885678956790567915679256793567945679556796567975679856799568005680156802568035680456805568065680756808568095681056811568125681356814568155681656817568185681956820568215682256823568245682556826568275682856829568305683156832568335683456835568365683756838568395684056841568425684356844568455684656847568485684956850568515685256853568545685556856568575685856859568605686156862568635686456865568665686756868568695687056871568725687356874568755687656877568785687956880568815688256883568845688556886568875688856889568905689156892568935689456895568965689756898568995690056901569025690356904569055690656907569085690956910569115691256913569145691556916569175691856919569205692156922569235692456925569265692756928569295693056931569325693356934569355693656937569385693956940569415694256943569445694556946569475694856949569505695156952569535695456955569565695756958569595696056961569625696356964569655696656967569685696956970569715697256973569745697556976569775697856979569805698156982569835698456985569865698756988569895699056991569925699356994569955699656997569985699957000570015700257003570045700557006570075700857009570105701157012570135701457015570165701757018570195702057021570225702357024570255702657027570285702957030570315703257033570345703557036570375703857039570405704157042570435704457045570465704757048570495705057051570525705357054570555705657057570585705957060570615706257063570645706557066570675706857069570705707157072570735707457075570765707757078570795708057081570825708357084570855708657087570885708957090570915709257093570945709557096570975709857099571005710157102571035710457105571065710757108571095711057111571125711357114571155711657117571185711957120571215712257123571245712557126571275712857129571305713157132571335713457135571365713757138571395714057141571425714357144571455714657147571485714957150571515715257153571545715557156571575715857159571605716157162571635716457165571665716757168571695717057171571725717357174571755717657177571785717957180571815718257183571845718557186571875718857189571905719157192571935719457195571965719757198571995720057201572025720357204572055720657207572085720957210572115721257213572145721557216572175721857219572205722157222572235722457225572265722757228572295723057231572325723357234572355723657237572385723957240572415724257243572445724557246572475724857249572505725157252572535725457255572565725757258572595726057261572625726357264572655726657267572685726957270572715727257273572745727557276572775727857279572805728157282572835728457285572865728757288572895729057291572925729357294572955729657297572985729957300573015730257303573045730557306573075730857309573105731157312573135731457315573165731757318573195732057321573225732357324573255732657327573285732957330573315733257333573345733557336573375733857339573405734157342573435734457345573465734757348573495735057351573525735357354573555735657357573585735957360573615736257363573645736557366573675736857369573705737157372573735737457375573765737757378573795738057381573825738357384573855738657387573885738957390573915739257393573945739557396573975739857399574005740157402574035740457405574065740757408574095741057411574125741357414574155741657417574185741957420574215742257423574245742557426574275742857429574305743157432574335743457435574365743757438574395744057441574425744357444574455744657447574485744957450574515745257453574545745557456574575745857459574605746157462574635746457465574665746757468574695747057471574725747357474574755747657477574785747957480574815748257483574845748557486574875748857489574905749157492574935749457495574965749757498574995750057501575025750357504575055750657507575085750957510575115751257513575145751557516575175751857519575205752157522575235752457525575265752757528575295753057531575325753357534575355753657537575385753957540575415754257543575445754557546575475754857549575505755157552575535755457555575565755757558575595756057561575625756357564575655756657567575685756957570575715757257573575745757557576575775757857579575805758157582575835758457585575865758757588575895759057591575925759357594575955759657597575985759957600576015760257603576045760557606576075760857609576105761157612576135761457615576165761757618576195762057621576225762357624576255762657627576285762957630576315763257633576345763557636576375763857639576405764157642576435764457645576465764757648576495765057651576525765357654576555765657657576585765957660576615766257663576645766557666576675766857669576705767157672576735767457675576765767757678576795768057681576825768357684576855768657687576885768957690576915769257693576945769557696576975769857699577005770157702577035770457705577065770757708577095771057711577125771357714577155771657717577185771957720577215772257723577245772557726577275772857729577305773157732577335773457735577365773757738577395774057741577425774357744577455774657747577485774957750577515775257753577545775557756577575775857759577605776157762577635776457765577665776757768577695777057771577725777357774577755777657777577785777957780577815778257783577845778557786577875778857789577905779157792577935779457795577965779757798577995780057801578025780357804578055780657807578085780957810578115781257813578145781557816578175781857819578205782157822578235782457825578265782757828578295783057831578325783357834578355783657837578385783957840578415784257843578445784557846578475784857849578505785157852578535785457855578565785757858578595786057861578625786357864578655786657867578685786957870578715787257873578745787557876578775787857879578805788157882578835788457885578865788757888578895789057891578925789357894578955789657897578985789957900579015790257903579045790557906579075790857909579105791157912579135791457915579165791757918579195792057921579225792357924579255792657927579285792957930579315793257933579345793557936579375793857939579405794157942579435794457945579465794757948579495795057951579525795357954579555795657957579585795957960579615796257963579645796557966579675796857969579705797157972579735797457975579765797757978579795798057981579825798357984579855798657987579885798957990579915799257993579945799557996579975799857999580005800158002580035800458005580065800758008580095801058011580125801358014580155801658017580185801958020580215802258023580245802558026580275802858029580305803158032580335803458035580365803758038580395804058041580425804358044580455804658047580485804958050580515805258053580545805558056580575805858059580605806158062580635806458065580665806758068580695807058071580725807358074580755807658077580785807958080580815808258083580845808558086580875808858089580905809158092580935809458095580965809758098580995810058101581025810358104581055810658107581085810958110581115811258113581145811558116581175811858119581205812158122581235812458125581265812758128581295813058131581325813358134581355813658137581385813958140581415814258143581445814558146581475814858149581505815158152581535815458155581565815758158581595816058161581625816358164581655816658167581685816958170581715817258173581745817558176581775817858179581805818158182581835818458185581865818758188581895819058191581925819358194581955819658197581985819958200582015820258203582045820558206582075820858209582105821158212582135821458215582165821758218582195822058221582225822358224582255822658227582285822958230582315823258233582345823558236582375823858239582405824158242582435824458245582465824758248582495825058251582525825358254582555825658257582585825958260582615826258263582645826558266582675826858269582705827158272582735827458275582765827758278582795828058281582825828358284582855828658287582885828958290582915829258293582945829558296582975829858299583005830158302583035830458305583065830758308583095831058311583125831358314583155831658317583185831958320583215832258323583245832558326583275832858329583305833158332583335833458335583365833758338583395834058341583425834358344583455834658347583485834958350583515835258353583545835558356583575835858359583605836158362583635836458365583665836758368583695837058371583725837358374583755837658377583785837958380583815838258383583845838558386583875838858389583905839158392583935839458395583965839758398583995840058401584025840358404584055840658407584085840958410584115841258413584145841558416584175841858419584205842158422584235842458425584265842758428584295843058431584325843358434584355843658437584385843958440584415844258443584445844558446584475844858449584505845158452584535845458455584565845758458584595846058461584625846358464584655846658467584685846958470584715847258473584745847558476584775847858479584805848158482584835848458485584865848758488584895849058491584925849358494584955849658497584985849958500585015850258503585045850558506585075850858509585105851158512585135851458515585165851758518585195852058521585225852358524585255852658527585285852958530585315853258533585345853558536585375853858539585405854158542585435854458545585465854758548585495855058551585525855358554585555855658557585585855958560585615856258563585645856558566585675856858569585705857158572585735857458575585765857758578585795858058581585825858358584585855858658587585885858958590585915859258593585945859558596585975859858599586005860158602586035860458605586065860758608586095861058611586125861358614586155861658617586185861958620586215862258623586245862558626586275862858629586305863158632586335863458635586365863758638586395864058641586425864358644586455864658647586485864958650586515865258653586545865558656586575865858659586605866158662586635866458665586665866758668586695867058671586725867358674586755867658677586785867958680586815868258683586845868558686586875868858689586905869158692586935869458695586965869758698586995870058701587025870358704587055870658707587085870958710587115871258713587145871558716587175871858719587205872158722587235872458725587265872758728587295873058731587325873358734587355873658737587385873958740587415874258743587445874558746587475874858749587505875158752587535875458755587565875758758587595876058761587625876358764587655876658767587685876958770587715877258773587745877558776587775877858779587805878158782587835878458785587865878758788587895879058791587925879358794587955879658797587985879958800588015880258803588045880558806588075880858809588105881158812588135881458815588165881758818588195882058821588225882358824588255882658827588285882958830588315883258833588345883558836588375883858839588405884158842588435884458845588465884758848588495885058851588525885358854588555885658857588585885958860588615886258863588645886558866588675886858869588705887158872588735887458875588765887758878588795888058881588825888358884588855888658887588885888958890588915889258893588945889558896588975889858899589005890158902589035890458905589065890758908589095891058911589125891358914589155891658917589185891958920589215892258923589245892558926589275892858929589305893158932589335893458935589365893758938589395894058941589425894358944589455894658947589485894958950589515895258953589545895558956589575895858959589605896158962589635896458965589665896758968589695897058971589725897358974589755897658977589785897958980589815898258983589845898558986589875898858989589905899158992589935899458995589965899758998589995900059001590025900359004590055900659007590085900959010590115901259013590145901559016590175901859019590205902159022590235902459025590265902759028590295903059031590325903359034590355903659037590385903959040590415904259043590445904559046590475904859049590505905159052590535905459055590565905759058590595906059061590625906359064590655906659067590685906959070590715907259073590745907559076590775907859079590805908159082590835908459085590865908759088590895909059091590925909359094590955909659097590985909959100591015910259103591045910559106591075910859109591105911159112591135911459115591165911759118591195912059121591225912359124591255912659127591285912959130591315913259133591345913559136591375913859139591405914159142591435914459145591465914759148591495915059151591525915359154591555915659157591585915959160591615916259163591645916559166591675916859169591705917159172591735917459175591765917759178591795918059181591825918359184591855918659187591885918959190591915919259193591945919559196591975919859199592005920159202592035920459205592065920759208592095921059211592125921359214592155921659217592185921959220592215922259223592245922559226592275922859229592305923159232592335923459235592365923759238592395924059241592425924359244592455924659247592485924959250592515925259253592545925559256592575925859259592605926159262592635926459265592665926759268592695927059271592725927359274592755927659277592785927959280592815928259283592845928559286592875928859289592905929159292592935929459295592965929759298592995930059301593025930359304593055930659307593085930959310593115931259313593145931559316593175931859319593205932159322593235932459325593265932759328593295933059331593325933359334593355933659337593385933959340593415934259343593445934559346593475934859349593505935159352593535935459355593565935759358593595936059361593625936359364593655936659367593685936959370593715937259373593745937559376593775937859379593805938159382593835938459385593865938759388593895939059391593925939359394593955939659397593985939959400594015940259403594045940559406594075940859409594105941159412594135941459415594165941759418594195942059421594225942359424594255942659427594285942959430594315943259433594345943559436594375943859439594405944159442594435944459445594465944759448594495945059451594525945359454594555945659457594585945959460594615946259463594645946559466594675946859469594705947159472594735947459475594765947759478594795948059481594825948359484594855948659487594885948959490594915949259493594945949559496594975949859499595005950159502595035950459505595065950759508595095951059511595125951359514595155951659517595185951959520595215952259523595245952559526595275952859529595305953159532595335953459535595365953759538595395954059541595425954359544595455954659547595485954959550595515955259553595545955559556595575955859559595605956159562595635956459565595665956759568595695957059571595725957359574595755957659577595785957959580595815958259583595845958559586595875958859589595905959159592595935959459595595965959759598595995960059601596025960359604596055960659607596085960959610596115961259613596145961559616596175961859619596205962159622596235962459625596265962759628596295963059631596325963359634596355963659637596385963959640596415964259643596445964559646596475964859649596505965159652596535965459655596565965759658596595966059661596625966359664596655966659667596685966959670596715967259673596745967559676596775967859679596805968159682596835968459685596865968759688596895969059691596925969359694596955969659697596985969959700597015970259703597045970559706597075970859709597105971159712597135971459715597165971759718597195972059721597225972359724597255972659727597285972959730597315973259733597345973559736597375973859739597405974159742597435974459745597465974759748597495975059751597525975359754597555975659757597585975959760597615976259763597645976559766597675976859769597705977159772597735977459775597765977759778597795978059781597825978359784597855978659787597885978959790597915979259793597945979559796597975979859799598005980159802598035980459805598065980759808598095981059811598125981359814598155981659817598185981959820598215982259823598245982559826598275982859829598305983159832598335983459835598365983759838598395984059841598425984359844598455984659847598485984959850598515985259853598545985559856598575985859859598605986159862598635986459865598665986759868598695987059871598725987359874598755987659877598785987959880598815988259883598845988559886598875988859889598905989159892598935989459895598965989759898598995990059901599025990359904599055990659907599085990959910599115991259913599145991559916599175991859919599205992159922599235992459925599265992759928599295993059931599325993359934599355993659937599385993959940599415994259943599445994559946599475994859949599505995159952599535995459955599565995759958599595996059961599625996359964599655996659967599685996959970599715997259973599745997559976599775997859979599805998159982599835998459985599865998759988599895999059991599925999359994599955999659997599985999960000600016000260003600046000560006600076000860009600106001160012600136001460015600166001760018600196002060021600226002360024600256002660027600286002960030600316003260033600346003560036600376003860039600406004160042600436004460045600466004760048600496005060051600526005360054600556005660057600586005960060600616006260063600646006560066600676006860069600706007160072600736007460075600766007760078600796008060081600826008360084600856008660087600886008960090600916009260093600946009560096600976009860099601006010160102601036010460105601066010760108601096011060111601126011360114601156011660117601186011960120601216012260123601246012560126601276012860129601306013160132601336013460135601366013760138601396014060141601426014360144601456014660147601486014960150601516015260153601546015560156601576015860159601606016160162601636016460165601666016760168601696017060171601726017360174601756017660177601786017960180601816018260183601846018560186601876018860189601906019160192601936019460195601966019760198601996020060201602026020360204602056020660207602086020960210602116021260213602146021560216602176021860219602206022160222602236022460225602266022760228602296023060231602326023360234602356023660237602386023960240602416024260243602446024560246602476024860249602506025160252602536025460255602566025760258602596026060261602626026360264602656026660267602686026960270602716027260273602746027560276602776027860279602806028160282602836028460285602866028760288602896029060291602926029360294602956029660297602986029960300603016030260303603046030560306603076030860309603106031160312603136031460315603166031760318603196032060321603226032360324603256032660327603286032960330603316033260333603346033560336603376033860339603406034160342603436034460345603466034760348603496035060351603526035360354603556035660357603586035960360603616036260363603646036560366603676036860369603706037160372603736037460375603766037760378603796038060381603826038360384603856038660387603886038960390603916039260393603946039560396603976039860399604006040160402604036040460405604066040760408604096041060411604126041360414604156041660417604186041960420604216042260423604246042560426604276042860429604306043160432604336043460435604366043760438604396044060441604426044360444604456044660447604486044960450604516045260453604546045560456604576045860459604606046160462604636046460465604666046760468604696047060471604726047360474604756047660477604786047960480604816048260483604846048560486604876048860489604906049160492604936049460495604966049760498604996050060501605026050360504605056050660507605086050960510605116051260513605146051560516605176051860519605206052160522605236052460525605266052760528605296053060531605326053360534605356053660537605386053960540605416054260543605446054560546605476054860549605506055160552605536055460555605566055760558605596056060561605626056360564605656056660567605686056960570605716057260573605746057560576605776057860579605806058160582605836058460585605866058760588605896059060591605926059360594605956059660597605986059960600606016060260603606046060560606606076060860609606106061160612606136061460615606166061760618606196062060621606226062360624606256062660627606286062960630606316063260633606346063560636606376063860639606406064160642606436064460645606466064760648606496065060651606526065360654606556065660657606586065960660606616066260663606646066560666606676066860669606706067160672606736067460675606766067760678606796068060681606826068360684606856068660687606886068960690606916069260693606946069560696606976069860699607006070160702607036070460705607066070760708607096071060711607126071360714607156071660717607186071960720607216072260723607246072560726607276072860729607306073160732607336073460735607366073760738607396074060741607426074360744607456074660747607486074960750607516075260753607546075560756607576075860759607606076160762607636076460765607666076760768607696077060771607726077360774607756077660777607786077960780607816078260783607846078560786607876078860789607906079160792607936079460795607966079760798607996080060801608026080360804608056080660807608086080960810608116081260813608146081560816608176081860819608206082160822608236082460825608266082760828608296083060831608326083360834608356083660837608386083960840608416084260843608446084560846608476084860849608506085160852608536085460855608566085760858608596086060861608626086360864608656086660867608686086960870608716087260873608746087560876608776087860879608806088160882608836088460885608866088760888608896089060891608926089360894608956089660897608986089960900609016090260903609046090560906609076090860909609106091160912609136091460915609166091760918609196092060921609226092360924609256092660927609286092960930609316093260933609346093560936609376093860939609406094160942609436094460945609466094760948609496095060951609526095360954609556095660957609586095960960609616096260963609646096560966609676096860969609706097160972609736097460975609766097760978609796098060981609826098360984609856098660987609886098960990609916099260993609946099560996609976099860999610006100161002610036100461005610066100761008610096101061011610126101361014610156101661017610186101961020610216102261023610246102561026610276102861029610306103161032610336103461035610366103761038610396104061041610426104361044610456104661047610486104961050610516105261053610546105561056610576105861059610606106161062610636106461065610666106761068610696107061071610726107361074610756107661077610786107961080610816108261083610846108561086610876108861089610906109161092610936109461095610966109761098610996110061101611026110361104611056110661107611086110961110611116111261113611146111561116611176111861119611206112161122611236112461125611266112761128611296113061131611326113361134611356113661137611386113961140611416114261143611446114561146611476114861149611506115161152611536115461155611566115761158611596116061161611626116361164611656116661167611686116961170611716117261173611746117561176611776117861179611806118161182611836118461185611866118761188611896119061191611926119361194611956119661197611986119961200612016120261203612046120561206612076120861209612106121161212612136121461215612166121761218612196122061221612226122361224612256122661227612286122961230612316123261233612346123561236612376123861239612406124161242612436124461245612466124761248612496125061251612526125361254612556125661257612586125961260612616126261263612646126561266612676126861269612706127161272612736127461275612766127761278612796128061281612826128361284612856128661287612886128961290612916129261293612946129561296612976129861299613006130161302613036130461305613066130761308613096131061311613126131361314613156131661317613186131961320613216132261323613246132561326613276132861329613306133161332613336133461335613366133761338613396134061341613426134361344613456134661347613486134961350613516135261353613546135561356613576135861359613606136161362613636136461365613666136761368613696137061371613726137361374613756137661377613786137961380613816138261383613846138561386613876138861389613906139161392613936139461395613966139761398613996140061401614026140361404614056140661407614086140961410614116141261413614146141561416614176141861419614206142161422614236142461425614266142761428614296143061431614326143361434614356143661437614386143961440614416144261443614446144561446614476144861449614506145161452614536145461455614566145761458614596146061461614626146361464614656146661467614686146961470614716147261473614746147561476614776147861479614806148161482614836148461485614866148761488614896149061491614926149361494614956149661497614986149961500615016150261503615046150561506615076150861509615106151161512615136151461515615166151761518615196152061521615226152361524615256152661527615286152961530615316153261533615346153561536615376153861539615406154161542615436154461545615466154761548615496155061551615526155361554615556155661557615586155961560615616156261563615646156561566615676156861569615706157161572615736157461575615766157761578615796158061581615826158361584615856158661587615886158961590615916159261593615946159561596615976159861599616006160161602616036160461605616066160761608616096161061611616126161361614616156161661617616186161961620616216162261623616246162561626616276162861629616306163161632616336163461635616366163761638616396164061641616426164361644616456164661647616486164961650616516165261653616546165561656616576165861659616606166161662616636166461665616666166761668616696167061671616726167361674616756167661677616786167961680616816168261683616846168561686616876168861689616906169161692616936169461695616966169761698616996170061701617026170361704617056170661707617086170961710617116171261713617146171561716617176171861719617206172161722617236172461725617266172761728617296173061731617326173361734617356173661737617386173961740617416174261743617446174561746617476174861749617506175161752617536175461755617566175761758617596176061761617626176361764617656176661767617686176961770617716177261773617746177561776617776177861779617806178161782617836178461785617866178761788617896179061791617926179361794617956179661797617986179961800618016180261803618046180561806618076180861809618106181161812618136181461815618166181761818618196182061821618226182361824618256182661827618286182961830618316183261833618346183561836618376183861839618406184161842618436184461845618466184761848618496185061851618526185361854618556185661857618586185961860618616186261863618646186561866618676186861869618706187161872618736187461875618766187761878618796188061881618826188361884618856188661887618886188961890618916189261893618946189561896618976189861899619006190161902619036190461905619066190761908619096191061911619126191361914619156191661917619186191961920619216192261923619246192561926619276192861929619306193161932619336193461935619366193761938619396194061941619426194361944619456194661947619486194961950619516195261953619546195561956619576195861959619606196161962619636196461965619666196761968619696197061971619726197361974619756197661977619786197961980619816198261983619846198561986619876198861989619906199161992619936199461995619966199761998619996200062001620026200362004620056200662007620086200962010620116201262013620146201562016620176201862019620206202162022620236202462025620266202762028620296203062031620326203362034620356203662037620386203962040620416204262043620446204562046620476204862049620506205162052620536205462055620566205762058620596206062061620626206362064620656206662067620686206962070620716207262073620746207562076620776207862079620806208162082620836208462085620866208762088620896209062091620926209362094620956209662097620986209962100621016210262103621046210562106621076210862109621106211162112621136211462115621166211762118621196212062121621226212362124621256212662127621286212962130621316213262133621346213562136621376213862139621406214162142621436214462145621466214762148621496215062151621526215362154621556215662157621586215962160621616216262163621646216562166621676216862169621706217162172621736217462175621766217762178621796218062181621826218362184621856218662187621886218962190621916219262193621946219562196621976219862199622006220162202622036220462205622066220762208622096221062211622126221362214622156221662217622186221962220622216222262223622246222562226622276222862229622306223162232622336223462235622366223762238622396224062241622426224362244622456224662247622486224962250622516225262253622546225562256622576225862259622606226162262622636226462265622666226762268622696227062271622726227362274622756227662277622786227962280622816228262283622846228562286622876228862289622906229162292622936229462295622966229762298622996230062301623026230362304623056230662307623086230962310623116231262313623146231562316623176231862319623206232162322623236232462325623266232762328623296233062331623326233362334623356233662337623386233962340623416234262343623446234562346623476234862349623506235162352623536235462355623566235762358623596236062361623626236362364623656236662367623686236962370623716237262373623746237562376623776237862379623806238162382623836238462385623866238762388623896239062391623926239362394623956239662397623986239962400624016240262403624046240562406624076240862409624106241162412624136241462415624166241762418624196242062421624226242362424624256242662427624286242962430624316243262433624346243562436624376243862439624406244162442624436244462445624466244762448624496245062451624526245362454624556245662457624586245962460624616246262463624646246562466624676246862469624706247162472624736247462475624766247762478624796248062481624826248362484624856248662487624886248962490624916249262493624946249562496624976249862499625006250162502625036250462505625066250762508625096251062511625126251362514625156251662517625186251962520625216252262523625246252562526625276252862529625306253162532625336253462535625366253762538625396254062541625426254362544625456254662547625486254962550625516255262553625546255562556625576255862559625606256162562625636256462565625666256762568625696257062571625726257362574625756257662577625786257962580625816258262583625846258562586625876258862589625906259162592625936259462595625966259762598625996260062601626026260362604626056260662607626086260962610626116261262613626146261562616626176261862619626206262162622626236262462625626266262762628626296263062631626326263362634626356263662637626386263962640626416264262643626446264562646626476264862649626506265162652626536265462655626566265762658626596266062661626626266362664626656266662667626686266962670626716267262673626746267562676626776267862679626806268162682626836268462685626866268762688626896269062691626926269362694626956269662697626986269962700627016270262703627046270562706627076270862709627106271162712627136271462715627166271762718627196272062721627226272362724627256272662727627286272962730627316273262733627346273562736627376273862739627406274162742627436274462745627466274762748627496275062751627526275362754627556275662757627586275962760627616276262763627646276562766627676276862769627706277162772627736277462775627766277762778627796278062781627826278362784627856278662787627886278962790627916279262793627946279562796627976279862799628006280162802628036280462805628066280762808628096281062811628126281362814628156281662817628186281962820628216282262823628246282562826628276282862829628306283162832628336283462835628366283762838628396284062841628426284362844628456284662847628486284962850628516285262853628546285562856628576285862859628606286162862628636286462865628666286762868628696287062871628726287362874628756287662877628786287962880628816288262883628846288562886628876288862889628906289162892628936289462895628966289762898628996290062901629026290362904629056290662907629086290962910629116291262913629146291562916629176291862919629206292162922629236292462925629266292762928629296293062931629326293362934629356293662937629386293962940629416294262943629446294562946629476294862949629506295162952629536295462955629566295762958629596296062961629626296362964629656296662967629686296962970629716297262973629746297562976629776297862979629806298162982629836298462985629866298762988629896299062991629926299362994629956299662997629986299963000630016300263003630046300563006630076300863009630106301163012630136301463015630166301763018630196302063021630226302363024630256302663027630286302963030630316303263033630346303563036630376303863039630406304163042630436304463045630466304763048630496305063051630526305363054630556305663057630586305963060630616306263063630646306563066630676306863069630706307163072630736307463075630766307763078630796308063081630826308363084630856308663087630886308963090630916309263093630946309563096630976309863099631006310163102631036310463105631066310763108631096311063111631126311363114631156311663117631186311963120631216312263123631246312563126631276312863129631306313163132631336313463135631366313763138631396314063141631426314363144631456314663147631486314963150631516315263153631546315563156631576315863159631606316163162631636316463165631666316763168631696317063171631726317363174631756317663177631786317963180631816318263183631846318563186631876318863189631906319163192631936319463195631966319763198631996320063201632026320363204632056320663207632086320963210632116321263213632146321563216632176321863219632206322163222632236322463225632266322763228632296323063231632326323363234632356323663237632386323963240632416324263243632446324563246632476324863249632506325163252632536325463255632566325763258632596326063261632626326363264632656326663267632686326963270632716327263273632746327563276632776327863279632806328163282632836328463285632866328763288632896329063291632926329363294632956329663297632986329963300633016330263303633046330563306633076330863309633106331163312633136331463315633166331763318633196332063321633226332363324633256332663327633286332963330633316333263333633346333563336633376333863339633406334163342633436334463345633466334763348633496335063351633526335363354633556335663357633586335963360633616336263363633646336563366633676336863369633706337163372633736337463375633766337763378633796338063381633826338363384633856338663387633886338963390633916339263393633946339563396633976339863399634006340163402634036340463405634066340763408634096341063411634126341363414634156341663417634186341963420634216342263423634246342563426634276342863429634306343163432634336343463435634366343763438634396344063441634426344363444634456344663447634486344963450634516345263453634546345563456634576345863459634606346163462634636346463465634666346763468634696347063471634726347363474634756347663477634786347963480634816348263483634846348563486634876348863489634906349163492634936349463495634966349763498634996350063501635026350363504635056350663507635086350963510635116351263513635146351563516635176351863519635206352163522635236352463525635266352763528635296353063531635326353363534635356353663537635386353963540635416354263543635446354563546635476354863549635506355163552635536355463555635566355763558635596356063561635626356363564635656356663567635686356963570635716357263573635746357563576635776357863579635806358163582635836358463585635866358763588635896359063591635926359363594635956359663597635986359963600636016360263603636046360563606636076360863609636106361163612636136361463615636166361763618636196362063621636226362363624636256362663627636286362963630636316363263633636346363563636636376363863639636406364163642636436364463645636466364763648636496365063651636526365363654636556365663657636586365963660636616366263663636646366563666636676366863669636706367163672636736367463675636766367763678636796368063681636826368363684636856368663687636886368963690636916369263693636946369563696636976369863699637006370163702637036370463705637066370763708637096371063711637126371363714637156371663717637186371963720637216372263723637246372563726637276372863729637306373163732637336373463735637366373763738637396374063741637426374363744637456374663747637486374963750637516375263753637546375563756637576375863759637606376163762637636376463765637666376763768637696377063771637726377363774637756377663777637786377963780637816378263783637846378563786637876378863789637906379163792637936379463795637966379763798637996380063801638026380363804638056380663807638086380963810638116381263813638146381563816638176381863819638206382163822638236382463825638266382763828638296383063831638326383363834638356383663837638386383963840638416384263843638446384563846638476384863849638506385163852638536385463855638566385763858638596386063861638626386363864638656386663867638686386963870638716387263873638746387563876638776387863879638806388163882638836388463885638866388763888638896389063891638926389363894638956389663897638986389963900639016390263903639046390563906639076390863909639106391163912639136391463915639166391763918639196392063921639226392363924639256392663927639286392963930639316393263933639346393563936639376393863939639406394163942639436394463945639466394763948639496395063951639526395363954639556395663957639586395963960639616396263963639646396563966639676396863969639706397163972639736397463975639766397763978639796398063981639826398363984639856398663987639886398963990639916399263993639946399563996639976399863999640006400164002640036400464005640066400764008640096401064011640126401364014640156401664017640186401964020640216402264023640246402564026640276402864029640306403164032640336403464035640366403764038640396404064041640426404364044640456404664047640486404964050640516405264053640546405564056640576405864059640606406164062640636406464065640666406764068640696407064071640726407364074640756407664077640786407964080640816408264083640846408564086640876408864089640906409164092640936409464095640966409764098640996410064101641026410364104641056410664107641086410964110641116411264113641146411564116641176411864119641206412164122641236412464125641266412764128641296413064131641326413364134641356413664137641386413964140641416414264143641446414564146641476414864149641506415164152641536415464155641566415764158641596416064161641626416364164641656416664167641686416964170641716417264173641746417564176641776417864179641806418164182641836418464185641866418764188641896419064191641926419364194641956419664197641986419964200642016420264203642046420564206642076420864209642106421164212642136421464215642166421764218642196422064221642226422364224642256422664227642286422964230642316423264233642346423564236642376423864239642406424164242642436424464245642466424764248642496425064251642526425364254642556425664257642586425964260642616426264263642646426564266642676426864269642706427164272642736427464275642766427764278642796428064281642826428364284642856428664287642886428964290642916429264293642946429564296642976429864299643006430164302643036430464305643066430764308643096431064311643126431364314643156431664317643186431964320643216432264323643246432564326643276432864329643306433164332643336433464335643366433764338643396434064341643426434364344643456434664347643486434964350643516435264353643546435564356643576435864359643606436164362643636436464365643666436764368643696437064371643726437364374643756437664377643786437964380643816438264383643846438564386643876438864389643906439164392643936439464395643966439764398643996440064401644026440364404644056440664407644086440964410644116441264413644146441564416644176441864419644206442164422644236442464425644266442764428644296443064431644326443364434644356443664437644386443964440644416444264443644446444564446644476444864449644506445164452644536445464455644566445764458644596446064461644626446364464644656446664467644686446964470644716447264473644746447564476644776447864479644806448164482644836448464485644866448764488644896449064491644926449364494644956449664497644986449964500645016450264503645046450564506645076450864509645106451164512645136451464515645166451764518645196452064521645226452364524645256452664527645286452964530645316453264533645346453564536645376453864539645406454164542645436454464545645466454764548645496455064551645526455364554645556455664557645586455964560645616456264563645646456564566645676456864569645706457164572645736457464575645766457764578645796458064581645826458364584645856458664587645886458964590645916459264593645946459564596645976459864599646006460164602646036460464605646066460764608646096461064611646126461364614646156461664617646186461964620646216462264623646246462564626646276462864629646306463164632646336463464635646366463764638646396464064641646426464364644646456464664647646486464964650646516465264653646546465564656646576465864659646606466164662646636466464665646666466764668646696467064671646726467364674646756467664677646786467964680646816468264683646846468564686646876468864689646906469164692646936469464695646966469764698646996470064701647026470364704647056470664707647086470964710647116471264713647146471564716647176471864719647206472164722647236472464725647266472764728647296473064731647326473364734647356473664737647386473964740647416474264743647446474564746647476474864749647506475164752647536475464755647566475764758647596476064761647626476364764647656476664767647686476964770647716477264773647746477564776647776477864779647806478164782647836478464785647866478764788647896479064791647926479364794647956479664797647986479964800648016480264803648046480564806648076480864809648106481164812648136481464815648166481764818648196482064821648226482364824648256482664827648286482964830648316483264833648346483564836648376483864839648406484164842648436484464845648466484764848648496485064851648526485364854648556485664857648586485964860648616486264863648646486564866648676486864869648706487164872648736487464875648766487764878648796488064881648826488364884648856488664887648886488964890648916489264893648946489564896648976489864899649006490164902649036490464905649066490764908649096491064911649126491364914649156491664917649186491964920649216492264923649246492564926649276492864929649306493164932649336493464935649366493764938649396494064941649426494364944649456494664947649486494964950649516495264953649546495564956649576495864959649606496164962649636496464965649666496764968649696497064971649726497364974649756497664977649786497964980649816498264983649846498564986649876498864989649906499164992649936499464995649966499764998649996500065001650026500365004650056500665007650086500965010650116501265013650146501565016650176501865019650206502165022650236502465025650266502765028650296503065031650326503365034650356503665037650386503965040650416504265043650446504565046650476504865049650506505165052650536505465055650566505765058650596506065061650626506365064650656506665067650686506965070650716507265073650746507565076650776507865079650806508165082650836508465085650866508765088650896509065091650926509365094650956509665097650986509965100651016510265103651046510565106651076510865109651106511165112651136511465115651166511765118651196512065121651226512365124651256512665127651286512965130651316513265133651346513565136651376513865139651406514165142651436514465145651466514765148651496515065151651526515365154651556515665157651586515965160651616516265163651646516565166651676516865169651706517165172651736517465175651766517765178651796518065181651826518365184651856518665187651886518965190651916519265193651946519565196651976519865199652006520165202652036520465205652066520765208652096521065211652126521365214652156521665217652186521965220652216522265223652246522565226652276522865229652306523165232652336523465235652366523765238652396524065241652426524365244652456524665247652486524965250652516525265253652546525565256652576525865259652606526165262652636526465265652666526765268652696527065271652726527365274652756527665277652786527965280652816528265283652846528565286652876528865289652906529165292652936529465295652966529765298652996530065301653026530365304653056530665307653086530965310653116531265313653146531565316653176531865319653206532165322653236532465325653266532765328653296533065331653326533365334653356533665337653386533965340653416534265343653446534565346653476534865349653506535165352653536535465355653566535765358653596536065361653626536365364653656536665367653686536965370653716537265373653746537565376653776537865379653806538165382653836538465385653866538765388653896539065391653926539365394653956539665397653986539965400654016540265403654046540565406654076540865409654106541165412654136541465415654166541765418654196542065421654226542365424654256542665427654286542965430654316543265433654346543565436654376543865439654406544165442654436544465445654466544765448654496545065451654526545365454654556545665457654586545965460654616546265463654646546565466654676546865469654706547165472654736547465475654766547765478654796548065481654826548365484654856548665487654886548965490654916549265493654946549565496654976549865499655006550165502655036550465505655066550765508655096551065511655126551365514655156551665517655186551965520655216552265523655246552565526655276552865529655306553165532655336553465535655366553765538655396554065541655426554365544655456554665547655486554965550655516555265553655546555565556655576555865559655606556165562655636556465565655666556765568655696557065571655726557365574655756557665577655786557965580655816558265583655846558565586655876558865589655906559165592655936559465595655966559765598655996560065601656026560365604656056560665607656086560965610656116561265613656146561565616656176561865619656206562165622656236562465625656266562765628656296563065631656326563365634656356563665637656386563965640656416564265643656446564565646656476564865649656506565165652656536565465655656566565765658656596566065661656626566365664656656566665667656686566965670656716567265673656746567565676656776567865679656806568165682656836568465685656866568765688656896569065691656926569365694656956569665697656986569965700657016570265703657046570565706657076570865709657106571165712657136571465715657166571765718657196572065721657226572365724657256572665727657286572965730657316573265733657346573565736657376573865739657406574165742657436574465745657466574765748657496575065751657526575365754657556575665757657586575965760657616576265763657646576565766657676576865769657706577165772657736577465775657766577765778657796578065781657826578365784657856578665787657886578965790657916579265793657946579565796657976579865799658006580165802658036580465805658066580765808658096581065811658126581365814658156581665817658186581965820658216582265823658246582565826658276582865829658306583165832658336583465835658366583765838658396584065841658426584365844658456584665847658486584965850658516585265853658546585565856658576585865859658606586165862658636586465865658666586765868658696587065871658726587365874658756587665877658786587965880658816588265883658846588565886658876588865889658906589165892658936589465895658966589765898658996590065901659026590365904659056590665907659086590965910659116591265913659146591565916659176591865919659206592165922659236592465925659266592765928659296593065931659326593365934659356593665937659386593965940659416594265943659446594565946659476594865949659506595165952659536595465955659566595765958659596596065961659626596365964659656596665967659686596965970659716597265973659746597565976659776597865979659806598165982659836598465985659866598765988659896599065991659926599365994659956599665997659986599966000660016600266003660046600566006660076600866009660106601166012660136601466015660166601766018660196602066021660226602366024660256602666027660286602966030660316603266033660346603566036660376603866039660406604166042660436604466045660466604766048660496605066051660526605366054660556605666057660586605966060660616606266063660646606566066660676606866069660706607166072660736607466075660766607766078660796608066081660826608366084660856608666087660886608966090660916609266093660946609566096660976609866099661006610166102661036610466105661066610766108661096611066111661126611366114661156611666117661186611966120661216612266123661246612566126661276612866129661306613166132661336613466135661366613766138661396614066141661426614366144661456614666147661486614966150661516615266153661546615566156661576615866159661606616166162661636616466165661666616766168661696617066171661726617366174661756617666177661786617966180661816618266183661846618566186661876618866189661906619166192661936619466195661966619766198661996620066201662026620366204662056620666207662086620966210662116621266213662146621566216662176621866219662206622166222662236622466225662266622766228662296623066231662326623366234662356623666237662386623966240662416624266243662446624566246662476624866249662506625166252662536625466255662566625766258662596626066261662626626366264662656626666267662686626966270662716627266273662746627566276662776627866279662806628166282662836628466285662866628766288662896629066291662926629366294662956629666297662986629966300663016630266303663046630566306663076630866309663106631166312663136631466315663166631766318663196632066321663226632366324663256632666327663286632966330663316633266333663346633566336663376633866339663406634166342663436634466345663466634766348663496635066351663526635366354663556635666357663586635966360663616636266363663646636566366663676636866369663706637166372663736637466375663766637766378663796638066381663826638366384663856638666387663886638966390663916639266393663946639566396663976639866399664006640166402664036640466405664066640766408664096641066411664126641366414664156641666417664186641966420664216642266423664246642566426664276642866429664306643166432664336643466435664366643766438664396644066441664426644366444664456644666447664486644966450664516645266453664546645566456664576645866459664606646166462664636646466465664666646766468664696647066471664726647366474664756647666477664786647966480664816648266483664846648566486664876648866489664906649166492664936649466495664966649766498664996650066501665026650366504665056650666507665086650966510665116651266513665146651566516665176651866519665206652166522665236652466525665266652766528665296653066531665326653366534665356653666537665386653966540665416654266543665446654566546665476654866549665506655166552665536655466555665566655766558665596656066561665626656366564665656656666567665686656966570665716657266573665746657566576665776657866579665806658166582665836658466585665866658766588665896659066591665926659366594665956659666597665986659966600666016660266603666046660566606666076660866609666106661166612666136661466615666166661766618666196662066621666226662366624666256662666627666286662966630666316663266633666346663566636666376663866639666406664166642666436664466645666466664766648666496665066651666526665366654666556665666657666586665966660666616666266663666646666566666666676666866669666706667166672666736667466675666766667766678666796668066681666826668366684666856668666687666886668966690666916669266693666946669566696666976669866699667006670166702667036670466705667066670766708667096671066711667126671366714667156671666717667186671966720667216672266723667246672566726667276672866729667306673166732667336673466735667366673766738667396674066741667426674366744667456674666747667486674966750667516675266753667546675566756667576675866759667606676166762667636676466765667666676766768667696677066771667726677366774667756677666777667786677966780667816678266783667846678566786667876678866789667906679166792667936679466795667966679766798667996680066801668026680366804668056680666807668086680966810668116681266813668146681566816668176681866819668206682166822668236682466825668266682766828668296683066831668326683366834668356683666837668386683966840668416684266843668446684566846668476684866849668506685166852668536685466855668566685766858668596686066861668626686366864668656686666867668686686966870668716687266873668746687566876668776687866879668806688166882668836688466885668866688766888668896689066891668926689366894668956689666897668986689966900669016690266903669046690566906669076690866909669106691166912669136691466915669166691766918669196692066921669226692366924669256692666927669286692966930669316693266933669346693566936669376693866939669406694166942669436694466945669466694766948669496695066951669526695366954669556695666957669586695966960669616696266963669646696566966669676696866969669706697166972669736697466975669766697766978669796698066981669826698366984669856698666987669886698966990669916699266993669946699566996669976699866999670006700167002670036700467005670066700767008670096701067011670126701367014670156701667017670186701967020670216702267023670246702567026670276702867029670306703167032670336703467035670366703767038670396704067041670426704367044670456704667047670486704967050670516705267053670546705567056670576705867059670606706167062670636706467065670666706767068670696707067071670726707367074670756707667077670786707967080670816708267083670846708567086670876708867089670906709167092670936709467095670966709767098670996710067101671026710367104671056710667107671086710967110671116711267113671146711567116671176711867119671206712167122671236712467125671266712767128671296713067131671326713367134671356713667137671386713967140671416714267143671446714567146671476714867149671506715167152671536715467155671566715767158671596716067161671626716367164671656716667167671686716967170671716717267173671746717567176671776717867179671806718167182671836718467185671866718767188671896719067191671926719367194671956719667197671986719967200672016720267203672046720567206672076720867209672106721167212672136721467215672166721767218672196722067221672226722367224672256722667227672286722967230672316723267233672346723567236672376723867239672406724167242672436724467245672466724767248672496725067251672526725367254672556725667257672586725967260672616726267263672646726567266672676726867269672706727167272672736727467275672766727767278672796728067281672826728367284672856728667287672886728967290672916729267293672946729567296672976729867299673006730167302673036730467305673066730767308673096731067311673126731367314673156731667317673186731967320673216732267323673246732567326673276732867329673306733167332673336733467335673366733767338673396734067341673426734367344673456734667347673486734967350673516735267353673546735567356673576735867359673606736167362673636736467365673666736767368673696737067371673726737367374673756737667377673786737967380673816738267383673846738567386673876738867389673906739167392673936739467395673966739767398673996740067401674026740367404674056740667407674086740967410674116741267413674146741567416674176741867419674206742167422674236742467425674266742767428674296743067431674326743367434674356743667437674386743967440674416744267443674446744567446674476744867449674506745167452674536745467455674566745767458674596746067461674626746367464674656746667467674686746967470674716747267473674746747567476674776747867479674806748167482674836748467485674866748767488674896749067491674926749367494674956749667497674986749967500675016750267503675046750567506675076750867509675106751167512675136751467515675166751767518675196752067521675226752367524675256752667527675286752967530675316753267533675346753567536675376753867539675406754167542675436754467545675466754767548675496755067551675526755367554675556755667557675586755967560675616756267563675646756567566675676756867569675706757167572675736757467575675766757767578675796758067581675826758367584675856758667587675886758967590675916759267593675946759567596675976759867599676006760167602676036760467605676066760767608676096761067611676126761367614676156761667617676186761967620676216762267623676246762567626676276762867629676306763167632676336763467635676366763767638676396764067641676426764367644676456764667647676486764967650676516765267653676546765567656676576765867659676606766167662676636766467665676666766767668676696767067671676726767367674676756767667677676786767967680676816768267683676846768567686676876768867689676906769167692676936769467695676966769767698676996770067701677026770367704677056770667707677086770967710677116771267713677146771567716677176771867719677206772167722677236772467725677266772767728677296773067731677326773367734677356773667737677386773967740677416774267743677446774567746677476774867749677506775167752677536775467755677566775767758677596776067761677626776367764677656776667767677686776967770677716777267773677746777567776677776777867779677806778167782677836778467785677866778767788677896779067791677926779367794677956779667797677986779967800678016780267803678046780567806678076780867809678106781167812678136781467815678166781767818678196782067821678226782367824678256782667827678286782967830678316783267833678346783567836678376783867839678406784167842678436784467845678466784767848678496785067851678526785367854678556785667857678586785967860678616786267863678646786567866678676786867869678706787167872678736787467875678766787767878678796788067881678826788367884678856788667887678886788967890678916789267893678946789567896678976789867899679006790167902679036790467905679066790767908679096791067911679126791367914679156791667917679186791967920679216792267923679246792567926679276792867929679306793167932679336793467935679366793767938679396794067941679426794367944679456794667947679486794967950679516795267953679546795567956679576795867959679606796167962679636796467965679666796767968679696797067971679726797367974679756797667977679786797967980679816798267983679846798567986679876798867989679906799167992679936799467995679966799767998679996800068001680026800368004680056800668007680086800968010680116801268013680146801568016680176801868019680206802168022680236802468025680266802768028680296803068031680326803368034680356803668037680386803968040680416804268043680446804568046680476804868049680506805168052680536805468055680566805768058680596806068061680626806368064680656806668067680686806968070680716807268073680746807568076680776807868079680806808168082680836808468085680866808768088680896809068091680926809368094680956809668097680986809968100681016810268103681046810568106681076810868109681106811168112681136811468115681166811768118681196812068121681226812368124681256812668127681286812968130681316813268133681346813568136681376813868139681406814168142681436814468145681466814768148681496815068151681526815368154681556815668157681586815968160681616816268163681646816568166681676816868169681706817168172681736817468175681766817768178681796818068181681826818368184681856818668187681886818968190681916819268193681946819568196681976819868199682006820168202682036820468205682066820768208682096821068211682126821368214682156821668217682186821968220682216822268223682246822568226682276822868229682306823168232682336823468235682366823768238682396824068241682426824368244682456824668247682486824968250682516825268253682546825568256682576825868259682606826168262682636826468265682666826768268682696827068271682726827368274682756827668277682786827968280682816828268283682846828568286682876828868289682906829168292682936829468295682966829768298682996830068301683026830368304683056830668307683086830968310683116831268313683146831568316683176831868319683206832168322683236832468325683266832768328683296833068331683326833368334683356833668337683386833968340683416834268343683446834568346683476834868349683506835168352683536835468355683566835768358683596836068361683626836368364683656836668367683686836968370683716837268373683746837568376683776837868379683806838168382683836838468385683866838768388683896839068391683926839368394683956839668397683986839968400684016840268403684046840568406684076840868409684106841168412684136841468415684166841768418684196842068421684226842368424684256842668427684286842968430684316843268433684346843568436684376843868439684406844168442684436844468445684466844768448684496845068451684526845368454684556845668457684586845968460684616846268463684646846568466684676846868469684706847168472684736847468475684766847768478684796848068481684826848368484684856848668487684886848968490684916849268493684946849568496684976849868499685006850168502685036850468505685066850768508685096851068511685126851368514685156851668517685186851968520685216852268523685246852568526685276852868529685306853168532685336853468535685366853768538685396854068541685426854368544685456854668547685486854968550685516855268553685546855568556685576855868559685606856168562685636856468565685666856768568685696857068571685726857368574685756857668577685786857968580685816858268583685846858568586685876858868589685906859168592685936859468595685966859768598685996860068601686026860368604686056860668607686086860968610686116861268613686146861568616686176861868619686206862168622686236862468625686266862768628686296863068631686326863368634686356863668637686386863968640686416864268643686446864568646686476864868649686506865168652686536865468655686566865768658686596866068661686626866368664686656866668667686686866968670686716867268673686746867568676686776867868679686806868168682686836868468685686866868768688686896869068691686926869368694686956869668697686986869968700687016870268703687046870568706687076870868709687106871168712687136871468715687166871768718687196872068721687226872368724687256872668727687286872968730687316873268733687346873568736687376873868739687406874168742687436874468745687466874768748687496875068751687526875368754687556875668757687586875968760687616876268763687646876568766687676876868769687706877168772687736877468775687766877768778687796878068781687826878368784687856878668787687886878968790687916879268793687946879568796687976879868799688006880168802688036880468805688066880768808688096881068811688126881368814688156881668817688186881968820688216882268823688246882568826688276882868829688306883168832688336883468835688366883768838688396884068841688426884368844688456884668847688486884968850688516885268853688546885568856688576885868859688606886168862688636886468865688666886768868688696887068871688726887368874688756887668877688786887968880688816888268883688846888568886688876888868889688906889168892688936889468895688966889768898688996890068901689026890368904689056890668907689086890968910689116891268913689146891568916689176891868919689206892168922689236892468925689266892768928689296893068931689326893368934689356893668937689386893968940689416894268943689446894568946689476894868949689506895168952689536895468955689566895768958689596896068961689626896368964689656896668967689686896968970689716897268973689746897568976689776897868979689806898168982689836898468985689866898768988689896899068991689926899368994689956899668997689986899969000690016900269003690046900569006690076900869009690106901169012690136901469015690166901769018690196902069021690226902369024690256902669027690286902969030690316903269033690346903569036690376903869039690406904169042690436904469045690466904769048690496905069051690526905369054690556905669057690586905969060690616906269063690646906569066690676906869069690706907169072690736907469075690766907769078690796908069081690826908369084690856908669087690886908969090690916909269093690946909569096690976909869099691006910169102691036910469105691066910769108691096911069111691126911369114691156911669117691186911969120691216912269123691246912569126691276912869129691306913169132691336913469135691366913769138691396914069141691426914369144691456914669147691486914969150691516915269153691546915569156691576915869159691606916169162691636916469165691666916769168691696917069171691726917369174691756917669177691786917969180691816918269183691846918569186691876918869189691906919169192691936919469195691966919769198691996920069201692026920369204692056920669207692086920969210692116921269213692146921569216692176921869219692206922169222692236922469225692266922769228692296923069231692326923369234692356923669237692386923969240692416924269243692446924569246692476924869249692506925169252692536925469255692566925769258692596926069261692626926369264692656926669267692686926969270692716927269273692746927569276692776927869279692806928169282692836928469285692866928769288692896929069291692926929369294692956929669297692986929969300693016930269303693046930569306693076930869309693106931169312693136931469315693166931769318693196932069321693226932369324693256932669327693286932969330693316933269333693346933569336693376933869339693406934169342693436934469345693466934769348693496935069351693526935369354693556935669357693586935969360693616936269363693646936569366693676936869369693706937169372693736937469375693766937769378693796938069381693826938369384693856938669387693886938969390693916939269393693946939569396693976939869399694006940169402694036940469405694066940769408694096941069411694126941369414694156941669417694186941969420694216942269423694246942569426694276942869429694306943169432694336943469435694366943769438694396944069441694426944369444694456944669447694486944969450694516945269453694546945569456694576945869459694606946169462694636946469465694666946769468694696947069471694726947369474694756947669477694786947969480694816948269483694846948569486694876948869489694906949169492694936949469495694966949769498694996950069501695026950369504695056950669507695086950969510695116951269513695146951569516695176951869519695206952169522695236952469525695266952769528695296953069531695326953369534695356953669537695386953969540695416954269543695446954569546695476954869549695506955169552695536955469555695566955769558695596956069561695626956369564695656956669567695686956969570695716957269573695746957569576695776957869579695806958169582695836958469585695866958769588695896959069591695926959369594695956959669597695986959969600696016960269603696046960569606696076960869609696106961169612696136961469615696166961769618696196962069621696226962369624696256962669627696286962969630696316963269633696346963569636696376963869639696406964169642696436964469645696466964769648696496965069651696526965369654696556965669657696586965969660696616966269663696646966569666696676966869669696706967169672696736967469675696766967769678696796968069681696826968369684696856968669687696886968969690696916969269693696946969569696696976969869699697006970169702697036970469705697066970769708697096971069711697126971369714697156971669717697186971969720697216972269723697246972569726697276972869729697306973169732697336973469735697366973769738697396974069741697426974369744697456974669747697486974969750697516975269753697546975569756697576975869759697606976169762697636976469765697666976769768697696977069771697726977369774697756977669777697786977969780697816978269783697846978569786697876978869789697906979169792697936979469795697966979769798697996980069801698026980369804698056980669807698086980969810698116981269813698146981569816698176981869819698206982169822698236982469825698266982769828698296983069831698326983369834698356983669837698386983969840698416984269843698446984569846698476984869849698506985169852698536985469855698566985769858698596986069861698626986369864698656986669867698686986969870698716987269873698746987569876698776987869879698806988169882698836988469885698866988769888698896989069891698926989369894698956989669897698986989969900699016990269903699046990569906699076990869909699106991169912699136991469915699166991769918699196992069921699226992369924699256992669927699286992969930699316993269933699346993569936699376993869939699406994169942699436994469945699466994769948699496995069951699526995369954699556995669957699586995969960699616996269963699646996569966699676996869969699706997169972699736997469975699766997769978699796998069981699826998369984699856998669987699886998969990699916999269993699946999569996699976999869999700007000170002700037000470005700067000770008700097001070011700127001370014700157001670017700187001970020700217002270023700247002570026700277002870029700307003170032700337003470035700367003770038700397004070041700427004370044700457004670047700487004970050700517005270053700547005570056700577005870059700607006170062700637006470065700667006770068700697007070071700727007370074700757007670077700787007970080700817008270083700847008570086700877008870089700907009170092700937009470095700967009770098700997010070101701027010370104701057010670107701087010970110701117011270113701147011570116701177011870119701207012170122701237012470125701267012770128701297013070131701327013370134701357013670137701387013970140701417014270143701447014570146701477014870149701507015170152701537015470155701567015770158701597016070161701627016370164701657016670167701687016970170701717017270173701747017570176701777017870179701807018170182701837018470185701867018770188701897019070191701927019370194701957019670197701987019970200702017020270203702047020570206702077020870209702107021170212702137021470215702167021770218702197022070221702227022370224702257022670227702287022970230702317023270233702347023570236702377023870239702407024170242702437024470245702467024770248702497025070251702527025370254702557025670257702587025970260702617026270263702647026570266702677026870269702707027170272702737027470275702767027770278702797028070281702827028370284702857028670287702887028970290702917029270293702947029570296702977029870299703007030170302703037030470305703067030770308703097031070311703127031370314703157031670317703187031970320703217032270323703247032570326703277032870329703307033170332703337033470335703367033770338703397034070341703427034370344703457034670347703487034970350703517035270353703547035570356703577035870359703607036170362703637036470365703667036770368703697037070371703727037370374703757037670377703787037970380703817038270383703847038570386703877038870389703907039170392703937039470395703967039770398703997040070401704027040370404704057040670407704087040970410704117041270413704147041570416704177041870419704207042170422704237042470425704267042770428704297043070431704327043370434704357043670437704387043970440704417044270443704447044570446704477044870449704507045170452704537045470455704567045770458704597046070461704627046370464704657046670467704687046970470704717047270473704747047570476704777047870479704807048170482704837048470485704867048770488704897049070491704927049370494704957049670497704987049970500705017050270503705047050570506705077050870509705107051170512705137051470515705167051770518705197052070521705227052370524705257052670527705287052970530705317053270533705347053570536705377053870539705407054170542705437054470545705467054770548705497055070551705527055370554705557055670557705587055970560705617056270563705647056570566705677056870569705707057170572705737057470575705767057770578705797058070581705827058370584705857058670587705887058970590705917059270593705947059570596705977059870599706007060170602706037060470605706067060770608706097061070611706127061370614706157061670617706187061970620706217062270623706247062570626706277062870629706307063170632706337063470635706367063770638706397064070641706427064370644706457064670647706487064970650706517065270653706547065570656706577065870659706607066170662706637066470665706667066770668706697067070671706727067370674706757067670677706787067970680706817068270683706847068570686706877068870689706907069170692706937069470695706967069770698706997070070701707027070370704707057070670707707087070970710707117071270713707147071570716707177071870719707207072170722707237072470725707267072770728707297073070731707327073370734707357073670737707387073970740707417074270743707447074570746707477074870749707507075170752707537075470755707567075770758707597076070761707627076370764707657076670767707687076970770707717077270773707747077570776707777077870779707807078170782707837078470785707867078770788707897079070791707927079370794707957079670797707987079970800708017080270803708047080570806708077080870809708107081170812708137081470815708167081770818708197082070821708227082370824708257082670827708287082970830708317083270833708347083570836708377083870839708407084170842708437084470845708467084770848708497085070851708527085370854708557085670857708587085970860708617086270863708647086570866708677086870869708707087170872708737087470875708767087770878708797088070881708827088370884708857088670887708887088970890708917089270893708947089570896708977089870899709007090170902709037090470905709067090770908709097091070911709127091370914709157091670917709187091970920709217092270923709247092570926709277092870929709307093170932709337093470935709367093770938709397094070941709427094370944709457094670947709487094970950709517095270953709547095570956709577095870959709607096170962709637096470965709667096770968709697097070971709727097370974709757097670977709787097970980709817098270983709847098570986709877098870989709907099170992709937099470995709967099770998709997100071001710027100371004710057100671007710087100971010710117101271013710147101571016710177101871019710207102171022710237102471025710267102771028710297103071031710327103371034710357103671037710387103971040710417104271043710447104571046710477104871049710507105171052710537105471055710567105771058710597106071061710627106371064710657106671067710687106971070710717107271073710747107571076710777107871079710807108171082710837108471085710867108771088710897109071091710927109371094710957109671097710987109971100711017110271103711047110571106711077110871109711107111171112711137111471115711167111771118711197112071121711227112371124711257112671127711287112971130711317113271133711347113571136711377113871139711407114171142711437114471145711467114771148711497115071151711527115371154711557115671157711587115971160711617116271163711647116571166711677116871169711707117171172711737117471175711767117771178711797118071181711827118371184711857118671187711887118971190711917119271193711947119571196711977119871199712007120171202712037120471205712067120771208712097121071211712127121371214712157121671217712187121971220712217122271223712247122571226712277122871229712307123171232712337123471235712367123771238712397124071241712427124371244712457124671247712487124971250712517125271253712547125571256712577125871259712607126171262712637126471265712667126771268712697127071271712727127371274712757127671277712787127971280712817128271283712847128571286712877128871289712907129171292712937129471295712967129771298712997130071301713027130371304713057130671307713087130971310713117131271313713147131571316713177131871319713207132171322713237132471325713267132771328713297133071331713327133371334713357133671337713387133971340713417134271343713447134571346713477134871349713507135171352713537135471355713567135771358713597136071361713627136371364713657136671367713687136971370713717137271373713747137571376713777137871379713807138171382713837138471385713867138771388713897139071391713927139371394713957139671397713987139971400714017140271403714047140571406714077140871409714107141171412714137141471415714167141771418714197142071421714227142371424714257142671427714287142971430714317143271433714347143571436714377143871439714407144171442714437144471445714467144771448714497145071451714527145371454714557145671457714587145971460714617146271463714647146571466714677146871469714707147171472714737147471475714767147771478714797148071481714827148371484714857148671487714887148971490714917149271493714947149571496714977149871499715007150171502715037150471505715067150771508715097151071511715127151371514715157151671517715187151971520715217152271523715247152571526715277152871529715307153171532715337153471535715367153771538715397154071541715427154371544715457154671547715487154971550715517155271553715547155571556715577155871559715607156171562715637156471565715667156771568715697157071571715727157371574715757157671577715787157971580715817158271583715847158571586715877158871589715907159171592715937159471595715967159771598715997160071601716027160371604716057160671607716087160971610716117161271613716147161571616716177161871619716207162171622716237162471625716267162771628716297163071631716327163371634716357163671637716387163971640716417164271643716447164571646716477164871649716507165171652716537165471655716567165771658716597166071661716627166371664716657166671667716687166971670716717167271673716747167571676716777167871679716807168171682716837168471685716867168771688716897169071691716927169371694716957169671697716987169971700717017170271703717047170571706717077170871709717107171171712717137171471715717167171771718717197172071721717227172371724717257172671727717287172971730717317173271733717347173571736717377173871739717407174171742717437174471745717467174771748717497175071751717527175371754717557175671757717587175971760717617176271763717647176571766717677176871769717707177171772717737177471775717767177771778717797178071781717827178371784717857178671787717887178971790717917179271793717947179571796717977179871799718007180171802718037180471805718067180771808718097181071811718127181371814718157181671817718187181971820718217182271823718247182571826718277182871829718307183171832718337183471835718367183771838718397184071841718427184371844718457184671847718487184971850718517185271853718547185571856718577185871859718607186171862718637186471865718667186771868718697187071871718727187371874718757187671877718787187971880718817188271883718847188571886718877188871889718907189171892718937189471895718967189771898718997190071901719027190371904719057190671907719087190971910719117191271913719147191571916719177191871919719207192171922719237192471925719267192771928719297193071931719327193371934719357193671937719387193971940719417194271943719447194571946719477194871949719507195171952719537195471955719567195771958719597196071961719627196371964719657196671967719687196971970719717197271973719747197571976719777197871979719807198171982719837198471985719867198771988719897199071991719927199371994719957199671997719987199972000720017200272003720047200572006720077200872009720107201172012720137201472015720167201772018720197202072021720227202372024720257202672027720287202972030720317203272033720347203572036720377203872039720407204172042720437204472045720467204772048720497205072051720527205372054720557205672057720587205972060720617206272063720647206572066720677206872069720707207172072720737207472075720767207772078720797208072081720827208372084720857208672087720887208972090720917209272093720947209572096720977209872099721007210172102721037210472105721067210772108721097211072111721127211372114721157211672117721187211972120721217212272123721247212572126721277212872129721307213172132721337213472135721367213772138721397214072141721427214372144721457214672147721487214972150721517215272153721547215572156721577215872159721607216172162721637216472165721667216772168721697217072171721727217372174721757217672177721787217972180721817218272183721847218572186721877218872189721907219172192721937219472195721967219772198721997220072201722027220372204722057220672207722087220972210722117221272213722147221572216722177221872219722207222172222722237222472225722267222772228722297223072231722327223372234722357223672237722387223972240722417224272243722447224572246722477224872249722507225172252722537225472255722567225772258722597226072261722627226372264722657226672267722687226972270722717227272273722747227572276722777227872279722807228172282722837228472285722867228772288722897229072291722927229372294722957229672297722987229972300723017230272303723047230572306723077230872309723107231172312723137231472315723167231772318723197232072321723227232372324723257232672327723287232972330723317233272333723347233572336723377233872339723407234172342723437234472345723467234772348723497235072351723527235372354723557235672357723587235972360723617236272363723647236572366723677236872369723707237172372723737237472375723767237772378723797238072381723827238372384723857238672387723887238972390723917239272393723947239572396723977239872399724007240172402724037240472405724067240772408724097241072411724127241372414724157241672417724187241972420724217242272423724247242572426724277242872429724307243172432724337243472435724367243772438724397244072441724427244372444724457244672447724487244972450724517245272453724547245572456724577245872459724607246172462724637246472465724667246772468724697247072471724727247372474724757247672477724787247972480724817248272483724847248572486724877248872489724907249172492724937249472495724967249772498724997250072501725027250372504725057250672507725087250972510725117251272513725147251572516725177251872519725207252172522725237252472525725267252772528725297253072531725327253372534725357253672537725387253972540725417254272543725447254572546725477254872549725507255172552725537255472555725567255772558725597256072561725627256372564725657256672567725687256972570725717257272573725747257572576725777257872579725807258172582725837258472585725867258772588725897259072591725927259372594725957259672597725987259972600726017260272603726047260572606726077260872609726107261172612726137261472615726167261772618726197262072621726227262372624726257262672627726287262972630726317263272633726347263572636726377263872639726407264172642726437264472645726467264772648726497265072651726527265372654726557265672657726587265972660726617266272663726647266572666726677266872669726707267172672726737267472675726767267772678726797268072681726827268372684726857268672687726887268972690726917269272693726947269572696726977269872699727007270172702727037270472705727067270772708727097271072711727127271372714727157271672717727187271972720727217272272723727247272572726727277272872729727307273172732727337273472735727367273772738727397274072741727427274372744727457274672747727487274972750727517275272753727547275572756727577275872759727607276172762727637276472765727667276772768727697277072771727727277372774727757277672777727787277972780727817278272783727847278572786727877278872789727907279172792727937279472795727967279772798727997280072801728027280372804728057280672807728087280972810728117281272813728147281572816728177281872819728207282172822728237282472825728267282772828728297283072831728327283372834728357283672837728387283972840728417284272843728447284572846728477284872849728507285172852728537285472855728567285772858728597286072861728627286372864728657286672867728687286972870728717287272873728747287572876728777287872879728807288172882728837288472885728867288772888728897289072891728927289372894728957289672897728987289972900729017290272903729047290572906729077290872909729107291172912729137291472915729167291772918729197292072921729227292372924729257292672927729287292972930729317293272933729347293572936729377293872939729407294172942729437294472945729467294772948729497295072951729527295372954729557295672957729587295972960729617296272963729647296572966729677296872969729707297172972729737297472975729767297772978729797298072981729827298372984729857298672987729887298972990729917299272993729947299572996729977299872999730007300173002730037300473005730067300773008730097301073011730127301373014730157301673017730187301973020730217302273023730247302573026730277302873029730307303173032730337303473035730367303773038730397304073041730427304373044730457304673047730487304973050730517305273053730547305573056730577305873059730607306173062730637306473065730667306773068730697307073071730727307373074730757307673077730787307973080730817308273083730847308573086730877308873089730907309173092730937309473095730967309773098730997310073101731027310373104731057310673107731087310973110731117311273113731147311573116731177311873119731207312173122731237312473125731267312773128731297313073131731327313373134731357313673137731387313973140731417314273143731447314573146731477314873149731507315173152731537315473155731567315773158731597316073161731627316373164731657316673167731687316973170731717317273173731747317573176731777317873179731807318173182731837318473185731867318773188731897319073191731927319373194731957319673197731987319973200732017320273203732047320573206732077320873209732107321173212732137321473215732167321773218732197322073221732227322373224732257322673227732287322973230732317323273233732347323573236732377323873239732407324173242732437324473245732467324773248732497325073251732527325373254732557325673257732587325973260732617326273263732647326573266732677326873269732707327173272732737327473275732767327773278732797328073281732827328373284732857328673287732887328973290732917329273293732947329573296732977329873299733007330173302733037330473305733067330773308733097331073311733127331373314733157331673317733187331973320733217332273323733247332573326733277332873329733307333173332733337333473335733367333773338733397334073341733427334373344733457334673347733487334973350733517335273353733547335573356733577335873359733607336173362733637336473365733667336773368733697337073371733727337373374733757337673377733787337973380733817338273383733847338573386733877338873389733907339173392733937339473395733967339773398733997340073401734027340373404734057340673407734087340973410734117341273413734147341573416734177341873419734207342173422734237342473425734267342773428734297343073431734327343373434734357343673437734387343973440734417344273443734447344573446734477344873449734507345173452734537345473455734567345773458734597346073461734627346373464734657346673467734687346973470734717347273473734747347573476734777347873479734807348173482734837348473485734867348773488734897349073491734927349373494734957349673497734987349973500735017350273503735047350573506735077350873509735107351173512735137351473515735167351773518735197352073521735227352373524735257352673527735287352973530735317353273533735347353573536735377353873539735407354173542735437354473545735467354773548735497355073551735527355373554735557355673557735587355973560735617356273563735647356573566735677356873569735707357173572735737357473575735767357773578735797358073581735827358373584735857358673587735887358973590735917359273593735947359573596735977359873599736007360173602736037360473605736067360773608736097361073611736127361373614736157361673617736187361973620736217362273623736247362573626736277362873629736307363173632736337363473635736367363773638736397364073641736427364373644736457364673647736487364973650736517365273653736547365573656736577365873659736607366173662736637366473665736667366773668736697367073671736727367373674736757367673677736787367973680736817368273683736847368573686736877368873689736907369173692736937369473695736967369773698736997370073701737027370373704737057370673707737087370973710737117371273713737147371573716737177371873719737207372173722737237372473725737267372773728737297373073731737327373373734737357373673737737387373973740737417374273743737447374573746737477374873749737507375173752737537375473755737567375773758737597376073761737627376373764737657376673767737687376973770737717377273773737747377573776737777377873779737807378173782737837378473785737867378773788737897379073791737927379373794737957379673797737987379973800738017380273803738047380573806738077380873809738107381173812738137381473815738167381773818738197382073821738227382373824738257382673827738287382973830738317383273833738347383573836738377383873839738407384173842738437384473845738467384773848738497385073851738527385373854738557385673857738587385973860738617386273863738647386573866738677386873869738707387173872738737387473875738767387773878738797388073881738827388373884738857388673887738887388973890738917389273893738947389573896738977389873899739007390173902739037390473905739067390773908739097391073911739127391373914739157391673917739187391973920739217392273923739247392573926739277392873929739307393173932739337393473935739367393773938739397394073941739427394373944739457394673947739487394973950739517395273953739547395573956739577395873959739607396173962739637396473965739667396773968739697397073971739727397373974739757397673977739787397973980739817398273983739847398573986739877398873989739907399173992739937399473995739967399773998739997400074001740027400374004740057400674007740087400974010740117401274013740147401574016740177401874019740207402174022740237402474025740267402774028740297403074031740327403374034740357403674037740387403974040740417404274043740447404574046740477404874049740507405174052740537405474055740567405774058740597406074061740627406374064740657406674067740687406974070740717407274073740747407574076740777407874079740807408174082740837408474085740867408774088740897409074091740927409374094740957409674097740987409974100741017410274103741047410574106741077410874109741107411174112741137411474115741167411774118741197412074121741227412374124741257412674127741287412974130741317413274133741347413574136741377413874139741407414174142741437414474145741467414774148741497415074151741527415374154741557415674157741587415974160741617416274163741647416574166741677416874169741707417174172741737417474175741767417774178741797418074181741827418374184741857418674187741887418974190741917419274193741947419574196741977419874199742007420174202742037420474205742067420774208742097421074211742127421374214742157421674217742187421974220742217422274223742247422574226742277422874229742307423174232742337423474235742367423774238742397424074241742427424374244742457424674247742487424974250742517425274253742547425574256742577425874259742607426174262742637426474265742667426774268742697427074271742727427374274742757427674277742787427974280742817428274283742847428574286742877428874289742907429174292742937429474295742967429774298742997430074301743027430374304743057430674307743087430974310743117431274313743147431574316743177431874319743207432174322743237432474325743267432774328743297433074331743327433374334743357433674337743387433974340743417434274343743447434574346743477434874349743507435174352743537435474355743567435774358743597436074361743627436374364743657436674367743687436974370743717437274373743747437574376743777437874379743807438174382743837438474385743867438774388743897439074391743927439374394743957439674397743987439974400744017440274403744047440574406744077440874409744107441174412744137441474415744167441774418744197442074421744227442374424744257442674427744287442974430744317443274433744347443574436744377443874439744407444174442744437444474445744467444774448744497445074451744527445374454744557445674457744587445974460744617446274463744647446574466744677446874469744707447174472744737447474475744767447774478744797448074481744827448374484744857448674487744887448974490744917449274493744947449574496744977449874499745007450174502745037450474505745067450774508745097451074511745127451374514745157451674517745187451974520745217452274523745247452574526745277452874529745307453174532745337453474535745367453774538745397454074541745427454374544745457454674547745487454974550745517455274553745547455574556745577455874559745607456174562745637456474565745667456774568745697457074571745727457374574745757457674577745787457974580745817458274583745847458574586745877458874589745907459174592745937459474595745967459774598745997460074601746027460374604746057460674607746087460974610746117461274613746147461574616746177461874619746207462174622746237462474625746267462774628746297463074631746327463374634746357463674637746387463974640746417464274643746447464574646746477464874649746507465174652746537465474655746567465774658746597466074661746627466374664746657466674667746687466974670746717467274673746747467574676746777467874679746807468174682746837468474685746867468774688746897469074691746927469374694746957469674697746987469974700747017470274703747047470574706747077470874709747107471174712747137471474715747167471774718747197472074721747227472374724747257472674727747287472974730747317473274733747347473574736747377473874739747407474174742747437474474745747467474774748747497475074751747527475374754747557475674757747587475974760747617476274763747647476574766747677476874769747707477174772747737477474775747767477774778747797478074781747827478374784747857478674787747887478974790747917479274793747947479574796747977479874799748007480174802748037480474805748067480774808748097481074811748127481374814748157481674817748187481974820748217482274823748247482574826748277482874829748307483174832748337483474835748367483774838748397484074841748427484374844748457484674847748487484974850748517485274853748547485574856748577485874859748607486174862748637486474865748667486774868748697487074871748727487374874748757487674877748787487974880748817488274883748847488574886748877488874889748907489174892748937489474895748967489774898748997490074901749027490374904749057490674907749087490974910749117491274913749147491574916749177491874919749207492174922749237492474925749267492774928749297493074931749327493374934749357493674937749387493974940749417494274943749447494574946749477494874949749507495174952749537495474955749567495774958749597496074961749627496374964749657496674967749687496974970749717497274973749747497574976749777497874979749807498174982749837498474985749867498774988749897499074991749927499374994749957499674997749987499975000750017500275003750047500575006750077500875009750107501175012750137501475015750167501775018750197502075021750227502375024750257502675027750287502975030750317503275033750347503575036750377503875039750407504175042750437504475045750467504775048750497505075051750527505375054750557505675057750587505975060750617506275063750647506575066750677506875069750707507175072750737507475075750767507775078750797508075081750827508375084750857508675087750887508975090750917509275093750947509575096750977509875099751007510175102751037510475105751067510775108751097511075111751127511375114751157511675117751187511975120751217512275123751247512575126751277512875129751307513175132751337513475135751367513775138751397514075141751427514375144751457514675147751487514975150751517515275153751547515575156751577515875159751607516175162751637516475165751667516775168751697517075171751727517375174751757517675177751787517975180751817518275183751847518575186751877518875189751907519175192751937519475195751967519775198751997520075201752027520375204752057520675207752087520975210752117521275213752147521575216752177521875219752207522175222752237522475225752267522775228752297523075231752327523375234752357523675237752387523975240752417524275243752447524575246752477524875249752507525175252752537525475255752567525775258752597526075261752627526375264752657526675267752687526975270752717527275273752747527575276752777527875279752807528175282752837528475285752867528775288752897529075291752927529375294752957529675297752987529975300753017530275303753047530575306753077530875309753107531175312753137531475315753167531775318753197532075321753227532375324753257532675327753287532975330753317533275333753347533575336753377533875339753407534175342753437534475345753467534775348753497535075351753527535375354753557535675357753587535975360753617536275363753647536575366753677536875369753707537175372753737537475375753767537775378753797538075381753827538375384753857538675387753887538975390753917539275393753947539575396753977539875399754007540175402754037540475405754067540775408754097541075411754127541375414754157541675417754187541975420754217542275423754247542575426754277542875429754307543175432754337543475435754367543775438754397544075441754427544375444754457544675447754487544975450754517545275453754547545575456754577545875459754607546175462754637546475465754667546775468754697547075471754727547375474754757547675477754787547975480754817548275483754847548575486754877548875489754907549175492754937549475495754967549775498754997550075501755027550375504755057550675507755087550975510755117551275513755147551575516755177551875519755207552175522755237552475525755267552775528755297553075531755327553375534755357553675537755387553975540755417554275543755447554575546755477554875549755507555175552755537555475555755567555775558755597556075561755627556375564755657556675567755687556975570755717557275573755747557575576755777557875579755807558175582755837558475585755867558775588755897559075591755927559375594755957559675597755987559975600756017560275603756047560575606756077560875609756107561175612756137561475615756167561775618756197562075621756227562375624756257562675627756287562975630756317563275633756347563575636756377563875639756407564175642756437564475645756467564775648756497565075651756527565375654756557565675657756587565975660756617566275663756647566575666756677566875669756707567175672756737567475675756767567775678756797568075681756827568375684756857568675687756887568975690756917569275693756947569575696756977569875699757007570175702757037570475705757067570775708757097571075711757127571375714757157571675717757187571975720757217572275723757247572575726757277572875729757307573175732757337573475735757367573775738757397574075741757427574375744757457574675747757487574975750757517575275753757547575575756757577575875759757607576175762757637576475765757667576775768757697577075771757727577375774757757577675777757787577975780757817578275783757847578575786757877578875789757907579175792757937579475795757967579775798757997580075801758027580375804758057580675807758087580975810758117581275813758147581575816758177581875819758207582175822758237582475825758267582775828758297583075831758327583375834758357583675837758387583975840758417584275843758447584575846758477584875849758507585175852758537585475855758567585775858758597586075861758627586375864758657586675867758687586975870758717587275873758747587575876758777587875879758807588175882758837588475885758867588775888758897589075891758927589375894758957589675897758987589975900759017590275903759047590575906759077590875909759107591175912759137591475915759167591775918759197592075921759227592375924759257592675927759287592975930759317593275933759347593575936759377593875939759407594175942759437594475945759467594775948759497595075951759527595375954759557595675957759587595975960759617596275963759647596575966759677596875969759707597175972759737597475975759767597775978759797598075981759827598375984759857598675987759887598975990759917599275993759947599575996759977599875999760007600176002760037600476005760067600776008760097601076011760127601376014760157601676017760187601976020760217602276023760247602576026760277602876029760307603176032760337603476035760367603776038760397604076041760427604376044760457604676047760487604976050760517605276053760547605576056760577605876059760607606176062760637606476065760667606776068760697607076071760727607376074760757607676077760787607976080760817608276083760847608576086760877608876089760907609176092760937609476095760967609776098760997610076101761027610376104761057610676107761087610976110761117611276113761147611576116761177611876119761207612176122761237612476125761267612776128761297613076131761327613376134761357613676137761387613976140761417614276143761447614576146761477614876149761507615176152761537615476155761567615776158761597616076161761627616376164761657616676167761687616976170761717617276173761747617576176761777617876179761807618176182761837618476185761867618776188761897619076191761927619376194761957619676197761987619976200762017620276203762047620576206762077620876209762107621176212762137621476215762167621776218762197622076221762227622376224762257622676227762287622976230762317623276233762347623576236762377623876239762407624176242762437624476245762467624776248762497625076251762527625376254762557625676257762587625976260762617626276263762647626576266762677626876269762707627176272762737627476275762767627776278762797628076281762827628376284762857628676287762887628976290762917629276293762947629576296762977629876299763007630176302763037630476305763067630776308763097631076311763127631376314763157631676317763187631976320763217632276323763247632576326763277632876329763307633176332763337633476335763367633776338763397634076341763427634376344763457634676347763487634976350763517635276353763547635576356763577635876359763607636176362763637636476365763667636776368763697637076371763727637376374763757637676377763787637976380763817638276383763847638576386763877638876389763907639176392763937639476395763967639776398763997640076401764027640376404764057640676407764087640976410764117641276413764147641576416764177641876419764207642176422764237642476425764267642776428764297643076431764327643376434764357643676437764387643976440764417644276443764447644576446764477644876449764507645176452764537645476455764567645776458764597646076461764627646376464764657646676467764687646976470764717647276473764747647576476764777647876479764807648176482764837648476485764867648776488764897649076491764927649376494764957649676497764987649976500765017650276503765047650576506765077650876509765107651176512765137651476515765167651776518765197652076521765227652376524765257652676527765287652976530765317653276533765347653576536765377653876539765407654176542765437654476545765467654776548765497655076551765527655376554765557655676557765587655976560765617656276563765647656576566765677656876569765707657176572765737657476575765767657776578765797658076581765827658376584765857658676587765887658976590765917659276593765947659576596765977659876599766007660176602766037660476605766067660776608766097661076611766127661376614766157661676617766187661976620766217662276623766247662576626766277662876629766307663176632766337663476635766367663776638766397664076641766427664376644766457664676647766487664976650766517665276653766547665576656766577665876659766607666176662766637666476665766667666776668766697667076671766727667376674766757667676677766787667976680766817668276683766847668576686766877668876689766907669176692766937669476695766967669776698766997670076701767027670376704767057670676707767087670976710767117671276713767147671576716767177671876719767207672176722767237672476725767267672776728767297673076731767327673376734767357673676737767387673976740767417674276743767447674576746767477674876749767507675176752767537675476755767567675776758767597676076761767627676376764767657676676767767687676976770767717677276773767747677576776767777677876779767807678176782767837678476785767867678776788767897679076791767927679376794767957679676797767987679976800768017680276803768047680576806768077680876809768107681176812768137681476815768167681776818768197682076821768227682376824768257682676827768287682976830768317683276833768347683576836768377683876839768407684176842768437684476845768467684776848768497685076851768527685376854768557685676857768587685976860768617686276863768647686576866768677686876869768707687176872768737687476875768767687776878768797688076881768827688376884768857688676887768887688976890768917689276893768947689576896768977689876899769007690176902769037690476905769067690776908769097691076911769127691376914769157691676917769187691976920769217692276923769247692576926769277692876929769307693176932769337693476935769367693776938769397694076941769427694376944769457694676947769487694976950769517695276953769547695576956769577695876959769607696176962769637696476965769667696776968769697697076971769727697376974769757697676977769787697976980769817698276983769847698576986769877698876989769907699176992769937699476995769967699776998769997700077001770027700377004770057700677007770087700977010770117701277013770147701577016770177701877019770207702177022770237702477025770267702777028770297703077031770327703377034770357703677037770387703977040770417704277043770447704577046770477704877049770507705177052770537705477055770567705777058770597706077061770627706377064770657706677067770687706977070770717707277073770747707577076770777707877079770807708177082770837708477085770867708777088770897709077091770927709377094770957709677097770987709977100771017710277103771047710577106771077710877109771107711177112771137711477115771167711777118771197712077121771227712377124771257712677127771287712977130771317713277133771347713577136771377713877139771407714177142771437714477145771467714777148771497715077151771527715377154771557715677157771587715977160771617716277163771647716577166771677716877169771707717177172771737717477175771767717777178771797718077181771827718377184771857718677187771887718977190771917719277193771947719577196771977719877199772007720177202772037720477205772067720777208772097721077211772127721377214772157721677217772187721977220772217722277223772247722577226772277722877229772307723177232772337723477235772367723777238772397724077241772427724377244772457724677247772487724977250772517725277253772547725577256772577725877259772607726177262772637726477265772667726777268772697727077271772727727377274772757727677277772787727977280772817728277283772847728577286772877728877289772907729177292772937729477295772967729777298772997730077301773027730377304773057730677307773087730977310773117731277313773147731577316773177731877319773207732177322773237732477325773267732777328773297733077331773327733377334773357733677337773387733977340773417734277343773447734577346773477734877349773507735177352773537735477355773567735777358773597736077361773627736377364773657736677367773687736977370773717737277373773747737577376773777737877379773807738177382773837738477385773867738777388773897739077391773927739377394773957739677397773987739977400774017740277403774047740577406774077740877409774107741177412774137741477415774167741777418774197742077421774227742377424774257742677427774287742977430774317743277433774347743577436774377743877439774407744177442774437744477445774467744777448774497745077451774527745377454774557745677457774587745977460774617746277463774647746577466774677746877469774707747177472774737747477475774767747777478774797748077481774827748377484774857748677487774887748977490774917749277493774947749577496774977749877499775007750177502775037750477505775067750777508775097751077511775127751377514775157751677517775187751977520775217752277523775247752577526775277752877529775307753177532775337753477535775367753777538775397754077541775427754377544775457754677547775487754977550775517755277553775547755577556775577755877559775607756177562775637756477565775667756777568775697757077571775727757377574775757757677577775787757977580775817758277583775847758577586775877758877589775907759177592775937759477595775967759777598775997760077601776027760377604776057760677607776087760977610776117761277613776147761577616776177761877619776207762177622776237762477625776267762777628776297763077631776327763377634776357763677637776387763977640776417764277643776447764577646776477764877649776507765177652776537765477655776567765777658776597766077661776627766377664776657766677667776687766977670776717767277673776747767577676776777767877679776807768177682776837768477685776867768777688776897769077691776927769377694776957769677697776987769977700777017770277703777047770577706777077770877709777107771177712777137771477715777167771777718777197772077721777227772377724777257772677727777287772977730777317773277733777347773577736777377773877739777407774177742777437774477745777467774777748777497775077751777527775377754777557775677757777587775977760777617776277763777647776577766777677776877769777707777177772777737777477775777767777777778777797778077781777827778377784777857778677787777887778977790777917779277793777947779577796777977779877799778007780177802778037780477805778067780777808778097781077811778127781377814778157781677817778187781977820778217782277823778247782577826778277782877829778307783177832778337783477835778367783777838778397784077841778427784377844778457784677847778487784977850778517785277853778547785577856778577785877859778607786177862778637786477865778667786777868778697787077871778727787377874778757787677877778787787977880778817788277883778847788577886778877788877889778907789177892778937789477895778967789777898778997790077901779027790377904779057790677907779087790977910779117791277913779147791577916779177791877919779207792177922779237792477925779267792777928779297793077931779327793377934779357793677937779387793977940779417794277943779447794577946779477794877949779507795177952779537795477955779567795777958779597796077961779627796377964779657796677967779687796977970779717797277973779747797577976779777797877979779807798177982779837798477985779867798777988779897799077991779927799377994779957799677997779987799978000780017800278003780047800578006780077800878009780107801178012780137801478015780167801778018780197802078021780227802378024780257802678027780287802978030780317803278033780347803578036780377803878039780407804178042780437804478045780467804778048780497805078051780527805378054780557805678057780587805978060780617806278063780647806578066780677806878069780707807178072780737807478075780767807778078780797808078081780827808378084780857808678087780887808978090780917809278093780947809578096780977809878099781007810178102781037810478105781067810778108781097811078111781127811378114781157811678117781187811978120781217812278123781247812578126781277812878129781307813178132781337813478135781367813778138781397814078141781427814378144781457814678147781487814978150781517815278153781547815578156781577815878159781607816178162781637816478165781667816778168781697817078171781727817378174781757817678177781787817978180781817818278183781847818578186781877818878189781907819178192781937819478195781967819778198781997820078201782027820378204782057820678207782087820978210782117821278213782147821578216782177821878219782207822178222782237822478225782267822778228782297823078231782327823378234782357823678237782387823978240782417824278243782447824578246782477824878249782507825178252782537825478255782567825778258782597826078261782627826378264782657826678267782687826978270782717827278273782747827578276782777827878279782807828178282782837828478285782867828778288782897829078291782927829378294782957829678297782987829978300783017830278303783047830578306783077830878309783107831178312783137831478315783167831778318783197832078321783227832378324783257832678327783287832978330783317833278333783347833578336783377833878339783407834178342783437834478345783467834778348783497835078351783527835378354783557835678357783587835978360783617836278363783647836578366783677836878369783707837178372783737837478375783767837778378783797838078381783827838378384783857838678387783887838978390783917839278393783947839578396783977839878399784007840178402784037840478405784067840778408784097841078411784127841378414784157841678417784187841978420784217842278423784247842578426784277842878429784307843178432784337843478435784367843778438784397844078441784427844378444784457844678447784487844978450784517845278453784547845578456784577845878459784607846178462784637846478465784667846778468784697847078471784727847378474784757847678477784787847978480784817848278483784847848578486784877848878489784907849178492784937849478495784967849778498784997850078501785027850378504785057850678507785087850978510785117851278513785147851578516785177851878519785207852178522785237852478525785267852778528785297853078531785327853378534785357853678537785387853978540785417854278543785447854578546785477854878549785507855178552785537855478555785567855778558785597856078561785627856378564785657856678567785687856978570785717857278573785747857578576785777857878579785807858178582785837858478585785867858778588785897859078591785927859378594785957859678597785987859978600786017860278603786047860578606786077860878609786107861178612786137861478615786167861778618786197862078621786227862378624786257862678627786287862978630786317863278633786347863578636786377863878639786407864178642786437864478645786467864778648786497865078651786527865378654786557865678657786587865978660786617866278663786647866578666786677866878669786707867178672786737867478675786767867778678786797868078681786827868378684786857868678687786887868978690786917869278693786947869578696786977869878699787007870178702787037870478705787067870778708787097871078711787127871378714787157871678717787187871978720787217872278723787247872578726787277872878729787307873178732787337873478735787367873778738787397874078741787427874378744787457874678747787487874978750787517875278753787547875578756787577875878759787607876178762787637876478765787667876778768787697877078771787727877378774787757877678777787787877978780787817878278783787847878578786787877878878789787907879178792787937879478795787967879778798787997880078801788027880378804788057880678807788087880978810788117881278813788147881578816788177881878819788207882178822788237882478825788267882778828788297883078831788327883378834788357883678837788387883978840788417884278843788447884578846788477884878849788507885178852788537885478855788567885778858788597886078861788627886378864788657886678867788687886978870788717887278873788747887578876788777887878879788807888178882788837888478885788867888778888788897889078891788927889378894788957889678897788987889978900789017890278903789047890578906789077890878909789107891178912789137891478915789167891778918789197892078921789227892378924789257892678927789287892978930789317893278933789347893578936789377893878939789407894178942789437894478945789467894778948789497895078951789527895378954789557895678957789587895978960789617896278963789647896578966789677896878969789707897178972789737897478975789767897778978789797898078981789827898378984789857898678987789887898978990789917899278993789947899578996789977899878999790007900179002790037900479005790067900779008790097901079011790127901379014790157901679017790187901979020790217902279023790247902579026790277902879029790307903179032790337903479035790367903779038790397904079041790427904379044790457904679047790487904979050790517905279053790547905579056790577905879059790607906179062790637906479065790667906779068790697907079071790727907379074790757907679077790787907979080790817908279083790847908579086790877908879089790907909179092790937909479095790967909779098790997910079101791027910379104791057910679107791087910979110791117911279113791147911579116791177911879119791207912179122791237912479125791267912779128791297913079131791327913379134791357913679137791387913979140791417914279143791447914579146791477914879149791507915179152791537915479155791567915779158791597916079161791627916379164791657916679167791687916979170791717917279173791747917579176791777917879179791807918179182791837918479185791867918779188791897919079191791927919379194791957919679197791987919979200792017920279203792047920579206792077920879209792107921179212792137921479215792167921779218792197922079221792227922379224792257922679227792287922979230792317923279233792347923579236792377923879239792407924179242792437924479245792467924779248792497925079251792527925379254792557925679257792587925979260792617926279263792647926579266792677926879269792707927179272792737927479275792767927779278792797928079281792827928379284792857928679287792887928979290792917929279293792947929579296792977929879299793007930179302793037930479305793067930779308793097931079311793127931379314793157931679317793187931979320793217932279323793247932579326793277932879329793307933179332793337933479335793367933779338793397934079341793427934379344793457934679347793487934979350793517935279353793547935579356793577935879359793607936179362793637936479365793667936779368793697937079371793727937379374793757937679377793787937979380793817938279383793847938579386793877938879389793907939179392793937939479395793967939779398793997940079401794027940379404794057940679407794087940979410794117941279413794147941579416794177941879419794207942179422794237942479425794267942779428794297943079431794327943379434794357943679437794387943979440794417944279443794447944579446794477944879449794507945179452794537945479455794567945779458794597946079461794627946379464794657946679467794687946979470794717947279473794747947579476794777947879479794807948179482794837948479485794867948779488794897949079491794927949379494794957949679497794987949979500795017950279503795047950579506795077950879509795107951179512795137951479515795167951779518795197952079521795227952379524795257952679527795287952979530795317953279533795347953579536795377953879539795407954179542795437954479545795467954779548795497955079551795527955379554795557955679557795587955979560795617956279563795647956579566795677956879569795707957179572795737957479575795767957779578795797958079581795827958379584795857958679587795887958979590795917959279593795947959579596795977959879599796007960179602796037960479605796067960779608796097961079611796127961379614796157961679617796187961979620796217962279623796247962579626796277962879629796307963179632796337963479635796367963779638796397964079641796427964379644796457964679647796487964979650796517965279653796547965579656796577965879659796607966179662796637966479665796667966779668796697967079671796727967379674796757967679677796787967979680796817968279683796847968579686796877968879689796907969179692796937969479695796967969779698796997970079701797027970379704797057970679707797087970979710797117971279713797147971579716797177971879719797207972179722797237972479725797267972779728797297973079731797327973379734797357973679737797387973979740797417974279743797447974579746797477974879749797507975179752797537975479755797567975779758797597976079761797627976379764797657976679767797687976979770797717977279773797747977579776797777977879779797807978179782797837978479785797867978779788797897979079791797927979379794797957979679797797987979979800798017980279803798047980579806798077980879809798107981179812798137981479815798167981779818798197982079821798227982379824798257982679827798287982979830798317983279833798347983579836798377983879839798407984179842798437984479845798467984779848798497985079851798527985379854798557985679857798587985979860798617986279863798647986579866798677986879869798707987179872798737987479875798767987779878798797988079881798827988379884798857988679887798887988979890798917989279893798947989579896798977989879899799007990179902799037990479905799067990779908799097991079911799127991379914799157991679917799187991979920799217992279923799247992579926799277992879929799307993179932799337993479935799367993779938799397994079941799427994379944799457994679947799487994979950799517995279953799547995579956799577995879959799607996179962799637996479965799667996779968799697997079971799727997379974799757997679977799787997979980799817998279983799847998579986799877998879989799907999179992799937999479995799967999779998799998000080001800028000380004800058000680007800088000980010800118001280013800148001580016800178001880019800208002180022800238002480025800268002780028800298003080031800328003380034800358003680037800388003980040800418004280043800448004580046800478004880049800508005180052800538005480055800568005780058800598006080061800628006380064800658006680067800688006980070800718007280073800748007580076800778007880079800808008180082800838008480085800868008780088800898009080091800928009380094800958009680097800988009980100801018010280103801048010580106801078010880109801108011180112801138011480115801168011780118801198012080121801228012380124801258012680127801288012980130801318013280133801348013580136801378013880139801408014180142801438014480145801468014780148801498015080151801528015380154801558015680157801588015980160801618016280163801648016580166801678016880169801708017180172801738017480175801768017780178801798018080181801828018380184801858018680187801888018980190801918019280193801948019580196801978019880199802008020180202802038020480205802068020780208802098021080211802128021380214802158021680217802188021980220802218022280223802248022580226802278022880229802308023180232802338023480235802368023780238802398024080241802428024380244802458024680247802488024980250802518025280253802548025580256802578025880259802608026180262802638026480265802668026780268802698027080271802728027380274802758027680277802788027980280802818028280283802848028580286802878028880289802908029180292802938029480295802968029780298802998030080301803028030380304803058030680307803088030980310803118031280313803148031580316803178031880319803208032180322803238032480325803268032780328803298033080331803328033380334803358033680337803388033980340803418034280343803448034580346803478034880349803508035180352803538035480355803568035780358803598036080361803628036380364803658036680367803688036980370803718037280373803748037580376803778037880379803808038180382803838038480385803868038780388803898039080391803928039380394803958039680397803988039980400804018040280403804048040580406804078040880409804108041180412804138041480415804168041780418804198042080421804228042380424804258042680427804288042980430804318043280433804348043580436804378043880439804408044180442804438044480445804468044780448804498045080451804528045380454804558045680457804588045980460804618046280463804648046580466804678046880469804708047180472804738047480475804768047780478804798048080481804828048380484804858048680487804888048980490804918049280493804948049580496804978049880499805008050180502805038050480505805068050780508805098051080511805128051380514805158051680517805188051980520805218052280523805248052580526805278052880529805308053180532805338053480535805368053780538805398054080541805428054380544805458054680547805488054980550805518055280553805548055580556805578055880559805608056180562805638056480565805668056780568805698057080571805728057380574805758057680577805788057980580805818058280583805848058580586805878058880589805908059180592805938059480595805968059780598805998060080601806028060380604806058060680607806088060980610806118061280613806148061580616806178061880619806208062180622806238062480625806268062780628806298063080631806328063380634806358063680637806388063980640806418064280643806448064580646806478064880649806508065180652806538065480655806568065780658806598066080661806628066380664806658066680667806688066980670806718067280673806748067580676806778067880679806808068180682806838068480685806868068780688806898069080691806928069380694806958069680697806988069980700807018070280703807048070580706807078070880709807108071180712807138071480715807168071780718807198072080721807228072380724807258072680727807288072980730807318073280733807348073580736807378073880739807408074180742807438074480745807468074780748807498075080751807528075380754807558075680757807588075980760807618076280763807648076580766807678076880769807708077180772807738077480775807768077780778807798078080781807828078380784807858078680787807888078980790807918079280793807948079580796807978079880799808008080180802808038080480805808068080780808808098081080811808128081380814808158081680817808188081980820808218082280823808248082580826808278082880829808308083180832808338083480835808368083780838808398084080841808428084380844808458084680847808488084980850808518085280853808548085580856808578085880859808608086180862808638086480865808668086780868808698087080871808728087380874808758087680877808788087980880808818088280883808848088580886808878088880889808908089180892808938089480895808968089780898808998090080901809028090380904809058090680907809088090980910809118091280913809148091580916809178091880919809208092180922809238092480925809268092780928809298093080931809328093380934809358093680937809388093980940809418094280943809448094580946809478094880949809508095180952809538095480955809568095780958809598096080961809628096380964809658096680967809688096980970809718097280973809748097580976809778097880979809808098180982809838098480985809868098780988809898099080991809928099380994809958099680997809988099981000810018100281003810048100581006810078100881009810108101181012810138101481015810168101781018810198102081021810228102381024810258102681027810288102981030810318103281033810348103581036810378103881039810408104181042810438104481045810468104781048810498105081051810528105381054810558105681057810588105981060810618106281063810648106581066810678106881069810708107181072810738107481075810768107781078810798108081081810828108381084810858108681087810888108981090810918109281093810948109581096810978109881099811008110181102811038110481105811068110781108811098111081111811128111381114811158111681117811188111981120811218112281123811248112581126811278112881129811308113181132811338113481135811368113781138811398114081141811428114381144811458114681147811488114981150811518115281153811548115581156811578115881159811608116181162811638116481165811668116781168811698117081171811728117381174811758117681177811788117981180811818118281183811848118581186811878118881189811908119181192811938119481195811968119781198811998120081201812028120381204812058120681207812088120981210812118121281213812148121581216812178121881219812208122181222812238122481225812268122781228812298123081231812328123381234812358123681237812388123981240812418124281243812448124581246812478124881249812508125181252812538125481255812568125781258812598126081261812628126381264812658126681267812688126981270812718127281273812748127581276812778127881279812808128181282812838128481285812868128781288812898129081291812928129381294812958129681297812988129981300813018130281303813048130581306813078130881309813108131181312813138131481315813168131781318813198132081321813228132381324813258132681327813288132981330813318133281333813348133581336813378133881339813408134181342813438134481345813468134781348813498135081351813528135381354813558135681357813588135981360813618136281363813648136581366813678136881369813708137181372813738137481375813768137781378813798138081381813828138381384813858138681387813888138981390813918139281393813948139581396813978139881399814008140181402814038140481405814068140781408814098141081411814128141381414814158141681417814188141981420814218142281423814248142581426814278142881429814308143181432814338143481435814368143781438814398144081441814428144381444814458144681447814488144981450814518145281453814548145581456814578145881459814608146181462814638146481465814668146781468814698147081471814728147381474814758147681477814788147981480814818148281483814848148581486814878148881489814908149181492814938149481495814968149781498814998150081501815028150381504815058150681507815088150981510815118151281513815148151581516815178151881519815208152181522815238152481525815268152781528815298153081531815328153381534815358153681537815388153981540815418154281543815448154581546815478154881549815508155181552815538155481555815568155781558815598156081561815628156381564815658156681567815688156981570815718157281573815748157581576815778157881579815808158181582815838158481585815868158781588815898159081591815928159381594815958159681597815988159981600816018160281603816048160581606816078160881609816108161181612816138161481615816168161781618816198162081621816228162381624816258162681627816288162981630816318163281633816348163581636816378163881639816408164181642816438164481645816468164781648816498165081651816528165381654816558165681657816588165981660816618166281663816648166581666816678166881669816708167181672816738167481675816768167781678816798168081681816828168381684816858168681687816888168981690816918169281693816948169581696816978169881699817008170181702817038170481705817068170781708817098171081711817128171381714817158171681717817188171981720817218172281723817248172581726817278172881729817308173181732817338173481735817368173781738817398174081741817428174381744817458174681747817488174981750817518175281753817548175581756817578175881759817608176181762817638176481765817668176781768817698177081771817728177381774817758177681777817788177981780817818178281783817848178581786817878178881789817908179181792817938179481795817968179781798817998180081801818028180381804818058180681807818088180981810818118181281813818148181581816818178181881819818208182181822818238182481825818268182781828818298183081831818328183381834818358183681837818388183981840818418184281843818448184581846818478184881849818508185181852818538185481855818568185781858818598186081861818628186381864818658186681867818688186981870818718187281873818748187581876818778187881879818808188181882818838188481885818868188781888818898189081891818928189381894818958189681897818988189981900819018190281903819048190581906819078190881909819108191181912819138191481915819168191781918819198192081921819228192381924819258192681927819288192981930819318193281933819348193581936819378193881939819408194181942819438194481945819468194781948819498195081951819528195381954819558195681957819588195981960819618196281963819648196581966819678196881969819708197181972819738197481975819768197781978819798198081981819828198381984819858198681987819888198981990819918199281993819948199581996819978199881999820008200182002820038200482005820068200782008820098201082011820128201382014820158201682017820188201982020820218202282023820248202582026820278202882029820308203182032820338203482035820368203782038820398204082041820428204382044820458204682047820488204982050820518205282053820548205582056820578205882059820608206182062820638206482065820668206782068820698207082071820728207382074820758207682077820788207982080820818208282083820848208582086820878208882089820908209182092820938209482095820968209782098820998210082101821028210382104821058210682107821088210982110821118211282113821148211582116821178211882119821208212182122821238212482125821268212782128821298213082131821328213382134821358213682137821388213982140821418214282143821448214582146821478214882149821508215182152821538215482155821568215782158821598216082161821628216382164821658216682167821688216982170821718217282173821748217582176821778217882179821808218182182821838218482185821868218782188821898219082191821928219382194821958219682197821988219982200822018220282203822048220582206822078220882209822108221182212822138221482215822168221782218822198222082221822228222382224822258222682227822288222982230822318223282233822348223582236822378223882239822408224182242822438224482245822468224782248822498225082251822528225382254822558225682257822588225982260822618226282263822648226582266822678226882269822708227182272822738227482275822768227782278822798228082281822828228382284822858228682287822888228982290822918229282293822948229582296822978229882299823008230182302823038230482305823068230782308823098231082311823128231382314823158231682317823188231982320823218232282323823248232582326823278232882329823308233182332823338233482335823368233782338823398234082341823428234382344823458234682347823488234982350823518235282353823548235582356823578235882359823608236182362823638236482365823668236782368823698237082371823728237382374823758237682377823788237982380823818238282383823848238582386823878238882389823908239182392823938239482395823968239782398823998240082401824028240382404824058240682407824088240982410824118241282413824148241582416824178241882419824208242182422824238242482425824268242782428824298243082431824328243382434824358243682437824388243982440824418244282443824448244582446824478244882449824508245182452824538245482455824568245782458824598246082461824628246382464824658246682467824688246982470824718247282473824748247582476824778247882479824808248182482824838248482485824868248782488824898249082491824928249382494824958249682497824988249982500825018250282503825048250582506825078250882509825108251182512825138251482515825168251782518825198252082521825228252382524825258252682527825288252982530825318253282533825348253582536825378253882539825408254182542825438254482545825468254782548825498255082551825528255382554825558255682557825588255982560825618256282563825648256582566825678256882569825708257182572825738257482575825768257782578825798258082581825828258382584825858258682587825888258982590825918259282593825948259582596825978259882599826008260182602826038260482605826068260782608826098261082611826128261382614826158261682617826188261982620826218262282623826248262582626826278262882629826308263182632826338263482635826368263782638826398264082641826428264382644826458264682647826488264982650826518265282653826548265582656826578265882659826608266182662826638266482665826668266782668826698267082671826728267382674826758267682677826788267982680826818268282683826848268582686826878268882689826908269182692826938269482695826968269782698826998270082701827028270382704827058270682707827088270982710827118271282713827148271582716827178271882719827208272182722827238272482725827268272782728827298273082731827328273382734827358273682737827388273982740827418274282743827448274582746827478274882749827508275182752827538275482755827568275782758827598276082761827628276382764827658276682767827688276982770827718277282773827748277582776827778277882779827808278182782827838278482785827868278782788827898279082791827928279382794827958279682797827988279982800828018280282803828048280582806828078280882809828108281182812828138281482815828168281782818828198282082821828228282382824828258282682827828288282982830828318283282833828348283582836828378283882839828408284182842828438284482845828468284782848828498285082851828528285382854828558285682857828588285982860828618286282863828648286582866828678286882869828708287182872828738287482875828768287782878828798288082881828828288382884828858288682887828888288982890828918289282893828948289582896828978289882899829008290182902829038290482905829068290782908829098291082911829128291382914829158291682917829188291982920829218292282923829248292582926829278292882929829308293182932829338293482935829368293782938829398294082941829428294382944829458294682947829488294982950829518295282953829548295582956829578295882959829608296182962829638296482965829668296782968829698297082971829728297382974829758297682977829788297982980829818298282983829848298582986829878298882989829908299182992829938299482995829968299782998829998300083001830028300383004830058300683007830088300983010830118301283013830148301583016830178301883019830208302183022830238302483025830268302783028830298303083031830328303383034830358303683037830388303983040830418304283043830448304583046830478304883049830508305183052830538305483055830568305783058830598306083061830628306383064830658306683067830688306983070830718307283073830748307583076830778307883079830808308183082830838308483085830868308783088830898309083091830928309383094830958309683097830988309983100831018310283103831048310583106831078310883109831108311183112831138311483115831168311783118831198312083121831228312383124831258312683127831288312983130831318313283133831348313583136831378313883139831408314183142831438314483145831468314783148831498315083151831528315383154831558315683157831588315983160831618316283163831648316583166831678316883169831708317183172831738317483175831768317783178831798318083181831828318383184831858318683187831888318983190831918319283193831948319583196831978319883199832008320183202832038320483205832068320783208832098321083211832128321383214832158321683217832188321983220832218322283223832248322583226832278322883229832308323183232832338323483235832368323783238832398324083241832428324383244832458324683247832488324983250832518325283253832548325583256832578325883259832608326183262832638326483265832668326783268832698327083271832728327383274832758327683277832788327983280832818328283283832848328583286832878328883289832908329183292832938329483295832968329783298832998330083301833028330383304833058330683307833088330983310833118331283313833148331583316833178331883319833208332183322833238332483325833268332783328833298333083331833328333383334833358333683337833388333983340833418334283343833448334583346833478334883349833508335183352833538335483355833568335783358833598336083361833628336383364833658336683367833688336983370833718337283373833748337583376833778337883379833808338183382833838338483385833868338783388833898339083391833928339383394833958339683397833988339983400834018340283403834048340583406834078340883409834108341183412834138341483415834168341783418834198342083421834228342383424834258342683427834288342983430834318343283433834348343583436834378343883439834408344183442834438344483445834468344783448834498345083451834528345383454834558345683457834588345983460834618346283463834648346583466834678346883469834708347183472834738347483475834768347783478834798348083481834828348383484834858348683487834888348983490834918349283493834948349583496834978349883499835008350183502835038350483505835068350783508835098351083511835128351383514835158351683517835188351983520835218352283523835248352583526835278352883529835308353183532835338353483535835368353783538835398354083541835428354383544835458354683547835488354983550835518355283553835548355583556835578355883559835608356183562835638356483565835668356783568835698357083571835728357383574835758357683577835788357983580835818358283583835848358583586835878358883589835908359183592835938359483595835968359783598835998360083601836028360383604836058360683607836088360983610836118361283613836148361583616836178361883619836208362183622836238362483625836268362783628836298363083631836328363383634836358363683637836388363983640836418364283643836448364583646836478364883649836508365183652836538365483655836568365783658836598366083661836628366383664836658366683667836688366983670836718367283673836748367583676836778367883679836808368183682836838368483685836868368783688836898369083691836928369383694836958369683697836988369983700837018370283703837048370583706837078370883709837108371183712837138371483715837168371783718837198372083721837228372383724837258372683727837288372983730837318373283733837348373583736837378373883739837408374183742837438374483745837468374783748837498375083751837528375383754837558375683757837588375983760837618376283763837648376583766837678376883769837708377183772837738377483775837768377783778837798378083781837828378383784837858378683787837888378983790837918379283793837948379583796837978379883799838008380183802838038380483805838068380783808838098381083811838128381383814838158381683817838188381983820838218382283823838248382583826838278382883829838308383183832838338383483835838368383783838838398384083841838428384383844838458384683847838488384983850838518385283853838548385583856838578385883859838608386183862838638386483865838668386783868838698387083871838728387383874838758387683877838788387983880838818388283883838848388583886838878388883889838908389183892838938389483895838968389783898838998390083901839028390383904839058390683907839088390983910839118391283913839148391583916839178391883919839208392183922839238392483925839268392783928839298393083931839328393383934839358393683937839388393983940839418394283943839448394583946839478394883949839508395183952839538395483955839568395783958839598396083961839628396383964839658396683967839688396983970839718397283973839748397583976839778397883979839808398183982839838398483985839868398783988839898399083991839928399383994839958399683997839988399984000840018400284003840048400584006840078400884009840108401184012840138401484015840168401784018840198402084021840228402384024840258402684027840288402984030840318403284033840348403584036840378403884039840408404184042840438404484045840468404784048840498405084051840528405384054840558405684057840588405984060840618406284063840648406584066840678406884069840708407184072840738407484075840768407784078840798408084081840828408384084840858408684087840888408984090840918409284093840948409584096840978409884099841008410184102841038410484105841068410784108841098411084111841128411384114841158411684117841188411984120841218412284123841248412584126841278412884129841308413184132841338413484135841368413784138841398414084141841428414384144841458414684147841488414984150841518415284153841548415584156841578415884159841608416184162841638416484165841668416784168841698417084171841728417384174841758417684177841788417984180841818418284183841848418584186841878418884189841908419184192841938419484195841968419784198841998420084201842028420384204842058420684207842088420984210842118421284213842148421584216842178421884219842208422184222842238422484225842268422784228842298423084231842328423384234842358423684237842388423984240842418424284243842448424584246842478424884249842508425184252842538425484255842568425784258842598426084261842628426384264842658426684267842688426984270842718427284273842748427584276842778427884279842808428184282842838428484285842868428784288842898429084291842928429384294842958429684297842988429984300843018430284303843048430584306843078430884309843108431184312843138431484315843168431784318843198432084321843228432384324843258432684327843288432984330843318433284333843348433584336843378433884339843408434184342843438434484345843468434784348843498435084351843528435384354843558435684357843588435984360843618436284363843648436584366843678436884369843708437184372843738437484375843768437784378843798438084381843828438384384843858438684387843888438984390843918439284393843948439584396843978439884399844008440184402844038440484405844068440784408844098441084411844128441384414844158441684417844188441984420844218442284423844248442584426844278442884429844308443184432844338443484435844368443784438844398444084441844428444384444844458444684447844488444984450844518445284453844548445584456844578445884459844608446184462844638446484465844668446784468844698447084471844728447384474844758447684477844788447984480844818448284483844848448584486844878448884489844908449184492844938449484495844968449784498844998450084501845028450384504845058450684507845088450984510845118451284513845148451584516845178451884519845208452184522845238452484525845268452784528845298453084531845328453384534845358453684537845388453984540845418454284543845448454584546845478454884549845508455184552845538455484555845568455784558845598456084561845628456384564845658456684567845688456984570845718457284573845748457584576845778457884579845808458184582845838458484585845868458784588845898459084591845928459384594845958459684597845988459984600846018460284603846048460584606846078460884609846108461184612846138461484615846168461784618846198462084621846228462384624846258462684627846288462984630846318463284633846348463584636846378463884639846408464184642846438464484645846468464784648846498465084651846528465384654846558465684657846588465984660846618466284663846648466584666846678466884669846708467184672846738467484675846768467784678846798468084681846828468384684846858468684687846888468984690846918469284693846948469584696846978469884699847008470184702847038470484705847068470784708847098471084711847128471384714847158471684717847188471984720847218472284723847248472584726847278472884729847308473184732847338473484735847368473784738847398474084741847428474384744847458474684747847488474984750847518475284753847548475584756847578475884759847608476184762847638476484765847668476784768847698477084771847728477384774847758477684777847788477984780847818478284783847848478584786847878478884789847908479184792847938479484795847968479784798847998480084801848028480384804848058480684807848088480984810848118481284813848148481584816848178481884819848208482184822848238482484825848268482784828848298483084831848328483384834848358483684837848388483984840848418484284843848448484584846848478484884849848508485184852848538485484855848568485784858848598486084861848628486384864848658486684867848688486984870848718487284873848748487584876848778487884879848808488184882848838488484885848868488784888848898489084891848928489384894848958489684897848988489984900849018490284903849048490584906849078490884909849108491184912849138491484915849168491784918849198492084921849228492384924849258492684927849288492984930849318493284933849348493584936849378493884939849408494184942849438494484945849468494784948849498495084951849528495384954849558495684957849588495984960849618496284963849648496584966849678496884969849708497184972849738497484975849768497784978849798498084981849828498384984849858498684987849888498984990849918499284993849948499584996849978499884999850008500185002850038500485005850068500785008850098501085011850128501385014850158501685017850188501985020850218502285023850248502585026850278502885029850308503185032850338503485035850368503785038850398504085041850428504385044850458504685047850488504985050850518505285053850548505585056850578505885059850608506185062850638506485065850668506785068850698507085071850728507385074850758507685077850788507985080850818508285083850848508585086850878508885089850908509185092850938509485095850968509785098850998510085101851028510385104851058510685107851088510985110851118511285113851148511585116851178511885119851208512185122851238512485125851268512785128851298513085131851328513385134851358513685137851388513985140851418514285143851448514585146851478514885149851508515185152851538515485155851568515785158851598516085161851628516385164851658516685167851688516985170851718517285173851748517585176851778517885179851808518185182851838518485185851868518785188851898519085191851928519385194851958519685197851988519985200852018520285203852048520585206852078520885209852108521185212852138521485215852168521785218852198522085221852228522385224852258522685227852288522985230852318523285233852348523585236852378523885239852408524185242852438524485245852468524785248852498525085251852528525385254852558525685257852588525985260852618526285263852648526585266852678526885269852708527185272852738527485275852768527785278852798528085281852828528385284852858528685287852888528985290852918529285293852948529585296852978529885299853008530185302853038530485305853068530785308853098531085311853128531385314853158531685317853188531985320853218532285323853248532585326853278532885329853308533185332853338533485335853368533785338853398534085341853428534385344853458534685347853488534985350853518535285353853548535585356853578535885359853608536185362853638536485365853668536785368853698537085371853728537385374853758537685377853788537985380853818538285383853848538585386853878538885389853908539185392853938539485395853968539785398853998540085401854028540385404854058540685407854088540985410854118541285413854148541585416854178541885419854208542185422854238542485425854268542785428854298543085431854328543385434854358543685437854388543985440854418544285443854448544585446854478544885449854508545185452854538545485455854568545785458854598546085461854628546385464854658546685467854688546985470854718547285473854748547585476854778547885479854808548185482854838548485485854868548785488854898549085491854928549385494854958549685497854988549985500855018550285503855048550585506855078550885509855108551185512855138551485515855168551785518855198552085521855228552385524855258552685527855288552985530855318553285533855348553585536855378553885539855408554185542855438554485545855468554785548855498555085551855528555385554855558555685557855588555985560855618556285563855648556585566855678556885569855708557185572855738557485575855768557785578855798558085581855828558385584855858558685587855888558985590855918559285593855948559585596855978559885599856008560185602856038560485605856068560785608856098561085611856128561385614856158561685617856188561985620856218562285623856248562585626856278562885629856308563185632856338563485635856368563785638856398564085641856428564385644856458564685647856488564985650856518565285653856548565585656856578565885659856608566185662856638566485665856668566785668856698567085671856728567385674856758567685677856788567985680856818568285683856848568585686856878568885689856908569185692856938569485695856968569785698856998570085701857028570385704857058570685707857088570985710857118571285713857148571585716857178571885719857208572185722857238572485725857268572785728857298573085731857328573385734857358573685737857388573985740857418574285743857448574585746857478574885749857508575185752857538575485755857568575785758857598576085761857628576385764857658576685767857688576985770857718577285773857748577585776857778577885779857808578185782857838578485785857868578785788857898579085791857928579385794857958579685797857988579985800858018580285803858048580585806858078580885809858108581185812858138581485815858168581785818858198582085821858228582385824858258582685827858288582985830858318583285833858348583585836858378583885839858408584185842858438584485845858468584785848858498585085851858528585385854858558585685857858588585985860858618586285863858648586585866858678586885869858708587185872858738587485875858768587785878858798588085881858828588385884858858588685887858888588985890858918589285893858948589585896858978589885899859008590185902859038590485905859068590785908859098591085911859128591385914859158591685917859188591985920859218592285923859248592585926859278592885929859308593185932859338593485935859368593785938859398594085941859428594385944859458594685947859488594985950859518595285953859548595585956859578595885959859608596185962859638596485965859668596785968859698597085971859728597385974859758597685977859788597985980859818598285983859848598585986859878598885989859908599185992859938599485995859968599785998859998600086001860028600386004860058600686007860088600986010860118601286013860148601586016860178601886019860208602186022860238602486025860268602786028860298603086031860328603386034860358603686037860388603986040860418604286043860448604586046860478604886049860508605186052860538605486055860568605786058860598606086061860628606386064860658606686067860688606986070860718607286073860748607586076860778607886079860808608186082860838608486085860868608786088860898609086091860928609386094860958609686097860988609986100861018610286103861048610586106861078610886109861108611186112861138611486115861168611786118861198612086121861228612386124861258612686127861288612986130861318613286133861348613586136861378613886139861408614186142861438614486145861468614786148861498615086151861528615386154861558615686157861588615986160861618616286163861648616586166861678616886169861708617186172861738617486175861768617786178861798618086181861828618386184861858618686187861888618986190861918619286193861948619586196861978619886199862008620186202862038620486205862068620786208862098621086211862128621386214862158621686217862188621986220862218622286223862248622586226862278622886229862308623186232862338623486235862368623786238862398624086241862428624386244862458624686247862488624986250862518625286253862548625586256862578625886259862608626186262862638626486265862668626786268862698627086271862728627386274862758627686277862788627986280862818628286283862848628586286862878628886289862908629186292862938629486295862968629786298862998630086301863028630386304863058630686307863088630986310863118631286313863148631586316863178631886319863208632186322863238632486325863268632786328863298633086331863328633386334863358633686337863388633986340863418634286343863448634586346863478634886349863508635186352863538635486355863568635786358863598636086361863628636386364863658636686367863688636986370863718637286373863748637586376863778637886379863808638186382863838638486385863868638786388863898639086391863928639386394863958639686397863988639986400864018640286403864048640586406864078640886409864108641186412864138641486415864168641786418864198642086421864228642386424864258642686427864288642986430864318643286433864348643586436864378643886439864408644186442864438644486445864468644786448864498645086451864528645386454864558645686457864588645986460864618646286463864648646586466864678646886469864708647186472864738647486475864768647786478864798648086481864828648386484864858648686487864888648986490864918649286493864948649586496864978649886499865008650186502865038650486505865068650786508865098651086511865128651386514865158651686517865188651986520865218652286523865248652586526865278652886529865308653186532865338653486535865368653786538865398654086541865428654386544865458654686547865488654986550865518655286553865548655586556865578655886559865608656186562865638656486565865668656786568865698657086571865728657386574865758657686577865788657986580865818658286583865848658586586865878658886589865908659186592865938659486595865968659786598865998660086601866028660386604866058660686607866088660986610866118661286613866148661586616866178661886619866208662186622866238662486625866268662786628866298663086631866328663386634866358663686637866388663986640866418664286643866448664586646866478664886649866508665186652866538665486655866568665786658866598666086661866628666386664866658666686667866688666986670866718667286673866748667586676866778667886679866808668186682866838668486685866868668786688866898669086691866928669386694866958669686697866988669986700867018670286703867048670586706867078670886709867108671186712867138671486715867168671786718867198672086721867228672386724867258672686727867288672986730867318673286733867348673586736867378673886739867408674186742867438674486745867468674786748867498675086751867528675386754867558675686757867588675986760867618676286763867648676586766867678676886769867708677186772867738677486775867768677786778867798678086781867828678386784867858678686787867888678986790867918679286793867948679586796867978679886799868008680186802868038680486805868068680786808868098681086811868128681386814868158681686817868188681986820868218682286823868248682586826868278682886829868308683186832868338683486835868368683786838868398684086841868428684386844868458684686847868488684986850868518685286853868548685586856868578685886859868608686186862868638686486865868668686786868868698687086871868728687386874868758687686877868788687986880868818688286883868848688586886868878688886889868908689186892868938689486895868968689786898868998690086901869028690386904869058690686907869088690986910869118691286913869148691586916869178691886919869208692186922869238692486925869268692786928869298693086931869328693386934869358693686937869388693986940869418694286943869448694586946869478694886949869508695186952869538695486955869568695786958869598696086961869628696386964869658696686967869688696986970869718697286973869748697586976869778697886979869808698186982869838698486985869868698786988869898699086991869928699386994869958699686997869988699987000870018700287003870048700587006870078700887009870108701187012870138701487015870168701787018870198702087021870228702387024870258702687027870288702987030870318703287033870348703587036870378703887039870408704187042870438704487045870468704787048870498705087051870528705387054870558705687057870588705987060870618706287063870648706587066870678706887069870708707187072870738707487075870768707787078870798708087081870828708387084870858708687087870888708987090870918709287093870948709587096870978709887099871008710187102871038710487105871068710787108871098711087111871128711387114871158711687117871188711987120871218712287123871248712587126871278712887129871308713187132871338713487135871368713787138871398714087141871428714387144871458714687147871488714987150871518715287153871548715587156871578715887159871608716187162871638716487165871668716787168871698717087171871728717387174871758717687177871788717987180871818718287183871848718587186871878718887189871908719187192871938719487195871968719787198871998720087201872028720387204872058720687207872088720987210872118721287213872148721587216872178721887219872208722187222872238722487225872268722787228872298723087231872328723387234872358723687237872388723987240872418724287243872448724587246872478724887249872508725187252872538725487255872568725787258872598726087261872628726387264872658726687267872688726987270872718727287273872748727587276872778727887279872808728187282872838728487285872868728787288872898729087291872928729387294872958729687297872988729987300873018730287303873048730587306873078730887309873108731187312873138731487315873168731787318873198732087321873228732387324873258732687327873288732987330873318733287333873348733587336873378733887339873408734187342873438734487345873468734787348873498735087351873528735387354873558735687357873588735987360873618736287363873648736587366873678736887369873708737187372873738737487375873768737787378873798738087381873828738387384873858738687387873888738987390873918739287393873948739587396873978739887399874008740187402874038740487405874068740787408874098741087411874128741387414874158741687417874188741987420874218742287423874248742587426874278742887429874308743187432874338743487435874368743787438874398744087441874428744387444874458744687447874488744987450874518745287453874548745587456874578745887459874608746187462874638746487465874668746787468874698747087471874728747387474874758747687477874788747987480874818748287483874848748587486874878748887489874908749187492874938749487495874968749787498874998750087501875028750387504875058750687507875088750987510875118751287513875148751587516875178751887519875208752187522875238752487525875268752787528875298753087531875328753387534875358753687537875388753987540875418754287543875448754587546875478754887549875508755187552875538755487555875568755787558875598756087561875628756387564875658756687567875688756987570875718757287573875748757587576875778757887579875808758187582875838758487585875868758787588875898759087591875928759387594875958759687597875988759987600876018760287603876048760587606876078760887609876108761187612876138761487615876168761787618876198762087621876228762387624876258762687627876288762987630876318763287633876348763587636876378763887639876408764187642876438764487645876468764787648876498765087651876528765387654876558765687657876588765987660876618766287663876648766587666876678766887669876708767187672876738767487675876768767787678876798768087681876828768387684876858768687687876888768987690876918769287693876948769587696876978769887699877008770187702877038770487705877068770787708877098771087711877128771387714877158771687717877188771987720877218772287723877248772587726877278772887729877308773187732877338773487735877368773787738877398774087741877428774387744877458774687747877488774987750877518775287753877548775587756877578775887759877608776187762877638776487765877668776787768877698777087771877728777387774877758777687777877788777987780877818778287783877848778587786877878778887789877908779187792877938779487795877968779787798877998780087801878028780387804878058780687807878088780987810878118781287813878148781587816878178781887819878208782187822878238782487825878268782787828878298783087831878328783387834878358783687837878388783987840878418784287843878448784587846878478784887849878508785187852878538785487855878568785787858878598786087861878628786387864878658786687867878688786987870878718787287873878748787587876878778787887879878808788187882878838788487885878868788787888878898789087891878928789387894878958789687897878988789987900879018790287903879048790587906879078790887909879108791187912879138791487915879168791787918879198792087921879228792387924879258792687927879288792987930879318793287933879348793587936879378793887939879408794187942879438794487945879468794787948879498795087951879528795387954879558795687957879588795987960879618796287963879648796587966879678796887969879708797187972879738797487975879768797787978879798798087981879828798387984879858798687987879888798987990879918799287993879948799587996879978799887999880008800188002880038800488005880068800788008880098801088011880128801388014880158801688017880188801988020880218802288023880248802588026880278802888029880308803188032880338803488035880368803788038880398804088041880428804388044880458804688047880488804988050880518805288053880548805588056880578805888059880608806188062880638806488065880668806788068880698807088071880728807388074880758807688077880788807988080880818808288083880848808588086880878808888089880908809188092880938809488095880968809788098880998810088101881028810388104881058810688107881088810988110881118811288113881148811588116881178811888119881208812188122881238812488125881268812788128881298813088131881328813388134881358813688137881388813988140881418814288143881448814588146881478814888149881508815188152881538815488155881568815788158881598816088161881628816388164881658816688167881688816988170881718817288173881748817588176881778817888179881808818188182881838818488185881868818788188881898819088191881928819388194881958819688197881988819988200882018820288203882048820588206882078820888209882108821188212882138821488215882168821788218882198822088221882228822388224882258822688227882288822988230882318823288233882348823588236882378823888239882408824188242882438824488245882468824788248882498825088251882528825388254882558825688257882588825988260882618826288263882648826588266882678826888269882708827188272882738827488275882768827788278882798828088281882828828388284882858828688287882888828988290882918829288293882948829588296882978829888299883008830188302883038830488305883068830788308883098831088311883128831388314883158831688317883188831988320883218832288323883248832588326883278832888329883308833188332883338833488335883368833788338883398834088341883428834388344883458834688347883488834988350883518835288353883548835588356883578835888359883608836188362883638836488365883668836788368883698837088371883728837388374883758837688377883788837988380883818838288383883848838588386883878838888389883908839188392883938839488395883968839788398883998840088401884028840388404884058840688407884088840988410884118841288413884148841588416884178841888419884208842188422884238842488425884268842788428884298843088431884328843388434884358843688437884388843988440884418844288443884448844588446884478844888449884508845188452884538845488455884568845788458884598846088461884628846388464884658846688467884688846988470884718847288473884748847588476884778847888479884808848188482884838848488485884868848788488884898849088491884928849388494884958849688497884988849988500885018850288503885048850588506885078850888509885108851188512885138851488515885168851788518885198852088521885228852388524885258852688527885288852988530885318853288533885348853588536885378853888539885408854188542885438854488545885468854788548885498855088551885528855388554885558855688557885588855988560885618856288563885648856588566885678856888569885708857188572885738857488575885768857788578885798858088581885828858388584885858858688587885888858988590885918859288593885948859588596885978859888599886008860188602886038860488605886068860788608886098861088611886128861388614886158861688617886188861988620886218862288623886248862588626886278862888629886308863188632886338863488635886368863788638886398864088641886428864388644886458864688647886488864988650886518865288653886548865588656886578865888659886608866188662886638866488665886668866788668886698867088671886728867388674886758867688677886788867988680886818868288683886848868588686886878868888689886908869188692886938869488695886968869788698886998870088701887028870388704887058870688707887088870988710887118871288713887148871588716887178871888719887208872188722887238872488725887268872788728887298873088731887328873388734887358873688737887388873988740887418874288743887448874588746887478874888749887508875188752887538875488755887568875788758887598876088761887628876388764887658876688767887688876988770887718877288773887748877588776887778877888779887808878188782887838878488785887868878788788887898879088791887928879388794887958879688797887988879988800888018880288803888048880588806888078880888809888108881188812888138881488815888168881788818888198882088821888228882388824888258882688827888288882988830888318883288833888348883588836888378883888839888408884188842888438884488845888468884788848888498885088851888528885388854888558885688857888588885988860888618886288863888648886588866888678886888869888708887188872888738887488875888768887788878888798888088881888828888388884888858888688887888888888988890888918889288893888948889588896888978889888899889008890188902889038890488905889068890788908889098891088911889128891388914889158891688917889188891988920889218892288923889248892588926889278892888929889308893188932889338893488935889368893788938889398894088941889428894388944889458894688947889488894988950889518895288953889548895588956889578895888959889608896188962889638896488965889668896788968889698897088971889728897388974889758897688977889788897988980889818898288983889848898588986889878898888989889908899188992889938899488995889968899788998889998900089001890028900389004890058900689007890088900989010890118901289013890148901589016890178901889019890208902189022890238902489025890268902789028890298903089031890328903389034890358903689037890388903989040890418904289043890448904589046890478904889049890508905189052890538905489055890568905789058890598906089061890628906389064890658906689067890688906989070890718907289073890748907589076890778907889079890808908189082890838908489085890868908789088890898909089091890928909389094890958909689097890988909989100891018910289103891048910589106891078910889109891108911189112891138911489115891168911789118891198912089121891228912389124891258912689127891288912989130891318913289133891348913589136891378913889139891408914189142891438914489145891468914789148891498915089151891528915389154891558915689157891588915989160891618916289163891648916589166891678916889169891708917189172891738917489175891768917789178891798918089181891828918389184891858918689187891888918989190891918919289193891948919589196891978919889199892008920189202892038920489205892068920789208892098921089211892128921389214892158921689217892188921989220892218922289223892248922589226892278922889229892308923189232892338923489235892368923789238892398924089241892428924389244892458924689247892488924989250892518925289253892548925589256892578925889259892608926189262892638926489265892668926789268892698927089271892728927389274892758927689277892788927989280892818928289283892848928589286892878928889289892908929189292892938929489295892968929789298892998930089301893028930389304893058930689307893088930989310893118931289313893148931589316893178931889319893208932189322893238932489325893268932789328893298933089331893328933389334893358933689337893388933989340893418934289343893448934589346893478934889349893508935189352893538935489355893568935789358893598936089361893628936389364893658936689367893688936989370893718937289373893748937589376893778937889379893808938189382893838938489385893868938789388893898939089391893928939389394893958939689397893988939989400894018940289403894048940589406894078940889409894108941189412894138941489415894168941789418894198942089421894228942389424894258942689427894288942989430894318943289433894348943589436894378943889439894408944189442894438944489445894468944789448894498945089451894528945389454894558945689457894588945989460894618946289463894648946589466894678946889469894708947189472894738947489475894768947789478894798948089481894828948389484894858948689487894888948989490894918949289493894948949589496894978949889499895008950189502895038950489505895068950789508895098951089511895128951389514895158951689517895188951989520895218952289523895248952589526895278952889529895308953189532895338953489535895368953789538895398954089541895428954389544895458954689547895488954989550895518955289553895548955589556895578955889559895608956189562895638956489565895668956789568895698957089571895728957389574895758957689577895788957989580895818958289583895848958589586895878958889589895908959189592895938959489595895968959789598895998960089601896028960389604896058960689607896088960989610896118961289613896148961589616896178961889619896208962189622896238962489625896268962789628896298963089631896328963389634896358963689637896388963989640896418964289643896448964589646896478964889649896508965189652896538965489655896568965789658896598966089661896628966389664896658966689667896688966989670896718967289673896748967589676896778967889679896808968189682896838968489685896868968789688896898969089691896928969389694896958969689697896988969989700897018970289703897048970589706897078970889709897108971189712897138971489715897168971789718897198972089721897228972389724897258972689727897288972989730897318973289733897348973589736897378973889739897408974189742897438974489745897468974789748897498975089751897528975389754897558975689757897588975989760897618976289763897648976589766897678976889769897708977189772897738977489775897768977789778897798978089781897828978389784897858978689787897888978989790897918979289793897948979589796897978979889799898008980189802898038980489805898068980789808898098981089811898128981389814898158981689817898188981989820898218982289823898248982589826898278982889829898308983189832898338983489835898368983789838898398984089841898428984389844898458984689847898488984989850898518985289853898548985589856898578985889859898608986189862898638986489865898668986789868898698987089871898728987389874898758987689877898788987989880898818988289883898848988589886898878988889889898908989189892898938989489895898968989789898898998990089901899028990389904899058990689907899088990989910899118991289913899148991589916899178991889919899208992189922899238992489925899268992789928899298993089931899328993389934899358993689937899388993989940899418994289943899448994589946899478994889949899508995189952899538995489955899568995789958899598996089961899628996389964899658996689967899688996989970899718997289973899748997589976899778997889979899808998189982899838998489985899868998789988899898999089991899928999389994899958999689997899988999990000900019000290003900049000590006900079000890009900109001190012900139001490015900169001790018900199002090021900229002390024900259002690027900289002990030900319003290033900349003590036900379003890039900409004190042900439004490045900469004790048900499005090051900529005390054900559005690057900589005990060900619006290063900649006590066900679006890069900709007190072900739007490075900769007790078900799008090081900829008390084900859008690087900889008990090900919009290093900949009590096900979009890099901009010190102901039010490105901069010790108901099011090111901129011390114901159011690117901189011990120901219012290123901249012590126901279012890129901309013190132901339013490135901369013790138901399014090141901429014390144901459014690147901489014990150901519015290153901549015590156901579015890159901609016190162901639016490165901669016790168901699017090171901729017390174901759017690177901789017990180901819018290183901849018590186901879018890189901909019190192901939019490195901969019790198901999020090201902029020390204902059020690207902089020990210902119021290213902149021590216902179021890219902209022190222902239022490225902269022790228902299023090231902329023390234902359023690237902389023990240902419024290243902449024590246902479024890249902509025190252902539025490255902569025790258902599026090261902629026390264902659026690267902689026990270902719027290273902749027590276902779027890279902809028190282902839028490285902869028790288902899029090291902929029390294902959029690297902989029990300903019030290303903049030590306903079030890309903109031190312903139031490315903169031790318903199032090321903229032390324903259032690327903289032990330903319033290333903349033590336903379033890339903409034190342903439034490345903469034790348903499035090351903529035390354903559035690357903589035990360903619036290363903649036590366903679036890369903709037190372903739037490375903769037790378903799038090381903829038390384903859038690387903889038990390903919039290393903949039590396903979039890399904009040190402904039040490405904069040790408904099041090411904129041390414904159041690417904189041990420904219042290423904249042590426904279042890429904309043190432904339043490435904369043790438904399044090441904429044390444904459044690447904489044990450904519045290453904549045590456904579045890459904609046190462904639046490465904669046790468904699047090471904729047390474904759047690477904789047990480904819048290483904849048590486904879048890489904909049190492904939049490495904969049790498904999050090501905029050390504905059050690507905089050990510905119051290513905149051590516905179051890519905209052190522905239052490525905269052790528905299053090531905329053390534905359053690537905389053990540905419054290543905449054590546905479054890549905509055190552905539055490555905569055790558905599056090561905629056390564905659056690567905689056990570905719057290573905749057590576905779057890579905809058190582905839058490585905869058790588905899059090591905929059390594905959059690597905989059990600906019060290603906049060590606906079060890609906109061190612906139061490615906169061790618906199062090621906229062390624906259062690627906289062990630906319063290633906349063590636906379063890639906409064190642906439064490645906469064790648906499065090651906529065390654906559065690657906589065990660906619066290663906649066590666906679066890669906709067190672906739067490675906769067790678906799068090681906829068390684906859068690687906889068990690906919069290693906949069590696906979069890699907009070190702907039070490705907069070790708907099071090711907129071390714907159071690717907189071990720907219072290723907249072590726907279072890729907309073190732907339073490735907369073790738907399074090741907429074390744907459074690747907489074990750907519075290753907549075590756907579075890759907609076190762907639076490765907669076790768907699077090771907729077390774907759077690777907789077990780907819078290783907849078590786907879078890789907909079190792907939079490795907969079790798907999080090801908029080390804908059080690807908089080990810908119081290813908149081590816908179081890819908209082190822908239082490825908269082790828908299083090831908329083390834908359083690837908389083990840908419084290843908449084590846908479084890849908509085190852908539085490855908569085790858908599086090861908629086390864908659086690867908689086990870908719087290873908749087590876908779087890879908809088190882908839088490885908869088790888908899089090891908929089390894908959089690897908989089990900909019090290903909049090590906909079090890909909109091190912909139091490915909169091790918909199092090921909229092390924909259092690927909289092990930909319093290933909349093590936909379093890939909409094190942909439094490945909469094790948909499095090951909529095390954909559095690957909589095990960909619096290963909649096590966909679096890969909709097190972909739097490975909769097790978909799098090981909829098390984909859098690987909889098990990909919099290993909949099590996909979099890999910009100191002910039100491005910069100791008910099101091011910129101391014910159101691017910189101991020910219102291023910249102591026910279102891029910309103191032910339103491035910369103791038910399104091041910429104391044910459104691047910489104991050910519105291053910549105591056910579105891059910609106191062910639106491065910669106791068910699107091071910729107391074910759107691077910789107991080910819108291083910849108591086910879108891089910909109191092910939109491095910969109791098910999110091101911029110391104911059110691107911089110991110911119111291113911149111591116911179111891119911209112191122911239112491125911269112791128911299113091131911329113391134911359113691137911389113991140911419114291143911449114591146911479114891149911509115191152911539115491155911569115791158911599116091161911629116391164911659116691167911689116991170911719117291173911749117591176911779117891179911809118191182911839118491185911869118791188911899119091191911929119391194911959119691197911989119991200912019120291203912049120591206912079120891209912109121191212912139121491215912169121791218912199122091221912229122391224912259122691227912289122991230912319123291233912349123591236912379123891239912409124191242912439124491245912469124791248912499125091251912529125391254912559125691257912589125991260912619126291263912649126591266912679126891269912709127191272912739127491275912769127791278912799128091281912829128391284912859128691287912889128991290912919129291293912949129591296912979129891299913009130191302913039130491305913069130791308913099131091311913129131391314913159131691317913189131991320913219132291323913249132591326913279132891329913309133191332913339133491335913369133791338913399134091341913429134391344913459134691347913489134991350913519135291353913549135591356913579135891359913609136191362913639136491365913669136791368913699137091371913729137391374913759137691377913789137991380913819138291383913849138591386913879138891389913909139191392913939139491395913969139791398913999140091401914029140391404914059140691407914089140991410914119141291413914149141591416914179141891419914209142191422914239142491425914269142791428914299143091431914329143391434914359143691437914389143991440914419144291443914449144591446914479144891449914509145191452914539145491455914569145791458914599146091461914629146391464914659146691467914689146991470914719147291473914749147591476914779147891479914809148191482914839148491485914869148791488914899149091491914929149391494914959149691497914989149991500915019150291503915049150591506915079150891509915109151191512915139151491515915169151791518915199152091521915229152391524915259152691527915289152991530915319153291533915349153591536915379153891539915409154191542915439154491545915469154791548915499155091551915529155391554915559155691557915589155991560915619156291563915649156591566915679156891569915709157191572915739157491575915769157791578915799158091581915829158391584915859158691587915889158991590915919159291593915949159591596915979159891599916009160191602916039160491605916069160791608916099161091611916129161391614916159161691617916189161991620916219162291623916249162591626916279162891629916309163191632916339163491635916369163791638916399164091641916429164391644916459164691647916489164991650916519165291653916549165591656916579165891659916609166191662916639166491665916669166791668916699167091671916729167391674916759167691677916789167991680916819168291683916849168591686916879168891689916909169191692916939169491695916969169791698916999170091701917029170391704917059170691707917089170991710917119171291713917149171591716917179171891719917209172191722917239172491725917269172791728917299173091731917329173391734917359173691737917389173991740917419174291743917449174591746917479174891749917509175191752917539175491755917569175791758917599176091761917629176391764917659176691767917689176991770917719177291773917749177591776917779177891779917809178191782917839178491785917869178791788917899179091791917929179391794917959179691797917989179991800918019180291803918049180591806918079180891809918109181191812918139181491815918169181791818918199182091821918229182391824918259182691827918289182991830918319183291833918349183591836918379183891839918409184191842918439184491845918469184791848918499185091851918529185391854918559185691857918589185991860918619186291863918649186591866918679186891869918709187191872918739187491875918769187791878918799188091881918829188391884918859188691887918889188991890918919189291893918949189591896918979189891899919009190191902919039190491905919069190791908919099191091911919129191391914919159191691917919189191991920919219192291923919249192591926919279192891929919309193191932919339193491935919369193791938919399194091941919429194391944919459194691947919489194991950919519195291953919549195591956919579195891959919609196191962919639196491965919669196791968919699197091971919729197391974919759197691977919789197991980919819198291983919849198591986919879198891989919909199191992919939199491995919969199791998919999200092001920029200392004920059200692007920089200992010920119201292013920149201592016920179201892019920209202192022920239202492025920269202792028920299203092031920329203392034920359203692037920389203992040920419204292043920449204592046920479204892049920509205192052920539205492055920569205792058920599206092061920629206392064920659206692067920689206992070920719207292073920749207592076920779207892079920809208192082920839208492085920869208792088920899209092091920929209392094920959209692097920989209992100921019210292103921049210592106921079210892109921109211192112921139211492115921169211792118921199212092121921229212392124921259212692127921289212992130921319213292133921349213592136921379213892139921409214192142921439214492145921469214792148921499215092151921529215392154921559215692157921589215992160921619216292163921649216592166921679216892169921709217192172921739217492175921769217792178921799218092181921829218392184921859218692187921889218992190921919219292193921949219592196921979219892199922009220192202922039220492205922069220792208922099221092211922129221392214922159221692217922189221992220922219222292223922249222592226922279222892229922309223192232922339223492235922369223792238922399224092241922429224392244922459224692247922489224992250922519225292253922549225592256922579225892259922609226192262922639226492265922669226792268922699227092271922729227392274922759227692277922789227992280922819228292283922849228592286922879228892289922909229192292922939229492295922969229792298922999230092301923029230392304923059230692307923089230992310923119231292313923149231592316923179231892319923209232192322923239232492325923269232792328923299233092331923329233392334923359233692337923389233992340923419234292343923449234592346923479234892349923509235192352923539235492355923569235792358923599236092361923629236392364923659236692367923689236992370923719237292373923749237592376923779237892379923809238192382923839238492385923869238792388923899239092391923929239392394923959239692397923989239992400924019240292403924049240592406924079240892409924109241192412924139241492415924169241792418924199242092421924229242392424924259242692427924289242992430924319243292433924349243592436924379243892439924409244192442924439244492445924469244792448924499245092451924529245392454924559245692457924589245992460924619246292463924649246592466924679246892469924709247192472924739247492475924769247792478924799248092481924829248392484924859248692487924889248992490924919249292493924949249592496924979249892499925009250192502925039250492505925069250792508925099251092511925129251392514925159251692517925189251992520925219252292523925249252592526925279252892529925309253192532925339253492535925369253792538925399254092541925429254392544925459254692547925489254992550925519255292553925549255592556925579255892559925609256192562925639256492565925669256792568925699257092571925729257392574925759257692577925789257992580925819258292583925849258592586925879258892589925909259192592925939259492595925969259792598925999260092601926029260392604926059260692607926089260992610926119261292613926149261592616926179261892619926209262192622926239262492625926269262792628926299263092631926329263392634926359263692637926389263992640926419264292643926449264592646926479264892649926509265192652926539265492655926569265792658926599266092661926629266392664926659266692667926689266992670926719267292673926749267592676926779267892679926809268192682926839268492685926869268792688926899269092691926929269392694926959269692697926989269992700927019270292703927049270592706927079270892709927109271192712927139271492715927169271792718927199272092721927229272392724927259272692727927289272992730927319273292733927349273592736927379273892739927409274192742927439274492745927469274792748927499275092751927529275392754927559275692757927589275992760927619276292763927649276592766927679276892769927709277192772927739277492775927769277792778927799278092781927829278392784927859278692787927889278992790927919279292793927949279592796927979279892799928009280192802928039280492805928069280792808928099281092811928129281392814928159281692817928189281992820928219282292823928249282592826928279282892829928309283192832928339283492835928369283792838928399284092841928429284392844928459284692847928489284992850928519285292853928549285592856928579285892859928609286192862928639286492865928669286792868928699287092871928729287392874928759287692877928789287992880928819288292883928849288592886928879288892889928909289192892928939289492895928969289792898928999290092901929029290392904929059290692907929089290992910929119291292913929149291592916929179291892919929209292192922929239292492925929269292792928929299293092931929329293392934929359293692937929389293992940929419294292943929449294592946929479294892949929509295192952929539295492955929569295792958929599296092961929629296392964929659296692967929689296992970929719297292973929749297592976929779297892979929809298192982929839298492985929869298792988929899299092991929929299392994929959299692997929989299993000930019300293003930049300593006930079300893009930109301193012930139301493015930169301793018930199302093021930229302393024930259302693027930289302993030930319303293033930349303593036930379303893039930409304193042930439304493045930469304793048930499305093051930529305393054930559305693057930589305993060930619306293063930649306593066930679306893069930709307193072930739307493075930769307793078930799308093081930829308393084930859308693087930889308993090930919309293093930949309593096930979309893099931009310193102931039310493105931069310793108931099311093111931129311393114931159311693117931189311993120931219312293123931249312593126931279312893129931309313193132931339313493135931369313793138931399314093141931429314393144931459314693147931489314993150931519315293153931549315593156931579315893159931609316193162931639316493165931669316793168931699317093171931729317393174931759317693177931789317993180931819318293183931849318593186931879318893189931909319193192931939319493195931969319793198931999320093201932029320393204932059320693207932089320993210932119321293213932149321593216932179321893219932209322193222932239322493225932269322793228932299323093231932329323393234932359323693237932389323993240932419324293243932449324593246932479324893249932509325193252932539325493255932569325793258932599326093261932629326393264932659326693267932689326993270932719327293273932749327593276932779327893279932809328193282932839328493285932869328793288932899329093291932929329393294932959329693297932989329993300933019330293303933049330593306933079330893309933109331193312933139331493315933169331793318933199332093321933229332393324933259332693327933289332993330933319333293333933349333593336933379333893339933409334193342933439334493345933469334793348933499335093351933529335393354933559335693357933589335993360933619336293363933649336593366933679336893369933709337193372933739337493375933769337793378933799338093381933829338393384933859338693387933889338993390933919339293393933949339593396933979339893399934009340193402934039340493405934069340793408934099341093411934129341393414934159341693417934189341993420934219342293423934249342593426934279342893429934309343193432934339343493435934369343793438934399344093441934429344393444934459344693447934489344993450934519345293453934549345593456934579345893459934609346193462934639346493465934669346793468934699347093471934729347393474934759347693477934789347993480934819348293483934849348593486934879348893489934909349193492934939349493495934969349793498934999350093501935029350393504935059350693507935089350993510935119351293513935149351593516935179351893519935209352193522935239352493525935269352793528935299353093531935329353393534935359353693537935389353993540935419354293543935449354593546935479354893549935509355193552935539355493555935569355793558935599356093561935629356393564935659356693567935689356993570935719357293573935749357593576935779357893579935809358193582935839358493585935869358793588935899359093591935929359393594935959359693597935989359993600936019360293603936049360593606936079360893609936109361193612936139361493615936169361793618936199362093621936229362393624936259362693627936289362993630936319363293633936349363593636936379363893639936409364193642936439364493645936469364793648936499365093651936529365393654936559365693657936589365993660936619366293663936649366593666936679366893669936709367193672936739367493675936769367793678936799368093681936829368393684936859368693687936889368993690936919369293693936949369593696936979369893699937009370193702937039370493705937069370793708937099371093711937129371393714937159371693717937189371993720937219372293723937249372593726937279372893729937309373193732937339373493735937369373793738937399374093741937429374393744937459374693747937489374993750937519375293753937549375593756937579375893759937609376193762937639376493765937669376793768937699377093771937729377393774937759377693777937789377993780937819378293783937849378593786937879378893789937909379193792937939379493795937969379793798937999380093801938029380393804938059380693807938089380993810938119381293813938149381593816938179381893819938209382193822938239382493825938269382793828938299383093831938329383393834938359383693837938389383993840938419384293843938449384593846938479384893849938509385193852938539385493855938569385793858938599386093861938629386393864938659386693867938689386993870938719387293873938749387593876938779387893879938809388193882938839388493885938869388793888938899389093891938929389393894938959389693897938989389993900939019390293903939049390593906939079390893909939109391193912939139391493915939169391793918939199392093921939229392393924939259392693927939289392993930939319393293933939349393593936939379393893939939409394193942939439394493945939469394793948939499395093951939529395393954939559395693957939589395993960939619396293963939649396593966939679396893969939709397193972939739397493975939769397793978939799398093981939829398393984939859398693987939889398993990939919399293993939949399593996939979399893999940009400194002940039400494005940069400794008940099401094011940129401394014940159401694017940189401994020940219402294023940249402594026940279402894029940309403194032940339403494035940369403794038940399404094041940429404394044940459404694047940489404994050940519405294053940549405594056940579405894059940609406194062940639406494065940669406794068940699407094071940729407394074940759407694077940789407994080940819408294083940849408594086940879408894089940909409194092940939409494095940969409794098940999410094101941029410394104941059410694107941089410994110941119411294113941149411594116941179411894119941209412194122941239412494125941269412794128941299413094131941329413394134941359413694137941389413994140941419414294143941449414594146941479414894149941509415194152941539415494155941569415794158941599416094161941629416394164941659416694167941689416994170941719417294173941749417594176941779417894179941809418194182941839418494185941869418794188941899419094191941929419394194941959419694197941989419994200942019420294203942049420594206942079420894209942109421194212942139421494215942169421794218942199422094221942229422394224942259422694227942289422994230942319423294233942349423594236942379423894239942409424194242942439424494245942469424794248942499425094251942529425394254942559425694257942589425994260942619426294263942649426594266942679426894269942709427194272942739427494275942769427794278942799428094281942829428394284942859428694287942889428994290942919429294293942949429594296942979429894299943009430194302943039430494305943069430794308943099431094311943129431394314943159431694317943189431994320943219432294323943249432594326943279432894329943309433194332943339433494335943369433794338943399434094341943429434394344943459434694347943489434994350943519435294353943549435594356943579435894359943609436194362943639436494365943669436794368943699437094371943729437394374943759437694377943789437994380943819438294383943849438594386943879438894389943909439194392943939439494395943969439794398943999440094401944029440394404944059440694407944089440994410944119441294413944149441594416944179441894419944209442194422944239442494425944269442794428944299443094431944329443394434944359443694437944389443994440944419444294443944449444594446944479444894449944509445194452944539445494455944569445794458944599446094461944629446394464944659446694467944689446994470944719447294473944749447594476944779447894479944809448194482944839448494485944869448794488944899449094491944929449394494944959449694497944989449994500945019450294503945049450594506945079450894509945109451194512945139451494515945169451794518945199452094521945229452394524945259452694527945289452994530945319453294533945349453594536945379453894539945409454194542945439454494545945469454794548945499455094551945529455394554945559455694557945589455994560945619456294563945649456594566945679456894569945709457194572945739457494575945769457794578945799458094581945829458394584945859458694587945889458994590945919459294593945949459594596945979459894599946009460194602946039460494605946069460794608946099461094611946129461394614946159461694617946189461994620946219462294623946249462594626946279462894629946309463194632946339463494635946369463794638946399464094641946429464394644946459464694647946489464994650946519465294653946549465594656946579465894659946609466194662946639466494665946669466794668946699467094671946729467394674946759467694677946789467994680946819468294683946849468594686946879468894689946909469194692946939469494695946969469794698946999470094701947029470394704947059470694707947089470994710947119471294713947149471594716947179471894719947209472194722947239472494725947269472794728947299473094731947329473394734947359473694737947389473994740947419474294743947449474594746947479474894749947509475194752947539475494755947569475794758947599476094761947629476394764947659476694767947689476994770947719477294773947749477594776947779477894779947809478194782947839478494785947869478794788947899479094791947929479394794947959479694797947989479994800948019480294803948049480594806948079480894809948109481194812948139481494815948169481794818948199482094821948229482394824948259482694827948289482994830948319483294833948349483594836948379483894839948409484194842948439484494845948469484794848948499485094851948529485394854948559485694857948589485994860948619486294863948649486594866948679486894869948709487194872948739487494875948769487794878948799488094881948829488394884948859488694887948889488994890948919489294893948949489594896948979489894899949009490194902949039490494905949069490794908949099491094911949129491394914949159491694917949189491994920949219492294923949249492594926949279492894929949309493194932949339493494935949369493794938949399494094941949429494394944949459494694947949489494994950949519495294953949549495594956949579495894959949609496194962949639496494965949669496794968949699497094971949729497394974949759497694977949789497994980949819498294983949849498594986949879498894989949909499194992949939499494995949969499794998949999500095001950029500395004950059500695007950089500995010950119501295013950149501595016950179501895019950209502195022950239502495025950269502795028950299503095031950329503395034950359503695037950389503995040950419504295043950449504595046950479504895049950509505195052950539505495055950569505795058950599506095061950629506395064950659506695067950689506995070950719507295073950749507595076950779507895079950809508195082950839508495085950869508795088950899509095091950929509395094950959509695097950989509995100951019510295103951049510595106951079510895109951109511195112951139511495115951169511795118951199512095121951229512395124951259512695127951289512995130951319513295133951349513595136951379513895139951409514195142951439514495145951469514795148951499515095151951529515395154951559515695157951589515995160951619516295163951649516595166951679516895169951709517195172951739517495175951769517795178951799518095181951829518395184951859518695187951889518995190951919519295193951949519595196951979519895199952009520195202952039520495205952069520795208952099521095211952129521395214952159521695217952189521995220952219522295223952249522595226952279522895229952309523195232952339523495235952369523795238952399524095241952429524395244952459524695247952489524995250952519525295253952549525595256952579525895259952609526195262952639526495265952669526795268952699527095271952729527395274952759527695277952789527995280952819528295283952849528595286952879528895289952909529195292952939529495295952969529795298952999530095301953029530395304953059530695307953089530995310953119531295313953149531595316953179531895319953209532195322953239532495325953269532795328953299533095331953329533395334953359533695337953389533995340953419534295343953449534595346953479534895349953509535195352953539535495355953569535795358953599536095361953629536395364953659536695367953689536995370953719537295373953749537595376953779537895379953809538195382953839538495385953869538795388953899539095391953929539395394953959539695397953989539995400954019540295403954049540595406954079540895409954109541195412954139541495415954169541795418954199542095421954229542395424954259542695427954289542995430954319543295433954349543595436954379543895439954409544195442954439544495445954469544795448954499545095451954529545395454954559545695457954589545995460954619546295463954649546595466954679546895469954709547195472954739547495475954769547795478954799548095481954829548395484954859548695487954889548995490954919549295493954949549595496954979549895499955009550195502955039550495505955069550795508955099551095511955129551395514955159551695517955189551995520955219552295523955249552595526955279552895529955309553195532955339553495535955369553795538955399554095541955429554395544955459554695547955489554995550955519555295553955549555595556955579555895559955609556195562955639556495565955669556795568955699557095571955729557395574955759557695577955789557995580955819558295583955849558595586955879558895589955909559195592955939559495595955969559795598955999560095601956029560395604956059560695607956089560995610956119561295613956149561595616956179561895619956209562195622956239562495625956269562795628956299563095631956329563395634956359563695637956389563995640956419564295643956449564595646956479564895649956509565195652956539565495655956569565795658956599566095661956629566395664956659566695667956689566995670956719567295673956749567595676956779567895679956809568195682956839568495685956869568795688956899569095691956929569395694956959569695697956989569995700957019570295703957049570595706957079570895709957109571195712957139571495715957169571795718957199572095721957229572395724957259572695727957289572995730957319573295733957349573595736957379573895739957409574195742957439574495745957469574795748957499575095751957529575395754957559575695757957589575995760957619576295763957649576595766957679576895769957709577195772957739577495775957769577795778957799578095781957829578395784957859578695787957889578995790957919579295793957949579595796957979579895799958009580195802958039580495805958069580795808958099581095811958129581395814958159581695817958189581995820958219582295823958249582595826958279582895829958309583195832958339583495835958369583795838958399584095841958429584395844958459584695847958489584995850958519585295853958549585595856958579585895859958609586195862958639586495865958669586795868958699587095871958729587395874958759587695877958789587995880958819588295883958849588595886958879588895889958909589195892958939589495895958969589795898958999590095901959029590395904959059590695907959089590995910959119591295913959149591595916959179591895919959209592195922959239592495925959269592795928959299593095931959329593395934959359593695937959389593995940959419594295943959449594595946959479594895949959509595195952959539595495955959569595795958959599596095961959629596395964959659596695967959689596995970959719597295973959749597595976959779597895979959809598195982959839598495985959869598795988959899599095991959929599395994959959599695997959989599996000960019600296003960049600596006960079600896009960109601196012960139601496015960169601796018960199602096021960229602396024960259602696027960289602996030960319603296033960349603596036960379603896039960409604196042960439604496045960469604796048960499605096051960529605396054960559605696057960589605996060960619606296063960649606596066960679606896069960709607196072960739607496075960769607796078960799608096081960829608396084960859608696087960889608996090960919609296093960949609596096960979609896099961009610196102961039610496105961069610796108961099611096111961129611396114961159611696117961189611996120961219612296123961249612596126961279612896129961309613196132961339613496135961369613796138961399614096141961429614396144961459614696147961489614996150961519615296153961549615596156961579615896159961609616196162961639616496165961669616796168961699617096171961729617396174961759617696177961789617996180961819618296183961849618596186961879618896189961909619196192961939619496195961969619796198961999620096201962029620396204962059620696207962089620996210962119621296213962149621596216962179621896219962209622196222962239622496225962269622796228962299623096231962329623396234962359623696237962389623996240962419624296243962449624596246962479624896249962509625196252962539625496255962569625796258962599626096261962629626396264962659626696267962689626996270962719627296273962749627596276962779627896279962809628196282962839628496285962869628796288962899629096291962929629396294962959629696297962989629996300963019630296303963049630596306963079630896309963109631196312963139631496315963169631796318963199632096321963229632396324963259632696327963289632996330963319633296333963349633596336963379633896339963409634196342963439634496345963469634796348963499635096351963529635396354963559635696357963589635996360963619636296363963649636596366963679636896369963709637196372963739637496375963769637796378963799638096381963829638396384963859638696387963889638996390963919639296393963949639596396963979639896399964009640196402964039640496405964069640796408964099641096411964129641396414964159641696417964189641996420964219642296423964249642596426964279642896429964309643196432964339643496435964369643796438964399644096441964429644396444964459644696447964489644996450964519645296453964549645596456964579645896459964609646196462964639646496465964669646796468964699647096471964729647396474964759647696477964789647996480964819648296483964849648596486964879648896489964909649196492964939649496495964969649796498964999650096501965029650396504965059650696507965089650996510965119651296513965149651596516965179651896519965209652196522965239652496525965269652796528965299653096531965329653396534965359653696537965389653996540965419654296543965449654596546965479654896549965509655196552965539655496555965569655796558965599656096561965629656396564965659656696567965689656996570965719657296573965749657596576965779657896579965809658196582965839658496585965869658796588965899659096591965929659396594965959659696597965989659996600966019660296603966049660596606966079660896609966109661196612966139661496615966169661796618966199662096621966229662396624966259662696627966289662996630966319663296633966349663596636966379663896639966409664196642966439664496645966469664796648966499665096651966529665396654966559665696657966589665996660966619666296663966649666596666966679666896669966709667196672966739667496675966769667796678966799668096681966829668396684966859668696687966889668996690966919669296693966949669596696966979669896699967009670196702967039670496705967069670796708967099671096711967129671396714967159671696717967189671996720967219672296723967249672596726967279672896729967309673196732967339673496735967369673796738967399674096741967429674396744967459674696747967489674996750967519675296753967549675596756967579675896759967609676196762967639676496765967669676796768967699677096771967729677396774967759677696777967789677996780967819678296783967849678596786967879678896789967909679196792967939679496795967969679796798967999680096801968029680396804968059680696807968089680996810968119681296813968149681596816968179681896819968209682196822968239682496825968269682796828968299683096831968329683396834968359683696837968389683996840968419684296843968449684596846968479684896849968509685196852968539685496855968569685796858968599686096861968629686396864968659686696867968689686996870968719687296873968749687596876968779687896879968809688196882968839688496885968869688796888968899689096891968929689396894968959689696897968989689996900969019690296903969049690596906969079690896909969109691196912969139691496915969169691796918969199692096921969229692396924969259692696927969289692996930969319693296933969349693596936969379693896939969409694196942969439694496945969469694796948969499695096951969529695396954969559695696957969589695996960969619696296963969649696596966969679696896969969709697196972969739697496975969769697796978969799698096981969829698396984969859698696987969889698996990969919699296993969949699596996969979699896999970009700197002970039700497005970069700797008970099701097011970129701397014970159701697017970189701997020970219702297023970249702597026970279702897029970309703197032970339703497035970369703797038970399704097041970429704397044970459704697047970489704997050970519705297053970549705597056970579705897059970609706197062970639706497065970669706797068970699707097071970729707397074970759707697077970789707997080970819708297083970849708597086970879708897089970909709197092970939709497095970969709797098970999710097101971029710397104971059710697107971089710997110971119711297113971149711597116971179711897119971209712197122971239712497125971269712797128971299713097131971329713397134971359713697137971389713997140971419714297143971449714597146971479714897149971509715197152971539715497155971569715797158971599716097161971629716397164971659716697167971689716997170971719717297173971749717597176971779717897179971809718197182971839718497185971869718797188971899719097191971929719397194971959719697197971989719997200972019720297203972049720597206972079720897209972109721197212972139721497215972169721797218972199722097221972229722397224972259722697227972289722997230972319723297233972349723597236972379723897239972409724197242972439724497245972469724797248972499725097251972529725397254972559725697257972589725997260972619726297263972649726597266972679726897269972709727197272972739727497275972769727797278972799728097281972829728397284972859728697287972889728997290972919729297293972949729597296972979729897299973009730197302973039730497305973069730797308973099731097311973129731397314973159731697317973189731997320973219732297323973249732597326973279732897329973309733197332973339733497335973369733797338973399734097341973429734397344973459734697347973489734997350973519735297353973549735597356973579735897359973609736197362973639736497365973669736797368973699737097371973729737397374973759737697377973789737997380973819738297383973849738597386973879738897389973909739197392973939739497395973969739797398973999740097401974029740397404974059740697407974089740997410974119741297413974149741597416974179741897419974209742197422974239742497425974269742797428974299743097431974329743397434974359743697437974389743997440974419744297443974449744597446974479744897449974509745197452974539745497455974569745797458974599746097461974629746397464974659746697467974689746997470974719747297473974749747597476974779747897479974809748197482974839748497485974869748797488974899749097491974929749397494974959749697497974989749997500975019750297503975049750597506975079750897509975109751197512975139751497515975169751797518975199752097521975229752397524975259752697527975289752997530975319753297533975349753597536975379753897539975409754197542975439754497545975469754797548975499755097551975529755397554975559755697557975589755997560975619756297563975649756597566975679756897569975709757197572975739757497575975769757797578975799758097581975829758397584975859758697587975889758997590975919759297593975949759597596975979759897599976009760197602976039760497605976069760797608976099761097611976129761397614976159761697617976189761997620976219762297623976249762597626976279762897629976309763197632976339763497635976369763797638976399764097641976429764397644976459764697647976489764997650976519765297653976549765597656976579765897659976609766197662976639766497665976669766797668976699767097671976729767397674976759767697677976789767997680976819768297683976849768597686976879768897689976909769197692976939769497695976969769797698976999770097701977029770397704977059770697707977089770997710977119771297713977149771597716977179771897719977209772197722977239772497725977269772797728977299773097731977329773397734977359773697737977389773997740977419774297743977449774597746977479774897749977509775197752977539775497755977569775797758977599776097761977629776397764977659776697767977689776997770977719777297773977749777597776977779777897779977809778197782977839778497785977869778797788977899779097791977929779397794977959779697797977989779997800978019780297803978049780597806978079780897809978109781197812978139781497815978169781797818978199782097821978229782397824978259782697827978289782997830978319783297833978349783597836978379783897839978409784197842978439784497845978469784797848978499785097851978529785397854978559785697857978589785997860978619786297863978649786597866978679786897869978709787197872978739787497875978769787797878978799788097881978829788397884978859788697887978889788997890978919789297893978949789597896978979789897899979009790197902979039790497905979069790797908979099791097911979129791397914979159791697917979189791997920979219792297923979249792597926979279792897929979309793197932979339793497935979369793797938979399794097941979429794397944979459794697947979489794997950979519795297953979549795597956979579795897959979609796197962979639796497965979669796797968979699797097971979729797397974979759797697977979789797997980979819798297983979849798597986979879798897989979909799197992979939799497995979969799797998979999800098001980029800398004980059800698007980089800998010980119801298013980149801598016980179801898019980209802198022980239802498025980269802798028980299803098031980329803398034980359803698037980389803998040980419804298043980449804598046980479804898049980509805198052980539805498055980569805798058980599806098061980629806398064980659806698067980689806998070980719807298073980749807598076980779807898079980809808198082980839808498085980869808798088980899809098091980929809398094980959809698097980989809998100981019810298103981049810598106981079810898109981109811198112981139811498115981169811798118981199812098121981229812398124981259812698127981289812998130981319813298133981349813598136981379813898139981409814198142981439814498145981469814798148981499815098151981529815398154981559815698157981589815998160981619816298163981649816598166981679816898169981709817198172981739817498175981769817798178981799818098181981829818398184981859818698187981889818998190981919819298193981949819598196981979819898199982009820198202982039820498205982069820798208982099821098211982129821398214982159821698217982189821998220982219822298223982249822598226982279822898229982309823198232982339823498235982369823798238982399824098241982429824398244982459824698247982489824998250982519825298253982549825598256982579825898259982609826198262982639826498265982669826798268982699827098271982729827398274982759827698277982789827998280982819828298283982849828598286982879828898289982909829198292982939829498295982969829798298982999830098301983029830398304983059830698307983089830998310983119831298313983149831598316983179831898319983209832198322983239832498325983269832798328983299833098331983329833398334983359833698337983389833998340983419834298343983449834598346983479834898349983509835198352983539835498355983569835798358983599836098361983629836398364983659836698367983689836998370983719837298373983749837598376983779837898379983809838198382983839838498385983869838798388983899839098391983929839398394983959839698397983989839998400984019840298403984049840598406984079840898409984109841198412984139841498415984169841798418984199842098421984229842398424984259842698427984289842998430984319843298433984349843598436984379843898439984409844198442984439844498445984469844798448984499845098451984529845398454984559845698457984589845998460984619846298463984649846598466984679846898469984709847198472984739847498475984769847798478984799848098481984829848398484984859848698487984889848998490984919849298493984949849598496984979849898499985009850198502985039850498505985069850798508985099851098511985129851398514985159851698517985189851998520985219852298523985249852598526985279852898529985309853198532985339853498535985369853798538985399854098541985429854398544985459854698547985489854998550985519855298553985549855598556985579855898559985609856198562985639856498565985669856798568985699857098571985729857398574985759857698577985789857998580985819858298583985849858598586985879858898589985909859198592985939859498595985969859798598985999860098601986029860398604986059860698607986089860998610986119861298613986149861598616986179861898619986209862198622986239862498625986269862798628986299863098631986329863398634986359863698637986389863998640986419864298643986449864598646986479864898649986509865198652986539865498655986569865798658986599866098661986629866398664986659866698667986689866998670986719867298673986749867598676986779867898679986809868198682986839868498685986869868798688986899869098691986929869398694986959869698697986989869998700987019870298703987049870598706987079870898709987109871198712987139871498715987169871798718987199872098721987229872398724987259872698727987289872998730987319873298733987349873598736987379873898739987409874198742987439874498745987469874798748987499875098751987529875398754987559875698757987589875998760987619876298763987649876598766987679876898769987709877198772987739877498775987769877798778987799878098781987829878398784987859878698787987889878998790987919879298793987949879598796987979879898799988009880198802988039880498805988069880798808988099881098811988129881398814988159881698817988189881998820988219882298823988249882598826988279882898829988309883198832988339883498835988369883798838988399884098841988429884398844988459884698847988489884998850988519885298853988549885598856988579885898859988609886198862988639886498865988669886798868988699887098871988729887398874988759887698877988789887998880988819888298883988849888598886988879888898889988909889198892988939889498895988969889798898988999890098901989029890398904989059890698907989089890998910989119891298913989149891598916989179891898919989209892198922989239892498925989269892798928989299893098931989329893398934989359893698937989389893998940989419894298943989449894598946989479894898949989509895198952989539895498955989569895798958989599896098961989629896398964989659896698967989689896998970989719897298973989749897598976989779897898979989809898198982989839898498985989869898798988989899899098991989929899398994989959899698997989989899999000990019900299003990049900599006990079900899009990109901199012990139901499015990169901799018990199902099021990229902399024990259902699027990289902999030990319903299033990349903599036990379903899039990409904199042990439904499045990469904799048990499905099051990529905399054990559905699057990589905999060990619906299063990649906599066990679906899069990709907199072990739907499075990769907799078990799908099081990829908399084990859908699087990889908999090990919909299093990949909599096990979909899099991009910199102991039910499105991069910799108991099911099111991129911399114991159911699117991189911999120991219912299123991249912599126991279912899129991309913199132991339913499135991369913799138991399914099141991429914399144991459914699147991489914999150991519915299153991549915599156991579915899159991609916199162991639916499165991669916799168991699917099171991729917399174991759917699177991789917999180991819918299183991849918599186991879918899189991909919199192991939919499195991969919799198991999920099201992029920399204992059920699207992089920999210992119921299213992149921599216992179921899219992209922199222992239922499225992269922799228992299923099231992329923399234992359923699237992389923999240992419924299243992449924599246992479924899249992509925199252992539925499255992569925799258992599926099261992629926399264992659926699267992689926999270992719927299273992749927599276992779927899279992809928199282992839928499285992869928799288992899929099291992929929399294992959929699297992989929999300993019930299303993049930599306993079930899309993109931199312993139931499315993169931799318993199932099321993229932399324993259932699327993289932999330993319933299333993349933599336993379933899339993409934199342993439934499345993469934799348993499935099351993529935399354993559935699357993589935999360993619936299363993649936599366993679936899369993709937199372993739937499375993769937799378993799938099381993829938399384993859938699387993889938999390993919939299393993949939599396993979939899399994009940199402994039940499405994069940799408994099941099411994129941399414994159941699417994189941999420994219942299423994249942599426994279942899429994309943199432994339943499435994369943799438994399944099441994429944399444994459944699447994489944999450994519945299453994549945599456994579945899459994609946199462994639946499465994669946799468994699947099471994729947399474994759947699477994789947999480994819948299483994849948599486994879948899489994909949199492994939949499495994969949799498994999950099501995029950399504995059950699507995089950999510995119951299513995149951599516995179951899519995209952199522995239952499525995269952799528995299953099531995329953399534995359953699537995389953999540995419954299543995449954599546995479954899549995509955199552995539955499555995569955799558995599956099561995629956399564995659956699567995689956999570995719957299573995749957599576995779957899579995809958199582995839958499585995869958799588995899959099591995929959399594995959959699597995989959999600996019960299603996049960599606996079960899609996109961199612996139961499615996169961799618996199962099621996229962399624996259962699627996289962999630996319963299633996349963599636996379963899639996409964199642996439964499645996469964799648996499965099651996529965399654996559965699657996589965999660996619966299663996649966599666996679966899669996709967199672996739967499675996769967799678996799968099681996829968399684996859968699687996889968999690996919969299693996949969599696996979969899699997009970199702997039970499705997069970799708997099971099711997129971399714997159971699717997189971999720997219972299723997249972599726997279972899729997309973199732997339973499735997369973799738997399974099741997429974399744997459974699747997489974999750997519975299753997549975599756997579975899759997609976199762997639976499765997669976799768997699977099771997729977399774997759977699777997789977999780997819978299783997849978599786997879978899789997909979199792997939979499795997969979799798997999980099801998029980399804998059980699807998089980999810998119981299813998149981599816998179981899819998209982199822998239982499825998269982799828998299983099831998329983399834998359983699837998389983999840998419984299843998449984599846998479984899849998509985199852998539985499855998569985799858998599986099861998629986399864998659986699867998689986999870998719987299873998749987599876998779987899879998809988199882998839988499885998869988799888998899989099891998929989399894998959989699897998989989999900999019990299903999049990599906999079990899909999109991199912999139991499915999169991799918999199992099921999229992399924999259992699927999289992999930999319993299933999349993599936999379993899939999409994199942999439994499945999469994799948999499995099951999529995399954999559995699957999589995999960999619996299963999649996599966999679996899969999709997199972999739997499975999769997799978999799998099981999829998399984999859998699987999889998999990999919999299993999949999599996999979999899999100000100001100002100003100004100005100006100007100008100009100010100011100012100013100014100015100016100017100018100019100020100021100022100023100024100025100026100027100028100029100030100031100032100033100034100035100036100037100038100039100040100041100042100043100044100045100046100047100048100049100050100051100052100053100054100055100056100057100058100059100060100061100062100063100064100065100066100067100068100069100070100071100072100073100074100075100076100077100078100079100080100081100082100083100084100085100086100087100088100089100090100091100092100093100094100095100096100097100098100099100100100101100102100103100104100105100106100107100108100109100110100111100112100113100114100115100116100117100118100119100120100121100122100123100124100125100126100127100128100129100130100131100132100133100134100135100136100137100138100139100140100141100142100143100144100145100146100147100148100149100150100151100152100153100154100155100156100157100158100159100160100161100162100163100164100165100166100167100168100169100170100171100172100173100174100175100176100177100178100179100180100181100182100183100184100185100186100187100188100189100190100191100192100193100194100195100196100197100198100199100200100201100202100203100204100205100206100207100208100209100210100211100212100213100214100215100216100217100218100219100220100221100222100223100224100225100226100227100228100229100230100231100232100233100234100235100236100237100238100239100240100241100242100243100244100245100246100247100248100249100250100251100252100253100254100255100256100257100258100259100260100261100262100263100264100265100266100267100268100269100270100271100272100273100274100275100276100277100278100279100280100281100282100283100284100285100286100287100288100289100290100291100292100293100294100295100296100297100298100299100300100301100302100303100304100305100306100307100308100309100310100311100312100313100314100315100316100317100318100319100320100321100322100323100324100325100326100327100328100329100330100331100332100333100334100335100336100337100338100339100340100341100342100343100344100345100346100347100348100349100350100351100352100353100354100355100356100357100358100359100360100361100362100363100364100365100366100367100368100369100370100371100372100373100374100375100376100377100378100379100380100381100382100383100384100385100386100387100388100389100390100391100392100393100394100395100396100397100398100399100400100401100402100403100404100405100406100407100408100409100410100411100412100413100414100415100416100417100418100419100420100421100422100423100424100425100426100427100428100429100430100431100432100433100434100435100436100437100438100439100440100441100442100443100444100445100446100447100448100449100450100451100452100453100454100455100456100457100458100459100460100461100462100463100464100465100466100467100468100469100470100471100472100473100474100475100476100477100478100479100480100481100482100483100484100485100486100487100488100489100490100491100492100493100494100495100496100497100498100499100500100501100502100503100504100505100506100507100508100509100510100511100512100513100514100515100516100517100518100519100520100521100522100523100524100525100526100527100528100529100530100531100532100533100534100535100536100537100538100539100540100541100542100543100544100545100546100547100548100549100550100551100552100553100554100555100556100557100558100559100560100561100562100563100564100565100566100567100568100569100570100571100572100573100574100575100576100577100578100579100580100581100582100583100584100585100586100587100588100589100590100591100592100593100594100595100596100597100598100599100600100601100602100603100604100605100606100607100608100609100610100611100612100613100614100615100616100617100618100619100620100621100622100623100624100625100626100627100628100629100630100631100632100633100634100635100636100637100638100639100640100641100642100643100644100645100646100647100648100649100650100651100652100653100654100655100656100657100658100659100660100661100662100663100664100665100666100667100668100669100670100671100672100673100674100675100676100677100678100679100680100681100682100683100684100685100686100687100688100689100690100691100692100693100694100695100696100697100698100699100700100701100702100703100704100705100706100707100708100709100710100711100712100713100714100715100716100717100718100719100720100721100722100723100724100725100726100727100728100729100730100731100732100733100734100735100736100737100738100739100740100741100742100743100744100745100746100747100748100749100750100751100752100753100754100755100756100757100758100759100760100761100762100763100764100765100766100767100768100769100770100771100772100773100774100775100776100777100778100779100780100781100782100783100784100785100786100787100788100789100790100791100792100793100794100795100796100797100798100799100800100801100802100803100804100805100806100807100808100809100810100811100812100813100814100815100816100817100818100819100820100821100822100823100824100825100826100827100828100829100830100831100832100833100834100835100836100837100838100839100840100841100842100843100844100845100846100847100848100849100850100851100852100853100854100855100856100857100858100859100860100861100862100863100864100865100866100867100868100869100870100871100872100873100874100875100876100877100878100879100880100881100882100883100884100885100886100887100888100889100890100891100892100893100894100895100896100897100898100899100900100901100902100903100904100905100906100907100908100909100910100911100912100913100914100915100916100917100918100919100920100921100922100923100924100925100926100927100928100929100930100931100932100933100934100935100936100937100938100939100940100941100942100943100944100945100946100947100948100949100950100951100952100953100954100955100956100957100958100959100960100961100962100963100964100965100966100967100968100969100970100971100972100973100974100975100976100977100978100979100980100981100982100983100984100985100986100987100988100989100990100991100992100993100994100995100996100997100998100999101000101001101002101003101004101005101006101007101008101009101010101011101012101013101014101015101016101017101018101019101020101021101022101023101024101025101026101027101028101029101030101031101032101033101034101035101036101037101038101039101040101041101042101043101044101045101046101047101048101049101050101051101052101053101054101055101056101057101058101059101060101061101062101063101064101065101066101067101068101069101070101071101072101073101074101075101076101077101078101079101080101081101082101083101084101085101086101087101088101089101090101091101092101093101094101095101096101097101098101099101100101101101102101103101104101105101106101107101108101109101110101111101112101113101114101115101116101117101118101119101120101121101122101123101124101125101126101127101128101129101130101131101132101133101134101135101136101137101138101139101140101141101142101143101144101145101146101147101148101149101150101151101152101153101154101155101156101157101158101159101160101161101162101163101164101165101166101167101168101169101170101171101172101173101174101175101176101177101178101179101180101181101182101183101184101185101186101187101188101189101190101191101192101193101194101195101196101197101198101199101200101201101202101203101204101205101206101207101208101209101210101211101212101213101214101215101216101217101218101219101220101221101222101223101224101225101226101227101228101229101230101231101232101233101234101235101236101237101238101239101240101241101242101243101244101245101246101247101248101249101250101251101252101253101254101255101256101257101258101259101260101261101262101263101264101265101266101267101268101269101270101271101272101273101274101275101276101277101278101279101280101281101282101283101284101285101286101287101288101289101290101291101292101293101294101295101296101297101298101299101300101301101302101303101304101305101306101307101308101309101310101311101312101313101314101315101316101317101318101319101320101321101322101323101324101325101326101327101328101329101330101331101332101333101334101335101336101337101338101339101340101341101342101343101344101345101346101347101348101349101350101351101352101353101354101355101356101357101358101359101360101361101362101363101364101365101366101367101368101369101370101371101372101373101374101375101376101377101378101379101380101381101382101383101384101385101386101387101388101389101390101391101392101393101394101395101396101397101398101399101400101401101402101403101404101405101406101407101408101409101410101411101412101413101414101415101416101417101418101419101420101421101422101423101424101425101426101427101428101429101430101431101432101433101434101435101436101437101438101439101440101441101442101443101444101445101446101447101448101449101450101451101452101453101454101455101456101457101458101459101460101461101462101463101464101465101466101467101468101469101470101471101472101473101474101475101476101477101478101479101480101481101482101483101484101485101486101487101488101489101490101491101492101493101494101495101496101497101498101499101500101501101502101503101504101505101506101507101508101509101510101511101512101513101514101515101516101517101518101519101520101521101522101523101524101525101526101527101528101529101530101531101532101533101534101535101536101537101538101539101540101541101542101543101544101545101546101547101548101549101550101551101552101553101554101555101556101557101558101559101560101561101562101563101564101565101566101567101568101569101570101571101572101573101574101575101576101577101578101579101580101581101582101583101584101585101586101587101588101589101590101591101592101593101594101595101596101597101598101599101600101601101602101603101604101605101606101607101608101609101610101611101612101613101614101615101616101617101618101619101620101621101622101623101624101625101626101627101628101629101630101631101632101633101634101635101636101637101638101639101640101641101642101643101644101645101646101647101648101649101650101651101652101653101654101655101656101657101658101659101660101661101662101663101664101665101666101667101668101669101670101671101672101673101674101675101676101677101678101679101680101681101682101683101684101685101686101687101688101689101690101691101692101693101694101695101696101697101698101699101700101701101702101703101704101705101706101707101708101709101710101711101712101713101714101715101716101717101718101719101720101721101722101723101724101725101726101727101728101729101730101731101732101733101734101735101736101737101738101739101740101741101742101743101744101745101746101747101748101749101750101751101752101753101754101755101756101757101758101759101760101761101762101763101764101765101766101767101768101769101770101771101772101773101774101775101776101777101778101779101780101781101782101783101784101785101786101787101788101789101790101791101792101793101794101795101796101797101798101799101800101801101802101803101804101805101806101807101808101809101810101811101812101813101814101815101816101817101818101819101820101821101822101823101824101825101826101827101828101829101830101831101832101833101834101835101836101837101838101839101840101841101842101843101844101845101846101847101848101849101850101851101852101853101854101855101856101857101858101859101860101861101862101863101864101865101866101867101868101869101870101871101872101873101874101875101876101877101878101879101880101881101882101883101884101885101886101887101888101889101890101891101892101893101894101895101896101897101898101899101900101901101902101903101904101905101906101907101908101909101910101911101912101913101914101915101916101917101918101919101920101921101922101923101924101925101926101927101928101929101930101931101932101933101934101935101936101937101938101939101940101941101942101943101944101945101946101947101948101949101950101951101952101953101954101955101956101957101958101959101960101961101962101963101964101965101966101967101968101969101970101971101972101973101974101975101976101977101978101979101980101981101982101983101984101985101986101987101988101989101990101991101992101993101994101995101996101997101998101999102000102001102002102003102004102005102006102007102008102009102010102011102012102013102014102015102016102017102018102019102020102021102022102023102024102025102026102027102028102029102030102031102032102033102034102035102036102037102038102039102040102041102042102043102044102045102046102047102048102049102050102051102052102053102054102055102056102057102058102059102060102061102062102063102064102065102066102067102068102069102070102071102072102073102074102075102076102077102078102079102080102081102082102083102084102085102086102087102088102089102090102091102092102093102094102095102096102097102098102099102100102101102102102103102104102105102106102107102108102109102110102111102112102113102114102115102116102117102118102119102120102121102122102123102124102125102126102127102128102129102130102131102132102133102134102135102136102137102138102139102140102141102142102143102144102145102146102147102148102149102150102151102152102153102154102155102156102157102158102159102160102161102162102163102164102165102166102167102168102169102170102171102172102173102174102175102176102177102178102179102180102181102182102183102184102185102186102187102188102189102190102191102192102193102194102195102196102197102198102199102200102201102202102203102204102205102206102207102208102209102210102211102212102213102214102215102216102217102218102219102220102221102222102223102224102225102226102227102228102229102230102231102232102233102234102235102236102237102238102239102240102241102242102243102244102245102246102247102248102249102250102251102252102253102254102255102256102257102258102259102260102261102262102263102264102265102266102267102268102269102270102271102272102273102274102275102276102277102278102279102280102281102282102283102284102285102286102287102288102289102290102291102292102293102294102295102296102297102298102299102300102301102302102303102304102305102306102307102308102309102310102311102312102313102314102315102316102317102318102319102320102321102322102323102324102325102326102327102328102329102330102331102332102333102334102335102336102337102338102339102340102341102342102343102344102345102346102347102348102349102350102351102352102353102354102355102356102357102358102359102360102361102362102363102364102365102366102367102368102369102370102371102372102373102374102375102376102377102378102379102380102381102382102383102384102385102386102387102388102389102390102391102392102393102394102395102396102397102398102399102400102401102402102403102404102405102406102407102408102409102410102411102412102413102414102415102416102417102418102419102420102421102422102423102424102425102426102427102428102429102430102431102432102433102434102435102436102437102438102439102440102441102442102443102444102445102446102447102448102449102450102451102452102453102454102455102456102457102458102459102460102461102462102463102464102465102466102467102468102469102470102471102472102473102474102475102476102477102478102479102480102481102482102483102484102485102486102487102488102489102490102491102492102493102494102495102496102497102498102499102500102501102502102503102504102505102506102507102508102509102510102511102512102513102514102515102516102517102518102519102520102521102522102523102524102525102526102527102528102529102530102531102532102533102534102535102536102537102538102539102540102541102542102543102544102545102546102547102548102549102550102551102552102553102554102555102556102557102558102559102560102561102562102563102564102565102566102567102568102569102570102571102572102573102574102575102576102577102578102579102580102581102582102583102584102585102586102587102588102589102590102591102592102593102594102595102596102597102598102599102600102601102602102603102604102605102606102607102608102609102610102611102612102613102614102615102616102617102618102619102620102621102622102623102624102625102626102627102628102629102630102631102632102633102634102635102636102637102638102639102640102641102642102643102644102645102646102647102648102649102650102651102652102653102654102655102656102657102658102659102660102661102662102663102664102665102666102667102668102669102670102671102672102673102674102675102676102677102678102679102680102681102682102683102684102685102686102687102688102689102690102691102692102693102694102695102696102697102698102699102700102701102702102703102704102705102706102707102708102709102710102711102712102713102714102715102716102717102718102719102720102721102722102723102724102725102726102727102728102729102730102731102732102733102734102735102736102737102738102739102740102741102742102743102744102745102746102747102748102749102750102751102752102753102754102755102756102757102758102759102760102761102762102763102764102765102766102767102768102769102770102771102772102773102774102775102776102777102778102779102780102781102782102783102784102785102786102787102788102789102790102791102792102793102794102795102796102797102798102799102800102801102802102803102804102805102806102807102808102809102810102811102812102813102814102815102816102817102818102819102820102821102822102823102824102825102826102827102828102829102830102831102832102833102834102835102836102837102838102839102840102841102842102843102844102845102846102847102848102849102850102851102852102853102854102855102856102857102858102859102860102861102862102863102864102865102866102867102868102869102870102871102872102873102874102875102876102877102878102879102880102881102882102883102884102885102886102887102888102889102890102891102892102893102894102895102896102897102898102899102900102901102902102903102904102905102906102907102908102909102910102911102912102913102914102915102916102917102918102919102920102921102922102923102924102925102926102927102928102929102930102931102932102933102934102935102936102937102938102939102940102941102942102943102944102945102946102947102948102949102950102951102952102953102954102955102956102957102958102959102960102961102962102963102964102965102966102967102968102969102970102971102972102973102974102975102976102977102978102979102980102981102982102983102984102985102986102987102988102989102990102991102992102993102994102995102996102997102998102999103000103001103002103003103004103005103006103007103008103009103010103011103012103013103014103015103016103017103018103019103020103021103022103023103024103025103026103027103028103029103030103031103032103033103034103035103036103037103038103039103040103041103042103043103044103045103046103047103048103049103050103051103052103053103054103055103056103057103058103059103060103061103062103063103064103065103066103067103068103069103070103071103072103073103074103075103076103077103078103079103080103081103082103083103084103085103086103087103088103089103090103091103092103093103094103095103096103097103098103099103100103101103102103103103104103105103106103107103108103109103110103111103112103113103114103115103116103117103118103119103120103121103122103123103124103125103126103127103128103129103130103131103132103133103134103135103136103137103138103139103140103141103142103143103144103145103146103147103148103149103150103151103152103153103154103155103156103157103158103159103160103161103162103163103164103165103166103167103168103169103170103171103172103173103174103175103176103177103178103179103180103181103182103183103184103185103186103187103188103189103190103191103192103193103194103195103196103197103198103199103200103201103202103203103204103205103206103207103208103209103210103211103212103213103214103215103216103217103218103219103220103221103222103223103224103225103226103227103228103229103230103231103232103233103234103235103236103237103238103239103240103241103242103243103244103245103246103247103248103249103250103251103252103253103254103255103256103257103258103259103260103261103262103263103264103265103266103267103268103269103270103271103272103273103274103275103276103277103278103279103280103281103282103283103284103285103286103287103288103289103290103291103292103293103294103295103296103297103298103299103300103301103302103303103304103305103306103307103308103309103310103311103312103313103314103315103316103317103318103319103320103321103322103323103324103325103326103327103328103329103330103331103332103333103334103335103336103337103338103339103340103341103342103343103344103345103346103347103348103349103350103351103352103353103354103355103356103357103358103359103360103361103362103363103364103365103366103367103368103369103370103371103372103373103374103375103376103377103378103379103380103381103382103383103384103385103386103387103388103389103390103391103392103393103394103395103396103397103398103399103400103401103402103403103404103405103406103407103408103409103410103411103412103413103414103415103416103417103418103419103420103421103422103423103424103425103426103427103428103429103430103431103432103433103434103435103436103437103438103439103440103441103442103443103444103445103446103447103448103449103450103451103452103453103454103455103456103457103458103459103460103461103462103463103464103465103466103467103468103469103470103471103472103473103474103475103476103477103478103479103480103481103482103483103484103485103486103487103488103489103490103491103492103493103494103495103496103497103498103499103500103501103502103503103504103505103506103507103508103509103510103511103512103513103514103515103516103517103518103519103520103521103522103523103524103525103526103527103528103529103530103531103532103533103534103535103536103537103538103539103540103541103542103543103544103545103546103547103548103549103550103551103552103553103554103555103556103557103558103559103560103561103562103563103564103565103566103567103568103569103570103571103572103573103574103575103576103577103578103579103580103581103582103583103584103585103586103587103588103589103590103591103592103593103594103595103596103597103598103599103600103601103602103603103604103605103606103607103608103609103610103611103612103613103614103615103616103617103618103619103620103621103622103623103624103625103626103627103628103629103630103631103632103633103634103635103636103637103638103639103640103641103642103643103644103645103646103647103648103649103650103651103652103653103654103655103656103657103658103659103660103661103662103663103664103665103666103667103668103669103670103671103672103673103674103675103676103677103678103679103680103681103682103683103684103685103686103687103688103689103690103691103692103693103694103695103696103697103698103699103700103701103702103703103704103705103706103707103708103709103710103711103712103713103714103715103716103717103718103719103720103721103722103723103724103725103726103727103728103729103730103731103732103733103734103735103736103737103738103739103740103741103742103743103744103745103746103747103748103749103750103751103752103753103754103755103756103757103758103759103760103761103762103763103764103765103766103767103768103769103770103771103772103773103774103775103776103777103778103779103780103781103782103783103784103785103786103787103788103789103790103791103792103793103794103795103796103797103798103799103800103801103802103803103804103805103806103807103808103809103810103811103812103813103814103815103816103817103818103819103820103821103822103823103824103825103826103827103828103829103830103831103832103833103834103835103836103837103838103839103840103841103842103843103844103845103846103847103848103849103850103851103852103853103854103855103856103857103858103859103860103861103862103863103864103865103866103867103868103869103870103871103872103873103874103875103876103877103878103879103880103881103882103883103884103885103886103887103888103889103890103891103892103893103894103895103896103897103898103899103900103901103902103903103904103905103906103907103908103909103910103911103912103913103914103915103916103917103918103919103920103921103922103923103924103925103926103927103928103929103930103931103932103933103934103935103936103937103938103939103940103941103942103943103944103945103946103947103948103949103950103951103952103953103954103955103956103957103958103959103960103961103962103963103964103965103966103967103968103969103970103971103972103973103974103975103976103977103978103979103980103981103982103983103984103985103986103987103988103989103990103991103992103993103994103995103996103997103998103999104000104001104002104003104004104005104006104007104008104009104010104011104012104013104014104015104016104017104018104019104020104021104022104023104024104025104026104027104028104029104030104031104032104033104034104035104036104037104038104039104040104041104042104043104044104045104046104047104048104049104050104051104052104053104054104055104056104057104058104059104060104061104062104063104064104065104066104067104068104069104070104071104072104073104074104075104076104077104078104079104080104081104082104083104084104085104086104087104088104089104090104091104092104093104094104095104096104097104098104099104100104101104102104103104104104105104106104107104108104109104110104111104112104113104114104115104116104117104118104119104120104121104122104123104124104125104126104127104128104129104130104131104132104133104134104135104136104137104138104139104140104141104142104143104144104145104146104147104148104149104150104151104152104153104154104155104156104157104158104159104160104161104162104163104164104165104166104167104168104169104170104171104172104173104174104175104176104177104178104179104180104181104182104183104184104185104186104187104188104189104190104191104192104193104194104195104196104197104198104199104200104201104202104203104204104205104206104207104208104209104210104211104212104213104214104215104216104217104218104219104220104221104222104223104224104225104226104227104228104229104230104231104232104233104234104235104236104237104238104239104240104241104242104243104244104245104246104247104248104249104250104251104252104253104254104255104256104257104258104259104260104261104262104263104264104265104266104267104268104269104270104271104272104273104274104275104276104277104278104279104280104281104282104283104284104285104286104287104288104289104290104291104292104293104294104295104296104297104298104299104300104301104302104303104304104305104306104307104308104309104310104311104312104313104314104315104316104317104318104319104320104321104322104323104324104325104326104327104328104329104330104331104332104333104334104335104336104337104338104339104340104341104342104343104344104345104346104347104348104349104350104351104352104353104354104355104356104357104358104359104360104361104362104363104364104365104366104367104368104369104370104371104372104373104374104375104376104377104378104379104380104381104382104383104384104385104386104387104388104389104390104391104392104393104394104395104396104397104398104399104400104401104402104403104404104405104406104407104408104409104410104411104412104413104414104415104416104417104418104419104420104421104422104423104424104425104426104427104428104429104430104431104432104433104434104435104436104437104438104439104440104441104442104443104444104445104446104447104448104449104450104451104452104453104454104455104456104457104458104459104460104461104462104463104464104465104466104467104468104469104470104471104472104473104474104475104476104477104478104479104480104481104482104483104484104485104486104487104488104489104490104491104492104493104494104495104496104497104498104499104500104501104502104503104504104505104506104507104508104509104510104511104512104513104514104515104516104517104518104519104520104521104522104523104524104525104526104527104528104529104530104531104532104533104534104535104536104537104538104539104540104541104542104543104544104545104546104547104548104549104550104551104552104553104554104555104556104557104558104559104560104561104562104563104564104565104566104567104568104569104570104571104572104573104574104575104576104577104578104579104580104581104582104583104584104585104586104587104588104589104590104591104592104593104594104595104596104597104598104599104600104601104602104603104604104605104606104607104608104609104610104611104612104613104614104615104616104617104618104619104620104621104622104623104624104625104626104627104628104629104630104631104632104633104634104635104636104637104638104639104640104641104642104643104644104645104646104647104648104649104650104651104652104653104654104655104656104657104658104659104660104661104662104663104664104665104666104667104668104669104670104671104672104673104674104675104676104677104678104679104680104681104682104683104684104685104686104687104688104689104690104691104692104693104694104695104696104697104698104699104700104701104702104703104704104705104706104707104708104709104710104711104712104713104714104715104716104717104718104719104720104721104722104723104724104725104726104727104728104729104730104731104732104733104734104735104736104737104738104739104740104741104742104743104744104745104746104747104748104749104750104751104752104753104754104755104756104757104758104759104760104761104762104763104764104765104766104767104768104769104770104771104772104773104774104775104776104777104778104779104780104781104782104783104784104785104786104787104788104789104790104791104792104793104794104795104796104797104798104799104800104801104802104803104804104805104806104807104808104809104810104811104812104813104814104815104816104817104818104819104820104821104822104823104824104825104826104827104828104829104830104831104832104833104834104835104836104837104838104839104840104841104842104843104844104845104846104847104848104849104850104851104852104853104854104855104856104857104858104859104860104861104862104863104864104865104866104867104868104869104870104871104872104873104874104875104876104877104878104879104880104881104882104883104884104885104886104887104888104889104890104891104892104893104894104895104896104897104898104899104900104901104902104903104904104905104906104907104908104909104910104911104912104913104914104915104916104917104918104919104920104921104922104923104924104925104926104927104928104929104930104931104932104933104934104935104936104937104938104939104940104941104942104943104944104945104946104947104948104949104950104951104952104953104954104955104956104957104958104959104960104961104962104963104964104965104966104967104968104969104970104971104972104973104974104975104976104977104978104979104980104981104982104983104984104985104986104987104988104989104990104991104992104993104994104995104996104997104998104999105000105001105002105003105004105005105006105007105008105009105010105011105012105013105014105015105016105017105018105019105020105021105022105023105024105025105026105027105028105029105030105031105032105033105034105035105036105037105038105039105040105041105042105043105044105045105046105047105048105049105050105051105052105053105054105055105056105057105058105059105060105061105062105063105064105065105066105067105068105069105070105071105072105073105074105075105076105077105078105079105080105081105082105083105084105085105086105087105088105089105090105091105092105093105094105095105096105097105098105099105100105101105102105103105104105105105106105107105108105109105110105111105112105113105114105115105116105117105118105119105120105121105122105123105124105125105126105127105128105129105130105131105132105133105134105135105136105137105138105139105140105141105142105143105144105145105146105147105148105149105150105151105152105153105154105155105156105157105158105159105160105161105162105163105164105165105166105167105168105169105170105171105172105173105174105175105176105177105178105179105180105181105182105183105184105185105186105187105188105189105190105191105192105193105194105195105196105197105198105199105200105201105202105203105204105205105206105207105208105209105210105211105212105213105214105215105216105217105218105219105220105221105222105223105224105225105226105227105228105229105230105231105232105233105234105235105236105237105238105239105240105241105242105243105244105245105246105247105248105249105250105251105252105253105254105255105256105257105258105259105260105261105262105263105264105265105266105267105268105269105270105271105272105273105274105275105276105277105278105279105280105281105282105283105284105285105286105287105288105289105290105291105292105293105294105295105296105297105298105299105300105301105302105303105304105305105306105307105308105309105310105311105312105313105314105315105316105317105318105319105320105321105322105323105324105325105326105327105328105329105330105331105332105333105334105335105336105337105338105339105340105341105342105343105344105345105346105347105348105349105350105351105352105353105354105355105356105357105358105359105360105361105362105363105364105365105366105367105368105369105370105371105372105373105374105375105376105377105378105379105380105381105382105383105384105385105386105387105388105389105390105391105392105393105394105395105396105397105398105399105400105401105402105403105404105405105406105407105408105409105410105411105412105413105414105415105416105417105418105419105420105421105422105423105424105425105426105427105428105429105430105431105432105433105434105435105436105437105438105439105440105441105442105443105444105445105446105447105448105449105450105451105452105453105454105455105456105457105458105459105460105461105462105463105464105465105466105467105468105469105470105471105472105473105474105475105476105477105478105479105480105481105482105483105484105485105486105487105488105489105490105491105492105493105494105495105496105497105498105499105500105501105502105503105504105505105506105507105508105509105510105511105512105513105514105515105516105517105518105519105520105521105522105523105524105525105526105527105528105529105530105531105532105533105534105535105536105537105538105539105540105541105542105543105544105545105546105547105548105549105550105551105552105553105554105555105556105557105558105559105560105561105562105563105564105565105566105567105568105569105570105571105572105573105574105575105576105577105578105579105580105581105582105583105584105585105586105587105588105589105590105591105592105593105594105595105596105597105598105599105600105601105602105603105604105605105606105607105608105609105610105611105612105613105614105615105616105617105618105619105620105621105622105623105624105625105626105627105628105629105630105631105632105633105634105635105636105637105638105639105640105641105642105643105644105645105646105647105648105649105650105651105652105653105654105655105656105657105658105659105660105661105662105663105664105665105666105667105668105669105670105671105672105673105674105675105676105677105678105679105680105681105682105683105684105685105686105687105688105689105690105691105692105693105694105695105696105697105698105699105700105701105702105703105704105705105706105707105708105709105710105711105712105713105714105715105716105717105718105719105720105721105722105723105724105725105726105727105728105729105730105731105732105733105734105735105736105737105738105739105740105741105742105743105744105745105746105747105748105749105750105751105752105753105754105755105756105757105758105759105760105761105762105763105764105765105766105767105768105769105770105771105772105773105774105775105776105777105778105779105780105781105782105783105784105785105786105787105788105789105790105791105792105793105794105795105796105797105798105799105800105801105802105803105804105805105806105807105808105809105810105811105812105813105814105815105816105817105818105819105820105821105822105823105824105825105826105827105828105829105830105831105832105833105834105835105836105837105838105839105840105841105842105843105844105845105846105847105848105849105850105851105852105853105854105855105856105857105858105859105860105861105862105863105864105865105866105867105868105869105870105871105872105873105874105875105876105877105878105879105880105881105882105883105884105885105886105887105888105889105890105891105892105893105894105895105896105897105898105899105900105901105902105903105904105905105906105907105908105909105910105911105912105913105914105915105916105917105918105919105920105921105922105923105924105925105926105927105928105929105930105931105932105933105934105935105936105937105938105939105940105941105942105943105944105945105946105947105948105949105950105951105952105953105954105955105956105957105958105959105960105961105962105963105964105965105966105967105968105969105970105971105972105973105974105975105976105977105978105979105980105981105982105983105984105985105986105987105988105989105990105991105992105993105994105995105996105997105998105999106000106001106002106003106004106005106006106007106008106009106010106011106012106013106014106015106016106017106018106019106020106021106022106023106024106025106026106027106028106029106030106031106032106033106034106035106036106037106038106039106040106041106042106043106044106045106046106047106048106049106050106051106052106053106054106055106056106057106058106059106060106061106062106063106064106065106066106067106068106069106070106071106072106073106074106075106076106077106078106079106080106081106082106083106084106085106086106087106088106089106090106091106092106093106094106095106096106097106098106099106100106101106102106103106104106105106106106107106108106109106110106111106112106113106114106115106116106117106118106119106120106121106122106123106124106125106126106127106128106129106130106131106132106133106134106135106136106137106138106139106140106141106142106143106144106145106146106147106148106149106150106151106152106153106154106155106156106157106158106159106160106161106162106163106164106165106166106167106168106169106170106171106172106173106174106175106176106177106178106179106180106181106182106183106184106185106186106187106188106189106190106191106192106193106194106195106196106197106198106199106200106201106202106203106204106205106206106207106208106209106210106211106212106213106214106215106216106217106218106219106220106221106222106223106224106225106226106227106228106229106230106231106232106233106234106235106236106237106238106239106240106241106242106243106244106245106246106247106248106249106250106251106252106253106254106255106256106257106258106259106260106261106262106263106264106265106266106267106268106269106270106271106272106273106274106275106276106277106278106279106280106281106282106283106284106285106286106287106288106289106290106291106292106293106294106295106296106297106298106299106300106301106302106303106304106305106306106307106308106309106310106311106312106313106314106315106316106317106318106319106320106321106322106323106324106325106326106327106328106329106330106331106332106333106334106335106336106337106338106339106340106341106342106343106344106345106346106347106348106349106350106351106352106353106354106355106356106357106358106359106360106361106362106363106364106365106366106367106368106369106370106371106372106373106374106375106376106377106378106379106380106381106382106383106384106385106386106387106388106389106390106391106392106393106394106395106396106397106398106399106400106401106402106403106404106405106406106407106408106409106410106411106412106413106414106415106416106417106418106419106420106421106422106423106424106425106426106427106428106429106430106431106432106433106434106435106436106437106438106439106440106441106442106443106444106445106446106447106448106449106450106451106452106453106454106455106456106457106458106459106460106461106462106463106464106465106466106467106468106469106470106471106472106473106474106475106476106477106478106479106480106481106482106483106484106485106486106487106488106489106490106491106492106493106494106495106496106497106498106499106500106501106502106503106504106505106506106507106508106509106510106511106512106513106514106515106516106517106518106519106520106521106522106523106524106525106526106527106528106529106530106531106532106533106534106535106536106537106538106539106540106541106542106543106544106545106546106547106548106549106550106551106552106553106554106555106556106557106558106559106560106561106562106563106564106565106566106567106568106569106570106571106572106573106574106575106576106577106578106579106580106581106582106583106584106585106586106587106588106589106590106591106592106593106594106595106596106597106598106599106600106601106602106603106604106605106606106607106608106609106610106611106612106613106614106615106616106617106618106619106620106621106622106623106624106625106626106627106628106629106630106631106632106633106634106635106636106637106638106639106640106641106642106643106644106645106646106647106648106649106650106651106652106653106654106655106656106657106658106659106660106661106662106663106664106665106666106667106668106669106670106671106672106673106674106675106676106677106678106679106680106681106682106683106684106685106686106687106688106689106690106691106692106693106694106695106696106697106698106699106700106701106702106703106704106705106706106707106708106709106710106711106712106713106714106715106716106717106718106719106720106721106722106723106724106725106726106727106728106729106730106731106732106733106734106735106736106737106738106739106740106741106742106743106744106745106746106747106748106749106750106751106752106753106754106755106756106757106758106759106760106761106762106763106764106765106766106767106768106769106770106771106772106773106774106775106776106777106778106779106780106781106782106783106784106785106786106787106788106789106790106791106792106793106794106795106796106797106798106799106800106801106802106803106804106805106806106807106808106809106810106811106812106813106814106815106816106817106818106819106820106821106822106823106824106825106826106827106828106829106830106831106832106833106834106835106836106837106838106839106840106841106842106843106844106845106846106847106848106849106850106851106852106853106854106855106856106857106858106859106860106861106862106863106864106865106866106867106868106869106870106871106872106873106874106875106876106877106878106879106880106881106882106883106884106885106886106887106888106889106890106891106892106893106894106895106896106897106898106899106900106901106902106903106904106905106906106907106908106909106910106911106912106913106914106915106916106917106918106919106920106921106922106923106924106925106926106927106928106929106930106931106932106933106934106935106936106937106938106939106940106941106942106943106944106945106946106947106948106949106950106951106952106953106954106955106956106957106958106959106960106961106962106963106964106965106966106967106968106969106970106971106972106973106974106975106976106977106978106979106980106981106982106983106984106985106986106987106988106989106990106991106992106993106994106995106996106997106998106999107000107001107002107003107004107005107006107007107008107009107010107011107012107013107014107015107016107017107018107019107020107021107022107023107024107025107026107027107028
  1. {
  2. "CVE_data_type" : "CVE",
  3. "CVE_data_format" : "MITRE",
  4. "CVE_data_version" : "4.0",
  5. "CVE_data_numberOfCVEs" : "885",
  6. "CVE_data_timestamp" : "2021-05-10T12:00Z",
  7. "CVE_Items" : [ {
  8. "cve" : {
  9. "data_type" : "CVE",
  10. "data_format" : "MITRE",
  11. "data_version" : "4.0",
  12. "CVE_data_meta" : {
  13. "ID" : "CVE-2021-28664",
  14. "ASSIGNER" : "cve@mitre.org"
  15. },
  16. "problemtype" : {
  17. "problemtype_data" : [ {
  18. "description" : [ ]
  19. } ]
  20. },
  21. "references" : {
  22. "reference_data" : [ {
  23. "url" : "https://developer.arm.com/support/arm-security-updates/mali-gpu-kernel-driver",
  24. "name" : "https://developer.arm.com/support/arm-security-updates/mali-gpu-kernel-driver",
  25. "refsource" : "CONFIRM",
  26. "tags" : [ ]
  27. }, {
  28. "url" : "https://developer.arm.com/support/arm-security-updates",
  29. "name" : "https://developer.arm.com/support/arm-security-updates",
  30. "refsource" : "MISC",
  31. "tags" : [ ]
  32. } ]
  33. },
  34. "description" : {
  35. "description_data" : [ {
  36. "lang" : "en",
  37. "value" : "The Arm Mali GPU kernel driver allows privilege escalation or a denial of service (memory corruption) because an unprivileged user can achieve read/write access to read-only pages. This affects Bifrost r0p0 through r28p0 before r29p0, Valhall r19p0 through r28p0 before r29p0, and Midgard r8p0 through r30p0."
  38. } ]
  39. }
  40. },
  41. "configurations" : {
  42. "CVE_data_version" : "4.0",
  43. "nodes" : [ ]
  44. },
  45. "impact" : { },
  46. "publishedDate" : "2021-05-10T15:15Z",
  47. "lastModifiedDate" : "2021-05-10T15:15Z"
  48. }, {
  49. "cve" : {
  50. "data_type" : "CVE",
  51. "data_format" : "MITRE",
  52. "data_version" : "4.0",
  53. "CVE_data_meta" : {
  54. "ID" : "CVE-2021-28663",
  55. "ASSIGNER" : "cve@mitre.org"
  56. },
  57. "problemtype" : {
  58. "problemtype_data" : [ {
  59. "description" : [ ]
  60. } ]
  61. },
  62. "references" : {
  63. "reference_data" : [ {
  64. "url" : "https://developer.arm.com/support/arm-security-updates/mali-gpu-kernel-driver",
  65. "name" : "https://developer.arm.com/support/arm-security-updates/mali-gpu-kernel-driver",
  66. "refsource" : "CONFIRM",
  67. "tags" : [ ]
  68. }, {
  69. "url" : "https://developer.arm.com/support/arm-security-updates",
  70. "name" : "https://developer.arm.com/support/arm-security-updates",
  71. "refsource" : "MISC",
  72. "tags" : [ ]
  73. } ]
  74. },
  75. "description" : {
  76. "description_data" : [ {
  77. "lang" : "en",
  78. "value" : "The Arm Mali GPU kernel driver allows privilege escalation or information disclosure because GPU memory operations are mishandled, leading to a use-after-free. This affects Bifrost r0p0 through r28p0 before r29p0, Valhall r19p0 through r28p0 before r29p0, and Midgard r4p0 through r30p0."
  79. } ]
  80. }
  81. },
  82. "configurations" : {
  83. "CVE_data_version" : "4.0",
  84. "nodes" : [ ]
  85. },
  86. "impact" : { },
  87. "publishedDate" : "2021-05-10T15:15Z",
  88. "lastModifiedDate" : "2021-05-10T15:15Z"
  89. }, {
  90. "cve" : {
  91. "data_type" : "CVE",
  92. "data_format" : "MITRE",
  93. "data_version" : "4.0",
  94. "CVE_data_meta" : {
  95. "ID" : "CVE-2021-23016",
  96. "ASSIGNER" : "f5sirt@f5.com"
  97. },
  98. "problemtype" : {
  99. "problemtype_data" : [ {
  100. "description" : [ ]
  101. } ]
  102. },
  103. "references" : {
  104. "reference_data" : [ {
  105. "url" : "https://support.f5.com/csp/article/K75540265",
  106. "name" : "https://support.f5.com/csp/article/K75540265",
  107. "refsource" : "MISC",
  108. "tags" : [ ]
  109. } ]
  110. },
  111. "description" : {
  112. "description_data" : [ {
  113. "lang" : "en",
  114. "value" : "On BIG-IP APM versions 15.1.x before 15.1.3, 14.1.x before 14.1.4.1, 13.1.x before 13.1.4, and all versions of 16.0.x, 12.1.x, and 11.6.x, an attacker may be able to bypass APM's internal restrictions and retrieve static content that is hosted within APM by sending specifically crafted requests to an APM Virtual Server. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
  115. } ]
  116. }
  117. },
  118. "configurations" : {
  119. "CVE_data_version" : "4.0",
  120. "nodes" : [ ]
  121. },
  122. "impact" : { },
  123. "publishedDate" : "2021-05-10T15:15Z",
  124. "lastModifiedDate" : "2021-05-10T15:15Z"
  125. }, {
  126. "cve" : {
  127. "data_type" : "CVE",
  128. "data_format" : "MITRE",
  129. "data_version" : "4.0",
  130. "CVE_data_meta" : {
  131. "ID" : "CVE-2021-23015",
  132. "ASSIGNER" : "f5sirt@f5.com"
  133. },
  134. "problemtype" : {
  135. "problemtype_data" : [ {
  136. "description" : [ ]
  137. } ]
  138. },
  139. "references" : {
  140. "reference_data" : [ {
  141. "url" : "https://support.f5.com/csp/article/K74151369",
  142. "name" : "https://support.f5.com/csp/article/K74151369",
  143. "refsource" : "MISC",
  144. "tags" : [ ]
  145. } ]
  146. },
  147. "description" : {
  148. "description_data" : [ {
  149. "lang" : "en",
  150. "value" : "On BIG-IP 15.1.x before 15.1.3, 14.1.x before 14.1.4.2, 13.1.0.8 through 13.1.3.6, and all versions of 16.0.x, when running in Appliance Mode, an authenticated user assigned the 'Administrator' role may be able to bypass Appliance Mode restrictions utilizing undisclosed iControl REST endpoints. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
  151. } ]
  152. }
  153. },
  154. "configurations" : {
  155. "CVE_data_version" : "4.0",
  156. "nodes" : [ ]
  157. },
  158. "impact" : { },
  159. "publishedDate" : "2021-05-10T15:15Z",
  160. "lastModifiedDate" : "2021-05-10T15:15Z"
  161. }, {
  162. "cve" : {
  163. "data_type" : "CVE",
  164. "data_format" : "MITRE",
  165. "data_version" : "4.0",
  166. "CVE_data_meta" : {
  167. "ID" : "CVE-2021-23014",
  168. "ASSIGNER" : "f5sirt@f5.com"
  169. },
  170. "problemtype" : {
  171. "problemtype_data" : [ {
  172. "description" : [ ]
  173. } ]
  174. },
  175. "references" : {
  176. "reference_data" : [ {
  177. "url" : "https://support.f5.com/csp/article/K23203045",
  178. "name" : "https://support.f5.com/csp/article/K23203045",
  179. "refsource" : "MISC",
  180. "tags" : [ ]
  181. } ]
  182. },
  183. "description" : {
  184. "description_data" : [ {
  185. "lang" : "en",
  186. "value" : "On versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.3, and 14.1.x before 14.1.4, BIG-IP Advanced WAF and ASM are missing authorization checks for file uploads to a specific directory within the REST API which might allow Authenticated users with guest privileges to upload files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
  187. } ]
  188. }
  189. },
  190. "configurations" : {
  191. "CVE_data_version" : "4.0",
  192. "nodes" : [ ]
  193. },
  194. "impact" : { },
  195. "publishedDate" : "2021-05-10T15:15Z",
  196. "lastModifiedDate" : "2021-05-10T15:15Z"
  197. }, {
  198. "cve" : {
  199. "data_type" : "CVE",
  200. "data_format" : "MITRE",
  201. "data_version" : "4.0",
  202. "CVE_data_meta" : {
  203. "ID" : "CVE-2021-23012",
  204. "ASSIGNER" : "f5sirt@f5.com"
  205. },
  206. "problemtype" : {
  207. "problemtype_data" : [ {
  208. "description" : [ ]
  209. } ]
  210. },
  211. "references" : {
  212. "reference_data" : [ {
  213. "url" : "https://support.f5.com/csp/article/K04234247",
  214. "name" : "https://support.f5.com/csp/article/K04234247",
  215. "refsource" : "MISC",
  216. "tags" : [ ]
  217. } ]
  218. },
  219. "description" : {
  220. "description_data" : [ {
  221. "lang" : "en",
  222. "value" : "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.3, 14.1.x before 14.1.4, and 13.1.x before 13.1.4, lack of input validation for items used in the system support functionality may allow users granted either \"Resource Administrator\" or \"Administrator\" roles to execute arbitrary bash commands on BIG-IP. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
  223. } ]
  224. }
  225. },
  226. "configurations" : {
  227. "CVE_data_version" : "4.0",
  228. "nodes" : [ ]
  229. },
  230. "impact" : { },
  231. "publishedDate" : "2021-05-10T15:15Z",
  232. "lastModifiedDate" : "2021-05-10T15:15Z"
  233. }, {
  234. "cve" : {
  235. "data_type" : "CVE",
  236. "data_format" : "MITRE",
  237. "data_version" : "4.0",
  238. "CVE_data_meta" : {
  239. "ID" : "CVE-2021-23010",
  240. "ASSIGNER" : "f5sirt@f5.com"
  241. },
  242. "problemtype" : {
  243. "problemtype_data" : [ {
  244. "description" : [ ]
  245. } ]
  246. },
  247. "references" : {
  248. "reference_data" : [ {
  249. "url" : "https://support.f5.com/csp/article/K18570111",
  250. "name" : "https://support.f5.com/csp/article/K18570111",
  251. "refsource" : "MISC",
  252. "tags" : [ ]
  253. } ]
  254. },
  255. "description" : {
  256. "description_data" : [ {
  257. "lang" : "en",
  258. "value" : "On versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.5, and 12.1.x before 12.1.5.3, when the BIG-IP ASM/Advanced WAF system processes WebSocket requests with JSON payloads using the default JSON Content Profile in the ASM Security Policy, the BIG-IP ASM bd process may produce a core file. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
  259. } ]
  260. }
  261. },
  262. "configurations" : {
  263. "CVE_data_version" : "4.0",
  264. "nodes" : [ ]
  265. },
  266. "impact" : { },
  267. "publishedDate" : "2021-05-10T15:15Z",
  268. "lastModifiedDate" : "2021-05-10T15:15Z"
  269. }, {
  270. "cve" : {
  271. "data_type" : "CVE",
  272. "data_format" : "MITRE",
  273. "data_version" : "4.0",
  274. "CVE_data_meta" : {
  275. "ID" : "CVE-2021-23009",
  276. "ASSIGNER" : "f5sirt@f5.com"
  277. },
  278. "problemtype" : {
  279. "problemtype_data" : [ {
  280. "description" : [ ]
  281. } ]
  282. },
  283. "references" : {
  284. "reference_data" : [ {
  285. "url" : "https://support.f5.com/csp/article/K90603426",
  286. "name" : "https://support.f5.com/csp/article/K90603426",
  287. "refsource" : "MISC",
  288. "tags" : [ ]
  289. } ]
  290. },
  291. "description" : {
  292. "description_data" : [ {
  293. "lang" : "en",
  294. "value" : "On BIG-IP version 16.0.x before 16.0.1.1 and 15.1.x before 15.1.3, malformed HTTP/2 requests may cause an infinite loop which causes a Denial of Service for Data Plane traffic. TMM takes the configured HA action when the TMM process is aborted. There is no control plane exposure, this is a data plane issue only. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
  295. } ]
  296. }
  297. },
  298. "configurations" : {
  299. "CVE_data_version" : "4.0",
  300. "nodes" : [ ]
  301. },
  302. "impact" : { },
  303. "publishedDate" : "2021-05-10T15:15Z",
  304. "lastModifiedDate" : "2021-05-10T15:15Z"
  305. }, {
  306. "cve" : {
  307. "data_type" : "CVE",
  308. "data_format" : "MITRE",
  309. "data_version" : "4.0",
  310. "CVE_data_meta" : {
  311. "ID" : "CVE-2021-32056",
  312. "ASSIGNER" : "cve@mitre.org"
  313. },
  314. "problemtype" : {
  315. "problemtype_data" : [ {
  316. "description" : [ ]
  317. } ]
  318. },
  319. "references" : {
  320. "reference_data" : [ {
  321. "url" : "https://cyrus.topicbox.com/groups/announce/T126392718bc29d6b/cyrus-imap-3-2-7-released",
  322. "name" : "https://cyrus.topicbox.com/groups/announce/T126392718bc29d6b/cyrus-imap-3-2-7-released",
  323. "refsource" : "CONFIRM",
  324. "tags" : [ ]
  325. }, {
  326. "url" : "https://www.cyrusimap.org/imap/download/release-notes/3.4/x/3.4.1.html",
  327. "name" : "https://www.cyrusimap.org/imap/download/release-notes/3.4/x/3.4.1.html",
  328. "refsource" : "CONFIRM",
  329. "tags" : [ ]
  330. }, {
  331. "url" : "https://www.cyrusimap.org/imap/download/release-notes/3.2/x/3.2.7.html",
  332. "name" : "https://www.cyrusimap.org/imap/download/release-notes/3.2/x/3.2.7.html",
  333. "refsource" : "CONFIRM",
  334. "tags" : [ ]
  335. }, {
  336. "url" : "https://cyrus.topicbox.com/groups/announce/T056901c106ecfce3/cyrus-imap-3-4-1-released",
  337. "name" : "https://cyrus.topicbox.com/groups/announce/T056901c106ecfce3/cyrus-imap-3-4-1-released",
  338. "refsource" : "CONFIRM",
  339. "tags" : [ ]
  340. } ]
  341. },
  342. "description" : {
  343. "description_data" : [ {
  344. "lang" : "en",
  345. "value" : "Cyrus IMAP before 3.2.7, and 3.3.x and 3.4.x before 3.4.1, allows remote authenticated users to bypass intended access restrictions on server annotations and consequently cause replication to stall."
  346. } ]
  347. }
  348. },
  349. "configurations" : {
  350. "CVE_data_version" : "4.0",
  351. "nodes" : [ ]
  352. },
  353. "impact" : { },
  354. "publishedDate" : "2021-05-10T14:15Z",
  355. "lastModifiedDate" : "2021-05-10T14:15Z"
  356. }, {
  357. "cve" : {
  358. "data_type" : "CVE",
  359. "data_format" : "MITRE",
  360. "data_version" : "4.0",
  361. "CVE_data_meta" : {
  362. "ID" : "CVE-2021-23013",
  363. "ASSIGNER" : "f5sirt@f5.com"
  364. },
  365. "problemtype" : {
  366. "problemtype_data" : [ {
  367. "description" : [ ]
  368. } ]
  369. },
  370. "references" : {
  371. "reference_data" : [ {
  372. "url" : "https://support.f5.com/csp/article/K04234247",
  373. "name" : "https://support.f5.com/csp/article/K04234247",
  374. "refsource" : "MISC",
  375. "tags" : [ ]
  376. } ]
  377. },
  378. "description" : {
  379. "description_data" : [ {
  380. "lang" : "en",
  381. "value" : "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.3, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3, the Traffic Management Microkernel (TMM) may stop responding when processing Stream Control Transmission Protocol (SCTP) traffic under certain conditions. This vulnerability affects TMM by way of a virtual server configured with an SCTP profile. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
  382. } ]
  383. }
  384. },
  385. "configurations" : {
  386. "CVE_data_version" : "4.0",
  387. "nodes" : [ ]
  388. },
  389. "impact" : { },
  390. "publishedDate" : "2021-05-10T14:15Z",
  391. "lastModifiedDate" : "2021-05-10T14:15Z"
  392. }, {
  393. "cve" : {
  394. "data_type" : "CVE",
  395. "data_format" : "MITRE",
  396. "data_version" : "4.0",
  397. "CVE_data_meta" : {
  398. "ID" : "CVE-2021-23011",
  399. "ASSIGNER" : "f5sirt@f5.com"
  400. },
  401. "problemtype" : {
  402. "problemtype_data" : [ {
  403. "description" : [ ]
  404. } ]
  405. },
  406. "references" : {
  407. "reference_data" : [ {
  408. "url" : "https://support.f5.com/csp/article/K10751325",
  409. "name" : "https://support.f5.com/csp/article/K10751325",
  410. "refsource" : "MISC",
  411. "tags" : [ ]
  412. } ]
  413. },
  414. "description" : {
  415. "description_data" : [ {
  416. "lang" : "en",
  417. "value" : "On versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.3, 14.1.x before 14.1.4, 13.1.x before 13.1.4, 12.1.x before 12.1.6, and 11.6.x before 11.6.5.3, when the BIG-IP system is buffering packet fragments for reassembly, the Traffic Management Microkernel (TMM) may consume an excessive amount of resources, eventually leading to a restart and failover event. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
  418. } ]
  419. }
  420. },
  421. "configurations" : {
  422. "CVE_data_version" : "4.0",
  423. "nodes" : [ ]
  424. },
  425. "impact" : { },
  426. "publishedDate" : "2021-05-10T14:15Z",
  427. "lastModifiedDate" : "2021-05-10T14:15Z"
  428. }, {
  429. "cve" : {
  430. "data_type" : "CVE",
  431. "data_format" : "MITRE",
  432. "data_version" : "4.0",
  433. "CVE_data_meta" : {
  434. "ID" : "CVE-2021-23008",
  435. "ASSIGNER" : "f5sirt@f5.com"
  436. },
  437. "problemtype" : {
  438. "problemtype_data" : [ {
  439. "description" : [ ]
  440. } ]
  441. },
  442. "references" : {
  443. "reference_data" : [ {
  444. "url" : "https://support.f5.com/csp/article/K51213246",
  445. "name" : "https://support.f5.com/csp/article/K51213246",
  446. "refsource" : "MISC",
  447. "tags" : [ ]
  448. } ]
  449. },
  450. "description" : {
  451. "description_data" : [ {
  452. "lang" : "en",
  453. "value" : "On version 15.1.x before 15.1.3, 14.1.x before 14.1.4, 13.1.x before 13.1.4, 12.1.x before 12.1.6, and all versions of 16.0.x and 11.6.x., BIG-IP APM AD (Active Directory) authentication can be bypassed via a spoofed AS-REP (Kerberos Authentication Service Response) response sent over a hijacked KDC (Kerberos Key Distribution Center) connection or from an AD server compromised by an attacker. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
  454. } ]
  455. }
  456. },
  457. "configurations" : {
  458. "CVE_data_version" : "4.0",
  459. "nodes" : [ ]
  460. },
  461. "impact" : { },
  462. "publishedDate" : "2021-05-10T14:15Z",
  463. "lastModifiedDate" : "2021-05-10T14:15Z"
  464. }, {
  465. "cve" : {
  466. "data_type" : "CVE",
  467. "data_format" : "MITRE",
  468. "data_version" : "4.0",
  469. "CVE_data_meta" : {
  470. "ID" : "CVE-2021-26583",
  471. "ASSIGNER" : "security-alert@hpe.com"
  472. },
  473. "problemtype" : {
  474. "problemtype_data" : [ {
  475. "description" : [ ]
  476. } ]
  477. },
  478. "references" : {
  479. "reference_data" : [ {
  480. "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04129en_us",
  481. "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04129en_us",
  482. "refsource" : "MISC",
  483. "tags" : [ ]
  484. } ]
  485. },
  486. "description" : {
  487. "description_data" : [ {
  488. "lang" : "en",
  489. "value" : "Potential security vulnerabilities have been identified in HPE iLO Amplifier Pack using bootstrap framework. The vulnerabilities could be remotely exploited to allow remote code execution and cross site scripting (XSS). HPE has released a software update to resolve the vulnerabilities in the HPE iLO Amplifier Pack."
  490. } ]
  491. }
  492. },
  493. "configurations" : {
  494. "CVE_data_version" : "4.0",
  495. "nodes" : [ ]
  496. },
  497. "impact" : { },
  498. "publishedDate" : "2021-05-10T13:15Z",
  499. "lastModifiedDate" : "2021-05-10T13:15Z"
  500. }, {
  501. "cve" : {
  502. "data_type" : "CVE",
  503. "data_format" : "MITRE",
  504. "data_version" : "4.0",
  505. "CVE_data_meta" : {
  506. "ID" : "CVE-2021-25645",
  507. "ASSIGNER" : "cve@mitre.org"
  508. },
  509. "problemtype" : {
  510. "problemtype_data" : [ {
  511. "description" : [ ]
  512. } ]
  513. },
  514. "references" : {
  515. "reference_data" : [ {
  516. "url" : "https://www.couchbase.com/resources/security#SecurityAlerts",
  517. "name" : "https://www.couchbase.com/resources/security#SecurityAlerts",
  518. "refsource" : "CONFIRM",
  519. "tags" : [ ]
  520. }, {
  521. "url" : "https://www.couchbase.com/downloads",
  522. "name" : "https://www.couchbase.com/downloads",
  523. "refsource" : "MISC",
  524. "tags" : [ ]
  525. } ]
  526. },
  527. "description" : {
  528. "description_data" : [ {
  529. "lang" : "en",
  530. "value" : "An issue was discovered in Couchbase Server before 6.0.5, 6.1.x through 6.5.x before 6.5.2, and 6.6.x before 6.6.1. An internal user with administrator privileges, @ns_server, leaks credentials in cleartext in the cbcollect_info.log, debug.log, ns_couchdb.log, indexer.log, and stats.log files. NOTE: updating the product does not automatically address leaks that occurred in the past."
  531. } ]
  532. }
  533. },
  534. "configurations" : {
  535. "CVE_data_version" : "4.0",
  536. "nodes" : [ ]
  537. },
  538. "impact" : { },
  539. "publishedDate" : "2021-05-10T13:15Z",
  540. "lastModifiedDate" : "2021-05-10T13:15Z"
  541. }, {
  542. "cve" : {
  543. "data_type" : "CVE",
  544. "data_format" : "MITRE",
  545. "data_version" : "4.0",
  546. "CVE_data_meta" : {
  547. "ID" : "CVE-2021-22672",
  548. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  549. },
  550. "problemtype" : {
  551. "problemtype_data" : [ {
  552. "description" : [ ]
  553. } ]
  554. },
  555. "references" : {
  556. "reference_data" : [ {
  557. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-524/",
  558. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-524/",
  559. "refsource" : "MISC",
  560. "tags" : [ ]
  561. }, {
  562. "url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-124-02",
  563. "name" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-124-02",
  564. "refsource" : "MISC",
  565. "tags" : [ ]
  566. } ]
  567. },
  568. "description" : {
  569. "description_data" : [ {
  570. "lang" : "en",
  571. "value" : "Delta Electronics' CNCSoft ScreenEditor in versions prior to v1.01.30 could allow the corruption of data, a denial-of-service condition, or code execution. The vulnerability may allow an attacker to remotely execute arbitrary code."
  572. } ]
  573. }
  574. },
  575. "configurations" : {
  576. "CVE_data_version" : "4.0",
  577. "nodes" : [ ]
  578. },
  579. "impact" : { },
  580. "publishedDate" : "2021-05-10T13:15Z",
  581. "lastModifiedDate" : "2021-05-10T13:15Z"
  582. }, {
  583. "cve" : {
  584. "data_type" : "CVE",
  585. "data_format" : "MITRE",
  586. "data_version" : "4.0",
  587. "CVE_data_meta" : {
  588. "ID" : "CVE-2020-22809",
  589. "ASSIGNER" : "cve@mitre.org"
  590. },
  591. "problemtype" : {
  592. "problemtype_data" : [ {
  593. "description" : [ ]
  594. } ]
  595. },
  596. "references" : {
  597. "reference_data" : [ {
  598. "url" : "https://www.exploit-db.com/exploits/48306",
  599. "name" : "https://www.exploit-db.com/exploits/48306",
  600. "refsource" : "MISC",
  601. "tags" : [ ]
  602. } ]
  603. },
  604. "description" : {
  605. "description_data" : [ {
  606. "lang" : "en",
  607. "value" : "In Windscribe v1.83 Build 20, 'WindscribeService' has an Unquoted Service Path that facilitates privilege escalation."
  608. } ]
  609. }
  610. },
  611. "configurations" : {
  612. "CVE_data_version" : "4.0",
  613. "nodes" : [ ]
  614. },
  615. "impact" : { },
  616. "publishedDate" : "2021-05-10T13:15Z",
  617. "lastModifiedDate" : "2021-05-10T13:15Z"
  618. }, {
  619. "cve" : {
  620. "data_type" : "CVE",
  621. "data_format" : "MITRE",
  622. "data_version" : "4.0",
  623. "CVE_data_meta" : {
  624. "ID" : "CVE-2021-24011",
  625. "ASSIGNER" : "psirt@fortinet.com"
  626. },
  627. "problemtype" : {
  628. "problemtype_data" : [ {
  629. "description" : [ ]
  630. } ]
  631. },
  632. "references" : {
  633. "reference_data" : [ {
  634. "url" : "https://fortiguard.com/advisory/FG-IR-20-038",
  635. "name" : "https://fortiguard.com/advisory/FG-IR-20-038",
  636. "refsource" : "CONFIRM",
  637. "tags" : [ ]
  638. } ]
  639. },
  640. "description" : {
  641. "description_data" : [ {
  642. "lang" : "en",
  643. "value" : "A privilege escalation vulnerability in FortiNAC version below 8.8.2 may allow an admin user to escalate the privileges to root by abusing the sudo privileges."
  644. } ]
  645. }
  646. },
  647. "configurations" : {
  648. "CVE_data_version" : "4.0",
  649. "nodes" : [ ]
  650. },
  651. "impact" : { },
  652. "publishedDate" : "2021-05-10T12:15Z",
  653. "lastModifiedDate" : "2021-05-10T12:15Z"
  654. }, {
  655. "cve" : {
  656. "data_type" : "CVE",
  657. "data_format" : "MITRE",
  658. "data_version" : "4.0",
  659. "CVE_data_meta" : {
  660. "ID" : "CVE-2021-31520",
  661. "ASSIGNER" : "security@trendmicro.com"
  662. },
  663. "problemtype" : {
  664. "problemtype_data" : [ {
  665. "description" : [ ]
  666. } ]
  667. },
  668. "references" : {
  669. "reference_data" : [ {
  670. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-525/",
  671. "name" : "N/A",
  672. "refsource" : "N/A",
  673. "tags" : [ ]
  674. }, {
  675. "url" : "https://success.trendmicro.com/solution/000286439",
  676. "name" : "N/A",
  677. "refsource" : "N/A",
  678. "tags" : [ ]
  679. } ]
  680. },
  681. "description" : {
  682. "description_data" : [ {
  683. "lang" : "en",
  684. "value" : "A weak session token authentication bypass vulnerability in Trend Micro IM Security 1.6 and 1.6.5 could allow an remote attacker to guess currently logged-in administrators' session session token in order to gain access to the product's web management interface."
  685. } ]
  686. }
  687. },
  688. "configurations" : {
  689. "CVE_data_version" : "4.0",
  690. "nodes" : [ ]
  691. },
  692. "impact" : { },
  693. "publishedDate" : "2021-05-10T11:15Z",
  694. "lastModifiedDate" : "2021-05-10T11:15Z"
  695. }, {
  696. "cve" : {
  697. "data_type" : "CVE",
  698. "data_format" : "MITRE",
  699. "data_version" : "4.0",
  700. "CVE_data_meta" : {
  701. "ID" : "CVE-2021-25849",
  702. "ASSIGNER" : "cve@mitre.org"
  703. },
  704. "problemtype" : {
  705. "problemtype_data" : [ {
  706. "description" : [ ]
  707. } ]
  708. },
  709. "references" : {
  710. "reference_data" : [ {
  711. "url" : "https://www.moxa.com/en/",
  712. "name" : "https://www.moxa.com/en/",
  713. "refsource" : "MISC",
  714. "tags" : [ ]
  715. }, {
  716. "url" : "https://www.moxa.com/en/support/product-support/security-advisory/vport-06ec-2v-series-ip-cameras-vulnerabilities",
  717. "name" : "https://www.moxa.com/en/support/product-support/security-advisory/vport-06ec-2v-series-ip-cameras-vulnerabilities",
  718. "refsource" : "MISC",
  719. "tags" : [ ]
  720. } ]
  721. },
  722. "description" : {
  723. "description_data" : [ {
  724. "lang" : "en",
  725. "value" : "An integer underflow was discovered in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, improper validation of the PortID TLV leads to Denial of Service via a crafted lldp packet."
  726. } ]
  727. }
  728. },
  729. "configurations" : {
  730. "CVE_data_version" : "4.0",
  731. "nodes" : [ ]
  732. },
  733. "impact" : { },
  734. "publishedDate" : "2021-05-10T11:15Z",
  735. "lastModifiedDate" : "2021-05-10T11:15Z"
  736. }, {
  737. "cve" : {
  738. "data_type" : "CVE",
  739. "data_format" : "MITRE",
  740. "data_version" : "4.0",
  741. "CVE_data_meta" : {
  742. "ID" : "CVE-2021-25848",
  743. "ASSIGNER" : "cve@mitre.org"
  744. },
  745. "problemtype" : {
  746. "problemtype_data" : [ {
  747. "description" : [ ]
  748. } ]
  749. },
  750. "references" : {
  751. "reference_data" : [ {
  752. "url" : "https://www.moxa.com/en/",
  753. "name" : "https://www.moxa.com/en/",
  754. "refsource" : "MISC",
  755. "tags" : [ ]
  756. }, {
  757. "url" : "https://www.moxa.com/en/support/product-support/security-advisory/vport-06ec-2v-series-ip-cameras-vulnerabilities",
  758. "name" : "https://www.moxa.com/en/support/product-support/security-advisory/vport-06ec-2v-series-ip-cameras-vulnerabilities",
  759. "refsource" : "MISC",
  760. "tags" : [ ]
  761. } ]
  762. },
  763. "description" : {
  764. "description_data" : [ {
  765. "lang" : "en",
  766. "value" : "Improper validation of the length field of LLDP-MED TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows information disclosure to attackers due to using fixed loop counter variable without checking the actual available length via a crafted lldp packet."
  767. } ]
  768. }
  769. },
  770. "configurations" : {
  771. "CVE_data_version" : "4.0",
  772. "nodes" : [ ]
  773. },
  774. "impact" : { },
  775. "publishedDate" : "2021-05-10T11:15Z",
  776. "lastModifiedDate" : "2021-05-10T11:15Z"
  777. }, {
  778. "cve" : {
  779. "data_type" : "CVE",
  780. "data_format" : "MITRE",
  781. "data_version" : "4.0",
  782. "CVE_data_meta" : {
  783. "ID" : "CVE-2021-25847",
  784. "ASSIGNER" : "cve@mitre.org"
  785. },
  786. "problemtype" : {
  787. "problemtype_data" : [ {
  788. "description" : [ ]
  789. } ]
  790. },
  791. "references" : {
  792. "reference_data" : [ {
  793. "url" : "https://www.moxa.com/en/",
  794. "name" : "https://www.moxa.com/en/",
  795. "refsource" : "MISC",
  796. "tags" : [ ]
  797. }, {
  798. "url" : "https://www.moxa.com/en/support/product-support/security-advisory/vport-06ec-2v-series-ip-cameras-vulnerabilities",
  799. "name" : "https://www.moxa.com/en/support/product-support/security-advisory/vport-06ec-2v-series-ip-cameras-vulnerabilities",
  800. "refsource" : "MISC",
  801. "tags" : [ ]
  802. } ]
  803. },
  804. "description" : {
  805. "description_data" : [ {
  806. "lang" : "en",
  807. "value" : "Improper validation of the length field of LLDP-MED TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows information disclosure to attackers due to controllable loop counter variable via a crafted lldp packet."
  808. } ]
  809. }
  810. },
  811. "configurations" : {
  812. "CVE_data_version" : "4.0",
  813. "nodes" : [ ]
  814. },
  815. "impact" : { },
  816. "publishedDate" : "2021-05-10T11:15Z",
  817. "lastModifiedDate" : "2021-05-10T11:15Z"
  818. }, {
  819. "cve" : {
  820. "data_type" : "CVE",
  821. "data_format" : "MITRE",
  822. "data_version" : "4.0",
  823. "CVE_data_meta" : {
  824. "ID" : "CVE-2021-25846",
  825. "ASSIGNER" : "cve@mitre.org"
  826. },
  827. "problemtype" : {
  828. "problemtype_data" : [ {
  829. "description" : [ ]
  830. } ]
  831. },
  832. "references" : {
  833. "reference_data" : [ {
  834. "url" : "https://www.moxa.com/en/",
  835. "name" : "https://www.moxa.com/en/",
  836. "refsource" : "MISC",
  837. "tags" : [ ]
  838. }, {
  839. "url" : "https://www.moxa.com/en/support/product-support/security-advisory/vport-06ec-2v-series-ip-cameras-vulnerabilities",
  840. "name" : "https://www.moxa.com/en/support/product-support/security-advisory/vport-06ec-2v-series-ip-cameras-vulnerabilities",
  841. "refsource" : "MISC",
  842. "tags" : [ ]
  843. } ]
  844. },
  845. "description" : {
  846. "description_data" : [ {
  847. "lang" : "en",
  848. "value" : "Improper validation of the ChassisID TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows attackers to cause a denial of service due to a negative number passed to the memcpy function via a crafted lldp packet."
  849. } ]
  850. }
  851. },
  852. "configurations" : {
  853. "CVE_data_version" : "4.0",
  854. "nodes" : [ ]
  855. },
  856. "impact" : { },
  857. "publishedDate" : "2021-05-10T11:15Z",
  858. "lastModifiedDate" : "2021-05-10T11:15Z"
  859. }, {
  860. "cve" : {
  861. "data_type" : "CVE",
  862. "data_format" : "MITRE",
  863. "data_version" : "4.0",
  864. "CVE_data_meta" : {
  865. "ID" : "CVE-2021-25845",
  866. "ASSIGNER" : "cve@mitre.org"
  867. },
  868. "problemtype" : {
  869. "problemtype_data" : [ {
  870. "description" : [ ]
  871. } ]
  872. },
  873. "references" : {
  874. "reference_data" : [ {
  875. "url" : "https://www.moxa.com/en/",
  876. "name" : "https://www.moxa.com/en/",
  877. "refsource" : "MISC",
  878. "tags" : [ ]
  879. }, {
  880. "url" : "https://www.moxa.com/en/support/product-support/security-advisory/vport-06ec-2v-series-ip-cameras-vulnerabilities",
  881. "name" : "https://www.moxa.com/en/support/product-support/security-advisory/vport-06ec-2v-series-ip-cameras-vulnerabilities",
  882. "refsource" : "MISC",
  883. "tags" : [ ]
  884. } ]
  885. },
  886. "description" : {
  887. "description_data" : [ {
  888. "lang" : "en",
  889. "value" : "Improper validation of the ChassisID TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows attackers to cause a denial of service due to a NULL pointer dereference via a crafted lldp packet."
  890. } ]
  891. }
  892. },
  893. "configurations" : {
  894. "CVE_data_version" : "4.0",
  895. "nodes" : [ ]
  896. },
  897. "impact" : { },
  898. "publishedDate" : "2021-05-10T11:15Z",
  899. "lastModifiedDate" : "2021-05-10T11:15Z"
  900. }, {
  901. "cve" : {
  902. "data_type" : "CVE",
  903. "data_format" : "MITRE",
  904. "data_version" : "4.0",
  905. "CVE_data_meta" : {
  906. "ID" : "CVE-2021-20717",
  907. "ASSIGNER" : "vultures@jpcert.or.jp"
  908. },
  909. "problemtype" : {
  910. "problemtype_data" : [ {
  911. "description" : [ ]
  912. } ]
  913. },
  914. "references" : {
  915. "reference_data" : [ {
  916. "url" : "https://jvn.jp/en/jp/JVN97554111/index.html",
  917. "name" : "https://jvn.jp/en/jp/JVN97554111/index.html",
  918. "refsource" : "MISC",
  919. "tags" : [ ]
  920. }, {
  921. "url" : "https://www.ec-cube.net/news/detail.php?news_id=384",
  922. "name" : "https://www.ec-cube.net/news/detail.php?news_id=384",
  923. "refsource" : "MISC",
  924. "tags" : [ ]
  925. }, {
  926. "url" : "https://www.ec-cube.net/news/detail.php?news_id=383",
  927. "name" : "https://www.ec-cube.net/news/detail.php?news_id=383",
  928. "refsource" : "MISC",
  929. "tags" : [ ]
  930. } ]
  931. },
  932. "description" : {
  933. "description_data" : [ {
  934. "lang" : "en",
  935. "value" : "Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a remote attacker to inject a specially crafted script in the specific input field of the EC web site which is created using EC-CUBE. As a result, it may lead to an arbitrary script execution on the administrator's web browser."
  936. } ]
  937. }
  938. },
  939. "configurations" : {
  940. "CVE_data_version" : "4.0",
  941. "nodes" : [ ]
  942. },
  943. "impact" : { },
  944. "publishedDate" : "2021-05-10T10:15Z",
  945. "lastModifiedDate" : "2021-05-10T10:15Z"
  946. }, {
  947. "cve" : {
  948. "data_type" : "CVE",
  949. "data_format" : "MITRE",
  950. "data_version" : "4.0",
  951. "CVE_data_meta" : {
  952. "ID" : "CVE-2021-3003",
  953. "ASSIGNER" : "cve@mitre.org"
  954. },
  955. "problemtype" : {
  956. "problemtype_data" : [ {
  957. "description" : [ ]
  958. } ]
  959. },
  960. "references" : {
  961. "reference_data" : [ {
  962. "url" : "https://fibonhack.github.io/2021/desktop-telematico-mitm-to-rce",
  963. "name" : "https://fibonhack.github.io/2021/desktop-telematico-mitm-to-rce",
  964. "refsource" : "MISC",
  965. "tags" : [ ]
  966. }, {
  967. "url" : "https://telematici.agenziaentrate.gov.it/Main/Desktop.jsp",
  968. "name" : "https://telematici.agenziaentrate.gov.it/Main/Desktop.jsp",
  969. "refsource" : "MISC",
  970. "tags" : [ ]
  971. } ]
  972. },
  973. "description" : {
  974. "description_data" : [ {
  975. "lang" : "en",
  976. "value" : "Agenzia delle Entrate Desktop Telematico 1.0.0 contacts the jws.agenziaentrate.it server over cleartext HTTP, which allows man-in-the-middle attackers to spoof product updates."
  977. } ]
  978. }
  979. },
  980. "configurations" : {
  981. "CVE_data_version" : "4.0",
  982. "nodes" : [ ]
  983. },
  984. "impact" : { },
  985. "publishedDate" : "2021-05-10T06:15Z",
  986. "lastModifiedDate" : "2021-05-10T06:15Z"
  987. }, {
  988. "cve" : {
  989. "data_type" : "CVE",
  990. "data_format" : "MITRE",
  991. "data_version" : "4.0",
  992. "CVE_data_meta" : {
  993. "ID" : "CVE-2021-32471",
  994. "ASSIGNER" : "cve@mitre.org"
  995. },
  996. "problemtype" : {
  997. "problemtype_data" : [ {
  998. "description" : [ ]
  999. } ]
  1000. },
  1001. "references" : {
  1002. "reference_data" : [ {
  1003. "url" : "https://github.com/intrinsic-propensity/turing-machine",
  1004. "name" : "https://github.com/intrinsic-propensity/turing-machine",
  1005. "refsource" : "MISC",
  1006. "tags" : [ ]
  1007. }, {
  1008. "url" : "https://arxiv.org/abs/2105.02124",
  1009. "name" : "https://arxiv.org/abs/2105.02124",
  1010. "refsource" : "MISC",
  1011. "tags" : [ ]
  1012. } ]
  1013. },
  1014. "description" : {
  1015. "description_data" : [ {
  1016. "lang" : "en",
  1017. "value" : "Insufficient input validation in the Marvin Minsky 1967 implementation of the Universal Turing Machine allows program users to execute arbitrary code via crafted data. For example, a tape head may have an unexpected location after the processing of input composed of As and Bs (instead of 0s and 1s). NOTE: the discoverer states \"this vulnerability has no real-world implications.\""
  1018. } ]
  1019. }
  1020. },
  1021. "configurations" : {
  1022. "CVE_data_version" : "4.0",
  1023. "nodes" : [ ]
  1024. },
  1025. "impact" : { },
  1026. "publishedDate" : "2021-05-10T05:15Z",
  1027. "lastModifiedDate" : "2021-05-10T05:15Z"
  1028. }, {
  1029. "cve" : {
  1030. "data_type" : "CVE",
  1031. "data_format" : "MITRE",
  1032. "data_version" : "4.0",
  1033. "CVE_data_meta" : {
  1034. "ID" : "CVE-2021-26077",
  1035. "ASSIGNER" : "security@atlassian.com"
  1036. },
  1037. "problemtype" : {
  1038. "problemtype_data" : [ {
  1039. "description" : [ ]
  1040. } ]
  1041. },
  1042. "references" : {
  1043. "reference_data" : [ {
  1044. "url" : "https://confluence.atlassian.com/pages/viewpage.action?pageId=1063555147",
  1045. "name" : "https://confluence.atlassian.com/pages/viewpage.action?pageId=1063555147",
  1046. "refsource" : "MISC",
  1047. "tags" : [ ]
  1048. }, {
  1049. "url" : "https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072",
  1050. "name" : "https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072",
  1051. "refsource" : "MISC",
  1052. "tags" : [ ]
  1053. } ]
  1054. },
  1055. "description" : {
  1056. "description_data" : [ {
  1057. "lang" : "en",
  1058. "value" : "Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions 1.1.0 before 2.1.3 and versions 2.1.4 before 2.1.5 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app."
  1059. } ]
  1060. }
  1061. },
  1062. "configurations" : {
  1063. "CVE_data_version" : "4.0",
  1064. "nodes" : [ ]
  1065. },
  1066. "impact" : { },
  1067. "publishedDate" : "2021-05-10T00:15Z",
  1068. "lastModifiedDate" : "2021-05-10T00:15Z"
  1069. }, {
  1070. "cve" : {
  1071. "data_type" : "CVE",
  1072. "data_format" : "MITRE",
  1073. "data_version" : "4.0",
  1074. "CVE_data_meta" : {
  1075. "ID" : "CVE-2021-31758",
  1076. "ASSIGNER" : "cve@mitre.org"
  1077. },
  1078. "problemtype" : {
  1079. "problemtype_data" : [ {
  1080. "description" : [ {
  1081. "lang" : "en",
  1082. "value" : "CWE-787"
  1083. } ]
  1084. } ]
  1085. },
  1086. "references" : {
  1087. "reference_data" : [ {
  1088. "url" : "https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_2",
  1089. "name" : "https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_2",
  1090. "refsource" : "MISC",
  1091. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  1092. } ]
  1093. },
  1094. "description" : {
  1095. "description_data" : [ {
  1096. "lang" : "en",
  1097. "value" : "An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request."
  1098. } ]
  1099. }
  1100. },
  1101. "configurations" : {
  1102. "CVE_data_version" : "4.0",
  1103. "nodes" : [ {
  1104. "operator" : "AND",
  1105. "children" : [ {
  1106. "operator" : "OR",
  1107. "children" : [ ],
  1108. "cpe_match" : [ {
  1109. "vulnerable" : true,
  1110. "cpe23Uri" : "cpe:2.3:o:tenda:ac11_firmware:*:*:*:*:*:*:*:*",
  1111. "versionEndIncluding" : "02.03.01.104_cn:",
  1112. "cpe_name" : [ ]
  1113. } ]
  1114. }, {
  1115. "operator" : "OR",
  1116. "children" : [ ],
  1117. "cpe_match" : [ {
  1118. "vulnerable" : false,
  1119. "cpe23Uri" : "cpe:2.3:h:tenda:ac11:-:*:*:*:*:*:*:*",
  1120. "cpe_name" : [ ]
  1121. } ]
  1122. } ],
  1123. "cpe_match" : [ ]
  1124. } ]
  1125. },
  1126. "impact" : {
  1127. "baseMetricV3" : {
  1128. "cvssV3" : {
  1129. "version" : "3.1",
  1130. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  1131. "attackVector" : "NETWORK",
  1132. "attackComplexity" : "LOW",
  1133. "privilegesRequired" : "NONE",
  1134. "userInteraction" : "NONE",
  1135. "scope" : "UNCHANGED",
  1136. "confidentialityImpact" : "HIGH",
  1137. "integrityImpact" : "HIGH",
  1138. "availabilityImpact" : "HIGH",
  1139. "baseScore" : 9.8,
  1140. "baseSeverity" : "CRITICAL"
  1141. },
  1142. "exploitabilityScore" : 3.9,
  1143. "impactScore" : 5.9
  1144. },
  1145. "baseMetricV2" : {
  1146. "cvssV2" : {
  1147. "version" : "2.0",
  1148. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  1149. "accessVector" : "NETWORK",
  1150. "accessComplexity" : "LOW",
  1151. "authentication" : "NONE",
  1152. "confidentialityImpact" : "COMPLETE",
  1153. "integrityImpact" : "COMPLETE",
  1154. "availabilityImpact" : "COMPLETE",
  1155. "baseScore" : 10.0
  1156. },
  1157. "severity" : "HIGH",
  1158. "exploitabilityScore" : 10.0,
  1159. "impactScore" : 10.0,
  1160. "acInsufInfo" : false,
  1161. "obtainAllPrivilege" : false,
  1162. "obtainUserPrivilege" : false,
  1163. "obtainOtherPrivilege" : false,
  1164. "userInteractionRequired" : false
  1165. }
  1166. },
  1167. "publishedDate" : "2021-05-07T23:15Z",
  1168. "lastModifiedDate" : "2021-05-10T14:56Z"
  1169. }, {
  1170. "cve" : {
  1171. "data_type" : "CVE",
  1172. "data_format" : "MITRE",
  1173. "data_version" : "4.0",
  1174. "CVE_data_meta" : {
  1175. "ID" : "CVE-2021-31757",
  1176. "ASSIGNER" : "cve@mitre.org"
  1177. },
  1178. "problemtype" : {
  1179. "problemtype_data" : [ {
  1180. "description" : [ {
  1181. "lang" : "en",
  1182. "value" : "CWE-787"
  1183. } ]
  1184. } ]
  1185. },
  1186. "references" : {
  1187. "reference_data" : [ {
  1188. "url" : "https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_4",
  1189. "name" : "https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_4",
  1190. "refsource" : "MISC",
  1191. "tags" : [ "Exploit", "Third Party Advisory" ]
  1192. } ]
  1193. },
  1194. "description" : {
  1195. "description_data" : [ {
  1196. "lang" : "en",
  1197. "value" : "An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request."
  1198. } ]
  1199. }
  1200. },
  1201. "configurations" : {
  1202. "CVE_data_version" : "4.0",
  1203. "nodes" : [ {
  1204. "operator" : "AND",
  1205. "children" : [ {
  1206. "operator" : "OR",
  1207. "children" : [ ],
  1208. "cpe_match" : [ {
  1209. "vulnerable" : true,
  1210. "cpe23Uri" : "cpe:2.3:o:tenda:ac11_firmware:*:*:*:*:*:*:*:*",
  1211. "versionEndIncluding" : "02.03.01.104_cn:",
  1212. "cpe_name" : [ ]
  1213. } ]
  1214. }, {
  1215. "operator" : "OR",
  1216. "children" : [ ],
  1217. "cpe_match" : [ {
  1218. "vulnerable" : false,
  1219. "cpe23Uri" : "cpe:2.3:h:tenda:ac11:-:*:*:*:*:*:*:*",
  1220. "cpe_name" : [ ]
  1221. } ]
  1222. } ],
  1223. "cpe_match" : [ ]
  1224. } ]
  1225. },
  1226. "impact" : {
  1227. "baseMetricV3" : {
  1228. "cvssV3" : {
  1229. "version" : "3.1",
  1230. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  1231. "attackVector" : "NETWORK",
  1232. "attackComplexity" : "LOW",
  1233. "privilegesRequired" : "NONE",
  1234. "userInteraction" : "NONE",
  1235. "scope" : "UNCHANGED",
  1236. "confidentialityImpact" : "HIGH",
  1237. "integrityImpact" : "HIGH",
  1238. "availabilityImpact" : "HIGH",
  1239. "baseScore" : 9.8,
  1240. "baseSeverity" : "CRITICAL"
  1241. },
  1242. "exploitabilityScore" : 3.9,
  1243. "impactScore" : 5.9
  1244. },
  1245. "baseMetricV2" : {
  1246. "cvssV2" : {
  1247. "version" : "2.0",
  1248. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  1249. "accessVector" : "NETWORK",
  1250. "accessComplexity" : "LOW",
  1251. "authentication" : "NONE",
  1252. "confidentialityImpact" : "COMPLETE",
  1253. "integrityImpact" : "COMPLETE",
  1254. "availabilityImpact" : "COMPLETE",
  1255. "baseScore" : 10.0
  1256. },
  1257. "severity" : "HIGH",
  1258. "exploitabilityScore" : 10.0,
  1259. "impactScore" : 10.0,
  1260. "acInsufInfo" : false,
  1261. "obtainAllPrivilege" : false,
  1262. "obtainUserPrivilege" : false,
  1263. "obtainOtherPrivilege" : false,
  1264. "userInteractionRequired" : false
  1265. }
  1266. },
  1267. "publishedDate" : "2021-05-07T23:15Z",
  1268. "lastModifiedDate" : "2021-05-10T14:56Z"
  1269. }, {
  1270. "cve" : {
  1271. "data_type" : "CVE",
  1272. "data_format" : "MITRE",
  1273. "data_version" : "4.0",
  1274. "CVE_data_meta" : {
  1275. "ID" : "CVE-2021-31756",
  1276. "ASSIGNER" : "cve@mitre.org"
  1277. },
  1278. "problemtype" : {
  1279. "problemtype_data" : [ {
  1280. "description" : [ {
  1281. "lang" : "en",
  1282. "value" : "CWE-787"
  1283. } ]
  1284. } ]
  1285. },
  1286. "references" : {
  1287. "reference_data" : [ {
  1288. "url" : "https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_1",
  1289. "name" : "https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_1",
  1290. "refsource" : "MISC",
  1291. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  1292. } ]
  1293. },
  1294. "description" : {
  1295. "description_data" : [ {
  1296. "lang" : "en",
  1297. "value" : "An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copied to the stack variable."
  1298. } ]
  1299. }
  1300. },
  1301. "configurations" : {
  1302. "CVE_data_version" : "4.0",
  1303. "nodes" : [ {
  1304. "operator" : "AND",
  1305. "children" : [ {
  1306. "operator" : "OR",
  1307. "children" : [ ],
  1308. "cpe_match" : [ {
  1309. "vulnerable" : true,
  1310. "cpe23Uri" : "cpe:2.3:o:tenda:ac11_firmware:*:*:*:*:*:*:*:*",
  1311. "versionEndIncluding" : "02.03.01.104_cn:",
  1312. "cpe_name" : [ ]
  1313. } ]
  1314. }, {
  1315. "operator" : "OR",
  1316. "children" : [ ],
  1317. "cpe_match" : [ {
  1318. "vulnerable" : false,
  1319. "cpe23Uri" : "cpe:2.3:h:tenda:ac11:-:*:*:*:*:*:*:*",
  1320. "cpe_name" : [ ]
  1321. } ]
  1322. } ],
  1323. "cpe_match" : [ ]
  1324. } ]
  1325. },
  1326. "impact" : {
  1327. "baseMetricV3" : {
  1328. "cvssV3" : {
  1329. "version" : "3.1",
  1330. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  1331. "attackVector" : "NETWORK",
  1332. "attackComplexity" : "LOW",
  1333. "privilegesRequired" : "NONE",
  1334. "userInteraction" : "NONE",
  1335. "scope" : "UNCHANGED",
  1336. "confidentialityImpact" : "HIGH",
  1337. "integrityImpact" : "HIGH",
  1338. "availabilityImpact" : "HIGH",
  1339. "baseScore" : 9.8,
  1340. "baseSeverity" : "CRITICAL"
  1341. },
  1342. "exploitabilityScore" : 3.9,
  1343. "impactScore" : 5.9
  1344. },
  1345. "baseMetricV2" : {
  1346. "cvssV2" : {
  1347. "version" : "2.0",
  1348. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  1349. "accessVector" : "NETWORK",
  1350. "accessComplexity" : "LOW",
  1351. "authentication" : "NONE",
  1352. "confidentialityImpact" : "COMPLETE",
  1353. "integrityImpact" : "COMPLETE",
  1354. "availabilityImpact" : "COMPLETE",
  1355. "baseScore" : 10.0
  1356. },
  1357. "severity" : "HIGH",
  1358. "exploitabilityScore" : 10.0,
  1359. "impactScore" : 10.0,
  1360. "acInsufInfo" : false,
  1361. "obtainAllPrivilege" : false,
  1362. "obtainUserPrivilege" : false,
  1363. "obtainOtherPrivilege" : false,
  1364. "userInteractionRequired" : false
  1365. }
  1366. },
  1367. "publishedDate" : "2021-05-07T23:15Z",
  1368. "lastModifiedDate" : "2021-05-10T14:56Z"
  1369. }, {
  1370. "cve" : {
  1371. "data_type" : "CVE",
  1372. "data_format" : "MITRE",
  1373. "data_version" : "4.0",
  1374. "CVE_data_meta" : {
  1375. "ID" : "CVE-2021-31755",
  1376. "ASSIGNER" : "cve@mitre.org"
  1377. },
  1378. "problemtype" : {
  1379. "problemtype_data" : [ {
  1380. "description" : [ {
  1381. "lang" : "en",
  1382. "value" : "CWE-787"
  1383. } ]
  1384. } ]
  1385. },
  1386. "references" : {
  1387. "reference_data" : [ {
  1388. "url" : "https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_3",
  1389. "name" : "https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_3",
  1390. "refsource" : "MISC",
  1391. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  1392. } ]
  1393. },
  1394. "description" : {
  1395. "description_data" : [ {
  1396. "lang" : "en",
  1397. "value" : "An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request."
  1398. } ]
  1399. }
  1400. },
  1401. "configurations" : {
  1402. "CVE_data_version" : "4.0",
  1403. "nodes" : [ {
  1404. "operator" : "AND",
  1405. "children" : [ {
  1406. "operator" : "OR",
  1407. "children" : [ ],
  1408. "cpe_match" : [ {
  1409. "vulnerable" : true,
  1410. "cpe23Uri" : "cpe:2.3:o:tenda:ac11_firmware:*:*:*:*:*:*:*:*",
  1411. "versionEndIncluding" : "02.03.01.104_cn:",
  1412. "cpe_name" : [ ]
  1413. } ]
  1414. }, {
  1415. "operator" : "OR",
  1416. "children" : [ ],
  1417. "cpe_match" : [ {
  1418. "vulnerable" : false,
  1419. "cpe23Uri" : "cpe:2.3:h:tenda:ac11:-:*:*:*:*:*:*:*",
  1420. "cpe_name" : [ ]
  1421. } ]
  1422. } ],
  1423. "cpe_match" : [ ]
  1424. } ]
  1425. },
  1426. "impact" : {
  1427. "baseMetricV3" : {
  1428. "cvssV3" : {
  1429. "version" : "3.1",
  1430. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  1431. "attackVector" : "NETWORK",
  1432. "attackComplexity" : "LOW",
  1433. "privilegesRequired" : "NONE",
  1434. "userInteraction" : "NONE",
  1435. "scope" : "UNCHANGED",
  1436. "confidentialityImpact" : "HIGH",
  1437. "integrityImpact" : "HIGH",
  1438. "availabilityImpact" : "HIGH",
  1439. "baseScore" : 9.8,
  1440. "baseSeverity" : "CRITICAL"
  1441. },
  1442. "exploitabilityScore" : 3.9,
  1443. "impactScore" : 5.9
  1444. },
  1445. "baseMetricV2" : {
  1446. "cvssV2" : {
  1447. "version" : "2.0",
  1448. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  1449. "accessVector" : "NETWORK",
  1450. "accessComplexity" : "LOW",
  1451. "authentication" : "NONE",
  1452. "confidentialityImpact" : "COMPLETE",
  1453. "integrityImpact" : "COMPLETE",
  1454. "availabilityImpact" : "COMPLETE",
  1455. "baseScore" : 10.0
  1456. },
  1457. "severity" : "HIGH",
  1458. "exploitabilityScore" : 10.0,
  1459. "impactScore" : 10.0,
  1460. "acInsufInfo" : false,
  1461. "obtainAllPrivilege" : false,
  1462. "obtainUserPrivilege" : false,
  1463. "obtainOtherPrivilege" : false,
  1464. "userInteractionRequired" : false
  1465. }
  1466. },
  1467. "publishedDate" : "2021-05-07T23:15Z",
  1468. "lastModifiedDate" : "2021-05-10T14:57Z"
  1469. }, {
  1470. "cve" : {
  1471. "data_type" : "CVE",
  1472. "data_format" : "MITRE",
  1473. "data_version" : "4.0",
  1474. "CVE_data_meta" : {
  1475. "ID" : "CVE-2021-31472",
  1476. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1477. },
  1478. "problemtype" : {
  1479. "problemtype_data" : [ {
  1480. "description" : [ ]
  1481. } ]
  1482. },
  1483. "references" : {
  1484. "reference_data" : [ {
  1485. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1486. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1487. "refsource" : "MISC",
  1488. "tags" : [ ]
  1489. }, {
  1490. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-529/",
  1491. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-529/",
  1492. "refsource" : "MISC",
  1493. "tags" : [ ]
  1494. } ]
  1495. },
  1496. "description" : {
  1497. "description_data" : [ {
  1498. "lang" : "en",
  1499. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13011."
  1500. } ]
  1501. }
  1502. },
  1503. "configurations" : {
  1504. "CVE_data_version" : "4.0",
  1505. "nodes" : [ ]
  1506. },
  1507. "impact" : { },
  1508. "publishedDate" : "2021-05-07T21:15Z",
  1509. "lastModifiedDate" : "2021-05-07T21:15Z"
  1510. }, {
  1511. "cve" : {
  1512. "data_type" : "CVE",
  1513. "data_format" : "MITRE",
  1514. "data_version" : "4.0",
  1515. "CVE_data_meta" : {
  1516. "ID" : "CVE-2021-31471",
  1517. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1518. },
  1519. "problemtype" : {
  1520. "problemtype_data" : [ {
  1521. "description" : [ ]
  1522. } ]
  1523. },
  1524. "references" : {
  1525. "reference_data" : [ {
  1526. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1527. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1528. "refsource" : "MISC",
  1529. "tags" : [ ]
  1530. }, {
  1531. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-528/",
  1532. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-528/",
  1533. "refsource" : "MISC",
  1534. "tags" : [ ]
  1535. } ]
  1536. },
  1537. "description" : {
  1538. "description_data" : [ {
  1539. "lang" : "en",
  1540. "value" : "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12955."
  1541. } ]
  1542. }
  1543. },
  1544. "configurations" : {
  1545. "CVE_data_version" : "4.0",
  1546. "nodes" : [ ]
  1547. },
  1548. "impact" : { },
  1549. "publishedDate" : "2021-05-07T21:15Z",
  1550. "lastModifiedDate" : "2021-05-07T21:15Z"
  1551. }, {
  1552. "cve" : {
  1553. "data_type" : "CVE",
  1554. "data_format" : "MITRE",
  1555. "data_version" : "4.0",
  1556. "CVE_data_meta" : {
  1557. "ID" : "CVE-2021-31470",
  1558. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1559. },
  1560. "problemtype" : {
  1561. "problemtype_data" : [ {
  1562. "description" : [ {
  1563. "lang" : "en",
  1564. "value" : "CWE-416"
  1565. } ]
  1566. } ]
  1567. },
  1568. "references" : {
  1569. "reference_data" : [ {
  1570. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1571. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1572. "refsource" : "MISC",
  1573. "tags" : [ ]
  1574. }, {
  1575. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-527/",
  1576. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-527/",
  1577. "refsource" : "MISC",
  1578. "tags" : [ ]
  1579. } ]
  1580. },
  1581. "description" : {
  1582. "description_data" : [ {
  1583. "lang" : "en",
  1584. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12947."
  1585. } ]
  1586. }
  1587. },
  1588. "configurations" : {
  1589. "CVE_data_version" : "4.0",
  1590. "nodes" : [ ]
  1591. },
  1592. "impact" : { },
  1593. "publishedDate" : "2021-05-07T21:15Z",
  1594. "lastModifiedDate" : "2021-05-07T21:50Z"
  1595. }, {
  1596. "cve" : {
  1597. "data_type" : "CVE",
  1598. "data_format" : "MITRE",
  1599. "data_version" : "4.0",
  1600. "CVE_data_meta" : {
  1601. "ID" : "CVE-2021-31469",
  1602. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1603. },
  1604. "problemtype" : {
  1605. "problemtype_data" : [ {
  1606. "description" : [ {
  1607. "lang" : "en",
  1608. "value" : "CWE-125"
  1609. } ]
  1610. } ]
  1611. },
  1612. "references" : {
  1613. "reference_data" : [ {
  1614. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1615. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1616. "refsource" : "MISC",
  1617. "tags" : [ ]
  1618. }, {
  1619. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-526/",
  1620. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-526/",
  1621. "refsource" : "MISC",
  1622. "tags" : [ ]
  1623. } ]
  1624. },
  1625. "description" : {
  1626. "description_data" : [ {
  1627. "lang" : "en",
  1628. "value" : "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12936."
  1629. } ]
  1630. }
  1631. },
  1632. "configurations" : {
  1633. "CVE_data_version" : "4.0",
  1634. "nodes" : [ ]
  1635. },
  1636. "impact" : { },
  1637. "publishedDate" : "2021-05-07T21:15Z",
  1638. "lastModifiedDate" : "2021-05-07T21:50Z"
  1639. }, {
  1640. "cve" : {
  1641. "data_type" : "CVE",
  1642. "data_format" : "MITRE",
  1643. "data_version" : "4.0",
  1644. "CVE_data_meta" : {
  1645. "ID" : "CVE-2021-31468",
  1646. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1647. },
  1648. "problemtype" : {
  1649. "problemtype_data" : [ {
  1650. "description" : [ {
  1651. "lang" : "en",
  1652. "value" : "CWE-125"
  1653. } ]
  1654. } ]
  1655. },
  1656. "references" : {
  1657. "reference_data" : [ {
  1658. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-557/",
  1659. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-557/",
  1660. "refsource" : "MISC",
  1661. "tags" : [ ]
  1662. }, {
  1663. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1664. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1665. "refsource" : "MISC",
  1666. "tags" : [ ]
  1667. } ]
  1668. },
  1669. "description" : {
  1670. "description_data" : [ {
  1671. "lang" : "en",
  1672. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D files embedded in PDF documents. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13620."
  1673. } ]
  1674. }
  1675. },
  1676. "configurations" : {
  1677. "CVE_data_version" : "4.0",
  1678. "nodes" : [ ]
  1679. },
  1680. "impact" : { },
  1681. "publishedDate" : "2021-05-07T21:15Z",
  1682. "lastModifiedDate" : "2021-05-07T21:50Z"
  1683. }, {
  1684. "cve" : {
  1685. "data_type" : "CVE",
  1686. "data_format" : "MITRE",
  1687. "data_version" : "4.0",
  1688. "CVE_data_meta" : {
  1689. "ID" : "CVE-2021-31467",
  1690. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1691. },
  1692. "problemtype" : {
  1693. "problemtype_data" : [ {
  1694. "description" : [ {
  1695. "lang" : "en",
  1696. "value" : "CWE-125"
  1697. } ]
  1698. } ]
  1699. },
  1700. "references" : {
  1701. "reference_data" : [ {
  1702. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-556/",
  1703. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-556/",
  1704. "refsource" : "MISC",
  1705. "tags" : [ ]
  1706. }, {
  1707. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1708. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1709. "refsource" : "MISC",
  1710. "tags" : [ ]
  1711. } ]
  1712. },
  1713. "description" : {
  1714. "description_data" : [ {
  1715. "lang" : "en",
  1716. "value" : "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D files embedded in PDF documents. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13621."
  1717. } ]
  1718. }
  1719. },
  1720. "configurations" : {
  1721. "CVE_data_version" : "4.0",
  1722. "nodes" : [ ]
  1723. },
  1724. "impact" : { },
  1725. "publishedDate" : "2021-05-07T21:15Z",
  1726. "lastModifiedDate" : "2021-05-07T21:50Z"
  1727. }, {
  1728. "cve" : {
  1729. "data_type" : "CVE",
  1730. "data_format" : "MITRE",
  1731. "data_version" : "4.0",
  1732. "CVE_data_meta" : {
  1733. "ID" : "CVE-2021-31466",
  1734. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1735. },
  1736. "problemtype" : {
  1737. "problemtype_data" : [ {
  1738. "description" : [ {
  1739. "lang" : "en",
  1740. "value" : "CWE-125"
  1741. } ]
  1742. } ]
  1743. },
  1744. "references" : {
  1745. "reference_data" : [ {
  1746. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-555/",
  1747. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-555/",
  1748. "refsource" : "MISC",
  1749. "tags" : [ ]
  1750. }, {
  1751. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1752. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1753. "refsource" : "MISC",
  1754. "tags" : [ ]
  1755. } ]
  1756. },
  1757. "description" : {
  1758. "description_data" : [ {
  1759. "lang" : "en",
  1760. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13583."
  1761. } ]
  1762. }
  1763. },
  1764. "configurations" : {
  1765. "CVE_data_version" : "4.0",
  1766. "nodes" : [ ]
  1767. },
  1768. "impact" : { },
  1769. "publishedDate" : "2021-05-07T21:15Z",
  1770. "lastModifiedDate" : "2021-05-07T21:50Z"
  1771. }, {
  1772. "cve" : {
  1773. "data_type" : "CVE",
  1774. "data_format" : "MITRE",
  1775. "data_version" : "4.0",
  1776. "CVE_data_meta" : {
  1777. "ID" : "CVE-2021-31465",
  1778. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1779. },
  1780. "problemtype" : {
  1781. "problemtype_data" : [ {
  1782. "description" : [ {
  1783. "lang" : "en",
  1784. "value" : "CWE-787"
  1785. } ]
  1786. } ]
  1787. },
  1788. "references" : {
  1789. "reference_data" : [ {
  1790. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1791. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1792. "refsource" : "MISC",
  1793. "tags" : [ ]
  1794. }, {
  1795. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-554/",
  1796. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-554/",
  1797. "refsource" : "MISC",
  1798. "tags" : [ ]
  1799. } ]
  1800. },
  1801. "description" : {
  1802. "description_data" : [ {
  1803. "lang" : "en",
  1804. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13582."
  1805. } ]
  1806. }
  1807. },
  1808. "configurations" : {
  1809. "CVE_data_version" : "4.0",
  1810. "nodes" : [ ]
  1811. },
  1812. "impact" : { },
  1813. "publishedDate" : "2021-05-07T21:15Z",
  1814. "lastModifiedDate" : "2021-05-07T21:50Z"
  1815. }, {
  1816. "cve" : {
  1817. "data_type" : "CVE",
  1818. "data_format" : "MITRE",
  1819. "data_version" : "4.0",
  1820. "CVE_data_meta" : {
  1821. "ID" : "CVE-2021-31464",
  1822. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1823. },
  1824. "problemtype" : {
  1825. "problemtype_data" : [ {
  1826. "description" : [ {
  1827. "lang" : "en",
  1828. "value" : "CWE-125"
  1829. } ]
  1830. } ]
  1831. },
  1832. "references" : {
  1833. "reference_data" : [ {
  1834. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1835. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1836. "refsource" : "MISC",
  1837. "tags" : [ ]
  1838. }, {
  1839. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-553/",
  1840. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-553/",
  1841. "refsource" : "MISC",
  1842. "tags" : [ ]
  1843. } ]
  1844. },
  1845. "description" : {
  1846. "description_data" : [ {
  1847. "lang" : "en",
  1848. "value" : "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13574."
  1849. } ]
  1850. }
  1851. },
  1852. "configurations" : {
  1853. "CVE_data_version" : "4.0",
  1854. "nodes" : [ ]
  1855. },
  1856. "impact" : { },
  1857. "publishedDate" : "2021-05-07T21:15Z",
  1858. "lastModifiedDate" : "2021-05-07T21:50Z"
  1859. }, {
  1860. "cve" : {
  1861. "data_type" : "CVE",
  1862. "data_format" : "MITRE",
  1863. "data_version" : "4.0",
  1864. "CVE_data_meta" : {
  1865. "ID" : "CVE-2021-31463",
  1866. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1867. },
  1868. "problemtype" : {
  1869. "problemtype_data" : [ {
  1870. "description" : [ {
  1871. "lang" : "en",
  1872. "value" : "CWE-125"
  1873. } ]
  1874. } ]
  1875. },
  1876. "references" : {
  1877. "reference_data" : [ {
  1878. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1879. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1880. "refsource" : "MISC",
  1881. "tags" : [ ]
  1882. }, {
  1883. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-552/",
  1884. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-552/",
  1885. "refsource" : "MISC",
  1886. "tags" : [ ]
  1887. } ]
  1888. },
  1889. "description" : {
  1890. "description_data" : [ {
  1891. "lang" : "en",
  1892. "value" : "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13573."
  1893. } ]
  1894. }
  1895. },
  1896. "configurations" : {
  1897. "CVE_data_version" : "4.0",
  1898. "nodes" : [ ]
  1899. },
  1900. "impact" : { },
  1901. "publishedDate" : "2021-05-07T21:15Z",
  1902. "lastModifiedDate" : "2021-05-07T21:50Z"
  1903. }, {
  1904. "cve" : {
  1905. "data_type" : "CVE",
  1906. "data_format" : "MITRE",
  1907. "data_version" : "4.0",
  1908. "CVE_data_meta" : {
  1909. "ID" : "CVE-2021-31462",
  1910. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1911. },
  1912. "problemtype" : {
  1913. "problemtype_data" : [ {
  1914. "description" : [ {
  1915. "lang" : "en",
  1916. "value" : "CWE-125"
  1917. } ]
  1918. } ]
  1919. },
  1920. "references" : {
  1921. "reference_data" : [ {
  1922. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1923. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1924. "refsource" : "MISC",
  1925. "tags" : [ ]
  1926. }, {
  1927. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-551/",
  1928. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-551/",
  1929. "refsource" : "MISC",
  1930. "tags" : [ ]
  1931. } ]
  1932. },
  1933. "description" : {
  1934. "description_data" : [ {
  1935. "lang" : "en",
  1936. "value" : "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13572."
  1937. } ]
  1938. }
  1939. },
  1940. "configurations" : {
  1941. "CVE_data_version" : "4.0",
  1942. "nodes" : [ ]
  1943. },
  1944. "impact" : { },
  1945. "publishedDate" : "2021-05-07T21:15Z",
  1946. "lastModifiedDate" : "2021-05-07T21:50Z"
  1947. }, {
  1948. "cve" : {
  1949. "data_type" : "CVE",
  1950. "data_format" : "MITRE",
  1951. "data_version" : "4.0",
  1952. "CVE_data_meta" : {
  1953. "ID" : "CVE-2021-31461",
  1954. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1955. },
  1956. "problemtype" : {
  1957. "problemtype_data" : [ {
  1958. "description" : [ ]
  1959. } ]
  1960. },
  1961. "references" : {
  1962. "reference_data" : [ {
  1963. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1964. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  1965. "refsource" : "MISC",
  1966. "tags" : [ ]
  1967. }, {
  1968. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-550/",
  1969. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-550/",
  1970. "refsource" : "MISC",
  1971. "tags" : [ ]
  1972. } ]
  1973. },
  1974. "description" : {
  1975. "description_data" : [ {
  1976. "lang" : "en",
  1977. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the the handling of app.media objects. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process Was ZDI-CAN-13333."
  1978. } ]
  1979. }
  1980. },
  1981. "configurations" : {
  1982. "CVE_data_version" : "4.0",
  1983. "nodes" : [ ]
  1984. },
  1985. "impact" : { },
  1986. "publishedDate" : "2021-05-07T21:15Z",
  1987. "lastModifiedDate" : "2021-05-07T21:50Z"
  1988. }, {
  1989. "cve" : {
  1990. "data_type" : "CVE",
  1991. "data_format" : "MITRE",
  1992. "data_version" : "4.0",
  1993. "CVE_data_meta" : {
  1994. "ID" : "CVE-2021-31460",
  1995. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  1996. },
  1997. "problemtype" : {
  1998. "problemtype_data" : [ {
  1999. "description" : [ {
  2000. "lang" : "en",
  2001. "value" : "CWE-416"
  2002. } ]
  2003. } ]
  2004. },
  2005. "references" : {
  2006. "reference_data" : [ {
  2007. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2008. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2009. "refsource" : "MISC",
  2010. "tags" : [ "Patch", "Vendor Advisory" ]
  2011. }, {
  2012. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-549/",
  2013. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-549/",
  2014. "refsource" : "MISC",
  2015. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  2016. } ]
  2017. },
  2018. "description" : {
  2019. "description_data" : [ {
  2020. "lang" : "en",
  2021. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XFA templates. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13096."
  2022. } ]
  2023. }
  2024. },
  2025. "configurations" : {
  2026. "CVE_data_version" : "4.0",
  2027. "nodes" : [ {
  2028. "operator" : "AND",
  2029. "children" : [ {
  2030. "operator" : "OR",
  2031. "children" : [ ],
  2032. "cpe_match" : [ {
  2033. "vulnerable" : true,
  2034. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
  2035. "versionEndIncluding" : "9.7.5.29616:",
  2036. "cpe_name" : [ ]
  2037. }, {
  2038. "vulnerable" : true,
  2039. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
  2040. "versionStartIncluding" : "10.0.0.0:",
  2041. "versionEndIncluding" : "10.1.37598:",
  2042. "cpe_name" : [ ]
  2043. }, {
  2044. "vulnerable" : true,
  2045. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
  2046. "versionEndIncluding" : "10.1.3.37598:",
  2047. "cpe_name" : [ ]
  2048. } ]
  2049. }, {
  2050. "operator" : "OR",
  2051. "children" : [ ],
  2052. "cpe_match" : [ {
  2053. "vulnerable" : false,
  2054. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  2055. "cpe_name" : [ ]
  2056. } ]
  2057. } ],
  2058. "cpe_match" : [ ]
  2059. } ]
  2060. },
  2061. "impact" : {
  2062. "baseMetricV3" : {
  2063. "cvssV3" : {
  2064. "version" : "3.1",
  2065. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  2066. "attackVector" : "LOCAL",
  2067. "attackComplexity" : "LOW",
  2068. "privilegesRequired" : "NONE",
  2069. "userInteraction" : "REQUIRED",
  2070. "scope" : "UNCHANGED",
  2071. "confidentialityImpact" : "HIGH",
  2072. "integrityImpact" : "HIGH",
  2073. "availabilityImpact" : "HIGH",
  2074. "baseScore" : 7.8,
  2075. "baseSeverity" : "HIGH"
  2076. },
  2077. "exploitabilityScore" : 1.8,
  2078. "impactScore" : 5.9
  2079. },
  2080. "baseMetricV2" : {
  2081. "cvssV2" : {
  2082. "version" : "2.0",
  2083. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  2084. "accessVector" : "NETWORK",
  2085. "accessComplexity" : "MEDIUM",
  2086. "authentication" : "NONE",
  2087. "confidentialityImpact" : "PARTIAL",
  2088. "integrityImpact" : "PARTIAL",
  2089. "availabilityImpact" : "PARTIAL",
  2090. "baseScore" : 6.8
  2091. },
  2092. "severity" : "MEDIUM",
  2093. "exploitabilityScore" : 8.6,
  2094. "impactScore" : 6.4,
  2095. "acInsufInfo" : false,
  2096. "obtainAllPrivilege" : false,
  2097. "obtainUserPrivilege" : false,
  2098. "obtainOtherPrivilege" : false,
  2099. "userInteractionRequired" : true
  2100. }
  2101. },
  2102. "publishedDate" : "2021-05-07T21:15Z",
  2103. "lastModifiedDate" : "2021-05-10T15:23Z"
  2104. }, {
  2105. "cve" : {
  2106. "data_type" : "CVE",
  2107. "data_format" : "MITRE",
  2108. "data_version" : "4.0",
  2109. "CVE_data_meta" : {
  2110. "ID" : "CVE-2021-31459",
  2111. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2112. },
  2113. "problemtype" : {
  2114. "problemtype_data" : [ {
  2115. "description" : [ {
  2116. "lang" : "en",
  2117. "value" : "CWE-416"
  2118. } ]
  2119. } ]
  2120. },
  2121. "references" : {
  2122. "reference_data" : [ {
  2123. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2124. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2125. "refsource" : "MISC",
  2126. "tags" : [ "Patch", "Vendor Advisory" ]
  2127. }, {
  2128. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-548/",
  2129. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-548/",
  2130. "refsource" : "MISC",
  2131. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  2132. } ]
  2133. },
  2134. "description" : {
  2135. "description_data" : [ {
  2136. "lang" : "en",
  2137. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA Forms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13162."
  2138. } ]
  2139. }
  2140. },
  2141. "configurations" : {
  2142. "CVE_data_version" : "4.0",
  2143. "nodes" : [ {
  2144. "operator" : "AND",
  2145. "children" : [ {
  2146. "operator" : "OR",
  2147. "children" : [ ],
  2148. "cpe_match" : [ {
  2149. "vulnerable" : true,
  2150. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
  2151. "versionEndIncluding" : "9.7.5.29616:",
  2152. "cpe_name" : [ ]
  2153. }, {
  2154. "vulnerable" : true,
  2155. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
  2156. "versionStartIncluding" : "10.0.0.0:",
  2157. "versionEndIncluding" : "10.1.3.37598:",
  2158. "cpe_name" : [ ]
  2159. }, {
  2160. "vulnerable" : true,
  2161. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
  2162. "versionEndIncluding" : "10.1.3.37598:",
  2163. "cpe_name" : [ ]
  2164. } ]
  2165. }, {
  2166. "operator" : "OR",
  2167. "children" : [ ],
  2168. "cpe_match" : [ {
  2169. "vulnerable" : false,
  2170. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  2171. "cpe_name" : [ ]
  2172. } ]
  2173. } ],
  2174. "cpe_match" : [ ]
  2175. } ]
  2176. },
  2177. "impact" : {
  2178. "baseMetricV3" : {
  2179. "cvssV3" : {
  2180. "version" : "3.1",
  2181. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  2182. "attackVector" : "LOCAL",
  2183. "attackComplexity" : "LOW",
  2184. "privilegesRequired" : "NONE",
  2185. "userInteraction" : "REQUIRED",
  2186. "scope" : "UNCHANGED",
  2187. "confidentialityImpact" : "HIGH",
  2188. "integrityImpact" : "HIGH",
  2189. "availabilityImpact" : "HIGH",
  2190. "baseScore" : 7.8,
  2191. "baseSeverity" : "HIGH"
  2192. },
  2193. "exploitabilityScore" : 1.8,
  2194. "impactScore" : 5.9
  2195. },
  2196. "baseMetricV2" : {
  2197. "cvssV2" : {
  2198. "version" : "2.0",
  2199. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  2200. "accessVector" : "NETWORK",
  2201. "accessComplexity" : "MEDIUM",
  2202. "authentication" : "NONE",
  2203. "confidentialityImpact" : "PARTIAL",
  2204. "integrityImpact" : "PARTIAL",
  2205. "availabilityImpact" : "PARTIAL",
  2206. "baseScore" : 6.8
  2207. },
  2208. "severity" : "MEDIUM",
  2209. "exploitabilityScore" : 8.6,
  2210. "impactScore" : 6.4,
  2211. "acInsufInfo" : false,
  2212. "obtainAllPrivilege" : false,
  2213. "obtainUserPrivilege" : false,
  2214. "obtainOtherPrivilege" : false,
  2215. "userInteractionRequired" : true
  2216. }
  2217. },
  2218. "publishedDate" : "2021-05-07T21:15Z",
  2219. "lastModifiedDate" : "2021-05-10T15:52Z"
  2220. }, {
  2221. "cve" : {
  2222. "data_type" : "CVE",
  2223. "data_format" : "MITRE",
  2224. "data_version" : "4.0",
  2225. "CVE_data_meta" : {
  2226. "ID" : "CVE-2021-31458",
  2227. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2228. },
  2229. "problemtype" : {
  2230. "problemtype_data" : [ {
  2231. "description" : [ {
  2232. "lang" : "en",
  2233. "value" : "CWE-416"
  2234. } ]
  2235. } ]
  2236. },
  2237. "references" : {
  2238. "reference_data" : [ {
  2239. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-547/",
  2240. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-547/",
  2241. "refsource" : "MISC",
  2242. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  2243. }, {
  2244. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2245. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2246. "refsource" : "MISC",
  2247. "tags" : [ "Patch", "Vendor Advisory" ]
  2248. } ]
  2249. },
  2250. "description" : {
  2251. "description_data" : [ {
  2252. "lang" : "en",
  2253. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13150."
  2254. } ]
  2255. }
  2256. },
  2257. "configurations" : {
  2258. "CVE_data_version" : "4.0",
  2259. "nodes" : [ {
  2260. "operator" : "AND",
  2261. "children" : [ {
  2262. "operator" : "OR",
  2263. "children" : [ ],
  2264. "cpe_match" : [ {
  2265. "vulnerable" : true,
  2266. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
  2267. "versionEndIncluding" : "9.7.5.29616:",
  2268. "cpe_name" : [ ]
  2269. }, {
  2270. "vulnerable" : true,
  2271. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
  2272. "versionStartIncluding" : "10.0.0.0:",
  2273. "versionEndIncluding" : "10.1.37598:",
  2274. "cpe_name" : [ ]
  2275. }, {
  2276. "vulnerable" : true,
  2277. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
  2278. "versionEndIncluding" : "10.1.3.37598:",
  2279. "cpe_name" : [ ]
  2280. } ]
  2281. }, {
  2282. "operator" : "OR",
  2283. "children" : [ ],
  2284. "cpe_match" : [ {
  2285. "vulnerable" : false,
  2286. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  2287. "cpe_name" : [ ]
  2288. } ]
  2289. } ],
  2290. "cpe_match" : [ ]
  2291. } ]
  2292. },
  2293. "impact" : {
  2294. "baseMetricV3" : {
  2295. "cvssV3" : {
  2296. "version" : "3.1",
  2297. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  2298. "attackVector" : "LOCAL",
  2299. "attackComplexity" : "LOW",
  2300. "privilegesRequired" : "NONE",
  2301. "userInteraction" : "REQUIRED",
  2302. "scope" : "UNCHANGED",
  2303. "confidentialityImpact" : "HIGH",
  2304. "integrityImpact" : "HIGH",
  2305. "availabilityImpact" : "HIGH",
  2306. "baseScore" : 7.8,
  2307. "baseSeverity" : "HIGH"
  2308. },
  2309. "exploitabilityScore" : 1.8,
  2310. "impactScore" : 5.9
  2311. },
  2312. "baseMetricV2" : {
  2313. "cvssV2" : {
  2314. "version" : "2.0",
  2315. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  2316. "accessVector" : "NETWORK",
  2317. "accessComplexity" : "MEDIUM",
  2318. "authentication" : "NONE",
  2319. "confidentialityImpact" : "PARTIAL",
  2320. "integrityImpact" : "PARTIAL",
  2321. "availabilityImpact" : "PARTIAL",
  2322. "baseScore" : 6.8
  2323. },
  2324. "severity" : "MEDIUM",
  2325. "exploitabilityScore" : 8.6,
  2326. "impactScore" : 6.4,
  2327. "acInsufInfo" : false,
  2328. "obtainAllPrivilege" : false,
  2329. "obtainUserPrivilege" : false,
  2330. "obtainOtherPrivilege" : false,
  2331. "userInteractionRequired" : true
  2332. }
  2333. },
  2334. "publishedDate" : "2021-05-07T21:15Z",
  2335. "lastModifiedDate" : "2021-05-10T15:53Z"
  2336. }, {
  2337. "cve" : {
  2338. "data_type" : "CVE",
  2339. "data_format" : "MITRE",
  2340. "data_version" : "4.0",
  2341. "CVE_data_meta" : {
  2342. "ID" : "CVE-2021-31457",
  2343. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2344. },
  2345. "problemtype" : {
  2346. "problemtype_data" : [ {
  2347. "description" : [ {
  2348. "lang" : "en",
  2349. "value" : "CWE-416"
  2350. } ]
  2351. } ]
  2352. },
  2353. "references" : {
  2354. "reference_data" : [ {
  2355. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-546/",
  2356. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-546/",
  2357. "refsource" : "MISC",
  2358. "tags" : [ ]
  2359. }, {
  2360. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2361. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2362. "refsource" : "MISC",
  2363. "tags" : [ ]
  2364. } ]
  2365. },
  2366. "description" : {
  2367. "description_data" : [ {
  2368. "lang" : "en",
  2369. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13147."
  2370. } ]
  2371. }
  2372. },
  2373. "configurations" : {
  2374. "CVE_data_version" : "4.0",
  2375. "nodes" : [ ]
  2376. },
  2377. "impact" : { },
  2378. "publishedDate" : "2021-05-07T21:15Z",
  2379. "lastModifiedDate" : "2021-05-07T21:50Z"
  2380. }, {
  2381. "cve" : {
  2382. "data_type" : "CVE",
  2383. "data_format" : "MITRE",
  2384. "data_version" : "4.0",
  2385. "CVE_data_meta" : {
  2386. "ID" : "CVE-2021-31456",
  2387. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2388. },
  2389. "problemtype" : {
  2390. "problemtype_data" : [ {
  2391. "description" : [ {
  2392. "lang" : "en",
  2393. "value" : "CWE-416"
  2394. } ]
  2395. } ]
  2396. },
  2397. "references" : {
  2398. "reference_data" : [ {
  2399. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-545/",
  2400. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-545/",
  2401. "refsource" : "MISC",
  2402. "tags" : [ ]
  2403. }, {
  2404. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2405. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2406. "refsource" : "MISC",
  2407. "tags" : [ ]
  2408. } ]
  2409. },
  2410. "description" : {
  2411. "description_data" : [ {
  2412. "lang" : "en",
  2413. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13102."
  2414. } ]
  2415. }
  2416. },
  2417. "configurations" : {
  2418. "CVE_data_version" : "4.0",
  2419. "nodes" : [ ]
  2420. },
  2421. "impact" : { },
  2422. "publishedDate" : "2021-05-07T21:15Z",
  2423. "lastModifiedDate" : "2021-05-07T21:50Z"
  2424. }, {
  2425. "cve" : {
  2426. "data_type" : "CVE",
  2427. "data_format" : "MITRE",
  2428. "data_version" : "4.0",
  2429. "CVE_data_meta" : {
  2430. "ID" : "CVE-2021-31455",
  2431. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2432. },
  2433. "problemtype" : {
  2434. "problemtype_data" : [ {
  2435. "description" : [ ]
  2436. } ]
  2437. },
  2438. "references" : {
  2439. "reference_data" : [ {
  2440. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-544/",
  2441. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-544/",
  2442. "refsource" : "MISC",
  2443. "tags" : [ ]
  2444. }, {
  2445. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2446. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2447. "refsource" : "MISC",
  2448. "tags" : [ ]
  2449. } ]
  2450. },
  2451. "description" : {
  2452. "description_data" : [ {
  2453. "lang" : "en",
  2454. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA forms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13100."
  2455. } ]
  2456. }
  2457. },
  2458. "configurations" : {
  2459. "CVE_data_version" : "4.0",
  2460. "nodes" : [ ]
  2461. },
  2462. "impact" : { },
  2463. "publishedDate" : "2021-05-07T21:15Z",
  2464. "lastModifiedDate" : "2021-05-07T21:50Z"
  2465. }, {
  2466. "cve" : {
  2467. "data_type" : "CVE",
  2468. "data_format" : "MITRE",
  2469. "data_version" : "4.0",
  2470. "CVE_data_meta" : {
  2471. "ID" : "CVE-2021-31454",
  2472. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2473. },
  2474. "problemtype" : {
  2475. "problemtype_data" : [ {
  2476. "description" : [ {
  2477. "lang" : "en",
  2478. "value" : "CWE-122"
  2479. } ]
  2480. } ]
  2481. },
  2482. "references" : {
  2483. "reference_data" : [ {
  2484. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2485. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2486. "refsource" : "MISC",
  2487. "tags" : [ ]
  2488. }, {
  2489. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-543/",
  2490. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-543/",
  2491. "refsource" : "MISC",
  2492. "tags" : [ ]
  2493. } ]
  2494. },
  2495. "description" : {
  2496. "description_data" : [ {
  2497. "lang" : "en",
  2498. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Decimal element. A crafted leadDigits value in a Decimal element can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. Was ZDI-CAN-13095."
  2499. } ]
  2500. }
  2501. },
  2502. "configurations" : {
  2503. "CVE_data_version" : "4.0",
  2504. "nodes" : [ ]
  2505. },
  2506. "impact" : { },
  2507. "publishedDate" : "2021-05-07T21:15Z",
  2508. "lastModifiedDate" : "2021-05-07T21:50Z"
  2509. }, {
  2510. "cve" : {
  2511. "data_type" : "CVE",
  2512. "data_format" : "MITRE",
  2513. "data_version" : "4.0",
  2514. "CVE_data_meta" : {
  2515. "ID" : "CVE-2021-31453",
  2516. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2517. },
  2518. "problemtype" : {
  2519. "problemtype_data" : [ {
  2520. "description" : [ {
  2521. "lang" : "en",
  2522. "value" : "CWE-416"
  2523. } ]
  2524. } ]
  2525. },
  2526. "references" : {
  2527. "reference_data" : [ {
  2528. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2529. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2530. "refsource" : "MISC",
  2531. "tags" : [ ]
  2532. }, {
  2533. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-542/",
  2534. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-542/",
  2535. "refsource" : "MISC",
  2536. "tags" : [ ]
  2537. } ]
  2538. },
  2539. "description" : {
  2540. "description_data" : [ {
  2541. "lang" : "en",
  2542. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA Forms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13092."
  2543. } ]
  2544. }
  2545. },
  2546. "configurations" : {
  2547. "CVE_data_version" : "4.0",
  2548. "nodes" : [ ]
  2549. },
  2550. "impact" : { },
  2551. "publishedDate" : "2021-05-07T21:15Z",
  2552. "lastModifiedDate" : "2021-05-07T21:50Z"
  2553. }, {
  2554. "cve" : {
  2555. "data_type" : "CVE",
  2556. "data_format" : "MITRE",
  2557. "data_version" : "4.0",
  2558. "CVE_data_meta" : {
  2559. "ID" : "CVE-2021-31452",
  2560. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2561. },
  2562. "problemtype" : {
  2563. "problemtype_data" : [ {
  2564. "description" : [ {
  2565. "lang" : "en",
  2566. "value" : "CWE-787"
  2567. } ]
  2568. } ]
  2569. },
  2570. "references" : {
  2571. "reference_data" : [ {
  2572. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2573. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2574. "refsource" : "MISC",
  2575. "tags" : [ ]
  2576. }, {
  2577. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-541/",
  2578. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-541/",
  2579. "refsource" : "MISC",
  2580. "tags" : [ ]
  2581. } ]
  2582. },
  2583. "description" : {
  2584. "description_data" : [ {
  2585. "lang" : "en",
  2586. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA forms. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13091."
  2587. } ]
  2588. }
  2589. },
  2590. "configurations" : {
  2591. "CVE_data_version" : "4.0",
  2592. "nodes" : [ ]
  2593. },
  2594. "impact" : { },
  2595. "publishedDate" : "2021-05-07T21:15Z",
  2596. "lastModifiedDate" : "2021-05-07T21:50Z"
  2597. }, {
  2598. "cve" : {
  2599. "data_type" : "CVE",
  2600. "data_format" : "MITRE",
  2601. "data_version" : "4.0",
  2602. "CVE_data_meta" : {
  2603. "ID" : "CVE-2021-31451",
  2604. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2605. },
  2606. "problemtype" : {
  2607. "problemtype_data" : [ {
  2608. "description" : [ {
  2609. "lang" : "en",
  2610. "value" : "CWE-416"
  2611. } ]
  2612. } ]
  2613. },
  2614. "references" : {
  2615. "reference_data" : [ {
  2616. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2617. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2618. "refsource" : "MISC",
  2619. "tags" : [ ]
  2620. }, {
  2621. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-540/",
  2622. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-540/",
  2623. "refsource" : "MISC",
  2624. "tags" : [ ]
  2625. } ]
  2626. },
  2627. "description" : {
  2628. "description_data" : [ {
  2629. "lang" : "en",
  2630. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13089."
  2631. } ]
  2632. }
  2633. },
  2634. "configurations" : {
  2635. "CVE_data_version" : "4.0",
  2636. "nodes" : [ ]
  2637. },
  2638. "impact" : { },
  2639. "publishedDate" : "2021-05-07T21:15Z",
  2640. "lastModifiedDate" : "2021-05-07T21:50Z"
  2641. }, {
  2642. "cve" : {
  2643. "data_type" : "CVE",
  2644. "data_format" : "MITRE",
  2645. "data_version" : "4.0",
  2646. "CVE_data_meta" : {
  2647. "ID" : "CVE-2021-31450",
  2648. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2649. },
  2650. "problemtype" : {
  2651. "problemtype_data" : [ {
  2652. "description" : [ {
  2653. "lang" : "en",
  2654. "value" : "CWE-416"
  2655. } ]
  2656. } ]
  2657. },
  2658. "references" : {
  2659. "reference_data" : [ {
  2660. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2661. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2662. "refsource" : "MISC",
  2663. "tags" : [ ]
  2664. }, {
  2665. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-539/",
  2666. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-539/",
  2667. "refsource" : "MISC",
  2668. "tags" : [ ]
  2669. } ]
  2670. },
  2671. "description" : {
  2672. "description_data" : [ {
  2673. "lang" : "en",
  2674. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA forms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13084."
  2675. } ]
  2676. }
  2677. },
  2678. "configurations" : {
  2679. "CVE_data_version" : "4.0",
  2680. "nodes" : [ ]
  2681. },
  2682. "impact" : { },
  2683. "publishedDate" : "2021-05-07T21:15Z",
  2684. "lastModifiedDate" : "2021-05-07T21:50Z"
  2685. }, {
  2686. "cve" : {
  2687. "data_type" : "CVE",
  2688. "data_format" : "MITRE",
  2689. "data_version" : "4.0",
  2690. "CVE_data_meta" : {
  2691. "ID" : "CVE-2021-31449",
  2692. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2693. },
  2694. "problemtype" : {
  2695. "problemtype_data" : [ {
  2696. "description" : [ {
  2697. "lang" : "en",
  2698. "value" : "CWE-415"
  2699. } ]
  2700. } ]
  2701. },
  2702. "references" : {
  2703. "reference_data" : [ {
  2704. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2705. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2706. "refsource" : "MISC",
  2707. "tags" : [ ]
  2708. }, {
  2709. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-538/",
  2710. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-538/",
  2711. "refsource" : "MISC",
  2712. "tags" : [ ]
  2713. } ]
  2714. },
  2715. "description" : {
  2716. "description_data" : [ {
  2717. "lang" : "en",
  2718. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13280."
  2719. } ]
  2720. }
  2721. },
  2722. "configurations" : {
  2723. "CVE_data_version" : "4.0",
  2724. "nodes" : [ ]
  2725. },
  2726. "impact" : { },
  2727. "publishedDate" : "2021-05-07T21:15Z",
  2728. "lastModifiedDate" : "2021-05-07T21:50Z"
  2729. }, {
  2730. "cve" : {
  2731. "data_type" : "CVE",
  2732. "data_format" : "MITRE",
  2733. "data_version" : "4.0",
  2734. "CVE_data_meta" : {
  2735. "ID" : "CVE-2021-31448",
  2736. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2737. },
  2738. "problemtype" : {
  2739. "problemtype_data" : [ {
  2740. "description" : [ ]
  2741. } ]
  2742. },
  2743. "references" : {
  2744. "reference_data" : [ {
  2745. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2746. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2747. "refsource" : "MISC",
  2748. "tags" : [ ]
  2749. }, {
  2750. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-537/",
  2751. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-537/",
  2752. "refsource" : "MISC",
  2753. "tags" : [ ]
  2754. } ]
  2755. },
  2756. "description" : {
  2757. "description_data" : [ {
  2758. "lang" : "en",
  2759. "value" : "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13273."
  2760. } ]
  2761. }
  2762. },
  2763. "configurations" : {
  2764. "CVE_data_version" : "4.0",
  2765. "nodes" : [ ]
  2766. },
  2767. "impact" : { },
  2768. "publishedDate" : "2021-05-07T21:15Z",
  2769. "lastModifiedDate" : "2021-05-07T21:50Z"
  2770. }, {
  2771. "cve" : {
  2772. "data_type" : "CVE",
  2773. "data_format" : "MITRE",
  2774. "data_version" : "4.0",
  2775. "CVE_data_meta" : {
  2776. "ID" : "CVE-2021-31447",
  2777. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2778. },
  2779. "problemtype" : {
  2780. "problemtype_data" : [ {
  2781. "description" : [ {
  2782. "lang" : "en",
  2783. "value" : "CWE-125"
  2784. } ]
  2785. } ]
  2786. },
  2787. "references" : {
  2788. "reference_data" : [ {
  2789. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-536/",
  2790. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-536/",
  2791. "refsource" : "MISC",
  2792. "tags" : [ ]
  2793. }, {
  2794. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2795. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2796. "refsource" : "MISC",
  2797. "tags" : [ ]
  2798. } ]
  2799. },
  2800. "description" : {
  2801. "description_data" : [ {
  2802. "lang" : "en",
  2803. "value" : "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13269."
  2804. } ]
  2805. }
  2806. },
  2807. "configurations" : {
  2808. "CVE_data_version" : "4.0",
  2809. "nodes" : [ ]
  2810. },
  2811. "impact" : { },
  2812. "publishedDate" : "2021-05-07T21:15Z",
  2813. "lastModifiedDate" : "2021-05-07T21:50Z"
  2814. }, {
  2815. "cve" : {
  2816. "data_type" : "CVE",
  2817. "data_format" : "MITRE",
  2818. "data_version" : "4.0",
  2819. "CVE_data_meta" : {
  2820. "ID" : "CVE-2021-31446",
  2821. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2822. },
  2823. "problemtype" : {
  2824. "problemtype_data" : [ {
  2825. "description" : [ {
  2826. "lang" : "en",
  2827. "value" : "CWE-125"
  2828. } ]
  2829. } ]
  2830. },
  2831. "references" : {
  2832. "reference_data" : [ {
  2833. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-535/",
  2834. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-535/",
  2835. "refsource" : "MISC",
  2836. "tags" : [ ]
  2837. }, {
  2838. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2839. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2840. "refsource" : "MISC",
  2841. "tags" : [ ]
  2842. } ]
  2843. },
  2844. "description" : {
  2845. "description_data" : [ {
  2846. "lang" : "en",
  2847. "value" : "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13245."
  2848. } ]
  2849. }
  2850. },
  2851. "configurations" : {
  2852. "CVE_data_version" : "4.0",
  2853. "nodes" : [ ]
  2854. },
  2855. "impact" : { },
  2856. "publishedDate" : "2021-05-07T21:15Z",
  2857. "lastModifiedDate" : "2021-05-07T21:50Z"
  2858. }, {
  2859. "cve" : {
  2860. "data_type" : "CVE",
  2861. "data_format" : "MITRE",
  2862. "data_version" : "4.0",
  2863. "CVE_data_meta" : {
  2864. "ID" : "CVE-2021-31445",
  2865. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2866. },
  2867. "problemtype" : {
  2868. "problemtype_data" : [ {
  2869. "description" : [ {
  2870. "lang" : "en",
  2871. "value" : "CWE-125"
  2872. } ]
  2873. } ]
  2874. },
  2875. "references" : {
  2876. "reference_data" : [ {
  2877. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-534/",
  2878. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-534/",
  2879. "refsource" : "MISC",
  2880. "tags" : [ ]
  2881. }, {
  2882. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2883. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2884. "refsource" : "MISC",
  2885. "tags" : [ ]
  2886. } ]
  2887. },
  2888. "description" : {
  2889. "description_data" : [ {
  2890. "lang" : "en",
  2891. "value" : "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13244."
  2892. } ]
  2893. }
  2894. },
  2895. "configurations" : {
  2896. "CVE_data_version" : "4.0",
  2897. "nodes" : [ ]
  2898. },
  2899. "impact" : { },
  2900. "publishedDate" : "2021-05-07T21:15Z",
  2901. "lastModifiedDate" : "2021-05-07T21:50Z"
  2902. }, {
  2903. "cve" : {
  2904. "data_type" : "CVE",
  2905. "data_format" : "MITRE",
  2906. "data_version" : "4.0",
  2907. "CVE_data_meta" : {
  2908. "ID" : "CVE-2021-31444",
  2909. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2910. },
  2911. "problemtype" : {
  2912. "problemtype_data" : [ {
  2913. "description" : [ {
  2914. "lang" : "en",
  2915. "value" : "CWE-125"
  2916. } ]
  2917. } ]
  2918. },
  2919. "references" : {
  2920. "reference_data" : [ {
  2921. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-533/",
  2922. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-533/",
  2923. "refsource" : "MISC",
  2924. "tags" : [ ]
  2925. }, {
  2926. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2927. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2928. "refsource" : "MISC",
  2929. "tags" : [ ]
  2930. } ]
  2931. },
  2932. "description" : {
  2933. "description_data" : [ {
  2934. "lang" : "en",
  2935. "value" : "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13241."
  2936. } ]
  2937. }
  2938. },
  2939. "configurations" : {
  2940. "CVE_data_version" : "4.0",
  2941. "nodes" : [ ]
  2942. },
  2943. "impact" : { },
  2944. "publishedDate" : "2021-05-07T21:15Z",
  2945. "lastModifiedDate" : "2021-05-07T21:50Z"
  2946. }, {
  2947. "cve" : {
  2948. "data_type" : "CVE",
  2949. "data_format" : "MITRE",
  2950. "data_version" : "4.0",
  2951. "CVE_data_meta" : {
  2952. "ID" : "CVE-2021-31443",
  2953. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2954. },
  2955. "problemtype" : {
  2956. "problemtype_data" : [ {
  2957. "description" : [ {
  2958. "lang" : "en",
  2959. "value" : "CWE-125"
  2960. } ]
  2961. } ]
  2962. },
  2963. "references" : {
  2964. "reference_data" : [ {
  2965. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2966. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  2967. "refsource" : "MISC",
  2968. "tags" : [ ]
  2969. }, {
  2970. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-532/",
  2971. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-532/",
  2972. "refsource" : "MISC",
  2973. "tags" : [ ]
  2974. } ]
  2975. },
  2976. "description" : {
  2977. "description_data" : [ {
  2978. "lang" : "en",
  2979. "value" : "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13240."
  2980. } ]
  2981. }
  2982. },
  2983. "configurations" : {
  2984. "CVE_data_version" : "4.0",
  2985. "nodes" : [ ]
  2986. },
  2987. "impact" : { },
  2988. "publishedDate" : "2021-05-07T21:15Z",
  2989. "lastModifiedDate" : "2021-05-07T21:50Z"
  2990. }, {
  2991. "cve" : {
  2992. "data_type" : "CVE",
  2993. "data_format" : "MITRE",
  2994. "data_version" : "4.0",
  2995. "CVE_data_meta" : {
  2996. "ID" : "CVE-2021-31442",
  2997. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  2998. },
  2999. "problemtype" : {
  3000. "problemtype_data" : [ {
  3001. "description" : [ {
  3002. "lang" : "en",
  3003. "value" : "CWE-787"
  3004. } ]
  3005. } ]
  3006. },
  3007. "references" : {
  3008. "reference_data" : [ {
  3009. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  3010. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  3011. "refsource" : "MISC",
  3012. "tags" : [ ]
  3013. }, {
  3014. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-531/",
  3015. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-531/",
  3016. "refsource" : "MISC",
  3017. "tags" : [ ]
  3018. } ]
  3019. },
  3020. "description" : {
  3021. "description_data" : [ {
  3022. "lang" : "en",
  3023. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13239."
  3024. } ]
  3025. }
  3026. },
  3027. "configurations" : {
  3028. "CVE_data_version" : "4.0",
  3029. "nodes" : [ ]
  3030. },
  3031. "impact" : { },
  3032. "publishedDate" : "2021-05-07T21:15Z",
  3033. "lastModifiedDate" : "2021-05-07T21:50Z"
  3034. }, {
  3035. "cve" : {
  3036. "data_type" : "CVE",
  3037. "data_format" : "MITRE",
  3038. "data_version" : "4.0",
  3039. "CVE_data_meta" : {
  3040. "ID" : "CVE-2021-31441",
  3041. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  3042. },
  3043. "problemtype" : {
  3044. "problemtype_data" : [ {
  3045. "description" : [ {
  3046. "lang" : "en",
  3047. "value" : "CWE-416"
  3048. } ]
  3049. } ]
  3050. },
  3051. "references" : {
  3052. "reference_data" : [ {
  3053. "url" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  3054. "name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
  3055. "refsource" : "MISC",
  3056. "tags" : [ ]
  3057. }, {
  3058. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-530/",
  3059. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-530/",
  3060. "refsource" : "MISC",
  3061. "tags" : [ ]
  3062. } ]
  3063. },
  3064. "description" : {
  3065. "description_data" : [ {
  3066. "lang" : "en",
  3067. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13101."
  3068. } ]
  3069. }
  3070. },
  3071. "configurations" : {
  3072. "CVE_data_version" : "4.0",
  3073. "nodes" : [ ]
  3074. },
  3075. "impact" : { },
  3076. "publishedDate" : "2021-05-07T21:15Z",
  3077. "lastModifiedDate" : "2021-05-07T21:50Z"
  3078. }, {
  3079. "cve" : {
  3080. "data_type" : "CVE",
  3081. "data_format" : "MITRE",
  3082. "data_version" : "4.0",
  3083. "CVE_data_meta" : {
  3084. "ID" : "CVE-2021-29499",
  3085. "ASSIGNER" : "security-advisories@github.com"
  3086. },
  3087. "problemtype" : {
  3088. "problemtype_data" : [ {
  3089. "description" : [ ]
  3090. } ]
  3091. },
  3092. "references" : {
  3093. "reference_data" : [ {
  3094. "url" : "https://github.com/sylabs/sif/security/advisories/GHSA-4gh8-x3vv-phhg",
  3095. "name" : "https://github.com/sylabs/sif/security/advisories/GHSA-4gh8-x3vv-phhg",
  3096. "refsource" : "CONFIRM",
  3097. "tags" : [ ]
  3098. } ]
  3099. },
  3100. "description" : {
  3101. "description_data" : [ {
  3102. "lang" : "en",
  3103. "value" : "SIF is an open source implementation of the Singularity Container Image Format. The `siftool new` command and func siftool.New() produce predictable UUID identifiers due to insecure randomness in the version of the `github.com/satori/go.uuid` module used as a dependency. A patch is available in version >= v1.2.3 of the module. Users are encouraged to upgrade. As a workaround, users passing CreateInfo struct should ensure the `ID` field is generated using a version of `github.com/satori/go.uuid` that is not vulnerable to this issue."
  3104. } ]
  3105. }
  3106. },
  3107. "configurations" : {
  3108. "CVE_data_version" : "4.0",
  3109. "nodes" : [ ]
  3110. },
  3111. "impact" : { },
  3112. "publishedDate" : "2021-05-07T21:15Z",
  3113. "lastModifiedDate" : "2021-05-07T21:15Z"
  3114. }, {
  3115. "cve" : {
  3116. "data_type" : "CVE",
  3117. "data_format" : "MITRE",
  3118. "data_version" : "4.0",
  3119. "CVE_data_meta" : {
  3120. "ID" : "CVE-2021-32470",
  3121. "ASSIGNER" : "cve@mitre.org"
  3122. },
  3123. "problemtype" : {
  3124. "problemtype_data" : [ {
  3125. "description" : [ ]
  3126. } ]
  3127. },
  3128. "references" : {
  3129. "reference_data" : [ {
  3130. "url" : "https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3613---2021-05-04",
  3131. "name" : "https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3613---2021-05-04",
  3132. "refsource" : "MISC",
  3133. "tags" : [ ]
  3134. }, {
  3135. "url" : "https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6",
  3136. "name" : "https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6",
  3137. "refsource" : "MISC",
  3138. "tags" : [ ]
  3139. } ]
  3140. },
  3141. "description" : {
  3142. "description_data" : [ {
  3143. "lang" : "en",
  3144. "value" : "Craft CMS before 3.6.13 has an XSS vulnerability."
  3145. } ]
  3146. }
  3147. },
  3148. "configurations" : {
  3149. "CVE_data_version" : "4.0",
  3150. "nodes" : [ ]
  3151. },
  3152. "impact" : { },
  3153. "publishedDate" : "2021-05-07T19:31Z",
  3154. "lastModifiedDate" : "2021-05-07T19:34Z"
  3155. }, {
  3156. "cve" : {
  3157. "data_type" : "CVE",
  3158. "data_format" : "MITRE",
  3159. "data_version" : "4.0",
  3160. "CVE_data_meta" : {
  3161. "ID" : "CVE-2021-27574",
  3162. "ASSIGNER" : "cve@mitre.org"
  3163. },
  3164. "problemtype" : {
  3165. "problemtype_data" : [ {
  3166. "description" : [ ]
  3167. } ]
  3168. },
  3169. "references" : {
  3170. "reference_data" : [ {
  3171. "url" : "https://axelp.io/MouseTrap",
  3172. "name" : "https://axelp.io/MouseTrap",
  3173. "refsource" : "MISC",
  3174. "tags" : [ ]
  3175. }, {
  3176. "url" : "https://remotemouse.net/blog/",
  3177. "name" : "https://remotemouse.net/blog/",
  3178. "refsource" : "MISC",
  3179. "tags" : [ ]
  3180. } ]
  3181. },
  3182. "description" : {
  3183. "description_data" : [ {
  3184. "lang" : "en",
  3185. "value" : "An issue was discovered in Emote Remote Mouse through 4.0.0.0. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings."
  3186. } ]
  3187. }
  3188. },
  3189. "configurations" : {
  3190. "CVE_data_version" : "4.0",
  3191. "nodes" : [ ]
  3192. },
  3193. "impact" : { },
  3194. "publishedDate" : "2021-05-07T19:31Z",
  3195. "lastModifiedDate" : "2021-05-07T19:34Z"
  3196. }, {
  3197. "cve" : {
  3198. "data_type" : "CVE",
  3199. "data_format" : "MITRE",
  3200. "data_version" : "4.0",
  3201. "CVE_data_meta" : {
  3202. "ID" : "CVE-2021-27573",
  3203. "ASSIGNER" : "cve@mitre.org"
  3204. },
  3205. "problemtype" : {
  3206. "problemtype_data" : [ {
  3207. "description" : [ ]
  3208. } ]
  3209. },
  3210. "references" : {
  3211. "reference_data" : [ {
  3212. "url" : "https://axelp.io/MouseTrap",
  3213. "name" : "https://axelp.io/MouseTrap",
  3214. "refsource" : "MISC",
  3215. "tags" : [ ]
  3216. }, {
  3217. "url" : "https://remotemouse.net/blog/",
  3218. "name" : "https://remotemouse.net/blog/",
  3219. "refsource" : "MISC",
  3220. "tags" : [ ]
  3221. } ]
  3222. },
  3223. "description" : {
  3224. "description_data" : [ {
  3225. "lang" : "en",
  3226. "value" : "An issue was discovered in Emote Remote Mouse through 4.0.0.0. Remote unauthenticated users can execute arbitrary code via crafted UDP packets with no prior authorization or authentication."
  3227. } ]
  3228. }
  3229. },
  3230. "configurations" : {
  3231. "CVE_data_version" : "4.0",
  3232. "nodes" : [ ]
  3233. },
  3234. "impact" : { },
  3235. "publishedDate" : "2021-05-07T19:31Z",
  3236. "lastModifiedDate" : "2021-05-07T19:34Z"
  3237. }, {
  3238. "cve" : {
  3239. "data_type" : "CVE",
  3240. "data_format" : "MITRE",
  3241. "data_version" : "4.0",
  3242. "CVE_data_meta" : {
  3243. "ID" : "CVE-2021-27572",
  3244. "ASSIGNER" : "cve@mitre.org"
  3245. },
  3246. "problemtype" : {
  3247. "problemtype_data" : [ {
  3248. "description" : [ ]
  3249. } ]
  3250. },
  3251. "references" : {
  3252. "reference_data" : [ {
  3253. "url" : "https://axelp.io/MouseTrap",
  3254. "name" : "https://axelp.io/MouseTrap",
  3255. "refsource" : "MISC",
  3256. "tags" : [ ]
  3257. }, {
  3258. "url" : "https://remotemouse.net/blog/",
  3259. "name" : "https://remotemouse.net/blog/",
  3260. "refsource" : "MISC",
  3261. "tags" : [ ]
  3262. } ]
  3263. },
  3264. "description" : {
  3265. "description_data" : [ {
  3266. "lang" : "en",
  3267. "value" : "An issue was discovered in Emote Remote Mouse through 4.0.0.0. Authentication Bypass can occur via Packet Replay. Remote unauthenticated users can execute arbitrary code via crafted UDP packets even when passwords are set."
  3268. } ]
  3269. }
  3270. },
  3271. "configurations" : {
  3272. "CVE_data_version" : "4.0",
  3273. "nodes" : [ ]
  3274. },
  3275. "impact" : { },
  3276. "publishedDate" : "2021-05-07T19:31Z",
  3277. "lastModifiedDate" : "2021-05-07T19:34Z"
  3278. }, {
  3279. "cve" : {
  3280. "data_type" : "CVE",
  3281. "data_format" : "MITRE",
  3282. "data_version" : "4.0",
  3283. "CVE_data_meta" : {
  3284. "ID" : "CVE-2021-27571",
  3285. "ASSIGNER" : "cve@mitre.org"
  3286. },
  3287. "problemtype" : {
  3288. "problemtype_data" : [ {
  3289. "description" : [ ]
  3290. } ]
  3291. },
  3292. "references" : {
  3293. "reference_data" : [ {
  3294. "url" : "https://axelp.io/MouseTrap",
  3295. "name" : "https://axelp.io/MouseTrap",
  3296. "refsource" : "MISC",
  3297. "tags" : [ ]
  3298. }, {
  3299. "url" : "https://remotemouse.net/blog/",
  3300. "name" : "https://remotemouse.net/blog/",
  3301. "refsource" : "MISC",
  3302. "tags" : [ ]
  3303. } ]
  3304. },
  3305. "description" : {
  3306. "description_data" : [ {
  3307. "lang" : "en",
  3308. "value" : "An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can retrieve recently used and running applications, their icons, and their file paths. This information is sent in cleartext and is not protected by any authentication logic."
  3309. } ]
  3310. }
  3311. },
  3312. "configurations" : {
  3313. "CVE_data_version" : "4.0",
  3314. "nodes" : [ ]
  3315. },
  3316. "impact" : { },
  3317. "publishedDate" : "2021-05-07T19:31Z",
  3318. "lastModifiedDate" : "2021-05-07T19:34Z"
  3319. }, {
  3320. "cve" : {
  3321. "data_type" : "CVE",
  3322. "data_format" : "MITRE",
  3323. "data_version" : "4.0",
  3324. "CVE_data_meta" : {
  3325. "ID" : "CVE-2021-27570",
  3326. "ASSIGNER" : "cve@mitre.org"
  3327. },
  3328. "problemtype" : {
  3329. "problemtype_data" : [ {
  3330. "description" : [ ]
  3331. } ]
  3332. },
  3333. "references" : {
  3334. "reference_data" : [ {
  3335. "url" : "https://axelp.io/MouseTrap",
  3336. "name" : "https://axelp.io/MouseTrap",
  3337. "refsource" : "MISC",
  3338. "tags" : [ ]
  3339. }, {
  3340. "url" : "https://remotemouse.net/blog/",
  3341. "name" : "https://remotemouse.net/blog/",
  3342. "refsource" : "MISC",
  3343. "tags" : [ ]
  3344. } ]
  3345. },
  3346. "description" : {
  3347. "description_data" : [ {
  3348. "lang" : "en",
  3349. "value" : "An issue was discovered in Emote Remote Mouse through 3.015. Attackers can close any running process by sending the process name in a specially crafted packet. This information is sent in cleartext and is not protected by any authentication logic."
  3350. } ]
  3351. }
  3352. },
  3353. "configurations" : {
  3354. "CVE_data_version" : "4.0",
  3355. "nodes" : [ ]
  3356. },
  3357. "impact" : { },
  3358. "publishedDate" : "2021-05-07T19:31Z",
  3359. "lastModifiedDate" : "2021-05-07T19:34Z"
  3360. }, {
  3361. "cve" : {
  3362. "data_type" : "CVE",
  3363. "data_format" : "MITRE",
  3364. "data_version" : "4.0",
  3365. "CVE_data_meta" : {
  3366. "ID" : "CVE-2021-27569",
  3367. "ASSIGNER" : "cve@mitre.org"
  3368. },
  3369. "problemtype" : {
  3370. "problemtype_data" : [ {
  3371. "description" : [ ]
  3372. } ]
  3373. },
  3374. "references" : {
  3375. "reference_data" : [ {
  3376. "url" : "https://axelp.io/MouseTrap",
  3377. "name" : "https://axelp.io/MouseTrap",
  3378. "refsource" : "MISC",
  3379. "tags" : [ ]
  3380. }, {
  3381. "url" : "https://remotemouse.net/blog/",
  3382. "name" : "https://remotemouse.net/blog/",
  3383. "refsource" : "MISC",
  3384. "tags" : [ ]
  3385. } ]
  3386. },
  3387. "description" : {
  3388. "description_data" : [ {
  3389. "lang" : "en",
  3390. "value" : "An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authentication logic."
  3391. } ]
  3392. }
  3393. },
  3394. "configurations" : {
  3395. "CVE_data_version" : "4.0",
  3396. "nodes" : [ ]
  3397. },
  3398. "impact" : { },
  3399. "publishedDate" : "2021-05-07T19:31Z",
  3400. "lastModifiedDate" : "2021-05-07T19:34Z"
  3401. }, {
  3402. "cve" : {
  3403. "data_type" : "CVE",
  3404. "data_format" : "MITRE",
  3405. "data_version" : "4.0",
  3406. "CVE_data_meta" : {
  3407. "ID" : "CVE-2021-29495",
  3408. "ASSIGNER" : "security-advisories@github.com"
  3409. },
  3410. "problemtype" : {
  3411. "problemtype_data" : [ {
  3412. "description" : [ ]
  3413. } ]
  3414. },
  3415. "references" : {
  3416. "reference_data" : [ {
  3417. "url" : "https://github.com/nim-lang/security/security/advisories/GHSA-9vqv-2jj9-7mqr",
  3418. "name" : "https://github.com/nim-lang/security/security/advisories/GHSA-9vqv-2jj9-7mqr",
  3419. "refsource" : "CONFIRM",
  3420. "tags" : [ ]
  3421. } ]
  3422. },
  3423. "description" : {
  3424. "description_data" : [ {
  3425. "lang" : "en",
  3426. "value" : "Nim is a statically typed compiled systems programming language. In Nim standard library before 1.4.2, httpClient SSL/TLS certificate verification was disabled by default. Users can upgrade to version 1.4.2 to receive a patch or, as a workaround, set \"verifyMode = CVerifyPeer\" as documented."
  3427. } ]
  3428. }
  3429. },
  3430. "configurations" : {
  3431. "CVE_data_version" : "4.0",
  3432. "nodes" : [ ]
  3433. },
  3434. "impact" : { },
  3435. "publishedDate" : "2021-05-07T16:15Z",
  3436. "lastModifiedDate" : "2021-05-07T18:30Z"
  3437. }, {
  3438. "cve" : {
  3439. "data_type" : "CVE",
  3440. "data_format" : "MITRE",
  3441. "data_version" : "4.0",
  3442. "CVE_data_meta" : {
  3443. "ID" : "CVE-2021-22677",
  3444. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  3445. },
  3446. "problemtype" : {
  3447. "problemtype_data" : [ {
  3448. "description" : [ {
  3449. "lang" : "en",
  3450. "value" : "CWE-190"
  3451. } ]
  3452. } ]
  3453. },
  3454. "references" : {
  3455. "reference_data" : [ {
  3456. "url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-01",
  3457. "name" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-01",
  3458. "refsource" : "MISC",
  3459. "tags" : [ ]
  3460. } ]
  3461. },
  3462. "description" : {
  3463. "description_data" : [ {
  3464. "lang" : "en",
  3465. "value" : "An integer overflow exists in the APIs of the host MCU while trying to connect to a WIFI network may lead to issues such as a denial-of-service condition or code execution on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior)."
  3466. } ]
  3467. }
  3468. },
  3469. "configurations" : {
  3470. "CVE_data_version" : "4.0",
  3471. "nodes" : [ ]
  3472. },
  3473. "impact" : { },
  3474. "publishedDate" : "2021-05-07T16:15Z",
  3475. "lastModifiedDate" : "2021-05-07T16:15Z"
  3476. }, {
  3477. "cve" : {
  3478. "data_type" : "CVE",
  3479. "data_format" : "MITRE",
  3480. "data_version" : "4.0",
  3481. "CVE_data_meta" : {
  3482. "ID" : "CVE-2020-4901",
  3483. "ASSIGNER" : "psirt@us.ibm.com"
  3484. },
  3485. "problemtype" : {
  3486. "problemtype_data" : [ {
  3487. "description" : [ ]
  3488. } ]
  3489. },
  3490. "references" : {
  3491. "reference_data" : [ {
  3492. "url" : "https://www.ibm.com/support/pages/node/6450435",
  3493. "name" : "https://www.ibm.com/support/pages/node/6450435",
  3494. "refsource" : "CONFIRM",
  3495. "tags" : [ ]
  3496. }, {
  3497. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190992",
  3498. "name" : "ibm-rpa-cve20204901-info-disc (190992)",
  3499. "refsource" : "XF",
  3500. "tags" : [ ]
  3501. } ]
  3502. },
  3503. "description" : {
  3504. "description_data" : [ {
  3505. "lang" : "en",
  3506. "value" : "IBM Robotic Process Automation with Automation Anywhere 11.0 could allow an attacker on the network to obtain sensitive information or cause a denial of service through username enumeration. IBM X-Force ID: 190992."
  3507. } ]
  3508. }
  3509. },
  3510. "configurations" : {
  3511. "CVE_data_version" : "4.0",
  3512. "nodes" : [ ]
  3513. },
  3514. "impact" : { },
  3515. "publishedDate" : "2021-05-07T16:15Z",
  3516. "lastModifiedDate" : "2021-05-07T18:30Z"
  3517. }, {
  3518. "cve" : {
  3519. "data_type" : "CVE",
  3520. "data_format" : "MITRE",
  3521. "data_version" : "4.0",
  3522. "CVE_data_meta" : {
  3523. "ID" : "CVE-2021-32259",
  3524. "ASSIGNER" : "cve@mitre.org"
  3525. },
  3526. "problemtype" : {
  3527. "problemtype_data" : [ {
  3528. "description" : [ ]
  3529. } ]
  3530. },
  3531. "references" : {
  3532. "reference_data" : [ ]
  3533. },
  3534. "description" : {
  3535. "description_data" : [ {
  3536. "lang" : "en",
  3537. "value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA."
  3538. } ]
  3539. }
  3540. },
  3541. "configurations" : {
  3542. "CVE_data_version" : "4.0",
  3543. "nodes" : [ ]
  3544. },
  3545. "impact" : { },
  3546. "publishedDate" : "2021-05-07T15:15Z",
  3547. "lastModifiedDate" : "2021-05-07T15:15Z"
  3548. }, {
  3549. "cve" : {
  3550. "data_type" : "CVE",
  3551. "data_format" : "MITRE",
  3552. "data_version" : "4.0",
  3553. "CVE_data_meta" : {
  3554. "ID" : "CVE-2021-29488",
  3555. "ASSIGNER" : "security-advisories@github.com"
  3556. },
  3557. "problemtype" : {
  3558. "problemtype_data" : [ {
  3559. "description" : [ {
  3560. "lang" : "en",
  3561. "value" : "CWE-23"
  3562. } ]
  3563. } ]
  3564. },
  3565. "references" : {
  3566. "reference_data" : [ {
  3567. "url" : "https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-jwj3-wrvf-v3rp",
  3568. "name" : "https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-jwj3-wrvf-v3rp",
  3569. "refsource" : "CONFIRM",
  3570. "tags" : [ ]
  3571. } ]
  3572. },
  3573. "description" : {
  3574. "description_data" : [ {
  3575. "lang" : "en",
  3576. "value" : "SABnzbd is an open source binary newsreader. A vulnerability was discovered in SABnzbd that could trick the `filesystem.renamer()` function into writing downloaded files outside the configured Download Folder via malicious PAR2 files. A patch was released as part of SABnzbd 3.2.1RC1. As a workaround, limit downloads to NZBs without PAR2 files, deny write permissions to the SABnzbd process outside areas it must access to perform its job, or update to a fixed version."
  3577. } ]
  3578. }
  3579. },
  3580. "configurations" : {
  3581. "CVE_data_version" : "4.0",
  3582. "nodes" : [ ]
  3583. },
  3584. "impact" : { },
  3585. "publishedDate" : "2021-05-07T15:15Z",
  3586. "lastModifiedDate" : "2021-05-07T15:15Z"
  3587. }, {
  3588. "cve" : {
  3589. "data_type" : "CVE",
  3590. "data_format" : "MITRE",
  3591. "data_version" : "4.0",
  3592. "CVE_data_meta" : {
  3593. "ID" : "CVE-2021-27437",
  3594. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  3595. },
  3596. "problemtype" : {
  3597. "problemtype_data" : [ {
  3598. "description" : [ {
  3599. "lang" : "en",
  3600. "value" : "CWE-798"
  3601. } ]
  3602. } ]
  3603. },
  3604. "references" : {
  3605. "reference_data" : [ {
  3606. "url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-124-01",
  3607. "name" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-124-01",
  3608. "refsource" : "MISC",
  3609. "tags" : [ ]
  3610. } ]
  3611. },
  3612. "description" : {
  3613. "description_data" : [ {
  3614. "lang" : "en",
  3615. "value" : "The affected product allows attackers to obtain sensitive information from the WISE-PaaS dashboard. The system contains a hard-coded administrator username and password that can be used to query Grafana APIs. Authentication is not required for exploitation on the WISE-PaaS/RMM (versions prior to 9.0.1)."
  3616. } ]
  3617. }
  3618. },
  3619. "configurations" : {
  3620. "CVE_data_version" : "4.0",
  3621. "nodes" : [ ]
  3622. },
  3623. "impact" : { },
  3624. "publishedDate" : "2021-05-07T15:15Z",
  3625. "lastModifiedDate" : "2021-05-07T15:15Z"
  3626. }, {
  3627. "cve" : {
  3628. "data_type" : "CVE",
  3629. "data_format" : "MITRE",
  3630. "data_version" : "4.0",
  3631. "CVE_data_meta" : {
  3632. "ID" : "CVE-2021-21419",
  3633. "ASSIGNER" : "security-advisories@github.com"
  3634. },
  3635. "problemtype" : {
  3636. "problemtype_data" : [ {
  3637. "description" : [ {
  3638. "lang" : "en",
  3639. "value" : "CWE-400"
  3640. } ]
  3641. } ]
  3642. },
  3643. "references" : {
  3644. "reference_data" : [ {
  3645. "url" : "https://github.com/eventlet/eventlet/security/advisories/GHSA-9p9m-jm8w-94p2",
  3646. "name" : "https://github.com/eventlet/eventlet/security/advisories/GHSA-9p9m-jm8w-94p2",
  3647. "refsource" : "CONFIRM",
  3648. "tags" : [ ]
  3649. } ]
  3650. },
  3651. "description" : {
  3652. "description_data" : [ {
  3653. "lang" : "en",
  3654. "value" : "Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process."
  3655. } ]
  3656. }
  3657. },
  3658. "configurations" : {
  3659. "CVE_data_version" : "4.0",
  3660. "nodes" : [ ]
  3661. },
  3662. "impact" : { },
  3663. "publishedDate" : "2021-05-07T15:15Z",
  3664. "lastModifiedDate" : "2021-05-07T15:15Z"
  3665. }, {
  3666. "cve" : {
  3667. "data_type" : "CVE",
  3668. "data_format" : "MITRE",
  3669. "data_version" : "4.0",
  3670. "CVE_data_meta" : {
  3671. "ID" : "CVE-2021-22673",
  3672. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  3673. },
  3674. "problemtype" : {
  3675. "problemtype_data" : [ {
  3676. "description" : [ ]
  3677. } ]
  3678. },
  3679. "references" : {
  3680. "reference_data" : [ {
  3681. "url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-01",
  3682. "name" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-01",
  3683. "refsource" : "MISC",
  3684. "tags" : [ ]
  3685. } ]
  3686. },
  3687. "description" : {
  3688. "description_data" : [ {
  3689. "lang" : "en",
  3690. "value" : "The affected product is vulnerable to stack-based buffer overflow while processing over-the-air firmware updates from the CDN server, which may allow an attacker to remotely execute code on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior)."
  3691. } ]
  3692. }
  3693. },
  3694. "configurations" : {
  3695. "CVE_data_version" : "4.0",
  3696. "nodes" : [ ]
  3697. },
  3698. "impact" : { },
  3699. "publishedDate" : "2021-05-07T14:15Z",
  3700. "lastModifiedDate" : "2021-05-07T14:15Z"
  3701. }, {
  3702. "cve" : {
  3703. "data_type" : "CVE",
  3704. "data_format" : "MITRE",
  3705. "data_version" : "4.0",
  3706. "CVE_data_meta" : {
  3707. "ID" : "CVE-2021-22671",
  3708. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  3709. },
  3710. "problemtype" : {
  3711. "problemtype_data" : [ {
  3712. "description" : [ {
  3713. "lang" : "en",
  3714. "value" : "CWE-190"
  3715. } ]
  3716. } ]
  3717. },
  3718. "references" : {
  3719. "reference_data" : [ {
  3720. "url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-01",
  3721. "name" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-01",
  3722. "refsource" : "MISC",
  3723. "tags" : [ ]
  3724. } ]
  3725. },
  3726. "description" : {
  3727. "description_data" : [ {
  3728. "lang" : "en",
  3729. "value" : "Multiple integer overflow issues exist while processing long domain names, which may allow an attacker to remotely execute code on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior)."
  3730. } ]
  3731. }
  3732. },
  3733. "configurations" : {
  3734. "CVE_data_version" : "4.0",
  3735. "nodes" : [ ]
  3736. },
  3737. "impact" : { },
  3738. "publishedDate" : "2021-05-07T14:15Z",
  3739. "lastModifiedDate" : "2021-05-07T14:15Z"
  3740. }, {
  3741. "cve" : {
  3742. "data_type" : "CVE",
  3743. "data_format" : "MITRE",
  3744. "data_version" : "4.0",
  3745. "CVE_data_meta" : {
  3746. "ID" : "CVE-2021-22679",
  3747. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  3748. },
  3749. "problemtype" : {
  3750. "problemtype_data" : [ {
  3751. "description" : [ {
  3752. "lang" : "en",
  3753. "value" : "CWE-190"
  3754. } ]
  3755. } ]
  3756. },
  3757. "references" : {
  3758. "reference_data" : [ {
  3759. "url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-01",
  3760. "name" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-01",
  3761. "refsource" : "MISC",
  3762. "tags" : [ ]
  3763. } ]
  3764. },
  3765. "description" : {
  3766. "description_data" : [ {
  3767. "lang" : "en",
  3768. "value" : "The affected product is vulnerable to an integer overflow while processing HTTP headers, which may allow an attacker to remotely execute code on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior)."
  3769. } ]
  3770. }
  3771. },
  3772. "configurations" : {
  3773. "CVE_data_version" : "4.0",
  3774. "nodes" : [ ]
  3775. },
  3776. "impact" : { },
  3777. "publishedDate" : "2021-05-07T13:15Z",
  3778. "lastModifiedDate" : "2021-05-07T13:15Z"
  3779. }, {
  3780. "cve" : {
  3781. "data_type" : "CVE",
  3782. "data_format" : "MITRE",
  3783. "data_version" : "4.0",
  3784. "CVE_data_meta" : {
  3785. "ID" : "CVE-2021-22675",
  3786. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  3787. },
  3788. "problemtype" : {
  3789. "problemtype_data" : [ {
  3790. "description" : [ {
  3791. "lang" : "en",
  3792. "value" : "CWE-190"
  3793. } ]
  3794. } ]
  3795. },
  3796. "references" : {
  3797. "reference_data" : [ {
  3798. "url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-01",
  3799. "name" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-01",
  3800. "refsource" : "MISC",
  3801. "tags" : [ ]
  3802. } ]
  3803. },
  3804. "description" : {
  3805. "description_data" : [ {
  3806. "lang" : "en",
  3807. "value" : "The affected product is vulnerable to integer overflow while parsing malformed over-the-air firmware update files, which may allow an attacker to remotely execute code on SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior)."
  3808. } ]
  3809. }
  3810. },
  3811. "configurations" : {
  3812. "CVE_data_version" : "4.0",
  3813. "nodes" : [ ]
  3814. },
  3815. "impact" : { },
  3816. "publishedDate" : "2021-05-07T13:15Z",
  3817. "lastModifiedDate" : "2021-05-07T13:15Z"
  3818. }, {
  3819. "cve" : {
  3820. "data_type" : "CVE",
  3821. "data_format" : "MITRE",
  3822. "data_version" : "4.0",
  3823. "CVE_data_meta" : {
  3824. "ID" : "CVE-2021-3502",
  3825. "ASSIGNER" : "secalert@redhat.com"
  3826. },
  3827. "problemtype" : {
  3828. "problemtype_data" : [ {
  3829. "description" : [ {
  3830. "lang" : "en",
  3831. "value" : "CWE-476"
  3832. }, {
  3833. "lang" : "en",
  3834. "value" : "CWE-617"
  3835. } ]
  3836. } ]
  3837. },
  3838. "references" : {
  3839. "reference_data" : [ {
  3840. "url" : "https://github.com/lathiat/avahi/issues/338",
  3841. "name" : "https://github.com/lathiat/avahi/issues/338",
  3842. "refsource" : "MISC",
  3843. "tags" : [ ]
  3844. }, {
  3845. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1946914",
  3846. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1946914",
  3847. "refsource" : "MISC",
  3848. "tags" : [ ]
  3849. } ]
  3850. },
  3851. "description" : {
  3852. "description_data" : [ {
  3853. "lang" : "en",
  3854. "value" : "A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability."
  3855. } ]
  3856. }
  3857. },
  3858. "configurations" : {
  3859. "CVE_data_version" : "4.0",
  3860. "nodes" : [ ]
  3861. },
  3862. "impact" : { },
  3863. "publishedDate" : "2021-05-07T12:15Z",
  3864. "lastModifiedDate" : "2021-05-07T12:15Z"
  3865. }, {
  3866. "cve" : {
  3867. "data_type" : "CVE",
  3868. "data_format" : "MITRE",
  3869. "data_version" : "4.0",
  3870. "CVE_data_meta" : {
  3871. "ID" : "CVE-2021-26123",
  3872. "ASSIGNER" : "cve@mitre.org"
  3873. },
  3874. "problemtype" : {
  3875. "problemtype_data" : [ {
  3876. "description" : [ ]
  3877. } ]
  3878. },
  3879. "references" : {
  3880. "reference_data" : [ {
  3881. "url" : "https://www.xist4c.com",
  3882. "name" : "https://www.xist4c.com",
  3883. "refsource" : "MISC",
  3884. "tags" : [ ]
  3885. }, {
  3886. "url" : "https://www.dgc.org/responsible_disclosure_20210421_livinglogic_xss",
  3887. "name" : "https://www.dgc.org/responsible_disclosure_20210421_livinglogic_xss",
  3888. "refsource" : "MISC",
  3889. "tags" : [ ]
  3890. } ]
  3891. },
  3892. "description" : {
  3893. "description_data" : [ {
  3894. "lang" : "en",
  3895. "value" : "LivingLogic XIST4C before 0.107.8 allows XSS via login.htm, login.wihtm, or login-form.htm."
  3896. } ]
  3897. }
  3898. },
  3899. "configurations" : {
  3900. "CVE_data_version" : "4.0",
  3901. "nodes" : [ ]
  3902. },
  3903. "impact" : { },
  3904. "publishedDate" : "2021-05-07T12:15Z",
  3905. "lastModifiedDate" : "2021-05-07T18:30Z"
  3906. }, {
  3907. "cve" : {
  3908. "data_type" : "CVE",
  3909. "data_format" : "MITRE",
  3910. "data_version" : "4.0",
  3911. "CVE_data_meta" : {
  3912. "ID" : "CVE-2021-26122",
  3913. "ASSIGNER" : "cve@mitre.org"
  3914. },
  3915. "problemtype" : {
  3916. "problemtype_data" : [ {
  3917. "description" : [ ]
  3918. } ]
  3919. },
  3920. "references" : {
  3921. "reference_data" : [ {
  3922. "url" : "https://www.xist4c.com",
  3923. "name" : "https://www.xist4c.com",
  3924. "refsource" : "MISC",
  3925. "tags" : [ ]
  3926. }, {
  3927. "url" : "https://www.dgc.org/responsible_disclosure_20210421_livinglogic_xss",
  3928. "name" : "https://www.dgc.org/responsible_disclosure_20210421_livinglogic_xss",
  3929. "refsource" : "MISC",
  3930. "tags" : [ ]
  3931. } ]
  3932. },
  3933. "description" : {
  3934. "description_data" : [ {
  3935. "lang" : "en",
  3936. "value" : "LivingLogic XIST4C before 0.107.8 allows XSS via feedback.htm or feedback.wihtm."
  3937. } ]
  3938. }
  3939. },
  3940. "configurations" : {
  3941. "CVE_data_version" : "4.0",
  3942. "nodes" : [ ]
  3943. },
  3944. "impact" : { },
  3945. "publishedDate" : "2021-05-07T12:15Z",
  3946. "lastModifiedDate" : "2021-05-07T18:30Z"
  3947. }, {
  3948. "cve" : {
  3949. "data_type" : "CVE",
  3950. "data_format" : "MITRE",
  3951. "data_version" : "4.0",
  3952. "CVE_data_meta" : {
  3953. "ID" : "CVE-2021-21984",
  3954. "ASSIGNER" : "security@vmware.com"
  3955. },
  3956. "problemtype" : {
  3957. "problemtype_data" : [ {
  3958. "description" : [ ]
  3959. } ]
  3960. },
  3961. "references" : {
  3962. "reference_data" : [ {
  3963. "url" : "https://www.vmware.com/security/advisories/VMSA-2021-0007.html",
  3964. "name" : "https://www.vmware.com/security/advisories/VMSA-2021-0007.html",
  3965. "refsource" : "MISC",
  3966. "tags" : [ ]
  3967. } ]
  3968. },
  3969. "description" : {
  3970. "description_data" : [ {
  3971. "lang" : "en",
  3972. "value" : "VMware vRealize Business for Cloud 7.x prior to 7.6.0 contains a remote code execution vulnerability due to an unauthorised end point. A malicious actor with network access may exploit this issue causing unauthorised remote code execution on vRealize Business for Cloud Virtual Appliance."
  3973. } ]
  3974. }
  3975. },
  3976. "configurations" : {
  3977. "CVE_data_version" : "4.0",
  3978. "nodes" : [ ]
  3979. },
  3980. "impact" : { },
  3981. "publishedDate" : "2021-05-07T12:15Z",
  3982. "lastModifiedDate" : "2021-05-07T12:15Z"
  3983. }, {
  3984. "cve" : {
  3985. "data_type" : "CVE",
  3986. "data_format" : "MITRE",
  3987. "data_version" : "4.0",
  3988. "CVE_data_meta" : {
  3989. "ID" : "CVE-2020-14009",
  3990. "ASSIGNER" : "cve@mitre.org"
  3991. },
  3992. "problemtype" : {
  3993. "problemtype_data" : [ {
  3994. "description" : [ ]
  3995. } ]
  3996. },
  3997. "references" : {
  3998. "reference_data" : [ {
  3999. "url" : "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2021-0006",
  4000. "name" : "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2021-0006",
  4001. "refsource" : "MISC",
  4002. "tags" : [ ]
  4003. }, {
  4004. "url" : "https://www.proofpoint.com/us/security/security-advisories",
  4005. "name" : "https://www.proofpoint.com/us/security/security-advisories",
  4006. "refsource" : "MISC",
  4007. "tags" : [ ]
  4008. } ]
  4009. },
  4010. "description" : {
  4011. "description_data" : [ {
  4012. "lang" : "en",
  4013. "value" : "Proofpoint Enterprise Protection (PPS/PoD) before 8.17.0 contains a vulnerability that could allow an attacker to deliver an email message with a malicious attachment that bypasses scanning and file-blocking rules. The vulnerability exists because messages with certain crafted and malformed multipart structures are not properly handled."
  4014. } ]
  4015. }
  4016. },
  4017. "configurations" : {
  4018. "CVE_data_version" : "4.0",
  4019. "nodes" : [ ]
  4020. },
  4021. "impact" : { },
  4022. "publishedDate" : "2021-05-07T12:15Z",
  4023. "lastModifiedDate" : "2021-05-07T12:15Z"
  4024. }, {
  4025. "cve" : {
  4026. "data_type" : "CVE",
  4027. "data_format" : "MITRE",
  4028. "data_version" : "4.0",
  4029. "CVE_data_meta" : {
  4030. "ID" : "CVE-2020-36128",
  4031. "ASSIGNER" : "cve@mitre.org"
  4032. },
  4033. "problemtype" : {
  4034. "problemtype_data" : [ {
  4035. "description" : [ ]
  4036. } ]
  4037. },
  4038. "references" : {
  4039. "reference_data" : [ {
  4040. "url" : "https://marketing.paxtechnology.com/about-pax",
  4041. "name" : "https://marketing.paxtechnology.com/about-pax",
  4042. "refsource" : "MISC",
  4043. "tags" : [ ]
  4044. }, {
  4045. "url" : "https://www.whatspos.com/",
  4046. "name" : "https://www.whatspos.com/",
  4047. "refsource" : "MISC",
  4048. "tags" : [ ]
  4049. }, {
  4050. "url" : "https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/",
  4051. "name" : "https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/",
  4052. "refsource" : "MISC",
  4053. "tags" : [ ]
  4054. } ]
  4055. },
  4056. "description" : {
  4057. "description_data" : [ {
  4058. "lang" : "en",
  4059. "value" : "Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by a token spoofing vulnerability. Each payment terminal has a session token (called X-Terminal-Token) to access the marketplace. This allows the store to identify the terminal and make available the applications distributed by its reseller. By intercepting HTTPS traffic from the application store, it is possible to collect the request responsible for assigning the X-Terminal-Token to the terminal, which makes it possible to craft an X-Terminal-Token pretending to be another device. An attacker can use this behavior to authenticate its own payment terminal in the application store through token impersonation."
  4060. } ]
  4061. }
  4062. },
  4063. "configurations" : {
  4064. "CVE_data_version" : "4.0",
  4065. "nodes" : [ ]
  4066. },
  4067. "impact" : { },
  4068. "publishedDate" : "2021-05-07T11:15Z",
  4069. "lastModifiedDate" : "2021-05-07T18:30Z"
  4070. }, {
  4071. "cve" : {
  4072. "data_type" : "CVE",
  4073. "data_format" : "MITRE",
  4074. "data_version" : "4.0",
  4075. "CVE_data_meta" : {
  4076. "ID" : "CVE-2020-36127",
  4077. "ASSIGNER" : "cve@mitre.org"
  4078. },
  4079. "problemtype" : {
  4080. "problemtype_data" : [ {
  4081. "description" : [ ]
  4082. } ]
  4083. },
  4084. "references" : {
  4085. "reference_data" : [ {
  4086. "url" : "https://marketing.paxtechnology.com/about-pax",
  4087. "name" : "https://marketing.paxtechnology.com/about-pax",
  4088. "refsource" : "MISC",
  4089. "tags" : [ ]
  4090. }, {
  4091. "url" : "https://www.whatspos.com/",
  4092. "name" : "https://www.whatspos.com/",
  4093. "refsource" : "MISC",
  4094. "tags" : [ ]
  4095. }, {
  4096. "url" : "https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/",
  4097. "name" : "https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/",
  4098. "refsource" : "MISC",
  4099. "tags" : [ ]
  4100. } ]
  4101. },
  4102. "description" : {
  4103. "description_data" : [ {
  4104. "lang" : "en",
  4105. "value" : "Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by an information disclosure vulnerability. Through the PUK signature functionality, an administrator will not have access to the current p12 certificate and password. When accessing this functionality, the administrator has the option to replace the current certificate and it is not possible to view the certificate password (p12) already deployed on the platform. The replacement p12 certificate returns to users in base64 with its password, which can be accessed by non-administrator users."
  4106. } ]
  4107. }
  4108. },
  4109. "configurations" : {
  4110. "CVE_data_version" : "4.0",
  4111. "nodes" : [ ]
  4112. },
  4113. "impact" : { },
  4114. "publishedDate" : "2021-05-07T11:15Z",
  4115. "lastModifiedDate" : "2021-05-07T18:30Z"
  4116. }, {
  4117. "cve" : {
  4118. "data_type" : "CVE",
  4119. "data_format" : "MITRE",
  4120. "data_version" : "4.0",
  4121. "CVE_data_meta" : {
  4122. "ID" : "CVE-2020-36126",
  4123. "ASSIGNER" : "cve@mitre.org"
  4124. },
  4125. "problemtype" : {
  4126. "problemtype_data" : [ {
  4127. "description" : [ ]
  4128. } ]
  4129. },
  4130. "references" : {
  4131. "reference_data" : [ {
  4132. "url" : "https://marketing.paxtechnology.com/about-pax",
  4133. "name" : "https://marketing.paxtechnology.com/about-pax",
  4134. "refsource" : "MISC",
  4135. "tags" : [ ]
  4136. }, {
  4137. "url" : "https://www.whatspos.com/",
  4138. "name" : "https://www.whatspos.com/",
  4139. "refsource" : "MISC",
  4140. "tags" : [ ]
  4141. }, {
  4142. "url" : "https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/",
  4143. "name" : "https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/",
  4144. "refsource" : "MISC",
  4145. "tags" : [ ]
  4146. } ]
  4147. },
  4148. "description" : {
  4149. "description_data" : [ {
  4150. "lang" : "en",
  4151. "value" : "Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control that can lead to remote privilege escalation. PAXSTORE marketplace endpoints allow an authenticated user to read and write data not owned by them, including third-party users, application and payment terminals, where an attacker can impersonate any user which may lead to the unauthorized disclosure, modification, or destruction of information."
  4152. } ]
  4153. }
  4154. },
  4155. "configurations" : {
  4156. "CVE_data_version" : "4.0",
  4157. "nodes" : [ ]
  4158. },
  4159. "impact" : { },
  4160. "publishedDate" : "2021-05-07T11:15Z",
  4161. "lastModifiedDate" : "2021-05-07T18:30Z"
  4162. }, {
  4163. "cve" : {
  4164. "data_type" : "CVE",
  4165. "data_format" : "MITRE",
  4166. "data_version" : "4.0",
  4167. "CVE_data_meta" : {
  4168. "ID" : "CVE-2020-36125",
  4169. "ASSIGNER" : "cve@mitre.org"
  4170. },
  4171. "problemtype" : {
  4172. "problemtype_data" : [ {
  4173. "description" : [ ]
  4174. } ]
  4175. },
  4176. "references" : {
  4177. "reference_data" : [ {
  4178. "url" : "https://marketing.paxtechnology.com/about-pax",
  4179. "name" : "https://marketing.paxtechnology.com/about-pax",
  4180. "refsource" : "MISC",
  4181. "tags" : [ ]
  4182. }, {
  4183. "url" : "https://www.whatspos.com/",
  4184. "name" : "https://www.whatspos.com/",
  4185. "refsource" : "MISC",
  4186. "tags" : [ ]
  4187. }, {
  4188. "url" : "https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/",
  4189. "name" : "https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/",
  4190. "refsource" : "MISC",
  4191. "tags" : [ ]
  4192. } ]
  4193. },
  4194. "description" : {
  4195. "description_data" : [ {
  4196. "lang" : "en",
  4197. "value" : "Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control where password revalidation in sensitive operations can be bypassed remotely by an authenticated attacker through requesting the endpoint directly."
  4198. } ]
  4199. }
  4200. },
  4201. "configurations" : {
  4202. "CVE_data_version" : "4.0",
  4203. "nodes" : [ ]
  4204. },
  4205. "impact" : { },
  4206. "publishedDate" : "2021-05-07T11:15Z",
  4207. "lastModifiedDate" : "2021-05-07T18:30Z"
  4208. }, {
  4209. "cve" : {
  4210. "data_type" : "CVE",
  4211. "data_format" : "MITRE",
  4212. "data_version" : "4.0",
  4213. "CVE_data_meta" : {
  4214. "ID" : "CVE-2020-36124",
  4215. "ASSIGNER" : "cve@mitre.org"
  4216. },
  4217. "problemtype" : {
  4218. "problemtype_data" : [ {
  4219. "description" : [ ]
  4220. } ]
  4221. },
  4222. "references" : {
  4223. "reference_data" : [ {
  4224. "url" : "https://marketing.paxtechnology.com/about-pax",
  4225. "name" : "https://marketing.paxtechnology.com/about-pax",
  4226. "refsource" : "MISC",
  4227. "tags" : [ ]
  4228. }, {
  4229. "url" : "https://www.whatspos.com/",
  4230. "name" : "https://www.whatspos.com/",
  4231. "refsource" : "MISC",
  4232. "tags" : [ ]
  4233. }, {
  4234. "url" : "https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/",
  4235. "name" : "https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/",
  4236. "refsource" : "MISC",
  4237. "tags" : [ ]
  4238. } ]
  4239. },
  4240. "description" : {
  4241. "description_data" : [ {
  4242. "lang" : "en",
  4243. "value" : "Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by XML External Entity (XXE) injection. An authenticated attacker can compromise the private keys of a JWT token and reuse them to manipulate the access tokens to access the platform as any desired user (clients and administrators)."
  4244. } ]
  4245. }
  4246. },
  4247. "configurations" : {
  4248. "CVE_data_version" : "4.0",
  4249. "nodes" : [ ]
  4250. },
  4251. "impact" : { },
  4252. "publishedDate" : "2021-05-07T11:15Z",
  4253. "lastModifiedDate" : "2021-05-07T18:30Z"
  4254. }, {
  4255. "cve" : {
  4256. "data_type" : "CVE",
  4257. "data_format" : "MITRE",
  4258. "data_version" : "4.0",
  4259. "CVE_data_meta" : {
  4260. "ID" : "CVE-2021-30173",
  4261. "ASSIGNER" : "cve@cert.org.tw"
  4262. },
  4263. "problemtype" : {
  4264. "problemtype_data" : [ {
  4265. "description" : [ {
  4266. "lang" : "en",
  4267. "value" : "CWE-36"
  4268. } ]
  4269. } ]
  4270. },
  4271. "references" : {
  4272. "reference_data" : [ {
  4273. "url" : "https://www.twcert.org.tw/tw/cp-132-4712-7ade4-1.html",
  4274. "name" : "https://www.twcert.org.tw/tw/cp-132-4712-7ade4-1.html",
  4275. "refsource" : "MISC",
  4276. "tags" : [ ]
  4277. } ]
  4278. },
  4279. "description" : {
  4280. "description_data" : [ {
  4281. "lang" : "en",
  4282. "value" : "Local File Inclusion vulnerability of the omni-directional communication system allows remote authenticated attacker inject absolute path into Url parameter and access arbitrary file."
  4283. } ]
  4284. }
  4285. },
  4286. "configurations" : {
  4287. "CVE_data_version" : "4.0",
  4288. "nodes" : [ ]
  4289. },
  4290. "impact" : {
  4291. "baseMetricV3" : {
  4292. "cvssV3" : {
  4293. "version" : "3.1",
  4294. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  4295. "attackVector" : "NETWORK",
  4296. "attackComplexity" : "LOW",
  4297. "privilegesRequired" : "LOW",
  4298. "userInteraction" : "NONE",
  4299. "scope" : "UNCHANGED",
  4300. "confidentialityImpact" : "HIGH",
  4301. "integrityImpact" : "NONE",
  4302. "availabilityImpact" : "NONE",
  4303. "baseScore" : 6.5,
  4304. "baseSeverity" : "MEDIUM"
  4305. },
  4306. "exploitabilityScore" : 2.8,
  4307. "impactScore" : 3.6
  4308. }
  4309. },
  4310. "publishedDate" : "2021-05-07T10:15Z",
  4311. "lastModifiedDate" : "2021-05-07T18:30Z"
  4312. }, {
  4313. "cve" : {
  4314. "data_type" : "CVE",
  4315. "data_format" : "MITRE",
  4316. "data_version" : "4.0",
  4317. "CVE_data_meta" : {
  4318. "ID" : "CVE-2021-30172",
  4319. "ASSIGNER" : "cve@cert.org.tw"
  4320. },
  4321. "problemtype" : {
  4322. "problemtype_data" : [ {
  4323. "description" : [ {
  4324. "lang" : "en",
  4325. "value" : "CWE-79"
  4326. } ]
  4327. } ]
  4328. },
  4329. "references" : {
  4330. "reference_data" : [ {
  4331. "url" : "https://www.twcert.org.tw/tw/cp-132-4711-04469-1.html",
  4332. "name" : "https://www.twcert.org.tw/tw/cp-132-4711-04469-1.html",
  4333. "refsource" : "MISC",
  4334. "tags" : [ ]
  4335. } ]
  4336. },
  4337. "description" : {
  4338. "description_data" : [ {
  4339. "lang" : "en",
  4340. "value" : "Special characters of picture preview page in the Quan-Fang-Wei-Tong-Xun system are not filtered in users’ input, which allow remote authenticated attackers can inject malicious JavaScript and carry out Reflected XSS (Cross-site scripting) attacks, additionally access and manipulate customer’s information."
  4341. } ]
  4342. }
  4343. },
  4344. "configurations" : {
  4345. "CVE_data_version" : "4.0",
  4346. "nodes" : [ ]
  4347. },
  4348. "impact" : {
  4349. "baseMetricV3" : {
  4350. "cvssV3" : {
  4351. "version" : "3.1",
  4352. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
  4353. "attackVector" : "NETWORK",
  4354. "attackComplexity" : "LOW",
  4355. "privilegesRequired" : "LOW",
  4356. "userInteraction" : "REQUIRED",
  4357. "scope" : "UNCHANGED",
  4358. "confidentialityImpact" : "LOW",
  4359. "integrityImpact" : "LOW",
  4360. "availabilityImpact" : "NONE",
  4361. "baseScore" : 4.6,
  4362. "baseSeverity" : "MEDIUM"
  4363. },
  4364. "exploitabilityScore" : 2.1,
  4365. "impactScore" : 2.5
  4366. }
  4367. },
  4368. "publishedDate" : "2021-05-07T10:15Z",
  4369. "lastModifiedDate" : "2021-05-07T18:30Z"
  4370. }, {
  4371. "cve" : {
  4372. "data_type" : "CVE",
  4373. "data_format" : "MITRE",
  4374. "data_version" : "4.0",
  4375. "CVE_data_meta" : {
  4376. "ID" : "CVE-2021-30171",
  4377. "ASSIGNER" : "cve@cert.org.tw"
  4378. },
  4379. "problemtype" : {
  4380. "problemtype_data" : [ {
  4381. "description" : [ {
  4382. "lang" : "en",
  4383. "value" : "CWE-79"
  4384. } ]
  4385. } ]
  4386. },
  4387. "references" : {
  4388. "reference_data" : [ {
  4389. "url" : "https://www.twcert.org.tw/tw/cp-132-4707-9c87e-1.html",
  4390. "name" : "https://www.twcert.org.tw/tw/cp-132-4707-9c87e-1.html",
  4391. "refsource" : "MISC",
  4392. "tags" : [ ]
  4393. } ]
  4394. },
  4395. "description" : {
  4396. "description_data" : [ {
  4397. "lang" : "en",
  4398. "value" : "Special characters of ERP POS news page are not filtered in users’ input, which allow remote authenticated attackers can inject malicious JavaScript and carry out stored XSS (Stored Cross-site scripting) attacks, additionally access and manipulate customer’s information."
  4399. } ]
  4400. }
  4401. },
  4402. "configurations" : {
  4403. "CVE_data_version" : "4.0",
  4404. "nodes" : [ ]
  4405. },
  4406. "impact" : {
  4407. "baseMetricV3" : {
  4408. "cvssV3" : {
  4409. "version" : "3.1",
  4410. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
  4411. "attackVector" : "NETWORK",
  4412. "attackComplexity" : "LOW",
  4413. "privilegesRequired" : "LOW",
  4414. "userInteraction" : "REQUIRED",
  4415. "scope" : "UNCHANGED",
  4416. "confidentialityImpact" : "LOW",
  4417. "integrityImpact" : "LOW",
  4418. "availabilityImpact" : "NONE",
  4419. "baseScore" : 4.6,
  4420. "baseSeverity" : "MEDIUM"
  4421. },
  4422. "exploitabilityScore" : 2.1,
  4423. "impactScore" : 2.5
  4424. }
  4425. },
  4426. "publishedDate" : "2021-05-07T10:15Z",
  4427. "lastModifiedDate" : "2021-05-07T18:30Z"
  4428. }, {
  4429. "cve" : {
  4430. "data_type" : "CVE",
  4431. "data_format" : "MITRE",
  4432. "data_version" : "4.0",
  4433. "CVE_data_meta" : {
  4434. "ID" : "CVE-2021-30170",
  4435. "ASSIGNER" : "cve@cert.org.tw"
  4436. },
  4437. "problemtype" : {
  4438. "problemtype_data" : [ {
  4439. "description" : [ {
  4440. "lang" : "en",
  4441. "value" : "CWE-79"
  4442. } ]
  4443. } ]
  4444. },
  4445. "references" : {
  4446. "reference_data" : [ {
  4447. "url" : "https://www.twcert.org.tw/tw/cp-132-4707-9c87e-1.html",
  4448. "name" : "https://www.twcert.org.tw/tw/cp-132-4707-9c87e-1.html",
  4449. "refsource" : "MISC",
  4450. "tags" : [ ]
  4451. } ]
  4452. },
  4453. "description" : {
  4454. "description_data" : [ {
  4455. "lang" : "en",
  4456. "value" : "Special characters of ERP POS customer profile page are not filtered in users’ input, which allow remote authenticated attackers can inject malicious JavaScript and carry out stored XSS (Stored Cross-site scripting) attacks, additionally access and manipulate customer’s information."
  4457. } ]
  4458. }
  4459. },
  4460. "configurations" : {
  4461. "CVE_data_version" : "4.0",
  4462. "nodes" : [ ]
  4463. },
  4464. "impact" : {
  4465. "baseMetricV3" : {
  4466. "cvssV3" : {
  4467. "version" : "3.1",
  4468. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
  4469. "attackVector" : "NETWORK",
  4470. "attackComplexity" : "LOW",
  4471. "privilegesRequired" : "LOW",
  4472. "userInteraction" : "REQUIRED",
  4473. "scope" : "UNCHANGED",
  4474. "confidentialityImpact" : "LOW",
  4475. "integrityImpact" : "LOW",
  4476. "availabilityImpact" : "NONE",
  4477. "baseScore" : 4.6,
  4478. "baseSeverity" : "MEDIUM"
  4479. },
  4480. "exploitabilityScore" : 2.1,
  4481. "impactScore" : 2.5
  4482. }
  4483. },
  4484. "publishedDate" : "2021-05-07T10:15Z",
  4485. "lastModifiedDate" : "2021-05-07T18:30Z"
  4486. }, {
  4487. "cve" : {
  4488. "data_type" : "CVE",
  4489. "data_format" : "MITRE",
  4490. "data_version" : "4.0",
  4491. "CVE_data_meta" : {
  4492. "ID" : "CVE-2021-1927",
  4493. "ASSIGNER" : "product-security@qualcomm.com"
  4494. },
  4495. "problemtype" : {
  4496. "problemtype_data" : [ {
  4497. "description" : [ ]
  4498. } ]
  4499. },
  4500. "references" : {
  4501. "reference_data" : [ {
  4502. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4503. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4504. "refsource" : "CONFIRM",
  4505. "tags" : [ ]
  4506. } ]
  4507. },
  4508. "description" : {
  4509. "description_data" : [ {
  4510. "lang" : "en",
  4511. "value" : "Possible use after free due to lack of null check while memory is being freed in FastRPC driver in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking"
  4512. } ]
  4513. }
  4514. },
  4515. "configurations" : {
  4516. "CVE_data_version" : "4.0",
  4517. "nodes" : [ ]
  4518. },
  4519. "impact" : { },
  4520. "publishedDate" : "2021-05-07T09:15Z",
  4521. "lastModifiedDate" : "2021-05-07T09:31Z"
  4522. }, {
  4523. "cve" : {
  4524. "data_type" : "CVE",
  4525. "data_format" : "MITRE",
  4526. "data_version" : "4.0",
  4527. "CVE_data_meta" : {
  4528. "ID" : "CVE-2021-1925",
  4529. "ASSIGNER" : "product-security@qualcomm.com"
  4530. },
  4531. "problemtype" : {
  4532. "problemtype_data" : [ {
  4533. "description" : [ ]
  4534. } ]
  4535. },
  4536. "references" : {
  4537. "reference_data" : [ {
  4538. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4539. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4540. "refsource" : "CONFIRM",
  4541. "tags" : [ ]
  4542. } ]
  4543. },
  4544. "description" : {
  4545. "description_data" : [ {
  4546. "lang" : "en",
  4547. "value" : "Possible denial of service scenario due to improper handling of group management action frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking"
  4548. } ]
  4549. }
  4550. },
  4551. "configurations" : {
  4552. "CVE_data_version" : "4.0",
  4553. "nodes" : [ ]
  4554. },
  4555. "impact" : { },
  4556. "publishedDate" : "2021-05-07T09:15Z",
  4557. "lastModifiedDate" : "2021-05-07T09:31Z"
  4558. }, {
  4559. "cve" : {
  4560. "data_type" : "CVE",
  4561. "data_format" : "MITRE",
  4562. "data_version" : "4.0",
  4563. "CVE_data_meta" : {
  4564. "ID" : "CVE-2021-1915",
  4565. "ASSIGNER" : "product-security@qualcomm.com"
  4566. },
  4567. "problemtype" : {
  4568. "problemtype_data" : [ {
  4569. "description" : [ ]
  4570. } ]
  4571. },
  4572. "references" : {
  4573. "reference_data" : [ {
  4574. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4575. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4576. "refsource" : "CONFIRM",
  4577. "tags" : [ ]
  4578. } ]
  4579. },
  4580. "description" : {
  4581. "description_data" : [ {
  4582. "lang" : "en",
  4583. "value" : "Buffer overflow can occur due to improper validation of NDP application information length in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking"
  4584. } ]
  4585. }
  4586. },
  4587. "configurations" : {
  4588. "CVE_data_version" : "4.0",
  4589. "nodes" : [ ]
  4590. },
  4591. "impact" : { },
  4592. "publishedDate" : "2021-05-07T09:15Z",
  4593. "lastModifiedDate" : "2021-05-07T09:31Z"
  4594. }, {
  4595. "cve" : {
  4596. "data_type" : "CVE",
  4597. "data_format" : "MITRE",
  4598. "data_version" : "4.0",
  4599. "CVE_data_meta" : {
  4600. "ID" : "CVE-2021-1910",
  4601. "ASSIGNER" : "product-security@qualcomm.com"
  4602. },
  4603. "problemtype" : {
  4604. "problemtype_data" : [ {
  4605. "description" : [ ]
  4606. } ]
  4607. },
  4608. "references" : {
  4609. "reference_data" : [ {
  4610. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4611. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4612. "refsource" : "CONFIRM",
  4613. "tags" : [ ]
  4614. } ]
  4615. },
  4616. "description" : {
  4617. "description_data" : [ {
  4618. "lang" : "en",
  4619. "value" : "Double free in video due to lack of input buffer length check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables"
  4620. } ]
  4621. }
  4622. },
  4623. "configurations" : {
  4624. "CVE_data_version" : "4.0",
  4625. "nodes" : [ ]
  4626. },
  4627. "impact" : { },
  4628. "publishedDate" : "2021-05-07T09:15Z",
  4629. "lastModifiedDate" : "2021-05-07T09:31Z"
  4630. }, {
  4631. "cve" : {
  4632. "data_type" : "CVE",
  4633. "data_format" : "MITRE",
  4634. "data_version" : "4.0",
  4635. "CVE_data_meta" : {
  4636. "ID" : "CVE-2021-1906",
  4637. "ASSIGNER" : "product-security@qualcomm.com"
  4638. },
  4639. "problemtype" : {
  4640. "problemtype_data" : [ {
  4641. "description" : [ ]
  4642. } ]
  4643. },
  4644. "references" : {
  4645. "reference_data" : [ {
  4646. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4647. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4648. "refsource" : "CONFIRM",
  4649. "tags" : [ ]
  4650. } ]
  4651. },
  4652. "description" : {
  4653. "description_data" : [ {
  4654. "lang" : "en",
  4655. "value" : "Improper handling of address deregistration on failure can lead to new GPU address allocation failure. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables"
  4656. } ]
  4657. }
  4658. },
  4659. "configurations" : {
  4660. "CVE_data_version" : "4.0",
  4661. "nodes" : [ ]
  4662. },
  4663. "impact" : { },
  4664. "publishedDate" : "2021-05-07T09:15Z",
  4665. "lastModifiedDate" : "2021-05-07T09:31Z"
  4666. }, {
  4667. "cve" : {
  4668. "data_type" : "CVE",
  4669. "data_format" : "MITRE",
  4670. "data_version" : "4.0",
  4671. "CVE_data_meta" : {
  4672. "ID" : "CVE-2021-1905",
  4673. "ASSIGNER" : "product-security@qualcomm.com"
  4674. },
  4675. "problemtype" : {
  4676. "problemtype_data" : [ {
  4677. "description" : [ ]
  4678. } ]
  4679. },
  4680. "references" : {
  4681. "reference_data" : [ {
  4682. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4683. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4684. "refsource" : "CONFIRM",
  4685. "tags" : [ ]
  4686. } ]
  4687. },
  4688. "description" : {
  4689. "description_data" : [ {
  4690. "lang" : "en",
  4691. "value" : "Possible use after free due to improper handling of memory mapping of multiple processes simultaneously. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables"
  4692. } ]
  4693. }
  4694. },
  4695. "configurations" : {
  4696. "CVE_data_version" : "4.0",
  4697. "nodes" : [ ]
  4698. },
  4699. "impact" : { },
  4700. "publishedDate" : "2021-05-07T09:15Z",
  4701. "lastModifiedDate" : "2021-05-07T09:31Z"
  4702. }, {
  4703. "cve" : {
  4704. "data_type" : "CVE",
  4705. "data_format" : "MITRE",
  4706. "data_version" : "4.0",
  4707. "CVE_data_meta" : {
  4708. "ID" : "CVE-2021-1895",
  4709. "ASSIGNER" : "product-security@qualcomm.com"
  4710. },
  4711. "problemtype" : {
  4712. "problemtype_data" : [ {
  4713. "description" : [ ]
  4714. } ]
  4715. },
  4716. "references" : {
  4717. "reference_data" : [ {
  4718. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4719. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4720. "refsource" : "CONFIRM",
  4721. "tags" : [ ]
  4722. } ]
  4723. },
  4724. "description" : {
  4725. "description_data" : [ {
  4726. "lang" : "en",
  4727. "value" : "Possible integer overflow due to improper length check while flashing an image in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music"
  4728. } ]
  4729. }
  4730. },
  4731. "configurations" : {
  4732. "CVE_data_version" : "4.0",
  4733. "nodes" : [ ]
  4734. },
  4735. "impact" : { },
  4736. "publishedDate" : "2021-05-07T09:15Z",
  4737. "lastModifiedDate" : "2021-05-07T09:31Z"
  4738. }, {
  4739. "cve" : {
  4740. "data_type" : "CVE",
  4741. "data_format" : "MITRE",
  4742. "data_version" : "4.0",
  4743. "CVE_data_meta" : {
  4744. "ID" : "CVE-2021-1891",
  4745. "ASSIGNER" : "product-security@qualcomm.com"
  4746. },
  4747. "problemtype" : {
  4748. "problemtype_data" : [ {
  4749. "description" : [ ]
  4750. } ]
  4751. },
  4752. "references" : {
  4753. "reference_data" : [ {
  4754. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4755. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4756. "refsource" : "CONFIRM",
  4757. "tags" : [ ]
  4758. } ]
  4759. },
  4760. "description" : {
  4761. "description_data" : [ {
  4762. "lang" : "en",
  4763. "value" : "A possible use-after-free occurrence in audio driver can happen when pointers are not properly handled in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking"
  4764. } ]
  4765. }
  4766. },
  4767. "configurations" : {
  4768. "CVE_data_version" : "4.0",
  4769. "nodes" : [ ]
  4770. },
  4771. "impact" : { },
  4772. "publishedDate" : "2021-05-07T09:15Z",
  4773. "lastModifiedDate" : "2021-05-07T09:31Z"
  4774. }, {
  4775. "cve" : {
  4776. "data_type" : "CVE",
  4777. "data_format" : "MITRE",
  4778. "data_version" : "4.0",
  4779. "CVE_data_meta" : {
  4780. "ID" : "CVE-2020-11295",
  4781. "ASSIGNER" : "product-security@qualcomm.com"
  4782. },
  4783. "problemtype" : {
  4784. "problemtype_data" : [ {
  4785. "description" : [ ]
  4786. } ]
  4787. },
  4788. "references" : {
  4789. "reference_data" : [ {
  4790. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4791. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4792. "refsource" : "CONFIRM",
  4793. "tags" : [ ]
  4794. } ]
  4795. },
  4796. "description" : {
  4797. "description_data" : [ {
  4798. "lang" : "en",
  4799. "value" : "Use after free in camera If the threadmanager is being cleaned up while the worker thread is processing objects in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
  4800. } ]
  4801. }
  4802. },
  4803. "configurations" : {
  4804. "CVE_data_version" : "4.0",
  4805. "nodes" : [ ]
  4806. },
  4807. "impact" : { },
  4808. "publishedDate" : "2021-05-07T09:15Z",
  4809. "lastModifiedDate" : "2021-05-07T09:31Z"
  4810. }, {
  4811. "cve" : {
  4812. "data_type" : "CVE",
  4813. "data_format" : "MITRE",
  4814. "data_version" : "4.0",
  4815. "CVE_data_meta" : {
  4816. "ID" : "CVE-2020-11294",
  4817. "ASSIGNER" : "product-security@qualcomm.com"
  4818. },
  4819. "problemtype" : {
  4820. "problemtype_data" : [ {
  4821. "description" : [ ]
  4822. } ]
  4823. },
  4824. "references" : {
  4825. "reference_data" : [ {
  4826. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4827. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4828. "refsource" : "CONFIRM",
  4829. "tags" : [ ]
  4830. } ]
  4831. },
  4832. "description" : {
  4833. "description_data" : [ {
  4834. "lang" : "en",
  4835. "value" : "Out of bound write in logger due to prefix size is not validated while prepended to logging string in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables"
  4836. } ]
  4837. }
  4838. },
  4839. "configurations" : {
  4840. "CVE_data_version" : "4.0",
  4841. "nodes" : [ ]
  4842. },
  4843. "impact" : { },
  4844. "publishedDate" : "2021-05-07T09:15Z",
  4845. "lastModifiedDate" : "2021-05-07T09:31Z"
  4846. }, {
  4847. "cve" : {
  4848. "data_type" : "CVE",
  4849. "data_format" : "MITRE",
  4850. "data_version" : "4.0",
  4851. "CVE_data_meta" : {
  4852. "ID" : "CVE-2020-11293",
  4853. "ASSIGNER" : "product-security@qualcomm.com"
  4854. },
  4855. "problemtype" : {
  4856. "problemtype_data" : [ {
  4857. "description" : [ ]
  4858. } ]
  4859. },
  4860. "references" : {
  4861. "reference_data" : [ {
  4862. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4863. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4864. "refsource" : "CONFIRM",
  4865. "tags" : [ ]
  4866. } ]
  4867. },
  4868. "description" : {
  4869. "description_data" : [ {
  4870. "lang" : "en",
  4871. "value" : "Out of bound read can happen in Widevine TA while copying data to buffer from user data due to lack of check of buffer length received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking"
  4872. } ]
  4873. }
  4874. },
  4875. "configurations" : {
  4876. "CVE_data_version" : "4.0",
  4877. "nodes" : [ ]
  4878. },
  4879. "impact" : { },
  4880. "publishedDate" : "2021-05-07T09:15Z",
  4881. "lastModifiedDate" : "2021-05-07T09:31Z"
  4882. }, {
  4883. "cve" : {
  4884. "data_type" : "CVE",
  4885. "data_format" : "MITRE",
  4886. "data_version" : "4.0",
  4887. "CVE_data_meta" : {
  4888. "ID" : "CVE-2020-11289",
  4889. "ASSIGNER" : "product-security@qualcomm.com"
  4890. },
  4891. "problemtype" : {
  4892. "problemtype_data" : [ {
  4893. "description" : [ ]
  4894. } ]
  4895. },
  4896. "references" : {
  4897. "reference_data" : [ {
  4898. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4899. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4900. "refsource" : "CONFIRM",
  4901. "tags" : [ ]
  4902. } ]
  4903. },
  4904. "description" : {
  4905. "description_data" : [ {
  4906. "lang" : "en",
  4907. "value" : "Out of bound write can occur in TZ command handler due to lack of validation of command ID in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking"
  4908. } ]
  4909. }
  4910. },
  4911. "configurations" : {
  4912. "CVE_data_version" : "4.0",
  4913. "nodes" : [ ]
  4914. },
  4915. "impact" : { },
  4916. "publishedDate" : "2021-05-07T09:15Z",
  4917. "lastModifiedDate" : "2021-05-07T09:31Z"
  4918. }, {
  4919. "cve" : {
  4920. "data_type" : "CVE",
  4921. "data_format" : "MITRE",
  4922. "data_version" : "4.0",
  4923. "CVE_data_meta" : {
  4924. "ID" : "CVE-2020-11288",
  4925. "ASSIGNER" : "product-security@qualcomm.com"
  4926. },
  4927. "problemtype" : {
  4928. "problemtype_data" : [ {
  4929. "description" : [ ]
  4930. } ]
  4931. },
  4932. "references" : {
  4933. "reference_data" : [ {
  4934. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4935. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4936. "refsource" : "CONFIRM",
  4937. "tags" : [ ]
  4938. } ]
  4939. },
  4940. "description" : {
  4941. "description_data" : [ {
  4942. "lang" : "en",
  4943. "value" : "Out of bound write can occur in playready while processing command due to lack of input validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music"
  4944. } ]
  4945. }
  4946. },
  4947. "configurations" : {
  4948. "CVE_data_version" : "4.0",
  4949. "nodes" : [ ]
  4950. },
  4951. "impact" : { },
  4952. "publishedDate" : "2021-05-07T09:15Z",
  4953. "lastModifiedDate" : "2021-05-07T09:31Z"
  4954. }, {
  4955. "cve" : {
  4956. "data_type" : "CVE",
  4957. "data_format" : "MITRE",
  4958. "data_version" : "4.0",
  4959. "CVE_data_meta" : {
  4960. "ID" : "CVE-2020-11285",
  4961. "ASSIGNER" : "product-security@qualcomm.com"
  4962. },
  4963. "problemtype" : {
  4964. "problemtype_data" : [ {
  4965. "description" : [ ]
  4966. } ]
  4967. },
  4968. "references" : {
  4969. "reference_data" : [ {
  4970. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4971. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  4972. "refsource" : "CONFIRM",
  4973. "tags" : [ ]
  4974. } ]
  4975. },
  4976. "description" : {
  4977. "description_data" : [ {
  4978. "lang" : "en",
  4979. "value" : "Buffer over-read while unpacking the RTCP packet we may read extra byte if wrong length is provided in RTCP packets in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables"
  4980. } ]
  4981. }
  4982. },
  4983. "configurations" : {
  4984. "CVE_data_version" : "4.0",
  4985. "nodes" : [ ]
  4986. },
  4987. "impact" : { },
  4988. "publishedDate" : "2021-05-07T09:15Z",
  4989. "lastModifiedDate" : "2021-05-07T09:31Z"
  4990. }, {
  4991. "cve" : {
  4992. "data_type" : "CVE",
  4993. "data_format" : "MITRE",
  4994. "data_version" : "4.0",
  4995. "CVE_data_meta" : {
  4996. "ID" : "CVE-2020-11284",
  4997. "ASSIGNER" : "product-security@qualcomm.com"
  4998. },
  4999. "problemtype" : {
  5000. "problemtype_data" : [ {
  5001. "description" : [ ]
  5002. } ]
  5003. },
  5004. "references" : {
  5005. "reference_data" : [ {
  5006. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  5007. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  5008. "refsource" : "CONFIRM",
  5009. "tags" : [ ]
  5010. } ]
  5011. },
  5012. "description" : {
  5013. "description_data" : [ {
  5014. "lang" : "en",
  5015. "value" : "Locked memory can be unlocked and modified by non secure boot loader through improper system call sequence making the memory region untrusted source of input for secure boot loader in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking"
  5016. } ]
  5017. }
  5018. },
  5019. "configurations" : {
  5020. "CVE_data_version" : "4.0",
  5021. "nodes" : [ ]
  5022. },
  5023. "impact" : { },
  5024. "publishedDate" : "2021-05-07T09:15Z",
  5025. "lastModifiedDate" : "2021-05-07T09:31Z"
  5026. }, {
  5027. "cve" : {
  5028. "data_type" : "CVE",
  5029. "data_format" : "MITRE",
  5030. "data_version" : "4.0",
  5031. "CVE_data_meta" : {
  5032. "ID" : "CVE-2020-11279",
  5033. "ASSIGNER" : "product-security@qualcomm.com"
  5034. },
  5035. "problemtype" : {
  5036. "problemtype_data" : [ {
  5037. "description" : [ ]
  5038. } ]
  5039. },
  5040. "references" : {
  5041. "reference_data" : [ {
  5042. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  5043. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  5044. "refsource" : "CONFIRM",
  5045. "tags" : [ ]
  5046. } ]
  5047. },
  5048. "description" : {
  5049. "description_data" : [ {
  5050. "lang" : "en",
  5051. "value" : "Memory corruption while processing crafted SDES packets due to improper length check in sdes packets recieved in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables"
  5052. } ]
  5053. }
  5054. },
  5055. "configurations" : {
  5056. "CVE_data_version" : "4.0",
  5057. "nodes" : [ ]
  5058. },
  5059. "impact" : { },
  5060. "publishedDate" : "2021-05-07T09:15Z",
  5061. "lastModifiedDate" : "2021-05-07T09:31Z"
  5062. }, {
  5063. "cve" : {
  5064. "data_type" : "CVE",
  5065. "data_format" : "MITRE",
  5066. "data_version" : "4.0",
  5067. "CVE_data_meta" : {
  5068. "ID" : "CVE-2020-11274",
  5069. "ASSIGNER" : "product-security@qualcomm.com"
  5070. },
  5071. "problemtype" : {
  5072. "problemtype_data" : [ {
  5073. "description" : [ ]
  5074. } ]
  5075. },
  5076. "references" : {
  5077. "reference_data" : [ {
  5078. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  5079. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  5080. "refsource" : "CONFIRM",
  5081. "tags" : [ ]
  5082. } ]
  5083. },
  5084. "description" : {
  5085. "description_data" : [ {
  5086. "lang" : "en",
  5087. "value" : "Denial of service in MODEM due to assert to the invalid configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
  5088. } ]
  5089. }
  5090. },
  5091. "configurations" : {
  5092. "CVE_data_version" : "4.0",
  5093. "nodes" : [ ]
  5094. },
  5095. "impact" : { },
  5096. "publishedDate" : "2021-05-07T09:15Z",
  5097. "lastModifiedDate" : "2021-05-07T09:31Z"
  5098. }, {
  5099. "cve" : {
  5100. "data_type" : "CVE",
  5101. "data_format" : "MITRE",
  5102. "data_version" : "4.0",
  5103. "CVE_data_meta" : {
  5104. "ID" : "CVE-2020-11273",
  5105. "ASSIGNER" : "product-security@qualcomm.com"
  5106. },
  5107. "problemtype" : {
  5108. "problemtype_data" : [ {
  5109. "description" : [ ]
  5110. } ]
  5111. },
  5112. "references" : {
  5113. "reference_data" : [ {
  5114. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  5115. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  5116. "refsource" : "CONFIRM",
  5117. "tags" : [ ]
  5118. } ]
  5119. },
  5120. "description" : {
  5121. "description_data" : [ {
  5122. "lang" : "en",
  5123. "value" : "Histogram type KPI was teardown with the assumption of the existence of histogram binning info and will lead to null pointer access when histogram binning info is missing due to lack of null check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile"
  5124. } ]
  5125. }
  5126. },
  5127. "configurations" : {
  5128. "CVE_data_version" : "4.0",
  5129. "nodes" : [ ]
  5130. },
  5131. "impact" : { },
  5132. "publishedDate" : "2021-05-07T09:15Z",
  5133. "lastModifiedDate" : "2021-05-07T09:31Z"
  5134. }, {
  5135. "cve" : {
  5136. "data_type" : "CVE",
  5137. "data_format" : "MITRE",
  5138. "data_version" : "4.0",
  5139. "CVE_data_meta" : {
  5140. "ID" : "CVE-2020-11268",
  5141. "ASSIGNER" : "product-security@qualcomm.com"
  5142. },
  5143. "problemtype" : {
  5144. "problemtype_data" : [ {
  5145. "description" : [ ]
  5146. } ]
  5147. },
  5148. "references" : {
  5149. "reference_data" : [ {
  5150. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  5151. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  5152. "refsource" : "CONFIRM",
  5153. "tags" : [ ]
  5154. } ]
  5155. },
  5156. "description" : {
  5157. "description_data" : [ {
  5158. "lang" : "en",
  5159. "value" : "Potential UE reset while decoding a crafted Sib1 or SIB1 that schedules unsupported SIBs and can lead to denial of service in Snapdragon Auto, Snapdragon Mobile"
  5160. } ]
  5161. }
  5162. },
  5163. "configurations" : {
  5164. "CVE_data_version" : "4.0",
  5165. "nodes" : [ ]
  5166. },
  5167. "impact" : { },
  5168. "publishedDate" : "2021-05-07T09:15Z",
  5169. "lastModifiedDate" : "2021-05-07T09:31Z"
  5170. }, {
  5171. "cve" : {
  5172. "data_type" : "CVE",
  5173. "data_format" : "MITRE",
  5174. "data_version" : "4.0",
  5175. "CVE_data_meta" : {
  5176. "ID" : "CVE-2020-11254",
  5177. "ASSIGNER" : "product-security@qualcomm.com"
  5178. },
  5179. "problemtype" : {
  5180. "problemtype_data" : [ {
  5181. "description" : [ ]
  5182. } ]
  5183. },
  5184. "references" : {
  5185. "reference_data" : [ {
  5186. "url" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  5187. "name" : "https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin",
  5188. "refsource" : "CONFIRM",
  5189. "tags" : [ ]
  5190. } ]
  5191. },
  5192. "description" : {
  5193. "description_data" : [ {
  5194. "lang" : "en",
  5195. "value" : "Memory corruption during buffer allocation due to dereferencing session ctx pointer without checking if pointer is valid in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile"
  5196. } ]
  5197. }
  5198. },
  5199. "configurations" : {
  5200. "CVE_data_version" : "4.0",
  5201. "nodes" : [ ]
  5202. },
  5203. "impact" : { },
  5204. "publishedDate" : "2021-05-07T09:15Z",
  5205. "lastModifiedDate" : "2021-05-07T09:31Z"
  5206. }, {
  5207. "cve" : {
  5208. "data_type" : "CVE",
  5209. "data_format" : "MITRE",
  5210. "data_version" : "4.0",
  5211. "CVE_data_meta" : {
  5212. "ID" : "CVE-2020-29445",
  5213. "ASSIGNER" : "security@atlassian.com"
  5214. },
  5215. "problemtype" : {
  5216. "problemtype_data" : [ {
  5217. "description" : [ ]
  5218. } ]
  5219. },
  5220. "references" : {
  5221. "reference_data" : [ {
  5222. "url" : "https://jira.atlassian.com/browse/CONFSERVER-61453",
  5223. "name" : "N/A",
  5224. "refsource" : "N/A",
  5225. "tags" : [ ]
  5226. } ]
  5227. },
  5228. "description" : {
  5229. "description_data" : [ {
  5230. "lang" : "en",
  5231. "value" : "Affected versions of Confluence Server before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters."
  5232. } ]
  5233. }
  5234. },
  5235. "configurations" : {
  5236. "CVE_data_version" : "4.0",
  5237. "nodes" : [ ]
  5238. },
  5239. "impact" : { },
  5240. "publishedDate" : "2021-05-07T06:15Z",
  5241. "lastModifiedDate" : "2021-05-07T09:31Z"
  5242. }, {
  5243. "cve" : {
  5244. "data_type" : "CVE",
  5245. "data_format" : "MITRE",
  5246. "data_version" : "4.0",
  5247. "CVE_data_meta" : {
  5248. "ID" : "CVE-2020-29444",
  5249. "ASSIGNER" : "security@atlassian.com"
  5250. },
  5251. "problemtype" : {
  5252. "problemtype_data" : [ {
  5253. "description" : [ ]
  5254. } ]
  5255. },
  5256. "references" : {
  5257. "reference_data" : [ {
  5258. "url" : "https://jira.atlassian.com/browse/CONFSERVER-61266",
  5259. "name" : "N/A",
  5260. "refsource" : "N/A",
  5261. "tags" : [ ]
  5262. } ]
  5263. },
  5264. "description" : {
  5265. "description_data" : [ {
  5266. "lang" : "en",
  5267. "value" : "Affected versions of Team Calendar in Confluence Server before 7.11.0 allow attackers to inject arbitrary HTML or Javascript via a Cross Site Scripting Vulnerability in admin global setting parameters."
  5268. } ]
  5269. }
  5270. },
  5271. "configurations" : {
  5272. "CVE_data_version" : "4.0",
  5273. "nodes" : [ ]
  5274. },
  5275. "impact" : { },
  5276. "publishedDate" : "2021-05-07T06:15Z",
  5277. "lastModifiedDate" : "2021-05-07T09:31Z"
  5278. }, {
  5279. "cve" : {
  5280. "data_type" : "CVE",
  5281. "data_format" : "MITRE",
  5282. "data_version" : "4.0",
  5283. "CVE_data_meta" : {
  5284. "ID" : "CVE-2021-32093",
  5285. "ASSIGNER" : "cve@mitre.org"
  5286. },
  5287. "problemtype" : {
  5288. "problemtype_data" : [ {
  5289. "description" : [ ]
  5290. } ]
  5291. },
  5292. "references" : {
  5293. "reference_data" : [ {
  5294. "url" : "https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed",
  5295. "name" : "https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed",
  5296. "refsource" : "MISC",
  5297. "tags" : [ ]
  5298. }, {
  5299. "url" : "https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover",
  5300. "name" : "https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover",
  5301. "refsource" : "MISC",
  5302. "tags" : [ ]
  5303. } ]
  5304. },
  5305. "description" : {
  5306. "description_data" : [ {
  5307. "lang" : "en",
  5308. "value" : "The ConfigFileAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to read arbitrary files via the ConfigName parameter."
  5309. } ]
  5310. }
  5311. },
  5312. "configurations" : {
  5313. "CVE_data_version" : "4.0",
  5314. "nodes" : [ ]
  5315. },
  5316. "impact" : { },
  5317. "publishedDate" : "2021-05-07T05:15Z",
  5318. "lastModifiedDate" : "2021-05-07T09:31Z"
  5319. }, {
  5320. "cve" : {
  5321. "data_type" : "CVE",
  5322. "data_format" : "MITRE",
  5323. "data_version" : "4.0",
  5324. "CVE_data_meta" : {
  5325. "ID" : "CVE-2021-32092",
  5326. "ASSIGNER" : "cve@mitre.org"
  5327. },
  5328. "problemtype" : {
  5329. "problemtype_data" : [ {
  5330. "description" : [ ]
  5331. } ]
  5332. },
  5333. "references" : {
  5334. "reference_data" : [ {
  5335. "url" : "https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed",
  5336. "name" : "https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed",
  5337. "refsource" : "MISC",
  5338. "tags" : [ ]
  5339. }, {
  5340. "url" : "https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover",
  5341. "name" : "https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover",
  5342. "refsource" : "MISC",
  5343. "tags" : [ ]
  5344. } ]
  5345. },
  5346. "description" : {
  5347. "description_data" : [ {
  5348. "lang" : "en",
  5349. "value" : "A Cross-site scripting (XSS) vulnerability in the DocumentAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows remote attackers to inject arbitrary web script or HTML via the uuid parameter."
  5350. } ]
  5351. }
  5352. },
  5353. "configurations" : {
  5354. "CVE_data_version" : "4.0",
  5355. "nodes" : [ ]
  5356. },
  5357. "impact" : { },
  5358. "publishedDate" : "2021-05-07T05:15Z",
  5359. "lastModifiedDate" : "2021-05-07T09:31Z"
  5360. }, {
  5361. "cve" : {
  5362. "data_type" : "CVE",
  5363. "data_format" : "MITRE",
  5364. "data_version" : "4.0",
  5365. "CVE_data_meta" : {
  5366. "ID" : "CVE-2021-32091",
  5367. "ASSIGNER" : "cve@mitre.org"
  5368. },
  5369. "problemtype" : {
  5370. "problemtype_data" : [ {
  5371. "description" : [ ]
  5372. } ]
  5373. },
  5374. "references" : {
  5375. "reference_data" : [ {
  5376. "url" : "https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances",
  5377. "name" : "https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances",
  5378. "refsource" : "MISC",
  5379. "tags" : [ ]
  5380. }, {
  5381. "url" : "https://blog.sonarsource.com/hack-the-stack-with-localstack",
  5382. "name" : "https://blog.sonarsource.com/hack-the-stack-with-localstack",
  5383. "refsource" : "MISC",
  5384. "tags" : [ ]
  5385. } ]
  5386. },
  5387. "description" : {
  5388. "description_data" : [ {
  5389. "lang" : "en",
  5390. "value" : "A Cross-site scripting (XSS) vulnerability exists in StackLift LocalStack 0.12.6."
  5391. } ]
  5392. }
  5393. },
  5394. "configurations" : {
  5395. "CVE_data_version" : "4.0",
  5396. "nodes" : [ ]
  5397. },
  5398. "impact" : { },
  5399. "publishedDate" : "2021-05-07T05:15Z",
  5400. "lastModifiedDate" : "2021-05-07T09:31Z"
  5401. }, {
  5402. "cve" : {
  5403. "data_type" : "CVE",
  5404. "data_format" : "MITRE",
  5405. "data_version" : "4.0",
  5406. "CVE_data_meta" : {
  5407. "ID" : "CVE-2021-32090",
  5408. "ASSIGNER" : "cve@mitre.org"
  5409. },
  5410. "problemtype" : {
  5411. "problemtype_data" : [ {
  5412. "description" : [ ]
  5413. } ]
  5414. },
  5415. "references" : {
  5416. "reference_data" : [ {
  5417. "url" : "https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances",
  5418. "name" : "https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances",
  5419. "refsource" : "MISC",
  5420. "tags" : [ ]
  5421. }, {
  5422. "url" : "https://blog.sonarsource.com/hack-the-stack-with-localstack",
  5423. "name" : "https://blog.sonarsource.com/hack-the-stack-with-localstack",
  5424. "refsource" : "MISC",
  5425. "tags" : [ ]
  5426. } ]
  5427. },
  5428. "description" : {
  5429. "description_data" : [ {
  5430. "lang" : "en",
  5431. "value" : "The dashboard component of StackLift LocalStack 0.12.6 allows attackers to inject arbitrary shell commands via the functionName parameter."
  5432. } ]
  5433. }
  5434. },
  5435. "configurations" : {
  5436. "CVE_data_version" : "4.0",
  5437. "nodes" : [ ]
  5438. },
  5439. "impact" : { },
  5440. "publishedDate" : "2021-05-07T05:15Z",
  5441. "lastModifiedDate" : "2021-05-07T09:31Z"
  5442. }, {
  5443. "cve" : {
  5444. "data_type" : "CVE",
  5445. "data_format" : "MITRE",
  5446. "data_version" : "4.0",
  5447. "CVE_data_meta" : {
  5448. "ID" : "CVE-2021-32074",
  5449. "ASSIGNER" : "cve@mitre.org"
  5450. },
  5451. "problemtype" : {
  5452. "problemtype_data" : [ {
  5453. "description" : [ ]
  5454. } ]
  5455. },
  5456. "references" : {
  5457. "reference_data" : [ {
  5458. "url" : "https://github.com/hashicorp/vault-action/pull/208",
  5459. "name" : "https://github.com/hashicorp/vault-action/pull/208",
  5460. "refsource" : "MISC",
  5461. "tags" : [ ]
  5462. }, {
  5463. "url" : "https://github.com/hashicorp/vault-action/issues/205",
  5464. "name" : "https://github.com/hashicorp/vault-action/issues/205",
  5465. "refsource" : "MISC",
  5466. "tags" : [ ]
  5467. }, {
  5468. "url" : "https://github.com/hashicorp/vault-action/blob/master/CHANGELOG.md",
  5469. "name" : "https://github.com/hashicorp/vault-action/blob/master/CHANGELOG.md",
  5470. "refsource" : "MISC",
  5471. "tags" : [ ]
  5472. }, {
  5473. "url" : "https://discuss.hashicorp.com/t/hcsec-2021-13-vault-github-action-did-not-correctly-mask-multi-line-secrets-in-output/24128",
  5474. "name" : "https://discuss.hashicorp.com/t/hcsec-2021-13-vault-github-action-did-not-correctly-mask-multi-line-secrets-in-output/24128",
  5475. "refsource" : "MISC",
  5476. "tags" : [ ]
  5477. } ]
  5478. },
  5479. "description" : {
  5480. "description_data" : [ {
  5481. "lang" : "en",
  5482. "value" : "HashiCorp vault-action (aka Vault GitHub Action) before 2.2.0 allows attackers to obtain sensitive information from log files because a multi-line secret was not correctly registered with GitHub Actions for log masking."
  5483. } ]
  5484. }
  5485. },
  5486. "configurations" : {
  5487. "CVE_data_version" : "4.0",
  5488. "nodes" : [ ]
  5489. },
  5490. "impact" : { },
  5491. "publishedDate" : "2021-05-07T05:15Z",
  5492. "lastModifiedDate" : "2021-05-07T09:31Z"
  5493. }, {
  5494. "cve" : {
  5495. "data_type" : "CVE",
  5496. "data_format" : "MITRE",
  5497. "data_version" : "4.0",
  5498. "CVE_data_meta" : {
  5499. "ID" : "CVE-2021-32104",
  5500. "ASSIGNER" : "cve@mitre.org"
  5501. },
  5502. "problemtype" : {
  5503. "problemtype_data" : [ {
  5504. "description" : [ ]
  5505. } ]
  5506. },
  5507. "references" : {
  5508. "reference_data" : [ {
  5509. "url" : "https://community.sonarsource.com/t/openemr-5-0-2-1-command-injection-vulnerability-puts-health-records-at-risk/33592",
  5510. "name" : "https://community.sonarsource.com/t/openemr-5-0-2-1-command-injection-vulnerability-puts-health-records-at-risk/33592",
  5511. "refsource" : "MISC",
  5512. "tags" : [ ]
  5513. }, {
  5514. "url" : "https://community.open-emr.org/t/openemr-5-0-2-patch-5-has-been-released/15431",
  5515. "name" : "https://community.open-emr.org/t/openemr-5-0-2-patch-5-has-been-released/15431",
  5516. "refsource" : "MISC",
  5517. "tags" : [ ]
  5518. }, {
  5519. "url" : "https://blog.sonarsource.com/openemr-5-0-2-1-command-injection-vulnerability",
  5520. "name" : "https://blog.sonarsource.com/openemr-5-0-2-1-command-injection-vulnerability",
  5521. "refsource" : "MISC",
  5522. "tags" : [ ]
  5523. }, {
  5524. "url" : "https://www.open-emr.org/wiki/index.php/Old_Outdated_OpenEMR_Patches",
  5525. "name" : "https://www.open-emr.org/wiki/index.php/Old_Outdated_OpenEMR_Patches",
  5526. "refsource" : "MISC",
  5527. "tags" : [ ]
  5528. }, {
  5529. "url" : "https://portswigger.net/daily-swig/healthcare-security-openemr-fixes-serious-flaws-that-lead-to-command-execution-in-patient-portal",
  5530. "name" : "https://portswigger.net/daily-swig/healthcare-security-openemr-fixes-serious-flaws-that-lead-to-command-execution-in-patient-portal",
  5531. "refsource" : "MISC",
  5532. "tags" : [ ]
  5533. } ]
  5534. },
  5535. "description" : {
  5536. "description_data" : [ {
  5537. "lang" : "en",
  5538. "value" : "A SQL injection vulnerability exists (with user privileges) in interface/forms/eye_mag/save.php in OpenEMR 5.0.2.1."
  5539. } ]
  5540. }
  5541. },
  5542. "configurations" : {
  5543. "CVE_data_version" : "4.0",
  5544. "nodes" : [ ]
  5545. },
  5546. "impact" : { },
  5547. "publishedDate" : "2021-05-07T04:15Z",
  5548. "lastModifiedDate" : "2021-05-07T09:31Z"
  5549. }, {
  5550. "cve" : {
  5551. "data_type" : "CVE",
  5552. "data_format" : "MITRE",
  5553. "data_version" : "4.0",
  5554. "CVE_data_meta" : {
  5555. "ID" : "CVE-2021-32103",
  5556. "ASSIGNER" : "cve@mitre.org"
  5557. },
  5558. "problemtype" : {
  5559. "problemtype_data" : [ {
  5560. "description" : [ ]
  5561. } ]
  5562. },
  5563. "references" : {
  5564. "reference_data" : [ {
  5565. "url" : "https://community.sonarsource.com/t/openemr-5-0-2-1-command-injection-vulnerability-puts-health-records-at-risk/33592",
  5566. "name" : "https://community.sonarsource.com/t/openemr-5-0-2-1-command-injection-vulnerability-puts-health-records-at-risk/33592",
  5567. "refsource" : "MISC",
  5568. "tags" : [ ]
  5569. }, {
  5570. "url" : "https://community.open-emr.org/t/openemr-5-0-2-patch-5-has-been-released/15431",
  5571. "name" : "https://community.open-emr.org/t/openemr-5-0-2-patch-5-has-been-released/15431",
  5572. "refsource" : "MISC",
  5573. "tags" : [ ]
  5574. }, {
  5575. "url" : "https://blog.sonarsource.com/openemr-5-0-2-1-command-injection-vulnerability",
  5576. "name" : "https://blog.sonarsource.com/openemr-5-0-2-1-command-injection-vulnerability",
  5577. "refsource" : "MISC",
  5578. "tags" : [ ]
  5579. }, {
  5580. "url" : "https://portswigger.net/daily-swig/healthcare-security-openemr-fixes-serious-flaws-that-lead-to-command-execution-in-patient-portal",
  5581. "name" : "https://portswigger.net/daily-swig/healthcare-security-openemr-fixes-serious-flaws-that-lead-to-command-execution-in-patient-portal",
  5582. "refsource" : "MISC",
  5583. "tags" : [ ]
  5584. } ]
  5585. },
  5586. "description" : {
  5587. "description_data" : [ {
  5588. "lang" : "en",
  5589. "value" : "A Stored XSS vulnerability in interface/usergroup/usergroup_admin.php in OpenEMR before 5.0.2.1 allows a admin authenticated user to inject arbitrary web script or HTML via the lname parameter."
  5590. } ]
  5591. }
  5592. },
  5593. "configurations" : {
  5594. "CVE_data_version" : "4.0",
  5595. "nodes" : [ ]
  5596. },
  5597. "impact" : { },
  5598. "publishedDate" : "2021-05-07T04:15Z",
  5599. "lastModifiedDate" : "2021-05-07T09:31Z"
  5600. }, {
  5601. "cve" : {
  5602. "data_type" : "CVE",
  5603. "data_format" : "MITRE",
  5604. "data_version" : "4.0",
  5605. "CVE_data_meta" : {
  5606. "ID" : "CVE-2021-32102",
  5607. "ASSIGNER" : "cve@mitre.org"
  5608. },
  5609. "problemtype" : {
  5610. "problemtype_data" : [ {
  5611. "description" : [ ]
  5612. } ]
  5613. },
  5614. "references" : {
  5615. "reference_data" : [ {
  5616. "url" : "https://community.sonarsource.com/t/openemr-5-0-2-1-command-injection-vulnerability-puts-health-records-at-risk/33592",
  5617. "name" : "https://community.sonarsource.com/t/openemr-5-0-2-1-command-injection-vulnerability-puts-health-records-at-risk/33592",
  5618. "refsource" : "MISC",
  5619. "tags" : [ ]
  5620. }, {
  5621. "url" : "https://community.open-emr.org/t/openemr-5-0-2-patch-5-has-been-released/15431",
  5622. "name" : "https://community.open-emr.org/t/openemr-5-0-2-patch-5-has-been-released/15431",
  5623. "refsource" : "MISC",
  5624. "tags" : [ ]
  5625. }, {
  5626. "url" : "https://blog.sonarsource.com/openemr-5-0-2-1-command-injection-vulnerability",
  5627. "name" : "https://blog.sonarsource.com/openemr-5-0-2-1-command-injection-vulnerability",
  5628. "refsource" : "MISC",
  5629. "tags" : [ ]
  5630. }, {
  5631. "url" : "https://www.open-emr.org/wiki/index.php/Old_Outdated_OpenEMR_Patches",
  5632. "name" : "https://www.open-emr.org/wiki/index.php/Old_Outdated_OpenEMR_Patches",
  5633. "refsource" : "MISC",
  5634. "tags" : [ ]
  5635. }, {
  5636. "url" : "https://portswigger.net/daily-swig/healthcare-security-openemr-fixes-serious-flaws-that-lead-to-command-execution-in-patient-portal",
  5637. "name" : "https://portswigger.net/daily-swig/healthcare-security-openemr-fixes-serious-flaws-that-lead-to-command-execution-in-patient-portal",
  5638. "refsource" : "MISC",
  5639. "tags" : [ ]
  5640. } ]
  5641. },
  5642. "description" : {
  5643. "description_data" : [ {
  5644. "lang" : "en",
  5645. "value" : "A SQL injection vulnerability exists (with user privileges) in library/custom_template/ajax_code.php in OpenEMR 5.0.2.1."
  5646. } ]
  5647. }
  5648. },
  5649. "configurations" : {
  5650. "CVE_data_version" : "4.0",
  5651. "nodes" : [ ]
  5652. },
  5653. "impact" : { },
  5654. "publishedDate" : "2021-05-07T04:15Z",
  5655. "lastModifiedDate" : "2021-05-07T09:31Z"
  5656. }, {
  5657. "cve" : {
  5658. "data_type" : "CVE",
  5659. "data_format" : "MITRE",
  5660. "data_version" : "4.0",
  5661. "CVE_data_meta" : {
  5662. "ID" : "CVE-2021-32101",
  5663. "ASSIGNER" : "cve@mitre.org"
  5664. },
  5665. "problemtype" : {
  5666. "problemtype_data" : [ {
  5667. "description" : [ ]
  5668. } ]
  5669. },
  5670. "references" : {
  5671. "reference_data" : [ {
  5672. "url" : "https://community.sonarsource.com/t/openemr-5-0-2-1-command-injection-vulnerability-puts-health-records-at-risk/33592",
  5673. "name" : "https://community.sonarsource.com/t/openemr-5-0-2-1-command-injection-vulnerability-puts-health-records-at-risk/33592",
  5674. "refsource" : "MISC",
  5675. "tags" : [ ]
  5676. }, {
  5677. "url" : "https://community.open-emr.org/t/openemr-5-0-2-patch-5-has-been-released/15431",
  5678. "name" : "https://community.open-emr.org/t/openemr-5-0-2-patch-5-has-been-released/15431",
  5679. "refsource" : "MISC",
  5680. "tags" : [ ]
  5681. }, {
  5682. "url" : "https://blog.sonarsource.com/openemr-5-0-2-1-command-injection-vulnerability",
  5683. "name" : "https://blog.sonarsource.com/openemr-5-0-2-1-command-injection-vulnerability",
  5684. "refsource" : "MISC",
  5685. "tags" : [ ]
  5686. }, {
  5687. "url" : "https://portswigger.net/daily-swig/healthcare-security-openemr-fixes-serious-flaws-that-lead-to-command-execution-in-patient-portal",
  5688. "name" : "https://portswigger.net/daily-swig/healthcare-security-openemr-fixes-serious-flaws-that-lead-to-command-execution-in-patient-portal",
  5689. "refsource" : "MISC",
  5690. "tags" : [ ]
  5691. } ]
  5692. },
  5693. "description" : {
  5694. "description_data" : [ {
  5695. "lang" : "en",
  5696. "value" : "The Patient Portal of OpenEMR 5.0.2.1 is affected by a incorrect access control system in portal/patient/_machine_config.php. To exploit the vulnerability, an unauthenticated attacker can register an account, bypassing the permission check of this portal's API. Then, the attacker can then manipulate and read data of every registered patient."
  5697. } ]
  5698. }
  5699. },
  5700. "configurations" : {
  5701. "CVE_data_version" : "4.0",
  5702. "nodes" : [ ]
  5703. },
  5704. "impact" : { },
  5705. "publishedDate" : "2021-05-07T04:15Z",
  5706. "lastModifiedDate" : "2021-05-07T09:31Z"
  5707. }, {
  5708. "cve" : {
  5709. "data_type" : "CVE",
  5710. "data_format" : "MITRE",
  5711. "data_version" : "4.0",
  5712. "CVE_data_meta" : {
  5713. "ID" : "CVE-2021-32100",
  5714. "ASSIGNER" : "cve@mitre.org"
  5715. },
  5716. "problemtype" : {
  5717. "problemtype_data" : [ {
  5718. "description" : [ ]
  5719. } ]
  5720. },
  5721. "references" : {
  5722. "reference_data" : [ {
  5723. "url" : "https://blog.sonarsource.com/pandora-fms-742-critical-code-vulnerabilities-explained",
  5724. "name" : "https://blog.sonarsource.com/pandora-fms-742-critical-code-vulnerabilities-explained",
  5725. "refsource" : "MISC",
  5726. "tags" : [ ]
  5727. }, {
  5728. "url" : "https://pandorafms.com/blog/whats-new-in-pandora-fms-743/",
  5729. "name" : "https://pandorafms.com/blog/whats-new-in-pandora-fms-743/",
  5730. "refsource" : "MISC",
  5731. "tags" : [ ]
  5732. }, {
  5733. "url" : "https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack",
  5734. "name" : "https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack",
  5735. "refsource" : "MISC",
  5736. "tags" : [ ]
  5737. } ]
  5738. },
  5739. "description" : {
  5740. "description_data" : [ {
  5741. "lang" : "en",
  5742. "value" : "A remote file inclusion vulnerability exists in Artica Pandora FMS 742, exploitable by the lowest privileged user."
  5743. } ]
  5744. }
  5745. },
  5746. "configurations" : {
  5747. "CVE_data_version" : "4.0",
  5748. "nodes" : [ ]
  5749. },
  5750. "impact" : { },
  5751. "publishedDate" : "2021-05-07T04:15Z",
  5752. "lastModifiedDate" : "2021-05-07T09:31Z"
  5753. }, {
  5754. "cve" : {
  5755. "data_type" : "CVE",
  5756. "data_format" : "MITRE",
  5757. "data_version" : "4.0",
  5758. "CVE_data_meta" : {
  5759. "ID" : "CVE-2021-32099",
  5760. "ASSIGNER" : "cve@mitre.org"
  5761. },
  5762. "problemtype" : {
  5763. "problemtype_data" : [ {
  5764. "description" : [ ]
  5765. } ]
  5766. },
  5767. "references" : {
  5768. "reference_data" : [ {
  5769. "url" : "https://blog.sonarsource.com/pandora-fms-742-critical-code-vulnerabilities-explained",
  5770. "name" : "https://blog.sonarsource.com/pandora-fms-742-critical-code-vulnerabilities-explained",
  5771. "refsource" : "MISC",
  5772. "tags" : [ ]
  5773. }, {
  5774. "url" : "https://pandorafms.com/blog/whats-new-in-pandora-fms-743/",
  5775. "name" : "https://pandorafms.com/blog/whats-new-in-pandora-fms-743/",
  5776. "refsource" : "MISC",
  5777. "tags" : [ ]
  5778. }, {
  5779. "url" : "https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack",
  5780. "name" : "https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack",
  5781. "refsource" : "MISC",
  5782. "tags" : [ ]
  5783. } ]
  5784. },
  5785. "description" : {
  5786. "description_data" : [ {
  5787. "lang" : "en",
  5788. "value" : "A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated attacker to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass."
  5789. } ]
  5790. }
  5791. },
  5792. "configurations" : {
  5793. "CVE_data_version" : "4.0",
  5794. "nodes" : [ ]
  5795. },
  5796. "impact" : { },
  5797. "publishedDate" : "2021-05-07T04:15Z",
  5798. "lastModifiedDate" : "2021-05-07T09:31Z"
  5799. }, {
  5800. "cve" : {
  5801. "data_type" : "CVE",
  5802. "data_format" : "MITRE",
  5803. "data_version" : "4.0",
  5804. "CVE_data_meta" : {
  5805. "ID" : "CVE-2021-32098",
  5806. "ASSIGNER" : "cve@mitre.org"
  5807. },
  5808. "problemtype" : {
  5809. "problemtype_data" : [ {
  5810. "description" : [ ]
  5811. } ]
  5812. },
  5813. "references" : {
  5814. "reference_data" : [ {
  5815. "url" : "https://blog.sonarsource.com/pandora-fms-742-critical-code-vulnerabilities-explained",
  5816. "name" : "https://blog.sonarsource.com/pandora-fms-742-critical-code-vulnerabilities-explained",
  5817. "refsource" : "MISC",
  5818. "tags" : [ ]
  5819. }, {
  5820. "url" : "https://pandorafms.com/blog/whats-new-in-pandora-fms-743/",
  5821. "name" : "https://pandorafms.com/blog/whats-new-in-pandora-fms-743/",
  5822. "refsource" : "MISC",
  5823. "tags" : [ ]
  5824. }, {
  5825. "url" : "https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack",
  5826. "name" : "https://portswigger.net/daily-swig/multiple-vulnerabilities-in-pandora-fms-could-trigger-remote-execution-attack",
  5827. "refsource" : "MISC",
  5828. "tags" : [ ]
  5829. } ]
  5830. },
  5831. "description" : {
  5832. "description_data" : [ {
  5833. "lang" : "en",
  5834. "value" : "Artica Pandora FMS 742 allows unauthenticated attackers to perform Phar deserialization."
  5835. } ]
  5836. }
  5837. },
  5838. "configurations" : {
  5839. "CVE_data_version" : "4.0",
  5840. "nodes" : [ ]
  5841. },
  5842. "impact" : { },
  5843. "publishedDate" : "2021-05-07T04:15Z",
  5844. "lastModifiedDate" : "2021-05-07T09:31Z"
  5845. }, {
  5846. "cve" : {
  5847. "data_type" : "CVE",
  5848. "data_format" : "MITRE",
  5849. "data_version" : "4.0",
  5850. "CVE_data_meta" : {
  5851. "ID" : "CVE-2021-32096",
  5852. "ASSIGNER" : "cve@mitre.org"
  5853. },
  5854. "problemtype" : {
  5855. "problemtype_data" : [ {
  5856. "description" : [ ]
  5857. } ]
  5858. },
  5859. "references" : {
  5860. "reference_data" : [ {
  5861. "url" : "https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed",
  5862. "name" : "https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed",
  5863. "refsource" : "MISC",
  5864. "tags" : [ ]
  5865. }, {
  5866. "url" : "https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover",
  5867. "name" : "https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover",
  5868. "refsource" : "MISC",
  5869. "tags" : [ ]
  5870. } ]
  5871. },
  5872. "description" : {
  5873. "description_data" : [ {
  5874. "lang" : "en",
  5875. "value" : "The ConsoleAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows a CSRF attack that results in injecting arbitrary Ruby code (for an eval call) via the CONSOLE_COMMAND_STRING parameter."
  5876. } ]
  5877. }
  5878. },
  5879. "configurations" : {
  5880. "CVE_data_version" : "4.0",
  5881. "nodes" : [ ]
  5882. },
  5883. "impact" : { },
  5884. "publishedDate" : "2021-05-07T04:15Z",
  5885. "lastModifiedDate" : "2021-05-07T09:31Z"
  5886. }, {
  5887. "cve" : {
  5888. "data_type" : "CVE",
  5889. "data_format" : "MITRE",
  5890. "data_version" : "4.0",
  5891. "CVE_data_meta" : {
  5892. "ID" : "CVE-2021-32095",
  5893. "ASSIGNER" : "cve@mitre.org"
  5894. },
  5895. "problemtype" : {
  5896. "problemtype_data" : [ {
  5897. "description" : [ ]
  5898. } ]
  5899. },
  5900. "references" : {
  5901. "reference_data" : [ {
  5902. "url" : "https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed",
  5903. "name" : "https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed",
  5904. "refsource" : "MISC",
  5905. "tags" : [ ]
  5906. }, {
  5907. "url" : "https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover",
  5908. "name" : "https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover",
  5909. "refsource" : "MISC",
  5910. "tags" : [ ]
  5911. } ]
  5912. },
  5913. "description" : {
  5914. "description_data" : [ {
  5915. "lang" : "en",
  5916. "value" : "U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to delete arbitrary files."
  5917. } ]
  5918. }
  5919. },
  5920. "configurations" : {
  5921. "CVE_data_version" : "4.0",
  5922. "nodes" : [ ]
  5923. },
  5924. "impact" : { },
  5925. "publishedDate" : "2021-05-07T04:15Z",
  5926. "lastModifiedDate" : "2021-05-07T09:31Z"
  5927. }, {
  5928. "cve" : {
  5929. "data_type" : "CVE",
  5930. "data_format" : "MITRE",
  5931. "data_version" : "4.0",
  5932. "CVE_data_meta" : {
  5933. "ID" : "CVE-2021-32094",
  5934. "ASSIGNER" : "cve@mitre.org"
  5935. },
  5936. "problemtype" : {
  5937. "problemtype_data" : [ {
  5938. "description" : [ ]
  5939. } ]
  5940. },
  5941. "references" : {
  5942. "reference_data" : [ {
  5943. "url" : "https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed",
  5944. "name" : "https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed",
  5945. "refsource" : "MISC",
  5946. "tags" : [ ]
  5947. }, {
  5948. "url" : "https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover",
  5949. "name" : "https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover",
  5950. "refsource" : "MISC",
  5951. "tags" : [ ]
  5952. } ]
  5953. },
  5954. "description" : {
  5955. "description_data" : [ {
  5956. "lang" : "en",
  5957. "value" : "U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to upload arbitrary files."
  5958. } ]
  5959. }
  5960. },
  5961. "configurations" : {
  5962. "CVE_data_version" : "4.0",
  5963. "nodes" : [ ]
  5964. },
  5965. "impact" : { },
  5966. "publishedDate" : "2021-05-07T04:15Z",
  5967. "lastModifiedDate" : "2021-05-07T09:31Z"
  5968. }, {
  5969. "cve" : {
  5970. "data_type" : "CVE",
  5971. "data_format" : "MITRE",
  5972. "data_version" : "4.0",
  5973. "CVE_data_meta" : {
  5974. "ID" : "CVE-2021-32077",
  5975. "ASSIGNER" : "cve@mitre.org"
  5976. },
  5977. "problemtype" : {
  5978. "problemtype_data" : [ {
  5979. "description" : [ ]
  5980. } ]
  5981. },
  5982. "references" : {
  5983. "reference_data" : [ {
  5984. "url" : "https://www.marbasec.com/blog/cve-2021-32077-fun-with-social-security-numbers",
  5985. "name" : "https://www.marbasec.com/blog/cve-2021-32077-fun-with-social-security-numbers",
  5986. "refsource" : "MISC",
  5987. "tags" : [ ]
  5988. }, {
  5989. "url" : "https://www.veritystream.com/legacy/msow-solutions",
  5990. "name" : "https://www.veritystream.com/legacy/msow-solutions",
  5991. "refsource" : "MISC",
  5992. "tags" : [ ]
  5993. } ]
  5994. },
  5995. "description" : {
  5996. "description_data" : [ {
  5997. "lang" : "en",
  5998. "value" : "Primary Source Verification in VerityStream MSOW Solutions before 3.1.1 allows an anonymous internet user to discover Social Security Number (SSN) values via a brute-force attack on a (sometimes hidden) search field, because the last four SSN digits are part of the supported combination of search selectors. This discloses doctors' and nurses' social security numbers and PII."
  5999. } ]
  6000. }
  6001. },
  6002. "configurations" : {
  6003. "CVE_data_version" : "4.0",
  6004. "nodes" : [ ]
  6005. },
  6006. "impact" : { },
  6007. "publishedDate" : "2021-05-06T23:15Z",
  6008. "lastModifiedDate" : "2021-05-07T09:31Z"
  6009. }, {
  6010. "cve" : {
  6011. "data_type" : "CVE",
  6012. "data_format" : "MITRE",
  6013. "data_version" : "4.0",
  6014. "CVE_data_meta" : {
  6015. "ID" : "CVE-2020-23264",
  6016. "ASSIGNER" : "cve@mitre.org"
  6017. },
  6018. "problemtype" : {
  6019. "problemtype_data" : [ {
  6020. "description" : [ ]
  6021. } ]
  6022. },
  6023. "references" : {
  6024. "reference_data" : [ {
  6025. "url" : "https://github.com/forkcms/forkcms/pull/3123",
  6026. "name" : "https://github.com/forkcms/forkcms/pull/3123",
  6027. "refsource" : "CONFIRM",
  6028. "tags" : [ ]
  6029. } ]
  6030. },
  6031. "description" : {
  6032. "description_data" : [ {
  6033. "lang" : "en",
  6034. "value" : "Cross-site request forgery (CSRF) in Fork-CMS before 5.8.2 allow remote attackers to hijack the authentication of logged administrators."
  6035. } ]
  6036. }
  6037. },
  6038. "configurations" : {
  6039. "CVE_data_version" : "4.0",
  6040. "nodes" : [ ]
  6041. },
  6042. "impact" : { },
  6043. "publishedDate" : "2021-05-06T22:15Z",
  6044. "lastModifiedDate" : "2021-05-07T09:31Z"
  6045. }, {
  6046. "cve" : {
  6047. "data_type" : "CVE",
  6048. "data_format" : "MITRE",
  6049. "data_version" : "4.0",
  6050. "CVE_data_meta" : {
  6051. "ID" : "CVE-2020-23263",
  6052. "ASSIGNER" : "cve@mitre.org"
  6053. },
  6054. "problemtype" : {
  6055. "problemtype_data" : [ {
  6056. "description" : [ ]
  6057. } ]
  6058. },
  6059. "references" : {
  6060. "reference_data" : [ {
  6061. "url" : "https://github.com/forkcms/forkcms/pull/3093",
  6062. "name" : "https://github.com/forkcms/forkcms/pull/3093",
  6063. "refsource" : "CONFIRM",
  6064. "tags" : [ ]
  6065. } ]
  6066. },
  6067. "description" : {
  6068. "description_data" : [ {
  6069. "lang" : "en",
  6070. "value" : "Persistent Cross-site scripting vulnerability on Fork CMS version 5.8.2 allows remote attackers to inject arbitrary Javascript code via the \"navigation_title\" parameter and the \"title\" parameter in /private/en/pages/add."
  6071. } ]
  6072. }
  6073. },
  6074. "configurations" : {
  6075. "CVE_data_version" : "4.0",
  6076. "nodes" : [ ]
  6077. },
  6078. "impact" : { },
  6079. "publishedDate" : "2021-05-06T22:15Z",
  6080. "lastModifiedDate" : "2021-05-07T09:31Z"
  6081. }, {
  6082. "cve" : {
  6083. "data_type" : "CVE",
  6084. "data_format" : "MITRE",
  6085. "data_version" : "4.0",
  6086. "CVE_data_meta" : {
  6087. "ID" : "CVE-2021-31737",
  6088. "ASSIGNER" : "cve@mitre.org"
  6089. },
  6090. "problemtype" : {
  6091. "problemtype_data" : [ {
  6092. "description" : [ ]
  6093. } ]
  6094. },
  6095. "references" : {
  6096. "reference_data" : [ {
  6097. "url" : "https://github.com/emlog/emlog/issues/82",
  6098. "name" : "https://github.com/emlog/emlog/issues/82",
  6099. "refsource" : "MISC",
  6100. "tags" : [ ]
  6101. } ]
  6102. },
  6103. "description" : {
  6104. "description_data" : [ {
  6105. "lang" : "en",
  6106. "value" : "emlog v5.3.1 and emlog v6.0.0 have a Remote Code Execution vulnerability due to upload of database backup file in admin/data.php."
  6107. } ]
  6108. }
  6109. },
  6110. "configurations" : {
  6111. "CVE_data_version" : "4.0",
  6112. "nodes" : [ ]
  6113. },
  6114. "impact" : { },
  6115. "publishedDate" : "2021-05-06T21:15Z",
  6116. "lastModifiedDate" : "2021-05-07T09:31Z"
  6117. }, {
  6118. "cve" : {
  6119. "data_type" : "CVE",
  6120. "data_format" : "MITRE",
  6121. "data_version" : "4.0",
  6122. "CVE_data_meta" : {
  6123. "ID" : "CVE-2021-29203",
  6124. "ASSIGNER" : "security-alert@hpe.com"
  6125. },
  6126. "problemtype" : {
  6127. "problemtype_data" : [ {
  6128. "description" : [ ]
  6129. } ]
  6130. },
  6131. "references" : {
  6132. "reference_data" : [ {
  6133. "url" : "https://www.tenable.com/security/research/tra-2021-15",
  6134. "name" : "https://www.tenable.com/security/research/tra-2021-15",
  6135. "refsource" : "MISC",
  6136. "tags" : [ ]
  6137. }, {
  6138. "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04124en_us",
  6139. "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04124en_us",
  6140. "refsource" : "MISC",
  6141. "tags" : [ ]
  6142. } ]
  6143. },
  6144. "description" : {
  6145. "description_data" : [ {
  6146. "lang" : "en",
  6147. "value" : "A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration. HPE has released a software update to resolve the vulnerability in the HPE Edgeline Infrastructure Manager."
  6148. } ]
  6149. }
  6150. },
  6151. "configurations" : {
  6152. "CVE_data_version" : "4.0",
  6153. "nodes" : [ ]
  6154. },
  6155. "impact" : { },
  6156. "publishedDate" : "2021-05-06T21:15Z",
  6157. "lastModifiedDate" : "2021-05-07T09:31Z"
  6158. }, {
  6159. "cve" : {
  6160. "data_type" : "CVE",
  6161. "data_format" : "MITRE",
  6162. "data_version" : "4.0",
  6163. "CVE_data_meta" : {
  6164. "ID" : "CVE-2021-27941",
  6165. "ASSIGNER" : "cve@mitre.org"
  6166. },
  6167. "problemtype" : {
  6168. "problemtype_data" : [ {
  6169. "description" : [ ]
  6170. } ]
  6171. },
  6172. "references" : {
  6173. "reference_data" : [ {
  6174. "url" : "https://github.com/salgio/eWeLink-QR-Code",
  6175. "name" : "https://github.com/salgio/eWeLink-QR-Code",
  6176. "refsource" : "MISC",
  6177. "tags" : [ ]
  6178. }, {
  6179. "url" : "https://apps.apple.com/us/app/ewelink-smart-home/id1035163158",
  6180. "name" : "https://apps.apple.com/us/app/ewelink-smart-home/id1035163158",
  6181. "refsource" : "MISC",
  6182. "tags" : [ ]
  6183. }, {
  6184. "url" : "https://play.google.com/store/apps/details?id=com.coolkit&hl=en_US",
  6185. "name" : "https://play.google.com/store/apps/details?id=com.coolkit&hl=en_US",
  6186. "refsource" : "MISC",
  6187. "tags" : [ ]
  6188. } ]
  6189. },
  6190. "description" : {
  6191. "description_data" : [ {
  6192. "lang" : "en",
  6193. "value" : "Unconstrained Web access to the device's private encryption key in the QR code pairing mode in the eWeLink mobile application (through 4.9.2 on Android and through 4.9.1 on iOS) allows a physically proximate attacker to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the Wi-Fi spectrum during a device pairing process."
  6194. } ]
  6195. }
  6196. },
  6197. "configurations" : {
  6198. "CVE_data_version" : "4.0",
  6199. "nodes" : [ ]
  6200. },
  6201. "impact" : { },
  6202. "publishedDate" : "2021-05-06T21:15Z",
  6203. "lastModifiedDate" : "2021-05-07T09:31Z"
  6204. }, {
  6205. "cve" : {
  6206. "data_type" : "CVE",
  6207. "data_format" : "MITRE",
  6208. "data_version" : "4.0",
  6209. "CVE_data_meta" : {
  6210. "ID" : "CVE-2021-29493",
  6211. "ASSIGNER" : "security-advisories@github.com"
  6212. },
  6213. "problemtype" : {
  6214. "problemtype_data" : [ {
  6215. "description" : [ {
  6216. "lang" : "en",
  6217. "value" : "CWE-94"
  6218. } ]
  6219. } ]
  6220. },
  6221. "references" : {
  6222. "reference_data" : [ {
  6223. "url" : "https://github.com/kennnyshiwa/kennnyshiwa-cogs/security/advisories/GHSA-f4j2-2cwr-h473",
  6224. "name" : "https://github.com/kennnyshiwa/kennnyshiwa-cogs/security/advisories/GHSA-f4j2-2cwr-h473",
  6225. "refsource" : "CONFIRM",
  6226. "tags" : [ ]
  6227. } ]
  6228. },
  6229. "description" : {
  6230. "description_data" : [ {
  6231. "lang" : "en",
  6232. "value" : "Kennnyshiwa-cogs contains cogs for Red Discordbot. An RCE exploit has been found in the Tickets module of kennnyshiwa-cogs. This exploit allows discord users to craft a message that can reveal sensitive and harmful information. Users can upgrade to version 5a84d60018468e5c0346f7ee74b2b4650a6dade7 to receive a patch or, as a workaround, unload tickets to render the exploit unusable."
  6233. } ]
  6234. }
  6235. },
  6236. "configurations" : {
  6237. "CVE_data_version" : "4.0",
  6238. "nodes" : [ ]
  6239. },
  6240. "impact" : { },
  6241. "publishedDate" : "2021-05-06T20:15Z",
  6242. "lastModifiedDate" : "2021-05-07T09:31Z"
  6243. }, {
  6244. "cve" : {
  6245. "data_type" : "CVE",
  6246. "data_format" : "MITRE",
  6247. "data_version" : "4.0",
  6248. "CVE_data_meta" : {
  6249. "ID" : "CVE-2021-28665",
  6250. "ASSIGNER" : "cve@mitre.org"
  6251. },
  6252. "problemtype" : {
  6253. "problemtype_data" : [ {
  6254. "description" : [ ]
  6255. } ]
  6256. },
  6257. "references" : {
  6258. "reference_data" : [ {
  6259. "url" : "https://advisories.stormshield.eu/",
  6260. "name" : "https://advisories.stormshield.eu/",
  6261. "refsource" : "MISC",
  6262. "tags" : [ ]
  6263. }, {
  6264. "url" : "https://advisories-admin.stormshield.eu/2021-014",
  6265. "name" : "https://advisories-admin.stormshield.eu/2021-014",
  6266. "refsource" : "MISC",
  6267. "tags" : [ ]
  6268. } ]
  6269. },
  6270. "description" : {
  6271. "description_data" : [ {
  6272. "lang" : "en",
  6273. "value" : "Stormshield SNS with versions before 3.7.18, 3.11.6 and 4.1.6 has a memory-management defect in the SNMP plugin that can lead to excessive consumption of memory and CPU resources, and possibly a denial of service."
  6274. } ]
  6275. }
  6276. },
  6277. "configurations" : {
  6278. "CVE_data_version" : "4.0",
  6279. "nodes" : [ ]
  6280. },
  6281. "impact" : { },
  6282. "publishedDate" : "2021-05-06T20:15Z",
  6283. "lastModifiedDate" : "2021-05-07T09:31Z"
  6284. }, {
  6285. "cve" : {
  6286. "data_type" : "CVE",
  6287. "data_format" : "MITRE",
  6288. "data_version" : "4.0",
  6289. "CVE_data_meta" : {
  6290. "ID" : "CVE-2020-28198",
  6291. "ASSIGNER" : "cve@mitre.org"
  6292. },
  6293. "problemtype" : {
  6294. "problemtype_data" : [ {
  6295. "description" : [ ]
  6296. } ]
  6297. },
  6298. "references" : {
  6299. "reference_data" : [ {
  6300. "url" : "https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager",
  6301. "name" : "https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager",
  6302. "refsource" : "MISC",
  6303. "tags" : [ ]
  6304. }, {
  6305. "url" : "https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py",
  6306. "name" : "https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py",
  6307. "refsource" : "MISC",
  6308. "tags" : [ ]
  6309. } ]
  6310. },
  6311. "description" : {
  6312. "description_data" : [ {
  6313. "lang" : "en",
  6314. "value" : "** UNSUPPORTED WHEN ASSIGNED ** The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in \"interactive\" mode while, cause of a max number characters limitation, it cannot be exploited in batch or command line usage (e.g. dsmadmc.exe -id=username -password=pwd). NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
  6315. } ]
  6316. }
  6317. },
  6318. "configurations" : {
  6319. "CVE_data_version" : "4.0",
  6320. "nodes" : [ ]
  6321. },
  6322. "impact" : { },
  6323. "publishedDate" : "2021-05-06T20:15Z",
  6324. "lastModifiedDate" : "2021-05-07T09:31Z"
  6325. }, {
  6326. "cve" : {
  6327. "data_type" : "CVE",
  6328. "data_format" : "MITRE",
  6329. "data_version" : "4.0",
  6330. "CVE_data_meta" : {
  6331. "ID" : "CVE-2021-31828",
  6332. "ASSIGNER" : "cve@mitre.org"
  6333. },
  6334. "problemtype" : {
  6335. "problemtype_data" : [ {
  6336. "description" : [ ]
  6337. } ]
  6338. },
  6339. "references" : {
  6340. "reference_data" : [ {
  6341. "url" : "https://github.com/opendistro-for-elasticsearch/alerting/pull/353",
  6342. "name" : "https://github.com/opendistro-for-elasticsearch/alerting/pull/353",
  6343. "refsource" : "CONFIRM",
  6344. "tags" : [ ]
  6345. }, {
  6346. "url" : "https://opendistro.github.io/for-elasticsearch-docs/version-history/",
  6347. "name" : "https://opendistro.github.io/for-elasticsearch-docs/version-history/",
  6348. "refsource" : "MISC",
  6349. "tags" : [ ]
  6350. } ]
  6351. },
  6352. "description" : {
  6353. "description_data" : [ {
  6354. "lang" : "en",
  6355. "value" : "An SSRF issue in Open Distro for Elasticsearch (ODFE) before 1.13.1.0 allows an existing privileged user to enumerate listening services or interact with configured resources via HTTP requests exceeding the Alerting plugin's intended scope."
  6356. } ]
  6357. }
  6358. },
  6359. "configurations" : {
  6360. "CVE_data_version" : "4.0",
  6361. "nodes" : [ ]
  6362. },
  6363. "impact" : { },
  6364. "publishedDate" : "2021-05-06T19:15Z",
  6365. "lastModifiedDate" : "2021-05-07T09:31Z"
  6366. }, {
  6367. "cve" : {
  6368. "data_type" : "CVE",
  6369. "data_format" : "MITRE",
  6370. "data_version" : "4.0",
  6371. "CVE_data_meta" : {
  6372. "ID" : "CVE-2020-18890",
  6373. "ASSIGNER" : "cve@mitre.org"
  6374. },
  6375. "problemtype" : {
  6376. "problemtype_data" : [ {
  6377. "description" : [ ]
  6378. } ]
  6379. },
  6380. "references" : {
  6381. "reference_data" : [ {
  6382. "url" : "https://github.com/choregus/puppyCMS/issues/14",
  6383. "name" : "https://github.com/choregus/puppyCMS/issues/14",
  6384. "refsource" : "MISC",
  6385. "tags" : [ ]
  6386. } ]
  6387. },
  6388. "description" : {
  6389. "description_data" : [ {
  6390. "lang" : "en",
  6391. "value" : "Rmote Code Execution (RCE) vulnerability in puppyCMS v5.1 due to insecure permissions, which could let a remote malicious user getshell via /admin/functions.php."
  6392. } ]
  6393. }
  6394. },
  6395. "configurations" : {
  6396. "CVE_data_version" : "4.0",
  6397. "nodes" : [ ]
  6398. },
  6399. "impact" : { },
  6400. "publishedDate" : "2021-05-06T18:15Z",
  6401. "lastModifiedDate" : "2021-05-06T18:18Z"
  6402. }, {
  6403. "cve" : {
  6404. "data_type" : "CVE",
  6405. "data_format" : "MITRE",
  6406. "data_version" : "4.0",
  6407. "CVE_data_meta" : {
  6408. "ID" : "CVE-2020-18888",
  6409. "ASSIGNER" : "cve@mitre.org"
  6410. },
  6411. "problemtype" : {
  6412. "problemtype_data" : [ {
  6413. "description" : [ ]
  6414. } ]
  6415. },
  6416. "references" : {
  6417. "reference_data" : [ {
  6418. "url" : "https://github.com/choregus/puppyCMS/issues/15",
  6419. "name" : "https://github.com/choregus/puppyCMS/issues/15",
  6420. "refsource" : "MISC",
  6421. "tags" : [ ]
  6422. } ]
  6423. },
  6424. "description" : {
  6425. "description_data" : [ {
  6426. "lang" : "en",
  6427. "value" : "Arbitrary File Deletion vulnerability in puppyCMS v5.1 allows remote malicious attackers to delete the file/folder via /admin/functions.php."
  6428. } ]
  6429. }
  6430. },
  6431. "configurations" : {
  6432. "CVE_data_version" : "4.0",
  6433. "nodes" : [ ]
  6434. },
  6435. "impact" : { },
  6436. "publishedDate" : "2021-05-06T18:15Z",
  6437. "lastModifiedDate" : "2021-05-06T18:18Z"
  6438. }, {
  6439. "cve" : {
  6440. "data_type" : "CVE",
  6441. "data_format" : "MITRE",
  6442. "data_version" : "4.0",
  6443. "CVE_data_meta" : {
  6444. "ID" : "CVE-2021-31918",
  6445. "ASSIGNER" : "secalert@redhat.com"
  6446. },
  6447. "problemtype" : {
  6448. "problemtype_data" : [ {
  6449. "description" : [ {
  6450. "lang" : "en",
  6451. "value" : "CWE-200"
  6452. } ]
  6453. } ]
  6454. },
  6455. "references" : {
  6456. "reference_data" : [ {
  6457. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1954250",
  6458. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1954250",
  6459. "refsource" : "MISC",
  6460. "tags" : [ ]
  6461. } ]
  6462. },
  6463. "description" : {
  6464. "description_data" : [ {
  6465. "lang" : "en",
  6466. "value" : "A flaw was found in tripleo-ansible version as shipped in Red Hat Openstack 16.1. The Ansible log file is readable to all users during stack update and creation. The highest threat from this vulnerability is to data confidentiality."
  6467. } ]
  6468. }
  6469. },
  6470. "configurations" : {
  6471. "CVE_data_version" : "4.0",
  6472. "nodes" : [ ]
  6473. },
  6474. "impact" : { },
  6475. "publishedDate" : "2021-05-06T17:15Z",
  6476. "lastModifiedDate" : "2021-05-06T18:18Z"
  6477. }, {
  6478. "cve" : {
  6479. "data_type" : "CVE",
  6480. "data_format" : "MITRE",
  6481. "data_version" : "4.0",
  6482. "CVE_data_meta" : {
  6483. "ID" : "CVE-2021-31916",
  6484. "ASSIGNER" : "secalert@redhat.com"
  6485. },
  6486. "problemtype" : {
  6487. "problemtype_data" : [ {
  6488. "description" : [ {
  6489. "lang" : "en",
  6490. "value" : "CWE-787"
  6491. } ]
  6492. } ]
  6493. },
  6494. "references" : {
  6495. "reference_data" : [ {
  6496. "url" : "https://seclists.org/oss-sec/2021/q1/268",
  6497. "name" : "https://seclists.org/oss-sec/2021/q1/268",
  6498. "refsource" : "MISC",
  6499. "tags" : [ ]
  6500. }, {
  6501. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1946965",
  6502. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1946965",
  6503. "refsource" : "MISC",
  6504. "tags" : [ ]
  6505. }, {
  6506. "url" : "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
  6507. "name" : "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
  6508. "refsource" : "MISC",
  6509. "tags" : [ ]
  6510. } ]
  6511. },
  6512. "description" : {
  6513. "description_data" : [ {
  6514. "lang" : "en",
  6515. "value" : "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability."
  6516. } ]
  6517. }
  6518. },
  6519. "configurations" : {
  6520. "CVE_data_version" : "4.0",
  6521. "nodes" : [ ]
  6522. },
  6523. "impact" : { },
  6524. "publishedDate" : "2021-05-06T17:15Z",
  6525. "lastModifiedDate" : "2021-05-06T18:18Z"
  6526. }, {
  6527. "cve" : {
  6528. "data_type" : "CVE",
  6529. "data_format" : "MITRE",
  6530. "data_version" : "4.0",
  6531. "CVE_data_meta" : {
  6532. "ID" : "CVE-2021-31793",
  6533. "ASSIGNER" : "cve@mitre.org"
  6534. },
  6535. "problemtype" : {
  6536. "problemtype_data" : [ {
  6537. "description" : [ ]
  6538. } ]
  6539. },
  6540. "references" : {
  6541. "reference_data" : [ {
  6542. "url" : "https://gist.github.com/tj-oconnor/16a4116050bbcb4717315f519b944f1f",
  6543. "name" : "https://gist.github.com/tj-oconnor/16a4116050bbcb4717315f519b944f1f",
  6544. "refsource" : "MISC",
  6545. "tags" : [ ]
  6546. }, {
  6547. "url" : "https://cloud.binary.ninja/embed/f4400a22-c438-403a-bf2a-939ca44a4f6b",
  6548. "name" : "https://cloud.binary.ninja/embed/f4400a22-c438-403a-bf2a-939ca44a4f6b",
  6549. "refsource" : "MISC",
  6550. "tags" : [ ]
  6551. } ]
  6552. },
  6553. "description" : {
  6554. "description_data" : [ {
  6555. "lang" : "en",
  6556. "value" : "An issue exists on NightOwl WDB-20-V2 WDB-20-V2_20190314 devices that allows an unauthenticated user to gain access to snapshots and video streams from the doorbell. The binary app offers a web server on port 80 that allows an unauthenticated user to take a snapshot from the doorbell camera via the /snapshot URI."
  6557. } ]
  6558. }
  6559. },
  6560. "configurations" : {
  6561. "CVE_data_version" : "4.0",
  6562. "nodes" : [ ]
  6563. },
  6564. "impact" : { },
  6565. "publishedDate" : "2021-05-06T17:15Z",
  6566. "lastModifiedDate" : "2021-05-06T18:18Z"
  6567. }, {
  6568. "cve" : {
  6569. "data_type" : "CVE",
  6570. "data_format" : "MITRE",
  6571. "data_version" : "4.0",
  6572. "CVE_data_meta" : {
  6573. "ID" : "CVE-2020-18889",
  6574. "ASSIGNER" : "cve@mitre.org"
  6575. },
  6576. "problemtype" : {
  6577. "problemtype_data" : [ {
  6578. "description" : [ ]
  6579. } ]
  6580. },
  6581. "references" : {
  6582. "reference_data" : [ {
  6583. "url" : "https://github.com/choregus/puppyCMS/issues/13",
  6584. "name" : "https://github.com/choregus/puppyCMS/issues/13",
  6585. "refsource" : "MISC",
  6586. "tags" : [ ]
  6587. } ]
  6588. },
  6589. "description" : {
  6590. "description_data" : [ {
  6591. "lang" : "en",
  6592. "value" : "Cross Site Request Forgery (CSRF) vulnerability in puppyCMS v5.1 that can change the admin's password via /admin/settings.php."
  6593. } ]
  6594. }
  6595. },
  6596. "configurations" : {
  6597. "CVE_data_version" : "4.0",
  6598. "nodes" : [ ]
  6599. },
  6600. "impact" : { },
  6601. "publishedDate" : "2021-05-06T17:15Z",
  6602. "lastModifiedDate" : "2021-05-06T18:18Z"
  6603. }, {
  6604. "cve" : {
  6605. "data_type" : "CVE",
  6606. "data_format" : "MITRE",
  6607. "data_version" : "4.0",
  6608. "CVE_data_meta" : {
  6609. "ID" : "CVE-2019-25043",
  6610. "ASSIGNER" : "cve@mitre.org"
  6611. },
  6612. "problemtype" : {
  6613. "problemtype_data" : [ {
  6614. "description" : [ ]
  6615. } ]
  6616. },
  6617. "references" : {
  6618. "reference_data" : [ {
  6619. "url" : "https://github.com/SpiderLabs/ModSecurity/issues/2566",
  6620. "name" : "https://github.com/SpiderLabs/ModSecurity/issues/2566",
  6621. "refsource" : "MISC",
  6622. "tags" : [ ]
  6623. } ]
  6624. },
  6625. "description" : {
  6626. "description_data" : [ {
  6627. "lang" : "en",
  6628. "value" : "ModSecurity 3.x before 3.0.4 mishandles key-value pair parsing, as demonstrated by a \"string index out of range\" error and worker-process crash for a \"Cookie: =abc\" header."
  6629. } ]
  6630. }
  6631. },
  6632. "configurations" : {
  6633. "CVE_data_version" : "4.0",
  6634. "nodes" : [ ]
  6635. },
  6636. "impact" : { },
  6637. "publishedDate" : "2021-05-06T17:15Z",
  6638. "lastModifiedDate" : "2021-05-06T18:18Z"
  6639. }, {
  6640. "cve" : {
  6641. "data_type" : "CVE",
  6642. "data_format" : "MITRE",
  6643. "data_version" : "4.0",
  6644. "CVE_data_meta" : {
  6645. "ID" : "CVE-2021-3507",
  6646. "ASSIGNER" : "secalert@redhat.com"
  6647. },
  6648. "problemtype" : {
  6649. "problemtype_data" : [ {
  6650. "description" : [ {
  6651. "lang" : "en",
  6652. "value" : "CWE-119"
  6653. } ]
  6654. } ]
  6655. },
  6656. "references" : {
  6657. "reference_data" : [ {
  6658. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1951118",
  6659. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1951118",
  6660. "refsource" : "MISC",
  6661. "tags" : [ ]
  6662. } ]
  6663. },
  6664. "description" : {
  6665. "description_data" : [ {
  6666. "lang" : "en",
  6667. "value" : "A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory."
  6668. } ]
  6669. }
  6670. },
  6671. "configurations" : {
  6672. "CVE_data_version" : "4.0",
  6673. "nodes" : [ ]
  6674. },
  6675. "impact" : { },
  6676. "publishedDate" : "2021-05-06T16:15Z",
  6677. "lastModifiedDate" : "2021-05-06T16:33Z"
  6678. }, {
  6679. "cve" : {
  6680. "data_type" : "CVE",
  6681. "data_format" : "MITRE",
  6682. "data_version" : "4.0",
  6683. "CVE_data_meta" : {
  6684. "ID" : "CVE-2021-32052",
  6685. "ASSIGNER" : "cve@mitre.org"
  6686. },
  6687. "problemtype" : {
  6688. "problemtype_data" : [ {
  6689. "description" : [ ]
  6690. } ]
  6691. },
  6692. "references" : {
  6693. "reference_data" : [ {
  6694. "url" : "https://docs.djangoproject.com/en/3.2/releases/security/",
  6695. "name" : "https://docs.djangoproject.com/en/3.2/releases/security/",
  6696. "refsource" : "MISC",
  6697. "tags" : [ ]
  6698. }, {
  6699. "url" : "http://www.openwall.com/lists/oss-security/2021/05/06/1",
  6700. "name" : "http://www.openwall.com/lists/oss-security/2021/05/06/1",
  6701. "refsource" : "MISC",
  6702. "tags" : [ ]
  6703. }, {
  6704. "url" : "https://groups.google.com/forum/#!forum/django-announce",
  6705. "name" : "https://groups.google.com/forum/#!forum/django-announce",
  6706. "refsource" : "MISC",
  6707. "tags" : [ ]
  6708. }, {
  6709. "url" : "https://www.djangoproject.com/weblog/2021/may/06/security-releases/",
  6710. "name" : "https://www.djangoproject.com/weblog/2021/may/06/security-releases/",
  6711. "refsource" : "MISC",
  6712. "tags" : [ ]
  6713. } ]
  6714. },
  6715. "description" : {
  6716. "description_data" : [ {
  6717. "lang" : "en",
  6718. "value" : "In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers."
  6719. } ]
  6720. }
  6721. },
  6722. "configurations" : {
  6723. "CVE_data_version" : "4.0",
  6724. "nodes" : [ ]
  6725. },
  6726. "impact" : { },
  6727. "publishedDate" : "2021-05-06T16:15Z",
  6728. "lastModifiedDate" : "2021-05-06T16:33Z"
  6729. }, {
  6730. "cve" : {
  6731. "data_type" : "CVE",
  6732. "data_format" : "MITRE",
  6733. "data_version" : "4.0",
  6734. "CVE_data_meta" : {
  6735. "ID" : "CVE-2021-31829",
  6736. "ASSIGNER" : "cve@mitre.org"
  6737. },
  6738. "problemtype" : {
  6739. "problemtype_data" : [ {
  6740. "description" : [ ]
  6741. } ]
  6742. },
  6743. "references" : {
  6744. "reference_data" : [ {
  6745. "url" : "http://www.openwall.com/lists/oss-security/2021/05/04/4",
  6746. "name" : "http://www.openwall.com/lists/oss-security/2021/05/04/4",
  6747. "refsource" : "MISC",
  6748. "tags" : [ ]
  6749. }, {
  6750. "url" : "https://github.com/torvalds/linux/commit/801c6058d14a82179a7ee17a4b532cac6fad067f",
  6751. "name" : "https://github.com/torvalds/linux/commit/801c6058d14a82179a7ee17a4b532cac6fad067f",
  6752. "refsource" : "MISC",
  6753. "tags" : [ ]
  6754. } ]
  6755. },
  6756. "description" : {
  6757. "description_data" : [ {
  6758. "lang" : "en",
  6759. "value" : "kernel/bpf/verifier.c in the Linux kernel through 5.12.1 performs undesirable speculative loads, leading to disclosure of stack content via side-channel attacks, aka CID-801c6058d14a. The specific concern is not protecting the BPF stack area against speculative loads. Also, the BPF stack can contain uninitialized data that might represent sensitive information previously operated on by the kernel."
  6760. } ]
  6761. }
  6762. },
  6763. "configurations" : {
  6764. "CVE_data_version" : "4.0",
  6765. "nodes" : [ ]
  6766. },
  6767. "impact" : { },
  6768. "publishedDate" : "2021-05-06T16:15Z",
  6769. "lastModifiedDate" : "2021-05-06T16:33Z"
  6770. }, {
  6771. "cve" : {
  6772. "data_type" : "CVE",
  6773. "data_format" : "MITRE",
  6774. "data_version" : "4.0",
  6775. "CVE_data_meta" : {
  6776. "ID" : "CVE-2021-28152",
  6777. "ASSIGNER" : "cve@mitre.org"
  6778. },
  6779. "problemtype" : {
  6780. "problemtype_data" : [ {
  6781. "description" : [ ]
  6782. } ]
  6783. },
  6784. "references" : {
  6785. "reference_data" : [ {
  6786. "url" : "http://en.hongdian.com/Products/Details/H8922",
  6787. "name" : "http://en.hongdian.com/Products/Details/H8922",
  6788. "refsource" : "MISC",
  6789. "tags" : [ ]
  6790. }, {
  6791. "url" : "https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/",
  6792. "name" : "https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/",
  6793. "refsource" : "MISC",
  6794. "tags" : [ ]
  6795. } ]
  6796. },
  6797. "description" : {
  6798. "description_data" : [ {
  6799. "lang" : "en",
  6800. "value" : "Hongdian H8922 3.0.5 devices have an undocumented feature that allows access to a shell as a superuser. To connect, the telnet service is used on port 5188 with the default credentials of root:superzxmn."
  6801. } ]
  6802. }
  6803. },
  6804. "configurations" : {
  6805. "CVE_data_version" : "4.0",
  6806. "nodes" : [ ]
  6807. },
  6808. "impact" : { },
  6809. "publishedDate" : "2021-05-06T16:15Z",
  6810. "lastModifiedDate" : "2021-05-06T16:33Z"
  6811. }, {
  6812. "cve" : {
  6813. "data_type" : "CVE",
  6814. "data_format" : "MITRE",
  6815. "data_version" : "4.0",
  6816. "CVE_data_meta" : {
  6817. "ID" : "CVE-2021-28151",
  6818. "ASSIGNER" : "cve@mitre.org"
  6819. },
  6820. "problemtype" : {
  6821. "problemtype_data" : [ {
  6822. "description" : [ ]
  6823. } ]
  6824. },
  6825. "references" : {
  6826. "reference_data" : [ {
  6827. "url" : "http://en.hongdian.com/Products/Details/H8922",
  6828. "name" : "http://en.hongdian.com/Products/Details/H8922",
  6829. "refsource" : "MISC",
  6830. "tags" : [ ]
  6831. }, {
  6832. "url" : "https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/",
  6833. "name" : "https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/",
  6834. "refsource" : "MISC",
  6835. "tags" : [ ]
  6836. } ]
  6837. },
  6838. "description" : {
  6839. "description_data" : [ {
  6840. "lang" : "en",
  6841. "value" : "Hongdian H8922 3.0.5 devices allow OS command injection via shell metacharacters into the ip-address (aka Destination) field to the tools.cgi ping command, which is accessible with the username guest and password guest."
  6842. } ]
  6843. }
  6844. },
  6845. "configurations" : {
  6846. "CVE_data_version" : "4.0",
  6847. "nodes" : [ ]
  6848. },
  6849. "impact" : { },
  6850. "publishedDate" : "2021-05-06T16:15Z",
  6851. "lastModifiedDate" : "2021-05-06T16:33Z"
  6852. }, {
  6853. "cve" : {
  6854. "data_type" : "CVE",
  6855. "data_format" : "MITRE",
  6856. "data_version" : "4.0",
  6857. "CVE_data_meta" : {
  6858. "ID" : "CVE-2021-28150",
  6859. "ASSIGNER" : "cve@mitre.org"
  6860. },
  6861. "problemtype" : {
  6862. "problemtype_data" : [ {
  6863. "description" : [ ]
  6864. } ]
  6865. },
  6866. "references" : {
  6867. "reference_data" : [ {
  6868. "url" : "http://en.hongdian.com/Products/Details/H8922",
  6869. "name" : "http://en.hongdian.com/Products/Details/H8922",
  6870. "refsource" : "MISC",
  6871. "tags" : [ ]
  6872. }, {
  6873. "url" : "https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/",
  6874. "name" : "https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/",
  6875. "refsource" : "MISC",
  6876. "tags" : [ ]
  6877. } ]
  6878. },
  6879. "description" : {
  6880. "description_data" : [ {
  6881. "lang" : "en",
  6882. "value" : "Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi."
  6883. } ]
  6884. }
  6885. },
  6886. "configurations" : {
  6887. "CVE_data_version" : "4.0",
  6888. "nodes" : [ ]
  6889. },
  6890. "impact" : { },
  6891. "publishedDate" : "2021-05-06T16:15Z",
  6892. "lastModifiedDate" : "2021-05-06T16:33Z"
  6893. }, {
  6894. "cve" : {
  6895. "data_type" : "CVE",
  6896. "data_format" : "MITRE",
  6897. "data_version" : "4.0",
  6898. "CVE_data_meta" : {
  6899. "ID" : "CVE-2021-28149",
  6900. "ASSIGNER" : "cve@mitre.org"
  6901. },
  6902. "problemtype" : {
  6903. "problemtype_data" : [ {
  6904. "description" : [ ]
  6905. } ]
  6906. },
  6907. "references" : {
  6908. "reference_data" : [ {
  6909. "url" : "http://en.hongdian.com/Products/Details/H8922",
  6910. "name" : "http://en.hongdian.com/Products/Details/H8922",
  6911. "refsource" : "MISC",
  6912. "tags" : [ ]
  6913. }, {
  6914. "url" : "https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/",
  6915. "name" : "https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/",
  6916. "refsource" : "MISC",
  6917. "tags" : [ ]
  6918. } ]
  6919. },
  6920. "description" : {
  6921. "description_data" : [ {
  6922. "lang" : "en",
  6923. "value" : "Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file."
  6924. } ]
  6925. }
  6926. },
  6927. "configurations" : {
  6928. "CVE_data_version" : "4.0",
  6929. "nodes" : [ ]
  6930. },
  6931. "impact" : { },
  6932. "publishedDate" : "2021-05-06T16:15Z",
  6933. "lastModifiedDate" : "2021-05-06T16:33Z"
  6934. }, {
  6935. "cve" : {
  6936. "data_type" : "CVE",
  6937. "data_format" : "MITRE",
  6938. "data_version" : "4.0",
  6939. "CVE_data_meta" : {
  6940. "ID" : "CVE-2021-32030",
  6941. "ASSIGNER" : "cve@mitre.org"
  6942. },
  6943. "problemtype" : {
  6944. "problemtype_data" : [ {
  6945. "description" : [ ]
  6946. } ]
  6947. },
  6948. "references" : {
  6949. "reference_data" : [ {
  6950. "url" : "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0010.md",
  6951. "name" : "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0010.md",
  6952. "refsource" : "MISC",
  6953. "tags" : [ ]
  6954. }, {
  6955. "url" : "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-Gaming-Routers/RT-AC2900/HelpDesk_BIOS/",
  6956. "name" : "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-Gaming-Routers/RT-AC2900/HelpDesk_BIOS/",
  6957. "refsource" : "MISC",
  6958. "tags" : [ ]
  6959. } ]
  6960. },
  6961. "description" : {
  6962. "description_data" : [ {
  6963. "lang" : "en",
  6964. "value" : "The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\\0' matches the device's default value of '\\0' in some situations."
  6965. } ]
  6966. }
  6967. },
  6968. "configurations" : {
  6969. "CVE_data_version" : "4.0",
  6970. "nodes" : [ ]
  6971. },
  6972. "impact" : { },
  6973. "publishedDate" : "2021-05-06T15:15Z",
  6974. "lastModifiedDate" : "2021-05-06T16:33Z"
  6975. }, {
  6976. "cve" : {
  6977. "data_type" : "CVE",
  6978. "data_format" : "MITRE",
  6979. "data_version" : "4.0",
  6980. "CVE_data_meta" : {
  6981. "ID" : "CVE-2021-30473",
  6982. "ASSIGNER" : "cve@mitre.org"
  6983. },
  6984. "problemtype" : {
  6985. "problemtype_data" : [ {
  6986. "description" : [ ]
  6987. } ]
  6988. },
  6989. "references" : {
  6990. "reference_data" : [ {
  6991. "url" : "https://aomedia.googlesource.com/aom/+/4efe20e99dcd9b6f8eadc8de8acc825be7416578",
  6992. "name" : "https://aomedia.googlesource.com/aom/+/4efe20e99dcd9b6f8eadc8de8acc825be7416578",
  6993. "refsource" : "MISC",
  6994. "tags" : [ ]
  6995. }, {
  6996. "url" : "https://bugs.chromium.org/p/aomedia/issues/detail?id=2998",
  6997. "name" : "https://bugs.chromium.org/p/aomedia/issues/detail?id=2998",
  6998. "refsource" : "MISC",
  6999. "tags" : [ ]
  7000. } ]
  7001. },
  7002. "description" : {
  7003. "description_data" : [ {
  7004. "lang" : "en",
  7005. "value" : "aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that is not located on the heap."
  7006. } ]
  7007. }
  7008. },
  7009. "configurations" : {
  7010. "CVE_data_version" : "4.0",
  7011. "nodes" : [ ]
  7012. },
  7013. "impact" : { },
  7014. "publishedDate" : "2021-05-06T15:15Z",
  7015. "lastModifiedDate" : "2021-05-06T16:33Z"
  7016. }, {
  7017. "cve" : {
  7018. "data_type" : "CVE",
  7019. "data_format" : "MITRE",
  7020. "data_version" : "4.0",
  7021. "CVE_data_meta" : {
  7022. "ID" : "CVE-2021-20204",
  7023. "ASSIGNER" : "secalert@redhat.com"
  7024. },
  7025. "problemtype" : {
  7026. "problemtype_data" : [ {
  7027. "description" : [ {
  7028. "lang" : "en",
  7029. "value" : "CWE-119"
  7030. } ]
  7031. } ]
  7032. },
  7033. "references" : {
  7034. "reference_data" : [ {
  7035. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1956348",
  7036. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1956348",
  7037. "refsource" : "MISC",
  7038. "tags" : [ ]
  7039. } ]
  7040. },
  7041. "description" : {
  7042. "description_data" : [ {
  7043. "lang" : "en",
  7044. "value" : "A heap memory corruption problem (use after free) can be triggered in libgetdata v0.10.0 when processing maliciously crafted dirfile databases. This degrades the confidentiality, integrity and availability of third-party software that uses libgetdata as a library. This vulnerability may lead to arbitrary code execution or privilege escalation depending on input/skills of attacker."
  7045. } ]
  7046. }
  7047. },
  7048. "configurations" : {
  7049. "CVE_data_version" : "4.0",
  7050. "nodes" : [ ]
  7051. },
  7052. "impact" : { },
  7053. "publishedDate" : "2021-05-06T15:15Z",
  7054. "lastModifiedDate" : "2021-05-06T16:33Z"
  7055. }, {
  7056. "cve" : {
  7057. "data_type" : "CVE",
  7058. "data_format" : "MITRE",
  7059. "data_version" : "4.0",
  7060. "CVE_data_meta" : {
  7061. "ID" : "CVE-2020-35519",
  7062. "ASSIGNER" : "secalert@redhat.com"
  7063. },
  7064. "problemtype" : {
  7065. "problemtype_data" : [ {
  7066. "description" : [ {
  7067. "lang" : "en",
  7068. "value" : "CWE-125"
  7069. } ]
  7070. } ]
  7071. },
  7072. "references" : {
  7073. "reference_data" : [ {
  7074. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1908251",
  7075. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1908251",
  7076. "refsource" : "MISC",
  7077. "tags" : [ ]
  7078. } ]
  7079. },
  7080. "description" : {
  7081. "description_data" : [ {
  7082. "lang" : "en",
  7083. "value" : "An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability."
  7084. } ]
  7085. }
  7086. },
  7087. "configurations" : {
  7088. "CVE_data_version" : "4.0",
  7089. "nodes" : [ ]
  7090. },
  7091. "impact" : { },
  7092. "publishedDate" : "2021-05-06T15:15Z",
  7093. "lastModifiedDate" : "2021-05-06T16:33Z"
  7094. }, {
  7095. "cve" : {
  7096. "data_type" : "CVE",
  7097. "data_format" : "MITRE",
  7098. "data_version" : "4.0",
  7099. "CVE_data_meta" : {
  7100. "ID" : "CVE-2021-28128",
  7101. "ASSIGNER" : "cve@mitre.org"
  7102. },
  7103. "problemtype" : {
  7104. "problemtype_data" : [ {
  7105. "description" : [ ]
  7106. } ]
  7107. },
  7108. "references" : {
  7109. "reference_data" : [ {
  7110. "url" : "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt",
  7111. "name" : "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt",
  7112. "refsource" : "MISC",
  7113. "tags" : [ ]
  7114. }, {
  7115. "url" : "https://github.com/strapi/strapi/releases",
  7116. "name" : "https://github.com/strapi/strapi/releases",
  7117. "refsource" : "MISC",
  7118. "tags" : [ ]
  7119. }, {
  7120. "url" : "https://strapi.io/changelog",
  7121. "name" : "https://strapi.io/changelog",
  7122. "refsource" : "MISC",
  7123. "tags" : [ ]
  7124. } ]
  7125. },
  7126. "description" : {
  7127. "description_data" : [ {
  7128. "lang" : "en",
  7129. "value" : "In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password."
  7130. } ]
  7131. }
  7132. },
  7133. "configurations" : {
  7134. "CVE_data_version" : "4.0",
  7135. "nodes" : [ ]
  7136. },
  7137. "impact" : { },
  7138. "publishedDate" : "2021-05-06T14:15Z",
  7139. "lastModifiedDate" : "2021-05-06T16:33Z"
  7140. }, {
  7141. "cve" : {
  7142. "data_type" : "CVE",
  7143. "data_format" : "MITRE",
  7144. "data_version" : "4.0",
  7145. "CVE_data_meta" : {
  7146. "ID" : "CVE-2021-22210",
  7147. "ASSIGNER" : "cve@gitlab.com"
  7148. },
  7149. "problemtype" : {
  7150. "problemtype_data" : [ {
  7151. "description" : [ ]
  7152. } ]
  7153. },
  7154. "references" : {
  7155. "reference_data" : [ {
  7156. "url" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22210.json",
  7157. "name" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22210.json",
  7158. "refsource" : "CONFIRM",
  7159. "tags" : [ ]
  7160. }, {
  7161. "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/322500",
  7162. "name" : "https://gitlab.com/gitlab-org/gitlab/-/issues/322500",
  7163. "refsource" : "MISC",
  7164. "tags" : [ ]
  7165. } ]
  7166. },
  7167. "description" : {
  7168. "description_data" : [ {
  7169. "lang" : "en",
  7170. "value" : "An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2. When querying the repository branches through API, GitLab was ignoring a query parameter and returning a considerable amount of results."
  7171. } ]
  7172. }
  7173. },
  7174. "configurations" : {
  7175. "CVE_data_version" : "4.0",
  7176. "nodes" : [ ]
  7177. },
  7178. "impact" : { },
  7179. "publishedDate" : "2021-05-06T14:15Z",
  7180. "lastModifiedDate" : "2021-05-06T16:33Z"
  7181. }, {
  7182. "cve" : {
  7183. "data_type" : "CVE",
  7184. "data_format" : "MITRE",
  7185. "data_version" : "4.0",
  7186. "CVE_data_meta" : {
  7187. "ID" : "CVE-2021-22209",
  7188. "ASSIGNER" : "cve@gitlab.com"
  7189. },
  7190. "problemtype" : {
  7191. "problemtype_data" : [ {
  7192. "description" : [ ]
  7193. } ]
  7194. },
  7195. "references" : {
  7196. "reference_data" : [ {
  7197. "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/327155",
  7198. "name" : "https://gitlab.com/gitlab-org/gitlab/-/issues/327155",
  7199. "refsource" : "MISC",
  7200. "tags" : [ ]
  7201. }, {
  7202. "url" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22209.json",
  7203. "name" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22209.json",
  7204. "refsource" : "CONFIRM",
  7205. "tags" : [ ]
  7206. } ]
  7207. },
  7208. "description" : {
  7209. "description_data" : [ {
  7210. "lang" : "en",
  7211. "value" : "An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.8. GitLab was not properly validating authorisation tokens which resulted in GraphQL mutation being executed."
  7212. } ]
  7213. }
  7214. },
  7215. "configurations" : {
  7216. "CVE_data_version" : "4.0",
  7217. "nodes" : [ ]
  7218. },
  7219. "impact" : { },
  7220. "publishedDate" : "2021-05-06T14:15Z",
  7221. "lastModifiedDate" : "2021-05-06T16:33Z"
  7222. }, {
  7223. "cve" : {
  7224. "data_type" : "CVE",
  7225. "data_format" : "MITRE",
  7226. "data_version" : "4.0",
  7227. "CVE_data_meta" : {
  7228. "ID" : "CVE-2021-22208",
  7229. "ASSIGNER" : "cve@gitlab.com"
  7230. },
  7231. "problemtype" : {
  7232. "problemtype_data" : [ {
  7233. "description" : [ ]
  7234. } ]
  7235. },
  7236. "references" : {
  7237. "reference_data" : [ {
  7238. "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/301212",
  7239. "name" : "https://gitlab.com/gitlab-org/gitlab/-/issues/301212",
  7240. "refsource" : "MISC",
  7241. "tags" : [ ]
  7242. }, {
  7243. "url" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22208.json",
  7244. "name" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22208.json",
  7245. "refsource" : "CONFIRM",
  7246. "tags" : [ ]
  7247. } ]
  7248. },
  7249. "description" : {
  7250. "description_data" : [ {
  7251. "lang" : "en",
  7252. "value" : "An issue has been discovered in GitLab affecting versions starting with 13.5 up to 13.9.7. Improper permission check could allow the change of timestamp for issue creation or update."
  7253. } ]
  7254. }
  7255. },
  7256. "configurations" : {
  7257. "CVE_data_version" : "4.0",
  7258. "nodes" : [ ]
  7259. },
  7260. "impact" : { },
  7261. "publishedDate" : "2021-05-06T14:15Z",
  7262. "lastModifiedDate" : "2021-05-06T16:33Z"
  7263. }, {
  7264. "cve" : {
  7265. "data_type" : "CVE",
  7266. "data_format" : "MITRE",
  7267. "data_version" : "4.0",
  7268. "CVE_data_meta" : {
  7269. "ID" : "CVE-2021-22206",
  7270. "ASSIGNER" : "cve@gitlab.com"
  7271. },
  7272. "problemtype" : {
  7273. "problemtype_data" : [ {
  7274. "description" : [ ]
  7275. } ]
  7276. },
  7277. "references" : {
  7278. "reference_data" : [ {
  7279. "url" : "https://hackerone.com/reports/928074",
  7280. "name" : "https://hackerone.com/reports/928074",
  7281. "refsource" : "MISC",
  7282. "tags" : [ ]
  7283. }, {
  7284. "url" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22206.json",
  7285. "name" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22206.json",
  7286. "refsource" : "CONFIRM",
  7287. "tags" : [ ]
  7288. }, {
  7289. "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/230864",
  7290. "name" : "https://gitlab.com/gitlab-org/gitlab/-/issues/230864",
  7291. "refsource" : "MISC",
  7292. "tags" : [ ]
  7293. } ]
  7294. },
  7295. "description" : {
  7296. "description_data" : [ {
  7297. "lang" : "en",
  7298. "value" : "An issue has been discovered in GitLab affecting all versions starting from 11.6. Pull mirror credentials are exposed that allows other maintainers to be able to view the credentials in plain-text,"
  7299. } ]
  7300. }
  7301. },
  7302. "configurations" : {
  7303. "CVE_data_version" : "4.0",
  7304. "nodes" : [ ]
  7305. },
  7306. "impact" : { },
  7307. "publishedDate" : "2021-05-06T14:15Z",
  7308. "lastModifiedDate" : "2021-05-06T16:33Z"
  7309. }, {
  7310. "cve" : {
  7311. "data_type" : "CVE",
  7312. "data_format" : "MITRE",
  7313. "data_version" : "4.0",
  7314. "CVE_data_meta" : {
  7315. "ID" : "CVE-2021-3501",
  7316. "ASSIGNER" : "secalert@redhat.com"
  7317. },
  7318. "problemtype" : {
  7319. "problemtype_data" : [ {
  7320. "description" : [ {
  7321. "lang" : "en",
  7322. "value" : "CWE-787"
  7323. } ]
  7324. } ]
  7325. },
  7326. "references" : {
  7327. "reference_data" : [ {
  7328. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1950136",
  7329. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1950136",
  7330. "refsource" : "MISC",
  7331. "tags" : [ ]
  7332. }, {
  7333. "url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a",
  7334. "name" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a",
  7335. "refsource" : "MISC",
  7336. "tags" : [ ]
  7337. } ]
  7338. },
  7339. "description" : {
  7340. "description_data" : [ {
  7341. "lang" : "en",
  7342. "value" : "A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM API, is mapped to an array index, which can be updated by a user process at anytime which could lead to an out-of-bounds write. The highest threat from this vulnerability is to data integrity and system availability."
  7343. } ]
  7344. }
  7345. },
  7346. "configurations" : {
  7347. "CVE_data_version" : "4.0",
  7348. "nodes" : [ ]
  7349. },
  7350. "impact" : { },
  7351. "publishedDate" : "2021-05-06T13:15Z",
  7352. "lastModifiedDate" : "2021-05-06T13:16Z"
  7353. }, {
  7354. "cve" : {
  7355. "data_type" : "CVE",
  7356. "data_format" : "MITRE",
  7357. "data_version" : "4.0",
  7358. "CVE_data_meta" : {
  7359. "ID" : "CVE-2021-32062",
  7360. "ASSIGNER" : "cve@mitre.org"
  7361. },
  7362. "problemtype" : {
  7363. "problemtype_data" : [ {
  7364. "description" : [ ]
  7365. } ]
  7366. },
  7367. "references" : {
  7368. "reference_data" : [ {
  7369. "url" : "https://mapserver.org/development/changelog/changelog-7-6.html",
  7370. "name" : "https://mapserver.org/development/changelog/changelog-7-6.html",
  7371. "refsource" : "MISC",
  7372. "tags" : [ ]
  7373. }, {
  7374. "url" : "https://mapserver.org/development/changelog/changelog-7-0.html",
  7375. "name" : "https://mapserver.org/development/changelog/changelog-7-0.html",
  7376. "refsource" : "MISC",
  7377. "tags" : [ ]
  7378. }, {
  7379. "url" : "https://mapserver.org/development/changelog/changelog-7-4.html",
  7380. "name" : "https://mapserver.org/development/changelog/changelog-7-4.html",
  7381. "refsource" : "MISC",
  7382. "tags" : [ ]
  7383. }, {
  7384. "url" : "https://mapserver.org/development/changelog/changelog-7-2.html",
  7385. "name" : "https://mapserver.org/development/changelog/changelog-7-2.html",
  7386. "refsource" : "MISC",
  7387. "tags" : [ ]
  7388. } ]
  7389. },
  7390. "description" : {
  7391. "description_data" : [ {
  7392. "lang" : "en",
  7393. "value" : "MapServer before 7.0.8, 7.1.x and 7.2.x before 7.2.3, 7.3.x and 7.4.x before 7.4.5, and 7.5.x and 7.6.x before 7.6.3 does not properly enforce the MS_MAP_NO_PATH and MS_MAP_PATTERN restrictions that are intended to control the locations from which a mapfile may be loaded (with MapServer CGI)."
  7394. } ]
  7395. }
  7396. },
  7397. "configurations" : {
  7398. "CVE_data_version" : "4.0",
  7399. "nodes" : [ ]
  7400. },
  7401. "impact" : { },
  7402. "publishedDate" : "2021-05-06T13:15Z",
  7403. "lastModifiedDate" : "2021-05-06T13:16Z"
  7404. }, {
  7405. "cve" : {
  7406. "data_type" : "CVE",
  7407. "data_format" : "MITRE",
  7408. "data_version" : "4.0",
  7409. "CVE_data_meta" : {
  7410. "ID" : "CVE-2021-31616",
  7411. "ASSIGNER" : "cve@mitre.org"
  7412. },
  7413. "problemtype" : {
  7414. "problemtype_data" : [ {
  7415. "description" : [ ]
  7416. } ]
  7417. },
  7418. "references" : {
  7419. "reference_data" : [ {
  7420. "url" : "https://github.com/keepkey/keepkey-firmware/commit/e49d45594002d4d3fbc1f03488e6dfc0a0a65836",
  7421. "name" : "https://github.com/keepkey/keepkey-firmware/commit/e49d45594002d4d3fbc1f03488e6dfc0a0a65836",
  7422. "refsource" : "MISC",
  7423. "tags" : [ ]
  7424. }, {
  7425. "url" : "https://github.com/keepkey/keepkey-firmware/releases/tag/v7.1.0",
  7426. "name" : "https://github.com/keepkey/keepkey-firmware/releases/tag/v7.1.0",
  7427. "refsource" : "MISC",
  7428. "tags" : [ ]
  7429. }, {
  7430. "url" : "https://blog.inhq.net/posts/keepkey-CVE-2021-31616/",
  7431. "name" : "https://blog.inhq.net/posts/keepkey-CVE-2021-31616/",
  7432. "refsource" : "MISC",
  7433. "tags" : [ ]
  7434. }, {
  7435. "url" : "https://shapeshift.com/library/keepkey-important-update-issued-april-4-required",
  7436. "name" : "https://shapeshift.com/library/keepkey-important-update-issued-april-4-required",
  7437. "refsource" : "MISC",
  7438. "tags" : [ ]
  7439. } ]
  7440. },
  7441. "description" : {
  7442. "description_data" : [ {
  7443. "lang" : "en",
  7444. "value" : "Insufficient length checks in the ShapeShift KeepKey hardware wallet firmware before 7.1.0 allow a stack buffer overflow via crafted messages. The overflow in ethereum_extractThorchainSwapData() in ethereum.c can circumvent stack protections and lead to code execution. The vulnerable interface is reachable remotely over WebUSB."
  7445. } ]
  7446. }
  7447. },
  7448. "configurations" : {
  7449. "CVE_data_version" : "4.0",
  7450. "nodes" : [ ]
  7451. },
  7452. "impact" : { },
  7453. "publishedDate" : "2021-05-06T13:15Z",
  7454. "lastModifiedDate" : "2021-05-06T20:15Z"
  7455. }, {
  7456. "cve" : {
  7457. "data_type" : "CVE",
  7458. "data_format" : "MITRE",
  7459. "data_version" : "4.0",
  7460. "CVE_data_meta" : {
  7461. "ID" : "CVE-2021-31532",
  7462. "ASSIGNER" : "cve@mitre.org"
  7463. },
  7464. "problemtype" : {
  7465. "problemtype_data" : [ {
  7466. "description" : [ ]
  7467. } ]
  7468. },
  7469. "references" : {
  7470. "reference_data" : [ {
  7471. "url" : "https://oxide.computer/blog/lpc55/",
  7472. "name" : "https://oxide.computer/blog/lpc55/",
  7473. "refsource" : "MISC",
  7474. "tags" : [ ]
  7475. }, {
  7476. "url" : "https://www.nxp.com",
  7477. "name" : "https://www.nxp.com",
  7478. "refsource" : "MISC",
  7479. "tags" : [ ]
  7480. } ]
  7481. },
  7482. "description" : {
  7483. "description_data" : [ {
  7484. "lang" : "en",
  7485. "value" : "NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), and LPC55S1x, LPC551x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM. The peripheral is accessible from any execution mode (secure/privileged, secure/unprivileged, non-secure/privileged, non-secure/unprivileged). The ROM includes a set of APIs intended for use by a secure application to perform flash and in-application programming (IAP) operations. An attacker may use the ROM patch peripheral to modify the implementation of these ROM APIs from a non-secure, unprivileged context. If a non-secure application can also cause the secure application to invoke these ROM APIs, this provides privilege escalation and arbitrary code execution."
  7486. } ]
  7487. }
  7488. },
  7489. "configurations" : {
  7490. "CVE_data_version" : "4.0",
  7491. "nodes" : [ ]
  7492. },
  7493. "impact" : { },
  7494. "publishedDate" : "2021-05-06T13:15Z",
  7495. "lastModifiedDate" : "2021-05-06T13:16Z"
  7496. }, {
  7497. "cve" : {
  7498. "data_type" : "CVE",
  7499. "data_format" : "MITRE",
  7500. "data_version" : "4.0",
  7501. "CVE_data_meta" : {
  7502. "ID" : "CVE-2021-31409",
  7503. "ASSIGNER" : "security@vaadin.com"
  7504. },
  7505. "problemtype" : {
  7506. "problemtype_data" : [ {
  7507. "description" : [ ]
  7508. } ]
  7509. },
  7510. "references" : {
  7511. "reference_data" : [ {
  7512. "url" : "https://github.com/vaadin/framework/pull/12241",
  7513. "name" : "https://github.com/vaadin/framework/pull/12241",
  7514. "refsource" : "CONFIRM",
  7515. "tags" : [ ]
  7516. }, {
  7517. "url" : "https://github.com/vaadin/framework/issues/12240",
  7518. "name" : "https://github.com/vaadin/framework/issues/12240",
  7519. "refsource" : "CONFIRM",
  7520. "tags" : [ ]
  7521. }, {
  7522. "url" : "https://vaadin.com/security/cve-2021-31409",
  7523. "name" : "https://vaadin.com/security/cve-2021-31409",
  7524. "refsource" : "CONFIRM",
  7525. "tags" : [ ]
  7526. } ]
  7527. },
  7528. "description" : {
  7529. "description_data" : [ {
  7530. "lang" : "en",
  7531. "value" : "Unsafe validation RegEx in EmailValidator component in com.vaadin:vaadin-compatibility-server versions 8.0.0 through 8.12.4 (Vaadin versions 8.0.0 through 8.12.4) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses."
  7532. } ]
  7533. }
  7534. },
  7535. "configurations" : {
  7536. "CVE_data_version" : "4.0",
  7537. "nodes" : [ ]
  7538. },
  7539. "impact" : { },
  7540. "publishedDate" : "2021-05-06T13:15Z",
  7541. "lastModifiedDate" : "2021-05-06T13:16Z"
  7542. }, {
  7543. "cve" : {
  7544. "data_type" : "CVE",
  7545. "data_format" : "MITRE",
  7546. "data_version" : "4.0",
  7547. "CVE_data_meta" : {
  7548. "ID" : "CVE-2021-31245",
  7549. "ASSIGNER" : "cve@mitre.org"
  7550. },
  7551. "problemtype" : {
  7552. "problemtype_data" : [ {
  7553. "description" : [ ]
  7554. } ]
  7555. },
  7556. "references" : {
  7557. "reference_data" : [ {
  7558. "url" : "https://github.com/Ysurac/openmptcprouter-vps-admin",
  7559. "name" : "https://github.com/Ysurac/openmptcprouter-vps-admin",
  7560. "refsource" : "MISC",
  7561. "tags" : [ ]
  7562. }, {
  7563. "url" : "https://www.openmptcprouter.com/",
  7564. "name" : "https://www.openmptcprouter.com/",
  7565. "refsource" : "MISC",
  7566. "tags" : [ ]
  7567. }, {
  7568. "url" : "https://github.com/Ysurac/openmptcprouter-vps-admin/commit/a01cbc8c3d3b8bb7720bf3ff234671b4c0e1859c#diff-b89ee68e63302a732d4bde35eb04a205b06f1611147e139642356f173195ab80",
  7569. "name" : "https://github.com/Ysurac/openmptcprouter-vps-admin/commit/a01cbc8c3d3b8bb7720bf3ff234671b4c0e1859c#diff-b89ee68e63302a732d4bde35eb04a205b06f1611147e139642356f173195ab80",
  7570. "refsource" : "MISC",
  7571. "tags" : [ ]
  7572. }, {
  7573. "url" : "https://medium.com/d3crypt/timing-attack-on-openmptcprouter-vps-admin-authentication-cve-2021-31245-12dd92303e1",
  7574. "name" : "https://medium.com/d3crypt/timing-attack-on-openmptcprouter-vps-admin-authentication-cve-2021-31245-12dd92303e1",
  7575. "refsource" : "MISC",
  7576. "tags" : [ ]
  7577. } ]
  7578. },
  7579. "description" : {
  7580. "description_data" : [ {
  7581. "lang" : "en",
  7582. "value" : "omr-admin.py in openmptcprouter-vps-admin 0.57.3 and earlier compares the user provided password with the original password in a length dependent manner, which allows remote attackers to guess the password via a timing attack."
  7583. } ]
  7584. }
  7585. },
  7586. "configurations" : {
  7587. "CVE_data_version" : "4.0",
  7588. "nodes" : [ ]
  7589. },
  7590. "impact" : { },
  7591. "publishedDate" : "2021-05-06T13:15Z",
  7592. "lastModifiedDate" : "2021-05-06T13:16Z"
  7593. }, {
  7594. "cve" : {
  7595. "data_type" : "CVE",
  7596. "data_format" : "MITRE",
  7597. "data_version" : "4.0",
  7598. "CVE_data_meta" : {
  7599. "ID" : "CVE-2021-29921",
  7600. "ASSIGNER" : "cve@mitre.org"
  7601. },
  7602. "problemtype" : {
  7603. "problemtype_data" : [ {
  7604. "description" : [ ]
  7605. } ]
  7606. },
  7607. "references" : {
  7608. "reference_data" : [ {
  7609. "url" : "https://github.com/python/cpython/pull/25099",
  7610. "name" : "https://github.com/python/cpython/pull/25099",
  7611. "refsource" : "MISC",
  7612. "tags" : [ ]
  7613. }, {
  7614. "url" : "https://sick.codes/sick-2021-014",
  7615. "name" : "https://sick.codes/sick-2021-014",
  7616. "refsource" : "MISC",
  7617. "tags" : [ ]
  7618. }, {
  7619. "url" : "https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html",
  7620. "name" : "https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html",
  7621. "refsource" : "MISC",
  7622. "tags" : [ ]
  7623. }, {
  7624. "url" : "https://github.com/sickcodes",
  7625. "name" : "https://github.com/sickcodes",
  7626. "refsource" : "MISC",
  7627. "tags" : [ ]
  7628. }, {
  7629. "url" : "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md",
  7630. "name" : "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md",
  7631. "refsource" : "MISC",
  7632. "tags" : [ ]
  7633. }, {
  7634. "url" : "https://github.com/python/cpython/pull/12577",
  7635. "name" : "https://github.com/python/cpython/pull/12577",
  7636. "refsource" : "MISC",
  7637. "tags" : [ ]
  7638. }, {
  7639. "url" : "https://docs.python.org/3/library/ipaddress.html",
  7640. "name" : "https://docs.python.org/3/library/ipaddress.html",
  7641. "refsource" : "MISC",
  7642. "tags" : [ ]
  7643. }, {
  7644. "url" : "https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst",
  7645. "name" : "https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst",
  7646. "refsource" : "MISC",
  7647. "tags" : [ ]
  7648. }, {
  7649. "url" : "https://bugs.python.org/issue36384",
  7650. "name" : "https://bugs.python.org/issue36384",
  7651. "refsource" : "MISC",
  7652. "tags" : [ ]
  7653. } ]
  7654. },
  7655. "description" : {
  7656. "description_data" : [ {
  7657. "lang" : "en",
  7658. "value" : "Improper input validation of octal strings in Python stdlib ipaddress 3.10 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on Python stdlib ipaddress. IP address octects are left stripped instead of evaluated as valid IP addresses."
  7659. } ]
  7660. }
  7661. },
  7662. "configurations" : {
  7663. "CVE_data_version" : "4.0",
  7664. "nodes" : [ ]
  7665. },
  7666. "impact" : { },
  7667. "publishedDate" : "2021-05-06T13:15Z",
  7668. "lastModifiedDate" : "2021-05-06T13:16Z"
  7669. }, {
  7670. "cve" : {
  7671. "data_type" : "CVE",
  7672. "data_format" : "MITRE",
  7673. "data_version" : "4.0",
  7674. "CVE_data_meta" : {
  7675. "ID" : "CVE-2021-29491",
  7676. "ASSIGNER" : "security-advisories@github.com"
  7677. },
  7678. "problemtype" : {
  7679. "problemtype_data" : [ {
  7680. "description" : [ {
  7681. "lang" : "en",
  7682. "value" : "CWE-913"
  7683. } ]
  7684. } ]
  7685. },
  7686. "references" : {
  7687. "reference_data" : [ {
  7688. "url" : "https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4",
  7689. "name" : "https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4",
  7690. "refsource" : "CONFIRM",
  7691. "tags" : [ ]
  7692. } ]
  7693. },
  7694. "description" : {
  7695. "description_data" : [ {
  7696. "lang" : "en",
  7697. "value" : "Mixme is a library for recursive merging of Javascript objects. In Node.js mixme v0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS). The problem is corrected starting with version 0.5.1; no workarounds are known to exist."
  7698. } ]
  7699. }
  7700. },
  7701. "configurations" : {
  7702. "CVE_data_version" : "4.0",
  7703. "nodes" : [ ]
  7704. },
  7705. "impact" : { },
  7706. "publishedDate" : "2021-05-06T13:15Z",
  7707. "lastModifiedDate" : "2021-05-06T13:16Z"
  7708. }, {
  7709. "cve" : {
  7710. "data_type" : "CVE",
  7711. "data_format" : "MITRE",
  7712. "data_version" : "4.0",
  7713. "CVE_data_meta" : {
  7714. "ID" : "CVE-2021-29490",
  7715. "ASSIGNER" : "security-advisories@github.com"
  7716. },
  7717. "problemtype" : {
  7718. "problemtype_data" : [ {
  7719. "description" : [ {
  7720. "lang" : "en",
  7721. "value" : "CWE-918"
  7722. } ]
  7723. } ]
  7724. },
  7725. "references" : {
  7726. "reference_data" : [ {
  7727. "url" : "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-rgjw-4fwc-9v96",
  7728. "name" : "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-rgjw-4fwc-9v96",
  7729. "refsource" : "CONFIRM",
  7730. "tags" : [ ]
  7731. } ]
  7732. },
  7733. "description" : {
  7734. "description_data" : [ {
  7735. "lang" : "en",
  7736. "value" : "Jellyfin is a free software media system that provides media from a dedicated server to end-user devices via multiple apps. Verions prior to 10.7.3 vulnerable to unauthenticated Server-Side Request Forgery (SSRF) attacks via the imageUrl parameter. This issue potentially exposes both internal and external HTTP servers or other resources available via HTTP `GET` that are visible from the Jellyfin server. The vulnerability is patched in version 10.7.3. As a workaround, disable external access to the API endpoints `/Items/*/RemoteImages/Download`, `/Items/RemoteSearch/Image` and `/Images/Remote` via reverse proxy, or limit to known-friendly IPs."
  7737. } ]
  7738. }
  7739. },
  7740. "configurations" : {
  7741. "CVE_data_version" : "4.0",
  7742. "nodes" : [ ]
  7743. },
  7744. "impact" : { },
  7745. "publishedDate" : "2021-05-06T13:15Z",
  7746. "lastModifiedDate" : "2021-05-06T13:16Z"
  7747. }, {
  7748. "cve" : {
  7749. "data_type" : "CVE",
  7750. "data_format" : "MITRE",
  7751. "data_version" : "4.0",
  7752. "CVE_data_meta" : {
  7753. "ID" : "CVE-2021-27216",
  7754. "ASSIGNER" : "cve@mitre.org"
  7755. },
  7756. "problemtype" : {
  7757. "problemtype_data" : [ {
  7758. "description" : [ ]
  7759. } ]
  7760. },
  7761. "references" : {
  7762. "reference_data" : [ {
  7763. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
  7764. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
  7765. "refsource" : "MISC",
  7766. "tags" : [ ]
  7767. } ]
  7768. },
  7769. "description" : {
  7770. "description_data" : [ {
  7771. "lang" : "en",
  7772. "value" : "Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options."
  7773. } ]
  7774. }
  7775. },
  7776. "configurations" : {
  7777. "CVE_data_version" : "4.0",
  7778. "nodes" : [ ]
  7779. },
  7780. "impact" : { },
  7781. "publishedDate" : "2021-05-06T13:15Z",
  7782. "lastModifiedDate" : "2021-05-06T13:16Z"
  7783. }, {
  7784. "cve" : {
  7785. "data_type" : "CVE",
  7786. "data_format" : "MITRE",
  7787. "data_version" : "4.0",
  7788. "CVE_data_meta" : {
  7789. "ID" : "CVE-2021-26543",
  7790. "ASSIGNER" : "cve@mitre.org"
  7791. },
  7792. "problemtype" : {
  7793. "problemtype_data" : [ {
  7794. "description" : [ ]
  7795. } ]
  7796. },
  7797. "references" : {
  7798. "reference_data" : [ {
  7799. "url" : "https://advisory.checkmarx.net/advisory/CX-2020-4302",
  7800. "name" : "https://advisory.checkmarx.net/advisory/CX-2020-4302",
  7801. "refsource" : "MISC",
  7802. "tags" : [ ]
  7803. }, {
  7804. "url" : "https://www.npmjs.com/package/git-parse",
  7805. "name" : "https://www.npmjs.com/package/git-parse",
  7806. "refsource" : "MISC",
  7807. "tags" : [ ]
  7808. } ]
  7809. },
  7810. "description" : {
  7811. "description_data" : [ {
  7812. "lang" : "en",
  7813. "value" : "The \"gitDiff\" function in Wayfair git-parse <=1.0.4 has a command injection vulnerability. Clients of the git-parse library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability."
  7814. } ]
  7815. }
  7816. },
  7817. "configurations" : {
  7818. "CVE_data_version" : "4.0",
  7819. "nodes" : [ ]
  7820. },
  7821. "impact" : { },
  7822. "publishedDate" : "2021-05-06T13:15Z",
  7823. "lastModifiedDate" : "2021-05-06T13:16Z"
  7824. }, {
  7825. "cve" : {
  7826. "data_type" : "CVE",
  7827. "data_format" : "MITRE",
  7828. "data_version" : "4.0",
  7829. "CVE_data_meta" : {
  7830. "ID" : "CVE-2021-24254",
  7831. "ASSIGNER" : "contact@wpscan.com"
  7832. },
  7833. "problemtype" : {
  7834. "problemtype_data" : [ {
  7835. "description" : [ {
  7836. "lang" : "en",
  7837. "value" : "CWE-434"
  7838. } ]
  7839. } ]
  7840. },
  7841. "references" : {
  7842. "reference_data" : [ {
  7843. "url" : "https://github.com/jinhuang1102/CVE-ID-Reports/blob/master/College%20Puglisher%20Import.md",
  7844. "name" : "https://github.com/jinhuang1102/CVE-ID-Reports/blob/master/College%20Puglisher%20Import.md",
  7845. "refsource" : "MISC",
  7846. "tags" : [ ]
  7847. }, {
  7848. "url" : "https://wpscan.com/vulnerability/bb3e56dd-ae2e-45c2-a6c9-a59ae5fc1dc4",
  7849. "name" : "https://wpscan.com/vulnerability/bb3e56dd-ae2e-45c2-a6c9-a59ae5fc1dc4",
  7850. "refsource" : "CONFIRM",
  7851. "tags" : [ ]
  7852. } ]
  7853. },
  7854. "description" : {
  7855. "description_data" : [ {
  7856. "lang" : "en",
  7857. "value" : "The College publisher Import WordPress plugin through 0.1 does not check for the uploaded CSV file to import, allowing high privilege users to upload arbitrary files, such as PHP, leading to RCE. Due to the lack of CSRF check, the issue could also be exploited via a CSRF attack."
  7858. } ]
  7859. }
  7860. },
  7861. "configurations" : {
  7862. "CVE_data_version" : "4.0",
  7863. "nodes" : [ ]
  7864. },
  7865. "impact" : { },
  7866. "publishedDate" : "2021-05-06T13:15Z",
  7867. "lastModifiedDate" : "2021-05-06T13:16Z"
  7868. }, {
  7869. "cve" : {
  7870. "data_type" : "CVE",
  7871. "data_format" : "MITRE",
  7872. "data_version" : "4.0",
  7873. "CVE_data_meta" : {
  7874. "ID" : "CVE-2021-24253",
  7875. "ASSIGNER" : "contact@wpscan.com"
  7876. },
  7877. "problemtype" : {
  7878. "problemtype_data" : [ {
  7879. "description" : [ {
  7880. "lang" : "en",
  7881. "value" : "CWE-434"
  7882. } ]
  7883. } ]
  7884. },
  7885. "references" : {
  7886. "reference_data" : [ {
  7887. "url" : "https://wpscan.com/vulnerability/ee42c233-0ff6-4b27-a5ec-ad3246bef079",
  7888. "name" : "https://wpscan.com/vulnerability/ee42c233-0ff6-4b27-a5ec-ad3246bef079",
  7889. "refsource" : "CONFIRM",
  7890. "tags" : [ ]
  7891. }, {
  7892. "url" : "https://github.com/jinhuang1102/CVE-ID-Reports/blob/master/classyfrieds.md",
  7893. "name" : "https://github.com/jinhuang1102/CVE-ID-Reports/blob/master/classyfrieds.md",
  7894. "refsource" : "MISC",
  7895. "tags" : [ ]
  7896. } ]
  7897. },
  7898. "description" : {
  7899. "description_data" : [ {
  7900. "lang" : "en",
  7901. "value" : "The Classyfrieds WordPress plugin through 3.8 does not properly check the uploaded file when an authenticated user adds a listing, only checking the content-type in the request. This allows any authenticated user to upload arbitrary PHP files via the Add Listing feature of the plugin, leading to RCE."
  7902. } ]
  7903. }
  7904. },
  7905. "configurations" : {
  7906. "CVE_data_version" : "4.0",
  7907. "nodes" : [ ]
  7908. },
  7909. "impact" : { },
  7910. "publishedDate" : "2021-05-06T13:15Z",
  7911. "lastModifiedDate" : "2021-05-06T13:16Z"
  7912. }, {
  7913. "cve" : {
  7914. "data_type" : "CVE",
  7915. "data_format" : "MITRE",
  7916. "data_version" : "4.0",
  7917. "CVE_data_meta" : {
  7918. "ID" : "CVE-2021-24252",
  7919. "ASSIGNER" : "contact@wpscan.com"
  7920. },
  7921. "problemtype" : {
  7922. "problemtype_data" : [ {
  7923. "description" : [ {
  7924. "lang" : "en",
  7925. "value" : "CWE-434"
  7926. } ]
  7927. } ]
  7928. },
  7929. "references" : {
  7930. "reference_data" : [ {
  7931. "url" : "https://github.com/jinhuang1102/CVE-ID-Reports/blob/master/Event%20Banner.md",
  7932. "name" : "https://github.com/jinhuang1102/CVE-ID-Reports/blob/master/Event%20Banner.md",
  7933. "refsource" : "MISC",
  7934. "tags" : [ ]
  7935. }, {
  7936. "url" : "https://wpscan.com/vulnerability/91e81c6d-f24d-4f87-bc13-746715af8f7c",
  7937. "name" : "https://wpscan.com/vulnerability/91e81c6d-f24d-4f87-bc13-746715af8f7c",
  7938. "refsource" : "CONFIRM",
  7939. "tags" : [ ]
  7940. } ]
  7941. },
  7942. "description" : {
  7943. "description_data" : [ {
  7944. "lang" : "en",
  7945. "value" : "The Event Banner WordPress plugin through 1.3 does not verify the uploaded image file, allowing admin accounts to upload arbitrary files, such as .exe, .php, or others executable, leading to RCE. Due to the lack of CSRF check, the issue can also be used via such vector to achieve the same result, or via a LFI as authorisation checks are missing (but would require WP to be loaded)"
  7946. } ]
  7947. }
  7948. },
  7949. "configurations" : {
  7950. "CVE_data_version" : "4.0",
  7951. "nodes" : [ ]
  7952. },
  7953. "impact" : { },
  7954. "publishedDate" : "2021-05-06T13:15Z",
  7955. "lastModifiedDate" : "2021-05-06T13:16Z"
  7956. }, {
  7957. "cve" : {
  7958. "data_type" : "CVE",
  7959. "data_format" : "MITRE",
  7960. "data_version" : "4.0",
  7961. "CVE_data_meta" : {
  7962. "ID" : "CVE-2021-24251",
  7963. "ASSIGNER" : "contact@wpscan.com"
  7964. },
  7965. "problemtype" : {
  7966. "problemtype_data" : [ {
  7967. "description" : [ {
  7968. "lang" : "en",
  7969. "value" : "CWE-352"
  7970. } ]
  7971. } ]
  7972. },
  7973. "references" : {
  7974. "reference_data" : [ {
  7975. "url" : "https://wpscan.com/vulnerability/c9911236-4af3-4557-9bc0-217face534e1",
  7976. "name" : "https://wpscan.com/vulnerability/c9911236-4af3-4557-9bc0-217face534e1",
  7977. "refsource" : "CONFIRM",
  7978. "tags" : [ ]
  7979. } ]
  7980. },
  7981. "description" : {
  7982. "description_data" : [ {
  7983. "lang" : "en",
  7984. "value" : "The Business Directory Plugin – Easy Listing Directories for WordPress WordPress plugin before 5.11.2 suffered from a Cross-Site Request Forgery issue, allowing an attacker to make a logged in administrator update arbitrary payment history, such as change their status (from pending to completed to example)"
  7985. } ]
  7986. }
  7987. },
  7988. "configurations" : {
  7989. "CVE_data_version" : "4.0",
  7990. "nodes" : [ ]
  7991. },
  7992. "impact" : { },
  7993. "publishedDate" : "2021-05-06T13:15Z",
  7994. "lastModifiedDate" : "2021-05-06T13:16Z"
  7995. }, {
  7996. "cve" : {
  7997. "data_type" : "CVE",
  7998. "data_format" : "MITRE",
  7999. "data_version" : "4.0",
  8000. "CVE_data_meta" : {
  8001. "ID" : "CVE-2021-24250",
  8002. "ASSIGNER" : "contact@wpscan.com"
  8003. },
  8004. "problemtype" : {
  8005. "problemtype_data" : [ {
  8006. "description" : [ {
  8007. "lang" : "en",
  8008. "value" : "CWE-79"
  8009. } ]
  8010. } ]
  8011. },
  8012. "references" : {
  8013. "reference_data" : [ {
  8014. "url" : "https://wpscan.com/vulnerability/e23bf712-d891-4df7-99cc-9ef64f19f685",
  8015. "name" : "https://wpscan.com/vulnerability/e23bf712-d891-4df7-99cc-9ef64f19f685",
  8016. "refsource" : "CONFIRM",
  8017. "tags" : [ ]
  8018. } ]
  8019. },
  8020. "description" : {
  8021. "description_data" : [ {
  8022. "lang" : "en",
  8023. "value" : "The Business Directory Plugin – Easy Listing Directories for WordPress WordPress plugin before 5.11.2 suffered from lack of sanitisation in the label of the Form Fields, leading to Authenticated Stored Cross-Site Scripting issues across various pages of the plugin."
  8024. } ]
  8025. }
  8026. },
  8027. "configurations" : {
  8028. "CVE_data_version" : "4.0",
  8029. "nodes" : [ ]
  8030. },
  8031. "impact" : { },
  8032. "publishedDate" : "2021-05-06T13:15Z",
  8033. "lastModifiedDate" : "2021-05-06T13:16Z"
  8034. }, {
  8035. "cve" : {
  8036. "data_type" : "CVE",
  8037. "data_format" : "MITRE",
  8038. "data_version" : "4.0",
  8039. "CVE_data_meta" : {
  8040. "ID" : "CVE-2021-24249",
  8041. "ASSIGNER" : "contact@wpscan.com"
  8042. },
  8043. "problemtype" : {
  8044. "problemtype_data" : [ {
  8045. "description" : [ {
  8046. "lang" : "en",
  8047. "value" : "CWE-352"
  8048. } ]
  8049. } ]
  8050. },
  8051. "references" : {
  8052. "reference_data" : [ {
  8053. "url" : "https://wpscan.com/vulnerability/fc4cf749-34ef-43b8-a529-5065d698ab81",
  8054. "name" : "https://wpscan.com/vulnerability/fc4cf749-34ef-43b8-a529-5065d698ab81",
  8055. "refsource" : "CONFIRM",
  8056. "tags" : [ ]
  8057. } ]
  8058. },
  8059. "description" : {
  8060. "description_data" : [ {
  8061. "lang" : "en",
  8062. "value" : "The Business Directory Plugin – Easy Listing Directories for WordPress WordPress plugin before 5.11.2 suffered from a Cross-Site Request Forgery issue, allowing an attacker to make a logged in administrator export files, which could then be downloaded by the attacker to get access to PII, such as email, home addresses etc"
  8063. } ]
  8064. }
  8065. },
  8066. "configurations" : {
  8067. "CVE_data_version" : "4.0",
  8068. "nodes" : [ ]
  8069. },
  8070. "impact" : { },
  8071. "publishedDate" : "2021-05-06T13:15Z",
  8072. "lastModifiedDate" : "2021-05-06T13:16Z"
  8073. }, {
  8074. "cve" : {
  8075. "data_type" : "CVE",
  8076. "data_format" : "MITRE",
  8077. "data_version" : "4.0",
  8078. "CVE_data_meta" : {
  8079. "ID" : "CVE-2021-24248",
  8080. "ASSIGNER" : "contact@wpscan.com"
  8081. },
  8082. "problemtype" : {
  8083. "problemtype_data" : [ {
  8084. "description" : [ {
  8085. "lang" : "en",
  8086. "value" : "CWE-434"
  8087. } ]
  8088. } ]
  8089. },
  8090. "references" : {
  8091. "reference_data" : [ {
  8092. "url" : "https://wpscan.com/vulnerability/ca886a34-cd2b-4032-9de1-8089b5cf3001",
  8093. "name" : "https://wpscan.com/vulnerability/ca886a34-cd2b-4032-9de1-8089b5cf3001",
  8094. "refsource" : "CONFIRM",
  8095. "tags" : [ ]
  8096. } ]
  8097. },
  8098. "description" : {
  8099. "description_data" : [ {
  8100. "lang" : "en",
  8101. "value" : "The Business Directory Plugin – Easy Listing Directories for WordPress WordPress plugin before 5.11.1 did not properly check for imported files, forbidding certain extension via a blacklist approach, allowing administrator to import an archive with a .php4 inside for example, leading to RCE"
  8102. } ]
  8103. }
  8104. },
  8105. "configurations" : {
  8106. "CVE_data_version" : "4.0",
  8107. "nodes" : [ ]
  8108. },
  8109. "impact" : { },
  8110. "publishedDate" : "2021-05-06T13:15Z",
  8111. "lastModifiedDate" : "2021-05-06T13:16Z"
  8112. }, {
  8113. "cve" : {
  8114. "data_type" : "CVE",
  8115. "data_format" : "MITRE",
  8116. "data_version" : "4.0",
  8117. "CVE_data_meta" : {
  8118. "ID" : "CVE-2021-24247",
  8119. "ASSIGNER" : "contact@wpscan.com"
  8120. },
  8121. "problemtype" : {
  8122. "problemtype_data" : [ {
  8123. "description" : [ ]
  8124. } ]
  8125. },
  8126. "references" : {
  8127. "reference_data" : [ {
  8128. "url" : "https://wpscan.com/vulnerability/e2990a7a-d4f0-424e-b01d-ecf67cf9c9f3",
  8129. "name" : "https://wpscan.com/vulnerability/e2990a7a-d4f0-424e-b01d-ecf67cf9c9f3",
  8130. "refsource" : "CONFIRM",
  8131. "tags" : [ ]
  8132. } ]
  8133. },
  8134. "description" : {
  8135. "description_data" : [ {
  8136. "lang" : "en",
  8137. "value" : "The Contact Form Check Tester WordPress plugin through 1.0.2 settings are visible to all registered users in the dashboard and are lacking any sanitisation. As a result, any registered user, such as subscriber, can leave an XSS payload in the plugin settings, which will be triggered by any user visiting them, and could allow for privilege escalation. The vendor decided to close the plugin."
  8138. } ]
  8139. }
  8140. },
  8141. "configurations" : {
  8142. "CVE_data_version" : "4.0",
  8143. "nodes" : [ ]
  8144. },
  8145. "impact" : { },
  8146. "publishedDate" : "2021-05-06T13:15Z",
  8147. "lastModifiedDate" : "2021-05-06T13:16Z"
  8148. }, {
  8149. "cve" : {
  8150. "data_type" : "CVE",
  8151. "data_format" : "MITRE",
  8152. "data_version" : "4.0",
  8153. "CVE_data_meta" : {
  8154. "ID" : "CVE-2021-24246",
  8155. "ASSIGNER" : "contact@wpscan.com"
  8156. },
  8157. "problemtype" : {
  8158. "problemtype_data" : [ {
  8159. "description" : [ {
  8160. "lang" : "en",
  8161. "value" : "CWE-79"
  8162. } ]
  8163. } ]
  8164. },
  8165. "references" : {
  8166. "reference_data" : [ {
  8167. "url" : "https://wpscan.com/vulnerability/2365a9d0-f6f4-4602-9804-5af23d0cb11d",
  8168. "name" : "https://wpscan.com/vulnerability/2365a9d0-f6f4-4602-9804-5af23d0cb11d",
  8169. "refsource" : "CONFIRM",
  8170. "tags" : [ ]
  8171. }, {
  8172. "url" : "https://m0ze.ru/vulnerability/[2021-02-10]-[WordPress]-[CWE-79]-WorkScout-WordPress-Theme-v2.0.33.txt",
  8173. "name" : "https://m0ze.ru/vulnerability/[2021-02-10]-[WordPress]-[CWE-79]-WorkScout-WordPress-Theme-v2.0.33.txt",
  8174. "refsource" : "MISC",
  8175. "tags" : [ "Broken Link" ]
  8176. } ]
  8177. },
  8178. "description" : {
  8179. "description_data" : [ {
  8180. "lang" : "en",
  8181. "value" : "The Workscout Core WordPress plugin before 1.3.4, used by the WorkScout Theme did not sanitise the chat messages sent via the workscout_send_message_chat AJAX action, leading to Stored Cross-Site Scripting and Cross-Frame Scripting issues"
  8182. } ]
  8183. }
  8184. },
  8185. "configurations" : {
  8186. "CVE_data_version" : "4.0",
  8187. "nodes" : [ ]
  8188. },
  8189. "impact" : { },
  8190. "publishedDate" : "2021-05-06T13:15Z",
  8191. "lastModifiedDate" : "2021-05-06T13:16Z"
  8192. }, {
  8193. "cve" : {
  8194. "data_type" : "CVE",
  8195. "data_format" : "MITRE",
  8196. "data_version" : "4.0",
  8197. "CVE_data_meta" : {
  8198. "ID" : "CVE-2021-24245",
  8199. "ASSIGNER" : "contact@wpscan.com"
  8200. },
  8201. "problemtype" : {
  8202. "problemtype_data" : [ {
  8203. "description" : [ {
  8204. "lang" : "en",
  8205. "value" : "CWE-79"
  8206. } ]
  8207. } ]
  8208. },
  8209. "references" : {
  8210. "reference_data" : [ {
  8211. "url" : "https://wpscan.com/vulnerability/5e7accd6-08dc-4c6e-9d19-73e2d7e97735",
  8212. "name" : "https://wpscan.com/vulnerability/5e7accd6-08dc-4c6e-9d19-73e2d7e97735",
  8213. "refsource" : "CONFIRM",
  8214. "tags" : [ ]
  8215. } ]
  8216. },
  8217. "description" : {
  8218. "description_data" : [ {
  8219. "lang" : "en",
  8220. "value" : "The Stop Spammers WordPress plugin before 2021.9 did not escape user input when blocking requests (such as matching a spam word), outputting it in an attribute after sanitising it to remove HTML tags, which is not sufficient and lead to a reflected Cross-Site Scripting issue."
  8221. } ]
  8222. }
  8223. },
  8224. "configurations" : {
  8225. "CVE_data_version" : "4.0",
  8226. "nodes" : [ ]
  8227. },
  8228. "impact" : { },
  8229. "publishedDate" : "2021-05-06T13:15Z",
  8230. "lastModifiedDate" : "2021-05-06T13:16Z"
  8231. }, {
  8232. "cve" : {
  8233. "data_type" : "CVE",
  8234. "data_format" : "MITRE",
  8235. "data_version" : "4.0",
  8236. "CVE_data_meta" : {
  8237. "ID" : "CVE-2021-24244",
  8238. "ASSIGNER" : "contact@wpscan.com"
  8239. },
  8240. "problemtype" : {
  8241. "problemtype_data" : [ {
  8242. "description" : [ {
  8243. "lang" : "en",
  8244. "value" : "CWE-863"
  8245. } ]
  8246. } ]
  8247. },
  8248. "references" : {
  8249. "reference_data" : [ {
  8250. "url" : "https://wpscan.com/vulnerability/354b98d8-46a1-4189-b347-198701ea59b9",
  8251. "name" : "https://wpscan.com/vulnerability/354b98d8-46a1-4189-b347-198701ea59b9",
  8252. "refsource" : "CONFIRM",
  8253. "tags" : [ ]
  8254. }, {
  8255. "url" : "https://codecanyon.net/item/visual-composer-clipboard/8897711",
  8256. "name" : "https://codecanyon.net/item/visual-composer-clipboard/8897711",
  8257. "refsource" : "MISC",
  8258. "tags" : [ ]
  8259. } ]
  8260. },
  8261. "description" : {
  8262. "description_data" : [ {
  8263. "lang" : "en",
  8264. "value" : "An AJAX action registered by the WPBakery Page Builder (Visual Composer) Clipboard WordPress plugin before 4.5.8 did not have capability checks, allowing low privilege users, such as subscribers, to update the license options (key, email)."
  8265. } ]
  8266. }
  8267. },
  8268. "configurations" : {
  8269. "CVE_data_version" : "4.0",
  8270. "nodes" : [ ]
  8271. },
  8272. "impact" : { },
  8273. "publishedDate" : "2021-05-06T13:15Z",
  8274. "lastModifiedDate" : "2021-05-06T13:16Z"
  8275. }, {
  8276. "cve" : {
  8277. "data_type" : "CVE",
  8278. "data_format" : "MITRE",
  8279. "data_version" : "4.0",
  8280. "CVE_data_meta" : {
  8281. "ID" : "CVE-2021-24243",
  8282. "ASSIGNER" : "contact@wpscan.com"
  8283. },
  8284. "problemtype" : {
  8285. "problemtype_data" : [ {
  8286. "description" : [ {
  8287. "lang" : "en",
  8288. "value" : "CWE-79"
  8289. } ]
  8290. } ]
  8291. },
  8292. "references" : {
  8293. "reference_data" : [ {
  8294. "url" : "https://wpscan.com/vulnerability/3bc0733a-b949-40c9-a5fb-f56814fc4af3",
  8295. "name" : "https://wpscan.com/vulnerability/3bc0733a-b949-40c9-a5fb-f56814fc4af3",
  8296. "refsource" : "CONFIRM",
  8297. "tags" : [ ]
  8298. }, {
  8299. "url" : "https://codecanyon.net/item/visual-composer-clipboard/8897711",
  8300. "name" : "https://codecanyon.net/item/visual-composer-clipboard/8897711",
  8301. "refsource" : "MISC",
  8302. "tags" : [ ]
  8303. } ]
  8304. },
  8305. "description" : {
  8306. "description_data" : [ {
  8307. "lang" : "en",
  8308. "value" : "An AJAX action registered by the WPBakery Page Builder (Visual Composer) Clipboard WordPress plugin before 4.5.6 did not have capability checks nor sanitization, allowing low privilege users (subscriber+) to call it and set XSS payloads, which will be triggered in all backend pages."
  8309. } ]
  8310. }
  8311. },
  8312. "configurations" : {
  8313. "CVE_data_version" : "4.0",
  8314. "nodes" : [ ]
  8315. },
  8316. "impact" : { },
  8317. "publishedDate" : "2021-05-06T13:15Z",
  8318. "lastModifiedDate" : "2021-05-06T13:16Z"
  8319. }, {
  8320. "cve" : {
  8321. "data_type" : "CVE",
  8322. "data_format" : "MITRE",
  8323. "data_version" : "4.0",
  8324. "CVE_data_meta" : {
  8325. "ID" : "CVE-2021-24236",
  8326. "ASSIGNER" : "contact@wpscan.com"
  8327. },
  8328. "problemtype" : {
  8329. "problemtype_data" : [ {
  8330. "description" : [ {
  8331. "lang" : "en",
  8332. "value" : "CWE-434"
  8333. } ]
  8334. } ]
  8335. },
  8336. "references" : {
  8337. "reference_data" : [ {
  8338. "url" : "https://wpscan.com/vulnerability/8f24e74f-60e3-4100-9ab2-ec31b9c9cdea",
  8339. "name" : "https://wpscan.com/vulnerability/8f24e74f-60e3-4100-9ab2-ec31b9c9cdea",
  8340. "refsource" : "CONFIRM",
  8341. "tags" : [ ]
  8342. } ]
  8343. },
  8344. "description" : {
  8345. "description_data" : [ {
  8346. "lang" : "en",
  8347. "value" : "The Imagements WordPress plugin through 1.2.5 allows images to be uploaded in comments, however only checks for the Content-Type in the request to forbid dangerous files. This allows unauthenticated attackers to upload arbitrary files by using a valid image Content-Type along with a PHP filename and code, leading to RCE."
  8348. } ]
  8349. }
  8350. },
  8351. "configurations" : {
  8352. "CVE_data_version" : "4.0",
  8353. "nodes" : [ ]
  8354. },
  8355. "impact" : { },
  8356. "publishedDate" : "2021-05-06T13:15Z",
  8357. "lastModifiedDate" : "2021-05-06T13:16Z"
  8358. }, {
  8359. "cve" : {
  8360. "data_type" : "CVE",
  8361. "data_format" : "MITRE",
  8362. "data_version" : "4.0",
  8363. "CVE_data_meta" : {
  8364. "ID" : "CVE-2021-24214",
  8365. "ASSIGNER" : "contact@wpscan.com"
  8366. },
  8367. "problemtype" : {
  8368. "problemtype_data" : [ {
  8369. "description" : [ ]
  8370. } ]
  8371. },
  8372. "references" : {
  8373. "reference_data" : [ {
  8374. "url" : "https://wpscan.com/vulnerability/31cf0dfb-4025-4898-a5f4-fc7115565a10",
  8375. "name" : "https://wpscan.com/vulnerability/31cf0dfb-4025-4898-a5f4-fc7115565a10",
  8376. "refsource" : "CONFIRM",
  8377. "tags" : [ ]
  8378. } ]
  8379. },
  8380. "description" : {
  8381. "description_data" : [ {
  8382. "lang" : "en",
  8383. "value" : "The OpenID Connect Generic Client WordPress plugin 3.8.0 and 3.8.1 did not sanitise the login error when output back in the login form, leading to a reflected Cross-Site Scripting issue. This issue does not require authentication and can be exploited with the default configuration."
  8384. } ]
  8385. }
  8386. },
  8387. "configurations" : {
  8388. "CVE_data_version" : "4.0",
  8389. "nodes" : [ ]
  8390. },
  8391. "impact" : { },
  8392. "publishedDate" : "2021-05-06T13:15Z",
  8393. "lastModifiedDate" : "2021-05-06T13:16Z"
  8394. }, {
  8395. "cve" : {
  8396. "data_type" : "CVE",
  8397. "data_format" : "MITRE",
  8398. "data_version" : "4.0",
  8399. "CVE_data_meta" : {
  8400. "ID" : "CVE-2021-24179",
  8401. "ASSIGNER" : "contact@wpscan.com"
  8402. },
  8403. "problemtype" : {
  8404. "problemtype_data" : [ {
  8405. "description" : [ {
  8406. "lang" : "en",
  8407. "value" : "CWE-352"
  8408. } ]
  8409. } ]
  8410. },
  8411. "references" : {
  8412. "reference_data" : [ {
  8413. "url" : "https://wpscan.com/vulnerability/c0a5cdde-732a-432a-86c2-776df5d130a7",
  8414. "name" : "https://wpscan.com/vulnerability/c0a5cdde-732a-432a-86c2-776df5d130a7",
  8415. "refsource" : "CONFIRM",
  8416. "tags" : [ ]
  8417. } ]
  8418. },
  8419. "description" : {
  8420. "description_data" : [ {
  8421. "lang" : "en",
  8422. "value" : "The Business Directory Plugin – Easy Listing Directories for WordPress WordPress plugin before 5.11 suffered from a Cross-Site Request Forgery issue, allowing an attacker to make a logged in administrator import files. As the plugin also did not validate uploaded files, it could lead to RCE."
  8423. } ]
  8424. }
  8425. },
  8426. "configurations" : {
  8427. "CVE_data_version" : "4.0",
  8428. "nodes" : [ ]
  8429. },
  8430. "impact" : { },
  8431. "publishedDate" : "2021-05-06T13:15Z",
  8432. "lastModifiedDate" : "2021-05-06T13:16Z"
  8433. }, {
  8434. "cve" : {
  8435. "data_type" : "CVE",
  8436. "data_format" : "MITRE",
  8437. "data_version" : "4.0",
  8438. "CVE_data_meta" : {
  8439. "ID" : "CVE-2021-24178",
  8440. "ASSIGNER" : "contact@wpscan.com"
  8441. },
  8442. "problemtype" : {
  8443. "problemtype_data" : [ {
  8444. "description" : [ {
  8445. "lang" : "en",
  8446. "value" : "CWE-352"
  8447. } ]
  8448. } ]
  8449. },
  8450. "references" : {
  8451. "reference_data" : [ {
  8452. "url" : "https://wpscan.com/vulnerability/700f3b04-8298-447c-8d3c-4581880a63b5",
  8453. "name" : "https://wpscan.com/vulnerability/700f3b04-8298-447c-8d3c-4581880a63b5",
  8454. "refsource" : "CONFIRM",
  8455. "tags" : [ ]
  8456. } ]
  8457. },
  8458. "description" : {
  8459. "description_data" : [ {
  8460. "lang" : "en",
  8461. "value" : "The Business Directory Plugin – Easy Listing Directories for WordPress WordPress plugin before 5.11.1 suffered from Cross-Site Request Forgery issues, allowing an attacker to make a logged in administrator add, edit or delete form fields, which could also lead to Stored Cross-Site Scripting issues."
  8462. } ]
  8463. }
  8464. },
  8465. "configurations" : {
  8466. "CVE_data_version" : "4.0",
  8467. "nodes" : [ ]
  8468. },
  8469. "impact" : { },
  8470. "publishedDate" : "2021-05-06T13:15Z",
  8471. "lastModifiedDate" : "2021-05-06T13:16Z"
  8472. }, {
  8473. "cve" : {
  8474. "data_type" : "CVE",
  8475. "data_format" : "MITRE",
  8476. "data_version" : "4.0",
  8477. "CVE_data_meta" : {
  8478. "ID" : "CVE-2021-22211",
  8479. "ASSIGNER" : "cve@gitlab.com"
  8480. },
  8481. "problemtype" : {
  8482. "problemtype_data" : [ {
  8483. "description" : [ ]
  8484. } ]
  8485. },
  8486. "references" : {
  8487. "reference_data" : [ {
  8488. "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/298847",
  8489. "name" : "https://gitlab.com/gitlab-org/gitlab/-/issues/298847",
  8490. "refsource" : "MISC",
  8491. "tags" : [ ]
  8492. }, {
  8493. "url" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22211.json",
  8494. "name" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22211.json",
  8495. "refsource" : "CONFIRM",
  8496. "tags" : [ ]
  8497. } ]
  8498. },
  8499. "description" : {
  8500. "description_data" : [ {
  8501. "lang" : "en",
  8502. "value" : "An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7. GitLab Dependency Proxy, under certain circumstances, can impersonate a user resulting in possibly incorrect access handling."
  8503. } ]
  8504. }
  8505. },
  8506. "configurations" : {
  8507. "CVE_data_version" : "4.0",
  8508. "nodes" : [ ]
  8509. },
  8510. "impact" : { },
  8511. "publishedDate" : "2021-05-06T13:15Z",
  8512. "lastModifiedDate" : "2021-05-06T13:16Z"
  8513. }, {
  8514. "cve" : {
  8515. "data_type" : "CVE",
  8516. "data_format" : "MITRE",
  8517. "data_version" : "4.0",
  8518. "CVE_data_meta" : {
  8519. "ID" : "CVE-2021-21550",
  8520. "ASSIGNER" : "secure@dell.com"
  8521. },
  8522. "problemtype" : {
  8523. "problemtype_data" : [ {
  8524. "description" : [ ]
  8525. } ]
  8526. },
  8527. "references" : {
  8528. "reference_data" : [ {
  8529. "url" : "https://www.dell.com/support/kbdoc/000185978",
  8530. "name" : "https://www.dell.com/support/kbdoc/000185978",
  8531. "refsource" : "MISC",
  8532. "tags" : [ ]
  8533. } ]
  8534. },
  8535. "description" : {
  8536. "description_data" : [ {
  8537. "lang" : "en",
  8538. "value" : "Dell EMC PowerScale OneFS 8.1.0-9.1.0 contain an improper neutralization of special elements used in an OS command vulnerability. This vulnerability can allow an authenticated user with ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE privileges to escalate privileges."
  8539. } ]
  8540. }
  8541. },
  8542. "configurations" : {
  8543. "CVE_data_version" : "4.0",
  8544. "nodes" : [ ]
  8545. },
  8546. "impact" : { },
  8547. "publishedDate" : "2021-05-06T13:15Z",
  8548. "lastModifiedDate" : "2021-05-06T13:16Z"
  8549. }, {
  8550. "cve" : {
  8551. "data_type" : "CVE",
  8552. "data_format" : "MITRE",
  8553. "data_version" : "4.0",
  8554. "CVE_data_meta" : {
  8555. "ID" : "CVE-2021-21527",
  8556. "ASSIGNER" : "secure@dell.com"
  8557. },
  8558. "problemtype" : {
  8559. "problemtype_data" : [ {
  8560. "description" : [ ]
  8561. } ]
  8562. },
  8563. "references" : {
  8564. "reference_data" : [ {
  8565. "url" : "https://www.dell.com/support/kbdoc/000185978",
  8566. "name" : "https://www.dell.com/support/kbdoc/000185978",
  8567. "refsource" : "MISC",
  8568. "tags" : [ ]
  8569. } ]
  8570. },
  8571. "description" : {
  8572. "description_data" : [ {
  8573. "lang" : "en",
  8574. "value" : "Dell PowerScale OneFS 8.1.0-9.1.0 contain an improper neutralization of special elements used in an OS command vulnerability. This vulnerability may allow an authenticated user with ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE privileges to escalate privileges."
  8575. } ]
  8576. }
  8577. },
  8578. "configurations" : {
  8579. "CVE_data_version" : "4.0",
  8580. "nodes" : [ ]
  8581. },
  8582. "impact" : { },
  8583. "publishedDate" : "2021-05-06T13:15Z",
  8584. "lastModifiedDate" : "2021-05-06T13:16Z"
  8585. }, {
  8586. "cve" : {
  8587. "data_type" : "CVE",
  8588. "data_format" : "MITRE",
  8589. "data_version" : "4.0",
  8590. "CVE_data_meta" : {
  8591. "ID" : "CVE-2021-21505",
  8592. "ASSIGNER" : "secure@dell.com"
  8593. },
  8594. "problemtype" : {
  8595. "problemtype_data" : [ {
  8596. "description" : [ ]
  8597. } ]
  8598. },
  8599. "references" : {
  8600. "reference_data" : [ {
  8601. "url" : "https://www.dell.com/support/kbdoc/en-us/000186008/dsa-2021-020-dell-emc-integrated-system-for-microsoft-azure-stack-hub-security-update-for-an-idrac-undocumented-account-vulnerability",
  8602. "name" : "https://www.dell.com/support/kbdoc/en-us/000186008/dsa-2021-020-dell-emc-integrated-system-for-microsoft-azure-stack-hub-security-update-for-an-idrac-undocumented-account-vulnerability",
  8603. "refsource" : "MISC",
  8604. "tags" : [ ]
  8605. } ]
  8606. },
  8607. "description" : {
  8608. "description_data" : [ {
  8609. "lang" : "en",
  8610. "value" : "Dell EMC Integrated System for Microsoft Azure Stack Hub, versions 1906 – 2011, contain an undocumented default iDRAC account. A remote unauthenticated attacker, with the knowledge of the default credentials, could potentially exploit this to log in to the system to gain root privileges."
  8611. } ]
  8612. }
  8613. },
  8614. "configurations" : {
  8615. "CVE_data_version" : "4.0",
  8616. "nodes" : [ ]
  8617. },
  8618. "impact" : { },
  8619. "publishedDate" : "2021-05-06T13:15Z",
  8620. "lastModifiedDate" : "2021-05-06T13:16Z"
  8621. }, {
  8622. "cve" : {
  8623. "data_type" : "CVE",
  8624. "data_format" : "MITRE",
  8625. "data_version" : "4.0",
  8626. "CVE_data_meta" : {
  8627. "ID" : "CVE-2021-1535",
  8628. "ASSIGNER" : "psirt@cisco.com"
  8629. },
  8630. "problemtype" : {
  8631. "problemtype_data" : [ {
  8632. "description" : [ {
  8633. "lang" : "en",
  8634. "value" : "CWE-497"
  8635. } ]
  8636. } ]
  8637. },
  8638. "references" : {
  8639. "reference_data" : [ {
  8640. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanageinfdis-LKrFpbv",
  8641. "name" : "20210505 Cisco SD-WAN vManage Information Disclosure Vulnerability",
  8642. "refsource" : "CISCO",
  8643. "tags" : [ ]
  8644. } ]
  8645. },
  8646. "description" : {
  8647. "description_data" : [ {
  8648. "lang" : "en",
  8649. "value" : "A vulnerability in the cluster management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. To be affected by this vulnerability, the Cisco SD-WAN vManage Software must be in cluster mode. This vulnerability is due to the absence of authentication for sensitive information in the cluster management interface. An attacker could exploit this vulnerability by sending a crafted request to the cluster management interface of an affected system. A successful exploit could allow the attacker to allow the attacker to view sensitive information on the affected system."
  8650. } ]
  8651. }
  8652. },
  8653. "configurations" : {
  8654. "CVE_data_version" : "4.0",
  8655. "nodes" : [ ]
  8656. },
  8657. "impact" : { },
  8658. "publishedDate" : "2021-05-06T13:15Z",
  8659. "lastModifiedDate" : "2021-05-06T13:16Z"
  8660. }, {
  8661. "cve" : {
  8662. "data_type" : "CVE",
  8663. "data_format" : "MITRE",
  8664. "data_version" : "4.0",
  8665. "CVE_data_meta" : {
  8666. "ID" : "CVE-2021-1532",
  8667. "ASSIGNER" : "psirt@cisco.com"
  8668. },
  8669. "problemtype" : {
  8670. "problemtype_data" : [ {
  8671. "description" : [ {
  8672. "lang" : "en",
  8673. "value" : "CWE-22"
  8674. } ]
  8675. } ]
  8676. },
  8677. "references" : {
  8678. "reference_data" : [ {
  8679. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-rmos-fileread-pE9sL3g",
  8680. "name" : "20210505 Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Read Vulnerability",
  8681. "refsource" : "CISCO",
  8682. "tags" : [ ]
  8683. } ]
  8684. },
  8685. "description" : {
  8686. "description_data" : [ {
  8687. "lang" : "en",
  8688. "value" : "A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system. This vulnerability is due to insufficient path validation of command arguments. An attacker could exploit this vulnerability by sending a crafted command request to the xAPI. A successful exploit could allow the attacker to read the contents of any file that is located on the device filesystem."
  8689. } ]
  8690. }
  8691. },
  8692. "configurations" : {
  8693. "CVE_data_version" : "4.0",
  8694. "nodes" : [ ]
  8695. },
  8696. "impact" : { },
  8697. "publishedDate" : "2021-05-06T13:15Z",
  8698. "lastModifiedDate" : "2021-05-06T13:16Z"
  8699. }, {
  8700. "cve" : {
  8701. "data_type" : "CVE",
  8702. "data_format" : "MITRE",
  8703. "data_version" : "4.0",
  8704. "CVE_data_meta" : {
  8705. "ID" : "CVE-2021-1530",
  8706. "ASSIGNER" : "psirt@cisco.com"
  8707. },
  8708. "problemtype" : {
  8709. "problemtype_data" : [ {
  8710. "description" : [ ]
  8711. } ]
  8712. },
  8713. "references" : {
  8714. "reference_data" : [ {
  8715. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bwms-xxe-uSLrZgKs",
  8716. "name" : "20210505 Cisco BroadWorks Messaging Server XML External Entity Injection Vulnerability",
  8717. "refsource" : "CISCO",
  8718. "tags" : [ ]
  8719. } ]
  8720. },
  8721. "description" : {
  8722. "description_data" : [ {
  8723. "lang" : "en",
  8724. "value" : "A vulnerability in the web-based management interface of Cisco BroadWorks Messaging Server Software could allow an authenticated, remote attacker to access sensitive information or cause a partial denial of service (DoS) condition on an affected system. This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by uploading a crafted XML file that contains references to external entities. A successful exploit could allow the attacker to retrieve files from the local system, resulting in the disclosure of sensitive information, or cause the application to consume available resources, resulting in a partial DoS condition on an affected system. There are workarounds that address this vulnerability."
  8725. } ]
  8726. }
  8727. },
  8728. "configurations" : {
  8729. "CVE_data_version" : "4.0",
  8730. "nodes" : [ ]
  8731. },
  8732. "impact" : { },
  8733. "publishedDate" : "2021-05-06T13:15Z",
  8734. "lastModifiedDate" : "2021-05-06T13:16Z"
  8735. }, {
  8736. "cve" : {
  8737. "data_type" : "CVE",
  8738. "data_format" : "MITRE",
  8739. "data_version" : "4.0",
  8740. "CVE_data_meta" : {
  8741. "ID" : "CVE-2021-1521",
  8742. "ASSIGNER" : "psirt@cisco.com"
  8743. },
  8744. "problemtype" : {
  8745. "problemtype_data" : [ {
  8746. "description" : [ {
  8747. "lang" : "en",
  8748. "value" : "CWE-119"
  8749. } ]
  8750. } ]
  8751. },
  8752. "references" : {
  8753. "reference_data" : [ {
  8754. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcameras-dos-fc3F6LzT",
  8755. "name" : "20210505 Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Denial of Service Vulnerability",
  8756. "refsource" : "CISCO",
  8757. "tags" : [ ]
  8758. } ]
  8759. },
  8760. "description" : {
  8761. "description_data" : [ {
  8762. "lang" : "en",
  8763. "value" : "A vulnerability in the Cisco Discovery Protocol implementation for Cisco Video Surveillance 8000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause an affected IP camera to reload. This vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected IP camera. A successful exploit could allow the attacker to cause the affected IP camera to reload unexpectedly, resulting in a denial of service (DoS) condition. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent)."
  8764. } ]
  8765. }
  8766. },
  8767. "configurations" : {
  8768. "CVE_data_version" : "4.0",
  8769. "nodes" : [ ]
  8770. },
  8771. "impact" : { },
  8772. "publishedDate" : "2021-05-06T13:15Z",
  8773. "lastModifiedDate" : "2021-05-06T13:16Z"
  8774. }, {
  8775. "cve" : {
  8776. "data_type" : "CVE",
  8777. "data_format" : "MITRE",
  8778. "data_version" : "4.0",
  8779. "CVE_data_meta" : {
  8780. "ID" : "CVE-2021-1520",
  8781. "ASSIGNER" : "psirt@cisco.com"
  8782. },
  8783. "problemtype" : {
  8784. "problemtype_data" : [ {
  8785. "description" : [ {
  8786. "lang" : "en",
  8787. "value" : "CWE-123"
  8788. } ]
  8789. } ]
  8790. },
  8791. "references" : {
  8792. "reference_data" : [ {
  8793. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-34x-privesc-GLN8ZAQE",
  8794. "name" : "20210505 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Local Privilege Escalation Vulnerability",
  8795. "refsource" : "CISCO",
  8796. "tags" : [ ]
  8797. } ]
  8798. },
  8799. "description" : {
  8800. "description_data" : [ {
  8801. "lang" : "en",
  8802. "value" : "A vulnerability in the internal message processing of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, local attacker to run arbitrary commands with root privileges on the underlying operating system (OS). This vulnerability exists because an internal messaging service does not properly sanitize input. An attacker could exploit this vulnerability by first authenticating to the device and then sending a crafted request to the internal service. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying OS. To exploit this vulnerability, the attacker must have valid Administrator credentials for the device."
  8803. } ]
  8804. }
  8805. },
  8806. "configurations" : {
  8807. "CVE_data_version" : "4.0",
  8808. "nodes" : [ ]
  8809. },
  8810. "impact" : { },
  8811. "publishedDate" : "2021-05-06T13:15Z",
  8812. "lastModifiedDate" : "2021-05-06T13:16Z"
  8813. }, {
  8814. "cve" : {
  8815. "data_type" : "CVE",
  8816. "data_format" : "MITRE",
  8817. "data_version" : "4.0",
  8818. "CVE_data_meta" : {
  8819. "ID" : "CVE-2021-1519",
  8820. "ASSIGNER" : "psirt@cisco.com"
  8821. },
  8822. "problemtype" : {
  8823. "problemtype_data" : [ {
  8824. "description" : [ {
  8825. "lang" : "en",
  8826. "value" : "CWE-20"
  8827. } ]
  8828. } ]
  8829. },
  8830. "references" : {
  8831. "reference_data" : [ {
  8832. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-profile-AggMUCDg",
  8833. "name" : "20210505 Cisco AnyConnect Secure Mobility Client Profile Modification Vulnerability",
  8834. "refsource" : "CISCO",
  8835. "tags" : [ "Vendor Advisory" ]
  8836. } ]
  8837. },
  8838. "description" : {
  8839. "description_data" : [ {
  8840. "lang" : "en",
  8841. "value" : "A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software could allow an authenticated, local attacker to overwrite VPN profiles on an affected device. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process. A successful exploit could allow the attacker to modify VPN profile files. To exploit this vulnerability, the attacker must have valid credentials on the affected system."
  8842. } ]
  8843. }
  8844. },
  8845. "configurations" : {
  8846. "CVE_data_version" : "4.0",
  8847. "nodes" : [ {
  8848. "operator" : "OR",
  8849. "children" : [ ],
  8850. "cpe_match" : [ {
  8851. "vulnerable" : true,
  8852. "cpe23Uri" : "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:*:*:*",
  8853. "versionEndExcluding" : "4.10.00093:",
  8854. "cpe_name" : [ ]
  8855. } ]
  8856. } ]
  8857. },
  8858. "impact" : {
  8859. "baseMetricV3" : {
  8860. "cvssV3" : {
  8861. "version" : "3.1",
  8862. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
  8863. "attackVector" : "LOCAL",
  8864. "attackComplexity" : "LOW",
  8865. "privilegesRequired" : "LOW",
  8866. "userInteraction" : "NONE",
  8867. "scope" : "UNCHANGED",
  8868. "confidentialityImpact" : "NONE",
  8869. "integrityImpact" : "HIGH",
  8870. "availabilityImpact" : "NONE",
  8871. "baseScore" : 5.5,
  8872. "baseSeverity" : "MEDIUM"
  8873. },
  8874. "exploitabilityScore" : 1.8,
  8875. "impactScore" : 3.6
  8876. },
  8877. "baseMetricV2" : {
  8878. "cvssV2" : {
  8879. "version" : "2.0",
  8880. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:P/A:N",
  8881. "accessVector" : "LOCAL",
  8882. "accessComplexity" : "LOW",
  8883. "authentication" : "NONE",
  8884. "confidentialityImpact" : "NONE",
  8885. "integrityImpact" : "PARTIAL",
  8886. "availabilityImpact" : "NONE",
  8887. "baseScore" : 2.1
  8888. },
  8889. "severity" : "LOW",
  8890. "exploitabilityScore" : 3.9,
  8891. "impactScore" : 2.9,
  8892. "acInsufInfo" : false,
  8893. "obtainAllPrivilege" : false,
  8894. "obtainUserPrivilege" : false,
  8895. "obtainOtherPrivilege" : false,
  8896. "userInteractionRequired" : false
  8897. }
  8898. },
  8899. "publishedDate" : "2021-05-06T13:15Z",
  8900. "lastModifiedDate" : "2021-05-07T20:55Z"
  8901. }, {
  8902. "cve" : {
  8903. "data_type" : "CVE",
  8904. "data_format" : "MITRE",
  8905. "data_version" : "4.0",
  8906. "CVE_data_meta" : {
  8907. "ID" : "CVE-2021-1516",
  8908. "ASSIGNER" : "psirt@cisco.com"
  8909. },
  8910. "problemtype" : {
  8911. "problemtype_data" : [ {
  8912. "description" : [ {
  8913. "lang" : "en",
  8914. "value" : "CWE-540"
  8915. } ]
  8916. } ]
  8917. },
  8918. "references" : {
  8919. "reference_data" : [ {
  8920. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-gY2AEz2H",
  8921. "name" : "20210505 Cisco Content Security Management Appliance, Email Security Appliance, and Web Security Appliance Information Disclosure Vulnerability",
  8922. "refsource" : "CISCO",
  8923. "tags" : [ ]
  8924. } ]
  8925. },
  8926. "description" : {
  8927. "description_data" : [ {
  8928. "lang" : "en",
  8929. "value" : "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA), Cisco Email Security Appliance (ESA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because confidential information is included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface."
  8930. } ]
  8931. }
  8932. },
  8933. "configurations" : {
  8934. "CVE_data_version" : "4.0",
  8935. "nodes" : [ ]
  8936. },
  8937. "impact" : { },
  8938. "publishedDate" : "2021-05-06T13:15Z",
  8939. "lastModifiedDate" : "2021-05-06T13:16Z"
  8940. }, {
  8941. "cve" : {
  8942. "data_type" : "CVE",
  8943. "data_format" : "MITRE",
  8944. "data_version" : "4.0",
  8945. "CVE_data_meta" : {
  8946. "ID" : "CVE-2021-1515",
  8947. "ASSIGNER" : "psirt@cisco.com"
  8948. },
  8949. "problemtype" : {
  8950. "problemtype_data" : [ {
  8951. "description" : [ {
  8952. "lang" : "en",
  8953. "value" : "CWE-284"
  8954. } ]
  8955. } ]
  8956. },
  8957. "references" : {
  8958. "reference_data" : [ {
  8959. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-9VZO4gfU",
  8960. "name" : "20210505 Cisco SD-WAN vManage Information Disclosure Vulnerability",
  8961. "refsource" : "CISCO",
  8962. "tags" : [ ]
  8963. } ]
  8964. },
  8965. "description" : {
  8966. "description_data" : [ {
  8967. "lang" : "en",
  8968. "value" : "A vulnerability in Cisco SD-WAN vManage Software could allow an unauthenticated, adjacent attacker to gain access to sensitive information. This vulnerability is due to improper access controls on API endpoints when Cisco SD-WAN vManage Software is running in multi-tenant mode. An attacker with access to a device that is managed in the multi-tenant environment could exploit this vulnerability by sending a request to an affected API endpoint on the vManage system. A successful exploit could allow the attacker to gain access to sensitive information that may include hashed credentials that could be used in future attacks."
  8969. } ]
  8970. }
  8971. },
  8972. "configurations" : {
  8973. "CVE_data_version" : "4.0",
  8974. "nodes" : [ ]
  8975. },
  8976. "impact" : { },
  8977. "publishedDate" : "2021-05-06T13:15Z",
  8978. "lastModifiedDate" : "2021-05-06T13:16Z"
  8979. }, {
  8980. "cve" : {
  8981. "data_type" : "CVE",
  8982. "data_format" : "MITRE",
  8983. "data_version" : "4.0",
  8984. "CVE_data_meta" : {
  8985. "ID" : "CVE-2021-1514",
  8986. "ASSIGNER" : "psirt@cisco.com"
  8987. },
  8988. "problemtype" : {
  8989. "problemtype_data" : [ {
  8990. "description" : [ {
  8991. "lang" : "en",
  8992. "value" : "CWE-20"
  8993. } ]
  8994. } ]
  8995. },
  8996. "references" : {
  8997. "reference_data" : [ {
  8998. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-QVszVUPy",
  8999. "name" : "20210505 Cisco SD-WAN Software Privilege Escalation Vulnerability",
  9000. "refsource" : "CISCO",
  9001. "tags" : [ ]
  9002. } ]
  9003. },
  9004. "description" : {
  9005. "description_data" : [ {
  9006. "lang" : "en",
  9007. "value" : "A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with Administrator privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as a low-privileged user to execute the affected commands. A successful exploit could allow the attacker to execute commands with Administrator privileges."
  9008. } ]
  9009. }
  9010. },
  9011. "configurations" : {
  9012. "CVE_data_version" : "4.0",
  9013. "nodes" : [ ]
  9014. },
  9015. "impact" : { },
  9016. "publishedDate" : "2021-05-06T13:15Z",
  9017. "lastModifiedDate" : "2021-05-06T13:16Z"
  9018. }, {
  9019. "cve" : {
  9020. "data_type" : "CVE",
  9021. "data_format" : "MITRE",
  9022. "data_version" : "4.0",
  9023. "CVE_data_meta" : {
  9024. "ID" : "CVE-2021-1513",
  9025. "ASSIGNER" : "psirt@cisco.com"
  9026. },
  9027. "problemtype" : {
  9028. "problemtype_data" : [ {
  9029. "description" : [ ]
  9030. } ]
  9031. },
  9032. "references" : {
  9033. "reference_data" : [ {
  9034. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dos-Ckn5cVqW",
  9035. "name" : "20210505 Cisco SD-WAN Software vDaemon Denial of Service Vulnerability",
  9036. "refsource" : "CISCO",
  9037. "tags" : [ ]
  9038. } ]
  9039. },
  9040. "description" : {
  9041. "description_data" : [ {
  9042. "lang" : "en",
  9043. "value" : "A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."
  9044. } ]
  9045. }
  9046. },
  9047. "configurations" : {
  9048. "CVE_data_version" : "4.0",
  9049. "nodes" : [ ]
  9050. },
  9051. "impact" : { },
  9052. "publishedDate" : "2021-05-06T13:15Z",
  9053. "lastModifiedDate" : "2021-05-06T13:16Z"
  9054. }, {
  9055. "cve" : {
  9056. "data_type" : "CVE",
  9057. "data_format" : "MITRE",
  9058. "data_version" : "4.0",
  9059. "CVE_data_meta" : {
  9060. "ID" : "CVE-2021-1512",
  9061. "ASSIGNER" : "psirt@cisco.com"
  9062. },
  9063. "problemtype" : {
  9064. "problemtype_data" : [ {
  9065. "description" : [ {
  9066. "lang" : "en",
  9067. "value" : "CWE-552"
  9068. } ]
  9069. } ]
  9070. },
  9071. "references" : {
  9072. "reference_data" : [ {
  9073. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-arbfile-7Qhd9mCn",
  9074. "name" : "20210505 Cisco SD-WAN Software Arbitrary File Corruption Vulnerability",
  9075. "refsource" : "CISCO",
  9076. "tags" : [ ]
  9077. } ]
  9078. },
  9079. "description" : {
  9080. "description_data" : [ {
  9081. "lang" : "en",
  9082. "value" : "A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite arbitrary files in the underlying file system of an affected system. This vulnerability is due to insufficient validation of the user-supplied input parameters of a specific CLI command. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content in any arbitrary files that reside on the underlying host file system."
  9083. } ]
  9084. }
  9085. },
  9086. "configurations" : {
  9087. "CVE_data_version" : "4.0",
  9088. "nodes" : [ ]
  9089. },
  9090. "impact" : { },
  9091. "publishedDate" : "2021-05-06T13:15Z",
  9092. "lastModifiedDate" : "2021-05-06T13:16Z"
  9093. }, {
  9094. "cve" : {
  9095. "data_type" : "CVE",
  9096. "data_format" : "MITRE",
  9097. "data_version" : "4.0",
  9098. "CVE_data_meta" : {
  9099. "ID" : "CVE-2021-1511",
  9100. "ASSIGNER" : "psirt@cisco.com"
  9101. },
  9102. "problemtype" : {
  9103. "problemtype_data" : [ {
  9104. "description" : [ {
  9105. "lang" : "en",
  9106. "value" : "CWE-119"
  9107. } ]
  9108. } ]
  9109. },
  9110. "references" : {
  9111. "reference_data" : [ {
  9112. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO",
  9113. "name" : "20210505 Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities",
  9114. "refsource" : "CISCO",
  9115. "tags" : [ ]
  9116. } ]
  9117. },
  9118. "description" : {
  9119. "description_data" : [ {
  9120. "lang" : "en",
  9121. "value" : "Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
  9122. } ]
  9123. }
  9124. },
  9125. "configurations" : {
  9126. "CVE_data_version" : "4.0",
  9127. "nodes" : [ ]
  9128. },
  9129. "impact" : { },
  9130. "publishedDate" : "2021-05-06T13:15Z",
  9131. "lastModifiedDate" : "2021-05-06T13:16Z"
  9132. }, {
  9133. "cve" : {
  9134. "data_type" : "CVE",
  9135. "data_format" : "MITRE",
  9136. "data_version" : "4.0",
  9137. "CVE_data_meta" : {
  9138. "ID" : "CVE-2021-1510",
  9139. "ASSIGNER" : "psirt@cisco.com"
  9140. },
  9141. "problemtype" : {
  9142. "problemtype_data" : [ {
  9143. "description" : [ {
  9144. "lang" : "en",
  9145. "value" : "CWE-119"
  9146. } ]
  9147. } ]
  9148. },
  9149. "references" : {
  9150. "reference_data" : [ {
  9151. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO",
  9152. "name" : "20210505 Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities",
  9153. "refsource" : "CISCO",
  9154. "tags" : [ ]
  9155. } ]
  9156. },
  9157. "description" : {
  9158. "description_data" : [ {
  9159. "lang" : "en",
  9160. "value" : "Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
  9161. } ]
  9162. }
  9163. },
  9164. "configurations" : {
  9165. "CVE_data_version" : "4.0",
  9166. "nodes" : [ ]
  9167. },
  9168. "impact" : { },
  9169. "publishedDate" : "2021-05-06T13:15Z",
  9170. "lastModifiedDate" : "2021-05-06T13:16Z"
  9171. }, {
  9172. "cve" : {
  9173. "data_type" : "CVE",
  9174. "data_format" : "MITRE",
  9175. "data_version" : "4.0",
  9176. "CVE_data_meta" : {
  9177. "ID" : "CVE-2021-1509",
  9178. "ASSIGNER" : "psirt@cisco.com"
  9179. },
  9180. "problemtype" : {
  9181. "problemtype_data" : [ {
  9182. "description" : [ {
  9183. "lang" : "en",
  9184. "value" : "CWE-119"
  9185. } ]
  9186. } ]
  9187. },
  9188. "references" : {
  9189. "reference_data" : [ {
  9190. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO",
  9191. "name" : "20210505 Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities",
  9192. "refsource" : "CISCO",
  9193. "tags" : [ ]
  9194. } ]
  9195. },
  9196. "description" : {
  9197. "description_data" : [ {
  9198. "lang" : "en",
  9199. "value" : "Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
  9200. } ]
  9201. }
  9202. },
  9203. "configurations" : {
  9204. "CVE_data_version" : "4.0",
  9205. "nodes" : [ ]
  9206. },
  9207. "impact" : { },
  9208. "publishedDate" : "2021-05-06T13:15Z",
  9209. "lastModifiedDate" : "2021-05-06T13:16Z"
  9210. }, {
  9211. "cve" : {
  9212. "data_type" : "CVE",
  9213. "data_format" : "MITRE",
  9214. "data_version" : "4.0",
  9215. "CVE_data_meta" : {
  9216. "ID" : "CVE-2021-1508",
  9217. "ASSIGNER" : "psirt@cisco.com"
  9218. },
  9219. "problemtype" : {
  9220. "problemtype_data" : [ {
  9221. "description" : [ {
  9222. "lang" : "en",
  9223. "value" : "CWE-20"
  9224. } ]
  9225. } ]
  9226. },
  9227. "references" : {
  9228. "reference_data" : [ {
  9229. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ",
  9230. "name" : "20210505 Cisco SD-WAN vManage Software Vulnerabilities",
  9231. "refsource" : "CISCO",
  9232. "tags" : [ ]
  9233. } ]
  9234. },
  9235. "description" : {
  9236. "description_data" : [ {
  9237. "lang" : "en",
  9238. "value" : "Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorized access to the application. For more information about these vulnerabilities, see the Details section of this advisory."
  9239. } ]
  9240. }
  9241. },
  9242. "configurations" : {
  9243. "CVE_data_version" : "4.0",
  9244. "nodes" : [ ]
  9245. },
  9246. "impact" : { },
  9247. "publishedDate" : "2021-05-06T13:15Z",
  9248. "lastModifiedDate" : "2021-05-06T13:16Z"
  9249. }, {
  9250. "cve" : {
  9251. "data_type" : "CVE",
  9252. "data_format" : "MITRE",
  9253. "data_version" : "4.0",
  9254. "CVE_data_meta" : {
  9255. "ID" : "CVE-2021-1507",
  9256. "ASSIGNER" : "psirt@cisco.com"
  9257. },
  9258. "problemtype" : {
  9259. "problemtype_data" : [ {
  9260. "description" : [ {
  9261. "lang" : "en",
  9262. "value" : "CWE-79"
  9263. } ]
  9264. } ]
  9265. },
  9266. "references" : {
  9267. "reference_data" : [ {
  9268. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-xss-eN75jxtW",
  9269. "name" : "20210505 Cisco SD-WAN vManage API Stored Cross-Site Scripting Vulnerability",
  9270. "refsource" : "CISCO",
  9271. "tags" : [ ]
  9272. } ]
  9273. },
  9274. "description" : {
  9275. "description_data" : [ {
  9276. "lang" : "en",
  9277. "value" : "A vulnerability in an API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of the application web-based interface. This vulnerability exists because the API does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending malicious input to the API. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based interface or access sensitive, browser-based information."
  9278. } ]
  9279. }
  9280. },
  9281. "configurations" : {
  9282. "CVE_data_version" : "4.0",
  9283. "nodes" : [ ]
  9284. },
  9285. "impact" : { },
  9286. "publishedDate" : "2021-05-06T13:15Z",
  9287. "lastModifiedDate" : "2021-05-06T13:16Z"
  9288. }, {
  9289. "cve" : {
  9290. "data_type" : "CVE",
  9291. "data_format" : "MITRE",
  9292. "data_version" : "4.0",
  9293. "CVE_data_meta" : {
  9294. "ID" : "CVE-2021-1506",
  9295. "ASSIGNER" : "psirt@cisco.com"
  9296. },
  9297. "problemtype" : {
  9298. "problemtype_data" : [ {
  9299. "description" : [ {
  9300. "lang" : "en",
  9301. "value" : "CWE-20"
  9302. } ]
  9303. } ]
  9304. },
  9305. "references" : {
  9306. "reference_data" : [ {
  9307. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ",
  9308. "name" : "20210505 Cisco SD-WAN vManage Software Vulnerabilities",
  9309. "refsource" : "CISCO",
  9310. "tags" : [ ]
  9311. } ]
  9312. },
  9313. "description" : {
  9314. "description_data" : [ {
  9315. "lang" : "en",
  9316. "value" : "Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorized access to the application. For more information about these vulnerabilities, see the Details section of this advisory."
  9317. } ]
  9318. }
  9319. },
  9320. "configurations" : {
  9321. "CVE_data_version" : "4.0",
  9322. "nodes" : [ ]
  9323. },
  9324. "impact" : { },
  9325. "publishedDate" : "2021-05-06T13:15Z",
  9326. "lastModifiedDate" : "2021-05-06T13:16Z"
  9327. }, {
  9328. "cve" : {
  9329. "data_type" : "CVE",
  9330. "data_format" : "MITRE",
  9331. "data_version" : "4.0",
  9332. "CVE_data_meta" : {
  9333. "ID" : "CVE-2021-1505",
  9334. "ASSIGNER" : "psirt@cisco.com"
  9335. },
  9336. "problemtype" : {
  9337. "problemtype_data" : [ {
  9338. "description" : [ {
  9339. "lang" : "en",
  9340. "value" : "CWE-20"
  9341. } ]
  9342. } ]
  9343. },
  9344. "references" : {
  9345. "reference_data" : [ {
  9346. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ",
  9347. "name" : "20210505 Cisco SD-WAN vManage Software Vulnerabilities",
  9348. "refsource" : "CISCO",
  9349. "tags" : [ ]
  9350. } ]
  9351. },
  9352. "description" : {
  9353. "description_data" : [ {
  9354. "lang" : "en",
  9355. "value" : "Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorized access to the application. For more information about these vulnerabilities, see the Details section of this advisory."
  9356. } ]
  9357. }
  9358. },
  9359. "configurations" : {
  9360. "CVE_data_version" : "4.0",
  9361. "nodes" : [ ]
  9362. },
  9363. "impact" : { },
  9364. "publishedDate" : "2021-05-06T13:15Z",
  9365. "lastModifiedDate" : "2021-05-06T13:16Z"
  9366. }, {
  9367. "cve" : {
  9368. "data_type" : "CVE",
  9369. "data_format" : "MITRE",
  9370. "data_version" : "4.0",
  9371. "CVE_data_meta" : {
  9372. "ID" : "CVE-2021-1499",
  9373. "ASSIGNER" : "psirt@cisco.com"
  9374. },
  9375. "problemtype" : {
  9376. "problemtype_data" : [ {
  9377. "description" : [ {
  9378. "lang" : "en",
  9379. "value" : "CWE-306"
  9380. } ]
  9381. } ]
  9382. },
  9383. "references" : {
  9384. "reference_data" : [ {
  9385. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-upload-KtCK8Ugz",
  9386. "name" : "20210505 Cisco HyperFlex HX Data Platform File Upload Vulnerability",
  9387. "refsource" : "CISCO",
  9388. "tags" : [ ]
  9389. } ]
  9390. },
  9391. "description" : {
  9392. "description_data" : [ {
  9393. "lang" : "en",
  9394. "value" : "A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform could allow an unauthenticated, remote attacker to upload files to an affected device. This vulnerability is due to missing authentication for the upload function. An attacker could exploit this vulnerability by sending a specific HTTP request to an affected device. A successful exploit could allow the attacker to upload files to the affected device with the permissions of the tomcat8 user."
  9395. } ]
  9396. }
  9397. },
  9398. "configurations" : {
  9399. "CVE_data_version" : "4.0",
  9400. "nodes" : [ ]
  9401. },
  9402. "impact" : { },
  9403. "publishedDate" : "2021-05-06T13:15Z",
  9404. "lastModifiedDate" : "2021-05-06T13:16Z"
  9405. }, {
  9406. "cve" : {
  9407. "data_type" : "CVE",
  9408. "data_format" : "MITRE",
  9409. "data_version" : "4.0",
  9410. "CVE_data_meta" : {
  9411. "ID" : "CVE-2021-1498",
  9412. "ASSIGNER" : "psirt@cisco.com"
  9413. },
  9414. "problemtype" : {
  9415. "problemtype_data" : [ {
  9416. "description" : [ {
  9417. "lang" : "en",
  9418. "value" : "CWE-78"
  9419. } ]
  9420. } ]
  9421. },
  9422. "references" : {
  9423. "reference_data" : [ {
  9424. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-rce-TjjNrkpR",
  9425. "name" : "20210505 Cisco HyperFlex HX Command Injection Vulnerabilities",
  9426. "refsource" : "CISCO",
  9427. "tags" : [ ]
  9428. } ]
  9429. },
  9430. "description" : {
  9431. "description_data" : [ {
  9432. "lang" : "en",
  9433. "value" : "Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
  9434. } ]
  9435. }
  9436. },
  9437. "configurations" : {
  9438. "CVE_data_version" : "4.0",
  9439. "nodes" : [ ]
  9440. },
  9441. "impact" : { },
  9442. "publishedDate" : "2021-05-06T13:15Z",
  9443. "lastModifiedDate" : "2021-05-06T13:16Z"
  9444. }, {
  9445. "cve" : {
  9446. "data_type" : "CVE",
  9447. "data_format" : "MITRE",
  9448. "data_version" : "4.0",
  9449. "CVE_data_meta" : {
  9450. "ID" : "CVE-2021-1497",
  9451. "ASSIGNER" : "psirt@cisco.com"
  9452. },
  9453. "problemtype" : {
  9454. "problemtype_data" : [ {
  9455. "description" : [ {
  9456. "lang" : "en",
  9457. "value" : "CWE-78"
  9458. } ]
  9459. } ]
  9460. },
  9461. "references" : {
  9462. "reference_data" : [ {
  9463. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-rce-TjjNrkpR",
  9464. "name" : "20210505 Cisco HyperFlex HX Command Injection Vulnerabilities",
  9465. "refsource" : "CISCO",
  9466. "tags" : [ ]
  9467. } ]
  9468. },
  9469. "description" : {
  9470. "description_data" : [ {
  9471. "lang" : "en",
  9472. "value" : "Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
  9473. } ]
  9474. }
  9475. },
  9476. "configurations" : {
  9477. "CVE_data_version" : "4.0",
  9478. "nodes" : [ ]
  9479. },
  9480. "impact" : { },
  9481. "publishedDate" : "2021-05-06T13:15Z",
  9482. "lastModifiedDate" : "2021-05-06T13:16Z"
  9483. }, {
  9484. "cve" : {
  9485. "data_type" : "CVE",
  9486. "data_format" : "MITRE",
  9487. "data_version" : "4.0",
  9488. "CVE_data_meta" : {
  9489. "ID" : "CVE-2021-1496",
  9490. "ASSIGNER" : "psirt@cisco.com"
  9491. },
  9492. "problemtype" : {
  9493. "problemtype_data" : [ {
  9494. "description" : [ {
  9495. "lang" : "en",
  9496. "value" : "CWE-427"
  9497. } ]
  9498. } ]
  9499. },
  9500. "references" : {
  9501. "reference_data" : [ {
  9502. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6",
  9503. "name" : "20210505 Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities",
  9504. "refsource" : "CISCO",
  9505. "tags" : [ "Vendor Advisory" ]
  9506. } ]
  9507. },
  9508. "description" : {
  9509. "description_data" : [ {
  9510. "lang" : "en",
  9511. "value" : "Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory."
  9512. } ]
  9513. }
  9514. },
  9515. "configurations" : {
  9516. "CVE_data_version" : "4.0",
  9517. "nodes" : [ {
  9518. "operator" : "OR",
  9519. "children" : [ ],
  9520. "cpe_match" : [ {
  9521. "vulnerable" : true,
  9522. "cpe23Uri" : "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:windows:*:*",
  9523. "versionEndExcluding" : "4.9.03022:",
  9524. "cpe_name" : [ ]
  9525. } ]
  9526. } ]
  9527. },
  9528. "impact" : {
  9529. "baseMetricV3" : {
  9530. "cvssV3" : {
  9531. "version" : "3.1",
  9532. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  9533. "attackVector" : "LOCAL",
  9534. "attackComplexity" : "LOW",
  9535. "privilegesRequired" : "LOW",
  9536. "userInteraction" : "NONE",
  9537. "scope" : "UNCHANGED",
  9538. "confidentialityImpact" : "HIGH",
  9539. "integrityImpact" : "HIGH",
  9540. "availabilityImpact" : "HIGH",
  9541. "baseScore" : 7.8,
  9542. "baseSeverity" : "HIGH"
  9543. },
  9544. "exploitabilityScore" : 1.8,
  9545. "impactScore" : 5.9
  9546. },
  9547. "baseMetricV2" : {
  9548. "cvssV2" : {
  9549. "version" : "2.0",
  9550. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  9551. "accessVector" : "LOCAL",
  9552. "accessComplexity" : "LOW",
  9553. "authentication" : "NONE",
  9554. "confidentialityImpact" : "COMPLETE",
  9555. "integrityImpact" : "COMPLETE",
  9556. "availabilityImpact" : "COMPLETE",
  9557. "baseScore" : 7.2
  9558. },
  9559. "severity" : "HIGH",
  9560. "exploitabilityScore" : 3.9,
  9561. "impactScore" : 10.0,
  9562. "acInsufInfo" : false,
  9563. "obtainAllPrivilege" : false,
  9564. "obtainUserPrivilege" : false,
  9565. "obtainOtherPrivilege" : false,
  9566. "userInteractionRequired" : false
  9567. }
  9568. },
  9569. "publishedDate" : "2021-05-06T13:15Z",
  9570. "lastModifiedDate" : "2021-05-07T21:10Z"
  9571. }, {
  9572. "cve" : {
  9573. "data_type" : "CVE",
  9574. "data_format" : "MITRE",
  9575. "data_version" : "4.0",
  9576. "CVE_data_meta" : {
  9577. "ID" : "CVE-2021-1490",
  9578. "ASSIGNER" : "psirt@cisco.com"
  9579. },
  9580. "problemtype" : {
  9581. "problemtype_data" : [ {
  9582. "description" : [ {
  9583. "lang" : "en",
  9584. "value" : "CWE-79"
  9585. } ]
  9586. } ]
  9587. },
  9588. "references" : {
  9589. "reference_data" : [ {
  9590. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-xss-mVjOWchB",
  9591. "name" : "20210505 Cisco Web Security Appliance Cross-Site Scripting Vulnerability",
  9592. "refsource" : "CISCO",
  9593. "tags" : [ ]
  9594. } ]
  9595. },
  9596. "description" : {
  9597. "description_data" : [ {
  9598. "lang" : "en",
  9599. "value" : "A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by persuading a user to retrieve a crafted file that contains malicious payload and upload it to the affected device. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
  9600. } ]
  9601. }
  9602. },
  9603. "configurations" : {
  9604. "CVE_data_version" : "4.0",
  9605. "nodes" : [ ]
  9606. },
  9607. "impact" : { },
  9608. "publishedDate" : "2021-05-06T13:15Z",
  9609. "lastModifiedDate" : "2021-05-06T13:16Z"
  9610. }, {
  9611. "cve" : {
  9612. "data_type" : "CVE",
  9613. "data_format" : "MITRE",
  9614. "data_version" : "4.0",
  9615. "CVE_data_meta" : {
  9616. "ID" : "CVE-2021-1486",
  9617. "ASSIGNER" : "psirt@cisco.com"
  9618. },
  9619. "problemtype" : {
  9620. "problemtype_data" : [ {
  9621. "description" : [ {
  9622. "lang" : "en",
  9623. "value" : "CWE-203"
  9624. } ]
  9625. } ]
  9626. },
  9627. "references" : {
  9628. "reference_data" : [ {
  9629. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-enumeration-64eNnDKy",
  9630. "name" : "20210505 Cisco SD-WAN vManage HTTP Authentication User Enumeration Vulnerability",
  9631. "refsource" : "CISCO",
  9632. "tags" : [ ]
  9633. } ]
  9634. },
  9635. "description" : {
  9636. "description_data" : [ {
  9637. "lang" : "en",
  9638. "value" : "A vulnerability in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to enumerate user accounts. This vulnerability is due to the improper handling of HTTP headers. An attacker could exploit this vulnerability by sending authenticated requests to an affected system. A successful exploit could allow the attacker to compare the HTTP responses that are returned by the affected system to determine which accounts are valid user accounts."
  9639. } ]
  9640. }
  9641. },
  9642. "configurations" : {
  9643. "CVE_data_version" : "4.0",
  9644. "nodes" : [ ]
  9645. },
  9646. "impact" : { },
  9647. "publishedDate" : "2021-05-06T13:15Z",
  9648. "lastModifiedDate" : "2021-05-06T13:16Z"
  9649. }, {
  9650. "cve" : {
  9651. "data_type" : "CVE",
  9652. "data_format" : "MITRE",
  9653. "data_version" : "4.0",
  9654. "CVE_data_meta" : {
  9655. "ID" : "CVE-2021-1478",
  9656. "ASSIGNER" : "psirt@cisco.com"
  9657. },
  9658. "problemtype" : {
  9659. "problemtype_data" : [ {
  9660. "description" : [ ]
  9661. } ]
  9662. },
  9663. "references" : {
  9664. "reference_data" : [ {
  9665. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-dos-OO4SRYEf",
  9666. "name" : "20210505 Cisco Unified Communications Manager Denial of Service Vulnerability",
  9667. "refsource" : "CISCO",
  9668. "tags" : [ ]
  9669. } ]
  9670. },
  9671. "description" : {
  9672. "description_data" : [ {
  9673. "lang" : "en",
  9674. "value" : "A vulnerability in the Java Management Extensions (JMX) component of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to an unsecured TCP/IP port. An attacker could exploit this vulnerability by accessing the port and restarting the JMX process. A successful exploit could allow the attacker to cause a DoS condition on an affected system."
  9675. } ]
  9676. }
  9677. },
  9678. "configurations" : {
  9679. "CVE_data_version" : "4.0",
  9680. "nodes" : [ ]
  9681. },
  9682. "impact" : { },
  9683. "publishedDate" : "2021-05-06T13:15Z",
  9684. "lastModifiedDate" : "2021-05-06T13:16Z"
  9685. }, {
  9686. "cve" : {
  9687. "data_type" : "CVE",
  9688. "data_format" : "MITRE",
  9689. "data_version" : "4.0",
  9690. "CVE_data_meta" : {
  9691. "ID" : "CVE-2021-1468",
  9692. "ASSIGNER" : "psirt@cisco.com"
  9693. },
  9694. "problemtype" : {
  9695. "problemtype_data" : [ {
  9696. "description" : [ {
  9697. "lang" : "en",
  9698. "value" : "CWE-20"
  9699. } ]
  9700. } ]
  9701. },
  9702. "references" : {
  9703. "reference_data" : [ {
  9704. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ",
  9705. "name" : "20210505 Cisco SD-WAN vManage Software Vulnerabilities",
  9706. "refsource" : "CISCO",
  9707. "tags" : [ ]
  9708. } ]
  9709. },
  9710. "description" : {
  9711. "description_data" : [ {
  9712. "lang" : "en",
  9713. "value" : "Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorized access to the application. For more information about these vulnerabilities, see the Details section of this advisory."
  9714. } ]
  9715. }
  9716. },
  9717. "configurations" : {
  9718. "CVE_data_version" : "4.0",
  9719. "nodes" : [ ]
  9720. },
  9721. "impact" : { },
  9722. "publishedDate" : "2021-05-06T13:15Z",
  9723. "lastModifiedDate" : "2021-05-06T13:16Z"
  9724. }, {
  9725. "cve" : {
  9726. "data_type" : "CVE",
  9727. "data_format" : "MITRE",
  9728. "data_version" : "4.0",
  9729. "CVE_data_meta" : {
  9730. "ID" : "CVE-2021-1447",
  9731. "ASSIGNER" : "psirt@cisco.com"
  9732. },
  9733. "problemtype" : {
  9734. "problemtype_data" : [ {
  9735. "description" : [ {
  9736. "lang" : "en",
  9737. "value" : "CWE-269"
  9738. } ]
  9739. } ]
  9740. },
  9741. "references" : {
  9742. "reference_data" : [ {
  9743. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-priv-esc-JJ8zxQsC",
  9744. "name" : "20210505 Cisco Content Security Management Appliance Privilege Escalation Vulnerability",
  9745. "refsource" : "CISCO",
  9746. "tags" : [ ]
  9747. } ]
  9748. },
  9749. "description" : {
  9750. "description_data" : [ {
  9751. "lang" : "en",
  9752. "value" : "A vulnerability in the user account management system of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, local attacker to elevate their privileges to root. This vulnerability is due to a procedural flaw in the password generation algorithm. An attacker could exploit this vulnerability by enabling specific Administrator-only features and connecting to the appliance through the CLI with elevated privileges. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system. To exploit this vulnerability, the attacker must have valid Administrator credentials."
  9753. } ]
  9754. }
  9755. },
  9756. "configurations" : {
  9757. "CVE_data_version" : "4.0",
  9758. "nodes" : [ ]
  9759. },
  9760. "impact" : { },
  9761. "publishedDate" : "2021-05-06T13:15Z",
  9762. "lastModifiedDate" : "2021-05-06T13:16Z"
  9763. }, {
  9764. "cve" : {
  9765. "data_type" : "CVE",
  9766. "data_format" : "MITRE",
  9767. "data_version" : "4.0",
  9768. "CVE_data_meta" : {
  9769. "ID" : "CVE-2021-1438",
  9770. "ASSIGNER" : "psirt@cisco.com"
  9771. },
  9772. "problemtype" : {
  9773. "problemtype_data" : [ {
  9774. "description" : [ {
  9775. "lang" : "en",
  9776. "value" : "CWE-668"
  9777. } ]
  9778. } ]
  9779. },
  9780. "references" : {
  9781. "reference_data" : [ {
  9782. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-waas-infdisc-Twb4EypK",
  9783. "name" : "20210505 Cisco Wide Area Application Services Software Information Disclosure Vulnerability",
  9784. "refsource" : "CISCO",
  9785. "tags" : [ ]
  9786. } ]
  9787. },
  9788. "description" : {
  9789. "description_data" : [ {
  9790. "lang" : "en",
  9791. "value" : "A vulnerability in Cisco Wide Area Application Services (WAAS) Software could allow an authenticated, local attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper input validation and authorization of specific commands that a user can execute within the CLI. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to read arbitrary files that they originally did not have permissions to access."
  9792. } ]
  9793. }
  9794. },
  9795. "configurations" : {
  9796. "CVE_data_version" : "4.0",
  9797. "nodes" : [ ]
  9798. },
  9799. "impact" : { },
  9800. "publishedDate" : "2021-05-06T13:15Z",
  9801. "lastModifiedDate" : "2021-05-06T13:16Z"
  9802. }, {
  9803. "cve" : {
  9804. "data_type" : "CVE",
  9805. "data_format" : "MITRE",
  9806. "data_version" : "4.0",
  9807. "CVE_data_meta" : {
  9808. "ID" : "CVE-2021-1430",
  9809. "ASSIGNER" : "psirt@cisco.com"
  9810. },
  9811. "problemtype" : {
  9812. "problemtype_data" : [ {
  9813. "description" : [ {
  9814. "lang" : "en",
  9815. "value" : "CWE-427"
  9816. } ]
  9817. } ]
  9818. },
  9819. "references" : {
  9820. "reference_data" : [ {
  9821. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6",
  9822. "name" : "20210505 Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities",
  9823. "refsource" : "CISCO",
  9824. "tags" : [ "Vendor Advisory" ]
  9825. } ]
  9826. },
  9827. "description" : {
  9828. "description_data" : [ {
  9829. "lang" : "en",
  9830. "value" : "Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory."
  9831. } ]
  9832. }
  9833. },
  9834. "configurations" : {
  9835. "CVE_data_version" : "4.0",
  9836. "nodes" : [ {
  9837. "operator" : "OR",
  9838. "children" : [ ],
  9839. "cpe_match" : [ {
  9840. "vulnerable" : true,
  9841. "cpe23Uri" : "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:windows:*:*",
  9842. "versionEndExcluding" : "4.9.06037:",
  9843. "cpe_name" : [ ]
  9844. } ]
  9845. } ]
  9846. },
  9847. "impact" : {
  9848. "baseMetricV3" : {
  9849. "cvssV3" : {
  9850. "version" : "3.1",
  9851. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  9852. "attackVector" : "LOCAL",
  9853. "attackComplexity" : "LOW",
  9854. "privilegesRequired" : "LOW",
  9855. "userInteraction" : "NONE",
  9856. "scope" : "UNCHANGED",
  9857. "confidentialityImpact" : "HIGH",
  9858. "integrityImpact" : "HIGH",
  9859. "availabilityImpact" : "HIGH",
  9860. "baseScore" : 7.8,
  9861. "baseSeverity" : "HIGH"
  9862. },
  9863. "exploitabilityScore" : 1.8,
  9864. "impactScore" : 5.9
  9865. },
  9866. "baseMetricV2" : {
  9867. "cvssV2" : {
  9868. "version" : "2.0",
  9869. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  9870. "accessVector" : "LOCAL",
  9871. "accessComplexity" : "LOW",
  9872. "authentication" : "NONE",
  9873. "confidentialityImpact" : "COMPLETE",
  9874. "integrityImpact" : "COMPLETE",
  9875. "availabilityImpact" : "COMPLETE",
  9876. "baseScore" : 7.2
  9877. },
  9878. "severity" : "HIGH",
  9879. "exploitabilityScore" : 3.9,
  9880. "impactScore" : 10.0,
  9881. "acInsufInfo" : false,
  9882. "obtainAllPrivilege" : false,
  9883. "obtainUserPrivilege" : false,
  9884. "obtainOtherPrivilege" : false,
  9885. "userInteractionRequired" : false
  9886. }
  9887. },
  9888. "publishedDate" : "2021-05-06T13:15Z",
  9889. "lastModifiedDate" : "2021-05-07T21:09Z"
  9890. }, {
  9891. "cve" : {
  9892. "data_type" : "CVE",
  9893. "data_format" : "MITRE",
  9894. "data_version" : "4.0",
  9895. "CVE_data_meta" : {
  9896. "ID" : "CVE-2021-1429",
  9897. "ASSIGNER" : "psirt@cisco.com"
  9898. },
  9899. "problemtype" : {
  9900. "problemtype_data" : [ {
  9901. "description" : [ {
  9902. "lang" : "en",
  9903. "value" : "CWE-427"
  9904. } ]
  9905. } ]
  9906. },
  9907. "references" : {
  9908. "reference_data" : [ {
  9909. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6",
  9910. "name" : "20210505 Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities",
  9911. "refsource" : "CISCO",
  9912. "tags" : [ "Vendor Advisory" ]
  9913. } ]
  9914. },
  9915. "description" : {
  9916. "description_data" : [ {
  9917. "lang" : "en",
  9918. "value" : "Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory."
  9919. } ]
  9920. }
  9921. },
  9922. "configurations" : {
  9923. "CVE_data_version" : "4.0",
  9924. "nodes" : [ {
  9925. "operator" : "OR",
  9926. "children" : [ ],
  9927. "cpe_match" : [ {
  9928. "vulnerable" : true,
  9929. "cpe23Uri" : "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:windows:*:*",
  9930. "versionEndExcluding" : "4.10.00093:",
  9931. "cpe_name" : [ ]
  9932. } ]
  9933. } ]
  9934. },
  9935. "impact" : {
  9936. "baseMetricV3" : {
  9937. "cvssV3" : {
  9938. "version" : "3.1",
  9939. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  9940. "attackVector" : "LOCAL",
  9941. "attackComplexity" : "LOW",
  9942. "privilegesRequired" : "LOW",
  9943. "userInteraction" : "NONE",
  9944. "scope" : "UNCHANGED",
  9945. "confidentialityImpact" : "HIGH",
  9946. "integrityImpact" : "HIGH",
  9947. "availabilityImpact" : "HIGH",
  9948. "baseScore" : 7.8,
  9949. "baseSeverity" : "HIGH"
  9950. },
  9951. "exploitabilityScore" : 1.8,
  9952. "impactScore" : 5.9
  9953. },
  9954. "baseMetricV2" : {
  9955. "cvssV2" : {
  9956. "version" : "2.0",
  9957. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  9958. "accessVector" : "LOCAL",
  9959. "accessComplexity" : "LOW",
  9960. "authentication" : "NONE",
  9961. "confidentialityImpact" : "COMPLETE",
  9962. "integrityImpact" : "COMPLETE",
  9963. "availabilityImpact" : "COMPLETE",
  9964. "baseScore" : 7.2
  9965. },
  9966. "severity" : "HIGH",
  9967. "exploitabilityScore" : 3.9,
  9968. "impactScore" : 10.0,
  9969. "acInsufInfo" : false,
  9970. "obtainAllPrivilege" : false,
  9971. "obtainUserPrivilege" : false,
  9972. "obtainOtherPrivilege" : false,
  9973. "userInteractionRequired" : false
  9974. }
  9975. },
  9976. "publishedDate" : "2021-05-06T13:15Z",
  9977. "lastModifiedDate" : "2021-05-07T21:00Z"
  9978. }, {
  9979. "cve" : {
  9980. "data_type" : "CVE",
  9981. "data_format" : "MITRE",
  9982. "data_version" : "4.0",
  9983. "CVE_data_meta" : {
  9984. "ID" : "CVE-2021-1428",
  9985. "ASSIGNER" : "psirt@cisco.com"
  9986. },
  9987. "problemtype" : {
  9988. "problemtype_data" : [ {
  9989. "description" : [ {
  9990. "lang" : "en",
  9991. "value" : "CWE-427"
  9992. } ]
  9993. } ]
  9994. },
  9995. "references" : {
  9996. "reference_data" : [ {
  9997. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6",
  9998. "name" : "20210505 Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities",
  9999. "refsource" : "CISCO",
  10000. "tags" : [ "Vendor Advisory" ]
  10001. } ]
  10002. },
  10003. "description" : {
  10004. "description_data" : [ {
  10005. "lang" : "en",
  10006. "value" : "Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory."
  10007. } ]
  10008. }
  10009. },
  10010. "configurations" : {
  10011. "CVE_data_version" : "4.0",
  10012. "nodes" : [ {
  10013. "operator" : "OR",
  10014. "children" : [ ],
  10015. "cpe_match" : [ {
  10016. "vulnerable" : true,
  10017. "cpe23Uri" : "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:windows:*:*",
  10018. "versionEndExcluding" : "4.10.00093:",
  10019. "cpe_name" : [ ]
  10020. } ]
  10021. } ]
  10022. },
  10023. "impact" : {
  10024. "baseMetricV3" : {
  10025. "cvssV3" : {
  10026. "version" : "3.1",
  10027. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  10028. "attackVector" : "LOCAL",
  10029. "attackComplexity" : "LOW",
  10030. "privilegesRequired" : "LOW",
  10031. "userInteraction" : "NONE",
  10032. "scope" : "UNCHANGED",
  10033. "confidentialityImpact" : "HIGH",
  10034. "integrityImpact" : "HIGH",
  10035. "availabilityImpact" : "HIGH",
  10036. "baseScore" : 7.8,
  10037. "baseSeverity" : "HIGH"
  10038. },
  10039. "exploitabilityScore" : 1.8,
  10040. "impactScore" : 5.9
  10041. },
  10042. "baseMetricV2" : {
  10043. "cvssV2" : {
  10044. "version" : "2.0",
  10045. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  10046. "accessVector" : "LOCAL",
  10047. "accessComplexity" : "LOW",
  10048. "authentication" : "NONE",
  10049. "confidentialityImpact" : "COMPLETE",
  10050. "integrityImpact" : "COMPLETE",
  10051. "availabilityImpact" : "COMPLETE",
  10052. "baseScore" : 7.2
  10053. },
  10054. "severity" : "HIGH",
  10055. "exploitabilityScore" : 3.9,
  10056. "impactScore" : 10.0,
  10057. "acInsufInfo" : false,
  10058. "obtainAllPrivilege" : false,
  10059. "obtainUserPrivilege" : false,
  10060. "obtainOtherPrivilege" : false,
  10061. "userInteractionRequired" : false
  10062. }
  10063. },
  10064. "publishedDate" : "2021-05-06T13:15Z",
  10065. "lastModifiedDate" : "2021-05-07T20:59Z"
  10066. }, {
  10067. "cve" : {
  10068. "data_type" : "CVE",
  10069. "data_format" : "MITRE",
  10070. "data_version" : "4.0",
  10071. "CVE_data_meta" : {
  10072. "ID" : "CVE-2021-1427",
  10073. "ASSIGNER" : "psirt@cisco.com"
  10074. },
  10075. "problemtype" : {
  10076. "problemtype_data" : [ {
  10077. "description" : [ {
  10078. "lang" : "en",
  10079. "value" : "CWE-427"
  10080. } ]
  10081. } ]
  10082. },
  10083. "references" : {
  10084. "reference_data" : [ {
  10085. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6",
  10086. "name" : "20210505 Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities",
  10087. "refsource" : "CISCO",
  10088. "tags" : [ "Vendor Advisory" ]
  10089. } ]
  10090. },
  10091. "description" : {
  10092. "description_data" : [ {
  10093. "lang" : "en",
  10094. "value" : "Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory."
  10095. } ]
  10096. }
  10097. },
  10098. "configurations" : {
  10099. "CVE_data_version" : "4.0",
  10100. "nodes" : [ {
  10101. "operator" : "OR",
  10102. "children" : [ ],
  10103. "cpe_match" : [ {
  10104. "vulnerable" : true,
  10105. "cpe23Uri" : "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:windows:*:*",
  10106. "versionEndExcluding" : "4.9.06037:",
  10107. "cpe_name" : [ ]
  10108. } ]
  10109. } ]
  10110. },
  10111. "impact" : {
  10112. "baseMetricV3" : {
  10113. "cvssV3" : {
  10114. "version" : "3.1",
  10115. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  10116. "attackVector" : "LOCAL",
  10117. "attackComplexity" : "LOW",
  10118. "privilegesRequired" : "LOW",
  10119. "userInteraction" : "NONE",
  10120. "scope" : "UNCHANGED",
  10121. "confidentialityImpact" : "HIGH",
  10122. "integrityImpact" : "HIGH",
  10123. "availabilityImpact" : "HIGH",
  10124. "baseScore" : 7.8,
  10125. "baseSeverity" : "HIGH"
  10126. },
  10127. "exploitabilityScore" : 1.8,
  10128. "impactScore" : 5.9
  10129. },
  10130. "baseMetricV2" : {
  10131. "cvssV2" : {
  10132. "version" : "2.0",
  10133. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  10134. "accessVector" : "LOCAL",
  10135. "accessComplexity" : "LOW",
  10136. "authentication" : "NONE",
  10137. "confidentialityImpact" : "COMPLETE",
  10138. "integrityImpact" : "COMPLETE",
  10139. "availabilityImpact" : "COMPLETE",
  10140. "baseScore" : 7.2
  10141. },
  10142. "severity" : "HIGH",
  10143. "exploitabilityScore" : 3.9,
  10144. "impactScore" : 10.0,
  10145. "acInsufInfo" : false,
  10146. "obtainAllPrivilege" : false,
  10147. "obtainUserPrivilege" : false,
  10148. "obtainOtherPrivilege" : false,
  10149. "userInteractionRequired" : false
  10150. }
  10151. },
  10152. "publishedDate" : "2021-05-06T13:15Z",
  10153. "lastModifiedDate" : "2021-05-07T20:59Z"
  10154. }, {
  10155. "cve" : {
  10156. "data_type" : "CVE",
  10157. "data_format" : "MITRE",
  10158. "data_version" : "4.0",
  10159. "CVE_data_meta" : {
  10160. "ID" : "CVE-2021-1426",
  10161. "ASSIGNER" : "psirt@cisco.com"
  10162. },
  10163. "problemtype" : {
  10164. "problemtype_data" : [ {
  10165. "description" : [ {
  10166. "lang" : "en",
  10167. "value" : "CWE-427"
  10168. } ]
  10169. } ]
  10170. },
  10171. "references" : {
  10172. "reference_data" : [ {
  10173. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6",
  10174. "name" : "20210505 Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities",
  10175. "refsource" : "CISCO",
  10176. "tags" : [ "Vendor Advisory" ]
  10177. } ]
  10178. },
  10179. "description" : {
  10180. "description_data" : [ {
  10181. "lang" : "en",
  10182. "value" : "Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory."
  10183. } ]
  10184. }
  10185. },
  10186. "configurations" : {
  10187. "CVE_data_version" : "4.0",
  10188. "nodes" : [ {
  10189. "operator" : "OR",
  10190. "children" : [ ],
  10191. "cpe_match" : [ {
  10192. "vulnerable" : true,
  10193. "cpe23Uri" : "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:windows:*:*",
  10194. "versionEndExcluding" : "4.9.06037:",
  10195. "cpe_name" : [ ]
  10196. } ]
  10197. } ]
  10198. },
  10199. "impact" : {
  10200. "baseMetricV3" : {
  10201. "cvssV3" : {
  10202. "version" : "3.1",
  10203. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  10204. "attackVector" : "LOCAL",
  10205. "attackComplexity" : "LOW",
  10206. "privilegesRequired" : "LOW",
  10207. "userInteraction" : "NONE",
  10208. "scope" : "UNCHANGED",
  10209. "confidentialityImpact" : "HIGH",
  10210. "integrityImpact" : "HIGH",
  10211. "availabilityImpact" : "HIGH",
  10212. "baseScore" : 7.8,
  10213. "baseSeverity" : "HIGH"
  10214. },
  10215. "exploitabilityScore" : 1.8,
  10216. "impactScore" : 5.9
  10217. },
  10218. "baseMetricV2" : {
  10219. "cvssV2" : {
  10220. "version" : "2.0",
  10221. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  10222. "accessVector" : "LOCAL",
  10223. "accessComplexity" : "LOW",
  10224. "authentication" : "NONE",
  10225. "confidentialityImpact" : "COMPLETE",
  10226. "integrityImpact" : "COMPLETE",
  10227. "availabilityImpact" : "COMPLETE",
  10228. "baseScore" : 7.2
  10229. },
  10230. "severity" : "HIGH",
  10231. "exploitabilityScore" : 3.9,
  10232. "impactScore" : 10.0,
  10233. "acInsufInfo" : false,
  10234. "obtainAllPrivilege" : false,
  10235. "obtainUserPrivilege" : false,
  10236. "obtainOtherPrivilege" : false,
  10237. "userInteractionRequired" : false
  10238. }
  10239. },
  10240. "publishedDate" : "2021-05-06T13:15Z",
  10241. "lastModifiedDate" : "2021-05-07T20:59Z"
  10242. }, {
  10243. "cve" : {
  10244. "data_type" : "CVE",
  10245. "data_format" : "MITRE",
  10246. "data_version" : "4.0",
  10247. "CVE_data_meta" : {
  10248. "ID" : "CVE-2021-1421",
  10249. "ASSIGNER" : "psirt@cisco.com"
  10250. },
  10251. "problemtype" : {
  10252. "problemtype_data" : [ {
  10253. "description" : [ {
  10254. "lang" : "en",
  10255. "value" : "CWE-78"
  10256. } ]
  10257. } ]
  10258. },
  10259. "references" : {
  10260. "reference_data" : [ {
  10261. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-cmdinj-DkFjqg2j",
  10262. "name" : "20210505 Cisco Enterprise NFV Infrastructure Software Command Injection Vulnerability",
  10263. "refsource" : "CISCO",
  10264. "tags" : [ ]
  10265. } ]
  10266. },
  10267. "description" : {
  10268. "description_data" : [ {
  10269. "lang" : "en",
  10270. "value" : "A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to perform a command injection attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to a configuration command. An attacker could exploit this vulnerability by including malicious input during the execution of this command. A successful exploit could allow a non-privileged attacker authenticated in the restricted CLI to execute arbitrary commands on the underlying operating system (OS) with root privileges."
  10271. } ]
  10272. }
  10273. },
  10274. "configurations" : {
  10275. "CVE_data_version" : "4.0",
  10276. "nodes" : [ ]
  10277. },
  10278. "impact" : { },
  10279. "publishedDate" : "2021-05-06T13:15Z",
  10280. "lastModifiedDate" : "2021-05-06T13:16Z"
  10281. }, {
  10282. "cve" : {
  10283. "data_type" : "CVE",
  10284. "data_format" : "MITRE",
  10285. "data_version" : "4.0",
  10286. "CVE_data_meta" : {
  10287. "ID" : "CVE-2021-1401",
  10288. "ASSIGNER" : "psirt@cisco.com"
  10289. },
  10290. "problemtype" : {
  10291. "problemtype_data" : [ {
  10292. "description" : [ {
  10293. "lang" : "en",
  10294. "value" : "CWE-269"
  10295. } ]
  10296. } ]
  10297. },
  10298. "references" : {
  10299. "reference_data" : [ {
  10300. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF",
  10301. "name" : "20210505 Cisco Small Business 100, 300, and 500 Series Wireless Access Points Vulnerabilities",
  10302. "refsource" : "CISCO",
  10303. "tags" : [ ]
  10304. } ]
  10305. },
  10306. "description" : {
  10307. "description_data" : [ {
  10308. "lang" : "en",
  10309. "value" : "Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote attacker to obtain sensitive information from or inject arbitrary commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
  10310. } ]
  10311. }
  10312. },
  10313. "configurations" : {
  10314. "CVE_data_version" : "4.0",
  10315. "nodes" : [ ]
  10316. },
  10317. "impact" : { },
  10318. "publishedDate" : "2021-05-06T13:15Z",
  10319. "lastModifiedDate" : "2021-05-06T13:16Z"
  10320. }, {
  10321. "cve" : {
  10322. "data_type" : "CVE",
  10323. "data_format" : "MITRE",
  10324. "data_version" : "4.0",
  10325. "CVE_data_meta" : {
  10326. "ID" : "CVE-2021-1400",
  10327. "ASSIGNER" : "psirt@cisco.com"
  10328. },
  10329. "problemtype" : {
  10330. "problemtype_data" : [ {
  10331. "description" : [ {
  10332. "lang" : "en",
  10333. "value" : "CWE-269"
  10334. } ]
  10335. } ]
  10336. },
  10337. "references" : {
  10338. "reference_data" : [ {
  10339. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF",
  10340. "name" : "20210505 Cisco Small Business 100, 300, and 500 Series Wireless Access Points Vulnerabilities",
  10341. "refsource" : "CISCO",
  10342. "tags" : [ ]
  10343. } ]
  10344. },
  10345. "description" : {
  10346. "description_data" : [ {
  10347. "lang" : "en",
  10348. "value" : "Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote attacker to obtain sensitive information from or inject arbitrary commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
  10349. } ]
  10350. }
  10351. },
  10352. "configurations" : {
  10353. "CVE_data_version" : "4.0",
  10354. "nodes" : [ ]
  10355. },
  10356. "impact" : { },
  10357. "publishedDate" : "2021-05-06T13:15Z",
  10358. "lastModifiedDate" : "2021-05-06T13:16Z"
  10359. }, {
  10360. "cve" : {
  10361. "data_type" : "CVE",
  10362. "data_format" : "MITRE",
  10363. "data_version" : "4.0",
  10364. "CVE_data_meta" : {
  10365. "ID" : "CVE-2021-1397",
  10366. "ASSIGNER" : "psirt@cisco.com"
  10367. },
  10368. "problemtype" : {
  10369. "problemtype_data" : [ {
  10370. "description" : [ {
  10371. "lang" : "en",
  10372. "value" : "CWE-601"
  10373. } ]
  10374. } ]
  10375. },
  10376. "references" : {
  10377. "reference_data" : [ {
  10378. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imc-openred-zAYrU6d2",
  10379. "name" : "20210505 Cisco Integrated Management Controller Open Redirect Vulnerability",
  10380. "refsource" : "CISCO",
  10381. "tags" : [ ]
  10382. } ]
  10383. },
  10384. "description" : {
  10385. "description_data" : [ {
  10386. "lang" : "en",
  10387. "value" : "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability is known as an open redirect attack, which is used in phishing attacks to get users to visit malicious sites without their knowledge."
  10388. } ]
  10389. }
  10390. },
  10391. "configurations" : {
  10392. "CVE_data_version" : "4.0",
  10393. "nodes" : [ ]
  10394. },
  10395. "impact" : { },
  10396. "publishedDate" : "2021-05-06T13:15Z",
  10397. "lastModifiedDate" : "2021-05-06T13:16Z"
  10398. }, {
  10399. "cve" : {
  10400. "data_type" : "CVE",
  10401. "data_format" : "MITRE",
  10402. "data_version" : "4.0",
  10403. "CVE_data_meta" : {
  10404. "ID" : "CVE-2021-1365",
  10405. "ASSIGNER" : "psirt@cisco.com"
  10406. },
  10407. "problemtype" : {
  10408. "problemtype_data" : [ {
  10409. "description" : [ ]
  10410. } ]
  10411. },
  10412. "references" : {
  10413. "reference_data" : [ {
  10414. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-inj-ereCOKjR",
  10415. "name" : "20210505 Cisco Unified Communications Manager IM & Presence Service SQL Injection Vulnerabilities",
  10416. "refsource" : "CISCO",
  10417. "tags" : [ ]
  10418. } ]
  10419. },
  10420. "description" : {
  10421. "description_data" : [ {
  10422. "lang" : "en",
  10423. "value" : "Multiple vulnerabilities in the web-based management interface of Cisco Unified Communications Manager IM &amp; Presence Service could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. These vulnerabilities are due to improper validation of user-submitted parameters. An attacker could exploit these vulnerabilities by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database."
  10424. } ]
  10425. }
  10426. },
  10427. "configurations" : {
  10428. "CVE_data_version" : "4.0",
  10429. "nodes" : [ ]
  10430. },
  10431. "impact" : { },
  10432. "publishedDate" : "2021-05-06T13:15Z",
  10433. "lastModifiedDate" : "2021-05-06T13:16Z"
  10434. }, {
  10435. "cve" : {
  10436. "data_type" : "CVE",
  10437. "data_format" : "MITRE",
  10438. "data_version" : "4.0",
  10439. "CVE_data_meta" : {
  10440. "ID" : "CVE-2021-1363",
  10441. "ASSIGNER" : "psirt@cisco.com"
  10442. },
  10443. "problemtype" : {
  10444. "problemtype_data" : [ {
  10445. "description" : [ {
  10446. "lang" : "en",
  10447. "value" : "CWE-89"
  10448. } ]
  10449. } ]
  10450. },
  10451. "references" : {
  10452. "reference_data" : [ {
  10453. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-inj-ereCOKjR",
  10454. "name" : "20210505 Cisco Unified Communications Manager IM & Presence Service SQL Injection Vulnerabilities",
  10455. "refsource" : "CISCO",
  10456. "tags" : [ ]
  10457. } ]
  10458. },
  10459. "description" : {
  10460. "description_data" : [ {
  10461. "lang" : "en",
  10462. "value" : "Multiple vulnerabilities in the web-based management interface of Cisco Unified Communications Manager IM &amp; Presence Service could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. These vulnerabilities are due to improper validation of user-submitted parameters. An attacker could exploit these vulnerabilities by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database."
  10463. } ]
  10464. }
  10465. },
  10466. "configurations" : {
  10467. "CVE_data_version" : "4.0",
  10468. "nodes" : [ ]
  10469. },
  10470. "impact" : { },
  10471. "publishedDate" : "2021-05-06T13:15Z",
  10472. "lastModifiedDate" : "2021-05-06T13:16Z"
  10473. }, {
  10474. "cve" : {
  10475. "data_type" : "CVE",
  10476. "data_format" : "MITRE",
  10477. "data_version" : "4.0",
  10478. "CVE_data_meta" : {
  10479. "ID" : "CVE-2021-1284",
  10480. "ASSIGNER" : "psirt@cisco.com"
  10481. },
  10482. "problemtype" : {
  10483. "problemtype_data" : [ {
  10484. "description" : [ {
  10485. "lang" : "en",
  10486. "value" : "CWE-284"
  10487. } ]
  10488. } ]
  10489. },
  10490. "references" : {
  10491. "reference_data" : [ {
  10492. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-auth-bypass-65aYqcS2",
  10493. "name" : "20210505 Cisco SD-WAN vManage Software Authentication Bypass Vulnerability",
  10494. "refsource" : "CISCO",
  10495. "tags" : [ ]
  10496. } ]
  10497. },
  10498. "description" : {
  10499. "description_data" : [ {
  10500. "lang" : "en",
  10501. "value" : "A vulnerability in the web-based messaging service interface of Cisco SD-WAN vManage Software could allow an unauthenticated, adjacent attacker to bypass authentication and authorization and modify the configuration of an affected system. To exploit this vulnerability, the attacker must be able to access an associated Cisco SD-WAN vEdge device. This vulnerability is due to insufficient authorization checks. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based messaging service interface of an affected system. A successful exploit could allow the attacker to gain unauthenticated read and write access to the affected vManage system. With this access, the attacker could access information about the affected vManage system, modify the configuration of the system, or make configuration changes to devices that are managed by the system."
  10502. } ]
  10503. }
  10504. },
  10505. "configurations" : {
  10506. "CVE_data_version" : "4.0",
  10507. "nodes" : [ ]
  10508. },
  10509. "impact" : { },
  10510. "publishedDate" : "2021-05-06T13:15Z",
  10511. "lastModifiedDate" : "2021-05-06T13:16Z"
  10512. }, {
  10513. "cve" : {
  10514. "data_type" : "CVE",
  10515. "data_format" : "MITRE",
  10516. "data_version" : "4.0",
  10517. "CVE_data_meta" : {
  10518. "ID" : "CVE-2021-1275",
  10519. "ASSIGNER" : "psirt@cisco.com"
  10520. },
  10521. "problemtype" : {
  10522. "problemtype_data" : [ {
  10523. "description" : [ {
  10524. "lang" : "en",
  10525. "value" : "CWE-20"
  10526. } ]
  10527. } ]
  10528. },
  10529. "references" : {
  10530. "reference_data" : [ {
  10531. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ",
  10532. "name" : "20210505 Cisco SD-WAN vManage Software Vulnerabilities",
  10533. "refsource" : "CISCO",
  10534. "tags" : [ ]
  10535. } ]
  10536. },
  10537. "description" : {
  10538. "description_data" : [ {
  10539. "lang" : "en",
  10540. "value" : "Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorized access to the application. For more information about these vulnerabilities, see the Details section of this advisory."
  10541. } ]
  10542. }
  10543. },
  10544. "configurations" : {
  10545. "CVE_data_version" : "4.0",
  10546. "nodes" : [ ]
  10547. },
  10548. "impact" : { },
  10549. "publishedDate" : "2021-05-06T13:15Z",
  10550. "lastModifiedDate" : "2021-05-06T13:16Z"
  10551. }, {
  10552. "cve" : {
  10553. "data_type" : "CVE",
  10554. "data_format" : "MITRE",
  10555. "data_version" : "4.0",
  10556. "CVE_data_meta" : {
  10557. "ID" : "CVE-2020-28026",
  10558. "ASSIGNER" : "cve@mitre.org"
  10559. },
  10560. "problemtype" : {
  10561. "problemtype_data" : [ {
  10562. "description" : [ ]
  10563. } ]
  10564. },
  10565. "references" : {
  10566. "reference_data" : [ {
  10567. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt",
  10568. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt",
  10569. "refsource" : "MISC",
  10570. "tags" : [ ]
  10571. } ]
  10572. },
  10573. "description" : {
  10574. "description_data" : [ {
  10575. "lang" : "en",
  10576. "value" : "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root."
  10577. } ]
  10578. }
  10579. },
  10580. "configurations" : {
  10581. "CVE_data_version" : "4.0",
  10582. "nodes" : [ ]
  10583. },
  10584. "impact" : { },
  10585. "publishedDate" : "2021-05-06T13:15Z",
  10586. "lastModifiedDate" : "2021-05-06T13:16Z"
  10587. }, {
  10588. "cve" : {
  10589. "data_type" : "CVE",
  10590. "data_format" : "MITRE",
  10591. "data_version" : "4.0",
  10592. "CVE_data_meta" : {
  10593. "ID" : "CVE-2020-28025",
  10594. "ASSIGNER" : "cve@mitre.org"
  10595. },
  10596. "problemtype" : {
  10597. "problemtype_data" : [ {
  10598. "description" : [ ]
  10599. } ]
  10600. },
  10601. "references" : {
  10602. "reference_data" : [ {
  10603. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt",
  10604. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt",
  10605. "refsource" : "MISC",
  10606. "tags" : [ ]
  10607. } ]
  10608. },
  10609. "description" : {
  10610. "description_data" : [ {
  10611. "lang" : "en",
  10612. "value" : "Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory."
  10613. } ]
  10614. }
  10615. },
  10616. "configurations" : {
  10617. "CVE_data_version" : "4.0",
  10618. "nodes" : [ ]
  10619. },
  10620. "impact" : { },
  10621. "publishedDate" : "2021-05-06T13:15Z",
  10622. "lastModifiedDate" : "2021-05-06T13:16Z"
  10623. }, {
  10624. "cve" : {
  10625. "data_type" : "CVE",
  10626. "data_format" : "MITRE",
  10627. "data_version" : "4.0",
  10628. "CVE_data_meta" : {
  10629. "ID" : "CVE-2020-28024",
  10630. "ASSIGNER" : "cve@mitre.org"
  10631. },
  10632. "problemtype" : {
  10633. "problemtype_data" : [ {
  10634. "description" : [ ]
  10635. } ]
  10636. },
  10637. "references" : {
  10638. "reference_data" : [ {
  10639. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt",
  10640. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt",
  10641. "refsource" : "MISC",
  10642. "tags" : [ ]
  10643. } ]
  10644. },
  10645. "description" : {
  10646. "description_data" : [ {
  10647. "lang" : "en",
  10648. "value" : "Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF."
  10649. } ]
  10650. }
  10651. },
  10652. "configurations" : {
  10653. "CVE_data_version" : "4.0",
  10654. "nodes" : [ ]
  10655. },
  10656. "impact" : { },
  10657. "publishedDate" : "2021-05-06T13:15Z",
  10658. "lastModifiedDate" : "2021-05-06T13:16Z"
  10659. }, {
  10660. "cve" : {
  10661. "data_type" : "CVE",
  10662. "data_format" : "MITRE",
  10663. "data_version" : "4.0",
  10664. "CVE_data_meta" : {
  10665. "ID" : "CVE-2020-28023",
  10666. "ASSIGNER" : "cve@mitre.org"
  10667. },
  10668. "problemtype" : {
  10669. "problemtype_data" : [ {
  10670. "description" : [ ]
  10671. } ]
  10672. },
  10673. "references" : {
  10674. "reference_data" : [ {
  10675. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt",
  10676. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt",
  10677. "refsource" : "MISC",
  10678. "tags" : [ ]
  10679. } ]
  10680. },
  10681. "description" : {
  10682. "description_data" : [ {
  10683. "lang" : "en",
  10684. "value" : "Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client."
  10685. } ]
  10686. }
  10687. },
  10688. "configurations" : {
  10689. "CVE_data_version" : "4.0",
  10690. "nodes" : [ ]
  10691. },
  10692. "impact" : { },
  10693. "publishedDate" : "2021-05-06T13:15Z",
  10694. "lastModifiedDate" : "2021-05-06T13:16Z"
  10695. }, {
  10696. "cve" : {
  10697. "data_type" : "CVE",
  10698. "data_format" : "MITRE",
  10699. "data_version" : "4.0",
  10700. "CVE_data_meta" : {
  10701. "ID" : "CVE-2020-28022",
  10702. "ASSIGNER" : "cve@mitre.org"
  10703. },
  10704. "problemtype" : {
  10705. "problemtype_data" : [ {
  10706. "description" : [ ]
  10707. } ]
  10708. },
  10709. "references" : {
  10710. "reference_data" : [ {
  10711. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt",
  10712. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt",
  10713. "refsource" : "MISC",
  10714. "tags" : [ ]
  10715. } ]
  10716. },
  10717. "description" : {
  10718. "description_data" : [ {
  10719. "lang" : "en",
  10720. "value" : "Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands."
  10721. } ]
  10722. }
  10723. },
  10724. "configurations" : {
  10725. "CVE_data_version" : "4.0",
  10726. "nodes" : [ ]
  10727. },
  10728. "impact" : { },
  10729. "publishedDate" : "2021-05-06T13:15Z",
  10730. "lastModifiedDate" : "2021-05-06T13:16Z"
  10731. }, {
  10732. "cve" : {
  10733. "data_type" : "CVE",
  10734. "data_format" : "MITRE",
  10735. "data_version" : "4.0",
  10736. "CVE_data_meta" : {
  10737. "ID" : "CVE-2020-28021",
  10738. "ASSIGNER" : "cve@mitre.org"
  10739. },
  10740. "problemtype" : {
  10741. "problemtype_data" : [ {
  10742. "description" : [ ]
  10743. } ]
  10744. },
  10745. "references" : {
  10746. "reference_data" : [ {
  10747. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt",
  10748. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt",
  10749. "refsource" : "MISC",
  10750. "tags" : [ ]
  10751. } ]
  10752. },
  10753. "description" : {
  10754. "description_data" : [ {
  10755. "lang" : "en",
  10756. "value" : "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command."
  10757. } ]
  10758. }
  10759. },
  10760. "configurations" : {
  10761. "CVE_data_version" : "4.0",
  10762. "nodes" : [ ]
  10763. },
  10764. "impact" : { },
  10765. "publishedDate" : "2021-05-06T13:15Z",
  10766. "lastModifiedDate" : "2021-05-06T13:16Z"
  10767. }, {
  10768. "cve" : {
  10769. "data_type" : "CVE",
  10770. "data_format" : "MITRE",
  10771. "data_version" : "4.0",
  10772. "CVE_data_meta" : {
  10773. "ID" : "CVE-2020-28020",
  10774. "ASSIGNER" : "cve@mitre.org"
  10775. },
  10776. "problemtype" : {
  10777. "problemtype_data" : [ {
  10778. "description" : [ ]
  10779. } ]
  10780. },
  10781. "references" : {
  10782. "reference_data" : [ {
  10783. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28020-HSIZE.txt",
  10784. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28020-HSIZE.txt",
  10785. "refsource" : "MISC",
  10786. "tags" : [ ]
  10787. } ]
  10788. },
  10789. "description" : {
  10790. "description_data" : [ {
  10791. "lang" : "en",
  10792. "value" : "Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction."
  10793. } ]
  10794. }
  10795. },
  10796. "configurations" : {
  10797. "CVE_data_version" : "4.0",
  10798. "nodes" : [ ]
  10799. },
  10800. "impact" : { },
  10801. "publishedDate" : "2021-05-06T13:15Z",
  10802. "lastModifiedDate" : "2021-05-06T13:16Z"
  10803. }, {
  10804. "cve" : {
  10805. "data_type" : "CVE",
  10806. "data_format" : "MITRE",
  10807. "data_version" : "4.0",
  10808. "CVE_data_meta" : {
  10809. "ID" : "CVE-2020-28019",
  10810. "ASSIGNER" : "cve@mitre.org"
  10811. },
  10812. "problemtype" : {
  10813. "problemtype_data" : [ {
  10814. "description" : [ ]
  10815. } ]
  10816. },
  10817. "references" : {
  10818. "reference_data" : [ {
  10819. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt",
  10820. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt",
  10821. "refsource" : "MISC",
  10822. "tags" : [ ]
  10823. } ]
  10824. },
  10825. "description" : {
  10826. "description_data" : [ {
  10827. "lang" : "en",
  10828. "value" : "Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA."
  10829. } ]
  10830. }
  10831. },
  10832. "configurations" : {
  10833. "CVE_data_version" : "4.0",
  10834. "nodes" : [ ]
  10835. },
  10836. "impact" : { },
  10837. "publishedDate" : "2021-05-06T13:15Z",
  10838. "lastModifiedDate" : "2021-05-06T13:16Z"
  10839. }, {
  10840. "cve" : {
  10841. "data_type" : "CVE",
  10842. "data_format" : "MITRE",
  10843. "data_version" : "4.0",
  10844. "CVE_data_meta" : {
  10845. "ID" : "CVE-2020-28018",
  10846. "ASSIGNER" : "cve@mitre.org"
  10847. },
  10848. "problemtype" : {
  10849. "problemtype_data" : [ {
  10850. "description" : [ ]
  10851. } ]
  10852. },
  10853. "references" : {
  10854. "reference_data" : [ {
  10855. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28018-OCORK.txt",
  10856. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28018-OCORK.txt",
  10857. "refsource" : "MISC",
  10858. "tags" : [ ]
  10859. } ]
  10860. },
  10861. "description" : {
  10862. "description_data" : [ {
  10863. "lang" : "en",
  10864. "value" : "Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL."
  10865. } ]
  10866. }
  10867. },
  10868. "configurations" : {
  10869. "CVE_data_version" : "4.0",
  10870. "nodes" : [ ]
  10871. },
  10872. "impact" : { },
  10873. "publishedDate" : "2021-05-06T13:15Z",
  10874. "lastModifiedDate" : "2021-05-06T13:16Z"
  10875. }, {
  10876. "cve" : {
  10877. "data_type" : "CVE",
  10878. "data_format" : "MITRE",
  10879. "data_version" : "4.0",
  10880. "CVE_data_meta" : {
  10881. "ID" : "CVE-2020-28017",
  10882. "ASSIGNER" : "cve@mitre.org"
  10883. },
  10884. "problemtype" : {
  10885. "problemtype_data" : [ {
  10886. "description" : [ ]
  10887. } ]
  10888. },
  10889. "references" : {
  10890. "reference_data" : [ {
  10891. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt",
  10892. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt",
  10893. "refsource" : "MISC",
  10894. "tags" : [ ]
  10895. } ]
  10896. },
  10897. "description" : {
  10898. "description_data" : [ {
  10899. "lang" : "en",
  10900. "value" : "Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption."
  10901. } ]
  10902. }
  10903. },
  10904. "configurations" : {
  10905. "CVE_data_version" : "4.0",
  10906. "nodes" : [ ]
  10907. },
  10908. "impact" : { },
  10909. "publishedDate" : "2021-05-06T13:15Z",
  10910. "lastModifiedDate" : "2021-05-06T13:16Z"
  10911. }, {
  10912. "cve" : {
  10913. "data_type" : "CVE",
  10914. "data_format" : "MITRE",
  10915. "data_version" : "4.0",
  10916. "CVE_data_meta" : {
  10917. "ID" : "CVE-2020-28016",
  10918. "ASSIGNER" : "cve@mitre.org"
  10919. },
  10920. "problemtype" : {
  10921. "problemtype_data" : [ {
  10922. "description" : [ ]
  10923. } ]
  10924. },
  10925. "references" : {
  10926. "reference_data" : [ {
  10927. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt",
  10928. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt",
  10929. "refsource" : "MISC",
  10930. "tags" : [ ]
  10931. } ]
  10932. },
  10933. "description" : {
  10934. "description_data" : [ {
  10935. "lang" : "en",
  10936. "value" : "Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because \"-F ''\" is mishandled by parse_fix_phrase."
  10937. } ]
  10938. }
  10939. },
  10940. "configurations" : {
  10941. "CVE_data_version" : "4.0",
  10942. "nodes" : [ ]
  10943. },
  10944. "impact" : { },
  10945. "publishedDate" : "2021-05-06T13:15Z",
  10946. "lastModifiedDate" : "2021-05-06T13:16Z"
  10947. }, {
  10948. "cve" : {
  10949. "data_type" : "CVE",
  10950. "data_format" : "MITRE",
  10951. "data_version" : "4.0",
  10952. "CVE_data_meta" : {
  10953. "ID" : "CVE-2020-28015",
  10954. "ASSIGNER" : "cve@mitre.org"
  10955. },
  10956. "problemtype" : {
  10957. "problemtype_data" : [ {
  10958. "description" : [ ]
  10959. } ]
  10960. },
  10961. "references" : {
  10962. "reference_data" : [ {
  10963. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt",
  10964. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt",
  10965. "refsource" : "MISC",
  10966. "tags" : [ ]
  10967. } ]
  10968. },
  10969. "description" : {
  10970. "description_data" : [ {
  10971. "lang" : "en",
  10972. "value" : "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character."
  10973. } ]
  10974. }
  10975. },
  10976. "configurations" : {
  10977. "CVE_data_version" : "4.0",
  10978. "nodes" : [ ]
  10979. },
  10980. "impact" : { },
  10981. "publishedDate" : "2021-05-06T13:15Z",
  10982. "lastModifiedDate" : "2021-05-06T13:16Z"
  10983. }, {
  10984. "cve" : {
  10985. "data_type" : "CVE",
  10986. "data_format" : "MITRE",
  10987. "data_version" : "4.0",
  10988. "CVE_data_meta" : {
  10989. "ID" : "CVE-2020-28014",
  10990. "ASSIGNER" : "cve@mitre.org"
  10991. },
  10992. "problemtype" : {
  10993. "problemtype_data" : [ {
  10994. "description" : [ ]
  10995. } ]
  10996. },
  10997. "references" : {
  10998. "reference_data" : [ {
  10999. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt",
  11000. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt",
  11001. "refsource" : "MISC",
  11002. "tags" : [ ]
  11003. } ]
  11004. },
  11005. "description" : {
  11006. "description_data" : [ {
  11007. "lang" : "en",
  11008. "value" : "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten."
  11009. } ]
  11010. }
  11011. },
  11012. "configurations" : {
  11013. "CVE_data_version" : "4.0",
  11014. "nodes" : [ ]
  11015. },
  11016. "impact" : { },
  11017. "publishedDate" : "2021-05-06T13:15Z",
  11018. "lastModifiedDate" : "2021-05-06T13:16Z"
  11019. }, {
  11020. "cve" : {
  11021. "data_type" : "CVE",
  11022. "data_format" : "MITRE",
  11023. "data_version" : "4.0",
  11024. "CVE_data_meta" : {
  11025. "ID" : "CVE-2020-28013",
  11026. "ASSIGNER" : "cve@mitre.org"
  11027. },
  11028. "problemtype" : {
  11029. "problemtype_data" : [ {
  11030. "description" : [ ]
  11031. } ]
  11032. },
  11033. "references" : {
  11034. "reference_data" : [ {
  11035. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt",
  11036. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt",
  11037. "refsource" : "MISC",
  11038. "tags" : [ ]
  11039. } ]
  11040. },
  11041. "description" : {
  11042. "description_data" : [ {
  11043. "lang" : "en",
  11044. "value" : "Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles \"-F '.('\" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy."
  11045. } ]
  11046. }
  11047. },
  11048. "configurations" : {
  11049. "CVE_data_version" : "4.0",
  11050. "nodes" : [ ]
  11051. },
  11052. "impact" : { },
  11053. "publishedDate" : "2021-05-06T13:15Z",
  11054. "lastModifiedDate" : "2021-05-06T13:16Z"
  11055. }, {
  11056. "cve" : {
  11057. "data_type" : "CVE",
  11058. "data_format" : "MITRE",
  11059. "data_version" : "4.0",
  11060. "CVE_data_meta" : {
  11061. "ID" : "CVE-2020-28012",
  11062. "ASSIGNER" : "cve@mitre.org"
  11063. },
  11064. "problemtype" : {
  11065. "problemtype_data" : [ {
  11066. "description" : [ ]
  11067. } ]
  11068. },
  11069. "references" : {
  11070. "reference_data" : [ {
  11071. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt",
  11072. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt",
  11073. "refsource" : "MISC",
  11074. "tags" : [ ]
  11075. } ]
  11076. },
  11077. "description" : {
  11078. "description_data" : [ {
  11079. "lang" : "en",
  11080. "value" : "Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag."
  11081. } ]
  11082. }
  11083. },
  11084. "configurations" : {
  11085. "CVE_data_version" : "4.0",
  11086. "nodes" : [ ]
  11087. },
  11088. "impact" : { },
  11089. "publishedDate" : "2021-05-06T13:15Z",
  11090. "lastModifiedDate" : "2021-05-06T13:16Z"
  11091. }, {
  11092. "cve" : {
  11093. "data_type" : "CVE",
  11094. "data_format" : "MITRE",
  11095. "data_version" : "4.0",
  11096. "CVE_data_meta" : {
  11097. "ID" : "CVE-2020-28011",
  11098. "ASSIGNER" : "cve@mitre.org"
  11099. },
  11100. "problemtype" : {
  11101. "problemtype_data" : [ {
  11102. "description" : [ ]
  11103. } ]
  11104. },
  11105. "references" : {
  11106. "reference_data" : [ {
  11107. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt",
  11108. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt",
  11109. "refsource" : "MISC",
  11110. "tags" : [ ]
  11111. } ]
  11112. },
  11113. "description" : {
  11114. "description_data" : [ {
  11115. "lang" : "en",
  11116. "value" : "Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root."
  11117. } ]
  11118. }
  11119. },
  11120. "configurations" : {
  11121. "CVE_data_version" : "4.0",
  11122. "nodes" : [ ]
  11123. },
  11124. "impact" : { },
  11125. "publishedDate" : "2021-05-06T13:15Z",
  11126. "lastModifiedDate" : "2021-05-06T13:16Z"
  11127. }, {
  11128. "cve" : {
  11129. "data_type" : "CVE",
  11130. "data_format" : "MITRE",
  11131. "data_version" : "4.0",
  11132. "CVE_data_meta" : {
  11133. "ID" : "CVE-2020-28010",
  11134. "ASSIGNER" : "cve@mitre.org"
  11135. },
  11136. "problemtype" : {
  11137. "problemtype_data" : [ {
  11138. "description" : [ ]
  11139. } ]
  11140. },
  11141. "references" : {
  11142. "reference_data" : [ {
  11143. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt",
  11144. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt",
  11145. "refsource" : "MISC",
  11146. "tags" : [ ]
  11147. } ]
  11148. },
  11149. "description" : {
  11150. "description_data" : [ {
  11151. "lang" : "en",
  11152. "value" : "Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms)."
  11153. } ]
  11154. }
  11155. },
  11156. "configurations" : {
  11157. "CVE_data_version" : "4.0",
  11158. "nodes" : [ ]
  11159. },
  11160. "impact" : { },
  11161. "publishedDate" : "2021-05-06T13:15Z",
  11162. "lastModifiedDate" : "2021-05-06T13:16Z"
  11163. }, {
  11164. "cve" : {
  11165. "data_type" : "CVE",
  11166. "data_format" : "MITRE",
  11167. "data_version" : "4.0",
  11168. "CVE_data_meta" : {
  11169. "ID" : "CVE-2020-28009",
  11170. "ASSIGNER" : "cve@mitre.org"
  11171. },
  11172. "problemtype" : {
  11173. "problemtype_data" : [ {
  11174. "description" : [ ]
  11175. } ]
  11176. },
  11177. "references" : {
  11178. "reference_data" : [ {
  11179. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt",
  11180. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt",
  11181. "refsource" : "MISC",
  11182. "tags" : [ ]
  11183. } ]
  11184. },
  11185. "description" : {
  11186. "description_data" : [ {
  11187. "lang" : "en",
  11188. "value" : "Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days)."
  11189. } ]
  11190. }
  11191. },
  11192. "configurations" : {
  11193. "CVE_data_version" : "4.0",
  11194. "nodes" : [ ]
  11195. },
  11196. "impact" : { },
  11197. "publishedDate" : "2021-05-06T13:15Z",
  11198. "lastModifiedDate" : "2021-05-06T13:16Z"
  11199. }, {
  11200. "cve" : {
  11201. "data_type" : "CVE",
  11202. "data_format" : "MITRE",
  11203. "data_version" : "4.0",
  11204. "CVE_data_meta" : {
  11205. "ID" : "CVE-2020-28008",
  11206. "ASSIGNER" : "cve@mitre.org"
  11207. },
  11208. "problemtype" : {
  11209. "problemtype_data" : [ {
  11210. "description" : [ ]
  11211. } ]
  11212. },
  11213. "references" : {
  11214. "reference_data" : [ {
  11215. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt",
  11216. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt",
  11217. "refsource" : "MISC",
  11218. "tags" : [ ]
  11219. } ]
  11220. },
  11221. "description" : {
  11222. "description_data" : [ {
  11223. "lang" : "en",
  11224. "value" : "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution."
  11225. } ]
  11226. }
  11227. },
  11228. "configurations" : {
  11229. "CVE_data_version" : "4.0",
  11230. "nodes" : [ ]
  11231. },
  11232. "impact" : { },
  11233. "publishedDate" : "2021-05-06T13:15Z",
  11234. "lastModifiedDate" : "2021-05-06T13:16Z"
  11235. }, {
  11236. "cve" : {
  11237. "data_type" : "CVE",
  11238. "data_format" : "MITRE",
  11239. "data_version" : "4.0",
  11240. "CVE_data_meta" : {
  11241. "ID" : "CVE-2020-28007",
  11242. "ASSIGNER" : "cve@mitre.org"
  11243. },
  11244. "problemtype" : {
  11245. "problemtype_data" : [ {
  11246. "description" : [ ]
  11247. } ]
  11248. },
  11249. "references" : {
  11250. "reference_data" : [ {
  11251. "url" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
  11252. "name" : "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
  11253. "refsource" : "MISC",
  11254. "tags" : [ ]
  11255. } ]
  11256. },
  11257. "description" : {
  11258. "description_data" : [ {
  11259. "lang" : "en",
  11260. "value" : "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem."
  11261. } ]
  11262. }
  11263. },
  11264. "configurations" : {
  11265. "CVE_data_version" : "4.0",
  11266. "nodes" : [ ]
  11267. },
  11268. "impact" : { },
  11269. "publishedDate" : "2021-05-06T13:15Z",
  11270. "lastModifiedDate" : "2021-05-06T13:16Z"
  11271. }, {
  11272. "cve" : {
  11273. "data_type" : "CVE",
  11274. "data_format" : "MITRE",
  11275. "data_version" : "4.0",
  11276. "CVE_data_meta" : {
  11277. "ID" : "CVE-2020-23128",
  11278. "ASSIGNER" : "cve@mitre.org"
  11279. },
  11280. "problemtype" : {
  11281. "problemtype_data" : [ {
  11282. "description" : [ ]
  11283. } ]
  11284. },
  11285. "references" : {
  11286. "reference_data" : [ {
  11287. "url" : "https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-41-2020-04-22-Medium-risk-high-impact-CSRF-and-privilege-escalation-via-CSRF",
  11288. "name" : "https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-41-2020-04-22-Medium-risk-high-impact-CSRF-and-privilege-escalation-via-CSRF",
  11289. "refsource" : "CONFIRM",
  11290. "tags" : [ ]
  11291. }, {
  11292. "url" : "https://toandak.blogspot.com/2020/05/improper-privilege-management-in.html",
  11293. "name" : "https://toandak.blogspot.com/2020/05/improper-privilege-management-in.html",
  11294. "refsource" : "MISC",
  11295. "tags" : [ ]
  11296. } ]
  11297. },
  11298. "description" : {
  11299. "description_data" : [ {
  11300. "lang" : "en",
  11301. "value" : "Chamilo LMS 1.11.10 does not properly manage privileges which could allow a user with Sessions administrator privilege to create a new user then use the edit user function to change this new user to administrator privilege."
  11302. } ]
  11303. }
  11304. },
  11305. "configurations" : {
  11306. "CVE_data_version" : "4.0",
  11307. "nodes" : [ ]
  11308. },
  11309. "impact" : { },
  11310. "publishedDate" : "2021-05-06T13:15Z",
  11311. "lastModifiedDate" : "2021-05-06T13:16Z"
  11312. }, {
  11313. "cve" : {
  11314. "data_type" : "CVE",
  11315. "data_format" : "MITRE",
  11316. "data_version" : "4.0",
  11317. "CVE_data_meta" : {
  11318. "ID" : "CVE-2020-23127",
  11319. "ASSIGNER" : "cve@mitre.org"
  11320. },
  11321. "problemtype" : {
  11322. "problemtype_data" : [ {
  11323. "description" : [ {
  11324. "lang" : "en",
  11325. "value" : "CWE-352"
  11326. } ]
  11327. } ]
  11328. },
  11329. "references" : {
  11330. "reference_data" : [ {
  11331. "url" : "https://toandak.blogspot.com/2020/05/csrf-vulnerbility-in-chamilo-lms.html",
  11332. "name" : "https://toandak.blogspot.com/2020/05/csrf-vulnerbility-in-chamilo-lms.html",
  11333. "refsource" : "MISC",
  11334. "tags" : [ "Exploit", "Third Party Advisory" ]
  11335. }, {
  11336. "url" : "https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-41-2020-04-22-Medium-risk-high-impact-CSRF-and-privilege-escalation-via-CSRF",
  11337. "name" : "https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-41-2020-04-22-Medium-risk-high-impact-CSRF-and-privilege-escalation-via-CSRF",
  11338. "refsource" : "CONFIRM",
  11339. "tags" : [ "Patch", "Vendor Advisory" ]
  11340. } ]
  11341. },
  11342. "description" : {
  11343. "description_data" : [ {
  11344. "lang" : "en",
  11345. "value" : "Chamilo LMS 1.11.10 is affected by Cross Site Request Forgery (CSRF) via the edit_user function by targeting an admin user."
  11346. } ]
  11347. }
  11348. },
  11349. "configurations" : {
  11350. "CVE_data_version" : "4.0",
  11351. "nodes" : [ {
  11352. "operator" : "OR",
  11353. "children" : [ ],
  11354. "cpe_match" : [ {
  11355. "vulnerable" : true,
  11356. "cpe23Uri" : "cpe:2.3:a:chamilo:chamilo_lms:1.11.10:*:*:*:*:*:*:*",
  11357. "cpe_name" : [ ]
  11358. } ]
  11359. } ]
  11360. },
  11361. "impact" : {
  11362. "baseMetricV3" : {
  11363. "cvssV3" : {
  11364. "version" : "3.1",
  11365. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  11366. "attackVector" : "NETWORK",
  11367. "attackComplexity" : "LOW",
  11368. "privilegesRequired" : "NONE",
  11369. "userInteraction" : "REQUIRED",
  11370. "scope" : "UNCHANGED",
  11371. "confidentialityImpact" : "HIGH",
  11372. "integrityImpact" : "HIGH",
  11373. "availabilityImpact" : "HIGH",
  11374. "baseScore" : 8.8,
  11375. "baseSeverity" : "HIGH"
  11376. },
  11377. "exploitabilityScore" : 2.8,
  11378. "impactScore" : 5.9
  11379. },
  11380. "baseMetricV2" : {
  11381. "cvssV2" : {
  11382. "version" : "2.0",
  11383. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  11384. "accessVector" : "NETWORK",
  11385. "accessComplexity" : "MEDIUM",
  11386. "authentication" : "NONE",
  11387. "confidentialityImpact" : "PARTIAL",
  11388. "integrityImpact" : "PARTIAL",
  11389. "availabilityImpact" : "PARTIAL",
  11390. "baseScore" : 6.8
  11391. },
  11392. "severity" : "MEDIUM",
  11393. "exploitabilityScore" : 8.6,
  11394. "impactScore" : 6.4,
  11395. "acInsufInfo" : false,
  11396. "obtainAllPrivilege" : false,
  11397. "obtainUserPrivilege" : false,
  11398. "obtainOtherPrivilege" : false,
  11399. "userInteractionRequired" : true
  11400. }
  11401. },
  11402. "publishedDate" : "2021-05-06T13:15Z",
  11403. "lastModifiedDate" : "2021-05-07T17:50Z"
  11404. }, {
  11405. "cve" : {
  11406. "data_type" : "CVE",
  11407. "data_format" : "MITRE",
  11408. "data_version" : "4.0",
  11409. "CVE_data_meta" : {
  11410. "ID" : "CVE-2020-19114",
  11411. "ASSIGNER" : "cve@mitre.org"
  11412. },
  11413. "problemtype" : {
  11414. "problemtype_data" : [ {
  11415. "description" : [ {
  11416. "lang" : "en",
  11417. "value" : "CWE-89"
  11418. } ]
  11419. } ]
  11420. },
  11421. "references" : {
  11422. "reference_data" : [ {
  11423. "url" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/8",
  11424. "name" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/8",
  11425. "refsource" : "MISC",
  11426. "tags" : [ "Exploit", "Third Party Advisory" ]
  11427. } ]
  11428. },
  11429. "description" : {
  11430. "description_data" : [ {
  11431. "lang" : "en",
  11432. "value" : "SQL Injection vulnerability in Online Book Store v1.0 via the publisher parameter to edit_book.php, which could let a remote malicious user execute arbitrary code."
  11433. } ]
  11434. }
  11435. },
  11436. "configurations" : {
  11437. "CVE_data_version" : "4.0",
  11438. "nodes" : [ {
  11439. "operator" : "OR",
  11440. "children" : [ ],
  11441. "cpe_match" : [ {
  11442. "vulnerable" : true,
  11443. "cpe23Uri" : "cpe:2.3:a:projectworlds:online_book_store_project_in_php:1.0:*:*:*:*:*:*:*",
  11444. "cpe_name" : [ ]
  11445. } ]
  11446. } ]
  11447. },
  11448. "impact" : {
  11449. "baseMetricV3" : {
  11450. "cvssV3" : {
  11451. "version" : "3.1",
  11452. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  11453. "attackVector" : "NETWORK",
  11454. "attackComplexity" : "LOW",
  11455. "privilegesRequired" : "NONE",
  11456. "userInteraction" : "NONE",
  11457. "scope" : "UNCHANGED",
  11458. "confidentialityImpact" : "HIGH",
  11459. "integrityImpact" : "HIGH",
  11460. "availabilityImpact" : "HIGH",
  11461. "baseScore" : 9.8,
  11462. "baseSeverity" : "CRITICAL"
  11463. },
  11464. "exploitabilityScore" : 3.9,
  11465. "impactScore" : 5.9
  11466. },
  11467. "baseMetricV2" : {
  11468. "cvssV2" : {
  11469. "version" : "2.0",
  11470. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  11471. "accessVector" : "NETWORK",
  11472. "accessComplexity" : "LOW",
  11473. "authentication" : "NONE",
  11474. "confidentialityImpact" : "PARTIAL",
  11475. "integrityImpact" : "PARTIAL",
  11476. "availabilityImpact" : "PARTIAL",
  11477. "baseScore" : 7.5
  11478. },
  11479. "severity" : "HIGH",
  11480. "exploitabilityScore" : 10.0,
  11481. "impactScore" : 6.4,
  11482. "acInsufInfo" : false,
  11483. "obtainAllPrivilege" : false,
  11484. "obtainUserPrivilege" : false,
  11485. "obtainOtherPrivilege" : false,
  11486. "userInteractionRequired" : false
  11487. }
  11488. },
  11489. "publishedDate" : "2021-05-06T13:15Z",
  11490. "lastModifiedDate" : "2021-05-07T15:50Z"
  11491. }, {
  11492. "cve" : {
  11493. "data_type" : "CVE",
  11494. "data_format" : "MITRE",
  11495. "data_version" : "4.0",
  11496. "CVE_data_meta" : {
  11497. "ID" : "CVE-2020-19113",
  11498. "ASSIGNER" : "cve@mitre.org"
  11499. },
  11500. "problemtype" : {
  11501. "problemtype_data" : [ {
  11502. "description" : [ ]
  11503. } ]
  11504. },
  11505. "references" : {
  11506. "reference_data" : [ {
  11507. "url" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/15",
  11508. "name" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/15",
  11509. "refsource" : "MISC",
  11510. "tags" : [ ]
  11511. } ]
  11512. },
  11513. "description" : {
  11514. "description_data" : [ {
  11515. "lang" : "en",
  11516. "value" : "Arbitrary File Upload vulnerability in Online Book Store v1.0 in admin_add.php, which may lead to remote code execution."
  11517. } ]
  11518. }
  11519. },
  11520. "configurations" : {
  11521. "CVE_data_version" : "4.0",
  11522. "nodes" : [ ]
  11523. },
  11524. "impact" : { },
  11525. "publishedDate" : "2021-05-06T13:15Z",
  11526. "lastModifiedDate" : "2021-05-06T13:16Z"
  11527. }, {
  11528. "cve" : {
  11529. "data_type" : "CVE",
  11530. "data_format" : "MITRE",
  11531. "data_version" : "4.0",
  11532. "CVE_data_meta" : {
  11533. "ID" : "CVE-2020-19112",
  11534. "ASSIGNER" : "cve@mitre.org"
  11535. },
  11536. "problemtype" : {
  11537. "problemtype_data" : [ {
  11538. "description" : [ {
  11539. "lang" : "en",
  11540. "value" : "CWE-89"
  11541. } ]
  11542. } ]
  11543. },
  11544. "references" : {
  11545. "reference_data" : [ {
  11546. "url" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/13",
  11547. "name" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/13",
  11548. "refsource" : "MISC",
  11549. "tags" : [ "Exploit", "Third Party Advisory" ]
  11550. } ]
  11551. },
  11552. "description" : {
  11553. "description_data" : [ {
  11554. "lang" : "en",
  11555. "value" : "SQL Injection vulnerability in Online Book Store v1.0 via the bookisbn parameter to admin_delete.php, which could let a remote malicious user execute arbitrary code."
  11556. } ]
  11557. }
  11558. },
  11559. "configurations" : {
  11560. "CVE_data_version" : "4.0",
  11561. "nodes" : [ {
  11562. "operator" : "OR",
  11563. "children" : [ ],
  11564. "cpe_match" : [ {
  11565. "vulnerable" : true,
  11566. "cpe23Uri" : "cpe:2.3:a:projectworlds:online_book_store_project_in_php:1.0:*:*:*:*:*:*:*",
  11567. "cpe_name" : [ ]
  11568. } ]
  11569. } ]
  11570. },
  11571. "impact" : {
  11572. "baseMetricV3" : {
  11573. "cvssV3" : {
  11574. "version" : "3.1",
  11575. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  11576. "attackVector" : "NETWORK",
  11577. "attackComplexity" : "LOW",
  11578. "privilegesRequired" : "NONE",
  11579. "userInteraction" : "NONE",
  11580. "scope" : "UNCHANGED",
  11581. "confidentialityImpact" : "HIGH",
  11582. "integrityImpact" : "HIGH",
  11583. "availabilityImpact" : "HIGH",
  11584. "baseScore" : 9.8,
  11585. "baseSeverity" : "CRITICAL"
  11586. },
  11587. "exploitabilityScore" : 3.9,
  11588. "impactScore" : 5.9
  11589. },
  11590. "baseMetricV2" : {
  11591. "cvssV2" : {
  11592. "version" : "2.0",
  11593. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  11594. "accessVector" : "NETWORK",
  11595. "accessComplexity" : "LOW",
  11596. "authentication" : "NONE",
  11597. "confidentialityImpact" : "PARTIAL",
  11598. "integrityImpact" : "PARTIAL",
  11599. "availabilityImpact" : "PARTIAL",
  11600. "baseScore" : 7.5
  11601. },
  11602. "severity" : "HIGH",
  11603. "exploitabilityScore" : 10.0,
  11604. "impactScore" : 6.4,
  11605. "acInsufInfo" : false,
  11606. "obtainAllPrivilege" : false,
  11607. "obtainUserPrivilege" : false,
  11608. "obtainOtherPrivilege" : false,
  11609. "userInteractionRequired" : false
  11610. }
  11611. },
  11612. "publishedDate" : "2021-05-06T13:15Z",
  11613. "lastModifiedDate" : "2021-05-07T15:49Z"
  11614. }, {
  11615. "cve" : {
  11616. "data_type" : "CVE",
  11617. "data_format" : "MITRE",
  11618. "data_version" : "4.0",
  11619. "CVE_data_meta" : {
  11620. "ID" : "CVE-2020-19111",
  11621. "ASSIGNER" : "cve@mitre.org"
  11622. },
  11623. "problemtype" : {
  11624. "problemtype_data" : [ {
  11625. "description" : [ ]
  11626. } ]
  11627. },
  11628. "references" : {
  11629. "reference_data" : [ {
  11630. "url" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/14",
  11631. "name" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/14",
  11632. "refsource" : "MISC",
  11633. "tags" : [ ]
  11634. } ]
  11635. },
  11636. "description" : {
  11637. "description_data" : [ {
  11638. "lang" : "en",
  11639. "value" : "Incorrect Access Control vulnerability in Online Book Store v1.0 via admin_verify.php, which could let a remote mailicious user bypass authentication and obtain sensitive information."
  11640. } ]
  11641. }
  11642. },
  11643. "configurations" : {
  11644. "CVE_data_version" : "4.0",
  11645. "nodes" : [ ]
  11646. },
  11647. "impact" : { },
  11648. "publishedDate" : "2021-05-06T13:15Z",
  11649. "lastModifiedDate" : "2021-05-06T13:16Z"
  11650. }, {
  11651. "cve" : {
  11652. "data_type" : "CVE",
  11653. "data_format" : "MITRE",
  11654. "data_version" : "4.0",
  11655. "CVE_data_meta" : {
  11656. "ID" : "CVE-2020-19110",
  11657. "ASSIGNER" : "cve@mitre.org"
  11658. },
  11659. "problemtype" : {
  11660. "problemtype_data" : [ {
  11661. "description" : [ {
  11662. "lang" : "en",
  11663. "value" : "CWE-89"
  11664. } ]
  11665. } ]
  11666. },
  11667. "references" : {
  11668. "reference_data" : [ {
  11669. "url" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/11",
  11670. "name" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/11",
  11671. "refsource" : "MISC",
  11672. "tags" : [ "Third Party Advisory" ]
  11673. } ]
  11674. },
  11675. "description" : {
  11676. "description_data" : [ {
  11677. "lang" : "en",
  11678. "value" : "SQL Injection vulnerability in Online Book Store v1.0 via the bookisbn parameter to book.php parameter, which could let a remote malicious user execute arbitrary code."
  11679. } ]
  11680. }
  11681. },
  11682. "configurations" : {
  11683. "CVE_data_version" : "4.0",
  11684. "nodes" : [ {
  11685. "operator" : "OR",
  11686. "children" : [ ],
  11687. "cpe_match" : [ {
  11688. "vulnerable" : true,
  11689. "cpe23Uri" : "cpe:2.3:a:projectworlds:online_book_store_project_in_php:1.0:*:*:*:*:*:*:*",
  11690. "cpe_name" : [ ]
  11691. } ]
  11692. } ]
  11693. },
  11694. "impact" : {
  11695. "baseMetricV3" : {
  11696. "cvssV3" : {
  11697. "version" : "3.1",
  11698. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  11699. "attackVector" : "NETWORK",
  11700. "attackComplexity" : "LOW",
  11701. "privilegesRequired" : "NONE",
  11702. "userInteraction" : "NONE",
  11703. "scope" : "UNCHANGED",
  11704. "confidentialityImpact" : "HIGH",
  11705. "integrityImpact" : "HIGH",
  11706. "availabilityImpact" : "HIGH",
  11707. "baseScore" : 9.8,
  11708. "baseSeverity" : "CRITICAL"
  11709. },
  11710. "exploitabilityScore" : 3.9,
  11711. "impactScore" : 5.9
  11712. },
  11713. "baseMetricV2" : {
  11714. "cvssV2" : {
  11715. "version" : "2.0",
  11716. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  11717. "accessVector" : "NETWORK",
  11718. "accessComplexity" : "LOW",
  11719. "authentication" : "NONE",
  11720. "confidentialityImpact" : "PARTIAL",
  11721. "integrityImpact" : "PARTIAL",
  11722. "availabilityImpact" : "PARTIAL",
  11723. "baseScore" : 7.5
  11724. },
  11725. "severity" : "HIGH",
  11726. "exploitabilityScore" : 10.0,
  11727. "impactScore" : 6.4,
  11728. "acInsufInfo" : false,
  11729. "obtainAllPrivilege" : false,
  11730. "obtainUserPrivilege" : false,
  11731. "obtainOtherPrivilege" : false,
  11732. "userInteractionRequired" : false
  11733. }
  11734. },
  11735. "publishedDate" : "2021-05-06T13:15Z",
  11736. "lastModifiedDate" : "2021-05-07T15:48Z"
  11737. }, {
  11738. "cve" : {
  11739. "data_type" : "CVE",
  11740. "data_format" : "MITRE",
  11741. "data_version" : "4.0",
  11742. "CVE_data_meta" : {
  11743. "ID" : "CVE-2020-19109",
  11744. "ASSIGNER" : "cve@mitre.org"
  11745. },
  11746. "problemtype" : {
  11747. "problemtype_data" : [ {
  11748. "description" : [ {
  11749. "lang" : "en",
  11750. "value" : "CWE-89"
  11751. } ]
  11752. } ]
  11753. },
  11754. "references" : {
  11755. "reference_data" : [ {
  11756. "url" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/12",
  11757. "name" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/12",
  11758. "refsource" : "MISC",
  11759. "tags" : [ "Exploit", "Third Party Advisory" ]
  11760. } ]
  11761. },
  11762. "description" : {
  11763. "description_data" : [ {
  11764. "lang" : "en",
  11765. "value" : "SQL Injection vulnerability in Online Book Store v1.0 via the bookisbn parameter to admin_edit.php, which could let a remote malicious user execute arbitrary code."
  11766. } ]
  11767. }
  11768. },
  11769. "configurations" : {
  11770. "CVE_data_version" : "4.0",
  11771. "nodes" : [ {
  11772. "operator" : "OR",
  11773. "children" : [ ],
  11774. "cpe_match" : [ {
  11775. "vulnerable" : true,
  11776. "cpe23Uri" : "cpe:2.3:a:projectworlds:online_book_store_project_in_php:1.0:*:*:*:*:*:*:*",
  11777. "cpe_name" : [ ]
  11778. } ]
  11779. } ]
  11780. },
  11781. "impact" : {
  11782. "baseMetricV3" : {
  11783. "cvssV3" : {
  11784. "version" : "3.1",
  11785. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  11786. "attackVector" : "NETWORK",
  11787. "attackComplexity" : "LOW",
  11788. "privilegesRequired" : "NONE",
  11789. "userInteraction" : "NONE",
  11790. "scope" : "UNCHANGED",
  11791. "confidentialityImpact" : "HIGH",
  11792. "integrityImpact" : "HIGH",
  11793. "availabilityImpact" : "HIGH",
  11794. "baseScore" : 9.8,
  11795. "baseSeverity" : "CRITICAL"
  11796. },
  11797. "exploitabilityScore" : 3.9,
  11798. "impactScore" : 5.9
  11799. },
  11800. "baseMetricV2" : {
  11801. "cvssV2" : {
  11802. "version" : "2.0",
  11803. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  11804. "accessVector" : "NETWORK",
  11805. "accessComplexity" : "LOW",
  11806. "authentication" : "NONE",
  11807. "confidentialityImpact" : "PARTIAL",
  11808. "integrityImpact" : "PARTIAL",
  11809. "availabilityImpact" : "PARTIAL",
  11810. "baseScore" : 7.5
  11811. },
  11812. "severity" : "HIGH",
  11813. "exploitabilityScore" : 10.0,
  11814. "impactScore" : 6.4,
  11815. "acInsufInfo" : false,
  11816. "obtainAllPrivilege" : false,
  11817. "obtainUserPrivilege" : false,
  11818. "obtainOtherPrivilege" : false,
  11819. "userInteractionRequired" : false
  11820. }
  11821. },
  11822. "publishedDate" : "2021-05-06T13:15Z",
  11823. "lastModifiedDate" : "2021-05-07T15:51Z"
  11824. }, {
  11825. "cve" : {
  11826. "data_type" : "CVE",
  11827. "data_format" : "MITRE",
  11828. "data_version" : "4.0",
  11829. "CVE_data_meta" : {
  11830. "ID" : "CVE-2020-19108",
  11831. "ASSIGNER" : "cve@mitre.org"
  11832. },
  11833. "problemtype" : {
  11834. "problemtype_data" : [ {
  11835. "description" : [ {
  11836. "lang" : "en",
  11837. "value" : "CWE-89"
  11838. } ]
  11839. } ]
  11840. },
  11841. "references" : {
  11842. "reference_data" : [ {
  11843. "url" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/10",
  11844. "name" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/10",
  11845. "refsource" : "MISC",
  11846. "tags" : [ "Exploit", "Third Party Advisory" ]
  11847. } ]
  11848. },
  11849. "description" : {
  11850. "description_data" : [ {
  11851. "lang" : "en",
  11852. "value" : "SQL Injection vulnerability in Online Book Store v1.0 via the pubid parameter to bookPerPub.php, which could let a remote malicious user execute arbitrary code."
  11853. } ]
  11854. }
  11855. },
  11856. "configurations" : {
  11857. "CVE_data_version" : "4.0",
  11858. "nodes" : [ {
  11859. "operator" : "OR",
  11860. "children" : [ ],
  11861. "cpe_match" : [ {
  11862. "vulnerable" : true,
  11863. "cpe23Uri" : "cpe:2.3:a:projectworlds:online_book_store_project_in_php:1.0:*:*:*:*:*:*:*",
  11864. "cpe_name" : [ ]
  11865. } ]
  11866. } ]
  11867. },
  11868. "impact" : {
  11869. "baseMetricV3" : {
  11870. "cvssV3" : {
  11871. "version" : "3.1",
  11872. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  11873. "attackVector" : "NETWORK",
  11874. "attackComplexity" : "LOW",
  11875. "privilegesRequired" : "NONE",
  11876. "userInteraction" : "NONE",
  11877. "scope" : "UNCHANGED",
  11878. "confidentialityImpact" : "HIGH",
  11879. "integrityImpact" : "HIGH",
  11880. "availabilityImpact" : "HIGH",
  11881. "baseScore" : 9.8,
  11882. "baseSeverity" : "CRITICAL"
  11883. },
  11884. "exploitabilityScore" : 3.9,
  11885. "impactScore" : 5.9
  11886. },
  11887. "baseMetricV2" : {
  11888. "cvssV2" : {
  11889. "version" : "2.0",
  11890. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  11891. "accessVector" : "NETWORK",
  11892. "accessComplexity" : "LOW",
  11893. "authentication" : "NONE",
  11894. "confidentialityImpact" : "PARTIAL",
  11895. "integrityImpact" : "PARTIAL",
  11896. "availabilityImpact" : "PARTIAL",
  11897. "baseScore" : 7.5
  11898. },
  11899. "severity" : "HIGH",
  11900. "exploitabilityScore" : 10.0,
  11901. "impactScore" : 6.4,
  11902. "acInsufInfo" : false,
  11903. "obtainAllPrivilege" : false,
  11904. "obtainUserPrivilege" : false,
  11905. "obtainOtherPrivilege" : false,
  11906. "userInteractionRequired" : false
  11907. }
  11908. },
  11909. "publishedDate" : "2021-05-06T13:15Z",
  11910. "lastModifiedDate" : "2021-05-07T15:51Z"
  11911. }, {
  11912. "cve" : {
  11913. "data_type" : "CVE",
  11914. "data_format" : "MITRE",
  11915. "data_version" : "4.0",
  11916. "CVE_data_meta" : {
  11917. "ID" : "CVE-2020-19107",
  11918. "ASSIGNER" : "cve@mitre.org"
  11919. },
  11920. "problemtype" : {
  11921. "problemtype_data" : [ {
  11922. "description" : [ {
  11923. "lang" : "en",
  11924. "value" : "CWE-89"
  11925. } ]
  11926. } ]
  11927. },
  11928. "references" : {
  11929. "reference_data" : [ {
  11930. "url" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/9",
  11931. "name" : "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/9",
  11932. "refsource" : "MISC",
  11933. "tags" : [ "Exploit", "Third Party Advisory" ]
  11934. } ]
  11935. },
  11936. "description" : {
  11937. "description_data" : [ {
  11938. "lang" : "en",
  11939. "value" : "SQL Injection vulnerability in Online Book Store v1.0 via the isbn parameter to edit_book.php, which could let a remote malicious user execute arbitrary code."
  11940. } ]
  11941. }
  11942. },
  11943. "configurations" : {
  11944. "CVE_data_version" : "4.0",
  11945. "nodes" : [ {
  11946. "operator" : "OR",
  11947. "children" : [ ],
  11948. "cpe_match" : [ {
  11949. "vulnerable" : true,
  11950. "cpe23Uri" : "cpe:2.3:a:projectworlds:online_book_store_project_in_php:1.0:*:*:*:*:*:*:*",
  11951. "cpe_name" : [ ]
  11952. } ]
  11953. } ]
  11954. },
  11955. "impact" : {
  11956. "baseMetricV3" : {
  11957. "cvssV3" : {
  11958. "version" : "3.1",
  11959. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  11960. "attackVector" : "NETWORK",
  11961. "attackComplexity" : "LOW",
  11962. "privilegesRequired" : "NONE",
  11963. "userInteraction" : "NONE",
  11964. "scope" : "UNCHANGED",
  11965. "confidentialityImpact" : "HIGH",
  11966. "integrityImpact" : "HIGH",
  11967. "availabilityImpact" : "HIGH",
  11968. "baseScore" : 9.8,
  11969. "baseSeverity" : "CRITICAL"
  11970. },
  11971. "exploitabilityScore" : 3.9,
  11972. "impactScore" : 5.9
  11973. },
  11974. "baseMetricV2" : {
  11975. "cvssV2" : {
  11976. "version" : "2.0",
  11977. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  11978. "accessVector" : "NETWORK",
  11979. "accessComplexity" : "LOW",
  11980. "authentication" : "NONE",
  11981. "confidentialityImpact" : "PARTIAL",
  11982. "integrityImpact" : "PARTIAL",
  11983. "availabilityImpact" : "PARTIAL",
  11984. "baseScore" : 7.5
  11985. },
  11986. "severity" : "HIGH",
  11987. "exploitabilityScore" : 10.0,
  11988. "impactScore" : 6.4,
  11989. "acInsufInfo" : false,
  11990. "obtainAllPrivilege" : false,
  11991. "obtainUserPrivilege" : false,
  11992. "obtainOtherPrivilege" : false,
  11993. "userInteractionRequired" : false
  11994. }
  11995. },
  11996. "publishedDate" : "2021-05-06T13:15Z",
  11997. "lastModifiedDate" : "2021-05-07T15:51Z"
  11998. }, {
  11999. "cve" : {
  12000. "data_type" : "CVE",
  12001. "data_format" : "MITRE",
  12002. "data_version" : "4.0",
  12003. "CVE_data_meta" : {
  12004. "ID" : "CVE-2021-31411",
  12005. "ASSIGNER" : "security@vaadin.com"
  12006. },
  12007. "problemtype" : {
  12008. "problemtype_data" : [ {
  12009. "description" : [ ]
  12010. } ]
  12011. },
  12012. "references" : {
  12013. "reference_data" : [ {
  12014. "url" : "https://vaadin.com/security/cve-2021-31411",
  12015. "name" : "https://vaadin.com/security/cve-2021-31411",
  12016. "refsource" : "CONFIRM",
  12017. "tags" : [ ]
  12018. }, {
  12019. "url" : "https://github.com/vaadin/flow/pull/10640",
  12020. "name" : "https://github.com/vaadin/flow/pull/10640",
  12021. "refsource" : "CONFIRM",
  12022. "tags" : [ ]
  12023. } ]
  12024. },
  12025. "description" : {
  12026. "description_data" : [ {
  12027. "lang" : "en",
  12028. "value" : "Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds."
  12029. } ]
  12030. }
  12031. },
  12032. "configurations" : {
  12033. "CVE_data_version" : "4.0",
  12034. "nodes" : [ ]
  12035. },
  12036. "impact" : { },
  12037. "publishedDate" : "2021-05-05T19:15Z",
  12038. "lastModifiedDate" : "2021-05-05T19:21Z"
  12039. }, {
  12040. "cve" : {
  12041. "data_type" : "CVE",
  12042. "data_format" : "MITRE",
  12043. "data_version" : "4.0",
  12044. "CVE_data_meta" : {
  12045. "ID" : "CVE-2021-29101",
  12046. "ASSIGNER" : "psirt@esri.com"
  12047. },
  12048. "problemtype" : {
  12049. "problemtype_data" : [ {
  12050. "description" : [ ]
  12051. } ]
  12052. },
  12053. "references" : {
  12054. "reference_data" : [ {
  12055. "url" : "https://www.esri.com/arcgis-blog/products/ext-server-geoevent/administration/arcgis-geoevent-server-security-update-2021-patch-1",
  12056. "name" : "https://www.esri.com/arcgis-blog/products/ext-server-geoevent/administration/arcgis-geoevent-server-security-update-2021-patch-1",
  12057. "refsource" : "CONFIRM",
  12058. "tags" : [ ]
  12059. } ]
  12060. },
  12061. "description" : {
  12062. "description_data" : [ {
  12063. "lang" : "en",
  12064. "value" : "ArcGIS GeoEvent Server versions 10.8.1 and below has a read-only directory path traversal vulnerability that could allow an unauthenticated, remote attacker to perform directory traversal attacks and read arbitrary files on the system."
  12065. } ]
  12066. }
  12067. },
  12068. "configurations" : {
  12069. "CVE_data_version" : "4.0",
  12070. "nodes" : [ ]
  12071. },
  12072. "impact" : { },
  12073. "publishedDate" : "2021-05-05T19:15Z",
  12074. "lastModifiedDate" : "2021-05-05T19:21Z"
  12075. }, {
  12076. "cve" : {
  12077. "data_type" : "CVE",
  12078. "data_format" : "MITRE",
  12079. "data_version" : "4.0",
  12080. "CVE_data_meta" : {
  12081. "ID" : "CVE-2021-24293",
  12082. "ASSIGNER" : "contact@wpscan.com"
  12083. },
  12084. "problemtype" : {
  12085. "problemtype_data" : [ {
  12086. "description" : [ {
  12087. "lang" : "en",
  12088. "value" : "CWE-79"
  12089. } ]
  12090. } ]
  12091. },
  12092. "references" : {
  12093. "reference_data" : [ {
  12094. "url" : "https://www.imagely.com/wordpress-gallery-plugin/nextgen-pro/changelog/",
  12095. "name" : "https://www.imagely.com/wordpress-gallery-plugin/nextgen-pro/changelog/",
  12096. "refsource" : "MISC",
  12097. "tags" : [ ]
  12098. }, {
  12099. "url" : "https://wpscan.com/vulnerability/5e1a4725-3d20-44b0-8a35-bbf4263957f7",
  12100. "name" : "https://wpscan.com/vulnerability/5e1a4725-3d20-44b0-8a35-bbf4263957f7",
  12101. "refsource" : "CONFIRM",
  12102. "tags" : [ ]
  12103. } ]
  12104. },
  12105. "description" : {
  12106. "description_data" : [ {
  12107. "lang" : "en",
  12108. "value" : "In the eCommerce module of the NextGEN Gallery Pro WordPress plugin before 3.1.11, there is an action to call get_cart_items via photocrati_ajax , after that the settings[shipping_address][name] is able to inject malicious javascript."
  12109. } ]
  12110. }
  12111. },
  12112. "configurations" : {
  12113. "CVE_data_version" : "4.0",
  12114. "nodes" : [ ]
  12115. },
  12116. "impact" : { },
  12117. "publishedDate" : "2021-05-05T19:15Z",
  12118. "lastModifiedDate" : "2021-05-05T19:21Z"
  12119. }, {
  12120. "cve" : {
  12121. "data_type" : "CVE",
  12122. "data_format" : "MITRE",
  12123. "data_version" : "4.0",
  12124. "CVE_data_meta" : {
  12125. "ID" : "CVE-2021-24276",
  12126. "ASSIGNER" : "contact@wpscan.com"
  12127. },
  12128. "problemtype" : {
  12129. "problemtype_data" : [ {
  12130. "description" : [ {
  12131. "lang" : "en",
  12132. "value" : "CWE-79"
  12133. } ]
  12134. } ]
  12135. },
  12136. "references" : {
  12137. "reference_data" : [ {
  12138. "url" : "https://wpscan.com/vulnerability/1301123c-5e63-432a-ab90-3221ca532d9c",
  12139. "name" : "https://wpscan.com/vulnerability/1301123c-5e63-432a-ab90-3221ca532d9c",
  12140. "refsource" : "CONFIRM",
  12141. "tags" : [ ]
  12142. } ]
  12143. },
  12144. "description" : {
  12145. "description_data" : [ {
  12146. "lang" : "en",
  12147. "value" : "The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue"
  12148. } ]
  12149. }
  12150. },
  12151. "configurations" : {
  12152. "CVE_data_version" : "4.0",
  12153. "nodes" : [ ]
  12154. },
  12155. "impact" : { },
  12156. "publishedDate" : "2021-05-05T19:15Z",
  12157. "lastModifiedDate" : "2021-05-05T19:21Z"
  12158. }, {
  12159. "cve" : {
  12160. "data_type" : "CVE",
  12161. "data_format" : "MITRE",
  12162. "data_version" : "4.0",
  12163. "CVE_data_meta" : {
  12164. "ID" : "CVE-2021-24275",
  12165. "ASSIGNER" : "contact@wpscan.com"
  12166. },
  12167. "problemtype" : {
  12168. "problemtype_data" : [ {
  12169. "description" : [ {
  12170. "lang" : "en",
  12171. "value" : "CWE-79"
  12172. } ]
  12173. } ]
  12174. },
  12175. "references" : {
  12176. "reference_data" : [ {
  12177. "url" : "https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f",
  12178. "name" : "https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f",
  12179. "refsource" : "CONFIRM",
  12180. "tags" : [ ]
  12181. } ]
  12182. },
  12183. "description" : {
  12184. "description_data" : [ {
  12185. "lang" : "en",
  12186. "value" : "The Popup by Supsystic WordPress plugin before 1.10.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue"
  12187. } ]
  12188. }
  12189. },
  12190. "configurations" : {
  12191. "CVE_data_version" : "4.0",
  12192. "nodes" : [ ]
  12193. },
  12194. "impact" : { },
  12195. "publishedDate" : "2021-05-05T19:15Z",
  12196. "lastModifiedDate" : "2021-05-05T19:21Z"
  12197. }, {
  12198. "cve" : {
  12199. "data_type" : "CVE",
  12200. "data_format" : "MITRE",
  12201. "data_version" : "4.0",
  12202. "CVE_data_meta" : {
  12203. "ID" : "CVE-2021-24274",
  12204. "ASSIGNER" : "contact@wpscan.com"
  12205. },
  12206. "problemtype" : {
  12207. "problemtype_data" : [ {
  12208. "description" : [ {
  12209. "lang" : "en",
  12210. "value" : "CWE-79"
  12211. } ]
  12212. } ]
  12213. },
  12214. "references" : {
  12215. "reference_data" : [ {
  12216. "url" : "https://wpscan.com/vulnerability/200a3031-7c42-4189-96b1-bed9e0ab7c1d",
  12217. "name" : "https://wpscan.com/vulnerability/200a3031-7c42-4189-96b1-bed9e0ab7c1d",
  12218. "refsource" : "CONFIRM",
  12219. "tags" : [ ]
  12220. } ]
  12221. },
  12222. "description" : {
  12223. "description_data" : [ {
  12224. "lang" : "en",
  12225. "value" : "The Ultimate Maps by Supsystic WordPress plugin before 1.2.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue"
  12226. } ]
  12227. }
  12228. },
  12229. "configurations" : {
  12230. "CVE_data_version" : "4.0",
  12231. "nodes" : [ ]
  12232. },
  12233. "impact" : { },
  12234. "publishedDate" : "2021-05-05T19:15Z",
  12235. "lastModifiedDate" : "2021-05-05T19:21Z"
  12236. }, {
  12237. "cve" : {
  12238. "data_type" : "CVE",
  12239. "data_format" : "MITRE",
  12240. "data_version" : "4.0",
  12241. "CVE_data_meta" : {
  12242. "ID" : "CVE-2021-24273",
  12243. "ASSIGNER" : "contact@wpscan.com"
  12244. },
  12245. "problemtype" : {
  12246. "problemtype_data" : [ {
  12247. "description" : [ {
  12248. "lang" : "en",
  12249. "value" : "CWE-79"
  12250. } ]
  12251. } ]
  12252. },
  12253. "references" : {
  12254. "reference_data" : [ {
  12255. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12256. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12257. "refsource" : "MISC",
  12258. "tags" : [ ]
  12259. }, {
  12260. "url" : "https://wpscan.com/vulnerability/70ddb3fd-d819-4d85-9f8b-1451a3e3e5a6",
  12261. "name" : "https://wpscan.com/vulnerability/70ddb3fd-d819-4d85-9f8b-1451a3e3e5a6",
  12262. "refsource" : "CONFIRM",
  12263. "tags" : [ ]
  12264. } ]
  12265. },
  12266. "description" : {
  12267. "description_data" : [ {
  12268. "lang" : "en",
  12269. "value" : "The “Clever Addons for Elementor” WordPress Plugin before 2.1.0 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12270. } ]
  12271. }
  12272. },
  12273. "configurations" : {
  12274. "CVE_data_version" : "4.0",
  12275. "nodes" : [ ]
  12276. },
  12277. "impact" : { },
  12278. "publishedDate" : "2021-05-05T19:15Z",
  12279. "lastModifiedDate" : "2021-05-06T13:15Z"
  12280. }, {
  12281. "cve" : {
  12282. "data_type" : "CVE",
  12283. "data_format" : "MITRE",
  12284. "data_version" : "4.0",
  12285. "CVE_data_meta" : {
  12286. "ID" : "CVE-2021-24272",
  12287. "ASSIGNER" : "contact@wpscan.com"
  12288. },
  12289. "problemtype" : {
  12290. "problemtype_data" : [ {
  12291. "description" : [ {
  12292. "lang" : "en",
  12293. "value" : "CWE-352"
  12294. } ]
  12295. } ]
  12296. },
  12297. "references" : {
  12298. "reference_data" : [ {
  12299. "url" : "https://wpscan.com/vulnerability/e643040b-1f3b-4c13-8a20-acfd069dcc4f",
  12300. "name" : "https://wpscan.com/vulnerability/e643040b-1f3b-4c13-8a20-acfd069dcc4f",
  12301. "refsource" : "CONFIRM",
  12302. "tags" : [ ]
  12303. } ]
  12304. },
  12305. "description" : {
  12306. "description_data" : [ {
  12307. "lang" : "en",
  12308. "value" : "The fitness calculators WordPress plugin before 1.9.6 add calculators for Water intake, BMI calculator, protein Intake, and Body Fat and was lacking CSRF check, allowing attackers to make logged in users perform unwanted actions, such as change the calculator headers. Due to the lack of sanitisation, this could also lead to a Stored Cross-Site Scripting issue"
  12309. } ]
  12310. }
  12311. },
  12312. "configurations" : {
  12313. "CVE_data_version" : "4.0",
  12314. "nodes" : [ ]
  12315. },
  12316. "impact" : { },
  12317. "publishedDate" : "2021-05-05T19:15Z",
  12318. "lastModifiedDate" : "2021-05-05T19:21Z"
  12319. }, {
  12320. "cve" : {
  12321. "data_type" : "CVE",
  12322. "data_format" : "MITRE",
  12323. "data_version" : "4.0",
  12324. "CVE_data_meta" : {
  12325. "ID" : "CVE-2021-24271",
  12326. "ASSIGNER" : "contact@wpscan.com"
  12327. },
  12328. "problemtype" : {
  12329. "problemtype_data" : [ {
  12330. "description" : [ {
  12331. "lang" : "en",
  12332. "value" : "CWE-79"
  12333. } ]
  12334. } ]
  12335. },
  12336. "references" : {
  12337. "reference_data" : [ {
  12338. "url" : "https://wpscan.com/vulnerability/1ce8e188-6ded-413e-b4d1-bf80258acf79",
  12339. "name" : "https://wpscan.com/vulnerability/1ce8e188-6ded-413e-b4d1-bf80258acf79",
  12340. "refsource" : "CONFIRM",
  12341. "tags" : [ ]
  12342. }, {
  12343. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12344. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12345. "refsource" : "MISC",
  12346. "tags" : [ ]
  12347. } ]
  12348. },
  12349. "description" : {
  12350. "description_data" : [ {
  12351. "lang" : "en",
  12352. "value" : "The “Ultimate Addons for Elementor” WordPress Plugin before 1.30.0 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12353. } ]
  12354. }
  12355. },
  12356. "configurations" : {
  12357. "CVE_data_version" : "4.0",
  12358. "nodes" : [ ]
  12359. },
  12360. "impact" : { },
  12361. "publishedDate" : "2021-05-05T19:15Z",
  12362. "lastModifiedDate" : "2021-05-06T13:15Z"
  12363. }, {
  12364. "cve" : {
  12365. "data_type" : "CVE",
  12366. "data_format" : "MITRE",
  12367. "data_version" : "4.0",
  12368. "CVE_data_meta" : {
  12369. "ID" : "CVE-2021-24270",
  12370. "ASSIGNER" : "contact@wpscan.com"
  12371. },
  12372. "problemtype" : {
  12373. "problemtype_data" : [ {
  12374. "description" : [ {
  12375. "lang" : "en",
  12376. "value" : "CWE-79"
  12377. } ]
  12378. } ]
  12379. },
  12380. "references" : {
  12381. "reference_data" : [ {
  12382. "url" : "https://wpscan.com/vulnerability/67967784-18b6-4e41-9597-3a4c051f3978",
  12383. "name" : "https://wpscan.com/vulnerability/67967784-18b6-4e41-9597-3a4c051f3978",
  12384. "refsource" : "CONFIRM",
  12385. "tags" : [ ]
  12386. }, {
  12387. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12388. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12389. "refsource" : "MISC",
  12390. "tags" : [ ]
  12391. } ]
  12392. },
  12393. "description" : {
  12394. "description_data" : [ {
  12395. "lang" : "en",
  12396. "value" : "The “DeTheme Kit for Elementor” WordPress Plugin before 1.5.5.5 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12397. } ]
  12398. }
  12399. },
  12400. "configurations" : {
  12401. "CVE_data_version" : "4.0",
  12402. "nodes" : [ ]
  12403. },
  12404. "impact" : { },
  12405. "publishedDate" : "2021-05-05T19:15Z",
  12406. "lastModifiedDate" : "2021-05-06T13:15Z"
  12407. }, {
  12408. "cve" : {
  12409. "data_type" : "CVE",
  12410. "data_format" : "MITRE",
  12411. "data_version" : "4.0",
  12412. "CVE_data_meta" : {
  12413. "ID" : "CVE-2021-24269",
  12414. "ASSIGNER" : "contact@wpscan.com"
  12415. },
  12416. "problemtype" : {
  12417. "problemtype_data" : [ {
  12418. "description" : [ {
  12419. "lang" : "en",
  12420. "value" : "CWE-79"
  12421. } ]
  12422. } ]
  12423. },
  12424. "references" : {
  12425. "reference_data" : [ {
  12426. "url" : "https://wpscan.com/vulnerability/df953a91-f1d8-42e9-8966-f2012d4f97c9",
  12427. "name" : "https://wpscan.com/vulnerability/df953a91-f1d8-42e9-8966-f2012d4f97c9",
  12428. "refsource" : "CONFIRM",
  12429. "tags" : [ ]
  12430. }, {
  12431. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12432. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12433. "refsource" : "MISC",
  12434. "tags" : [ ]
  12435. } ]
  12436. },
  12437. "description" : {
  12438. "description_data" : [ {
  12439. "lang" : "en",
  12440. "value" : "The “Sina Extension for Elementor” WordPress Plugin before 3.3.12 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12441. } ]
  12442. }
  12443. },
  12444. "configurations" : {
  12445. "CVE_data_version" : "4.0",
  12446. "nodes" : [ ]
  12447. },
  12448. "impact" : { },
  12449. "publishedDate" : "2021-05-05T19:15Z",
  12450. "lastModifiedDate" : "2021-05-06T13:15Z"
  12451. }, {
  12452. "cve" : {
  12453. "data_type" : "CVE",
  12454. "data_format" : "MITRE",
  12455. "data_version" : "4.0",
  12456. "CVE_data_meta" : {
  12457. "ID" : "CVE-2021-24268",
  12458. "ASSIGNER" : "contact@wpscan.com"
  12459. },
  12460. "problemtype" : {
  12461. "problemtype_data" : [ {
  12462. "description" : [ {
  12463. "lang" : "en",
  12464. "value" : "CWE-79"
  12465. } ]
  12466. } ]
  12467. },
  12468. "references" : {
  12469. "reference_data" : [ {
  12470. "url" : "https://wpscan.com/vulnerability/68ecb965-2a9d-4e67-b069-c3dbfb14016b",
  12471. "name" : "https://wpscan.com/vulnerability/68ecb965-2a9d-4e67-b069-c3dbfb14016b",
  12472. "refsource" : "CONFIRM",
  12473. "tags" : [ "Third Party Advisory" ]
  12474. }, {
  12475. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12476. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12477. "refsource" : "MISC",
  12478. "tags" : [ "Third Party Advisory" ]
  12479. } ]
  12480. },
  12481. "description" : {
  12482. "description_data" : [ {
  12483. "lang" : "en",
  12484. "value" : "The “JetWidgets For Elementor” WordPress Plugin before 1.0.9 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12485. } ]
  12486. }
  12487. },
  12488. "configurations" : {
  12489. "CVE_data_version" : "4.0",
  12490. "nodes" : [ {
  12491. "operator" : "OR",
  12492. "children" : [ ],
  12493. "cpe_match" : [ {
  12494. "vulnerable" : true,
  12495. "cpe23Uri" : "cpe:2.3:a:crocoblock:jetwidgets_for_elementor:*:*:*:*:*:wordpress:*:*",
  12496. "versionEndExcluding" : "1.0.9:",
  12497. "cpe_name" : [ ]
  12498. } ]
  12499. } ]
  12500. },
  12501. "impact" : {
  12502. "baseMetricV3" : {
  12503. "cvssV3" : {
  12504. "version" : "3.1",
  12505. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  12506. "attackVector" : "NETWORK",
  12507. "attackComplexity" : "LOW",
  12508. "privilegesRequired" : "LOW",
  12509. "userInteraction" : "REQUIRED",
  12510. "scope" : "CHANGED",
  12511. "confidentialityImpact" : "LOW",
  12512. "integrityImpact" : "LOW",
  12513. "availabilityImpact" : "NONE",
  12514. "baseScore" : 5.4,
  12515. "baseSeverity" : "MEDIUM"
  12516. },
  12517. "exploitabilityScore" : 2.3,
  12518. "impactScore" : 2.7
  12519. },
  12520. "baseMetricV2" : {
  12521. "cvssV2" : {
  12522. "version" : "2.0",
  12523. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  12524. "accessVector" : "NETWORK",
  12525. "accessComplexity" : "MEDIUM",
  12526. "authentication" : "SINGLE",
  12527. "confidentialityImpact" : "NONE",
  12528. "integrityImpact" : "PARTIAL",
  12529. "availabilityImpact" : "NONE",
  12530. "baseScore" : 3.5
  12531. },
  12532. "severity" : "LOW",
  12533. "exploitabilityScore" : 6.8,
  12534. "impactScore" : 2.9,
  12535. "acInsufInfo" : false,
  12536. "obtainAllPrivilege" : false,
  12537. "obtainUserPrivilege" : false,
  12538. "obtainOtherPrivilege" : false,
  12539. "userInteractionRequired" : true
  12540. }
  12541. },
  12542. "publishedDate" : "2021-05-05T19:15Z",
  12543. "lastModifiedDate" : "2021-05-07T20:15Z"
  12544. }, {
  12545. "cve" : {
  12546. "data_type" : "CVE",
  12547. "data_format" : "MITRE",
  12548. "data_version" : "4.0",
  12549. "CVE_data_meta" : {
  12550. "ID" : "CVE-2021-24267",
  12551. "ASSIGNER" : "contact@wpscan.com"
  12552. },
  12553. "problemtype" : {
  12554. "problemtype_data" : [ {
  12555. "description" : [ {
  12556. "lang" : "en",
  12557. "value" : "CWE-79"
  12558. } ]
  12559. } ]
  12560. },
  12561. "references" : {
  12562. "reference_data" : [ {
  12563. "url" : "https://wpscan.com/vulnerability/0c96f3a1-d192-481f-9035-5393f4aadc19",
  12564. "name" : "https://wpscan.com/vulnerability/0c96f3a1-d192-481f-9035-5393f4aadc19",
  12565. "refsource" : "CONFIRM",
  12566. "tags" : [ ]
  12567. }, {
  12568. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12569. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12570. "refsource" : "MISC",
  12571. "tags" : [ ]
  12572. } ]
  12573. },
  12574. "description" : {
  12575. "description_data" : [ {
  12576. "lang" : "en",
  12577. "value" : "The “All-in-One Addons for Elementor – WidgetKit” WordPress Plugin before 2.3.10 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12578. } ]
  12579. }
  12580. },
  12581. "configurations" : {
  12582. "CVE_data_version" : "4.0",
  12583. "nodes" : [ ]
  12584. },
  12585. "impact" : { },
  12586. "publishedDate" : "2021-05-05T19:15Z",
  12587. "lastModifiedDate" : "2021-05-06T13:15Z"
  12588. }, {
  12589. "cve" : {
  12590. "data_type" : "CVE",
  12591. "data_format" : "MITRE",
  12592. "data_version" : "4.0",
  12593. "CVE_data_meta" : {
  12594. "ID" : "CVE-2021-24266",
  12595. "ASSIGNER" : "contact@wpscan.com"
  12596. },
  12597. "problemtype" : {
  12598. "problemtype_data" : [ {
  12599. "description" : [ {
  12600. "lang" : "en",
  12601. "value" : "CWE-79"
  12602. } ]
  12603. } ]
  12604. },
  12605. "references" : {
  12606. "reference_data" : [ {
  12607. "url" : "https://wpscan.com/vulnerability/78014ddd-1cc2-4723-8194-4bf478888578",
  12608. "name" : "https://wpscan.com/vulnerability/78014ddd-1cc2-4723-8194-4bf478888578",
  12609. "refsource" : "CONFIRM",
  12610. "tags" : [ ]
  12611. }, {
  12612. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12613. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12614. "refsource" : "MISC",
  12615. "tags" : [ ]
  12616. } ]
  12617. },
  12618. "description" : {
  12619. "description_data" : [ {
  12620. "lang" : "en",
  12621. "value" : "The “The Plus Addons for Elementor Page Builder Lite” WordPress Plugin before 2.0.6 has four widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12622. } ]
  12623. }
  12624. },
  12625. "configurations" : {
  12626. "CVE_data_version" : "4.0",
  12627. "nodes" : [ ]
  12628. },
  12629. "impact" : { },
  12630. "publishedDate" : "2021-05-05T19:15Z",
  12631. "lastModifiedDate" : "2021-05-06T13:15Z"
  12632. }, {
  12633. "cve" : {
  12634. "data_type" : "CVE",
  12635. "data_format" : "MITRE",
  12636. "data_version" : "4.0",
  12637. "CVE_data_meta" : {
  12638. "ID" : "CVE-2021-24265",
  12639. "ASSIGNER" : "contact@wpscan.com"
  12640. },
  12641. "problemtype" : {
  12642. "problemtype_data" : [ {
  12643. "description" : [ {
  12644. "lang" : "en",
  12645. "value" : "CWE-79"
  12646. } ]
  12647. } ]
  12648. },
  12649. "references" : {
  12650. "reference_data" : [ {
  12651. "url" : "https://wpscan.com/vulnerability/9f4771dc-80b5-49ff-9f64-bf6c36f76863",
  12652. "name" : "https://wpscan.com/vulnerability/9f4771dc-80b5-49ff-9f64-bf6c36f76863",
  12653. "refsource" : "CONFIRM",
  12654. "tags" : [ ]
  12655. }, {
  12656. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12657. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12658. "refsource" : "MISC",
  12659. "tags" : [ ]
  12660. } ]
  12661. },
  12662. "description" : {
  12663. "description_data" : [ {
  12664. "lang" : "en",
  12665. "value" : "The “Rife Elementor Extensions & Templates” WordPress Plugin before 1.1.6 has a widget that is vulnerable to stored Cross-Site Scripting(XSS) by lower-privileged users such as contributors, all via a similar method."
  12666. } ]
  12667. }
  12668. },
  12669. "configurations" : {
  12670. "CVE_data_version" : "4.0",
  12671. "nodes" : [ ]
  12672. },
  12673. "impact" : { },
  12674. "publishedDate" : "2021-05-05T19:15Z",
  12675. "lastModifiedDate" : "2021-05-06T13:15Z"
  12676. }, {
  12677. "cve" : {
  12678. "data_type" : "CVE",
  12679. "data_format" : "MITRE",
  12680. "data_version" : "4.0",
  12681. "CVE_data_meta" : {
  12682. "ID" : "CVE-2021-24264",
  12683. "ASSIGNER" : "contact@wpscan.com"
  12684. },
  12685. "problemtype" : {
  12686. "problemtype_data" : [ {
  12687. "description" : [ {
  12688. "lang" : "en",
  12689. "value" : "CWE-79"
  12690. } ]
  12691. } ]
  12692. },
  12693. "references" : {
  12694. "reference_data" : [ {
  12695. "url" : "https://wpscan.com/vulnerability/7fd89a49-fbb0-4308-836b-1f12dc585b1f",
  12696. "name" : "https://wpscan.com/vulnerability/7fd89a49-fbb0-4308-836b-1f12dc585b1f",
  12697. "refsource" : "CONFIRM",
  12698. "tags" : [ ]
  12699. }, {
  12700. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12701. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12702. "refsource" : "MISC",
  12703. "tags" : [ ]
  12704. } ]
  12705. },
  12706. "description" : {
  12707. "description_data" : [ {
  12708. "lang" : "en",
  12709. "value" : "The “Image Hover Effects – Elementor Addon” WordPress Plugin before 1.3.4 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12710. } ]
  12711. }
  12712. },
  12713. "configurations" : {
  12714. "CVE_data_version" : "4.0",
  12715. "nodes" : [ ]
  12716. },
  12717. "impact" : { },
  12718. "publishedDate" : "2021-05-05T19:15Z",
  12719. "lastModifiedDate" : "2021-05-06T13:15Z"
  12720. }, {
  12721. "cve" : {
  12722. "data_type" : "CVE",
  12723. "data_format" : "MITRE",
  12724. "data_version" : "4.0",
  12725. "CVE_data_meta" : {
  12726. "ID" : "CVE-2021-24263",
  12727. "ASSIGNER" : "contact@wpscan.com"
  12728. },
  12729. "problemtype" : {
  12730. "problemtype_data" : [ {
  12731. "description" : [ {
  12732. "lang" : "en",
  12733. "value" : "CWE-79"
  12734. } ]
  12735. } ]
  12736. },
  12737. "references" : {
  12738. "reference_data" : [ {
  12739. "url" : "https://wpscan.com/vulnerability/48876006-b00f-49b7-80a1-b1d6dc2f4eec",
  12740. "name" : "https://wpscan.com/vulnerability/48876006-b00f-49b7-80a1-b1d6dc2f4eec",
  12741. "refsource" : "CONFIRM",
  12742. "tags" : [ ]
  12743. }, {
  12744. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12745. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12746. "refsource" : "MISC",
  12747. "tags" : [ ]
  12748. } ]
  12749. },
  12750. "description" : {
  12751. "description_data" : [ {
  12752. "lang" : "en",
  12753. "value" : "The “Elementor Addons – PowerPack Addons for Elementor” WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12754. } ]
  12755. }
  12756. },
  12757. "configurations" : {
  12758. "CVE_data_version" : "4.0",
  12759. "nodes" : [ ]
  12760. },
  12761. "impact" : { },
  12762. "publishedDate" : "2021-05-05T19:15Z",
  12763. "lastModifiedDate" : "2021-05-06T13:15Z"
  12764. }, {
  12765. "cve" : {
  12766. "data_type" : "CVE",
  12767. "data_format" : "MITRE",
  12768. "data_version" : "4.0",
  12769. "CVE_data_meta" : {
  12770. "ID" : "CVE-2021-24262",
  12771. "ASSIGNER" : "contact@wpscan.com"
  12772. },
  12773. "problemtype" : {
  12774. "problemtype_data" : [ {
  12775. "description" : [ {
  12776. "lang" : "en",
  12777. "value" : "CWE-79"
  12778. } ]
  12779. } ]
  12780. },
  12781. "references" : {
  12782. "reference_data" : [ {
  12783. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12784. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12785. "refsource" : "MISC",
  12786. "tags" : [ ]
  12787. }, {
  12788. "url" : "https://wpscan.com/vulnerability/d6d16357-2bc3-4053-8274-d0275026e56b",
  12789. "name" : "https://wpscan.com/vulnerability/d6d16357-2bc3-4053-8274-d0275026e56b",
  12790. "refsource" : "CONFIRM",
  12791. "tags" : [ ]
  12792. } ]
  12793. },
  12794. "description" : {
  12795. "description_data" : [ {
  12796. "lang" : "en",
  12797. "value" : "The “WooLentor – WooCommerce Elementor Addons + Builder” WordPress Plugin before 1.8.6 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12798. } ]
  12799. }
  12800. },
  12801. "configurations" : {
  12802. "CVE_data_version" : "4.0",
  12803. "nodes" : [ ]
  12804. },
  12805. "impact" : { },
  12806. "publishedDate" : "2021-05-05T19:15Z",
  12807. "lastModifiedDate" : "2021-05-06T13:15Z"
  12808. }, {
  12809. "cve" : {
  12810. "data_type" : "CVE",
  12811. "data_format" : "MITRE",
  12812. "data_version" : "4.0",
  12813. "CVE_data_meta" : {
  12814. "ID" : "CVE-2021-24261",
  12815. "ASSIGNER" : "contact@wpscan.com"
  12816. },
  12817. "problemtype" : {
  12818. "problemtype_data" : [ {
  12819. "description" : [ {
  12820. "lang" : "en",
  12821. "value" : "CWE-79"
  12822. } ]
  12823. } ]
  12824. },
  12825. "references" : {
  12826. "reference_data" : [ {
  12827. "url" : "https://wpscan.com/vulnerability/0377705d-29e9-47db-a5bb-8acaf311a38f",
  12828. "name" : "https://wpscan.com/vulnerability/0377705d-29e9-47db-a5bb-8acaf311a38f",
  12829. "refsource" : "CONFIRM",
  12830. "tags" : [ ]
  12831. }, {
  12832. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12833. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12834. "refsource" : "MISC",
  12835. "tags" : [ ]
  12836. } ]
  12837. },
  12838. "description" : {
  12839. "description_data" : [ {
  12840. "lang" : "en",
  12841. "value" : "The “HT Mega – Absolute Addons for Elementor Page Builder” WordPress Plugin before 1.5.7 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12842. } ]
  12843. }
  12844. },
  12845. "configurations" : {
  12846. "CVE_data_version" : "4.0",
  12847. "nodes" : [ ]
  12848. },
  12849. "impact" : { },
  12850. "publishedDate" : "2021-05-05T19:15Z",
  12851. "lastModifiedDate" : "2021-05-06T13:15Z"
  12852. }, {
  12853. "cve" : {
  12854. "data_type" : "CVE",
  12855. "data_format" : "MITRE",
  12856. "data_version" : "4.0",
  12857. "CVE_data_meta" : {
  12858. "ID" : "CVE-2021-24260",
  12859. "ASSIGNER" : "contact@wpscan.com"
  12860. },
  12861. "problemtype" : {
  12862. "problemtype_data" : [ {
  12863. "description" : [ {
  12864. "lang" : "en",
  12865. "value" : "CWE-79"
  12866. } ]
  12867. } ]
  12868. },
  12869. "references" : {
  12870. "reference_data" : [ {
  12871. "url" : "https://wpscan.com/vulnerability/fa6c7c7c-1027-4fa9-bb55-07ae2bb7f021",
  12872. "name" : "https://wpscan.com/vulnerability/fa6c7c7c-1027-4fa9-bb55-07ae2bb7f021",
  12873. "refsource" : "CONFIRM",
  12874. "tags" : [ ]
  12875. }, {
  12876. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12877. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12878. "refsource" : "MISC",
  12879. "tags" : [ ]
  12880. } ]
  12881. },
  12882. "description" : {
  12883. "description_data" : [ {
  12884. "lang" : "en",
  12885. "value" : "The “Livemesh Addons for Elementor” WordPress Plugin before 6.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12886. } ]
  12887. }
  12888. },
  12889. "configurations" : {
  12890. "CVE_data_version" : "4.0",
  12891. "nodes" : [ ]
  12892. },
  12893. "impact" : { },
  12894. "publishedDate" : "2021-05-05T19:15Z",
  12895. "lastModifiedDate" : "2021-05-06T13:15Z"
  12896. }, {
  12897. "cve" : {
  12898. "data_type" : "CVE",
  12899. "data_format" : "MITRE",
  12900. "data_version" : "4.0",
  12901. "CVE_data_meta" : {
  12902. "ID" : "CVE-2021-24259",
  12903. "ASSIGNER" : "contact@wpscan.com"
  12904. },
  12905. "problemtype" : {
  12906. "problemtype_data" : [ {
  12907. "description" : [ {
  12908. "lang" : "en",
  12909. "value" : "CWE-79"
  12910. } ]
  12911. } ]
  12912. },
  12913. "references" : {
  12914. "reference_data" : [ {
  12915. "url" : "https://wpscan.com/vulnerability/0719063f-7743-4a34-94b9-f67fd98e5990",
  12916. "name" : "https://wpscan.com/vulnerability/0719063f-7743-4a34-94b9-f67fd98e5990",
  12917. "refsource" : "CONFIRM",
  12918. "tags" : [ ]
  12919. }, {
  12920. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12921. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12922. "refsource" : "MISC",
  12923. "tags" : [ ]
  12924. } ]
  12925. },
  12926. "description" : {
  12927. "description_data" : [ {
  12928. "lang" : "en",
  12929. "value" : "The “Elementor Addon Elements” WordPress Plugin before 1.11.2 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12930. } ]
  12931. }
  12932. },
  12933. "configurations" : {
  12934. "CVE_data_version" : "4.0",
  12935. "nodes" : [ ]
  12936. },
  12937. "impact" : { },
  12938. "publishedDate" : "2021-05-05T19:15Z",
  12939. "lastModifiedDate" : "2021-05-06T13:15Z"
  12940. }, {
  12941. "cve" : {
  12942. "data_type" : "CVE",
  12943. "data_format" : "MITRE",
  12944. "data_version" : "4.0",
  12945. "CVE_data_meta" : {
  12946. "ID" : "CVE-2021-24258",
  12947. "ASSIGNER" : "contact@wpscan.com"
  12948. },
  12949. "problemtype" : {
  12950. "problemtype_data" : [ {
  12951. "description" : [ {
  12952. "lang" : "en",
  12953. "value" : "CWE-79"
  12954. } ]
  12955. } ]
  12956. },
  12957. "references" : {
  12958. "reference_data" : [ {
  12959. "url" : "https://wpscan.com/vulnerability/47b47b86-899b-4de3-8a3c-2d5d1774298f",
  12960. "name" : "https://wpscan.com/vulnerability/47b47b86-899b-4de3-8a3c-2d5d1774298f",
  12961. "refsource" : "CONFIRM",
  12962. "tags" : [ ]
  12963. }, {
  12964. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12965. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  12966. "refsource" : "MISC",
  12967. "tags" : [ ]
  12968. } ]
  12969. },
  12970. "description" : {
  12971. "description_data" : [ {
  12972. "lang" : "en",
  12973. "value" : "The Elements Kit Lite and Elements Kit Pro WordPress Plugins before 2.2.0 have a number of widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  12974. } ]
  12975. }
  12976. },
  12977. "configurations" : {
  12978. "CVE_data_version" : "4.0",
  12979. "nodes" : [ ]
  12980. },
  12981. "impact" : { },
  12982. "publishedDate" : "2021-05-05T19:15Z",
  12983. "lastModifiedDate" : "2021-05-05T19:21Z"
  12984. }, {
  12985. "cve" : {
  12986. "data_type" : "CVE",
  12987. "data_format" : "MITRE",
  12988. "data_version" : "4.0",
  12989. "CVE_data_meta" : {
  12990. "ID" : "CVE-2021-24257",
  12991. "ASSIGNER" : "contact@wpscan.com"
  12992. },
  12993. "problemtype" : {
  12994. "problemtype_data" : [ {
  12995. "description" : [ {
  12996. "lang" : "en",
  12997. "value" : "CWE-79"
  12998. } ]
  12999. } ]
  13000. },
  13001. "references" : {
  13002. "reference_data" : [ {
  13003. "url" : "https://wpscan.com/vulnerability/4ad8314e-1cbe-4642-b4ee-aac2060f9a25",
  13004. "name" : "https://wpscan.com/vulnerability/4ad8314e-1cbe-4642-b4ee-aac2060f9a25",
  13005. "refsource" : "CONFIRM",
  13006. "tags" : [ ]
  13007. }, {
  13008. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  13009. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  13010. "refsource" : "MISC",
  13011. "tags" : [ ]
  13012. } ]
  13013. },
  13014. "description" : {
  13015. "description_data" : [ {
  13016. "lang" : "en",
  13017. "value" : "The “Premium Addons for Elementor” WordPress Plugin before 4.2.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  13018. } ]
  13019. }
  13020. },
  13021. "configurations" : {
  13022. "CVE_data_version" : "4.0",
  13023. "nodes" : [ ]
  13024. },
  13025. "impact" : { },
  13026. "publishedDate" : "2021-05-05T19:15Z",
  13027. "lastModifiedDate" : "2021-05-06T13:15Z"
  13028. }, {
  13029. "cve" : {
  13030. "data_type" : "CVE",
  13031. "data_format" : "MITRE",
  13032. "data_version" : "4.0",
  13033. "CVE_data_meta" : {
  13034. "ID" : "CVE-2021-24256",
  13035. "ASSIGNER" : "contact@wpscan.com"
  13036. },
  13037. "problemtype" : {
  13038. "problemtype_data" : [ {
  13039. "description" : [ {
  13040. "lang" : "en",
  13041. "value" : "CWE-79"
  13042. } ]
  13043. } ]
  13044. },
  13045. "references" : {
  13046. "reference_data" : [ {
  13047. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  13048. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  13049. "refsource" : "MISC",
  13050. "tags" : [ ]
  13051. }, {
  13052. "url" : "https://wpscan.com/vulnerability/a9412fed-aed3-4931-a504-1a86f876892e",
  13053. "name" : "https://wpscan.com/vulnerability/a9412fed-aed3-4931-a504-1a86f876892e",
  13054. "refsource" : "CONFIRM",
  13055. "tags" : [ ]
  13056. } ]
  13057. },
  13058. "description" : {
  13059. "description_data" : [ {
  13060. "lang" : "en",
  13061. "value" : "The “Elementor – Header, Footer & Blocks Template” WordPress Plugin before 1.5.8 has two widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method."
  13062. } ]
  13063. }
  13064. },
  13065. "configurations" : {
  13066. "CVE_data_version" : "4.0",
  13067. "nodes" : [ ]
  13068. },
  13069. "impact" : { },
  13070. "publishedDate" : "2021-05-05T19:15Z",
  13071. "lastModifiedDate" : "2021-05-06T13:15Z"
  13072. }, {
  13073. "cve" : {
  13074. "data_type" : "CVE",
  13075. "data_format" : "MITRE",
  13076. "data_version" : "4.0",
  13077. "CVE_data_meta" : {
  13078. "ID" : "CVE-2021-24255",
  13079. "ASSIGNER" : "contact@wpscan.com"
  13080. },
  13081. "problemtype" : {
  13082. "problemtype_data" : [ {
  13083. "description" : [ {
  13084. "lang" : "en",
  13085. "value" : "CWE-79"
  13086. } ]
  13087. } ]
  13088. },
  13089. "references" : {
  13090. "reference_data" : [ {
  13091. "url" : "https://wpscan.com/vulnerability/7fb708da-e8c4-4455-b4f9-c4ad72f877da",
  13092. "name" : "https://wpscan.com/vulnerability/7fb708da-e8c4-4455-b4f9-c4ad72f877da",
  13093. "refsource" : "CONFIRM",
  13094. "tags" : [ ]
  13095. }, {
  13096. "url" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  13097. "name" : "https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/",
  13098. "refsource" : "MISC",
  13099. "tags" : [ ]
  13100. } ]
  13101. },
  13102. "description" : {
  13103. "description_data" : [ {
  13104. "lang" : "en",
  13105. "value" : "The Essential Addons for Elementor Lite WordPress Plugin before 4.5.4 has two widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, both via a similar method."
  13106. } ]
  13107. }
  13108. },
  13109. "configurations" : {
  13110. "CVE_data_version" : "4.0",
  13111. "nodes" : [ ]
  13112. },
  13113. "impact" : { },
  13114. "publishedDate" : "2021-05-05T19:15Z",
  13115. "lastModifiedDate" : "2021-05-05T19:21Z"
  13116. }, {
  13117. "cve" : {
  13118. "data_type" : "CVE",
  13119. "data_format" : "MITRE",
  13120. "data_version" : "4.0",
  13121. "CVE_data_meta" : {
  13122. "ID" : "CVE-2021-32055",
  13123. "ASSIGNER" : "cve@mitre.org"
  13124. },
  13125. "problemtype" : {
  13126. "problemtype_data" : [ {
  13127. "description" : [ ]
  13128. } ]
  13129. },
  13130. "references" : {
  13131. "reference_data" : [ {
  13132. "url" : "https://gitlab.com/muttmua/mutt/-/commit/7c4779ac24d2fb68a2a47b58c7904118f40965d5",
  13133. "name" : "https://gitlab.com/muttmua/mutt/-/commit/7c4779ac24d2fb68a2a47b58c7904118f40965d5",
  13134. "refsource" : "MISC",
  13135. "tags" : [ ]
  13136. }, {
  13137. "url" : "http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20210503/000036.html",
  13138. "name" : "http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20210503/000036.html",
  13139. "refsource" : "MISC",
  13140. "tags" : [ ]
  13141. }, {
  13142. "url" : "https://github.com/neomutt/neomutt/commit/fa1db5785e5cfd9d3cd27b7571b9fe268d2ec2dc",
  13143. "name" : "https://github.com/neomutt/neomutt/commit/fa1db5785e5cfd9d3cd27b7571b9fe268d2ec2dc",
  13144. "refsource" : "MISC",
  13145. "tags" : [ ]
  13146. } ]
  13147. },
  13148. "description" : {
  13149. "description_data" : [ {
  13150. "lang" : "en",
  13151. "value" : "Mutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresync issue in which imap/util.c has an out-of-bounds read in situations where an IMAP sequence set ends with a comma. NOTE: the $imap_qresync setting for QRESYNC is not enabled by default."
  13152. } ]
  13153. }
  13154. },
  13155. "configurations" : {
  13156. "CVE_data_version" : "4.0",
  13157. "nodes" : [ ]
  13158. },
  13159. "impact" : { },
  13160. "publishedDate" : "2021-05-05T16:15Z",
  13161. "lastModifiedDate" : "2021-05-05T18:11Z"
  13162. }, {
  13163. "cve" : {
  13164. "data_type" : "CVE",
  13165. "data_format" : "MITRE",
  13166. "data_version" : "4.0",
  13167. "CVE_data_meta" : {
  13168. "ID" : "CVE-2021-29489",
  13169. "ASSIGNER" : "security-advisories@github.com"
  13170. },
  13171. "problemtype" : {
  13172. "problemtype_data" : [ {
  13173. "description" : [ {
  13174. "lang" : "en",
  13175. "value" : "CWE-79"
  13176. } ]
  13177. } ]
  13178. },
  13179. "references" : {
  13180. "reference_data" : [ {
  13181. "url" : "https://github.com/highcharts/highcharts/security/advisories/GHSA-8j65-4pcq-xq95",
  13182. "name" : "https://github.com/highcharts/highcharts/security/advisories/GHSA-8j65-4pcq-xq95",
  13183. "refsource" : "CONFIRM",
  13184. "tags" : [ ]
  13185. } ]
  13186. },
  13187. "description" : {
  13188. "description_data" : [ {
  13189. "lang" : "en",
  13190. "value" : "Highcharts JS is a JavaScript charting library based on SVG. In Highcharts versions 8 and earlier, the chart options structure was not systematically filtered for XSS vectors. The potential impact was that content from untrusted sources could execute code in the end user's browser. The vulnerability is patched in version 9. As a workaround, implementers who are not able to upgrade may apply DOMPurify recursively to the options structure to filter out malicious markup."
  13191. } ]
  13192. }
  13193. },
  13194. "configurations" : {
  13195. "CVE_data_version" : "4.0",
  13196. "nodes" : [ ]
  13197. },
  13198. "impact" : { },
  13199. "publishedDate" : "2021-05-05T16:15Z",
  13200. "lastModifiedDate" : "2021-05-05T18:11Z"
  13201. }, {
  13202. "cve" : {
  13203. "data_type" : "CVE",
  13204. "data_format" : "MITRE",
  13205. "data_version" : "4.0",
  13206. "CVE_data_meta" : {
  13207. "ID" : "CVE-2021-29100",
  13208. "ASSIGNER" : "psirt@esri.com"
  13209. },
  13210. "problemtype" : {
  13211. "problemtype_data" : [ {
  13212. "description" : [ ]
  13213. } ]
  13214. },
  13215. "references" : {
  13216. "reference_data" : [ {
  13217. "url" : "https://www.esri.com/arcgis-blog/products/arcgis-earth/administration/arcgis-earth-security-update",
  13218. "name" : "https://www.esri.com/arcgis-blog/products/arcgis-earth/administration/arcgis-earth-security-update",
  13219. "refsource" : "CONFIRM",
  13220. "tags" : [ ]
  13221. } ]
  13222. },
  13223. "description" : {
  13224. "description_data" : [ {
  13225. "lang" : "en",
  13226. "value" : "A path traversal vulnerability exists in Esri ArcGIS Earth versions 1.11.0 and below which allows arbitrary file creation on an affected system through crafted input. An attacker could exploit this vulnerability to gain arbitrary code execution under security context of the user running ArcGIS Earth by inducing the user to upload a crafted file to an affected system."
  13227. } ]
  13228. }
  13229. },
  13230. "configurations" : {
  13231. "CVE_data_version" : "4.0",
  13232. "nodes" : [ ]
  13233. },
  13234. "impact" : { },
  13235. "publishedDate" : "2021-05-05T16:15Z",
  13236. "lastModifiedDate" : "2021-05-05T18:11Z"
  13237. }, {
  13238. "cve" : {
  13239. "data_type" : "CVE",
  13240. "data_format" : "MITRE",
  13241. "data_version" : "4.0",
  13242. "CVE_data_meta" : {
  13243. "ID" : "CVE-2021-20401",
  13244. "ASSIGNER" : "psirt@us.ibm.com"
  13245. },
  13246. "problemtype" : {
  13247. "problemtype_data" : [ {
  13248. "description" : [ {
  13249. "lang" : "en",
  13250. "value" : "CWE-798"
  13251. } ]
  13252. } ]
  13253. },
  13254. "references" : {
  13255. "reference_data" : [ {
  13256. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/196075",
  13257. "name" : "ibm-qradar-cve202120401-info-disc (196075)",
  13258. "refsource" : "XF",
  13259. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  13260. }, {
  13261. "url" : "https://www.ibm.com/support/pages/node/6449682",
  13262. "name" : "https://www.ibm.com/support/pages/node/6449682",
  13263. "refsource" : "CONFIRM",
  13264. "tags" : [ "Vendor Advisory" ]
  13265. } ]
  13266. },
  13267. "description" : {
  13268. "description_data" : [ {
  13269. "lang" : "en",
  13270. "value" : "IBM QRadar SIEM 7.3 and 7.4 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 196075."
  13271. } ]
  13272. }
  13273. },
  13274. "configurations" : {
  13275. "CVE_data_version" : "4.0",
  13276. "nodes" : [ {
  13277. "operator" : "OR",
  13278. "children" : [ ],
  13279. "cpe_match" : [ {
  13280. "vulnerable" : true,
  13281. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  13282. "versionStartIncluding" : "7.3.0",
  13283. "versionEndExcluding" : "7.3.3",
  13284. "cpe_name" : [ ]
  13285. }, {
  13286. "vulnerable" : true,
  13287. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
  13288. "cpe_name" : [ ]
  13289. }, {
  13290. "vulnerable" : true,
  13291. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_1:*:*:*:*:*:*",
  13292. "cpe_name" : [ ]
  13293. }, {
  13294. "vulnerable" : true,
  13295. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_2:*:*:*:*:*:*",
  13296. "cpe_name" : [ ]
  13297. }, {
  13298. "vulnerable" : true,
  13299. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_3:*:*:*:*:*:*",
  13300. "cpe_name" : [ ]
  13301. }, {
  13302. "vulnerable" : true,
  13303. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_4:*:*:*:*:*:*",
  13304. "cpe_name" : [ ]
  13305. }, {
  13306. "vulnerable" : true,
  13307. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_5:*:*:*:*:*:*",
  13308. "cpe_name" : [ ]
  13309. }, {
  13310. "vulnerable" : true,
  13311. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_6:*:*:*:*:*:*",
  13312. "cpe_name" : [ ]
  13313. }, {
  13314. "vulnerable" : true,
  13315. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_7:*:*:*:*:*:*",
  13316. "cpe_name" : [ ]
  13317. }, {
  13318. "vulnerable" : true,
  13319. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  13320. "versionStartIncluding" : "7.4.0:",
  13321. "versionEndExcluding" : "7.4.2:",
  13322. "cpe_name" : [ ]
  13323. }, {
  13324. "vulnerable" : true,
  13325. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:-:*:*:*:*:*:*",
  13326. "cpe_name" : [ ]
  13327. }, {
  13328. "vulnerable" : true,
  13329. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_1:*:*:*:*:*:*",
  13330. "cpe_name" : [ ]
  13331. }, {
  13332. "vulnerable" : true,
  13333. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_2:*:*:*:*:*:*",
  13334. "cpe_name" : [ ]
  13335. } ]
  13336. } ]
  13337. },
  13338. "impact" : {
  13339. "baseMetricV3" : {
  13340. "cvssV3" : {
  13341. "version" : "3.1",
  13342. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  13343. "attackVector" : "LOCAL",
  13344. "attackComplexity" : "LOW",
  13345. "privilegesRequired" : "LOW",
  13346. "userInteraction" : "NONE",
  13347. "scope" : "UNCHANGED",
  13348. "confidentialityImpact" : "HIGH",
  13349. "integrityImpact" : "HIGH",
  13350. "availabilityImpact" : "HIGH",
  13351. "baseScore" : 7.8,
  13352. "baseSeverity" : "HIGH"
  13353. },
  13354. "exploitabilityScore" : 1.8,
  13355. "impactScore" : 5.9
  13356. },
  13357. "baseMetricV2" : {
  13358. "cvssV2" : {
  13359. "version" : "2.0",
  13360. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  13361. "accessVector" : "LOCAL",
  13362. "accessComplexity" : "LOW",
  13363. "authentication" : "NONE",
  13364. "confidentialityImpact" : "PARTIAL",
  13365. "integrityImpact" : "PARTIAL",
  13366. "availabilityImpact" : "PARTIAL",
  13367. "baseScore" : 4.6
  13368. },
  13369. "severity" : "MEDIUM",
  13370. "exploitabilityScore" : 3.9,
  13371. "impactScore" : 6.4,
  13372. "acInsufInfo" : false,
  13373. "obtainAllPrivilege" : false,
  13374. "obtainUserPrivilege" : false,
  13375. "obtainOtherPrivilege" : false,
  13376. "userInteractionRequired" : false
  13377. }
  13378. },
  13379. "publishedDate" : "2021-05-05T16:15Z",
  13380. "lastModifiedDate" : "2021-05-07T14:19Z"
  13381. }, {
  13382. "cve" : {
  13383. "data_type" : "CVE",
  13384. "data_format" : "MITRE",
  13385. "data_version" : "4.0",
  13386. "CVE_data_meta" : {
  13387. "ID" : "CVE-2021-20397",
  13388. "ASSIGNER" : "psirt@us.ibm.com"
  13389. },
  13390. "problemtype" : {
  13391. "problemtype_data" : [ {
  13392. "description" : [ {
  13393. "lang" : "en",
  13394. "value" : "CWE-79"
  13395. } ]
  13396. } ]
  13397. },
  13398. "references" : {
  13399. "reference_data" : [ {
  13400. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/196017",
  13401. "name" : "ibm-qradar-cve202120397-xss (196017)",
  13402. "refsource" : "XF",
  13403. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  13404. }, {
  13405. "url" : "https://www.ibm.com/support/pages/node/6449688",
  13406. "name" : "https://www.ibm.com/support/pages/node/6449688",
  13407. "refsource" : "CONFIRM",
  13408. "tags" : [ "Vendor Advisory" ]
  13409. } ]
  13410. },
  13411. "description" : {
  13412. "description_data" : [ {
  13413. "lang" : "en",
  13414. "value" : "IBM QRadar SIEM 7.3 and 7.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 196017."
  13415. } ]
  13416. }
  13417. },
  13418. "configurations" : {
  13419. "CVE_data_version" : "4.0",
  13420. "nodes" : [ {
  13421. "operator" : "OR",
  13422. "children" : [ ],
  13423. "cpe_match" : [ {
  13424. "vulnerable" : true,
  13425. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  13426. "versionStartIncluding" : "7.3.0",
  13427. "versionEndExcluding" : "7.3.3",
  13428. "cpe_name" : [ ]
  13429. }, {
  13430. "vulnerable" : true,
  13431. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
  13432. "cpe_name" : [ ]
  13433. }, {
  13434. "vulnerable" : true,
  13435. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_1:*:*:*:*:*:*",
  13436. "cpe_name" : [ ]
  13437. }, {
  13438. "vulnerable" : true,
  13439. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_2:*:*:*:*:*:*",
  13440. "cpe_name" : [ ]
  13441. }, {
  13442. "vulnerable" : true,
  13443. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_3:*:*:*:*:*:*",
  13444. "cpe_name" : [ ]
  13445. }, {
  13446. "vulnerable" : true,
  13447. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_4:*:*:*:*:*:*",
  13448. "cpe_name" : [ ]
  13449. }, {
  13450. "vulnerable" : true,
  13451. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_5:*:*:*:*:*:*",
  13452. "cpe_name" : [ ]
  13453. }, {
  13454. "vulnerable" : true,
  13455. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_6:*:*:*:*:*:*",
  13456. "cpe_name" : [ ]
  13457. }, {
  13458. "vulnerable" : true,
  13459. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_7:*:*:*:*:*:*",
  13460. "cpe_name" : [ ]
  13461. }, {
  13462. "vulnerable" : true,
  13463. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  13464. "versionStartIncluding" : "7.4.0:",
  13465. "versionEndExcluding" : "7.4.2:",
  13466. "cpe_name" : [ ]
  13467. }, {
  13468. "vulnerable" : true,
  13469. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:-:*:*:*:*:*:*",
  13470. "cpe_name" : [ ]
  13471. }, {
  13472. "vulnerable" : true,
  13473. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_1:*:*:*:*:*:*",
  13474. "cpe_name" : [ ]
  13475. }, {
  13476. "vulnerable" : true,
  13477. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_2:*:*:*:*:*:*",
  13478. "cpe_name" : [ ]
  13479. } ]
  13480. } ]
  13481. },
  13482. "impact" : {
  13483. "baseMetricV3" : {
  13484. "cvssV3" : {
  13485. "version" : "3.1",
  13486. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  13487. "attackVector" : "NETWORK",
  13488. "attackComplexity" : "LOW",
  13489. "privilegesRequired" : "NONE",
  13490. "userInteraction" : "REQUIRED",
  13491. "scope" : "CHANGED",
  13492. "confidentialityImpact" : "LOW",
  13493. "integrityImpact" : "LOW",
  13494. "availabilityImpact" : "NONE",
  13495. "baseScore" : 6.1,
  13496. "baseSeverity" : "MEDIUM"
  13497. },
  13498. "exploitabilityScore" : 2.8,
  13499. "impactScore" : 2.7
  13500. },
  13501. "baseMetricV2" : {
  13502. "cvssV2" : {
  13503. "version" : "2.0",
  13504. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  13505. "accessVector" : "NETWORK",
  13506. "accessComplexity" : "MEDIUM",
  13507. "authentication" : "NONE",
  13508. "confidentialityImpact" : "NONE",
  13509. "integrityImpact" : "PARTIAL",
  13510. "availabilityImpact" : "NONE",
  13511. "baseScore" : 4.3
  13512. },
  13513. "severity" : "MEDIUM",
  13514. "exploitabilityScore" : 8.6,
  13515. "impactScore" : 2.9,
  13516. "acInsufInfo" : false,
  13517. "obtainAllPrivilege" : false,
  13518. "obtainUserPrivilege" : false,
  13519. "obtainOtherPrivilege" : false,
  13520. "userInteractionRequired" : true
  13521. }
  13522. },
  13523. "publishedDate" : "2021-05-05T16:15Z",
  13524. "lastModifiedDate" : "2021-05-07T14:27Z"
  13525. }, {
  13526. "cve" : {
  13527. "data_type" : "CVE",
  13528. "data_format" : "MITRE",
  13529. "data_version" : "4.0",
  13530. "CVE_data_meta" : {
  13531. "ID" : "CVE-2020-5013",
  13532. "ASSIGNER" : "psirt@us.ibm.com"
  13533. },
  13534. "problemtype" : {
  13535. "problemtype_data" : [ {
  13536. "description" : [ {
  13537. "lang" : "en",
  13538. "value" : "CWE-611"
  13539. } ]
  13540. } ]
  13541. },
  13542. "references" : {
  13543. "reference_data" : [ {
  13544. "url" : "https://www.ibm.com/support/pages/node/6449690",
  13545. "name" : "https://www.ibm.com/support/pages/node/6449690",
  13546. "refsource" : "CONFIRM",
  13547. "tags" : [ "Vendor Advisory" ]
  13548. }, {
  13549. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/193245",
  13550. "name" : "ibm-qradar-cve20205013-xxe (193245)",
  13551. "refsource" : "XF",
  13552. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  13553. } ]
  13554. },
  13555. "description" : {
  13556. "description_data" : [ {
  13557. "lang" : "en",
  13558. "value" : "IBM QRadar SIEM 7.3 and 7.4 may vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 193245."
  13559. } ]
  13560. }
  13561. },
  13562. "configurations" : {
  13563. "CVE_data_version" : "4.0",
  13564. "nodes" : [ {
  13565. "operator" : "OR",
  13566. "children" : [ ],
  13567. "cpe_match" : [ {
  13568. "vulnerable" : true,
  13569. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  13570. "versionStartIncluding" : "7.3.0",
  13571. "versionEndExcluding" : "7.3.3",
  13572. "cpe_name" : [ ]
  13573. }, {
  13574. "vulnerable" : true,
  13575. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
  13576. "cpe_name" : [ ]
  13577. }, {
  13578. "vulnerable" : true,
  13579. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_1:*:*:*:*:*:*",
  13580. "cpe_name" : [ ]
  13581. }, {
  13582. "vulnerable" : true,
  13583. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_2:*:*:*:*:*:*",
  13584. "cpe_name" : [ ]
  13585. }, {
  13586. "vulnerable" : true,
  13587. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_3:*:*:*:*:*:*",
  13588. "cpe_name" : [ ]
  13589. }, {
  13590. "vulnerable" : true,
  13591. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_4:*:*:*:*:*:*",
  13592. "cpe_name" : [ ]
  13593. }, {
  13594. "vulnerable" : true,
  13595. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_5:*:*:*:*:*:*",
  13596. "cpe_name" : [ ]
  13597. }, {
  13598. "vulnerable" : true,
  13599. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_6:*:*:*:*:*:*",
  13600. "cpe_name" : [ ]
  13601. }, {
  13602. "vulnerable" : true,
  13603. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_7:*:*:*:*:*:*",
  13604. "cpe_name" : [ ]
  13605. }, {
  13606. "vulnerable" : true,
  13607. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  13608. "versionStartIncluding" : "7.4.0:",
  13609. "versionEndExcluding" : "7.4.2:",
  13610. "cpe_name" : [ ]
  13611. }, {
  13612. "vulnerable" : true,
  13613. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:-:*:*:*:*:*:*",
  13614. "cpe_name" : [ ]
  13615. }, {
  13616. "vulnerable" : true,
  13617. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_1:*:*:*:*:*:*",
  13618. "cpe_name" : [ ]
  13619. }, {
  13620. "vulnerable" : true,
  13621. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_2:*:*:*:*:*:*",
  13622. "cpe_name" : [ ]
  13623. } ]
  13624. } ]
  13625. },
  13626. "impact" : {
  13627. "baseMetricV3" : {
  13628. "cvssV3" : {
  13629. "version" : "3.1",
  13630. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
  13631. "attackVector" : "NETWORK",
  13632. "attackComplexity" : "LOW",
  13633. "privilegesRequired" : "LOW",
  13634. "userInteraction" : "NONE",
  13635. "scope" : "UNCHANGED",
  13636. "confidentialityImpact" : "HIGH",
  13637. "integrityImpact" : "NONE",
  13638. "availabilityImpact" : "HIGH",
  13639. "baseScore" : 8.1,
  13640. "baseSeverity" : "HIGH"
  13641. },
  13642. "exploitabilityScore" : 2.8,
  13643. "impactScore" : 5.2
  13644. },
  13645. "baseMetricV2" : {
  13646. "cvssV2" : {
  13647. "version" : "2.0",
  13648. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:P",
  13649. "accessVector" : "NETWORK",
  13650. "accessComplexity" : "LOW",
  13651. "authentication" : "SINGLE",
  13652. "confidentialityImpact" : "PARTIAL",
  13653. "integrityImpact" : "NONE",
  13654. "availabilityImpact" : "PARTIAL",
  13655. "baseScore" : 5.5
  13656. },
  13657. "severity" : "MEDIUM",
  13658. "exploitabilityScore" : 8.0,
  13659. "impactScore" : 4.9,
  13660. "acInsufInfo" : false,
  13661. "obtainAllPrivilege" : false,
  13662. "obtainUserPrivilege" : false,
  13663. "obtainOtherPrivilege" : false,
  13664. "userInteractionRequired" : false
  13665. }
  13666. },
  13667. "publishedDate" : "2021-05-05T16:15Z",
  13668. "lastModifiedDate" : "2021-05-07T14:28Z"
  13669. }, {
  13670. "cve" : {
  13671. "data_type" : "CVE",
  13672. "data_format" : "MITRE",
  13673. "data_version" : "4.0",
  13674. "CVE_data_meta" : {
  13675. "ID" : "CVE-2020-4993",
  13676. "ASSIGNER" : "psirt@us.ibm.com"
  13677. },
  13678. "problemtype" : {
  13679. "problemtype_data" : [ {
  13680. "description" : [ {
  13681. "lang" : "en",
  13682. "value" : "CWE-22"
  13683. } ]
  13684. } ]
  13685. },
  13686. "references" : {
  13687. "reference_data" : [ {
  13688. "url" : "https://www.ibm.com/support/pages/node/6449672",
  13689. "name" : "https://www.ibm.com/support/pages/node/6449672",
  13690. "refsource" : "CONFIRM",
  13691. "tags" : [ "Vendor Advisory" ]
  13692. }, {
  13693. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/192905",
  13694. "name" : "ibm-qradar-cve20204993-path-traversal (192905)",
  13695. "refsource" : "XF",
  13696. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  13697. } ]
  13698. },
  13699. "description" : {
  13700. "description_data" : [ {
  13701. "lang" : "en",
  13702. "value" : "IBM QRadar SIEM 7.3 and 7.4 when decompressing or verifying signature of zip files processes data in a way that may be vulnerable to path traversal attacks. IBM X-Force ID: 192905."
  13703. } ]
  13704. }
  13705. },
  13706. "configurations" : {
  13707. "CVE_data_version" : "4.0",
  13708. "nodes" : [ {
  13709. "operator" : "OR",
  13710. "children" : [ ],
  13711. "cpe_match" : [ {
  13712. "vulnerable" : true,
  13713. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  13714. "versionStartIncluding" : "7.3.0",
  13715. "versionEndExcluding" : "7.3.3",
  13716. "cpe_name" : [ ]
  13717. }, {
  13718. "vulnerable" : true,
  13719. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
  13720. "cpe_name" : [ ]
  13721. }, {
  13722. "vulnerable" : true,
  13723. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_1:*:*:*:*:*:*",
  13724. "cpe_name" : [ ]
  13725. }, {
  13726. "vulnerable" : true,
  13727. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_2:*:*:*:*:*:*",
  13728. "cpe_name" : [ ]
  13729. }, {
  13730. "vulnerable" : true,
  13731. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_3:*:*:*:*:*:*",
  13732. "cpe_name" : [ ]
  13733. }, {
  13734. "vulnerable" : true,
  13735. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_4:*:*:*:*:*:*",
  13736. "cpe_name" : [ ]
  13737. }, {
  13738. "vulnerable" : true,
  13739. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_5:*:*:*:*:*:*",
  13740. "cpe_name" : [ ]
  13741. }, {
  13742. "vulnerable" : true,
  13743. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_6:*:*:*:*:*:*",
  13744. "cpe_name" : [ ]
  13745. }, {
  13746. "vulnerable" : true,
  13747. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_7:*:*:*:*:*:*",
  13748. "cpe_name" : [ ]
  13749. }, {
  13750. "vulnerable" : true,
  13751. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  13752. "versionStartIncluding" : "7.4.0:",
  13753. "versionEndExcluding" : "7.4.2:",
  13754. "cpe_name" : [ ]
  13755. }, {
  13756. "vulnerable" : true,
  13757. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:-:*:*:*:*:*:*",
  13758. "cpe_name" : [ ]
  13759. }, {
  13760. "vulnerable" : true,
  13761. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_1:*:*:*:*:*:*",
  13762. "cpe_name" : [ ]
  13763. }, {
  13764. "vulnerable" : true,
  13765. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_2:*:*:*:*:*:*",
  13766. "cpe_name" : [ ]
  13767. } ]
  13768. } ]
  13769. },
  13770. "impact" : {
  13771. "baseMetricV3" : {
  13772. "cvssV3" : {
  13773. "version" : "3.1",
  13774. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
  13775. "attackVector" : "NETWORK",
  13776. "attackComplexity" : "LOW",
  13777. "privilegesRequired" : "HIGH",
  13778. "userInteraction" : "NONE",
  13779. "scope" : "UNCHANGED",
  13780. "confidentialityImpact" : "NONE",
  13781. "integrityImpact" : "HIGH",
  13782. "availabilityImpact" : "NONE",
  13783. "baseScore" : 4.9,
  13784. "baseSeverity" : "MEDIUM"
  13785. },
  13786. "exploitabilityScore" : 1.2,
  13787. "impactScore" : 3.6
  13788. },
  13789. "baseMetricV2" : {
  13790. "cvssV2" : {
  13791. "version" : "2.0",
  13792. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:N",
  13793. "accessVector" : "NETWORK",
  13794. "accessComplexity" : "LOW",
  13795. "authentication" : "SINGLE",
  13796. "confidentialityImpact" : "NONE",
  13797. "integrityImpact" : "PARTIAL",
  13798. "availabilityImpact" : "NONE",
  13799. "baseScore" : 4.0
  13800. },
  13801. "severity" : "MEDIUM",
  13802. "exploitabilityScore" : 8.0,
  13803. "impactScore" : 2.9,
  13804. "acInsufInfo" : false,
  13805. "obtainAllPrivilege" : false,
  13806. "obtainUserPrivilege" : false,
  13807. "obtainOtherPrivilege" : false,
  13808. "userInteractionRequired" : false
  13809. }
  13810. },
  13811. "publishedDate" : "2021-05-05T16:15Z",
  13812. "lastModifiedDate" : "2021-05-07T14:29Z"
  13813. }, {
  13814. "cve" : {
  13815. "data_type" : "CVE",
  13816. "data_format" : "MITRE",
  13817. "data_version" : "4.0",
  13818. "CVE_data_meta" : {
  13819. "ID" : "CVE-2020-4979",
  13820. "ASSIGNER" : "psirt@us.ibm.com"
  13821. },
  13822. "problemtype" : {
  13823. "problemtype_data" : [ {
  13824. "description" : [ {
  13825. "lang" : "en",
  13826. "value" : "CWE-77"
  13827. } ]
  13828. } ]
  13829. },
  13830. "references" : {
  13831. "reference_data" : [ {
  13832. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/192538",
  13833. "name" : "ibm-qradar-cve20204979-code-exec (192538)",
  13834. "refsource" : "XF",
  13835. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  13836. }, {
  13837. "url" : "https://www.ibm.com/support/pages/node/6449668",
  13838. "name" : "https://www.ibm.com/support/pages/node/6449668",
  13839. "refsource" : "CONFIRM",
  13840. "tags" : [ "Vendor Advisory" ]
  13841. } ]
  13842. },
  13843. "description" : {
  13844. "description_data" : [ {
  13845. "lang" : "en",
  13846. "value" : "IBM QRadar SIEM 7.3 and 7.4 is vulnerable to insecure inter-deployment communication. An attacker that is able to comprimise or spoof traffic between hosts may be able to execute arbitrary commands. IBM X-Force D: 192538."
  13847. } ]
  13848. }
  13849. },
  13850. "configurations" : {
  13851. "CVE_data_version" : "4.0",
  13852. "nodes" : [ {
  13853. "operator" : "OR",
  13854. "children" : [ ],
  13855. "cpe_match" : [ {
  13856. "vulnerable" : true,
  13857. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  13858. "versionStartIncluding" : "7.3.0",
  13859. "versionEndExcluding" : "7.3.3",
  13860. "cpe_name" : [ ]
  13861. }, {
  13862. "vulnerable" : true,
  13863. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
  13864. "cpe_name" : [ ]
  13865. }, {
  13866. "vulnerable" : true,
  13867. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_1:*:*:*:*:*:*",
  13868. "cpe_name" : [ ]
  13869. }, {
  13870. "vulnerable" : true,
  13871. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_2:*:*:*:*:*:*",
  13872. "cpe_name" : [ ]
  13873. }, {
  13874. "vulnerable" : true,
  13875. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_3:*:*:*:*:*:*",
  13876. "cpe_name" : [ ]
  13877. }, {
  13878. "vulnerable" : true,
  13879. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_4:*:*:*:*:*:*",
  13880. "cpe_name" : [ ]
  13881. }, {
  13882. "vulnerable" : true,
  13883. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_5:*:*:*:*:*:*",
  13884. "cpe_name" : [ ]
  13885. }, {
  13886. "vulnerable" : true,
  13887. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_6:*:*:*:*:*:*",
  13888. "cpe_name" : [ ]
  13889. }, {
  13890. "vulnerable" : true,
  13891. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_7:*:*:*:*:*:*",
  13892. "cpe_name" : [ ]
  13893. }, {
  13894. "vulnerable" : true,
  13895. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  13896. "versionStartIncluding" : "7.4.0:",
  13897. "versionEndExcluding" : "7.4.2:",
  13898. "cpe_name" : [ ]
  13899. }, {
  13900. "vulnerable" : true,
  13901. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:-:*:*:*:*:*:*",
  13902. "cpe_name" : [ ]
  13903. }, {
  13904. "vulnerable" : true,
  13905. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_1:*:*:*:*:*:*",
  13906. "cpe_name" : [ ]
  13907. }, {
  13908. "vulnerable" : true,
  13909. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_2:*:*:*:*:*:*",
  13910. "cpe_name" : [ ]
  13911. } ]
  13912. } ]
  13913. },
  13914. "impact" : {
  13915. "baseMetricV3" : {
  13916. "cvssV3" : {
  13917. "version" : "3.1",
  13918. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  13919. "attackVector" : "NETWORK",
  13920. "attackComplexity" : "LOW",
  13921. "privilegesRequired" : "NONE",
  13922. "userInteraction" : "NONE",
  13923. "scope" : "UNCHANGED",
  13924. "confidentialityImpact" : "HIGH",
  13925. "integrityImpact" : "HIGH",
  13926. "availabilityImpact" : "HIGH",
  13927. "baseScore" : 9.8,
  13928. "baseSeverity" : "CRITICAL"
  13929. },
  13930. "exploitabilityScore" : 3.9,
  13931. "impactScore" : 5.9
  13932. },
  13933. "baseMetricV2" : {
  13934. "cvssV2" : {
  13935. "version" : "2.0",
  13936. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  13937. "accessVector" : "NETWORK",
  13938. "accessComplexity" : "LOW",
  13939. "authentication" : "NONE",
  13940. "confidentialityImpact" : "PARTIAL",
  13941. "integrityImpact" : "PARTIAL",
  13942. "availabilityImpact" : "PARTIAL",
  13943. "baseScore" : 7.5
  13944. },
  13945. "severity" : "HIGH",
  13946. "exploitabilityScore" : 10.0,
  13947. "impactScore" : 6.4,
  13948. "acInsufInfo" : false,
  13949. "obtainAllPrivilege" : false,
  13950. "obtainUserPrivilege" : false,
  13951. "obtainOtherPrivilege" : false,
  13952. "userInteractionRequired" : false
  13953. }
  13954. },
  13955. "publishedDate" : "2021-05-05T16:15Z",
  13956. "lastModifiedDate" : "2021-05-07T14:40Z"
  13957. }, {
  13958. "cve" : {
  13959. "data_type" : "CVE",
  13960. "data_format" : "MITRE",
  13961. "data_version" : "4.0",
  13962. "CVE_data_meta" : {
  13963. "ID" : "CVE-2020-4932",
  13964. "ASSIGNER" : "psirt@us.ibm.com"
  13965. },
  13966. "problemtype" : {
  13967. "problemtype_data" : [ {
  13968. "description" : [ {
  13969. "lang" : "en",
  13970. "value" : "CWE-798"
  13971. } ]
  13972. } ]
  13973. },
  13974. "references" : {
  13975. "reference_data" : [ {
  13976. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/191748",
  13977. "name" : "ibm-qradar-cve20204932-info-disc (191748)",
  13978. "refsource" : "XF",
  13979. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  13980. }, {
  13981. "url" : "https://www.ibm.com/support/pages/node/6449682",
  13982. "name" : "https://www.ibm.com/support/pages/node/6449682",
  13983. "refsource" : "CONFIRM",
  13984. "tags" : [ "Vendor Advisory" ]
  13985. } ]
  13986. },
  13987. "description" : {
  13988. "description_data" : [ {
  13989. "lang" : "en",
  13990. "value" : "IBM QRadar SIEM 7.3 and 7.4 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 191748."
  13991. } ]
  13992. }
  13993. },
  13994. "configurations" : {
  13995. "CVE_data_version" : "4.0",
  13996. "nodes" : [ {
  13997. "operator" : "OR",
  13998. "children" : [ ],
  13999. "cpe_match" : [ {
  14000. "vulnerable" : true,
  14001. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  14002. "versionStartIncluding" : "7.3.0",
  14003. "versionEndExcluding" : "7.3.3",
  14004. "cpe_name" : [ ]
  14005. }, {
  14006. "vulnerable" : true,
  14007. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
  14008. "cpe_name" : [ ]
  14009. }, {
  14010. "vulnerable" : true,
  14011. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_1:*:*:*:*:*:*",
  14012. "cpe_name" : [ ]
  14013. }, {
  14014. "vulnerable" : true,
  14015. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_2:*:*:*:*:*:*",
  14016. "cpe_name" : [ ]
  14017. }, {
  14018. "vulnerable" : true,
  14019. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_3:*:*:*:*:*:*",
  14020. "cpe_name" : [ ]
  14021. }, {
  14022. "vulnerable" : true,
  14023. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_4:*:*:*:*:*:*",
  14024. "cpe_name" : [ ]
  14025. }, {
  14026. "vulnerable" : true,
  14027. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_5:*:*:*:*:*:*",
  14028. "cpe_name" : [ ]
  14029. }, {
  14030. "vulnerable" : true,
  14031. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_6:*:*:*:*:*:*",
  14032. "cpe_name" : [ ]
  14033. }, {
  14034. "vulnerable" : true,
  14035. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_7:*:*:*:*:*:*",
  14036. "cpe_name" : [ ]
  14037. }, {
  14038. "vulnerable" : true,
  14039. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  14040. "versionStartIncluding" : "7.4.0:",
  14041. "versionEndExcluding" : "7.4.2:",
  14042. "cpe_name" : [ ]
  14043. }, {
  14044. "vulnerable" : true,
  14045. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:-:*:*:*:*:*:*",
  14046. "cpe_name" : [ ]
  14047. }, {
  14048. "vulnerable" : true,
  14049. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_1:*:*:*:*:*:*",
  14050. "cpe_name" : [ ]
  14051. }, {
  14052. "vulnerable" : true,
  14053. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_2:*:*:*:*:*:*",
  14054. "cpe_name" : [ ]
  14055. } ]
  14056. } ]
  14057. },
  14058. "impact" : {
  14059. "baseMetricV3" : {
  14060. "cvssV3" : {
  14061. "version" : "3.1",
  14062. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  14063. "attackVector" : "LOCAL",
  14064. "attackComplexity" : "LOW",
  14065. "privilegesRequired" : "LOW",
  14066. "userInteraction" : "NONE",
  14067. "scope" : "UNCHANGED",
  14068. "confidentialityImpact" : "HIGH",
  14069. "integrityImpact" : "HIGH",
  14070. "availabilityImpact" : "HIGH",
  14071. "baseScore" : 7.8,
  14072. "baseSeverity" : "HIGH"
  14073. },
  14074. "exploitabilityScore" : 1.8,
  14075. "impactScore" : 5.9
  14076. },
  14077. "baseMetricV2" : {
  14078. "cvssV2" : {
  14079. "version" : "2.0",
  14080. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  14081. "accessVector" : "LOCAL",
  14082. "accessComplexity" : "LOW",
  14083. "authentication" : "NONE",
  14084. "confidentialityImpact" : "PARTIAL",
  14085. "integrityImpact" : "PARTIAL",
  14086. "availabilityImpact" : "PARTIAL",
  14087. "baseScore" : 4.6
  14088. },
  14089. "severity" : "MEDIUM",
  14090. "exploitabilityScore" : 3.9,
  14091. "impactScore" : 6.4,
  14092. "acInsufInfo" : false,
  14093. "obtainAllPrivilege" : false,
  14094. "obtainUserPrivilege" : false,
  14095. "obtainOtherPrivilege" : false,
  14096. "userInteractionRequired" : false
  14097. }
  14098. },
  14099. "publishedDate" : "2021-05-05T16:15Z",
  14100. "lastModifiedDate" : "2021-05-07T14:40Z"
  14101. }, {
  14102. "cve" : {
  14103. "data_type" : "CVE",
  14104. "data_format" : "MITRE",
  14105. "data_version" : "4.0",
  14106. "CVE_data_meta" : {
  14107. "ID" : "CVE-2020-4929",
  14108. "ASSIGNER" : "psirt@us.ibm.com"
  14109. },
  14110. "problemtype" : {
  14111. "problemtype_data" : [ {
  14112. "description" : [ {
  14113. "lang" : "en",
  14114. "value" : "CWE-79"
  14115. } ]
  14116. } ]
  14117. },
  14118. "references" : {
  14119. "reference_data" : [ {
  14120. "url" : "https://www.ibm.com/support/pages/node/6449674",
  14121. "name" : "https://www.ibm.com/support/pages/node/6449674",
  14122. "refsource" : "CONFIRM",
  14123. "tags" : [ "Vendor Advisory" ]
  14124. }, {
  14125. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/191706",
  14126. "name" : "ibm-qradar-cve20204929-xss (191706)",
  14127. "refsource" : "XF",
  14128. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  14129. } ]
  14130. },
  14131. "description" : {
  14132. "description_data" : [ {
  14133. "lang" : "en",
  14134. "value" : "IBM QRadar SIEM 7.3 and 7.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 191706."
  14135. } ]
  14136. }
  14137. },
  14138. "configurations" : {
  14139. "CVE_data_version" : "4.0",
  14140. "nodes" : [ {
  14141. "operator" : "OR",
  14142. "children" : [ ],
  14143. "cpe_match" : [ {
  14144. "vulnerable" : true,
  14145. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  14146. "versionStartIncluding" : "7.3.0",
  14147. "versionEndExcluding" : "7.3.3",
  14148. "cpe_name" : [ ]
  14149. }, {
  14150. "vulnerable" : true,
  14151. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
  14152. "cpe_name" : [ ]
  14153. }, {
  14154. "vulnerable" : true,
  14155. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_1:*:*:*:*:*:*",
  14156. "cpe_name" : [ ]
  14157. }, {
  14158. "vulnerable" : true,
  14159. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_2:*:*:*:*:*:*",
  14160. "cpe_name" : [ ]
  14161. }, {
  14162. "vulnerable" : true,
  14163. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_3:*:*:*:*:*:*",
  14164. "cpe_name" : [ ]
  14165. }, {
  14166. "vulnerable" : true,
  14167. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_4:*:*:*:*:*:*",
  14168. "cpe_name" : [ ]
  14169. }, {
  14170. "vulnerable" : true,
  14171. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_5:*:*:*:*:*:*",
  14172. "cpe_name" : [ ]
  14173. }, {
  14174. "vulnerable" : true,
  14175. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_6:*:*:*:*:*:*",
  14176. "cpe_name" : [ ]
  14177. }, {
  14178. "vulnerable" : true,
  14179. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_7:*:*:*:*:*:*",
  14180. "cpe_name" : [ ]
  14181. }, {
  14182. "vulnerable" : true,
  14183. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  14184. "versionStartIncluding" : "7.4.0:",
  14185. "versionEndExcluding" : "7.4.2:",
  14186. "cpe_name" : [ ]
  14187. }, {
  14188. "vulnerable" : true,
  14189. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:-:*:*:*:*:*:*",
  14190. "cpe_name" : [ ]
  14191. }, {
  14192. "vulnerable" : true,
  14193. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_1:*:*:*:*:*:*",
  14194. "cpe_name" : [ ]
  14195. }, {
  14196. "vulnerable" : true,
  14197. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_2:*:*:*:*:*:*",
  14198. "cpe_name" : [ ]
  14199. } ]
  14200. } ]
  14201. },
  14202. "impact" : {
  14203. "baseMetricV3" : {
  14204. "cvssV3" : {
  14205. "version" : "3.1",
  14206. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  14207. "attackVector" : "NETWORK",
  14208. "attackComplexity" : "LOW",
  14209. "privilegesRequired" : "LOW",
  14210. "userInteraction" : "REQUIRED",
  14211. "scope" : "CHANGED",
  14212. "confidentialityImpact" : "LOW",
  14213. "integrityImpact" : "LOW",
  14214. "availabilityImpact" : "NONE",
  14215. "baseScore" : 5.4,
  14216. "baseSeverity" : "MEDIUM"
  14217. },
  14218. "exploitabilityScore" : 2.3,
  14219. "impactScore" : 2.7
  14220. },
  14221. "baseMetricV2" : {
  14222. "cvssV2" : {
  14223. "version" : "2.0",
  14224. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  14225. "accessVector" : "NETWORK",
  14226. "accessComplexity" : "MEDIUM",
  14227. "authentication" : "SINGLE",
  14228. "confidentialityImpact" : "NONE",
  14229. "integrityImpact" : "PARTIAL",
  14230. "availabilityImpact" : "NONE",
  14231. "baseScore" : 3.5
  14232. },
  14233. "severity" : "LOW",
  14234. "exploitabilityScore" : 6.8,
  14235. "impactScore" : 2.9,
  14236. "acInsufInfo" : false,
  14237. "obtainAllPrivilege" : false,
  14238. "obtainUserPrivilege" : false,
  14239. "obtainOtherPrivilege" : false,
  14240. "userInteractionRequired" : true
  14241. }
  14242. },
  14243. "publishedDate" : "2021-05-05T16:15Z",
  14244. "lastModifiedDate" : "2021-05-07T14:41Z"
  14245. }, {
  14246. "cve" : {
  14247. "data_type" : "CVE",
  14248. "data_format" : "MITRE",
  14249. "data_version" : "4.0",
  14250. "CVE_data_meta" : {
  14251. "ID" : "CVE-2020-4883",
  14252. "ASSIGNER" : "psirt@us.ibm.com"
  14253. },
  14254. "problemtype" : {
  14255. "problemtype_data" : [ {
  14256. "description" : [ {
  14257. "lang" : "en",
  14258. "value" : "CWE-200"
  14259. } ]
  14260. } ]
  14261. },
  14262. "references" : {
  14263. "reference_data" : [ {
  14264. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/190907",
  14265. "name" : "ibm-qradar-cve20204883-info-disc (190907)",
  14266. "refsource" : "XF",
  14267. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  14268. }, {
  14269. "url" : "https://www.ibm.com/support/pages/node/6449678",
  14270. "name" : "https://www.ibm.com/support/pages/node/6449678",
  14271. "refsource" : "CONFIRM",
  14272. "tags" : [ "Patch", "Vendor Advisory" ]
  14273. } ]
  14274. },
  14275. "description" : {
  14276. "description_data" : [ {
  14277. "lang" : "en",
  14278. "value" : "IBM QRadar SIEM 7.3 and 7.4 could disclose sensitive information about other domains which could be used in further attacks against the system. IBM X-Force ID: 190907."
  14279. } ]
  14280. }
  14281. },
  14282. "configurations" : {
  14283. "CVE_data_version" : "4.0",
  14284. "nodes" : [ {
  14285. "operator" : "OR",
  14286. "children" : [ ],
  14287. "cpe_match" : [ {
  14288. "vulnerable" : true,
  14289. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  14290. "versionStartIncluding" : "7.3.0",
  14291. "versionEndExcluding" : "7.3.3",
  14292. "cpe_name" : [ ]
  14293. }, {
  14294. "vulnerable" : true,
  14295. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
  14296. "cpe_name" : [ ]
  14297. }, {
  14298. "vulnerable" : true,
  14299. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_1:*:*:*:*:*:*",
  14300. "cpe_name" : [ ]
  14301. }, {
  14302. "vulnerable" : true,
  14303. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_2:*:*:*:*:*:*",
  14304. "cpe_name" : [ ]
  14305. }, {
  14306. "vulnerable" : true,
  14307. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_3:*:*:*:*:*:*",
  14308. "cpe_name" : [ ]
  14309. }, {
  14310. "vulnerable" : true,
  14311. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_4:*:*:*:*:*:*",
  14312. "cpe_name" : [ ]
  14313. }, {
  14314. "vulnerable" : true,
  14315. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_5:*:*:*:*:*:*",
  14316. "cpe_name" : [ ]
  14317. }, {
  14318. "vulnerable" : true,
  14319. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_6:*:*:*:*:*:*",
  14320. "cpe_name" : [ ]
  14321. }, {
  14322. "vulnerable" : true,
  14323. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:fix_pack_7:*:*:*:*:*:*",
  14324. "cpe_name" : [ ]
  14325. }, {
  14326. "vulnerable" : true,
  14327. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
  14328. "versionStartIncluding" : "7.4.0:",
  14329. "versionEndExcluding" : "7.4.2:",
  14330. "cpe_name" : [ ]
  14331. }, {
  14332. "vulnerable" : true,
  14333. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:-:*:*:*:*:*:*",
  14334. "cpe_name" : [ ]
  14335. }, {
  14336. "vulnerable" : true,
  14337. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_1:*:*:*:*:*:*",
  14338. "cpe_name" : [ ]
  14339. }, {
  14340. "vulnerable" : true,
  14341. "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:fix_pack_2:*:*:*:*:*:*",
  14342. "cpe_name" : [ ]
  14343. } ]
  14344. } ]
  14345. },
  14346. "impact" : {
  14347. "baseMetricV3" : {
  14348. "cvssV3" : {
  14349. "version" : "3.1",
  14350. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  14351. "attackVector" : "NETWORK",
  14352. "attackComplexity" : "LOW",
  14353. "privilegesRequired" : "LOW",
  14354. "userInteraction" : "NONE",
  14355. "scope" : "UNCHANGED",
  14356. "confidentialityImpact" : "HIGH",
  14357. "integrityImpact" : "NONE",
  14358. "availabilityImpact" : "NONE",
  14359. "baseScore" : 6.5,
  14360. "baseSeverity" : "MEDIUM"
  14361. },
  14362. "exploitabilityScore" : 2.8,
  14363. "impactScore" : 3.6
  14364. },
  14365. "baseMetricV2" : {
  14366. "cvssV2" : {
  14367. "version" : "2.0",
  14368. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
  14369. "accessVector" : "NETWORK",
  14370. "accessComplexity" : "LOW",
  14371. "authentication" : "SINGLE",
  14372. "confidentialityImpact" : "PARTIAL",
  14373. "integrityImpact" : "NONE",
  14374. "availabilityImpact" : "NONE",
  14375. "baseScore" : 4.0
  14376. },
  14377. "severity" : "MEDIUM",
  14378. "exploitabilityScore" : 8.0,
  14379. "impactScore" : 2.9,
  14380. "acInsufInfo" : false,
  14381. "obtainAllPrivilege" : false,
  14382. "obtainUserPrivilege" : false,
  14383. "obtainOtherPrivilege" : false,
  14384. "userInteractionRequired" : false
  14385. }
  14386. },
  14387. "publishedDate" : "2021-05-05T16:15Z",
  14388. "lastModifiedDate" : "2021-05-07T14:41Z"
  14389. }, {
  14390. "cve" : {
  14391. "data_type" : "CVE",
  14392. "data_format" : "MITRE",
  14393. "data_version" : "4.0",
  14394. "CVE_data_meta" : {
  14395. "ID" : "CVE-2021-31542",
  14396. "ASSIGNER" : "cve@mitre.org"
  14397. },
  14398. "problemtype" : {
  14399. "problemtype_data" : [ {
  14400. "description" : [ ]
  14401. } ]
  14402. },
  14403. "references" : {
  14404. "reference_data" : [ {
  14405. "url" : "https://www.djangoproject.com/weblog/2021/may/04/security-releases/",
  14406. "name" : "https://www.djangoproject.com/weblog/2021/may/04/security-releases/",
  14407. "refsource" : "MISC",
  14408. "tags" : [ ]
  14409. }, {
  14410. "url" : "https://docs.djangoproject.com/en/3.2/releases/security/",
  14411. "name" : "https://docs.djangoproject.com/en/3.2/releases/security/",
  14412. "refsource" : "MISC",
  14413. "tags" : [ ]
  14414. }, {
  14415. "url" : "http://www.openwall.com/lists/oss-security/2021/05/04/3",
  14416. "name" : "http://www.openwall.com/lists/oss-security/2021/05/04/3",
  14417. "refsource" : "MISC",
  14418. "tags" : [ ]
  14419. }, {
  14420. "url" : "https://groups.google.com/forum/#!forum/django-announce",
  14421. "name" : "https://groups.google.com/forum/#!forum/django-announce",
  14422. "refsource" : "MISC",
  14423. "tags" : [ ]
  14424. }, {
  14425. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html",
  14426. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2651-1] python-django security update",
  14427. "refsource" : "MLIST",
  14428. "tags" : [ ]
  14429. } ]
  14430. },
  14431. "description" : {
  14432. "description_data" : [ {
  14433. "lang" : "en",
  14434. "value" : "In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names."
  14435. } ]
  14436. }
  14437. },
  14438. "configurations" : {
  14439. "CVE_data_version" : "4.0",
  14440. "nodes" : [ ]
  14441. },
  14442. "impact" : { },
  14443. "publishedDate" : "2021-05-05T15:15Z",
  14444. "lastModifiedDate" : "2021-05-06T14:15Z"
  14445. }, {
  14446. "cve" : {
  14447. "data_type" : "CVE",
  14448. "data_format" : "MITRE",
  14449. "data_version" : "4.0",
  14450. "CVE_data_meta" : {
  14451. "ID" : "CVE-2021-31518",
  14452. "ASSIGNER" : "security@trendmicro.com"
  14453. },
  14454. "problemtype" : {
  14455. "problemtype_data" : [ {
  14456. "description" : [ ]
  14457. } ]
  14458. },
  14459. "references" : {
  14460. "reference_data" : [ {
  14461. "url" : "https://helpcenter.trendmicro.com/en-us/article/TMKA-10312",
  14462. "name" : "N/A",
  14463. "refsource" : "N/A",
  14464. "tags" : [ ]
  14465. } ]
  14466. },
  14467. "description" : {
  14468. "description_data" : [ {
  14469. "lang" : "en",
  14470. "value" : "Trend Micro Home Network Security 6.5.599 and earlier is vulnerable to a file-parsing vulnerability which could allow an attacker to exploit the vulnerability and cause a denial-of-service to the device. This vulnerability is similar, but not identical to CVE-2021-31517."
  14471. } ]
  14472. }
  14473. },
  14474. "configurations" : {
  14475. "CVE_data_version" : "4.0",
  14476. "nodes" : [ ]
  14477. },
  14478. "impact" : { },
  14479. "publishedDate" : "2021-05-05T15:15Z",
  14480. "lastModifiedDate" : "2021-05-05T18:11Z"
  14481. }, {
  14482. "cve" : {
  14483. "data_type" : "CVE",
  14484. "data_format" : "MITRE",
  14485. "data_version" : "4.0",
  14486. "CVE_data_meta" : {
  14487. "ID" : "CVE-2021-31517",
  14488. "ASSIGNER" : "security@trendmicro.com"
  14489. },
  14490. "problemtype" : {
  14491. "problemtype_data" : [ {
  14492. "description" : [ ]
  14493. } ]
  14494. },
  14495. "references" : {
  14496. "reference_data" : [ {
  14497. "url" : "https://helpcenter.trendmicro.com/en-us/article/TMKA-10312",
  14498. "name" : "N/A",
  14499. "refsource" : "N/A",
  14500. "tags" : [ ]
  14501. } ]
  14502. },
  14503. "description" : {
  14504. "description_data" : [ {
  14505. "lang" : "en",
  14506. "value" : "Trend Micro Home Network Security 6.5.599 and earlier is vulnerable to a file-parsing vulnerability which could allow an attacker to exploit the vulnerability and cause a denial-of-service to the device. This vulnerability is similar, but not identical to CVE-2021-31518."
  14507. } ]
  14508. }
  14509. },
  14510. "configurations" : {
  14511. "CVE_data_version" : "4.0",
  14512. "nodes" : [ ]
  14513. },
  14514. "impact" : { },
  14515. "publishedDate" : "2021-05-05T15:15Z",
  14516. "lastModifiedDate" : "2021-05-05T18:11Z"
  14517. }, {
  14518. "cve" : {
  14519. "data_type" : "CVE",
  14520. "data_format" : "MITRE",
  14521. "data_version" : "4.0",
  14522. "CVE_data_meta" : {
  14523. "ID" : "CVE-2020-13665",
  14524. "ASSIGNER" : "security@drupal.org"
  14525. },
  14526. "problemtype" : {
  14527. "problemtype_data" : [ {
  14528. "description" : [ ]
  14529. } ]
  14530. },
  14531. "references" : {
  14532. "reference_data" : [ {
  14533. "url" : "https://www.drupal.org/sa-core-2020-006",
  14534. "name" : "https://www.drupal.org/sa-core-2020-006",
  14535. "refsource" : "CONFIRM",
  14536. "tags" : [ ]
  14537. } ]
  14538. },
  14539. "description" : {
  14540. "description_data" : [ {
  14541. "lang" : "en",
  14542. "value" : "Access bypass vulnerability in Drupal Core allows JSON:API when JSON:API is in read/write mode. Only sites that have the read_only set to FALSE under jsonapi.settings config are vulnerable. This issue affects: Drupal Drupal Core 8.8.x versions prior to 8.8.8; 8.9.x versions prior to 8.9.1; 9.0.x versions prior to 9.0.1."
  14543. } ]
  14544. }
  14545. },
  14546. "configurations" : {
  14547. "CVE_data_version" : "4.0",
  14548. "nodes" : [ ]
  14549. },
  14550. "impact" : { },
  14551. "publishedDate" : "2021-05-05T15:15Z",
  14552. "lastModifiedDate" : "2021-05-05T18:11Z"
  14553. }, {
  14554. "cve" : {
  14555. "data_type" : "CVE",
  14556. "data_format" : "MITRE",
  14557. "data_version" : "4.0",
  14558. "CVE_data_meta" : {
  14559. "ID" : "CVE-2020-13664",
  14560. "ASSIGNER" : "security@drupal.org"
  14561. },
  14562. "problemtype" : {
  14563. "problemtype_data" : [ {
  14564. "description" : [ ]
  14565. } ]
  14566. },
  14567. "references" : {
  14568. "reference_data" : [ {
  14569. "url" : "https://www.drupal.org/sa-core-2020-005",
  14570. "name" : "https://www.drupal.org/sa-core-2020-005",
  14571. "refsource" : "CONFIRM",
  14572. "tags" : [ ]
  14573. } ]
  14574. },
  14575. "description" : {
  14576. "description_data" : [ {
  14577. "lang" : "en",
  14578. "value" : "Arbitrary PHP code execution vulnerability in Drupal Core under certain circumstances. An attacker could trick an administrator into visiting a malicious site that could result in creating a carefully named directory on the file system. With this directory in place, an attacker could attempt to brute force a remote code execution vulnerability. Windows servers are most likely to be affected. This issue affects: Drupal Drupal Core 8.8.x versions prior to 8.8.8; 8.9.x versions prior to 8.9.1; 9.0.1 versions prior to 9.0.1."
  14579. } ]
  14580. }
  14581. },
  14582. "configurations" : {
  14583. "CVE_data_version" : "4.0",
  14584. "nodes" : [ ]
  14585. },
  14586. "impact" : { },
  14587. "publishedDate" : "2021-05-05T15:15Z",
  14588. "lastModifiedDate" : "2021-05-05T18:11Z"
  14589. }, {
  14590. "cve" : {
  14591. "data_type" : "CVE",
  14592. "data_format" : "MITRE",
  14593. "data_version" : "4.0",
  14594. "CVE_data_meta" : {
  14595. "ID" : "CVE-2020-13662",
  14596. "ASSIGNER" : "security@drupal.org"
  14597. },
  14598. "problemtype" : {
  14599. "problemtype_data" : [ {
  14600. "description" : [ ]
  14601. } ]
  14602. },
  14603. "references" : {
  14604. "reference_data" : [ {
  14605. "url" : "https://www.drupal.org/sa-core-2020-003",
  14606. "name" : "https://www.drupal.org/sa-core-2020-003",
  14607. "refsource" : "CONFIRM",
  14608. "tags" : [ ]
  14609. } ]
  14610. },
  14611. "description" : {
  14612. "description_data" : [ {
  14613. "lang" : "en",
  14614. "value" : "Open Redirect vulnerability in Drupal Core allows a user to be tricked into visiting a specially crafted link which would redirect them to an arbitrary external URL. This issue affects: Drupal Drupal Core 7 version 7.70 and prior versions."
  14615. } ]
  14616. }
  14617. },
  14618. "configurations" : {
  14619. "CVE_data_version" : "4.0",
  14620. "nodes" : [ ]
  14621. },
  14622. "impact" : { },
  14623. "publishedDate" : "2021-05-05T15:15Z",
  14624. "lastModifiedDate" : "2021-05-05T18:11Z"
  14625. }, {
  14626. "cve" : {
  14627. "data_type" : "CVE",
  14628. "data_format" : "MITRE",
  14629. "data_version" : "4.0",
  14630. "CVE_data_meta" : {
  14631. "ID" : "CVE-2021-20254",
  14632. "ASSIGNER" : "secalert@redhat.com"
  14633. },
  14634. "problemtype" : {
  14635. "problemtype_data" : [ {
  14636. "description" : [ {
  14637. "lang" : "en",
  14638. "value" : "CWE-125"
  14639. } ]
  14640. } ]
  14641. },
  14642. "references" : {
  14643. "reference_data" : [ {
  14644. "url" : "https://security.netapp.com/advisory/ntap-20210430-0001/",
  14645. "name" : "https://security.netapp.com/advisory/ntap-20210430-0001/",
  14646. "refsource" : "MISC",
  14647. "tags" : [ ]
  14648. }, {
  14649. "url" : "https://www.samba.org/samba/security/CVE-2021-20254.html",
  14650. "name" : "https://www.samba.org/samba/security/CVE-2021-20254.html",
  14651. "refsource" : "MISC",
  14652. "tags" : [ ]
  14653. }, {
  14654. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1949442",
  14655. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1949442",
  14656. "refsource" : "MISC",
  14657. "tags" : [ ]
  14658. }, {
  14659. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EP2VJ73OVBPVSOSTVOMGIEQA3MWF6F7/",
  14660. "name" : "FEDORA-2021-1d0807008b",
  14661. "refsource" : "FEDORA",
  14662. "tags" : [ ]
  14663. }, {
  14664. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZAF6L2M6CNAJ2YYYGXPWETTW5YLCWTVT/",
  14665. "name" : "FEDORA-2021-7026246ea9",
  14666. "refsource" : "FEDORA",
  14667. "tags" : [ ]
  14668. } ]
  14669. },
  14670. "description" : {
  14671. "description_data" : [ {
  14672. "lang" : "en",
  14673. "value" : "A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity."
  14674. } ]
  14675. }
  14676. },
  14677. "configurations" : {
  14678. "CVE_data_version" : "4.0",
  14679. "nodes" : [ ]
  14680. },
  14681. "impact" : { },
  14682. "publishedDate" : "2021-05-05T14:15Z",
  14683. "lastModifiedDate" : "2021-05-08T03:15Z"
  14684. }, {
  14685. "cve" : {
  14686. "data_type" : "CVE",
  14687. "data_format" : "MITRE",
  14688. "data_version" : "4.0",
  14689. "CVE_data_meta" : {
  14690. "ID" : "CVE-2020-13666",
  14691. "ASSIGNER" : "security@drupal.org"
  14692. },
  14693. "problemtype" : {
  14694. "problemtype_data" : [ {
  14695. "description" : [ {
  14696. "lang" : "en",
  14697. "value" : "CWE-79"
  14698. } ]
  14699. } ]
  14700. },
  14701. "references" : {
  14702. "reference_data" : [ {
  14703. "url" : "https://www.drupal.org/sa-core-2020-007",
  14704. "name" : "https://www.drupal.org/sa-core-2020-007",
  14705. "refsource" : "CONFIRM",
  14706. "tags" : [ "Vendor Advisory" ]
  14707. } ]
  14708. },
  14709. "description" : {
  14710. "description_data" : [ {
  14711. "lang" : "en",
  14712. "value" : "Cross-site scripting vulnerability in Drupal Core. Drupal AJAX API does not disable JSONP by default, allowing for an XSS attack. This issue affects: Drupal Drupal Core 7.x versions prior to 7.73; 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6."
  14713. } ]
  14714. }
  14715. },
  14716. "configurations" : {
  14717. "CVE_data_version" : "4.0",
  14718. "nodes" : [ {
  14719. "operator" : "OR",
  14720. "children" : [ ],
  14721. "cpe_match" : [ {
  14722. "vulnerable" : true,
  14723. "cpe23Uri" : "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
  14724. "versionStartIncluding" : "7.0:",
  14725. "versionEndExcluding" : "7.73:",
  14726. "cpe_name" : [ ]
  14727. }, {
  14728. "vulnerable" : true,
  14729. "cpe23Uri" : "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
  14730. "versionStartIncluding" : "8.8.0:",
  14731. "versionEndExcluding" : "8.8.10:",
  14732. "cpe_name" : [ ]
  14733. }, {
  14734. "vulnerable" : true,
  14735. "cpe23Uri" : "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
  14736. "versionStartIncluding" : "8.9.0:",
  14737. "versionEndExcluding" : "8.9.6:",
  14738. "cpe_name" : [ ]
  14739. }, {
  14740. "vulnerable" : true,
  14741. "cpe23Uri" : "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
  14742. "versionStartIncluding" : "9.0.0:",
  14743. "versionEndExcluding" : "9.0.6:",
  14744. "cpe_name" : [ ]
  14745. } ]
  14746. } ]
  14747. },
  14748. "impact" : {
  14749. "baseMetricV3" : {
  14750. "cvssV3" : {
  14751. "version" : "3.1",
  14752. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  14753. "attackVector" : "NETWORK",
  14754. "attackComplexity" : "LOW",
  14755. "privilegesRequired" : "NONE",
  14756. "userInteraction" : "REQUIRED",
  14757. "scope" : "CHANGED",
  14758. "confidentialityImpact" : "LOW",
  14759. "integrityImpact" : "LOW",
  14760. "availabilityImpact" : "NONE",
  14761. "baseScore" : 6.1,
  14762. "baseSeverity" : "MEDIUM"
  14763. },
  14764. "exploitabilityScore" : 2.8,
  14765. "impactScore" : 2.7
  14766. },
  14767. "baseMetricV2" : {
  14768. "cvssV2" : {
  14769. "version" : "2.0",
  14770. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  14771. "accessVector" : "NETWORK",
  14772. "accessComplexity" : "MEDIUM",
  14773. "authentication" : "NONE",
  14774. "confidentialityImpact" : "NONE",
  14775. "integrityImpact" : "PARTIAL",
  14776. "availabilityImpact" : "NONE",
  14777. "baseScore" : 4.3
  14778. },
  14779. "severity" : "MEDIUM",
  14780. "exploitabilityScore" : 8.6,
  14781. "impactScore" : 2.9,
  14782. "acInsufInfo" : false,
  14783. "obtainAllPrivilege" : false,
  14784. "obtainUserPrivilege" : false,
  14785. "obtainOtherPrivilege" : false,
  14786. "userInteractionRequired" : true
  14787. }
  14788. },
  14789. "publishedDate" : "2021-05-05T14:15Z",
  14790. "lastModifiedDate" : "2021-05-07T18:18Z"
  14791. }, {
  14792. "cve" : {
  14793. "data_type" : "CVE",
  14794. "data_format" : "MITRE",
  14795. "data_version" : "4.0",
  14796. "CVE_data_meta" : {
  14797. "ID" : "CVE-2016-20010",
  14798. "ASSIGNER" : "cve@mitre.org"
  14799. },
  14800. "problemtype" : {
  14801. "problemtype_data" : [ {
  14802. "description" : [ ]
  14803. } ]
  14804. },
  14805. "references" : {
  14806. "reference_data" : [ {
  14807. "url" : "https://plugins.trac.wordpress.org/browser/ewww-image-optimizer/trunk/changelog.txt",
  14808. "name" : "https://plugins.trac.wordpress.org/browser/ewww-image-optimizer/trunk/changelog.txt",
  14809. "refsource" : "MISC",
  14810. "tags" : [ ]
  14811. }, {
  14812. "url" : "https://www.wordfence.com/blog/2016/06/vulnerability-ewww-image-optimizer/",
  14813. "name" : "https://www.wordfence.com/blog/2016/06/vulnerability-ewww-image-optimizer/",
  14814. "refsource" : "MISC",
  14815. "tags" : [ ]
  14816. } ]
  14817. },
  14818. "description" : {
  14819. "description_data" : [ {
  14820. "lang" : "en",
  14821. "value" : "EWWW Image Optimizer before 2.8.5 allows remote command execution because it relies on a protection mechanism involving boolval, which is unavailable before PHP 5.5."
  14822. } ]
  14823. }
  14824. },
  14825. "configurations" : {
  14826. "CVE_data_version" : "4.0",
  14827. "nodes" : [ ]
  14828. },
  14829. "impact" : { },
  14830. "publishedDate" : "2021-05-05T14:15Z",
  14831. "lastModifiedDate" : "2021-05-05T18:11Z"
  14832. }, {
  14833. "cve" : {
  14834. "data_type" : "CVE",
  14835. "data_format" : "MITRE",
  14836. "data_version" : "4.0",
  14837. "CVE_data_meta" : {
  14838. "ID" : "CVE-2021-29250",
  14839. "ASSIGNER" : "cve@mitre.org"
  14840. },
  14841. "problemtype" : {
  14842. "problemtype_data" : [ {
  14843. "description" : [ ]
  14844. } ]
  14845. },
  14846. "references" : {
  14847. "reference_data" : [ {
  14848. "url" : "https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/",
  14849. "name" : "https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/",
  14850. "refsource" : "MISC",
  14851. "tags" : [ ]
  14852. }, {
  14853. "url" : "https://github.com/btcpayserver/btcpayserver/releases",
  14854. "name" : "https://github.com/btcpayserver/btcpayserver/releases",
  14855. "refsource" : "MISC",
  14856. "tags" : [ ]
  14857. } ]
  14858. },
  14859. "description" : {
  14860. "description_data" : [ {
  14861. "lang" : "en",
  14862. "value" : "BTCPay Server through 1.0.7.0 suffers from a Stored Cross Site Scripting (XSS) vulnerability within the POS Add Products functionality. This enables cookie stealing."
  14863. } ]
  14864. }
  14865. },
  14866. "configurations" : {
  14867. "CVE_data_version" : "4.0",
  14868. "nodes" : [ ]
  14869. },
  14870. "impact" : { },
  14871. "publishedDate" : "2021-05-05T13:15Z",
  14872. "lastModifiedDate" : "2021-05-05T14:04Z"
  14873. }, {
  14874. "cve" : {
  14875. "data_type" : "CVE",
  14876. "data_format" : "MITRE",
  14877. "data_version" : "4.0",
  14878. "CVE_data_meta" : {
  14879. "ID" : "CVE-2021-29248",
  14880. "ASSIGNER" : "cve@mitre.org"
  14881. },
  14882. "problemtype" : {
  14883. "problemtype_data" : [ {
  14884. "description" : [ ]
  14885. } ]
  14886. },
  14887. "references" : {
  14888. "reference_data" : [ {
  14889. "url" : "https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/",
  14890. "name" : "https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/",
  14891. "refsource" : "MISC",
  14892. "tags" : [ ]
  14893. }, {
  14894. "url" : "https://github.com/btcpayserver/btcpayserver/releases",
  14895. "name" : "https://github.com/btcpayserver/btcpayserver/releases",
  14896. "refsource" : "MISC",
  14897. "tags" : [ ]
  14898. } ]
  14899. },
  14900. "description" : {
  14901. "description_data" : [ {
  14902. "lang" : "en",
  14903. "value" : "BTCPay Server through 1.0.7.0 could allow a remote attacker to obtain sensitive information, caused by failure to set the Secure flag for a cookie."
  14904. } ]
  14905. }
  14906. },
  14907. "configurations" : {
  14908. "CVE_data_version" : "4.0",
  14909. "nodes" : [ ]
  14910. },
  14911. "impact" : { },
  14912. "publishedDate" : "2021-05-05T13:15Z",
  14913. "lastModifiedDate" : "2021-05-05T14:04Z"
  14914. }, {
  14915. "cve" : {
  14916. "data_type" : "CVE",
  14917. "data_format" : "MITRE",
  14918. "data_version" : "4.0",
  14919. "CVE_data_meta" : {
  14920. "ID" : "CVE-2021-29247",
  14921. "ASSIGNER" : "cve@mitre.org"
  14922. },
  14923. "problemtype" : {
  14924. "problemtype_data" : [ {
  14925. "description" : [ ]
  14926. } ]
  14927. },
  14928. "references" : {
  14929. "reference_data" : [ {
  14930. "url" : "https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/",
  14931. "name" : "https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/",
  14932. "refsource" : "MISC",
  14933. "tags" : [ ]
  14934. }, {
  14935. "url" : "https://github.com/btcpayserver/btcpayserver/releases",
  14936. "name" : "https://github.com/btcpayserver/btcpayserver/releases",
  14937. "refsource" : "MISC",
  14938. "tags" : [ ]
  14939. } ]
  14940. },
  14941. "description" : {
  14942. "description_data" : [ {
  14943. "lang" : "en",
  14944. "value" : "BTCPay Server through 1.0.7.0 could allow a remote attacker to obtain sensitive information, caused by failure to set the HTTPOnly flag for a cookie."
  14945. } ]
  14946. }
  14947. },
  14948. "configurations" : {
  14949. "CVE_data_version" : "4.0",
  14950. "nodes" : [ ]
  14951. },
  14952. "impact" : { },
  14953. "publishedDate" : "2021-05-05T13:15Z",
  14954. "lastModifiedDate" : "2021-05-05T14:04Z"
  14955. }, {
  14956. "cve" : {
  14957. "data_type" : "CVE",
  14958. "data_format" : "MITRE",
  14959. "data_version" : "4.0",
  14960. "CVE_data_meta" : {
  14961. "ID" : "CVE-2021-29246",
  14962. "ASSIGNER" : "cve@mitre.org"
  14963. },
  14964. "problemtype" : {
  14965. "problemtype_data" : [ {
  14966. "description" : [ ]
  14967. } ]
  14968. },
  14969. "references" : {
  14970. "reference_data" : [ {
  14971. "url" : "https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/",
  14972. "name" : "https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/",
  14973. "refsource" : "MISC",
  14974. "tags" : [ ]
  14975. }, {
  14976. "url" : "https://github.com/btcpayserver/btcpayserver/releases",
  14977. "name" : "https://github.com/btcpayserver/btcpayserver/releases",
  14978. "refsource" : "MISC",
  14979. "tags" : [ ]
  14980. } ]
  14981. },
  14982. "description" : {
  14983. "description_data" : [ {
  14984. "lang" : "en",
  14985. "value" : "BTCPay Server through 1.0.7.0 suffers from directory traversal, which allows an attacker with admin privileges to achieve code execution. The attacker must craft a malicious plugin file with special characters to upload the file outside of the restricted directory."
  14986. } ]
  14987. }
  14988. },
  14989. "configurations" : {
  14990. "CVE_data_version" : "4.0",
  14991. "nodes" : [ ]
  14992. },
  14993. "impact" : { },
  14994. "publishedDate" : "2021-05-05T13:15Z",
  14995. "lastModifiedDate" : "2021-05-05T14:04Z"
  14996. }, {
  14997. "cve" : {
  14998. "data_type" : "CVE",
  14999. "data_format" : "MITRE",
  15000. "data_version" : "4.0",
  15001. "CVE_data_meta" : {
  15002. "ID" : "CVE-2021-29245",
  15003. "ASSIGNER" : "cve@mitre.org"
  15004. },
  15005. "problemtype" : {
  15006. "problemtype_data" : [ {
  15007. "description" : [ ]
  15008. } ]
  15009. },
  15010. "references" : {
  15011. "reference_data" : [ {
  15012. "url" : "https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/",
  15013. "name" : "https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/",
  15014. "refsource" : "MISC",
  15015. "tags" : [ ]
  15016. }, {
  15017. "url" : "https://github.com/btcpayserver/btcpayserver/releases",
  15018. "name" : "https://github.com/btcpayserver/btcpayserver/releases",
  15019. "refsource" : "MISC",
  15020. "tags" : [ ]
  15021. } ]
  15022. },
  15023. "description" : {
  15024. "description_data" : [ {
  15025. "lang" : "en",
  15026. "value" : "BTCPay Server through 1.0.7.0 uses a weak method Next to produce pseudo-random values to generate a legacy API key."
  15027. } ]
  15028. }
  15029. },
  15030. "configurations" : {
  15031. "CVE_data_version" : "4.0",
  15032. "nodes" : [ ]
  15033. },
  15034. "impact" : { },
  15035. "publishedDate" : "2021-05-05T13:15Z",
  15036. "lastModifiedDate" : "2021-05-05T14:04Z"
  15037. }, {
  15038. "cve" : {
  15039. "data_type" : "CVE",
  15040. "data_format" : "MITRE",
  15041. "data_version" : "4.0",
  15042. "CVE_data_meta" : {
  15043. "ID" : "CVE-2021-31800",
  15044. "ASSIGNER" : "cve@mitre.org"
  15045. },
  15046. "problemtype" : {
  15047. "problemtype_data" : [ {
  15048. "description" : [ ]
  15049. } ]
  15050. },
  15051. "references" : {
  15052. "reference_data" : [ {
  15053. "url" : "https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2008",
  15054. "name" : "https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2008",
  15055. "refsource" : "MISC",
  15056. "tags" : [ ]
  15057. }, {
  15058. "url" : "https://github.com/SecureAuthCorp/impacket/releases",
  15059. "name" : "https://github.com/SecureAuthCorp/impacket/releases",
  15060. "refsource" : "MISC",
  15061. "tags" : [ ]
  15062. }, {
  15063. "url" : "https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L876",
  15064. "name" : "https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L876",
  15065. "refsource" : "MISC",
  15066. "tags" : [ ]
  15067. }, {
  15068. "url" : "https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2958",
  15069. "name" : "https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2958",
  15070. "refsource" : "MISC",
  15071. "tags" : [ ]
  15072. }, {
  15073. "url" : "https://github.com/SecureAuthCorp/impacket/commit/49c643bf66620646884ed141c94e5fdd85bcdd2f",
  15074. "name" : "https://github.com/SecureAuthCorp/impacket/commit/49c643bf66620646884ed141c94e5fdd85bcdd2f",
  15075. "refsource" : "MISC",
  15076. "tags" : [ ]
  15077. }, {
  15078. "url" : "https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L3485",
  15079. "name" : "https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L3485",
  15080. "refsource" : "MISC",
  15081. "tags" : [ ]
  15082. } ]
  15083. },
  15084. "description" : {
  15085. "description_data" : [ {
  15086. "lang" : "en",
  15087. "value" : "Multiple path traversal vulnerabilities exist in smbserver.py in Impacket through 0.9.22. An attacker that connects to a running smbserver instance can list and write to arbitrary files via ../ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key."
  15088. } ]
  15089. }
  15090. },
  15091. "configurations" : {
  15092. "CVE_data_version" : "4.0",
  15093. "nodes" : [ ]
  15094. },
  15095. "impact" : { },
  15096. "publishedDate" : "2021-05-05T11:15Z",
  15097. "lastModifiedDate" : "2021-05-05T12:38Z"
  15098. }, {
  15099. "cve" : {
  15100. "data_type" : "CVE",
  15101. "data_format" : "MITRE",
  15102. "data_version" : "4.0",
  15103. "CVE_data_meta" : {
  15104. "ID" : "CVE-2021-25317",
  15105. "ASSIGNER" : "security@suse.com"
  15106. },
  15107. "problemtype" : {
  15108. "problemtype_data" : [ {
  15109. "description" : [ {
  15110. "lang" : "en",
  15111. "value" : "CWE-276"
  15112. } ]
  15113. } ]
  15114. },
  15115. "references" : {
  15116. "reference_data" : [ {
  15117. "url" : "https://bugzilla.suse.com/show_bug.cgi?id=1184161",
  15118. "name" : "https://bugzilla.suse.com/show_bug.cgi?id=1184161",
  15119. "refsource" : "CONFIRM",
  15120. "tags" : [ ]
  15121. }, {
  15122. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H74BP746O5NNVCBUTLLZYAFBPESFVECV/",
  15123. "name" : "FEDORA-2021-dc578ce534",
  15124. "refsource" : "FEDORA",
  15125. "tags" : [ ]
  15126. }, {
  15127. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S37IDQGHTORQ3Z6VRDQIGBYVOI27YG47/",
  15128. "name" : "FEDORA-2021-7b698513d5",
  15129. "refsource" : "FEDORA",
  15130. "tags" : [ ]
  15131. } ]
  15132. },
  15133. "description" : {
  15134. "description_data" : [ {
  15135. "lang" : "en",
  15136. "value" : "A Incorrect Default Permissions vulnerability in the packaging of cups of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Leap 15.2, Factory allows local attackers with control of the lp users to create files as root with 0644 permissions without the ability to set the content. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS cups versions prior to 1.3.9. SUSE Manager Server 4.0 cups versions prior to 2.2.7. SUSE OpenStack Cloud Crowbar 9 cups versions prior to 1.7.5. openSUSE Leap 15.2 cups versions prior to 2.2.7. openSUSE Factory cups version 2.3.3op2-2.1 and prior versions."
  15137. } ]
  15138. }
  15139. },
  15140. "configurations" : {
  15141. "CVE_data_version" : "4.0",
  15142. "nodes" : [ ]
  15143. },
  15144. "impact" : { },
  15145. "publishedDate" : "2021-05-05T10:15Z",
  15146. "lastModifiedDate" : "2021-05-10T03:15Z"
  15147. }, {
  15148. "cve" : {
  15149. "data_type" : "CVE",
  15150. "data_format" : "MITRE",
  15151. "data_version" : "4.0",
  15152. "CVE_data_meta" : {
  15153. "ID" : "CVE-2021-25319",
  15154. "ASSIGNER" : "security@suse.com"
  15155. },
  15156. "problemtype" : {
  15157. "problemtype_data" : [ {
  15158. "description" : [ {
  15159. "lang" : "en",
  15160. "value" : "CWE-276"
  15161. } ]
  15162. } ]
  15163. },
  15164. "references" : {
  15165. "reference_data" : [ {
  15166. "url" : "https://bugzilla.suse.com/show_bug.cgi?id=1182918",
  15167. "name" : "https://bugzilla.suse.com/show_bug.cgi?id=1182918",
  15168. "refsource" : "CONFIRM",
  15169. "tags" : [ ]
  15170. } ]
  15171. },
  15172. "description" : {
  15173. "description_data" : [ {
  15174. "lang" : "en",
  15175. "value" : "A Incorrect Default Permissions vulnerability in the packaging of virtualbox of openSUSE Factory allows local attackers in the vboxusers groupu to escalate to root. This issue affects: openSUSE Factory virtualbox version 6.1.20-1.1 and prior versions."
  15176. } ]
  15177. }
  15178. },
  15179. "configurations" : {
  15180. "CVE_data_version" : "4.0",
  15181. "nodes" : [ ]
  15182. },
  15183. "impact" : { },
  15184. "publishedDate" : "2021-05-05T09:15Z",
  15185. "lastModifiedDate" : "2021-05-05T12:38Z"
  15186. }, {
  15187. "cve" : {
  15188. "data_type" : "CVE",
  15189. "data_format" : "MITRE",
  15190. "data_version" : "4.0",
  15191. "CVE_data_meta" : {
  15192. "ID" : "CVE-2020-36334",
  15193. "ASSIGNER" : "cve@mitre.org"
  15194. },
  15195. "problemtype" : {
  15196. "problemtype_data" : [ {
  15197. "description" : [ ]
  15198. } ]
  15199. },
  15200. "references" : {
  15201. "reference_data" : [ {
  15202. "url" : "https://www.webarxsecurity.com/critical-issue-in-themegrill-demo-importer/",
  15203. "name" : "https://www.webarxsecurity.com/critical-issue-in-themegrill-demo-importer/",
  15204. "refsource" : "MISC",
  15205. "tags" : [ ]
  15206. }, {
  15207. "url" : "https://www.openwall.com/lists/oss-security/2020/02/19/1",
  15208. "name" : "https://www.openwall.com/lists/oss-security/2020/02/19/1",
  15209. "refsource" : "MISC",
  15210. "tags" : [ ]
  15211. } ]
  15212. },
  15213. "description" : {
  15214. "description_data" : [ {
  15215. "lang" : "en",
  15216. "value" : "themegrill-demo-importer before 1.6.3 allows CSRF, as demonstrated by wiping the database."
  15217. } ]
  15218. }
  15219. },
  15220. "configurations" : {
  15221. "CVE_data_version" : "4.0",
  15222. "nodes" : [ ]
  15223. },
  15224. "impact" : { },
  15225. "publishedDate" : "2021-05-05T04:15Z",
  15226. "lastModifiedDate" : "2021-05-05T12:38Z"
  15227. }, {
  15228. "cve" : {
  15229. "data_type" : "CVE",
  15230. "data_format" : "MITRE",
  15231. "data_version" : "4.0",
  15232. "CVE_data_meta" : {
  15233. "ID" : "CVE-2020-36333",
  15234. "ASSIGNER" : "cve@mitre.org"
  15235. },
  15236. "problemtype" : {
  15237. "problemtype_data" : [ {
  15238. "description" : [ ]
  15239. } ]
  15240. },
  15241. "references" : {
  15242. "reference_data" : [ {
  15243. "url" : "https://www.webarxsecurity.com/critical-issue-in-themegrill-demo-importer/",
  15244. "name" : "https://www.webarxsecurity.com/critical-issue-in-themegrill-demo-importer/",
  15245. "refsource" : "MISC",
  15246. "tags" : [ ]
  15247. }, {
  15248. "url" : "https://www.openwall.com/lists/oss-security/2020/02/19/1",
  15249. "name" : "https://www.openwall.com/lists/oss-security/2020/02/19/1",
  15250. "refsource" : "MISC",
  15251. "tags" : [ ]
  15252. } ]
  15253. },
  15254. "description" : {
  15255. "description_data" : [ {
  15256. "lang" : "en",
  15257. "value" : "themegrill-demo-importer before 1.6.2 does not require authentication for wiping the database, because of a reset_wizard_actions hook."
  15258. } ]
  15259. }
  15260. },
  15261. "configurations" : {
  15262. "CVE_data_version" : "4.0",
  15263. "nodes" : [ ]
  15264. },
  15265. "impact" : { },
  15266. "publishedDate" : "2021-05-05T04:15Z",
  15267. "lastModifiedDate" : "2021-05-05T12:38Z"
  15268. }, {
  15269. "cve" : {
  15270. "data_type" : "CVE",
  15271. "data_format" : "MITRE",
  15272. "data_version" : "4.0",
  15273. "CVE_data_meta" : {
  15274. "ID" : "CVE-2021-25179",
  15275. "ASSIGNER" : "cve@mitre.org"
  15276. },
  15277. "problemtype" : {
  15278. "problemtype_data" : [ {
  15279. "description" : [ ]
  15280. } ]
  15281. },
  15282. "references" : {
  15283. "reference_data" : [ {
  15284. "url" : "https://github.com/matrix",
  15285. "name" : "https://github.com/matrix",
  15286. "refsource" : "MISC",
  15287. "tags" : [ ]
  15288. }, {
  15289. "url" : "https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-2_release_notes.htm",
  15290. "name" : "https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-2_release_notes.htm",
  15291. "refsource" : "MISC",
  15292. "tags" : [ ]
  15293. }, {
  15294. "url" : "https://twitter.com/gm4tr1x",
  15295. "name" : "https://twitter.com/gm4tr1x",
  15296. "refsource" : "MISC",
  15297. "tags" : [ ]
  15298. }, {
  15299. "url" : "https://www.linkedin.com/in/gabrielegristina",
  15300. "name" : "https://www.linkedin.com/in/gabrielegristina",
  15301. "refsource" : "MISC",
  15302. "tags" : [ ]
  15303. } ]
  15304. },
  15305. "description" : {
  15306. "description_data" : [ {
  15307. "lang" : "en",
  15308. "value" : "SolarWinds Serv-U before 15.2 is affected by Cross Site Scripting (XSS) via the HTTP Host header."
  15309. } ]
  15310. }
  15311. },
  15312. "configurations" : {
  15313. "CVE_data_version" : "4.0",
  15314. "nodes" : [ ]
  15315. },
  15316. "impact" : { },
  15317. "publishedDate" : "2021-05-05T03:15Z",
  15318. "lastModifiedDate" : "2021-05-05T12:38Z"
  15319. }, {
  15320. "cve" : {
  15321. "data_type" : "CVE",
  15322. "data_format" : "MITRE",
  15323. "data_version" : "4.0",
  15324. "CVE_data_meta" : {
  15325. "ID" : "CVE-2020-22428",
  15326. "ASSIGNER" : "cve@mitre.org"
  15327. },
  15328. "problemtype" : {
  15329. "problemtype_data" : [ {
  15330. "description" : [ ]
  15331. } ]
  15332. },
  15333. "references" : {
  15334. "reference_data" : [ {
  15335. "url" : "https://github.com/matrix",
  15336. "name" : "https://github.com/matrix",
  15337. "refsource" : "MISC",
  15338. "tags" : [ ]
  15339. }, {
  15340. "url" : "https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-1-6-Hotfix-3?language=en_US",
  15341. "name" : "https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-1-6-Hotfix-3?language=en_US",
  15342. "refsource" : "MISC",
  15343. "tags" : [ ]
  15344. }, {
  15345. "url" : "https://twitter.com/gm4tr1x",
  15346. "name" : "https://twitter.com/gm4tr1x",
  15347. "refsource" : "MISC",
  15348. "tags" : [ ]
  15349. }, {
  15350. "url" : "https://www.linkedin.com/in/gabrielegristina",
  15351. "name" : "https://www.linkedin.com/in/gabrielegristina",
  15352. "refsource" : "MISC",
  15353. "tags" : [ ]
  15354. } ]
  15355. },
  15356. "description" : {
  15357. "description_data" : [ {
  15358. "lang" : "en",
  15359. "value" : "SolarWinds Serv-U before 15.1.6 Hotfix 3 is affected by Cross Site Scripting (XSS) via a directory name (entered by an admin) containing a JavaScript payload."
  15360. } ]
  15361. }
  15362. },
  15363. "configurations" : {
  15364. "CVE_data_version" : "4.0",
  15365. "nodes" : [ ]
  15366. },
  15367. "impact" : { },
  15368. "publishedDate" : "2021-05-05T03:15Z",
  15369. "lastModifiedDate" : "2021-05-05T12:38Z"
  15370. }, {
  15371. "cve" : {
  15372. "data_type" : "CVE",
  15373. "data_format" : "MITRE",
  15374. "data_version" : "4.0",
  15375. "CVE_data_meta" : {
  15376. "ID" : "CVE-2021-26804",
  15377. "ASSIGNER" : "cve@mitre.org"
  15378. },
  15379. "problemtype" : {
  15380. "problemtype_data" : [ {
  15381. "description" : [ ]
  15382. } ]
  15383. },
  15384. "references" : {
  15385. "reference_data" : [ {
  15386. "url" : "https://medium.com/@pedro.ferreira.phf/vulnerability-affecting-some-versions-of-centreon-2b34bd6dc621",
  15387. "name" : "https://medium.com/@pedro.ferreira.phf/vulnerability-affecting-some-versions-of-centreon-2b34bd6dc621",
  15388. "refsource" : "MISC",
  15389. "tags" : [ ]
  15390. } ]
  15391. },
  15392. "description" : {
  15393. "description_data" : [ {
  15394. "lang" : "en",
  15395. "value" : "Insecure Permissions in Centreon Web versions 19.10.18, 20.04.8, and 20.10.2 allows remote attackers to bypass validation by changing any file extension to \".gif\", then uploading it in the \"Administration/ Parameters/ Images\" section of the application."
  15396. } ]
  15397. }
  15398. },
  15399. "configurations" : {
  15400. "CVE_data_version" : "4.0",
  15401. "nodes" : [ ]
  15402. },
  15403. "impact" : { },
  15404. "publishedDate" : "2021-05-04T17:15Z",
  15405. "lastModifiedDate" : "2021-05-04T17:27Z"
  15406. }, {
  15407. "cve" : {
  15408. "data_type" : "CVE",
  15409. "data_format" : "MITRE",
  15410. "data_version" : "4.0",
  15411. "CVE_data_meta" : {
  15412. "ID" : "CVE-2021-29478",
  15413. "ASSIGNER" : "security-advisories@github.com"
  15414. },
  15415. "problemtype" : {
  15416. "problemtype_data" : [ {
  15417. "description" : [ {
  15418. "lang" : "en",
  15419. "value" : "CWE-190"
  15420. } ]
  15421. } ]
  15422. },
  15423. "references" : {
  15424. "reference_data" : [ {
  15425. "url" : "https://github.com/redis/redis/security/advisories/GHSA-qh52-crrg-44g3",
  15426. "name" : "https://github.com/redis/redis/security/advisories/GHSA-qh52-crrg-44g3",
  15427. "refsource" : "CONFIRM",
  15428. "tags" : [ ]
  15429. }, {
  15430. "url" : "https://redis.io/",
  15431. "name" : "https://redis.io/",
  15432. "refsource" : "MISC",
  15433. "tags" : [ ]
  15434. } ]
  15435. },
  15436. "description" : {
  15437. "description_data" : [ {
  15438. "lang" : "en",
  15439. "value" : "Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version 6.2.3. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `set-max-intset-entries` configuration parameter. This can be done using ACL to restrict unprivileged users from using the `CONFIG SET` command."
  15440. } ]
  15441. }
  15442. },
  15443. "configurations" : {
  15444. "CVE_data_version" : "4.0",
  15445. "nodes" : [ ]
  15446. },
  15447. "impact" : { },
  15448. "publishedDate" : "2021-05-04T16:15Z",
  15449. "lastModifiedDate" : "2021-05-04T17:27Z"
  15450. }, {
  15451. "cve" : {
  15452. "data_type" : "CVE",
  15453. "data_format" : "MITRE",
  15454. "data_version" : "4.0",
  15455. "CVE_data_meta" : {
  15456. "ID" : "CVE-2021-29477",
  15457. "ASSIGNER" : "security-advisories@github.com"
  15458. },
  15459. "problemtype" : {
  15460. "problemtype_data" : [ {
  15461. "description" : [ {
  15462. "lang" : "en",
  15463. "value" : "CWE-190"
  15464. } ]
  15465. } ]
  15466. },
  15467. "references" : {
  15468. "reference_data" : [ {
  15469. "url" : "https://redis.io/",
  15470. "name" : "https://redis.io/",
  15471. "refsource" : "MISC",
  15472. "tags" : [ ]
  15473. }, {
  15474. "url" : "https://github.com/redis/redis/security/advisories/GHSA-vqxj-26vj-996g",
  15475. "name" : "https://github.com/redis/redis/security/advisories/GHSA-vqxj-26vj-996g",
  15476. "refsource" : "CONFIRM",
  15477. "tags" : [ ]
  15478. } ]
  15479. },
  15480. "description" : {
  15481. "description_data" : [ {
  15482. "lang" : "en",
  15483. "value" : "Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer could be exploited using the `STRALGO LCS` command to corrupt the heap and potentially result with remote code execution. The problem is fixed in version 6.2.3 and 6.0.13. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the `STRALGO LCS` command."
  15484. } ]
  15485. }
  15486. },
  15487. "configurations" : {
  15488. "CVE_data_version" : "4.0",
  15489. "nodes" : [ ]
  15490. },
  15491. "impact" : { },
  15492. "publishedDate" : "2021-05-04T16:15Z",
  15493. "lastModifiedDate" : "2021-05-04T17:27Z"
  15494. }, {
  15495. "cve" : {
  15496. "data_type" : "CVE",
  15497. "data_format" : "MITRE",
  15498. "data_version" : "4.0",
  15499. "CVE_data_meta" : {
  15500. "ID" : "CVE-2021-21551",
  15501. "ASSIGNER" : "secure@dell.com"
  15502. },
  15503. "problemtype" : {
  15504. "problemtype_data" : [ {
  15505. "description" : [ {
  15506. "lang" : "en",
  15507. "value" : "CWE-863"
  15508. } ]
  15509. } ]
  15510. },
  15511. "references" : {
  15512. "reference_data" : [ {
  15513. "url" : "https://www.dell.com/support/kbdoc/en-us/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability",
  15514. "name" : "https://www.dell.com/support/kbdoc/en-us/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability",
  15515. "refsource" : "MISC",
  15516. "tags" : [ "Mitigation", "Vendor Advisory" ]
  15517. } ]
  15518. },
  15519. "description" : {
  15520. "description_data" : [ {
  15521. "lang" : "en",
  15522. "value" : "Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required."
  15523. } ]
  15524. }
  15525. },
  15526. "configurations" : {
  15527. "CVE_data_version" : "4.0",
  15528. "nodes" : [ {
  15529. "operator" : "OR",
  15530. "children" : [ ],
  15531. "cpe_match" : [ {
  15532. "vulnerable" : true,
  15533. "cpe23Uri" : "cpe:2.3:a:dell:debutil_2_3.sys:-:*:*:*:*:*:*:*",
  15534. "cpe_name" : [ ]
  15535. } ]
  15536. } ]
  15537. },
  15538. "impact" : {
  15539. "baseMetricV3" : {
  15540. "cvssV3" : {
  15541. "version" : "3.1",
  15542. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  15543. "attackVector" : "LOCAL",
  15544. "attackComplexity" : "LOW",
  15545. "privilegesRequired" : "LOW",
  15546. "userInteraction" : "NONE",
  15547. "scope" : "UNCHANGED",
  15548. "confidentialityImpact" : "HIGH",
  15549. "integrityImpact" : "HIGH",
  15550. "availabilityImpact" : "HIGH",
  15551. "baseScore" : 7.8,
  15552. "baseSeverity" : "HIGH"
  15553. },
  15554. "exploitabilityScore" : 1.8,
  15555. "impactScore" : 5.9
  15556. },
  15557. "baseMetricV2" : {
  15558. "cvssV2" : {
  15559. "version" : "2.0",
  15560. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  15561. "accessVector" : "LOCAL",
  15562. "accessComplexity" : "LOW",
  15563. "authentication" : "NONE",
  15564. "confidentialityImpact" : "PARTIAL",
  15565. "integrityImpact" : "PARTIAL",
  15566. "availabilityImpact" : "PARTIAL",
  15567. "baseScore" : 4.6
  15568. },
  15569. "severity" : "MEDIUM",
  15570. "exploitabilityScore" : 3.9,
  15571. "impactScore" : 6.4,
  15572. "acInsufInfo" : false,
  15573. "obtainAllPrivilege" : false,
  15574. "obtainUserPrivilege" : false,
  15575. "obtainOtherPrivilege" : false,
  15576. "userInteractionRequired" : false
  15577. }
  15578. },
  15579. "publishedDate" : "2021-05-04T16:15Z",
  15580. "lastModifiedDate" : "2021-05-07T20:12Z"
  15581. }, {
  15582. "cve" : {
  15583. "data_type" : "CVE",
  15584. "data_format" : "MITRE",
  15585. "data_version" : "4.0",
  15586. "CVE_data_meta" : {
  15587. "ID" : "CVE-2020-4987",
  15588. "ASSIGNER" : "psirt@us.ibm.com"
  15589. },
  15590. "problemtype" : {
  15591. "problemtype_data" : [ {
  15592. "description" : [ {
  15593. "lang" : "en",
  15594. "value" : "CWE-79"
  15595. } ]
  15596. } ]
  15597. },
  15598. "references" : {
  15599. "reference_data" : [ {
  15600. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/192702",
  15601. "name" : "ibm-flashsystem-cve20204987-xss (192702)",
  15602. "refsource" : "XF",
  15603. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  15604. }, {
  15605. "url" : "https://www.ibm.com/support/pages/node/6449280",
  15606. "name" : "https://www.ibm.com/support/pages/node/6449280",
  15607. "refsource" : "CONFIRM",
  15608. "tags" : [ "Vendor Advisory" ]
  15609. } ]
  15610. },
  15611. "description" : {
  15612. "description_data" : [ {
  15613. "lang" : "en",
  15614. "value" : "IBM FlashSystem 900 1.5.2.9 and 1.6.1.3 user management GUI is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192702."
  15615. } ]
  15616. }
  15617. },
  15618. "configurations" : {
  15619. "CVE_data_version" : "4.0",
  15620. "nodes" : [ {
  15621. "operator" : "AND",
  15622. "children" : [ {
  15623. "operator" : "OR",
  15624. "children" : [ ],
  15625. "cpe_match" : [ {
  15626. "vulnerable" : true,
  15627. "cpe23Uri" : "cpe:2.3:o:ibm:flashsystem_900_firmware:*:*:*:*:*:*:*:*",
  15628. "versionEndExcluding" : "1.5.2.9:",
  15629. "cpe_name" : [ ]
  15630. }, {
  15631. "vulnerable" : true,
  15632. "cpe23Uri" : "cpe:2.3:o:ibm:flashsystem_900_firmware:*:*:*:*:*:*:*:*",
  15633. "versionStartIncluding" : "1.6.0.0:",
  15634. "versionEndExcluding" : "1.6.1.3:",
  15635. "cpe_name" : [ ]
  15636. } ]
  15637. }, {
  15638. "operator" : "OR",
  15639. "children" : [ ],
  15640. "cpe_match" : [ {
  15641. "vulnerable" : false,
  15642. "cpe23Uri" : "cpe:2.3:h:ibm:flashsystem_900:-:*:*:*:*:*:*:*",
  15643. "cpe_name" : [ ]
  15644. } ]
  15645. } ],
  15646. "cpe_match" : [ ]
  15647. } ]
  15648. },
  15649. "impact" : {
  15650. "baseMetricV3" : {
  15651. "cvssV3" : {
  15652. "version" : "3.1",
  15653. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  15654. "attackVector" : "NETWORK",
  15655. "attackComplexity" : "LOW",
  15656. "privilegesRequired" : "LOW",
  15657. "userInteraction" : "REQUIRED",
  15658. "scope" : "CHANGED",
  15659. "confidentialityImpact" : "LOW",
  15660. "integrityImpact" : "LOW",
  15661. "availabilityImpact" : "NONE",
  15662. "baseScore" : 5.4,
  15663. "baseSeverity" : "MEDIUM"
  15664. },
  15665. "exploitabilityScore" : 2.3,
  15666. "impactScore" : 2.7
  15667. },
  15668. "baseMetricV2" : {
  15669. "cvssV2" : {
  15670. "version" : "2.0",
  15671. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  15672. "accessVector" : "NETWORK",
  15673. "accessComplexity" : "MEDIUM",
  15674. "authentication" : "SINGLE",
  15675. "confidentialityImpact" : "NONE",
  15676. "integrityImpact" : "PARTIAL",
  15677. "availabilityImpact" : "NONE",
  15678. "baseScore" : 3.5
  15679. },
  15680. "severity" : "LOW",
  15681. "exploitabilityScore" : 6.8,
  15682. "impactScore" : 2.9,
  15683. "acInsufInfo" : false,
  15684. "obtainAllPrivilege" : false,
  15685. "obtainUserPrivilege" : false,
  15686. "obtainOtherPrivilege" : false,
  15687. "userInteractionRequired" : true
  15688. }
  15689. },
  15690. "publishedDate" : "2021-05-04T16:15Z",
  15691. "lastModifiedDate" : "2021-05-07T20:16Z"
  15692. }, {
  15693. "cve" : {
  15694. "data_type" : "CVE",
  15695. "data_format" : "MITRE",
  15696. "data_version" : "4.0",
  15697. "CVE_data_meta" : {
  15698. "ID" : "CVE-2020-21999",
  15699. "ASSIGNER" : "cve@mitre.org"
  15700. },
  15701. "problemtype" : {
  15702. "problemtype_data" : [ {
  15703. "description" : [ ]
  15704. } ]
  15705. },
  15706. "references" : {
  15707. "reference_data" : [ {
  15708. "url" : "https://www.exploit-db.com/exploits/47066",
  15709. "name" : "Exploit Database",
  15710. "refsource" : "EXPLOIT-DB",
  15711. "tags" : [ ]
  15712. }, {
  15713. "url" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.php",
  15714. "name" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.php",
  15715. "refsource" : "MISC",
  15716. "tags" : [ ]
  15717. } ]
  15718. },
  15719. "description" : {
  15720. "description_data" : [ {
  15721. "lang" : "en",
  15722. "value" : "iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script."
  15723. } ]
  15724. }
  15725. },
  15726. "configurations" : {
  15727. "CVE_data_version" : "4.0",
  15728. "nodes" : [ ]
  15729. },
  15730. "impact" : { },
  15731. "publishedDate" : "2021-05-04T16:15Z",
  15732. "lastModifiedDate" : "2021-05-04T17:27Z"
  15733. }, {
  15734. "cve" : {
  15735. "data_type" : "CVE",
  15736. "data_format" : "MITRE",
  15737. "data_version" : "4.0",
  15738. "CVE_data_meta" : {
  15739. "ID" : "CVE-2021-3154",
  15740. "ASSIGNER" : "cve@mitre.org"
  15741. },
  15742. "problemtype" : {
  15743. "problemtype_data" : [ {
  15744. "description" : [ ]
  15745. } ]
  15746. },
  15747. "references" : {
  15748. "reference_data" : [ {
  15749. "url" : "https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-2-2_release_notes.htm",
  15750. "name" : "https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-2-2_release_notes.htm",
  15751. "refsource" : "MISC",
  15752. "tags" : [ ]
  15753. } ]
  15754. },
  15755. "description" : {
  15756. "description_data" : [ {
  15757. "lang" : "en",
  15758. "value" : "An issue was discovered in SolarWinds Serv-U before 15.2.2. Unauthenticated attackers can retrieve cleartext passwords via macro Injection. NOTE: this had a distinct fix relative to CVE-2020-35481."
  15759. } ]
  15760. }
  15761. },
  15762. "configurations" : {
  15763. "CVE_data_version" : "4.0",
  15764. "nodes" : [ ]
  15765. },
  15766. "impact" : { },
  15767. "publishedDate" : "2021-05-04T14:15Z",
  15768. "lastModifiedDate" : "2021-05-04T17:27Z"
  15769. }, {
  15770. "cve" : {
  15771. "data_type" : "CVE",
  15772. "data_format" : "MITRE",
  15773. "data_version" : "4.0",
  15774. "CVE_data_meta" : {
  15775. "ID" : "CVE-2020-27518",
  15776. "ASSIGNER" : "cve@mitre.org"
  15777. },
  15778. "problemtype" : {
  15779. "problemtype_data" : [ {
  15780. "description" : [ ]
  15781. } ]
  15782. },
  15783. "references" : {
  15784. "reference_data" : [ {
  15785. "url" : "https://jeffs.sh/CVEs/CVE-2020-27518.txt",
  15786. "name" : "https://jeffs.sh/CVEs/CVE-2020-27518.txt",
  15787. "refsource" : "MISC",
  15788. "tags" : [ ]
  15789. }, {
  15790. "url" : "http://windscribe.com",
  15791. "name" : "http://windscribe.com",
  15792. "refsource" : "MISC",
  15793. "tags" : [ ]
  15794. } ]
  15795. },
  15796. "description" : {
  15797. "description_data" : [ {
  15798. "lang" : "en",
  15799. "value" : "All versions of Windscribe VPN for Mac and Windows <= v2.02.10 contain a local privilege escalation vulnerability in the WindscribeService component. A low privilege user could leverage several openvpn options to execute code as root/SYSTEM."
  15800. } ]
  15801. }
  15802. },
  15803. "configurations" : {
  15804. "CVE_data_version" : "4.0",
  15805. "nodes" : [ ]
  15806. },
  15807. "impact" : { },
  15808. "publishedDate" : "2021-05-04T14:15Z",
  15809. "lastModifiedDate" : "2021-05-04T17:27Z"
  15810. }, {
  15811. "cve" : {
  15812. "data_type" : "CVE",
  15813. "data_format" : "MITRE",
  15814. "data_version" : "4.0",
  15815. "CVE_data_meta" : {
  15816. "ID" : "CVE-2021-22547",
  15817. "ASSIGNER" : "security@google.com"
  15818. },
  15819. "problemtype" : {
  15820. "problemtype_data" : [ {
  15821. "description" : [ {
  15822. "lang" : "en",
  15823. "value" : "CWE-120"
  15824. } ]
  15825. } ]
  15826. },
  15827. "references" : {
  15828. "reference_data" : [ {
  15829. "url" : "https://github.com/GoogleCloudPlatform/iot-device-sdk-embedded-c/blob/master/RELEASE-NOTES.md",
  15830. "name" : "N/A",
  15831. "refsource" : "CONFIRM",
  15832. "tags" : [ "Release Notes", "Third Party Advisory" ]
  15833. }, {
  15834. "url" : "https://github.com/GoogleCloudPlatform/iot-device-sdk-embedded-c/pull/119",
  15835. "name" : "N/A",
  15836. "refsource" : "CONFIRM",
  15837. "tags" : [ "Patch", "Third Party Advisory" ]
  15838. } ]
  15839. },
  15840. "description" : {
  15841. "description_data" : [ {
  15842. "lang" : "en",
  15843. "value" : "In IoT Devices SDK, there is an implementation of calloc() that doesn't have a length check. An attacker could pass in memory objects larger than the buffer and wrap around to have a smaller buffer than required, allowing the attacker access to the other parts of the heap. We recommend upgrading the Google Cloud IoT Device SDK for Embedded C used to 1.0.3 or greater."
  15844. } ]
  15845. }
  15846. },
  15847. "configurations" : {
  15848. "CVE_data_version" : "4.0",
  15849. "nodes" : [ {
  15850. "operator" : "OR",
  15851. "children" : [ ],
  15852. "cpe_match" : [ {
  15853. "vulnerable" : true,
  15854. "cpe23Uri" : "cpe:2.3:a:google:cloud_iot_device_sdk_for_embedded_c:*:*:*:*:*:*:*:*",
  15855. "versionEndExcluding" : "1.0.3:",
  15856. "cpe_name" : [ ]
  15857. } ]
  15858. } ]
  15859. },
  15860. "impact" : {
  15861. "baseMetricV3" : {
  15862. "cvssV3" : {
  15863. "version" : "3.1",
  15864. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  15865. "attackVector" : "LOCAL",
  15866. "attackComplexity" : "LOW",
  15867. "privilegesRequired" : "LOW",
  15868. "userInteraction" : "NONE",
  15869. "scope" : "UNCHANGED",
  15870. "confidentialityImpact" : "HIGH",
  15871. "integrityImpact" : "HIGH",
  15872. "availabilityImpact" : "HIGH",
  15873. "baseScore" : 7.8,
  15874. "baseSeverity" : "HIGH"
  15875. },
  15876. "exploitabilityScore" : 1.8,
  15877. "impactScore" : 5.9
  15878. },
  15879. "baseMetricV2" : {
  15880. "cvssV2" : {
  15881. "version" : "2.0",
  15882. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  15883. "accessVector" : "LOCAL",
  15884. "accessComplexity" : "LOW",
  15885. "authentication" : "NONE",
  15886. "confidentialityImpact" : "PARTIAL",
  15887. "integrityImpact" : "PARTIAL",
  15888. "availabilityImpact" : "PARTIAL",
  15889. "baseScore" : 4.6
  15890. },
  15891. "severity" : "MEDIUM",
  15892. "exploitabilityScore" : 3.9,
  15893. "impactScore" : 6.4,
  15894. "acInsufInfo" : false,
  15895. "obtainAllPrivilege" : false,
  15896. "obtainUserPrivilege" : false,
  15897. "obtainOtherPrivilege" : false,
  15898. "userInteractionRequired" : false
  15899. }
  15900. },
  15901. "publishedDate" : "2021-05-04T13:15Z",
  15902. "lastModifiedDate" : "2021-05-07T22:18Z"
  15903. }, {
  15904. "cve" : {
  15905. "data_type" : "CVE",
  15906. "data_format" : "MITRE",
  15907. "data_version" : "4.0",
  15908. "CVE_data_meta" : {
  15909. "ID" : "CVE-2021-29240",
  15910. "ASSIGNER" : "cve@mitre.org"
  15911. },
  15912. "problemtype" : {
  15913. "problemtype_data" : [ {
  15914. "description" : [ ]
  15915. } ]
  15916. },
  15917. "references" : {
  15918. "reference_data" : [ {
  15919. "url" : "https://customers.codesys.com/index.php",
  15920. "name" : "https://customers.codesys.com/index.php",
  15921. "refsource" : "MISC",
  15922. "tags" : [ ]
  15923. }, {
  15924. "url" : "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14636&token=1ce7e6e4cbe4651989ede418450d7c82e972bdf2&download=",
  15925. "name" : "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14636&token=1ce7e6e4cbe4651989ede418450d7c82e972bdf2&download=",
  15926. "refsource" : "MISC",
  15927. "tags" : [ ]
  15928. }, {
  15929. "url" : "https://www.codesys.com/security/security-reports.html",
  15930. "name" : "https://www.codesys.com/security/security-reports.html",
  15931. "refsource" : "MISC",
  15932. "tags" : [ ]
  15933. } ]
  15934. },
  15935. "description" : {
  15936. "description_data" : [ {
  15937. "lang" : "en",
  15938. "value" : "The Package Manager of CODESYS Development System 3 before 3.5.17.0 does not check the validity of packages before installation and may be used to install CODESYS packages with malicious content."
  15939. } ]
  15940. }
  15941. },
  15942. "configurations" : {
  15943. "CVE_data_version" : "4.0",
  15944. "nodes" : [ ]
  15945. },
  15946. "impact" : { },
  15947. "publishedDate" : "2021-05-04T12:15Z",
  15948. "lastModifiedDate" : "2021-05-04T17:27Z"
  15949. }, {
  15950. "cve" : {
  15951. "data_type" : "CVE",
  15952. "data_format" : "MITRE",
  15953. "data_version" : "4.0",
  15954. "CVE_data_meta" : {
  15955. "ID" : "CVE-2021-23383",
  15956. "ASSIGNER" : "report@snyk.io"
  15957. },
  15958. "problemtype" : {
  15959. "problemtype_data" : [ {
  15960. "description" : [ ]
  15961. } ]
  15962. },
  15963. "references" : {
  15964. "reference_data" : [ {
  15965. "url" : "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032",
  15966. "name" : "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032",
  15967. "refsource" : "MISC",
  15968. "tags" : [ ]
  15969. }, {
  15970. "url" : "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031",
  15971. "name" : "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031",
  15972. "refsource" : "MISC",
  15973. "tags" : [ ]
  15974. }, {
  15975. "url" : "https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427",
  15976. "name" : "https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427",
  15977. "refsource" : "MISC",
  15978. "tags" : [ ]
  15979. }, {
  15980. "url" : "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030",
  15981. "name" : "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030",
  15982. "refsource" : "MISC",
  15983. "tags" : [ ]
  15984. }, {
  15985. "url" : "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029",
  15986. "name" : "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029",
  15987. "refsource" : "MISC",
  15988. "tags" : [ ]
  15989. } ]
  15990. },
  15991. "description" : {
  15992. "description_data" : [ {
  15993. "lang" : "en",
  15994. "value" : "The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source."
  15995. } ]
  15996. }
  15997. },
  15998. "configurations" : {
  15999. "CVE_data_version" : "4.0",
  16000. "nodes" : [ ]
  16001. },
  16002. "impact" : { },
  16003. "publishedDate" : "2021-05-04T09:15Z",
  16004. "lastModifiedDate" : "2021-05-04T10:21Z"
  16005. }, {
  16006. "cve" : {
  16007. "data_type" : "CVE",
  16008. "data_format" : "MITRE",
  16009. "data_version" : "4.0",
  16010. "CVE_data_meta" : {
  16011. "ID" : "CVE-2021-23343",
  16012. "ASSIGNER" : "report@snyk.io"
  16013. },
  16014. "problemtype" : {
  16015. "problemtype_data" : [ {
  16016. "description" : [ ]
  16017. } ]
  16018. },
  16019. "references" : {
  16020. "reference_data" : [ {
  16021. "url" : "https://github.com/jbgutierrez/path-parse/issues/8",
  16022. "name" : "https://github.com/jbgutierrez/path-parse/issues/8",
  16023. "refsource" : "MISC",
  16024. "tags" : [ ]
  16025. }, {
  16026. "url" : "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067",
  16027. "name" : "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067",
  16028. "refsource" : "MISC",
  16029. "tags" : [ ]
  16030. }, {
  16031. "url" : "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028",
  16032. "name" : "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028",
  16033. "refsource" : "MISC",
  16034. "tags" : [ ]
  16035. } ]
  16036. },
  16037. "description" : {
  16038. "description_data" : [ {
  16039. "lang" : "en",
  16040. "value" : "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity."
  16041. } ]
  16042. }
  16043. },
  16044. "configurations" : {
  16045. "CVE_data_version" : "4.0",
  16046. "nodes" : [ ]
  16047. },
  16048. "impact" : { },
  16049. "publishedDate" : "2021-05-04T09:15Z",
  16050. "lastModifiedDate" : "2021-05-04T10:21Z"
  16051. }, {
  16052. "cve" : {
  16053. "data_type" : "CVE",
  16054. "data_format" : "MITRE",
  16055. "data_version" : "4.0",
  16056. "CVE_data_meta" : {
  16057. "ID" : "CVE-2021-31164",
  16058. "ASSIGNER" : "security@apache.org"
  16059. },
  16060. "problemtype" : {
  16061. "problemtype_data" : [ {
  16062. "description" : [ ]
  16063. } ]
  16064. },
  16065. "references" : {
  16066. "reference_data" : [ {
  16067. "url" : "http://unomi.apache.org/security/cve-2021-31164",
  16068. "name" : "http://unomi.apache.org/security/cve-2021-31164",
  16069. "refsource" : "MISC",
  16070. "tags" : [ ]
  16071. } ]
  16072. },
  16073. "description" : {
  16074. "description_data" : [ {
  16075. "lang" : "en",
  16076. "value" : "Apache Unomi prior to version 1.5.5 allows CRLF log injection because of the lack of escaping in the log statements."
  16077. } ]
  16078. }
  16079. },
  16080. "configurations" : {
  16081. "CVE_data_version" : "4.0",
  16082. "nodes" : [ ]
  16083. },
  16084. "impact" : { },
  16085. "publishedDate" : "2021-05-04T07:15Z",
  16086. "lastModifiedDate" : "2021-05-04T10:21Z"
  16087. }, {
  16088. "cve" : {
  16089. "data_type" : "CVE",
  16090. "data_format" : "MITRE",
  16091. "data_version" : "4.0",
  16092. "CVE_data_meta" : {
  16093. "ID" : "CVE-2021-32020",
  16094. "ASSIGNER" : "cve@mitre.org"
  16095. },
  16096. "problemtype" : {
  16097. "problemtype_data" : [ {
  16098. "description" : [ ]
  16099. } ]
  16100. },
  16101. "references" : {
  16102. "reference_data" : [ {
  16103. "url" : "https://github.com/FreeRTOS/FreeRTOS-Kernel/commit/c7a9a01c94987082b223d3e59969ede64363da63",
  16104. "name" : "https://github.com/FreeRTOS/FreeRTOS-Kernel/commit/c7a9a01c94987082b223d3e59969ede64363da63",
  16105. "refsource" : "MISC",
  16106. "tags" : [ ]
  16107. } ]
  16108. },
  16109. "description" : {
  16110. "description_data" : [ {
  16111. "lang" : "en",
  16112. "value" : "The kernel in Amazon Web Services FreeRTOS before 10.4.3 has insufficient bounds checking during management of heap memory."
  16113. } ]
  16114. }
  16115. },
  16116. "configurations" : {
  16117. "CVE_data_version" : "4.0",
  16118. "nodes" : [ ]
  16119. },
  16120. "impact" : { },
  16121. "publishedDate" : "2021-05-03T22:15Z",
  16122. "lastModifiedDate" : "2021-05-04T10:21Z"
  16123. }, {
  16124. "cve" : {
  16125. "data_type" : "CVE",
  16126. "data_format" : "MITRE",
  16127. "data_version" : "4.0",
  16128. "CVE_data_meta" : {
  16129. "ID" : "CVE-2020-23083",
  16130. "ASSIGNER" : "cve@mitre.org"
  16131. },
  16132. "problemtype" : {
  16133. "problemtype_data" : [ {
  16134. "description" : [ ]
  16135. } ]
  16136. },
  16137. "references" : {
  16138. "reference_data" : [ {
  16139. "url" : "https://github.com/zhangdaiscott/jeecg/issues/56",
  16140. "name" : "https://github.com/zhangdaiscott/jeecg/issues/56",
  16141. "refsource" : "MISC",
  16142. "tags" : [ ]
  16143. } ]
  16144. },
  16145. "description" : {
  16146. "description_data" : [ {
  16147. "lang" : "en",
  16148. "value" : "Unrestricted File Upload in JEECG v4.0 and earlier allows remote attackers to execute arbitrary code or gain privileges by uploading a crafted file to the component \"jeecgFormDemoController.do?commonUpload\"."
  16149. } ]
  16150. }
  16151. },
  16152. "configurations" : {
  16153. "CVE_data_version" : "4.0",
  16154. "nodes" : [ ]
  16155. },
  16156. "impact" : { },
  16157. "publishedDate" : "2021-05-03T22:15Z",
  16158. "lastModifiedDate" : "2021-05-04T10:21Z"
  16159. }, {
  16160. "cve" : {
  16161. "data_type" : "CVE",
  16162. "data_format" : "MITRE",
  16163. "data_version" : "4.0",
  16164. "CVE_data_meta" : {
  16165. "ID" : "CVE-2020-23015",
  16166. "ASSIGNER" : "cve@mitre.org"
  16167. },
  16168. "problemtype" : {
  16169. "problemtype_data" : [ {
  16170. "description" : [ ]
  16171. } ]
  16172. },
  16173. "references" : {
  16174. "reference_data" : [ {
  16175. "url" : "https://github.com/opnsense/core/issues/4061",
  16176. "name" : "https://github.com/opnsense/core/issues/4061",
  16177. "refsource" : "MISC",
  16178. "tags" : [ ]
  16179. } ]
  16180. },
  16181. "description" : {
  16182. "description_data" : [ {
  16183. "lang" : "en",
  16184. "value" : "An open redirect issue was discovered in OPNsense through 20.1.5. The redirect parameter \"url\" in login page was not filtered and can redirect user to any website."
  16185. } ]
  16186. }
  16187. },
  16188. "configurations" : {
  16189. "CVE_data_version" : "4.0",
  16190. "nodes" : [ ]
  16191. },
  16192. "impact" : { },
  16193. "publishedDate" : "2021-05-03T22:15Z",
  16194. "lastModifiedDate" : "2021-05-04T10:21Z"
  16195. }, {
  16196. "cve" : {
  16197. "data_type" : "CVE",
  16198. "data_format" : "MITRE",
  16199. "data_version" : "4.0",
  16200. "CVE_data_meta" : {
  16201. "ID" : "CVE-2020-35758",
  16202. "ASSIGNER" : "cve@mitre.org"
  16203. },
  16204. "problemtype" : {
  16205. "problemtype_data" : [ {
  16206. "description" : [ ]
  16207. } ]
  16208. },
  16209. "references" : {
  16210. "reference_data" : [ {
  16211. "url" : "https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/",
  16212. "name" : "https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/",
  16213. "refsource" : "MISC",
  16214. "tags" : [ ]
  16215. } ]
  16216. },
  16217. "description" : {
  16218. "description_data" : [ {
  16219. "lang" : "en",
  16220. "value" : "An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a Authentication Bypass in the Web Interface. This interface does not properly restrict access to internal functionality. Despite presenting a password login page on first access, authentication is not required to access privileged functionality. As such, it's possible to directly access APIs that should not be exposed to an unauthenticated user."
  16221. } ]
  16222. }
  16223. },
  16224. "configurations" : {
  16225. "CVE_data_version" : "4.0",
  16226. "nodes" : [ ]
  16227. },
  16228. "impact" : { },
  16229. "publishedDate" : "2021-05-03T21:15Z",
  16230. "lastModifiedDate" : "2021-05-04T10:21Z"
  16231. }, {
  16232. "cve" : {
  16233. "data_type" : "CVE",
  16234. "data_format" : "MITRE",
  16235. "data_version" : "4.0",
  16236. "CVE_data_meta" : {
  16237. "ID" : "CVE-2020-35757",
  16238. "ASSIGNER" : "cve@mitre.org"
  16239. },
  16240. "problemtype" : {
  16241. "problemtype_data" : [ {
  16242. "description" : [ ]
  16243. } ]
  16244. },
  16245. "references" : {
  16246. "reference_data" : [ {
  16247. "url" : "https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/",
  16248. "name" : "https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/",
  16249. "refsource" : "MISC",
  16250. "tags" : [ ]
  16251. } ]
  16252. },
  16253. "description" : {
  16254. "description_data" : [ {
  16255. "lang" : "en",
  16256. "value" : "An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is Unauthenticated Root ADB Access Over TCP. The LS9 web interface provides functionality to access ADB over TCP. This is not enabled by default, but can be enabled by sending a crafted request to a web management interface endpoint. Requests made to this endpoint do not require authentication. As such, any unauthenticated user who is able to access the web interface will be able to gain root privileges on the LS9 module."
  16257. } ]
  16258. }
  16259. },
  16260. "configurations" : {
  16261. "CVE_data_version" : "4.0",
  16262. "nodes" : [ ]
  16263. },
  16264. "impact" : { },
  16265. "publishedDate" : "2021-05-03T21:15Z",
  16266. "lastModifiedDate" : "2021-05-04T10:21Z"
  16267. }, {
  16268. "cve" : {
  16269. "data_type" : "CVE",
  16270. "data_format" : "MITRE",
  16271. "data_version" : "4.0",
  16272. "CVE_data_meta" : {
  16273. "ID" : "CVE-2020-35756",
  16274. "ASSIGNER" : "cve@mitre.org"
  16275. },
  16276. "problemtype" : {
  16277. "problemtype_data" : [ {
  16278. "description" : [ ]
  16279. } ]
  16280. },
  16281. "references" : {
  16282. "reference_data" : [ {
  16283. "url" : "https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/",
  16284. "name" : "https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/",
  16285. "refsource" : "MISC",
  16286. "tags" : [ ]
  16287. } ]
  16288. },
  16289. "description" : {
  16290. "description_data" : [ {
  16291. "lang" : "en",
  16292. "value" : "An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a luci_service GETPASS Configuration Password Information Leak. The luci_service daemon running on port 7777 does not require authentication to return the device configuration password in cleartext when using the GETPASS command. As such, any unauthenticated person with access to port 7777 on the device will be able to leak the user's personal device configuration password by issuing the GETPASS command."
  16293. } ]
  16294. }
  16295. },
  16296. "configurations" : {
  16297. "CVE_data_version" : "4.0",
  16298. "nodes" : [ ]
  16299. },
  16300. "impact" : { },
  16301. "publishedDate" : "2021-05-03T21:15Z",
  16302. "lastModifiedDate" : "2021-05-04T10:21Z"
  16303. }, {
  16304. "cve" : {
  16305. "data_type" : "CVE",
  16306. "data_format" : "MITRE",
  16307. "data_version" : "4.0",
  16308. "CVE_data_meta" : {
  16309. "ID" : "CVE-2020-35755",
  16310. "ASSIGNER" : "cve@mitre.org"
  16311. },
  16312. "problemtype" : {
  16313. "problemtype_data" : [ {
  16314. "description" : [ ]
  16315. } ]
  16316. },
  16317. "references" : {
  16318. "reference_data" : [ {
  16319. "url" : "https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/",
  16320. "name" : "https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/",
  16321. "refsource" : "MISC",
  16322. "tags" : [ ]
  16323. } ]
  16324. },
  16325. "description" : {
  16326. "description_data" : [ {
  16327. "lang" : "en",
  16328. "value" : "An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a luci_service Read_ NVRAM Direct Access Information Leak. The luci_service deamon running on port 7777 provides a sub-category of commands for which Read_ is prepended. Commands in this category are able to directly read the contents of the device configuration NVRAM. The NVRAM contains sensitive information, such as the Wi-Fi password (in cleartext), as well as connected account tokens for services such as Spotify."
  16329. } ]
  16330. }
  16331. },
  16332. "configurations" : {
  16333. "CVE_data_version" : "4.0",
  16334. "nodes" : [ ]
  16335. },
  16336. "impact" : { },
  16337. "publishedDate" : "2021-05-03T21:15Z",
  16338. "lastModifiedDate" : "2021-05-04T10:21Z"
  16339. }, {
  16340. "cve" : {
  16341. "data_type" : "CVE",
  16342. "data_format" : "MITRE",
  16343. "data_version" : "4.0",
  16344. "CVE_data_meta" : {
  16345. "ID" : "CVE-2020-28945",
  16346. "ASSIGNER" : "cve@mitre.org"
  16347. },
  16348. "problemtype" : {
  16349. "problemtype_data" : [ {
  16350. "description" : [ {
  16351. "lang" : "en",
  16352. "value" : "CWE-79"
  16353. } ]
  16354. } ]
  16355. },
  16356. "references" : {
  16357. "reference_data" : [ {
  16358. "url" : "https://open-xchange.com",
  16359. "name" : "https://open-xchange.com",
  16360. "refsource" : "MISC",
  16361. "tags" : [ "Vendor Advisory" ]
  16362. }, {
  16363. "url" : "https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html",
  16364. "name" : "https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html",
  16365. "refsource" : "MISC",
  16366. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  16367. } ]
  16368. },
  16369. "description" : {
  16370. "description_data" : [ {
  16371. "lang" : "en",
  16372. "value" : "OX App Suite 7.10.4 and earlier allows XSS via crafted content to reach an undocumented feature, such as ![](http://onerror=Function.constructor, in a Notes item."
  16373. } ]
  16374. }
  16375. },
  16376. "configurations" : {
  16377. "CVE_data_version" : "4.0",
  16378. "nodes" : [ {
  16379. "operator" : "OR",
  16380. "children" : [ ],
  16381. "cpe_match" : [ {
  16382. "vulnerable" : true,
  16383. "cpe23Uri" : "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
  16384. "versionEndIncluding" : "7.10.4",
  16385. "cpe_name" : [ ]
  16386. } ]
  16387. } ]
  16388. },
  16389. "impact" : {
  16390. "baseMetricV3" : {
  16391. "cvssV3" : {
  16392. "version" : "3.1",
  16393. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  16394. "attackVector" : "NETWORK",
  16395. "attackComplexity" : "LOW",
  16396. "privilegesRequired" : "NONE",
  16397. "userInteraction" : "REQUIRED",
  16398. "scope" : "CHANGED",
  16399. "confidentialityImpact" : "LOW",
  16400. "integrityImpact" : "LOW",
  16401. "availabilityImpact" : "NONE",
  16402. "baseScore" : 6.1,
  16403. "baseSeverity" : "MEDIUM"
  16404. },
  16405. "exploitabilityScore" : 2.8,
  16406. "impactScore" : 2.7
  16407. },
  16408. "baseMetricV2" : {
  16409. "cvssV2" : {
  16410. "version" : "2.0",
  16411. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  16412. "accessVector" : "NETWORK",
  16413. "accessComplexity" : "MEDIUM",
  16414. "authentication" : "NONE",
  16415. "confidentialityImpact" : "NONE",
  16416. "integrityImpact" : "PARTIAL",
  16417. "availabilityImpact" : "NONE",
  16418. "baseScore" : 4.3
  16419. },
  16420. "severity" : "MEDIUM",
  16421. "exploitabilityScore" : 8.6,
  16422. "impactScore" : 2.9,
  16423. "acInsufInfo" : false,
  16424. "obtainAllPrivilege" : false,
  16425. "obtainUserPrivilege" : false,
  16426. "obtainOtherPrivilege" : false,
  16427. "userInteractionRequired" : false
  16428. }
  16429. },
  16430. "publishedDate" : "2021-05-03T20:15Z",
  16431. "lastModifiedDate" : "2021-05-07T12:50Z"
  16432. }, {
  16433. "cve" : {
  16434. "data_type" : "CVE",
  16435. "data_format" : "MITRE",
  16436. "data_version" : "4.0",
  16437. "CVE_data_meta" : {
  16438. "ID" : "CVE-2021-21264",
  16439. "ASSIGNER" : "security-advisories@github.com"
  16440. },
  16441. "problemtype" : {
  16442. "problemtype_data" : [ {
  16443. "description" : [ {
  16444. "lang" : "en",
  16445. "value" : "CWE-862"
  16446. } ]
  16447. } ]
  16448. },
  16449. "references" : {
  16450. "reference_data" : [ {
  16451. "url" : "https://github.com/octobercms/october/security/advisories/GHSA-fcr8-6q7r-m4wg",
  16452. "name" : "https://github.com/octobercms/october/security/advisories/GHSA-fcr8-6q7r-m4wg",
  16453. "refsource" : "CONFIRM",
  16454. "tags" : [ ]
  16455. } ]
  16456. },
  16457. "description" : {
  16458. "description_data" : [ {
  16459. "lang" : "en",
  16460. "value" : "October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. A bypass of CVE-2020-26231 (fixed in 1.0.470/471 and 1.1.1) was discovered that has the same impact as CVE-2020-26231 & CVE-2020-15247. An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having `cms.enableSafeMode` enabled, but would be a problem for anyone relying on `cms.enableSafeMode` to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP. Issue has been patched in Build 472 (v1.0.472) and v1.1.2. As a workaround, apply https://github.com/octobercms/october/commit/f63519ff1e8d375df30deba63156a2fc97aa9ee7 to your installation manually if unable to upgrade to Build 472 or v1.1.2."
  16461. } ]
  16462. }
  16463. },
  16464. "configurations" : {
  16465. "CVE_data_version" : "4.0",
  16466. "nodes" : [ ]
  16467. },
  16468. "impact" : { },
  16469. "publishedDate" : "2021-05-03T16:15Z",
  16470. "lastModifiedDate" : "2021-05-03T17:37Z"
  16471. }, {
  16472. "cve" : {
  16473. "data_type" : "CVE",
  16474. "data_format" : "MITRE",
  16475. "data_version" : "4.0",
  16476. "CVE_data_meta" : {
  16477. "ID" : "CVE-2020-20247",
  16478. "ASSIGNER" : "cve@mitre.org"
  16479. },
  16480. "problemtype" : {
  16481. "problemtype_data" : [ {
  16482. "description" : [ {
  16483. "lang" : "en",
  16484. "value" : "CWE-119"
  16485. } ]
  16486. } ]
  16487. },
  16488. "references" : {
  16489. "reference_data" : [ {
  16490. "url" : "https://seclists.org/fulldisclosure/2020/May/30",
  16491. "name" : "https://seclists.org/fulldisclosure/2020/May/30",
  16492. "refsource" : "MISC",
  16493. "tags" : [ "Mailing List", "Third Party Advisory" ]
  16494. } ]
  16495. },
  16496. "description" : {
  16497. "description_data" : [ {
  16498. "lang" : "en",
  16499. "value" : "Mikrotik RouterOs before 6.46.5 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/traceroute process. An authenticated remote attacker can cause a Denial of Service due via the loop counter variable."
  16500. } ]
  16501. }
  16502. },
  16503. "configurations" : {
  16504. "CVE_data_version" : "4.0",
  16505. "nodes" : [ {
  16506. "operator" : "OR",
  16507. "children" : [ ],
  16508. "cpe_match" : [ {
  16509. "vulnerable" : true,
  16510. "cpe23Uri" : "cpe:2.3:o:mikrotik:routeros:*:*:*:*:-:*:*:*",
  16511. "versionEndExcluding" : "6.46.5:",
  16512. "cpe_name" : [ ]
  16513. } ]
  16514. } ]
  16515. },
  16516. "impact" : {
  16517. "baseMetricV3" : {
  16518. "cvssV3" : {
  16519. "version" : "3.1",
  16520. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  16521. "attackVector" : "NETWORK",
  16522. "attackComplexity" : "LOW",
  16523. "privilegesRequired" : "LOW",
  16524. "userInteraction" : "NONE",
  16525. "scope" : "UNCHANGED",
  16526. "confidentialityImpact" : "NONE",
  16527. "integrityImpact" : "NONE",
  16528. "availabilityImpact" : "HIGH",
  16529. "baseScore" : 6.5,
  16530. "baseSeverity" : "MEDIUM"
  16531. },
  16532. "exploitabilityScore" : 2.8,
  16533. "impactScore" : 3.6
  16534. },
  16535. "baseMetricV2" : {
  16536. "cvssV2" : {
  16537. "version" : "2.0",
  16538. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P",
  16539. "accessVector" : "NETWORK",
  16540. "accessComplexity" : "LOW",
  16541. "authentication" : "SINGLE",
  16542. "confidentialityImpact" : "NONE",
  16543. "integrityImpact" : "NONE",
  16544. "availabilityImpact" : "PARTIAL",
  16545. "baseScore" : 4.0
  16546. },
  16547. "severity" : "MEDIUM",
  16548. "exploitabilityScore" : 8.0,
  16549. "impactScore" : 2.9,
  16550. "acInsufInfo" : false,
  16551. "obtainAllPrivilege" : false,
  16552. "obtainUserPrivilege" : false,
  16553. "obtainOtherPrivilege" : false,
  16554. "userInteractionRequired" : false
  16555. }
  16556. },
  16557. "publishedDate" : "2021-05-03T16:15Z",
  16558. "lastModifiedDate" : "2021-05-10T12:43Z"
  16559. }, {
  16560. "cve" : {
  16561. "data_type" : "CVE",
  16562. "data_format" : "MITRE",
  16563. "data_version" : "4.0",
  16564. "CVE_data_meta" : {
  16565. "ID" : "CVE-2020-20218",
  16566. "ASSIGNER" : "cve@mitre.org"
  16567. },
  16568. "problemtype" : {
  16569. "problemtype_data" : [ {
  16570. "description" : [ {
  16571. "lang" : "en",
  16572. "value" : "CWE-119"
  16573. } ]
  16574. } ]
  16575. },
  16576. "references" : {
  16577. "reference_data" : [ {
  16578. "url" : "https://seclists.org/fulldisclosure/2020/May/30",
  16579. "name" : "https://seclists.org/fulldisclosure/2020/May/30",
  16580. "refsource" : "MISC",
  16581. "tags" : [ "Mailing List", "Third Party Advisory" ]
  16582. } ]
  16583. },
  16584. "description" : {
  16585. "description_data" : [ {
  16586. "lang" : "en",
  16587. "value" : "Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/traceroute process. An authenticated remote attacker can cause a Denial of Service due via the loop counter variable."
  16588. } ]
  16589. }
  16590. },
  16591. "configurations" : {
  16592. "CVE_data_version" : "4.0",
  16593. "nodes" : [ {
  16594. "operator" : "OR",
  16595. "children" : [ ],
  16596. "cpe_match" : [ {
  16597. "vulnerable" : true,
  16598. "cpe23Uri" : "cpe:2.3:o:mikrotik:routeros:6.44.6:*:*:*:ltr:*:*:*",
  16599. "cpe_name" : [ ]
  16600. } ]
  16601. } ]
  16602. },
  16603. "impact" : {
  16604. "baseMetricV3" : {
  16605. "cvssV3" : {
  16606. "version" : "3.1",
  16607. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  16608. "attackVector" : "NETWORK",
  16609. "attackComplexity" : "LOW",
  16610. "privilegesRequired" : "LOW",
  16611. "userInteraction" : "NONE",
  16612. "scope" : "UNCHANGED",
  16613. "confidentialityImpact" : "NONE",
  16614. "integrityImpact" : "NONE",
  16615. "availabilityImpact" : "HIGH",
  16616. "baseScore" : 6.5,
  16617. "baseSeverity" : "MEDIUM"
  16618. },
  16619. "exploitabilityScore" : 2.8,
  16620. "impactScore" : 3.6
  16621. },
  16622. "baseMetricV2" : {
  16623. "cvssV2" : {
  16624. "version" : "2.0",
  16625. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P",
  16626. "accessVector" : "NETWORK",
  16627. "accessComplexity" : "LOW",
  16628. "authentication" : "SINGLE",
  16629. "confidentialityImpact" : "NONE",
  16630. "integrityImpact" : "NONE",
  16631. "availabilityImpact" : "PARTIAL",
  16632. "baseScore" : 4.0
  16633. },
  16634. "severity" : "MEDIUM",
  16635. "exploitabilityScore" : 8.0,
  16636. "impactScore" : 2.9,
  16637. "acInsufInfo" : false,
  16638. "obtainAllPrivilege" : false,
  16639. "obtainUserPrivilege" : false,
  16640. "obtainOtherPrivilege" : false,
  16641. "userInteractionRequired" : false
  16642. }
  16643. },
  16644. "publishedDate" : "2021-05-03T16:15Z",
  16645. "lastModifiedDate" : "2021-05-10T12:41Z"
  16646. }, {
  16647. "cve" : {
  16648. "data_type" : "CVE",
  16649. "data_format" : "MITRE",
  16650. "data_version" : "4.0",
  16651. "CVE_data_meta" : {
  16652. "ID" : "CVE-2021-29242",
  16653. "ASSIGNER" : "cve@mitre.org"
  16654. },
  16655. "problemtype" : {
  16656. "problemtype_data" : [ {
  16657. "description" : [ ]
  16658. } ]
  16659. },
  16660. "references" : {
  16661. "reference_data" : [ {
  16662. "url" : "https://customers.codesys.com/index.php",
  16663. "name" : "https://customers.codesys.com/index.php",
  16664. "refsource" : "MISC",
  16665. "tags" : [ ]
  16666. }, {
  16667. "url" : "https://www.codesys.com/security/security-reports.html",
  16668. "name" : "https://www.codesys.com/security/security-reports.html",
  16669. "refsource" : "MISC",
  16670. "tags" : [ ]
  16671. }, {
  16672. "url" : "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14640&token=623b6fceb0579ef0f7505e29beefa5b3f8ac7873&download=",
  16673. "name" : "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14640&token=623b6fceb0579ef0f7505e29beefa5b3f8ac7873&download=",
  16674. "refsource" : "MISC",
  16675. "tags" : [ ]
  16676. } ]
  16677. },
  16678. "description" : {
  16679. "description_data" : [ {
  16680. "lang" : "en",
  16681. "value" : "CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages."
  16682. } ]
  16683. }
  16684. },
  16685. "configurations" : {
  16686. "CVE_data_version" : "4.0",
  16687. "nodes" : [ ]
  16688. },
  16689. "impact" : { },
  16690. "publishedDate" : "2021-05-03T14:15Z",
  16691. "lastModifiedDate" : "2021-05-03T14:58Z"
  16692. }, {
  16693. "cve" : {
  16694. "data_type" : "CVE",
  16695. "data_format" : "MITRE",
  16696. "data_version" : "4.0",
  16697. "CVE_data_meta" : {
  16698. "ID" : "CVE-2021-29241",
  16699. "ASSIGNER" : "cve@mitre.org"
  16700. },
  16701. "problemtype" : {
  16702. "problemtype_data" : [ {
  16703. "description" : [ ]
  16704. } ]
  16705. },
  16706. "references" : {
  16707. "reference_data" : [ {
  16708. "url" : "https://customers.codesys.com/index.php",
  16709. "name" : "https://customers.codesys.com/index.php",
  16710. "refsource" : "MISC",
  16711. "tags" : [ ]
  16712. }, {
  16713. "url" : "https://www.codesys.com/security/security-reports.html",
  16714. "name" : "https://www.codesys.com/security/security-reports.html",
  16715. "refsource" : "MISC",
  16716. "tags" : [ ]
  16717. }, {
  16718. "url" : "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14637&token=8dbd75ae7553ae3be25e22f741db783b31e14799&download=",
  16719. "name" : "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14637&token=8dbd75ae7553ae3be25e22f741db783b31e14799&download=",
  16720. "refsource" : "MISC",
  16721. "tags" : [ ]
  16722. } ]
  16723. },
  16724. "description" : {
  16725. "description_data" : [ {
  16726. "lang" : "en",
  16727. "value" : "CODESYS Gateway 3 before 3.5.17.0 has a NULL pointer dereference that may result in a denial of service (DoS)."
  16728. } ]
  16729. }
  16730. },
  16731. "configurations" : {
  16732. "CVE_data_version" : "4.0",
  16733. "nodes" : [ ]
  16734. },
  16735. "impact" : { },
  16736. "publishedDate" : "2021-05-03T14:15Z",
  16737. "lastModifiedDate" : "2021-05-03T14:58Z"
  16738. }, {
  16739. "cve" : {
  16740. "data_type" : "CVE",
  16741. "data_format" : "MITRE",
  16742. "data_version" : "4.0",
  16743. "CVE_data_meta" : {
  16744. "ID" : "CVE-2021-29239",
  16745. "ASSIGNER" : "cve@mitre.org"
  16746. },
  16747. "problemtype" : {
  16748. "problemtype_data" : [ {
  16749. "description" : [ {
  16750. "lang" : "en",
  16751. "value" : "CWE-345"
  16752. } ]
  16753. } ]
  16754. },
  16755. "references" : {
  16756. "reference_data" : [ {
  16757. "url" : "https://customers.codesys.com/index.php",
  16758. "name" : "https://customers.codesys.com/index.php",
  16759. "refsource" : "MISC",
  16760. "tags" : [ "Permissions Required", "Vendor Advisory" ]
  16761. }, {
  16762. "url" : "https://www.codesys.com/security/security-reports.html",
  16763. "name" : "https://www.codesys.com/security/security-reports.html",
  16764. "refsource" : "MISC",
  16765. "tags" : [ "Vendor Advisory" ]
  16766. }, {
  16767. "url" : "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14639&token=fa836f8bd4a2184aa9323a639ca9f2aaf1538412&download=",
  16768. "name" : "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14639&token=fa836f8bd4a2184aa9323a639ca9f2aaf1538412&download=",
  16769. "refsource" : "MISC",
  16770. "tags" : [ "Vendor Advisory" ]
  16771. } ]
  16772. },
  16773. "description" : {
  16774. "description_data" : [ {
  16775. "lang" : "en",
  16776. "value" : "CODESYS Development System 3 before 3.5.17.0 displays or executes malicious documents or files embedded in libraries without first checking their validity."
  16777. } ]
  16778. }
  16779. },
  16780. "configurations" : {
  16781. "CVE_data_version" : "4.0",
  16782. "nodes" : [ {
  16783. "operator" : "OR",
  16784. "children" : [ ],
  16785. "cpe_match" : [ {
  16786. "vulnerable" : true,
  16787. "cpe23Uri" : "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*",
  16788. "versionStartIncluding" : "3.0:",
  16789. "versionEndExcluding" : "3.5.17.0:",
  16790. "cpe_name" : [ ]
  16791. } ]
  16792. } ]
  16793. },
  16794. "impact" : {
  16795. "baseMetricV3" : {
  16796. "cvssV3" : {
  16797. "version" : "3.1",
  16798. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  16799. "attackVector" : "LOCAL",
  16800. "attackComplexity" : "LOW",
  16801. "privilegesRequired" : "LOW",
  16802. "userInteraction" : "NONE",
  16803. "scope" : "UNCHANGED",
  16804. "confidentialityImpact" : "HIGH",
  16805. "integrityImpact" : "HIGH",
  16806. "availabilityImpact" : "HIGH",
  16807. "baseScore" : 7.8,
  16808. "baseSeverity" : "HIGH"
  16809. },
  16810. "exploitabilityScore" : 1.8,
  16811. "impactScore" : 5.9
  16812. },
  16813. "baseMetricV2" : {
  16814. "cvssV2" : {
  16815. "version" : "2.0",
  16816. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  16817. "accessVector" : "LOCAL",
  16818. "accessComplexity" : "LOW",
  16819. "authentication" : "NONE",
  16820. "confidentialityImpact" : "PARTIAL",
  16821. "integrityImpact" : "PARTIAL",
  16822. "availabilityImpact" : "PARTIAL",
  16823. "baseScore" : 4.6
  16824. },
  16825. "severity" : "MEDIUM",
  16826. "exploitabilityScore" : 3.9,
  16827. "impactScore" : 6.4,
  16828. "acInsufInfo" : false,
  16829. "obtainAllPrivilege" : false,
  16830. "obtainUserPrivilege" : false,
  16831. "obtainOtherPrivilege" : false,
  16832. "userInteractionRequired" : false
  16833. }
  16834. },
  16835. "publishedDate" : "2021-05-03T14:15Z",
  16836. "lastModifiedDate" : "2021-05-07T13:54Z"
  16837. }, {
  16838. "cve" : {
  16839. "data_type" : "CVE",
  16840. "data_format" : "MITRE",
  16841. "data_version" : "4.0",
  16842. "CVE_data_meta" : {
  16843. "ID" : "CVE-2021-29238",
  16844. "ASSIGNER" : "cve@mitre.org"
  16845. },
  16846. "problemtype" : {
  16847. "problemtype_data" : [ {
  16848. "description" : [ ]
  16849. } ]
  16850. },
  16851. "references" : {
  16852. "reference_data" : [ {
  16853. "url" : "https://customers.codesys.com/index.php",
  16854. "name" : "https://customers.codesys.com/index.php",
  16855. "refsource" : "MISC",
  16856. "tags" : [ ]
  16857. }, {
  16858. "url" : "https://www.codesys.com/security/security-reports.html",
  16859. "name" : "https://www.codesys.com/security/security-reports.html",
  16860. "refsource" : "MISC",
  16861. "tags" : [ ]
  16862. }, {
  16863. "url" : "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14638&token=30b75ee95d0d94527894dfd8cdc5432575a8eff8&download=",
  16864. "name" : "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14638&token=30b75ee95d0d94527894dfd8cdc5432575a8eff8&download=",
  16865. "refsource" : "MISC",
  16866. "tags" : [ ]
  16867. } ]
  16868. },
  16869. "description" : {
  16870. "description_data" : [ {
  16871. "lang" : "en",
  16872. "value" : "CODESYS Automation Server before 1.16.0 allows cross-site request forgery (CSRF)."
  16873. } ]
  16874. }
  16875. },
  16876. "configurations" : {
  16877. "CVE_data_version" : "4.0",
  16878. "nodes" : [ ]
  16879. },
  16880. "impact" : { },
  16881. "publishedDate" : "2021-05-03T14:15Z",
  16882. "lastModifiedDate" : "2021-05-03T14:58Z"
  16883. }, {
  16884. "cve" : {
  16885. "data_type" : "CVE",
  16886. "data_format" : "MITRE",
  16887. "data_version" : "4.0",
  16888. "CVE_data_meta" : {
  16889. "ID" : "CVE-2021-29369",
  16890. "ASSIGNER" : "cve@mitre.org"
  16891. },
  16892. "problemtype" : {
  16893. "problemtype_data" : [ {
  16894. "description" : [ ]
  16895. } ]
  16896. },
  16897. "references" : {
  16898. "reference_data" : [ {
  16899. "url" : "https://www.npmjs.com/package/@rkesters/gnuplot",
  16900. "name" : "https://www.npmjs.com/package/@rkesters/gnuplot",
  16901. "refsource" : "MISC",
  16902. "tags" : [ ]
  16903. }, {
  16904. "url" : "https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de",
  16905. "name" : "https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de",
  16906. "refsource" : "MISC",
  16907. "tags" : [ ]
  16908. } ]
  16909. },
  16910. "description" : {
  16911. "description_data" : [ {
  16912. "lang" : "en",
  16913. "value" : "The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands."
  16914. } ]
  16915. }
  16916. },
  16917. "configurations" : {
  16918. "CVE_data_version" : "4.0",
  16919. "nodes" : [ ]
  16920. },
  16921. "impact" : { },
  16922. "publishedDate" : "2021-05-03T12:15Z",
  16923. "lastModifiedDate" : "2021-05-03T13:52Z"
  16924. }, {
  16925. "cve" : {
  16926. "data_type" : "CVE",
  16927. "data_format" : "MITRE",
  16928. "data_version" : "4.0",
  16929. "CVE_data_meta" : {
  16930. "ID" : "CVE-2021-28860",
  16931. "ASSIGNER" : "cve@mitre.org"
  16932. },
  16933. "problemtype" : {
  16934. "problemtype_data" : [ {
  16935. "description" : [ ]
  16936. } ]
  16937. },
  16938. "references" : {
  16939. "reference_data" : [ {
  16940. "url" : "https://github.com/adaltas/node-mixme/issues/1",
  16941. "name" : "https://github.com/adaltas/node-mixme/issues/1",
  16942. "refsource" : "MISC",
  16943. "tags" : [ ]
  16944. }, {
  16945. "url" : "https://www.npmjs.com/~david",
  16946. "name" : "https://www.npmjs.com/~david",
  16947. "refsource" : "MISC",
  16948. "tags" : [ ]
  16949. }, {
  16950. "url" : "https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028",
  16951. "name" : "https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028",
  16952. "refsource" : "MISC",
  16953. "tags" : [ ]
  16954. }, {
  16955. "url" : "http://nodejs.com",
  16956. "name" : "http://nodejs.com",
  16957. "refsource" : "MISC",
  16958. "tags" : [ ]
  16959. }, {
  16960. "url" : "https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4",
  16961. "name" : "https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4",
  16962. "refsource" : "MISC",
  16963. "tags" : [ ]
  16964. } ]
  16965. },
  16966. "description" : {
  16967. "description_data" : [ {
  16968. "lang" : "en",
  16969. "value" : "In Node.js mixme, prior to v0.5.1, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS)."
  16970. } ]
  16971. }
  16972. },
  16973. "configurations" : {
  16974. "CVE_data_version" : "4.0",
  16975. "nodes" : [ ]
  16976. },
  16977. "impact" : { },
  16978. "publishedDate" : "2021-05-03T12:15Z",
  16979. "lastModifiedDate" : "2021-05-07T11:15Z"
  16980. }, {
  16981. "cve" : {
  16982. "data_type" : "CVE",
  16983. "data_format" : "MITRE",
  16984. "data_version" : "4.0",
  16985. "CVE_data_meta" : {
  16986. "ID" : "CVE-2021-25631",
  16987. "ASSIGNER" : "security@documentfoundation.org"
  16988. },
  16989. "problemtype" : {
  16990. "problemtype_data" : [ {
  16991. "description" : [ ]
  16992. } ]
  16993. },
  16994. "references" : {
  16995. "reference_data" : [ {
  16996. "url" : "https://www.libreoffice.org/about-us/security/advisories/cve-2021-25631/",
  16997. "name" : "https://www.libreoffice.org/about-us/security/advisories/cve-2021-25631/",
  16998. "refsource" : "MISC",
  16999. "tags" : [ ]
  17000. }, {
  17001. "url" : "https://positive.security/blog/url-open-rce#open-libreoffice",
  17002. "name" : "https://positive.security/blog/url-open-rce#open-libreoffice",
  17003. "refsource" : "MISC",
  17004. "tags" : [ ]
  17005. } ]
  17006. },
  17007. "description" : {
  17008. "description_data" : [ {
  17009. "lang" : "en",
  17010. "value" : "In the LibreOffice 7-1 series in versions prior to 7.1.2, and in the 7-0 series in versions prior to 7.0.5, the denylist can be circumvented by manipulating the link so it doesn't match the denylist but results in ShellExecute attempting to launch an executable type."
  17011. } ]
  17012. }
  17013. },
  17014. "configurations" : {
  17015. "CVE_data_version" : "4.0",
  17016. "nodes" : [ ]
  17017. },
  17018. "impact" : { },
  17019. "publishedDate" : "2021-05-03T12:15Z",
  17020. "lastModifiedDate" : "2021-05-03T13:52Z"
  17021. }, {
  17022. "cve" : {
  17023. "data_type" : "CVE",
  17024. "data_format" : "MITRE",
  17025. "data_version" : "4.0",
  17026. "CVE_data_meta" : {
  17027. "ID" : "CVE-2021-31996",
  17028. "ASSIGNER" : "cve@mitre.org"
  17029. },
  17030. "problemtype" : {
  17031. "problemtype_data" : [ {
  17032. "description" : [ ]
  17033. } ]
  17034. },
  17035. "references" : {
  17036. "reference_data" : [ {
  17037. "url" : "https://rustsec.org/advisories/RUSTSEC-2021-0053.html",
  17038. "name" : "https://rustsec.org/advisories/RUSTSEC-2021-0053.html",
  17039. "refsource" : "MISC",
  17040. "tags" : [ ]
  17041. } ]
  17042. },
  17043. "description" : {
  17044. "description_data" : [ {
  17045. "lang" : "en",
  17046. "value" : "An issue was discovered in the algorithmica crate through 2021-03-07 for Rust. There is a double free in merge_sort::merge()."
  17047. } ]
  17048. }
  17049. },
  17050. "configurations" : {
  17051. "CVE_data_version" : "4.0",
  17052. "nodes" : [ ]
  17053. },
  17054. "impact" : { },
  17055. "publishedDate" : "2021-05-03T07:15Z",
  17056. "lastModifiedDate" : "2021-05-03T13:52Z"
  17057. }, {
  17058. "cve" : {
  17059. "data_type" : "CVE",
  17060. "data_format" : "MITRE",
  17061. "data_version" : "4.0",
  17062. "CVE_data_meta" : {
  17063. "ID" : "CVE-2021-28359",
  17064. "ASSIGNER" : "security@apache.org"
  17065. },
  17066. "problemtype" : {
  17067. "problemtype_data" : [ {
  17068. "description" : [ ]
  17069. } ]
  17070. },
  17071. "references" : {
  17072. "reference_data" : [ {
  17073. "url" : "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E",
  17074. "name" : "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E",
  17075. "refsource" : "MISC",
  17076. "tags" : [ ]
  17077. }, {
  17078. "url" : "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E",
  17079. "name" : "[announce] 20210501 Apache Airflow CVE: CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
  17080. "refsource" : "MLIST",
  17081. "tags" : [ ]
  17082. } ]
  17083. },
  17084. "description" : {
  17085. "description_data" : [ {
  17086. "lang" : "en",
  17087. "value" : "The \"origin\" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely. Update to Airflow 1.10.15 or 2.0.2. Please also update your Python version to the latest available PATCH releases of the installed MINOR versions, example update to Python 3.6.13 if you are on Python 3.6. (Those contain the fix for CVE-2021-23336 https://nvd.nist.gov/vuln/detail/CVE-2021-23336)."
  17088. } ]
  17089. }
  17090. },
  17091. "configurations" : {
  17092. "CVE_data_version" : "4.0",
  17093. "nodes" : [ ]
  17094. },
  17095. "impact" : { },
  17096. "publishedDate" : "2021-05-02T08:15Z",
  17097. "lastModifiedDate" : "2021-05-04T00:15Z"
  17098. }, {
  17099. "cve" : {
  17100. "data_type" : "CVE",
  17101. "data_format" : "MITRE",
  17102. "data_version" : "4.0",
  17103. "CVE_data_meta" : {
  17104. "ID" : "CVE-2021-31935",
  17105. "ASSIGNER" : "cve@mitre.org"
  17106. },
  17107. "problemtype" : {
  17108. "problemtype_data" : [ {
  17109. "description" : [ {
  17110. "lang" : "en",
  17111. "value" : "CWE-79"
  17112. } ]
  17113. } ]
  17114. },
  17115. "references" : {
  17116. "reference_data" : [ {
  17117. "url" : "https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html",
  17118. "name" : "https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html",
  17119. "refsource" : "MISC",
  17120. "tags" : [ "Not Applicable", "Third Party Advisory", "VDB Entry" ]
  17121. } ]
  17122. },
  17123. "description" : {
  17124. "description_data" : [ {
  17125. "lang" : "en",
  17126. "value" : "OX App Suite 7.10.4 and earlier allows XSS via a crafted distribution list (payload in the common name) that is mishandled in the scheduling view."
  17127. } ]
  17128. }
  17129. },
  17130. "configurations" : {
  17131. "CVE_data_version" : "4.0",
  17132. "nodes" : [ {
  17133. "operator" : "OR",
  17134. "children" : [ ],
  17135. "cpe_match" : [ {
  17136. "vulnerable" : true,
  17137. "cpe23Uri" : "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
  17138. "versionEndIncluding" : "7.10.4",
  17139. "cpe_name" : [ ]
  17140. } ]
  17141. } ]
  17142. },
  17143. "impact" : {
  17144. "baseMetricV3" : {
  17145. "cvssV3" : {
  17146. "version" : "3.1",
  17147. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  17148. "attackVector" : "NETWORK",
  17149. "attackComplexity" : "LOW",
  17150. "privilegesRequired" : "NONE",
  17151. "userInteraction" : "REQUIRED",
  17152. "scope" : "CHANGED",
  17153. "confidentialityImpact" : "LOW",
  17154. "integrityImpact" : "LOW",
  17155. "availabilityImpact" : "NONE",
  17156. "baseScore" : 6.1,
  17157. "baseSeverity" : "MEDIUM"
  17158. },
  17159. "exploitabilityScore" : 2.8,
  17160. "impactScore" : 2.7
  17161. },
  17162. "baseMetricV2" : {
  17163. "cvssV2" : {
  17164. "version" : "2.0",
  17165. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  17166. "accessVector" : "NETWORK",
  17167. "accessComplexity" : "MEDIUM",
  17168. "authentication" : "NONE",
  17169. "confidentialityImpact" : "NONE",
  17170. "integrityImpact" : "PARTIAL",
  17171. "availabilityImpact" : "NONE",
  17172. "baseScore" : 4.3
  17173. },
  17174. "severity" : "MEDIUM",
  17175. "exploitabilityScore" : 8.6,
  17176. "impactScore" : 2.9,
  17177. "acInsufInfo" : false,
  17178. "obtainAllPrivilege" : false,
  17179. "obtainUserPrivilege" : false,
  17180. "obtainOtherPrivilege" : false,
  17181. "userInteractionRequired" : true
  17182. }
  17183. },
  17184. "publishedDate" : "2021-04-30T22:15Z",
  17185. "lastModifiedDate" : "2021-05-07T12:49Z"
  17186. }, {
  17187. "cve" : {
  17188. "data_type" : "CVE",
  17189. "data_format" : "MITRE",
  17190. "data_version" : "4.0",
  17191. "CVE_data_meta" : {
  17192. "ID" : "CVE-2021-31934",
  17193. "ASSIGNER" : "cve@mitre.org"
  17194. },
  17195. "problemtype" : {
  17196. "problemtype_data" : [ {
  17197. "description" : [ {
  17198. "lang" : "en",
  17199. "value" : "CWE-79"
  17200. } ]
  17201. } ]
  17202. },
  17203. "references" : {
  17204. "reference_data" : [ {
  17205. "url" : "https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html",
  17206. "name" : "https://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html",
  17207. "refsource" : "MISC",
  17208. "tags" : [ "Not Applicable", "Third Party Advisory", "VDB Entry" ]
  17209. } ]
  17210. },
  17211. "description" : {
  17212. "description_data" : [ {
  17213. "lang" : "en",
  17214. "value" : "OX App Suite 7.10.4 and earlier allows XSS via a crafted contact object (payload in the position or company field) that is mishandled in the App Suite UI on a smartphone."
  17215. } ]
  17216. }
  17217. },
  17218. "configurations" : {
  17219. "CVE_data_version" : "4.0",
  17220. "nodes" : [ {
  17221. "operator" : "OR",
  17222. "children" : [ ],
  17223. "cpe_match" : [ {
  17224. "vulnerable" : true,
  17225. "cpe23Uri" : "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
  17226. "versionEndIncluding" : "7.10.4",
  17227. "cpe_name" : [ ]
  17228. } ]
  17229. } ]
  17230. },
  17231. "impact" : {
  17232. "baseMetricV3" : {
  17233. "cvssV3" : {
  17234. "version" : "3.1",
  17235. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  17236. "attackVector" : "NETWORK",
  17237. "attackComplexity" : "LOW",
  17238. "privilegesRequired" : "NONE",
  17239. "userInteraction" : "REQUIRED",
  17240. "scope" : "CHANGED",
  17241. "confidentialityImpact" : "LOW",
  17242. "integrityImpact" : "LOW",
  17243. "availabilityImpact" : "NONE",
  17244. "baseScore" : 6.1,
  17245. "baseSeverity" : "MEDIUM"
  17246. },
  17247. "exploitabilityScore" : 2.8,
  17248. "impactScore" : 2.7
  17249. },
  17250. "baseMetricV2" : {
  17251. "cvssV2" : {
  17252. "version" : "2.0",
  17253. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  17254. "accessVector" : "NETWORK",
  17255. "accessComplexity" : "MEDIUM",
  17256. "authentication" : "NONE",
  17257. "confidentialityImpact" : "NONE",
  17258. "integrityImpact" : "PARTIAL",
  17259. "availabilityImpact" : "NONE",
  17260. "baseScore" : 4.3
  17261. },
  17262. "severity" : "MEDIUM",
  17263. "exploitabilityScore" : 8.6,
  17264. "impactScore" : 2.9,
  17265. "acInsufInfo" : false,
  17266. "obtainAllPrivilege" : false,
  17267. "obtainUserPrivilege" : false,
  17268. "obtainOtherPrivilege" : false,
  17269. "userInteractionRequired" : true
  17270. }
  17271. },
  17272. "publishedDate" : "2021-04-30T22:15Z",
  17273. "lastModifiedDate" : "2021-05-07T12:49Z"
  17274. }, {
  17275. "cve" : {
  17276. "data_type" : "CVE",
  17277. "data_format" : "MITRE",
  17278. "data_version" : "4.0",
  17279. "CVE_data_meta" : {
  17280. "ID" : "CVE-2021-31792",
  17281. "ASSIGNER" : "cve@mitre.org"
  17282. },
  17283. "problemtype" : {
  17284. "problemtype_data" : [ {
  17285. "description" : [ {
  17286. "lang" : "en",
  17287. "value" : "CWE-79"
  17288. } ]
  17289. } ]
  17290. },
  17291. "references" : {
  17292. "reference_data" : [ {
  17293. "url" : "https://chris-forbes.github.io/CVE-2021-31792",
  17294. "name" : "https://chris-forbes.github.io/CVE-2021-31792",
  17295. "refsource" : "MISC",
  17296. "tags" : [ "Exploit", "Third Party Advisory" ]
  17297. }, {
  17298. "url" : "https://github.com/salesagility/SuiteCRM",
  17299. "name" : "https://github.com/salesagility/SuiteCRM",
  17300. "refsource" : "MISC",
  17301. "tags" : [ "Release Notes", "Third Party Advisory" ]
  17302. }, {
  17303. "url" : "https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_19",
  17304. "name" : "https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_19",
  17305. "refsource" : "MISC",
  17306. "tags" : [ "Release Notes", "Vendor Advisory" ]
  17307. } ]
  17308. },
  17309. "description" : {
  17310. "description_data" : [ {
  17311. "lang" : "en",
  17312. "value" : "XSS in the client account page in SuiteCRM before 7.11.19 allows an attacker to inject JavaScript via the name field"
  17313. } ]
  17314. }
  17315. },
  17316. "configurations" : {
  17317. "CVE_data_version" : "4.0",
  17318. "nodes" : [ {
  17319. "operator" : "OR",
  17320. "children" : [ ],
  17321. "cpe_match" : [ {
  17322. "vulnerable" : true,
  17323. "cpe23Uri" : "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
  17324. "versionEndExcluding" : "7.11.19",
  17325. "cpe_name" : [ ]
  17326. } ]
  17327. } ]
  17328. },
  17329. "impact" : {
  17330. "baseMetricV3" : {
  17331. "cvssV3" : {
  17332. "version" : "3.1",
  17333. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  17334. "attackVector" : "NETWORK",
  17335. "attackComplexity" : "LOW",
  17336. "privilegesRequired" : "LOW",
  17337. "userInteraction" : "REQUIRED",
  17338. "scope" : "CHANGED",
  17339. "confidentialityImpact" : "LOW",
  17340. "integrityImpact" : "LOW",
  17341. "availabilityImpact" : "NONE",
  17342. "baseScore" : 5.4,
  17343. "baseSeverity" : "MEDIUM"
  17344. },
  17345. "exploitabilityScore" : 2.3,
  17346. "impactScore" : 2.7
  17347. },
  17348. "baseMetricV2" : {
  17349. "cvssV2" : {
  17350. "version" : "2.0",
  17351. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  17352. "accessVector" : "NETWORK",
  17353. "accessComplexity" : "MEDIUM",
  17354. "authentication" : "SINGLE",
  17355. "confidentialityImpact" : "NONE",
  17356. "integrityImpact" : "PARTIAL",
  17357. "availabilityImpact" : "NONE",
  17358. "baseScore" : 3.5
  17359. },
  17360. "severity" : "LOW",
  17361. "exploitabilityScore" : 6.8,
  17362. "impactScore" : 2.9,
  17363. "acInsufInfo" : false,
  17364. "obtainAllPrivilege" : false,
  17365. "obtainUserPrivilege" : false,
  17366. "obtainOtherPrivilege" : false,
  17367. "userInteractionRequired" : true
  17368. }
  17369. },
  17370. "publishedDate" : "2021-04-30T22:15Z",
  17371. "lastModifiedDate" : "2021-05-03T18:09Z"
  17372. }, {
  17373. "cve" : {
  17374. "data_type" : "CVE",
  17375. "data_format" : "MITRE",
  17376. "data_version" : "4.0",
  17377. "CVE_data_meta" : {
  17378. "ID" : "CVE-2020-28944",
  17379. "ASSIGNER" : "cve@mitre.org"
  17380. },
  17381. "problemtype" : {
  17382. "problemtype_data" : [ {
  17383. "description" : [ {
  17384. "lang" : "en",
  17385. "value" : "CWE-400"
  17386. } ]
  17387. } ]
  17388. },
  17389. "references" : {
  17390. "reference_data" : [ {
  17391. "url" : "https://open-xchange.com",
  17392. "name" : "https://open-xchange.com",
  17393. "refsource" : "MISC",
  17394. "tags" : [ "Vendor Advisory" ]
  17395. }, {
  17396. "url" : "http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html",
  17397. "name" : "http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html",
  17398. "refsource" : "MISC",
  17399. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  17400. } ]
  17401. },
  17402. "description" : {
  17403. "description_data" : [ {
  17404. "lang" : "en",
  17405. "value" : "OX Guard 2.10.4 and earlier allows a Denial of Service via a WKS server that responds slowly or with a large amount of data."
  17406. } ]
  17407. }
  17408. },
  17409. "configurations" : {
  17410. "CVE_data_version" : "4.0",
  17411. "nodes" : [ {
  17412. "operator" : "OR",
  17413. "children" : [ ],
  17414. "cpe_match" : [ {
  17415. "vulnerable" : true,
  17416. "cpe23Uri" : "cpe:2.3:a:open-xchange:ox_guard:*:*:*:*:*:*:*:*",
  17417. "versionEndIncluding" : "2.10.4:",
  17418. "cpe_name" : [ ]
  17419. } ]
  17420. } ]
  17421. },
  17422. "impact" : {
  17423. "baseMetricV3" : {
  17424. "cvssV3" : {
  17425. "version" : "3.1",
  17426. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  17427. "attackVector" : "NETWORK",
  17428. "attackComplexity" : "LOW",
  17429. "privilegesRequired" : "NONE",
  17430. "userInteraction" : "NONE",
  17431. "scope" : "UNCHANGED",
  17432. "confidentialityImpact" : "NONE",
  17433. "integrityImpact" : "NONE",
  17434. "availabilityImpact" : "HIGH",
  17435. "baseScore" : 7.5,
  17436. "baseSeverity" : "HIGH"
  17437. },
  17438. "exploitabilityScore" : 3.9,
  17439. "impactScore" : 3.6
  17440. },
  17441. "baseMetricV2" : {
  17442. "cvssV2" : {
  17443. "version" : "2.0",
  17444. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  17445. "accessVector" : "NETWORK",
  17446. "accessComplexity" : "LOW",
  17447. "authentication" : "NONE",
  17448. "confidentialityImpact" : "NONE",
  17449. "integrityImpact" : "NONE",
  17450. "availabilityImpact" : "PARTIAL",
  17451. "baseScore" : 5.0
  17452. },
  17453. "severity" : "MEDIUM",
  17454. "exploitabilityScore" : 10.0,
  17455. "impactScore" : 2.9,
  17456. "acInsufInfo" : false,
  17457. "obtainAllPrivilege" : false,
  17458. "obtainUserPrivilege" : false,
  17459. "obtainOtherPrivilege" : false,
  17460. "userInteractionRequired" : false
  17461. }
  17462. },
  17463. "publishedDate" : "2021-04-30T22:15Z",
  17464. "lastModifiedDate" : "2021-05-07T13:32Z"
  17465. }, {
  17466. "cve" : {
  17467. "data_type" : "CVE",
  17468. "data_format" : "MITRE",
  17469. "data_version" : "4.0",
  17470. "CVE_data_meta" : {
  17471. "ID" : "CVE-2020-28943",
  17472. "ASSIGNER" : "cve@mitre.org"
  17473. },
  17474. "problemtype" : {
  17475. "problemtype_data" : [ {
  17476. "description" : [ {
  17477. "lang" : "en",
  17478. "value" : "CWE-918"
  17479. } ]
  17480. } ]
  17481. },
  17482. "references" : {
  17483. "reference_data" : [ {
  17484. "url" : "https://open-xchange.com",
  17485. "name" : "https://open-xchange.com",
  17486. "refsource" : "MISC",
  17487. "tags" : [ "Vendor Advisory" ]
  17488. }, {
  17489. "url" : "http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html",
  17490. "name" : "http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html",
  17491. "refsource" : "MISC",
  17492. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  17493. } ]
  17494. },
  17495. "description" : {
  17496. "description_data" : [ {
  17497. "lang" : "en",
  17498. "value" : "OX App Suite 7.10.4 and earlier allows SSRF via a snippet."
  17499. } ]
  17500. }
  17501. },
  17502. "configurations" : {
  17503. "CVE_data_version" : "4.0",
  17504. "nodes" : [ {
  17505. "operator" : "OR",
  17506. "children" : [ ],
  17507. "cpe_match" : [ {
  17508. "vulnerable" : true,
  17509. "cpe23Uri" : "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
  17510. "versionEndIncluding" : "7.10.4",
  17511. "cpe_name" : [ ]
  17512. } ]
  17513. } ]
  17514. },
  17515. "impact" : {
  17516. "baseMetricV3" : {
  17517. "cvssV3" : {
  17518. "version" : "3.1",
  17519. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  17520. "attackVector" : "NETWORK",
  17521. "attackComplexity" : "LOW",
  17522. "privilegesRequired" : "LOW",
  17523. "userInteraction" : "NONE",
  17524. "scope" : "UNCHANGED",
  17525. "confidentialityImpact" : "HIGH",
  17526. "integrityImpact" : "NONE",
  17527. "availabilityImpact" : "NONE",
  17528. "baseScore" : 6.5,
  17529. "baseSeverity" : "MEDIUM"
  17530. },
  17531. "exploitabilityScore" : 2.8,
  17532. "impactScore" : 3.6
  17533. },
  17534. "baseMetricV2" : {
  17535. "cvssV2" : {
  17536. "version" : "2.0",
  17537. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
  17538. "accessVector" : "NETWORK",
  17539. "accessComplexity" : "LOW",
  17540. "authentication" : "SINGLE",
  17541. "confidentialityImpact" : "PARTIAL",
  17542. "integrityImpact" : "NONE",
  17543. "availabilityImpact" : "NONE",
  17544. "baseScore" : 4.0
  17545. },
  17546. "severity" : "MEDIUM",
  17547. "exploitabilityScore" : 8.0,
  17548. "impactScore" : 2.9,
  17549. "acInsufInfo" : false,
  17550. "obtainAllPrivilege" : false,
  17551. "obtainUserPrivilege" : false,
  17552. "obtainOtherPrivilege" : false,
  17553. "userInteractionRequired" : false
  17554. }
  17555. },
  17556. "publishedDate" : "2021-04-30T22:15Z",
  17557. "lastModifiedDate" : "2021-05-07T12:50Z"
  17558. }, {
  17559. "cve" : {
  17560. "data_type" : "CVE",
  17561. "data_format" : "MITRE",
  17562. "data_version" : "4.0",
  17563. "CVE_data_meta" : {
  17564. "ID" : "CVE-2021-21531",
  17565. "ASSIGNER" : "secure@dell.com"
  17566. },
  17567. "problemtype" : {
  17568. "problemtype_data" : [ {
  17569. "description" : [ {
  17570. "lang" : "en",
  17571. "value" : "CWE-669"
  17572. } ]
  17573. } ]
  17574. },
  17575. "references" : {
  17576. "reference_data" : [ {
  17577. "url" : "https://www.dell.com/support/kbdoc/000184565",
  17578. "name" : "N/A",
  17579. "refsource" : "CONFIRM",
  17580. "tags" : [ "Vendor Advisory" ]
  17581. } ]
  17582. },
  17583. "description" : {
  17584. "description_data" : [ {
  17585. "lang" : "en",
  17586. "value" : "Dell Unisphere for PowerMax versions prior to 9.2.1.6 contain an Authorization Bypass Vulnerability. A local authenticated malicious user with monitor role may exploit this vulnerability to perform unauthorized actions."
  17587. } ]
  17588. }
  17589. },
  17590. "configurations" : {
  17591. "CVE_data_version" : "4.0",
  17592. "nodes" : [ {
  17593. "operator" : "OR",
  17594. "children" : [ ],
  17595. "cpe_match" : [ {
  17596. "vulnerable" : true,
  17597. "cpe23Uri" : "cpe:2.3:a:dell:solutions_enabler:*:*:*:*:*:*:*:*",
  17598. "versionEndExcluding" : "9.1.0.15:",
  17599. "cpe_name" : [ ]
  17600. }, {
  17601. "vulnerable" : true,
  17602. "cpe23Uri" : "cpe:2.3:a:dell:solutions_enabler:*:*:*:*:*:*:*:*",
  17603. "versionStartIncluding" : "9.2.0:",
  17604. "versionEndExcluding" : "9.2.1.6:",
  17605. "cpe_name" : [ ]
  17606. }, {
  17607. "vulnerable" : true,
  17608. "cpe23Uri" : "cpe:2.3:a:dell:solutions_enabler_virtual_appliance:*:*:*:*:*:*:*:*",
  17609. "versionEndExcluding" : "9.1.0.15:",
  17610. "cpe_name" : [ ]
  17611. }, {
  17612. "vulnerable" : true,
  17613. "cpe23Uri" : "cpe:2.3:a:dell:solutions_enabler_virtual_appliance:*:*:*:*:*:*:*:*",
  17614. "versionStartIncluding" : "9.2.0:",
  17615. "versionEndExcluding" : "9.2.1.1:",
  17616. "cpe_name" : [ ]
  17617. }, {
  17618. "vulnerable" : true,
  17619. "cpe23Uri" : "cpe:2.3:a:dell:unisphere_for_powermax:*:*:*:*:*:*:*:*",
  17620. "versionEndExcluding" : "9.1.0.26:",
  17621. "cpe_name" : [ ]
  17622. }, {
  17623. "vulnerable" : true,
  17624. "cpe23Uri" : "cpe:2.3:a:dell:unisphere_for_powermax:*:*:*:*:*:*:*:*",
  17625. "versionStartIncluding" : "9.2.1.0:",
  17626. "versionEndIncluding" : "9.2.1.6:",
  17627. "cpe_name" : [ ]
  17628. }, {
  17629. "vulnerable" : true,
  17630. "cpe23Uri" : "cpe:2.3:a:dell:unisphere_for_powermax_virtual_appliance:*:*:*:*:*:*:*:*",
  17631. "versionEndExcluding" : "9.1.0.26:",
  17632. "cpe_name" : [ ]
  17633. }, {
  17634. "vulnerable" : true,
  17635. "cpe23Uri" : "cpe:2.3:a:dell:unisphere_for_powermax_virtual_appliance:*:*:*:*:*:*:*:*",
  17636. "versionStartIncluding" : "9.2.1.0:",
  17637. "versionEndExcluding" : "9.2.1.6:",
  17638. "cpe_name" : [ ]
  17639. }, {
  17640. "vulnerable" : true,
  17641. "cpe23Uri" : "cpe:2.3:o:dell:powermax_os:5978:*:*:*:*:*:*:*",
  17642. "cpe_name" : [ ]
  17643. } ]
  17644. } ]
  17645. },
  17646. "impact" : {
  17647. "baseMetricV3" : {
  17648. "cvssV3" : {
  17649. "version" : "3.1",
  17650. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  17651. "attackVector" : "LOCAL",
  17652. "attackComplexity" : "LOW",
  17653. "privilegesRequired" : "LOW",
  17654. "userInteraction" : "NONE",
  17655. "scope" : "UNCHANGED",
  17656. "confidentialityImpact" : "HIGH",
  17657. "integrityImpact" : "HIGH",
  17658. "availabilityImpact" : "HIGH",
  17659. "baseScore" : 7.8,
  17660. "baseSeverity" : "HIGH"
  17661. },
  17662. "exploitabilityScore" : 1.8,
  17663. "impactScore" : 5.9
  17664. },
  17665. "baseMetricV2" : {
  17666. "cvssV2" : {
  17667. "version" : "2.0",
  17668. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  17669. "accessVector" : "LOCAL",
  17670. "accessComplexity" : "LOW",
  17671. "authentication" : "NONE",
  17672. "confidentialityImpact" : "PARTIAL",
  17673. "integrityImpact" : "PARTIAL",
  17674. "availabilityImpact" : "PARTIAL",
  17675. "baseScore" : 4.6
  17676. },
  17677. "severity" : "MEDIUM",
  17678. "exploitabilityScore" : 3.9,
  17679. "impactScore" : 6.4,
  17680. "acInsufInfo" : false,
  17681. "obtainAllPrivilege" : false,
  17682. "obtainUserPrivilege" : false,
  17683. "obtainOtherPrivilege" : false,
  17684. "userInteractionRequired" : false
  17685. }
  17686. },
  17687. "publishedDate" : "2021-04-30T21:15Z",
  17688. "lastModifiedDate" : "2021-05-10T14:07Z"
  17689. }, {
  17690. "cve" : {
  17691. "data_type" : "CVE",
  17692. "data_format" : "MITRE",
  17693. "data_version" : "4.0",
  17694. "CVE_data_meta" : {
  17695. "ID" : "CVE-2021-21233",
  17696. "ASSIGNER" : "chrome-cve-admin@google.com"
  17697. },
  17698. "problemtype" : {
  17699. "problemtype_data" : [ {
  17700. "description" : [ {
  17701. "lang" : "en",
  17702. "value" : "CWE-787"
  17703. } ]
  17704. } ]
  17705. },
  17706. "references" : {
  17707. "reference_data" : [ {
  17708. "url" : "https://crbug.com/1182937",
  17709. "name" : "https://crbug.com/1182937",
  17710. "refsource" : "MISC",
  17711. "tags" : [ "Broken Link", "Vendor Advisory" ]
  17712. }, {
  17713. "url" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  17714. "name" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  17715. "refsource" : "MISC",
  17716. "tags" : [ "Release Notes", "Vendor Advisory" ]
  17717. }, {
  17718. "url" : "https://security.gentoo.org/glsa/202104-08",
  17719. "name" : "GLSA-202104-08",
  17720. "refsource" : "GENTOO",
  17721. "tags" : [ ]
  17722. }, {
  17723. "url" : "https://www.debian.org/security/2021/dsa-4911",
  17724. "name" : "DSA-4911",
  17725. "refsource" : "DEBIAN",
  17726. "tags" : [ ]
  17727. } ]
  17728. },
  17729. "description" : {
  17730. "description_data" : [ {
  17731. "lang" : "en",
  17732. "value" : "Heap buffer overflow in ANGLE in Google Chrome on Windows prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
  17733. } ]
  17734. }
  17735. },
  17736. "configurations" : {
  17737. "CVE_data_version" : "4.0",
  17738. "nodes" : [ {
  17739. "operator" : "AND",
  17740. "children" : [ {
  17741. "operator" : "OR",
  17742. "children" : [ ],
  17743. "cpe_match" : [ {
  17744. "vulnerable" : true,
  17745. "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
  17746. "versionEndExcluding" : "90.0.4430.93",
  17747. "cpe_name" : [ ]
  17748. } ]
  17749. }, {
  17750. "operator" : "OR",
  17751. "children" : [ ],
  17752. "cpe_match" : [ {
  17753. "vulnerable" : false,
  17754. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  17755. "cpe_name" : [ ]
  17756. } ]
  17757. } ],
  17758. "cpe_match" : [ ]
  17759. } ]
  17760. },
  17761. "impact" : {
  17762. "baseMetricV3" : {
  17763. "cvssV3" : {
  17764. "version" : "3.1",
  17765. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  17766. "attackVector" : "NETWORK",
  17767. "attackComplexity" : "LOW",
  17768. "privilegesRequired" : "NONE",
  17769. "userInteraction" : "REQUIRED",
  17770. "scope" : "UNCHANGED",
  17771. "confidentialityImpact" : "HIGH",
  17772. "integrityImpact" : "HIGH",
  17773. "availabilityImpact" : "HIGH",
  17774. "baseScore" : 8.8,
  17775. "baseSeverity" : "HIGH"
  17776. },
  17777. "exploitabilityScore" : 2.8,
  17778. "impactScore" : 5.9
  17779. },
  17780. "baseMetricV2" : {
  17781. "cvssV2" : {
  17782. "version" : "2.0",
  17783. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  17784. "accessVector" : "NETWORK",
  17785. "accessComplexity" : "MEDIUM",
  17786. "authentication" : "NONE",
  17787. "confidentialityImpact" : "PARTIAL",
  17788. "integrityImpact" : "PARTIAL",
  17789. "availabilityImpact" : "PARTIAL",
  17790. "baseScore" : 6.8
  17791. },
  17792. "severity" : "MEDIUM",
  17793. "exploitabilityScore" : 8.6,
  17794. "impactScore" : 6.4,
  17795. "acInsufInfo" : false,
  17796. "obtainAllPrivilege" : false,
  17797. "obtainUserPrivilege" : false,
  17798. "obtainOtherPrivilege" : false,
  17799. "userInteractionRequired" : true
  17800. }
  17801. },
  17802. "publishedDate" : "2021-04-30T21:15Z",
  17803. "lastModifiedDate" : "2021-05-04T12:15Z"
  17804. }, {
  17805. "cve" : {
  17806. "data_type" : "CVE",
  17807. "data_format" : "MITRE",
  17808. "data_version" : "4.0",
  17809. "CVE_data_meta" : {
  17810. "ID" : "CVE-2021-21232",
  17811. "ASSIGNER" : "chrome-cve-admin@google.com"
  17812. },
  17813. "problemtype" : {
  17814. "problemtype_data" : [ {
  17815. "description" : [ {
  17816. "lang" : "en",
  17817. "value" : "CWE-416"
  17818. } ]
  17819. } ]
  17820. },
  17821. "references" : {
  17822. "reference_data" : [ {
  17823. "url" : "https://crbug.com/1175058",
  17824. "name" : "https://crbug.com/1175058",
  17825. "refsource" : "MISC",
  17826. "tags" : [ "Broken Link", "Vendor Advisory" ]
  17827. }, {
  17828. "url" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  17829. "name" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  17830. "refsource" : "MISC",
  17831. "tags" : [ "Release Notes", "Vendor Advisory" ]
  17832. }, {
  17833. "url" : "https://security.gentoo.org/glsa/202104-08",
  17834. "name" : "GLSA-202104-08",
  17835. "refsource" : "GENTOO",
  17836. "tags" : [ ]
  17837. }, {
  17838. "url" : "https://www.debian.org/security/2021/dsa-4911",
  17839. "name" : "DSA-4911",
  17840. "refsource" : "DEBIAN",
  17841. "tags" : [ ]
  17842. } ]
  17843. },
  17844. "description" : {
  17845. "description_data" : [ {
  17846. "lang" : "en",
  17847. "value" : "Use after free in Dev Tools in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
  17848. } ]
  17849. }
  17850. },
  17851. "configurations" : {
  17852. "CVE_data_version" : "4.0",
  17853. "nodes" : [ {
  17854. "operator" : "OR",
  17855. "children" : [ ],
  17856. "cpe_match" : [ {
  17857. "vulnerable" : true,
  17858. "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
  17859. "versionEndExcluding" : "90.0.4430.93",
  17860. "cpe_name" : [ ]
  17861. } ]
  17862. } ]
  17863. },
  17864. "impact" : {
  17865. "baseMetricV3" : {
  17866. "cvssV3" : {
  17867. "version" : "3.1",
  17868. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  17869. "attackVector" : "NETWORK",
  17870. "attackComplexity" : "LOW",
  17871. "privilegesRequired" : "NONE",
  17872. "userInteraction" : "REQUIRED",
  17873. "scope" : "UNCHANGED",
  17874. "confidentialityImpact" : "HIGH",
  17875. "integrityImpact" : "HIGH",
  17876. "availabilityImpact" : "HIGH",
  17877. "baseScore" : 8.8,
  17878. "baseSeverity" : "HIGH"
  17879. },
  17880. "exploitabilityScore" : 2.8,
  17881. "impactScore" : 5.9
  17882. },
  17883. "baseMetricV2" : {
  17884. "cvssV2" : {
  17885. "version" : "2.0",
  17886. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  17887. "accessVector" : "NETWORK",
  17888. "accessComplexity" : "MEDIUM",
  17889. "authentication" : "NONE",
  17890. "confidentialityImpact" : "PARTIAL",
  17891. "integrityImpact" : "PARTIAL",
  17892. "availabilityImpact" : "PARTIAL",
  17893. "baseScore" : 6.8
  17894. },
  17895. "severity" : "MEDIUM",
  17896. "exploitabilityScore" : 8.6,
  17897. "impactScore" : 6.4,
  17898. "acInsufInfo" : false,
  17899. "obtainAllPrivilege" : false,
  17900. "obtainUserPrivilege" : false,
  17901. "obtainOtherPrivilege" : false,
  17902. "userInteractionRequired" : true
  17903. }
  17904. },
  17905. "publishedDate" : "2021-04-30T21:15Z",
  17906. "lastModifiedDate" : "2021-05-04T12:15Z"
  17907. }, {
  17908. "cve" : {
  17909. "data_type" : "CVE",
  17910. "data_format" : "MITRE",
  17911. "data_version" : "4.0",
  17912. "CVE_data_meta" : {
  17913. "ID" : "CVE-2021-21231",
  17914. "ASSIGNER" : "chrome-cve-admin@google.com"
  17915. },
  17916. "problemtype" : {
  17917. "problemtype_data" : [ {
  17918. "description" : [ {
  17919. "lang" : "en",
  17920. "value" : "CWE-345"
  17921. } ]
  17922. } ]
  17923. },
  17924. "references" : {
  17925. "reference_data" : [ {
  17926. "url" : "https://crbug.com/1198696",
  17927. "name" : "https://crbug.com/1198696",
  17928. "refsource" : "MISC",
  17929. "tags" : [ "Broken Link", "Vendor Advisory" ]
  17930. }, {
  17931. "url" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  17932. "name" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  17933. "refsource" : "MISC",
  17934. "tags" : [ "Release Notes", "Vendor Advisory" ]
  17935. }, {
  17936. "url" : "https://security.gentoo.org/glsa/202104-08",
  17937. "name" : "GLSA-202104-08",
  17938. "refsource" : "GENTOO",
  17939. "tags" : [ "Third Party Advisory" ]
  17940. }, {
  17941. "url" : "https://www.debian.org/security/2021/dsa-4911",
  17942. "name" : "DSA-4911",
  17943. "refsource" : "DEBIAN",
  17944. "tags" : [ "Third Party Advisory" ]
  17945. } ]
  17946. },
  17947. "description" : {
  17948. "description_data" : [ {
  17949. "lang" : "en",
  17950. "value" : "Insufficient data validation in V8 in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
  17951. } ]
  17952. }
  17953. },
  17954. "configurations" : {
  17955. "CVE_data_version" : "4.0",
  17956. "nodes" : [ {
  17957. "operator" : "OR",
  17958. "children" : [ ],
  17959. "cpe_match" : [ {
  17960. "vulnerable" : true,
  17961. "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
  17962. "versionEndExcluding" : "90.0.4430.93",
  17963. "cpe_name" : [ ]
  17964. } ]
  17965. }, {
  17966. "operator" : "OR",
  17967. "children" : [ ],
  17968. "cpe_match" : [ {
  17969. "vulnerable" : true,
  17970. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  17971. "cpe_name" : [ ]
  17972. } ]
  17973. } ]
  17974. },
  17975. "impact" : {
  17976. "baseMetricV3" : {
  17977. "cvssV3" : {
  17978. "version" : "3.1",
  17979. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  17980. "attackVector" : "NETWORK",
  17981. "attackComplexity" : "LOW",
  17982. "privilegesRequired" : "NONE",
  17983. "userInteraction" : "REQUIRED",
  17984. "scope" : "UNCHANGED",
  17985. "confidentialityImpact" : "HIGH",
  17986. "integrityImpact" : "HIGH",
  17987. "availabilityImpact" : "HIGH",
  17988. "baseScore" : 8.8,
  17989. "baseSeverity" : "HIGH"
  17990. },
  17991. "exploitabilityScore" : 2.8,
  17992. "impactScore" : 5.9
  17993. },
  17994. "baseMetricV2" : {
  17995. "cvssV2" : {
  17996. "version" : "2.0",
  17997. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  17998. "accessVector" : "NETWORK",
  17999. "accessComplexity" : "MEDIUM",
  18000. "authentication" : "NONE",
  18001. "confidentialityImpact" : "PARTIAL",
  18002. "integrityImpact" : "PARTIAL",
  18003. "availabilityImpact" : "PARTIAL",
  18004. "baseScore" : 6.8
  18005. },
  18006. "severity" : "MEDIUM",
  18007. "exploitabilityScore" : 8.6,
  18008. "impactScore" : 6.4,
  18009. "acInsufInfo" : false,
  18010. "obtainAllPrivilege" : false,
  18011. "obtainUserPrivilege" : false,
  18012. "obtainOtherPrivilege" : false,
  18013. "userInteractionRequired" : true
  18014. }
  18015. },
  18016. "publishedDate" : "2021-04-30T21:15Z",
  18017. "lastModifiedDate" : "2021-05-06T20:10Z"
  18018. }, {
  18019. "cve" : {
  18020. "data_type" : "CVE",
  18021. "data_format" : "MITRE",
  18022. "data_version" : "4.0",
  18023. "CVE_data_meta" : {
  18024. "ID" : "CVE-2021-21230",
  18025. "ASSIGNER" : "chrome-cve-admin@google.com"
  18026. },
  18027. "problemtype" : {
  18028. "problemtype_data" : [ {
  18029. "description" : [ {
  18030. "lang" : "en",
  18031. "value" : "CWE-843"
  18032. } ]
  18033. } ]
  18034. },
  18035. "references" : {
  18036. "reference_data" : [ {
  18037. "url" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  18038. "name" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  18039. "refsource" : "MISC",
  18040. "tags" : [ "Release Notes", "Vendor Advisory" ]
  18041. }, {
  18042. "url" : "https://crbug.com/1198705",
  18043. "name" : "https://crbug.com/1198705",
  18044. "refsource" : "MISC",
  18045. "tags" : [ "Broken Link", "Vendor Advisory" ]
  18046. }, {
  18047. "url" : "https://security.gentoo.org/glsa/202104-08",
  18048. "name" : "GLSA-202104-08",
  18049. "refsource" : "GENTOO",
  18050. "tags" : [ ]
  18051. }, {
  18052. "url" : "https://www.debian.org/security/2021/dsa-4911",
  18053. "name" : "DSA-4911",
  18054. "refsource" : "DEBIAN",
  18055. "tags" : [ ]
  18056. } ]
  18057. },
  18058. "description" : {
  18059. "description_data" : [ {
  18060. "lang" : "en",
  18061. "value" : "Type confusion in V8 in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
  18062. } ]
  18063. }
  18064. },
  18065. "configurations" : {
  18066. "CVE_data_version" : "4.0",
  18067. "nodes" : [ {
  18068. "operator" : "OR",
  18069. "children" : [ ],
  18070. "cpe_match" : [ {
  18071. "vulnerable" : true,
  18072. "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
  18073. "versionEndExcluding" : "90.0.4430.93",
  18074. "cpe_name" : [ ]
  18075. } ]
  18076. } ]
  18077. },
  18078. "impact" : {
  18079. "baseMetricV3" : {
  18080. "cvssV3" : {
  18081. "version" : "3.1",
  18082. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  18083. "attackVector" : "NETWORK",
  18084. "attackComplexity" : "LOW",
  18085. "privilegesRequired" : "NONE",
  18086. "userInteraction" : "REQUIRED",
  18087. "scope" : "UNCHANGED",
  18088. "confidentialityImpact" : "HIGH",
  18089. "integrityImpact" : "HIGH",
  18090. "availabilityImpact" : "HIGH",
  18091. "baseScore" : 8.8,
  18092. "baseSeverity" : "HIGH"
  18093. },
  18094. "exploitabilityScore" : 2.8,
  18095. "impactScore" : 5.9
  18096. },
  18097. "baseMetricV2" : {
  18098. "cvssV2" : {
  18099. "version" : "2.0",
  18100. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  18101. "accessVector" : "NETWORK",
  18102. "accessComplexity" : "MEDIUM",
  18103. "authentication" : "NONE",
  18104. "confidentialityImpact" : "PARTIAL",
  18105. "integrityImpact" : "PARTIAL",
  18106. "availabilityImpact" : "PARTIAL",
  18107. "baseScore" : 6.8
  18108. },
  18109. "severity" : "MEDIUM",
  18110. "exploitabilityScore" : 8.6,
  18111. "impactScore" : 6.4,
  18112. "acInsufInfo" : false,
  18113. "obtainAllPrivilege" : false,
  18114. "obtainUserPrivilege" : false,
  18115. "obtainOtherPrivilege" : false,
  18116. "userInteractionRequired" : true
  18117. }
  18118. },
  18119. "publishedDate" : "2021-04-30T21:15Z",
  18120. "lastModifiedDate" : "2021-05-04T12:15Z"
  18121. }, {
  18122. "cve" : {
  18123. "data_type" : "CVE",
  18124. "data_format" : "MITRE",
  18125. "data_version" : "4.0",
  18126. "CVE_data_meta" : {
  18127. "ID" : "CVE-2021-21229",
  18128. "ASSIGNER" : "chrome-cve-admin@google.com"
  18129. },
  18130. "problemtype" : {
  18131. "problemtype_data" : [ {
  18132. "description" : [ {
  18133. "lang" : "en",
  18134. "value" : "CWE-346"
  18135. } ]
  18136. } ]
  18137. },
  18138. "references" : {
  18139. "reference_data" : [ {
  18140. "url" : "https://crbug.com/1198165",
  18141. "name" : "https://crbug.com/1198165",
  18142. "refsource" : "MISC",
  18143. "tags" : [ "Broken Link", "Vendor Advisory" ]
  18144. }, {
  18145. "url" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  18146. "name" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  18147. "refsource" : "MISC",
  18148. "tags" : [ "Release Notes", "Vendor Advisory" ]
  18149. }, {
  18150. "url" : "https://security.gentoo.org/glsa/202104-08",
  18151. "name" : "GLSA-202104-08",
  18152. "refsource" : "GENTOO",
  18153. "tags" : [ "Third Party Advisory" ]
  18154. }, {
  18155. "url" : "https://www.debian.org/security/2021/dsa-4911",
  18156. "name" : "DSA-4911",
  18157. "refsource" : "DEBIAN",
  18158. "tags" : [ "Third Party Advisory" ]
  18159. } ]
  18160. },
  18161. "description" : {
  18162. "description_data" : [ {
  18163. "lang" : "en",
  18164. "value" : "Incorrect security UI in downloads in Google Chrome on Android prior to 90.0.4430.93 allowed a remote attacker to perform domain spoofing via a crafted HTML page."
  18165. } ]
  18166. }
  18167. },
  18168. "configurations" : {
  18169. "CVE_data_version" : "4.0",
  18170. "nodes" : [ {
  18171. "operator" : "AND",
  18172. "children" : [ {
  18173. "operator" : "OR",
  18174. "children" : [ ],
  18175. "cpe_match" : [ {
  18176. "vulnerable" : true,
  18177. "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
  18178. "versionEndExcluding" : "90.0.4430.93",
  18179. "cpe_name" : [ ]
  18180. } ]
  18181. }, {
  18182. "operator" : "OR",
  18183. "children" : [ ],
  18184. "cpe_match" : [ {
  18185. "vulnerable" : false,
  18186. "cpe23Uri" : "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
  18187. "cpe_name" : [ ]
  18188. } ]
  18189. } ],
  18190. "cpe_match" : [ ]
  18191. }, {
  18192. "operator" : "OR",
  18193. "children" : [ ],
  18194. "cpe_match" : [ {
  18195. "vulnerable" : true,
  18196. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  18197. "cpe_name" : [ ]
  18198. } ]
  18199. } ]
  18200. },
  18201. "impact" : {
  18202. "baseMetricV3" : {
  18203. "cvssV3" : {
  18204. "version" : "3.1",
  18205. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
  18206. "attackVector" : "NETWORK",
  18207. "attackComplexity" : "LOW",
  18208. "privilegesRequired" : "NONE",
  18209. "userInteraction" : "REQUIRED",
  18210. "scope" : "UNCHANGED",
  18211. "confidentialityImpact" : "NONE",
  18212. "integrityImpact" : "HIGH",
  18213. "availabilityImpact" : "NONE",
  18214. "baseScore" : 6.5,
  18215. "baseSeverity" : "MEDIUM"
  18216. },
  18217. "exploitabilityScore" : 2.8,
  18218. "impactScore" : 3.6
  18219. },
  18220. "baseMetricV2" : {
  18221. "cvssV2" : {
  18222. "version" : "2.0",
  18223. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  18224. "accessVector" : "NETWORK",
  18225. "accessComplexity" : "MEDIUM",
  18226. "authentication" : "NONE",
  18227. "confidentialityImpact" : "NONE",
  18228. "integrityImpact" : "PARTIAL",
  18229. "availabilityImpact" : "NONE",
  18230. "baseScore" : 4.3
  18231. },
  18232. "severity" : "MEDIUM",
  18233. "exploitabilityScore" : 8.6,
  18234. "impactScore" : 2.9,
  18235. "acInsufInfo" : false,
  18236. "obtainAllPrivilege" : false,
  18237. "obtainUserPrivilege" : false,
  18238. "obtainOtherPrivilege" : false,
  18239. "userInteractionRequired" : true
  18240. }
  18241. },
  18242. "publishedDate" : "2021-04-30T21:15Z",
  18243. "lastModifiedDate" : "2021-05-06T20:10Z"
  18244. }, {
  18245. "cve" : {
  18246. "data_type" : "CVE",
  18247. "data_format" : "MITRE",
  18248. "data_version" : "4.0",
  18249. "CVE_data_meta" : {
  18250. "ID" : "CVE-2021-21228",
  18251. "ASSIGNER" : "chrome-cve-admin@google.com"
  18252. },
  18253. "problemtype" : {
  18254. "problemtype_data" : [ {
  18255. "description" : [ {
  18256. "lang" : "en",
  18257. "value" : "CWE-863"
  18258. } ]
  18259. } ]
  18260. },
  18261. "references" : {
  18262. "reference_data" : [ {
  18263. "url" : "https://crbug.com/1139156",
  18264. "name" : "https://crbug.com/1139156",
  18265. "refsource" : "MISC",
  18266. "tags" : [ "Broken Link", "Vendor Advisory" ]
  18267. }, {
  18268. "url" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  18269. "name" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  18270. "refsource" : "MISC",
  18271. "tags" : [ "Release Notes", "Vendor Advisory" ]
  18272. }, {
  18273. "url" : "https://security.gentoo.org/glsa/202104-08",
  18274. "name" : "GLSA-202104-08",
  18275. "refsource" : "GENTOO",
  18276. "tags" : [ "Third Party Advisory" ]
  18277. }, {
  18278. "url" : "https://www.debian.org/security/2021/dsa-4911",
  18279. "name" : "DSA-4911",
  18280. "refsource" : "DEBIAN",
  18281. "tags" : [ "Third Party Advisory" ]
  18282. } ]
  18283. },
  18284. "description" : {
  18285. "description_data" : [ {
  18286. "lang" : "en",
  18287. "value" : "Insufficient policy enforcement in extensions in Google Chrome prior to 90.0.4430.93 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension."
  18288. } ]
  18289. }
  18290. },
  18291. "configurations" : {
  18292. "CVE_data_version" : "4.0",
  18293. "nodes" : [ {
  18294. "operator" : "OR",
  18295. "children" : [ ],
  18296. "cpe_match" : [ {
  18297. "vulnerable" : true,
  18298. "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
  18299. "versionEndExcluding" : "90.0.4430.93",
  18300. "cpe_name" : [ ]
  18301. } ]
  18302. }, {
  18303. "operator" : "OR",
  18304. "children" : [ ],
  18305. "cpe_match" : [ {
  18306. "vulnerable" : true,
  18307. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  18308. "cpe_name" : [ ]
  18309. } ]
  18310. } ]
  18311. },
  18312. "impact" : {
  18313. "baseMetricV3" : {
  18314. "cvssV3" : {
  18315. "version" : "3.1",
  18316. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
  18317. "attackVector" : "NETWORK",
  18318. "attackComplexity" : "LOW",
  18319. "privilegesRequired" : "NONE",
  18320. "userInteraction" : "REQUIRED",
  18321. "scope" : "UNCHANGED",
  18322. "confidentialityImpact" : "NONE",
  18323. "integrityImpact" : "LOW",
  18324. "availabilityImpact" : "NONE",
  18325. "baseScore" : 4.3,
  18326. "baseSeverity" : "MEDIUM"
  18327. },
  18328. "exploitabilityScore" : 2.8,
  18329. "impactScore" : 1.4
  18330. },
  18331. "baseMetricV2" : {
  18332. "cvssV2" : {
  18333. "version" : "2.0",
  18334. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  18335. "accessVector" : "NETWORK",
  18336. "accessComplexity" : "MEDIUM",
  18337. "authentication" : "NONE",
  18338. "confidentialityImpact" : "NONE",
  18339. "integrityImpact" : "PARTIAL",
  18340. "availabilityImpact" : "NONE",
  18341. "baseScore" : 4.3
  18342. },
  18343. "severity" : "MEDIUM",
  18344. "exploitabilityScore" : 8.6,
  18345. "impactScore" : 2.9,
  18346. "acInsufInfo" : false,
  18347. "obtainAllPrivilege" : false,
  18348. "obtainUserPrivilege" : false,
  18349. "obtainOtherPrivilege" : false,
  18350. "userInteractionRequired" : true
  18351. }
  18352. },
  18353. "publishedDate" : "2021-04-30T21:15Z",
  18354. "lastModifiedDate" : "2021-05-06T20:05Z"
  18355. }, {
  18356. "cve" : {
  18357. "data_type" : "CVE",
  18358. "data_format" : "MITRE",
  18359. "data_version" : "4.0",
  18360. "CVE_data_meta" : {
  18361. "ID" : "CVE-2021-21227",
  18362. "ASSIGNER" : "chrome-cve-admin@google.com"
  18363. },
  18364. "problemtype" : {
  18365. "problemtype_data" : [ {
  18366. "description" : [ {
  18367. "lang" : "en",
  18368. "value" : "CWE-787"
  18369. } ]
  18370. } ]
  18371. },
  18372. "references" : {
  18373. "reference_data" : [ {
  18374. "url" : "https://crbug.com/1199345",
  18375. "name" : "https://crbug.com/1199345",
  18376. "refsource" : "MISC",
  18377. "tags" : [ "Permissions Required", "Vendor Advisory" ]
  18378. }, {
  18379. "url" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  18380. "name" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html",
  18381. "refsource" : "MISC",
  18382. "tags" : [ "Release Notes", "Vendor Advisory" ]
  18383. }, {
  18384. "url" : "https://security.gentoo.org/glsa/202104-08",
  18385. "name" : "GLSA-202104-08",
  18386. "refsource" : "GENTOO",
  18387. "tags" : [ ]
  18388. }, {
  18389. "url" : "https://www.debian.org/security/2021/dsa-4911",
  18390. "name" : "DSA-4911",
  18391. "refsource" : "DEBIAN",
  18392. "tags" : [ ]
  18393. } ]
  18394. },
  18395. "description" : {
  18396. "description_data" : [ {
  18397. "lang" : "en",
  18398. "value" : "Insufficient data validation in V8 in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
  18399. } ]
  18400. }
  18401. },
  18402. "configurations" : {
  18403. "CVE_data_version" : "4.0",
  18404. "nodes" : [ {
  18405. "operator" : "OR",
  18406. "children" : [ ],
  18407. "cpe_match" : [ {
  18408. "vulnerable" : true,
  18409. "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
  18410. "versionEndExcluding" : "90.0.4430.93",
  18411. "cpe_name" : [ ]
  18412. } ]
  18413. } ]
  18414. },
  18415. "impact" : {
  18416. "baseMetricV3" : {
  18417. "cvssV3" : {
  18418. "version" : "3.1",
  18419. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  18420. "attackVector" : "NETWORK",
  18421. "attackComplexity" : "LOW",
  18422. "privilegesRequired" : "NONE",
  18423. "userInteraction" : "REQUIRED",
  18424. "scope" : "UNCHANGED",
  18425. "confidentialityImpact" : "HIGH",
  18426. "integrityImpact" : "HIGH",
  18427. "availabilityImpact" : "HIGH",
  18428. "baseScore" : 8.8,
  18429. "baseSeverity" : "HIGH"
  18430. },
  18431. "exploitabilityScore" : 2.8,
  18432. "impactScore" : 5.9
  18433. },
  18434. "baseMetricV2" : {
  18435. "cvssV2" : {
  18436. "version" : "2.0",
  18437. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  18438. "accessVector" : "NETWORK",
  18439. "accessComplexity" : "MEDIUM",
  18440. "authentication" : "NONE",
  18441. "confidentialityImpact" : "PARTIAL",
  18442. "integrityImpact" : "PARTIAL",
  18443. "availabilityImpact" : "PARTIAL",
  18444. "baseScore" : 6.8
  18445. },
  18446. "severity" : "MEDIUM",
  18447. "exploitabilityScore" : 8.6,
  18448. "impactScore" : 6.4,
  18449. "acInsufInfo" : false,
  18450. "obtainAllPrivilege" : false,
  18451. "obtainUserPrivilege" : false,
  18452. "obtainOtherPrivilege" : false,
  18453. "userInteractionRequired" : true
  18454. }
  18455. },
  18456. "publishedDate" : "2021-04-30T21:15Z",
  18457. "lastModifiedDate" : "2021-05-04T12:15Z"
  18458. }, {
  18459. "cve" : {
  18460. "data_type" : "CVE",
  18461. "data_format" : "MITRE",
  18462. "data_version" : "4.0",
  18463. "CVE_data_meta" : {
  18464. "ID" : "CVE-2020-18084",
  18465. "ASSIGNER" : "cve@mitre.org"
  18466. },
  18467. "problemtype" : {
  18468. "problemtype_data" : [ {
  18469. "description" : [ {
  18470. "lang" : "en",
  18471. "value" : "CWE-79"
  18472. } ]
  18473. } ]
  18474. },
  18475. "references" : {
  18476. "reference_data" : [ {
  18477. "url" : "https://github.com/yzmcms/yzmcms/issues/9",
  18478. "name" : "https://github.com/yzmcms/yzmcms/issues/9",
  18479. "refsource" : "MISC",
  18480. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  18481. } ]
  18482. },
  18483. "description" : {
  18484. "description_data" : [ {
  18485. "lang" : "en",
  18486. "value" : "Cross Site Scripting (XSS) in yzmCMS v5.2 allows remote attackers to execute arbitrary code by injecting commands into the \"referer\" field of a POST request to the component \"/member/index/login.html\" when logging in."
  18487. } ]
  18488. }
  18489. },
  18490. "configurations" : {
  18491. "CVE_data_version" : "4.0",
  18492. "nodes" : [ {
  18493. "operator" : "OR",
  18494. "children" : [ ],
  18495. "cpe_match" : [ {
  18496. "vulnerable" : true,
  18497. "cpe23Uri" : "cpe:2.3:a:yzmcms:yzmcms:5.2:*:*:*:*:*:*:*",
  18498. "cpe_name" : [ ]
  18499. } ]
  18500. } ]
  18501. },
  18502. "impact" : {
  18503. "baseMetricV3" : {
  18504. "cvssV3" : {
  18505. "version" : "3.1",
  18506. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  18507. "attackVector" : "NETWORK",
  18508. "attackComplexity" : "LOW",
  18509. "privilegesRequired" : "NONE",
  18510. "userInteraction" : "REQUIRED",
  18511. "scope" : "CHANGED",
  18512. "confidentialityImpact" : "LOW",
  18513. "integrityImpact" : "LOW",
  18514. "availabilityImpact" : "NONE",
  18515. "baseScore" : 6.1,
  18516. "baseSeverity" : "MEDIUM"
  18517. },
  18518. "exploitabilityScore" : 2.8,
  18519. "impactScore" : 2.7
  18520. },
  18521. "baseMetricV2" : {
  18522. "cvssV2" : {
  18523. "version" : "2.0",
  18524. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  18525. "accessVector" : "NETWORK",
  18526. "accessComplexity" : "MEDIUM",
  18527. "authentication" : "NONE",
  18528. "confidentialityImpact" : "NONE",
  18529. "integrityImpact" : "PARTIAL",
  18530. "availabilityImpact" : "NONE",
  18531. "baseScore" : 4.3
  18532. },
  18533. "severity" : "MEDIUM",
  18534. "exploitabilityScore" : 8.6,
  18535. "impactScore" : 2.9,
  18536. "acInsufInfo" : false,
  18537. "obtainAllPrivilege" : false,
  18538. "obtainUserPrivilege" : false,
  18539. "obtainOtherPrivilege" : false,
  18540. "userInteractionRequired" : true
  18541. }
  18542. },
  18543. "publishedDate" : "2021-04-30T21:15Z",
  18544. "lastModifiedDate" : "2021-05-06T13:44Z"
  18545. }, {
  18546. "cve" : {
  18547. "data_type" : "CVE",
  18548. "data_format" : "MITRE",
  18549. "data_version" : "4.0",
  18550. "CVE_data_meta" : {
  18551. "ID" : "CVE-2021-29464",
  18552. "ASSIGNER" : "security-advisories@github.com"
  18553. },
  18554. "problemtype" : {
  18555. "problemtype_data" : [ {
  18556. "description" : [ {
  18557. "lang" : "en",
  18558. "value" : "CWE-787"
  18559. } ]
  18560. } ]
  18561. },
  18562. "references" : {
  18563. "reference_data" : [ {
  18564. "url" : "https://github.com/Exiv2/exiv2/commit/f9308839198aca5e68a65194f151a1de92398f54",
  18565. "name" : "https://github.com/Exiv2/exiv2/commit/f9308839198aca5e68a65194f151a1de92398f54",
  18566. "refsource" : "MISC",
  18567. "tags" : [ "Patch", "Third Party Advisory" ]
  18568. }, {
  18569. "url" : "https://github.com/Exiv2/exiv2/security/advisories/GHSA-jgm9-5fw5-pw9p",
  18570. "name" : "https://github.com/Exiv2/exiv2/security/advisories/GHSA-jgm9-5fw5-pw9p",
  18571. "refsource" : "CONFIRM",
  18572. "tags" : [ "Third Party Advisory" ]
  18573. } ]
  18574. },
  18575. "description" : {
  18576. "description_data" : [ {
  18577. "lang" : "en",
  18578. "value" : "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4."
  18579. } ]
  18580. }
  18581. },
  18582. "configurations" : {
  18583. "CVE_data_version" : "4.0",
  18584. "nodes" : [ {
  18585. "operator" : "OR",
  18586. "children" : [ ],
  18587. "cpe_match" : [ {
  18588. "vulnerable" : true,
  18589. "cpe23Uri" : "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
  18590. "versionEndExcluding" : "0.27.4",
  18591. "cpe_name" : [ ]
  18592. } ]
  18593. } ]
  18594. },
  18595. "impact" : {
  18596. "baseMetricV3" : {
  18597. "cvssV3" : {
  18598. "version" : "3.1",
  18599. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  18600. "attackVector" : "LOCAL",
  18601. "attackComplexity" : "LOW",
  18602. "privilegesRequired" : "NONE",
  18603. "userInteraction" : "REQUIRED",
  18604. "scope" : "UNCHANGED",
  18605. "confidentialityImpact" : "HIGH",
  18606. "integrityImpact" : "HIGH",
  18607. "availabilityImpact" : "HIGH",
  18608. "baseScore" : 7.8,
  18609. "baseSeverity" : "HIGH"
  18610. },
  18611. "exploitabilityScore" : 1.8,
  18612. "impactScore" : 5.9
  18613. },
  18614. "baseMetricV2" : {
  18615. "cvssV2" : {
  18616. "version" : "2.0",
  18617. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  18618. "accessVector" : "NETWORK",
  18619. "accessComplexity" : "MEDIUM",
  18620. "authentication" : "NONE",
  18621. "confidentialityImpact" : "PARTIAL",
  18622. "integrityImpact" : "PARTIAL",
  18623. "availabilityImpact" : "PARTIAL",
  18624. "baseScore" : 6.8
  18625. },
  18626. "severity" : "MEDIUM",
  18627. "exploitabilityScore" : 8.6,
  18628. "impactScore" : 6.4,
  18629. "acInsufInfo" : false,
  18630. "obtainAllPrivilege" : false,
  18631. "obtainUserPrivilege" : false,
  18632. "obtainOtherPrivilege" : false,
  18633. "userInteractionRequired" : true
  18634. }
  18635. },
  18636. "publishedDate" : "2021-04-30T19:15Z",
  18637. "lastModifiedDate" : "2021-05-10T15:31Z"
  18638. }, {
  18639. "cve" : {
  18640. "data_type" : "CVE",
  18641. "data_format" : "MITRE",
  18642. "data_version" : "4.0",
  18643. "CVE_data_meta" : {
  18644. "ID" : "CVE-2021-29463",
  18645. "ASSIGNER" : "security-advisories@github.com"
  18646. },
  18647. "problemtype" : {
  18648. "problemtype_data" : [ {
  18649. "description" : [ {
  18650. "lang" : "en",
  18651. "value" : "CWE-125"
  18652. } ]
  18653. } ]
  18654. },
  18655. "references" : {
  18656. "reference_data" : [ {
  18657. "url" : "https://github.com/Exiv2/exiv2/commit/783b3a6ff15ed6f82a8f8e6c8a6f3b84a9b04d4b",
  18658. "name" : "https://github.com/Exiv2/exiv2/commit/783b3a6ff15ed6f82a8f8e6c8a6f3b84a9b04d4b",
  18659. "refsource" : "MISC",
  18660. "tags" : [ "Patch", "Third Party Advisory" ]
  18661. }, {
  18662. "url" : "https://github.com/Exiv2/exiv2/security/advisories/GHSA-5p8g-9xf3-gfrr",
  18663. "name" : "https://github.com/Exiv2/exiv2/security/advisories/GHSA-5p8g-9xf3-gfrr",
  18664. "refsource" : "CONFIRM",
  18665. "tags" : [ "Third Party Advisory" ]
  18666. } ]
  18667. },
  18668. "description" : {
  18669. "description_data" : [ {
  18670. "lang" : "en",
  18671. "value" : "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4."
  18672. } ]
  18673. }
  18674. },
  18675. "configurations" : {
  18676. "CVE_data_version" : "4.0",
  18677. "nodes" : [ {
  18678. "operator" : "OR",
  18679. "children" : [ ],
  18680. "cpe_match" : [ {
  18681. "vulnerable" : true,
  18682. "cpe23Uri" : "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
  18683. "versionEndExcluding" : "0.27.4",
  18684. "cpe_name" : [ ]
  18685. } ]
  18686. } ]
  18687. },
  18688. "impact" : {
  18689. "baseMetricV3" : {
  18690. "cvssV3" : {
  18691. "version" : "3.1",
  18692. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  18693. "attackVector" : "LOCAL",
  18694. "attackComplexity" : "LOW",
  18695. "privilegesRequired" : "NONE",
  18696. "userInteraction" : "REQUIRED",
  18697. "scope" : "UNCHANGED",
  18698. "confidentialityImpact" : "NONE",
  18699. "integrityImpact" : "NONE",
  18700. "availabilityImpact" : "HIGH",
  18701. "baseScore" : 5.5,
  18702. "baseSeverity" : "MEDIUM"
  18703. },
  18704. "exploitabilityScore" : 1.8,
  18705. "impactScore" : 3.6
  18706. },
  18707. "baseMetricV2" : {
  18708. "cvssV2" : {
  18709. "version" : "2.0",
  18710. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  18711. "accessVector" : "NETWORK",
  18712. "accessComplexity" : "MEDIUM",
  18713. "authentication" : "NONE",
  18714. "confidentialityImpact" : "NONE",
  18715. "integrityImpact" : "NONE",
  18716. "availabilityImpact" : "PARTIAL",
  18717. "baseScore" : 4.3
  18718. },
  18719. "severity" : "MEDIUM",
  18720. "exploitabilityScore" : 8.6,
  18721. "impactScore" : 2.9,
  18722. "acInsufInfo" : false,
  18723. "obtainAllPrivilege" : false,
  18724. "obtainUserPrivilege" : false,
  18725. "obtainOtherPrivilege" : false,
  18726. "userInteractionRequired" : true
  18727. }
  18728. },
  18729. "publishedDate" : "2021-04-30T19:15Z",
  18730. "lastModifiedDate" : "2021-05-10T15:29Z"
  18731. }, {
  18732. "cve" : {
  18733. "data_type" : "CVE",
  18734. "data_format" : "MITRE",
  18735. "data_version" : "4.0",
  18736. "CVE_data_meta" : {
  18737. "ID" : "CVE-2021-21537",
  18738. "ASSIGNER" : "secure@dell.com"
  18739. },
  18740. "problemtype" : {
  18741. "problemtype_data" : [ {
  18742. "description" : [ {
  18743. "lang" : "en",
  18744. "value" : "CWE-200"
  18745. } ]
  18746. } ]
  18747. },
  18748. "references" : {
  18749. "reference_data" : [ {
  18750. "url" : "https://www.dell.com/support/kbdoc/en-us/000184667/dsa-2021-071-dell-hybrid-client-security-update-for-multiple-vulnerabilities",
  18751. "name" : "https://www.dell.com/support/kbdoc/en-us/000184667/dsa-2021-071-dell-hybrid-client-security-update-for-multiple-vulnerabilities",
  18752. "refsource" : "MISC",
  18753. "tags" : [ "Vendor Advisory" ]
  18754. } ]
  18755. },
  18756. "description" : {
  18757. "description_data" : [ {
  18758. "lang" : "en",
  18759. "value" : "Dell Hybrid Client versions prior to 1.5 contain an information exposure vulnerability. A local unauthenticated attacker may exploit this vulnerability in order to view and exfiltrate sensitive information on the system."
  18760. } ]
  18761. }
  18762. },
  18763. "configurations" : {
  18764. "CVE_data_version" : "4.0",
  18765. "nodes" : [ {
  18766. "operator" : "OR",
  18767. "children" : [ ],
  18768. "cpe_match" : [ {
  18769. "vulnerable" : true,
  18770. "cpe23Uri" : "cpe:2.3:a:dell:hybrid_client:*:*:*:*:*:*:*:*",
  18771. "versionEndExcluding" : "1.5",
  18772. "cpe_name" : [ ]
  18773. } ]
  18774. } ]
  18775. },
  18776. "impact" : {
  18777. "baseMetricV3" : {
  18778. "cvssV3" : {
  18779. "version" : "3.1",
  18780. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  18781. "attackVector" : "LOCAL",
  18782. "attackComplexity" : "LOW",
  18783. "privilegesRequired" : "LOW",
  18784. "userInteraction" : "NONE",
  18785. "scope" : "UNCHANGED",
  18786. "confidentialityImpact" : "HIGH",
  18787. "integrityImpact" : "NONE",
  18788. "availabilityImpact" : "NONE",
  18789. "baseScore" : 5.5,
  18790. "baseSeverity" : "MEDIUM"
  18791. },
  18792. "exploitabilityScore" : 1.8,
  18793. "impactScore" : 3.6
  18794. },
  18795. "baseMetricV2" : {
  18796. "cvssV2" : {
  18797. "version" : "2.0",
  18798. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  18799. "accessVector" : "LOCAL",
  18800. "accessComplexity" : "LOW",
  18801. "authentication" : "NONE",
  18802. "confidentialityImpact" : "PARTIAL",
  18803. "integrityImpact" : "NONE",
  18804. "availabilityImpact" : "NONE",
  18805. "baseScore" : 2.1
  18806. },
  18807. "severity" : "LOW",
  18808. "exploitabilityScore" : 3.9,
  18809. "impactScore" : 2.9,
  18810. "acInsufInfo" : false,
  18811. "obtainAllPrivilege" : false,
  18812. "obtainUserPrivilege" : false,
  18813. "obtainOtherPrivilege" : false,
  18814. "userInteractionRequired" : false
  18815. }
  18816. },
  18817. "publishedDate" : "2021-04-30T18:15Z",
  18818. "lastModifiedDate" : "2021-05-06T20:12Z"
  18819. }, {
  18820. "cve" : {
  18821. "data_type" : "CVE",
  18822. "data_format" : "MITRE",
  18823. "data_version" : "4.0",
  18824. "CVE_data_meta" : {
  18825. "ID" : "CVE-2021-21536",
  18826. "ASSIGNER" : "secure@dell.com"
  18827. },
  18828. "problemtype" : {
  18829. "problemtype_data" : [ {
  18830. "description" : [ {
  18831. "lang" : "en",
  18832. "value" : "CWE-200"
  18833. } ]
  18834. } ]
  18835. },
  18836. "references" : {
  18837. "reference_data" : [ {
  18838. "url" : "https://www.dell.com/support/kbdoc/en-us/000184667/dsa-2021-071-dell-hybrid-client-security-update-for-multiple-vulnerabilities",
  18839. "name" : "https://www.dell.com/support/kbdoc/en-us/000184667/dsa-2021-071-dell-hybrid-client-security-update-for-multiple-vulnerabilities",
  18840. "refsource" : "MISC",
  18841. "tags" : [ "Vendor Advisory" ]
  18842. } ]
  18843. },
  18844. "description" : {
  18845. "description_data" : [ {
  18846. "lang" : "en",
  18847. "value" : "Dell Hybrid Client versions prior to 1.5 contain an information exposure vulnerability. A local unauthenticated attacker may exploit this vulnerability in order to register the client to a server in order to view sensitive information."
  18848. } ]
  18849. }
  18850. },
  18851. "configurations" : {
  18852. "CVE_data_version" : "4.0",
  18853. "nodes" : [ {
  18854. "operator" : "OR",
  18855. "children" : [ ],
  18856. "cpe_match" : [ {
  18857. "vulnerable" : true,
  18858. "cpe23Uri" : "cpe:2.3:a:dell:hybrid_client:*:*:*:*:*:*:*:*",
  18859. "versionEndExcluding" : "1.5",
  18860. "cpe_name" : [ ]
  18861. } ]
  18862. } ]
  18863. },
  18864. "impact" : {
  18865. "baseMetricV3" : {
  18866. "cvssV3" : {
  18867. "version" : "3.1",
  18868. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  18869. "attackVector" : "LOCAL",
  18870. "attackComplexity" : "LOW",
  18871. "privilegesRequired" : "LOW",
  18872. "userInteraction" : "NONE",
  18873. "scope" : "UNCHANGED",
  18874. "confidentialityImpact" : "HIGH",
  18875. "integrityImpact" : "NONE",
  18876. "availabilityImpact" : "NONE",
  18877. "baseScore" : 5.5,
  18878. "baseSeverity" : "MEDIUM"
  18879. },
  18880. "exploitabilityScore" : 1.8,
  18881. "impactScore" : 3.6
  18882. },
  18883. "baseMetricV2" : {
  18884. "cvssV2" : {
  18885. "version" : "2.0",
  18886. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  18887. "accessVector" : "LOCAL",
  18888. "accessComplexity" : "LOW",
  18889. "authentication" : "NONE",
  18890. "confidentialityImpact" : "PARTIAL",
  18891. "integrityImpact" : "NONE",
  18892. "availabilityImpact" : "NONE",
  18893. "baseScore" : 2.1
  18894. },
  18895. "severity" : "LOW",
  18896. "exploitabilityScore" : 3.9,
  18897. "impactScore" : 2.9,
  18898. "acInsufInfo" : false,
  18899. "obtainAllPrivilege" : false,
  18900. "obtainUserPrivilege" : false,
  18901. "obtainOtherPrivilege" : false,
  18902. "userInteractionRequired" : false
  18903. }
  18904. },
  18905. "publishedDate" : "2021-04-30T18:15Z",
  18906. "lastModifiedDate" : "2021-05-06T19:41Z"
  18907. }, {
  18908. "cve" : {
  18909. "data_type" : "CVE",
  18910. "data_format" : "MITRE",
  18911. "data_version" : "4.0",
  18912. "CVE_data_meta" : {
  18913. "ID" : "CVE-2021-21535",
  18914. "ASSIGNER" : "secure@dell.com"
  18915. },
  18916. "problemtype" : {
  18917. "problemtype_data" : [ {
  18918. "description" : [ {
  18919. "lang" : "en",
  18920. "value" : "CWE-306"
  18921. } ]
  18922. } ]
  18923. },
  18924. "references" : {
  18925. "reference_data" : [ {
  18926. "url" : "https://www.dell.com/support/kbdoc/en-us/000184667/dsa-2021-071-dell-hybrid-client-security-update-for-multiple-vulnerabilities",
  18927. "name" : "https://www.dell.com/support/kbdoc/en-us/000184667/dsa-2021-071-dell-hybrid-client-security-update-for-multiple-vulnerabilities",
  18928. "refsource" : "MISC",
  18929. "tags" : [ "Vendor Advisory" ]
  18930. } ]
  18931. },
  18932. "description" : {
  18933. "description_data" : [ {
  18934. "lang" : "en",
  18935. "value" : "Dell Hybrid Client versions prior to 1.5 contain a missing authentication for a critical function vulnerability. A local unauthenticated attacker may exploit this vulnerability in order to gain root level access to the system."
  18936. } ]
  18937. }
  18938. },
  18939. "configurations" : {
  18940. "CVE_data_version" : "4.0",
  18941. "nodes" : [ {
  18942. "operator" : "OR",
  18943. "children" : [ ],
  18944. "cpe_match" : [ {
  18945. "vulnerable" : true,
  18946. "cpe23Uri" : "cpe:2.3:a:dell:hybrid_client:*:*:*:*:*:*:*:*",
  18947. "versionEndExcluding" : "1.5",
  18948. "cpe_name" : [ ]
  18949. } ]
  18950. } ]
  18951. },
  18952. "impact" : {
  18953. "baseMetricV3" : {
  18954. "cvssV3" : {
  18955. "version" : "3.1",
  18956. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  18957. "attackVector" : "LOCAL",
  18958. "attackComplexity" : "LOW",
  18959. "privilegesRequired" : "LOW",
  18960. "userInteraction" : "NONE",
  18961. "scope" : "UNCHANGED",
  18962. "confidentialityImpact" : "HIGH",
  18963. "integrityImpact" : "HIGH",
  18964. "availabilityImpact" : "HIGH",
  18965. "baseScore" : 7.8,
  18966. "baseSeverity" : "HIGH"
  18967. },
  18968. "exploitabilityScore" : 1.8,
  18969. "impactScore" : 5.9
  18970. },
  18971. "baseMetricV2" : {
  18972. "cvssV2" : {
  18973. "version" : "2.0",
  18974. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  18975. "accessVector" : "LOCAL",
  18976. "accessComplexity" : "LOW",
  18977. "authentication" : "NONE",
  18978. "confidentialityImpact" : "COMPLETE",
  18979. "integrityImpact" : "COMPLETE",
  18980. "availabilityImpact" : "COMPLETE",
  18981. "baseScore" : 7.2
  18982. },
  18983. "severity" : "HIGH",
  18984. "exploitabilityScore" : 3.9,
  18985. "impactScore" : 10.0,
  18986. "acInsufInfo" : false,
  18987. "obtainAllPrivilege" : false,
  18988. "obtainUserPrivilege" : false,
  18989. "obtainOtherPrivilege" : false,
  18990. "userInteractionRequired" : false
  18991. }
  18992. },
  18993. "publishedDate" : "2021-04-30T18:15Z",
  18994. "lastModifiedDate" : "2021-05-06T19:46Z"
  18995. }, {
  18996. "cve" : {
  18997. "data_type" : "CVE",
  18998. "data_format" : "MITRE",
  18999. "data_version" : "4.0",
  19000. "CVE_data_meta" : {
  19001. "ID" : "CVE-2021-21534",
  19002. "ASSIGNER" : "secure@dell.com"
  19003. },
  19004. "problemtype" : {
  19005. "problemtype_data" : [ {
  19006. "description" : [ {
  19007. "lang" : "en",
  19008. "value" : "CWE-200"
  19009. } ]
  19010. } ]
  19011. },
  19012. "references" : {
  19013. "reference_data" : [ {
  19014. "url" : "https://www.dell.com/support/kbdoc/en-us/000184667/dsa-2021-071-dell-hybrid-client-security-update-for-multiple-vulnerabilities",
  19015. "name" : "https://www.dell.com/support/kbdoc/en-us/000184667/dsa-2021-071-dell-hybrid-client-security-update-for-multiple-vulnerabilities",
  19016. "refsource" : "MISC",
  19017. "tags" : [ "Vendor Advisory" ]
  19018. } ]
  19019. },
  19020. "description" : {
  19021. "description_data" : [ {
  19022. "lang" : "en",
  19023. "value" : "Dell Hybrid Client versions prior to 1.5 contain an information exposure vulnerability. A local unauthenticated attacker may exploit this vulnerability in order to gain access to sensitive information via the local API."
  19024. } ]
  19025. }
  19026. },
  19027. "configurations" : {
  19028. "CVE_data_version" : "4.0",
  19029. "nodes" : [ {
  19030. "operator" : "OR",
  19031. "children" : [ ],
  19032. "cpe_match" : [ {
  19033. "vulnerable" : true,
  19034. "cpe23Uri" : "cpe:2.3:a:dell:hybrid_client:*:*:*:*:*:*:*:*",
  19035. "versionEndExcluding" : "1.5",
  19036. "cpe_name" : [ ]
  19037. } ]
  19038. } ]
  19039. },
  19040. "impact" : {
  19041. "baseMetricV3" : {
  19042. "cvssV3" : {
  19043. "version" : "3.1",
  19044. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
  19045. "attackVector" : "LOCAL",
  19046. "attackComplexity" : "LOW",
  19047. "privilegesRequired" : "LOW",
  19048. "userInteraction" : "NONE",
  19049. "scope" : "UNCHANGED",
  19050. "confidentialityImpact" : "LOW",
  19051. "integrityImpact" : "NONE",
  19052. "availabilityImpact" : "NONE",
  19053. "baseScore" : 3.3,
  19054. "baseSeverity" : "LOW"
  19055. },
  19056. "exploitabilityScore" : 1.8,
  19057. "impactScore" : 1.4
  19058. },
  19059. "baseMetricV2" : {
  19060. "cvssV2" : {
  19061. "version" : "2.0",
  19062. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  19063. "accessVector" : "LOCAL",
  19064. "accessComplexity" : "LOW",
  19065. "authentication" : "NONE",
  19066. "confidentialityImpact" : "PARTIAL",
  19067. "integrityImpact" : "NONE",
  19068. "availabilityImpact" : "NONE",
  19069. "baseScore" : 2.1
  19070. },
  19071. "severity" : "LOW",
  19072. "exploitabilityScore" : 3.9,
  19073. "impactScore" : 2.9,
  19074. "acInsufInfo" : false,
  19075. "obtainAllPrivilege" : false,
  19076. "obtainUserPrivilege" : false,
  19077. "obtainOtherPrivilege" : false,
  19078. "userInteractionRequired" : false
  19079. }
  19080. },
  19081. "publishedDate" : "2021-04-30T18:15Z",
  19082. "lastModifiedDate" : "2021-05-06T19:47Z"
  19083. }, {
  19084. "cve" : {
  19085. "data_type" : "CVE",
  19086. "data_format" : "MITRE",
  19087. "data_version" : "4.0",
  19088. "CVE_data_meta" : {
  19089. "ID" : "CVE-2020-7731",
  19090. "ASSIGNER" : "report@snyk.io"
  19091. },
  19092. "problemtype" : {
  19093. "problemtype_data" : [ {
  19094. "description" : [ {
  19095. "lang" : "en",
  19096. "value" : "CWE-476"
  19097. } ]
  19098. } ]
  19099. },
  19100. "references" : {
  19101. "reference_data" : [ {
  19102. "url" : "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOSAML2-608302",
  19103. "name" : "N/A",
  19104. "refsource" : "CONFIRM",
  19105. "tags" : [ "Third Party Advisory" ]
  19106. }, {
  19107. "url" : "https://github.com/russellhaering/gosaml2/issues/59",
  19108. "name" : "N/A",
  19109. "refsource" : "CONFIRM",
  19110. "tags" : [ "Patch", "Third Party Advisory" ]
  19111. } ]
  19112. },
  19113. "description" : {
  19114. "description_data" : [ {
  19115. "lang" : "en",
  19116. "value" : "This affects all versions of package github.com/russellhaering/gosaml2. There is a crash on nil-pointer dereference caused by sending malformed XML signatures."
  19117. } ]
  19118. }
  19119. },
  19120. "configurations" : {
  19121. "CVE_data_version" : "4.0",
  19122. "nodes" : [ {
  19123. "operator" : "OR",
  19124. "children" : [ ],
  19125. "cpe_match" : [ {
  19126. "vulnerable" : true,
  19127. "cpe23Uri" : "cpe:2.3:a:gosaml2_project:gosaml2:*:*:*:*:*:*:*:*",
  19128. "cpe_name" : [ ]
  19129. } ]
  19130. } ]
  19131. },
  19132. "impact" : {
  19133. "baseMetricV3" : {
  19134. "cvssV3" : {
  19135. "version" : "3.1",
  19136. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  19137. "attackVector" : "NETWORK",
  19138. "attackComplexity" : "LOW",
  19139. "privilegesRequired" : "NONE",
  19140. "userInteraction" : "NONE",
  19141. "scope" : "UNCHANGED",
  19142. "confidentialityImpact" : "NONE",
  19143. "integrityImpact" : "NONE",
  19144. "availabilityImpact" : "HIGH",
  19145. "baseScore" : 7.5,
  19146. "baseSeverity" : "HIGH"
  19147. },
  19148. "exploitabilityScore" : 3.9,
  19149. "impactScore" : 3.6
  19150. },
  19151. "baseMetricV2" : {
  19152. "cvssV2" : {
  19153. "version" : "2.0",
  19154. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  19155. "accessVector" : "NETWORK",
  19156. "accessComplexity" : "LOW",
  19157. "authentication" : "NONE",
  19158. "confidentialityImpact" : "NONE",
  19159. "integrityImpact" : "NONE",
  19160. "availabilityImpact" : "PARTIAL",
  19161. "baseScore" : 5.0
  19162. },
  19163. "severity" : "MEDIUM",
  19164. "exploitabilityScore" : 10.0,
  19165. "impactScore" : 2.9,
  19166. "acInsufInfo" : false,
  19167. "obtainAllPrivilege" : false,
  19168. "obtainUserPrivilege" : false,
  19169. "obtainOtherPrivilege" : false,
  19170. "userInteractionRequired" : false
  19171. }
  19172. },
  19173. "publishedDate" : "2021-04-30T16:15Z",
  19174. "lastModifiedDate" : "2021-05-09T03:58Z"
  19175. }, {
  19176. "cve" : {
  19177. "data_type" : "CVE",
  19178. "data_format" : "MITRE",
  19179. "data_version" : "4.0",
  19180. "CVE_data_meta" : {
  19181. "ID" : "CVE-2020-4039",
  19182. "ASSIGNER" : "security-advisories@github.com"
  19183. },
  19184. "problemtype" : {
  19185. "problemtype_data" : [ {
  19186. "description" : [ {
  19187. "lang" : "en",
  19188. "value" : "CWE-23"
  19189. } ]
  19190. } ]
  19191. },
  19192. "references" : {
  19193. "reference_data" : [ {
  19194. "url" : "https://github.com/fossasia/susi_server/security/advisories/GHSA-wcm4-2jp5-q269",
  19195. "name" : "https://github.com/fossasia/susi_server/security/advisories/GHSA-wcm4-2jp5-q269",
  19196. "refsource" : "CONFIRM",
  19197. "tags" : [ "Patch", "Third Party Advisory" ]
  19198. } ]
  19199. },
  19200. "description" : {
  19201. "description_data" : [ {
  19202. "lang" : "en",
  19203. "value" : "SUSI.AI is an intelligent Open Source personal assistant. SUSI.AI Server before version d27ed0f has a directory traversal vulnerability due to insufficient input validation. Any admin config and file readable by the app can be retrieved by the attacker. Furthermore, some files can also be moved or deleted."
  19204. } ]
  19205. }
  19206. },
  19207. "configurations" : {
  19208. "CVE_data_version" : "4.0",
  19209. "nodes" : [ {
  19210. "operator" : "OR",
  19211. "children" : [ ],
  19212. "cpe_match" : [ {
  19213. "vulnerable" : true,
  19214. "cpe23Uri" : "cpe:2.3:a:fossasia:susi.ai:*:*:*:*:*:*:*:*",
  19215. "versionEndExcluding" : "2020-05-13:",
  19216. "cpe_name" : [ ]
  19217. } ]
  19218. } ]
  19219. },
  19220. "impact" : {
  19221. "baseMetricV3" : {
  19222. "cvssV3" : {
  19223. "version" : "3.1",
  19224. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
  19225. "attackVector" : "NETWORK",
  19226. "attackComplexity" : "LOW",
  19227. "privilegesRequired" : "NONE",
  19228. "userInteraction" : "NONE",
  19229. "scope" : "UNCHANGED",
  19230. "confidentialityImpact" : "HIGH",
  19231. "integrityImpact" : "HIGH",
  19232. "availabilityImpact" : "NONE",
  19233. "baseScore" : 9.1,
  19234. "baseSeverity" : "CRITICAL"
  19235. },
  19236. "exploitabilityScore" : 3.9,
  19237. "impactScore" : 5.2
  19238. },
  19239. "baseMetricV2" : {
  19240. "cvssV2" : {
  19241. "version" : "2.0",
  19242. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:N",
  19243. "accessVector" : "NETWORK",
  19244. "accessComplexity" : "LOW",
  19245. "authentication" : "NONE",
  19246. "confidentialityImpact" : "PARTIAL",
  19247. "integrityImpact" : "PARTIAL",
  19248. "availabilityImpact" : "NONE",
  19249. "baseScore" : 6.4
  19250. },
  19251. "severity" : "MEDIUM",
  19252. "exploitabilityScore" : 10.0,
  19253. "impactScore" : 4.9,
  19254. "acInsufInfo" : false,
  19255. "obtainAllPrivilege" : false,
  19256. "obtainUserPrivilege" : false,
  19257. "obtainOtherPrivilege" : false,
  19258. "userInteractionRequired" : false
  19259. }
  19260. },
  19261. "publishedDate" : "2021-04-30T16:15Z",
  19262. "lastModifiedDate" : "2021-05-10T13:31Z"
  19263. }, {
  19264. "cve" : {
  19265. "data_type" : "CVE",
  19266. "data_format" : "MITRE",
  19267. "data_version" : "4.0",
  19268. "CVE_data_meta" : {
  19269. "ID" : "CVE-2020-15153",
  19270. "ASSIGNER" : "security-advisories@github.com"
  19271. },
  19272. "problemtype" : {
  19273. "problemtype_data" : [ {
  19274. "description" : [ {
  19275. "lang" : "en",
  19276. "value" : "CWE-89"
  19277. } ]
  19278. } ]
  19279. },
  19280. "references" : {
  19281. "reference_data" : [ {
  19282. "url" : "https://github.com/ampache/ampache/releases/tag/4.2.2",
  19283. "name" : "https://github.com/ampache/ampache/releases/tag/4.2.2",
  19284. "refsource" : "MISC",
  19285. "tags" : [ "Release Notes", "Third Party Advisory" ]
  19286. }, {
  19287. "url" : "https://github.com/ampache/ampache/commit/e92cb6154c32c513b9c07e5fdbf5ac7de81ef5ed",
  19288. "name" : "https://github.com/ampache/ampache/commit/e92cb6154c32c513b9c07e5fdbf5ac7de81ef5ed",
  19289. "refsource" : "MISC",
  19290. "tags" : [ "Patch", "Third Party Advisory" ]
  19291. }, {
  19292. "url" : "https://github.com/ampache/ampache/security/advisories/GHSA-phr3-mpx5-7826",
  19293. "name" : "https://github.com/ampache/ampache/security/advisories/GHSA-phr3-mpx5-7826",
  19294. "refsource" : "CONFIRM",
  19295. "tags" : [ "Exploit", "Mitigation", "Third Party Advisory" ]
  19296. } ]
  19297. },
  19298. "description" : {
  19299. "description_data" : [ {
  19300. "lang" : "en",
  19301. "value" : "Ampache before version 4.2.2 allows unauthenticated users to perform SQL injection. Refer to the referenced GitHub Security Advisory for details and a workaround. This is fixed in version 4.2.2 and the development branch."
  19302. } ]
  19303. }
  19304. },
  19305. "configurations" : {
  19306. "CVE_data_version" : "4.0",
  19307. "nodes" : [ {
  19308. "operator" : "OR",
  19309. "children" : [ ],
  19310. "cpe_match" : [ {
  19311. "vulnerable" : true,
  19312. "cpe23Uri" : "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*",
  19313. "versionEndExcluding" : "4.2.2:",
  19314. "cpe_name" : [ ]
  19315. } ]
  19316. } ]
  19317. },
  19318. "impact" : {
  19319. "baseMetricV3" : {
  19320. "cvssV3" : {
  19321. "version" : "3.1",
  19322. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  19323. "attackVector" : "NETWORK",
  19324. "attackComplexity" : "LOW",
  19325. "privilegesRequired" : "NONE",
  19326. "userInteraction" : "NONE",
  19327. "scope" : "UNCHANGED",
  19328. "confidentialityImpact" : "HIGH",
  19329. "integrityImpact" : "HIGH",
  19330. "availabilityImpact" : "HIGH",
  19331. "baseScore" : 9.8,
  19332. "baseSeverity" : "CRITICAL"
  19333. },
  19334. "exploitabilityScore" : 3.9,
  19335. "impactScore" : 5.9
  19336. },
  19337. "baseMetricV2" : {
  19338. "cvssV2" : {
  19339. "version" : "2.0",
  19340. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  19341. "accessVector" : "NETWORK",
  19342. "accessComplexity" : "LOW",
  19343. "authentication" : "NONE",
  19344. "confidentialityImpact" : "PARTIAL",
  19345. "integrityImpact" : "PARTIAL",
  19346. "availabilityImpact" : "PARTIAL",
  19347. "baseScore" : 7.5
  19348. },
  19349. "severity" : "HIGH",
  19350. "exploitabilityScore" : 10.0,
  19351. "impactScore" : 6.4,
  19352. "acInsufInfo" : false,
  19353. "obtainAllPrivilege" : false,
  19354. "obtainUserPrivilege" : false,
  19355. "obtainOtherPrivilege" : false,
  19356. "userInteractionRequired" : false
  19357. }
  19358. },
  19359. "publishedDate" : "2021-04-30T16:15Z",
  19360. "lastModifiedDate" : "2021-05-09T02:29Z"
  19361. }, {
  19362. "cve" : {
  19363. "data_type" : "CVE",
  19364. "data_format" : "MITRE",
  19365. "data_version" : "4.0",
  19366. "CVE_data_meta" : {
  19367. "ID" : "CVE-2020-24918",
  19368. "ASSIGNER" : "cve@mitre.org"
  19369. },
  19370. "problemtype" : {
  19371. "problemtype_data" : [ {
  19372. "description" : [ {
  19373. "lang" : "en",
  19374. "value" : "CWE-120"
  19375. } ]
  19376. } ]
  19377. },
  19378. "references" : {
  19379. "reference_data" : [ {
  19380. "url" : "https://www.ambarella.com",
  19381. "name" : "https://www.ambarella.com",
  19382. "refsource" : "MISC",
  19383. "tags" : [ "Vendor Advisory" ]
  19384. }, {
  19385. "url" : "https://www.somersetrecon.com/blog",
  19386. "name" : "https://www.somersetrecon.com/blog",
  19387. "refsource" : "MISC",
  19388. "tags" : [ "Exploit", "Third Party Advisory" ]
  19389. }, {
  19390. "url" : "https://somersetrecon.squarespace.com/blog/2021/hacking-the-furbo-part-1",
  19391. "name" : "https://somersetrecon.squarespace.com/blog/2021/hacking-the-furbo-part-1",
  19392. "refsource" : "MISC",
  19393. "tags" : [ "Exploit", "Third Party Advisory" ]
  19394. } ]
  19395. },
  19396. "description" : {
  19397. "description_data" : [ {
  19398. "lang" : "en",
  19399. "value" : "A buffer overflow in the RTSP service of the Ambarella Oryx RTSP Server 2020-01-07 allows an unauthenticated attacker to send a crafted RTSP request, with a long digest authentication header, to execute arbitrary code in parse_authentication_header() in libamprotocol-rtsp.so.1 in rtsp_svc (or cause a crash). This allows remote takeover of a Furbo Dog Camera, for example."
  19400. } ]
  19401. }
  19402. },
  19403. "configurations" : {
  19404. "CVE_data_version" : "4.0",
  19405. "nodes" : [ {
  19406. "operator" : "OR",
  19407. "children" : [ ],
  19408. "cpe_match" : [ {
  19409. "vulnerable" : true,
  19410. "cpe23Uri" : "cpe:2.3:a:ambarella:oryx_rtsp_server:2020-01-07:*:*:*:*:*:*:*",
  19411. "cpe_name" : [ ]
  19412. } ]
  19413. } ]
  19414. },
  19415. "impact" : {
  19416. "baseMetricV3" : {
  19417. "cvssV3" : {
  19418. "version" : "3.1",
  19419. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  19420. "attackVector" : "NETWORK",
  19421. "attackComplexity" : "LOW",
  19422. "privilegesRequired" : "NONE",
  19423. "userInteraction" : "NONE",
  19424. "scope" : "UNCHANGED",
  19425. "confidentialityImpact" : "HIGH",
  19426. "integrityImpact" : "HIGH",
  19427. "availabilityImpact" : "HIGH",
  19428. "baseScore" : 9.8,
  19429. "baseSeverity" : "CRITICAL"
  19430. },
  19431. "exploitabilityScore" : 3.9,
  19432. "impactScore" : 5.9
  19433. },
  19434. "baseMetricV2" : {
  19435. "cvssV2" : {
  19436. "version" : "2.0",
  19437. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  19438. "accessVector" : "NETWORK",
  19439. "accessComplexity" : "LOW",
  19440. "authentication" : "NONE",
  19441. "confidentialityImpact" : "COMPLETE",
  19442. "integrityImpact" : "COMPLETE",
  19443. "availabilityImpact" : "COMPLETE",
  19444. "baseScore" : 10.0
  19445. },
  19446. "severity" : "HIGH",
  19447. "exploitabilityScore" : 10.0,
  19448. "impactScore" : 10.0,
  19449. "acInsufInfo" : false,
  19450. "obtainAllPrivilege" : false,
  19451. "obtainUserPrivilege" : false,
  19452. "obtainOtherPrivilege" : false,
  19453. "userInteractionRequired" : false
  19454. }
  19455. },
  19456. "publishedDate" : "2021-04-30T12:15Z",
  19457. "lastModifiedDate" : "2021-05-07T14:15Z"
  19458. }, {
  19459. "cve" : {
  19460. "data_type" : "CVE",
  19461. "data_format" : "MITRE",
  19462. "data_version" : "4.0",
  19463. "CVE_data_meta" : {
  19464. "ID" : "CVE-2021-20326",
  19465. "ASSIGNER" : "cna@mongodb.com"
  19466. },
  19467. "problemtype" : {
  19468. "problemtype_data" : [ {
  19469. "description" : [ {
  19470. "lang" : "en",
  19471. "value" : "CWE-732"
  19472. } ]
  19473. } ]
  19474. },
  19475. "references" : {
  19476. "reference_data" : [ {
  19477. "url" : "https://jira.mongodb.org/browse/SERVER-53929",
  19478. "name" : "N/A",
  19479. "refsource" : "CONFIRM",
  19480. "tags" : [ "Issue Tracking", "Patch", "Vendor Advisory" ]
  19481. } ]
  19482. },
  19483. "description" : {
  19484. "description_data" : [ {
  19485. "lang" : "en",
  19486. "value" : "A user authorized to performing a specific type of find query may trigger a denial of service. This issue affects: MongoDB Inc. MongoDB Server v4.4 versions prior to 4.4.4."
  19487. } ]
  19488. }
  19489. },
  19490. "configurations" : {
  19491. "CVE_data_version" : "4.0",
  19492. "nodes" : [ {
  19493. "operator" : "OR",
  19494. "children" : [ ],
  19495. "cpe_match" : [ {
  19496. "vulnerable" : true,
  19497. "cpe23Uri" : "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
  19498. "versionStartIncluding" : "4.4.0",
  19499. "versionEndExcluding" : "4.4.4",
  19500. "cpe_name" : [ ]
  19501. } ]
  19502. } ]
  19503. },
  19504. "impact" : {
  19505. "baseMetricV3" : {
  19506. "cvssV3" : {
  19507. "version" : "3.1",
  19508. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  19509. "attackVector" : "NETWORK",
  19510. "attackComplexity" : "LOW",
  19511. "privilegesRequired" : "LOW",
  19512. "userInteraction" : "NONE",
  19513. "scope" : "UNCHANGED",
  19514. "confidentialityImpact" : "NONE",
  19515. "integrityImpact" : "NONE",
  19516. "availabilityImpact" : "HIGH",
  19517. "baseScore" : 6.5,
  19518. "baseSeverity" : "MEDIUM"
  19519. },
  19520. "exploitabilityScore" : 2.8,
  19521. "impactScore" : 3.6
  19522. },
  19523. "baseMetricV2" : {
  19524. "cvssV2" : {
  19525. "version" : "2.0",
  19526. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P",
  19527. "accessVector" : "NETWORK",
  19528. "accessComplexity" : "LOW",
  19529. "authentication" : "SINGLE",
  19530. "confidentialityImpact" : "NONE",
  19531. "integrityImpact" : "NONE",
  19532. "availabilityImpact" : "PARTIAL",
  19533. "baseScore" : 4.0
  19534. },
  19535. "severity" : "MEDIUM",
  19536. "exploitabilityScore" : 8.0,
  19537. "impactScore" : 2.9,
  19538. "acInsufInfo" : false,
  19539. "obtainAllPrivilege" : false,
  19540. "obtainUserPrivilege" : false,
  19541. "obtainOtherPrivilege" : false,
  19542. "userInteractionRequired" : false
  19543. }
  19544. },
  19545. "publishedDate" : "2021-04-30T09:15Z",
  19546. "lastModifiedDate" : "2021-05-03T18:10Z"
  19547. }, {
  19548. "cve" : {
  19549. "data_type" : "CVE",
  19550. "data_format" : "MITRE",
  19551. "data_version" : "4.0",
  19552. "CVE_data_meta" : {
  19553. "ID" : "CVE-2021-31872",
  19554. "ASSIGNER" : "cve@mitre.org"
  19555. },
  19556. "problemtype" : {
  19557. "problemtype_data" : [ {
  19558. "description" : [ {
  19559. "lang" : "en",
  19560. "value" : "CWE-190"
  19561. } ]
  19562. } ]
  19563. },
  19564. "references" : {
  19565. "reference_data" : [ {
  19566. "url" : "https://kernel.org/pub/linux/libs/klibc/2.0/",
  19567. "name" : "https://kernel.org/pub/linux/libs/klibc/2.0/",
  19568. "refsource" : "MISC",
  19569. "tags" : [ "Release Notes", "Third Party Advisory" ]
  19570. }, {
  19571. "url" : "https://lists.zytor.com/archives/klibc/2021-April/004593.html",
  19572. "name" : "https://lists.zytor.com/archives/klibc/2021-April/004593.html",
  19573. "refsource" : "MISC",
  19574. "tags" : [ "Mailing List", "Release Notes", "Third Party Advisory" ]
  19575. }, {
  19576. "url" : "https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=9b1c91577aef7f2e72c3aa11a27749160bd278ff",
  19577. "name" : "https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=9b1c91577aef7f2e72c3aa11a27749160bd278ff",
  19578. "refsource" : "MISC",
  19579. "tags" : [ "Patch", "Third Party Advisory" ]
  19580. }, {
  19581. "url" : "http://www.openwall.com/lists/oss-security/2021/04/30/1",
  19582. "name" : "[oss-security] 20210430 [ANNOUNCE] klibc 2.0.9",
  19583. "refsource" : "MLIST",
  19584. "tags" : [ "Mailing List", "Release Notes", "Third Party Advisory" ]
  19585. } ]
  19586. },
  19587. "description" : {
  19588. "description_data" : [ {
  19589. "lang" : "en",
  19590. "value" : "An issue was discovered in klibc before 2.0.9. Multiple possible integer overflows in the cpio command on 32-bit systems may result in a buffer overflow or other security impact."
  19591. } ]
  19592. }
  19593. },
  19594. "configurations" : {
  19595. "CVE_data_version" : "4.0",
  19596. "nodes" : [ {
  19597. "operator" : "OR",
  19598. "children" : [ ],
  19599. "cpe_match" : [ {
  19600. "vulnerable" : true,
  19601. "cpe23Uri" : "cpe:2.3:a:klibc_project:klibc:*:*:*:*:*:x86:*:*",
  19602. "versionEndExcluding" : "2.0.9:",
  19603. "cpe_name" : [ ]
  19604. } ]
  19605. } ]
  19606. },
  19607. "impact" : {
  19608. "baseMetricV3" : {
  19609. "cvssV3" : {
  19610. "version" : "3.1",
  19611. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  19612. "attackVector" : "NETWORK",
  19613. "attackComplexity" : "LOW",
  19614. "privilegesRequired" : "NONE",
  19615. "userInteraction" : "NONE",
  19616. "scope" : "UNCHANGED",
  19617. "confidentialityImpact" : "HIGH",
  19618. "integrityImpact" : "HIGH",
  19619. "availabilityImpact" : "HIGH",
  19620. "baseScore" : 9.8,
  19621. "baseSeverity" : "CRITICAL"
  19622. },
  19623. "exploitabilityScore" : 3.9,
  19624. "impactScore" : 5.9
  19625. },
  19626. "baseMetricV2" : {
  19627. "cvssV2" : {
  19628. "version" : "2.0",
  19629. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  19630. "accessVector" : "NETWORK",
  19631. "accessComplexity" : "LOW",
  19632. "authentication" : "NONE",
  19633. "confidentialityImpact" : "PARTIAL",
  19634. "integrityImpact" : "PARTIAL",
  19635. "availabilityImpact" : "PARTIAL",
  19636. "baseScore" : 7.5
  19637. },
  19638. "severity" : "HIGH",
  19639. "exploitabilityScore" : 10.0,
  19640. "impactScore" : 6.4,
  19641. "acInsufInfo" : false,
  19642. "obtainAllPrivilege" : false,
  19643. "obtainUserPrivilege" : false,
  19644. "obtainOtherPrivilege" : false,
  19645. "userInteractionRequired" : false
  19646. }
  19647. },
  19648. "publishedDate" : "2021-04-30T06:15Z",
  19649. "lastModifiedDate" : "2021-05-07T19:54Z"
  19650. }, {
  19651. "cve" : {
  19652. "data_type" : "CVE",
  19653. "data_format" : "MITRE",
  19654. "data_version" : "4.0",
  19655. "CVE_data_meta" : {
  19656. "ID" : "CVE-2021-31871",
  19657. "ASSIGNER" : "cve@mitre.org"
  19658. },
  19659. "problemtype" : {
  19660. "problemtype_data" : [ {
  19661. "description" : [ {
  19662. "lang" : "en",
  19663. "value" : "CWE-190"
  19664. } ]
  19665. } ]
  19666. },
  19667. "references" : {
  19668. "reference_data" : [ {
  19669. "url" : "https://kernel.org/pub/linux/libs/klibc/2.0/",
  19670. "name" : "https://kernel.org/pub/linux/libs/klibc/2.0/",
  19671. "refsource" : "MISC",
  19672. "tags" : [ "Release Notes", "Third Party Advisory" ]
  19673. }, {
  19674. "url" : "https://lists.zytor.com/archives/klibc/2021-April/004593.html",
  19675. "name" : "https://lists.zytor.com/archives/klibc/2021-April/004593.html",
  19676. "refsource" : "MISC",
  19677. "tags" : [ "Mailing List", "Release Notes", "Third Party Advisory" ]
  19678. }, {
  19679. "url" : "https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=2e48a12ab1e30d43498c2d53e878a11a1b5102d5",
  19680. "name" : "https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=2e48a12ab1e30d43498c2d53e878a11a1b5102d5",
  19681. "refsource" : "MISC",
  19682. "tags" : [ "Patch", "Third Party Advisory" ]
  19683. }, {
  19684. "url" : "http://www.openwall.com/lists/oss-security/2021/04/30/1",
  19685. "name" : "[oss-security] 20210430 [ANNOUNCE] klibc 2.0.9",
  19686. "refsource" : "MLIST",
  19687. "tags" : [ "Mailing List", "Release Notes", "Third Party Advisory" ]
  19688. } ]
  19689. },
  19690. "description" : {
  19691. "description_data" : [ {
  19692. "lang" : "en",
  19693. "value" : "An issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems."
  19694. } ]
  19695. }
  19696. },
  19697. "configurations" : {
  19698. "CVE_data_version" : "4.0",
  19699. "nodes" : [ {
  19700. "operator" : "OR",
  19701. "children" : [ ],
  19702. "cpe_match" : [ {
  19703. "vulnerable" : true,
  19704. "cpe23Uri" : "cpe:2.3:a:klibc_project:klibc:*:*:*:*:*:*:x64:*",
  19705. "versionEndExcluding" : "2.0.9:",
  19706. "cpe_name" : [ ]
  19707. } ]
  19708. } ]
  19709. },
  19710. "impact" : {
  19711. "baseMetricV3" : {
  19712. "cvssV3" : {
  19713. "version" : "3.1",
  19714. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  19715. "attackVector" : "NETWORK",
  19716. "attackComplexity" : "LOW",
  19717. "privilegesRequired" : "NONE",
  19718. "userInteraction" : "NONE",
  19719. "scope" : "UNCHANGED",
  19720. "confidentialityImpact" : "NONE",
  19721. "integrityImpact" : "NONE",
  19722. "availabilityImpact" : "HIGH",
  19723. "baseScore" : 7.5,
  19724. "baseSeverity" : "HIGH"
  19725. },
  19726. "exploitabilityScore" : 3.9,
  19727. "impactScore" : 3.6
  19728. },
  19729. "baseMetricV2" : {
  19730. "cvssV2" : {
  19731. "version" : "2.0",
  19732. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  19733. "accessVector" : "NETWORK",
  19734. "accessComplexity" : "LOW",
  19735. "authentication" : "NONE",
  19736. "confidentialityImpact" : "NONE",
  19737. "integrityImpact" : "NONE",
  19738. "availabilityImpact" : "PARTIAL",
  19739. "baseScore" : 5.0
  19740. },
  19741. "severity" : "MEDIUM",
  19742. "exploitabilityScore" : 10.0,
  19743. "impactScore" : 2.9,
  19744. "acInsufInfo" : false,
  19745. "obtainAllPrivilege" : false,
  19746. "obtainUserPrivilege" : false,
  19747. "obtainOtherPrivilege" : false,
  19748. "userInteractionRequired" : false
  19749. }
  19750. },
  19751. "publishedDate" : "2021-04-30T06:15Z",
  19752. "lastModifiedDate" : "2021-05-07T20:16Z"
  19753. }, {
  19754. "cve" : {
  19755. "data_type" : "CVE",
  19756. "data_format" : "MITRE",
  19757. "data_version" : "4.0",
  19758. "CVE_data_meta" : {
  19759. "ID" : "CVE-2021-31870",
  19760. "ASSIGNER" : "cve@mitre.org"
  19761. },
  19762. "problemtype" : {
  19763. "problemtype_data" : [ {
  19764. "description" : [ {
  19765. "lang" : "en",
  19766. "value" : "CWE-190"
  19767. } ]
  19768. } ]
  19769. },
  19770. "references" : {
  19771. "reference_data" : [ {
  19772. "url" : "https://kernel.org/pub/linux/libs/klibc/2.0/",
  19773. "name" : "https://kernel.org/pub/linux/libs/klibc/2.0/",
  19774. "refsource" : "MISC",
  19775. "tags" : [ "Release Notes", "Third Party Advisory" ]
  19776. }, {
  19777. "url" : "https://lists.zytor.com/archives/klibc/2021-April/004593.html",
  19778. "name" : "https://lists.zytor.com/archives/klibc/2021-April/004593.html",
  19779. "refsource" : "MISC",
  19780. "tags" : [ "Mailing List", "Release Notes", "Third Party Advisory" ]
  19781. }, {
  19782. "url" : "https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=292650f04c2b5348b4efbad61fb014ed09b4f3f2",
  19783. "name" : "https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=292650f04c2b5348b4efbad61fb014ed09b4f3f2",
  19784. "refsource" : "MISC",
  19785. "tags" : [ "Patch", "Third Party Advisory" ]
  19786. }, {
  19787. "url" : "http://www.openwall.com/lists/oss-security/2021/04/30/1",
  19788. "name" : "[oss-security] 20210430 [ANNOUNCE] klibc 2.0.9",
  19789. "refsource" : "MLIST",
  19790. "tags" : [ "Mailing List", "Release Notes", "Third Party Advisory" ]
  19791. } ]
  19792. },
  19793. "description" : {
  19794. "description_data" : [ {
  19795. "lang" : "en",
  19796. "value" : "An issue was discovered in klibc before 2.0.9. Multiplication in the calloc() function may result in an integer overflow and a subsequent heap buffer overflow."
  19797. } ]
  19798. }
  19799. },
  19800. "configurations" : {
  19801. "CVE_data_version" : "4.0",
  19802. "nodes" : [ {
  19803. "operator" : "OR",
  19804. "children" : [ ],
  19805. "cpe_match" : [ {
  19806. "vulnerable" : true,
  19807. "cpe23Uri" : "cpe:2.3:a:klibc_project:klibc:*:*:*:*:*:*:*:*",
  19808. "versionEndExcluding" : "2.0.9:",
  19809. "cpe_name" : [ ]
  19810. } ]
  19811. } ]
  19812. },
  19813. "impact" : {
  19814. "baseMetricV3" : {
  19815. "cvssV3" : {
  19816. "version" : "3.1",
  19817. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  19818. "attackVector" : "NETWORK",
  19819. "attackComplexity" : "LOW",
  19820. "privilegesRequired" : "NONE",
  19821. "userInteraction" : "NONE",
  19822. "scope" : "UNCHANGED",
  19823. "confidentialityImpact" : "HIGH",
  19824. "integrityImpact" : "HIGH",
  19825. "availabilityImpact" : "HIGH",
  19826. "baseScore" : 9.8,
  19827. "baseSeverity" : "CRITICAL"
  19828. },
  19829. "exploitabilityScore" : 3.9,
  19830. "impactScore" : 5.9
  19831. },
  19832. "baseMetricV2" : {
  19833. "cvssV2" : {
  19834. "version" : "2.0",
  19835. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  19836. "accessVector" : "NETWORK",
  19837. "accessComplexity" : "LOW",
  19838. "authentication" : "NONE",
  19839. "confidentialityImpact" : "PARTIAL",
  19840. "integrityImpact" : "PARTIAL",
  19841. "availabilityImpact" : "PARTIAL",
  19842. "baseScore" : 7.5
  19843. },
  19844. "severity" : "HIGH",
  19845. "exploitabilityScore" : 10.0,
  19846. "impactScore" : 6.4,
  19847. "acInsufInfo" : false,
  19848. "obtainAllPrivilege" : false,
  19849. "obtainUserPrivilege" : false,
  19850. "obtainOtherPrivilege" : false,
  19851. "userInteractionRequired" : false
  19852. }
  19853. },
  19854. "publishedDate" : "2021-04-30T06:15Z",
  19855. "lastModifiedDate" : "2021-05-07T19:54Z"
  19856. }, {
  19857. "cve" : {
  19858. "data_type" : "CVE",
  19859. "data_format" : "MITRE",
  19860. "data_version" : "4.0",
  19861. "CVE_data_meta" : {
  19862. "ID" : "CVE-2021-31919",
  19863. "ASSIGNER" : "cve@mitre.org"
  19864. },
  19865. "problemtype" : {
  19866. "problemtype_data" : [ {
  19867. "description" : [ {
  19868. "lang" : "en",
  19869. "value" : "CWE-772"
  19870. } ]
  19871. } ]
  19872. },
  19873. "references" : {
  19874. "reference_data" : [ {
  19875. "url" : "https://rustsec.org/advisories/RUSTSEC-2021-0054.html",
  19876. "name" : "https://rustsec.org/advisories/RUSTSEC-2021-0054.html",
  19877. "refsource" : "MISC",
  19878. "tags" : [ "Third Party Advisory" ]
  19879. } ]
  19880. },
  19881. "description" : {
  19882. "description_data" : [ {
  19883. "lang" : "en",
  19884. "value" : "An issue was discovered in the rkyv crate before 0.6.0 for Rust. When an archive is created via serialization, the archive content may contain uninitialized values of certain parts of a struct."
  19885. } ]
  19886. }
  19887. },
  19888. "configurations" : {
  19889. "CVE_data_version" : "4.0",
  19890. "nodes" : [ {
  19891. "operator" : "OR",
  19892. "children" : [ ],
  19893. "cpe_match" : [ {
  19894. "vulnerable" : true,
  19895. "cpe23Uri" : "cpe:2.3:a:rkyv_project:rkyv:*:*:*:*:*:rust:*:*",
  19896. "versionEndExcluding" : "0.6.0:",
  19897. "cpe_name" : [ ]
  19898. } ]
  19899. } ]
  19900. },
  19901. "impact" : {
  19902. "baseMetricV3" : {
  19903. "cvssV3" : {
  19904. "version" : "3.1",
  19905. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  19906. "attackVector" : "NETWORK",
  19907. "attackComplexity" : "LOW",
  19908. "privilegesRequired" : "NONE",
  19909. "userInteraction" : "NONE",
  19910. "scope" : "UNCHANGED",
  19911. "confidentialityImpact" : "HIGH",
  19912. "integrityImpact" : "NONE",
  19913. "availabilityImpact" : "NONE",
  19914. "baseScore" : 7.5,
  19915. "baseSeverity" : "HIGH"
  19916. },
  19917. "exploitabilityScore" : 3.9,
  19918. "impactScore" : 3.6
  19919. },
  19920. "baseMetricV2" : {
  19921. "cvssV2" : {
  19922. "version" : "2.0",
  19923. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  19924. "accessVector" : "NETWORK",
  19925. "accessComplexity" : "LOW",
  19926. "authentication" : "NONE",
  19927. "confidentialityImpact" : "PARTIAL",
  19928. "integrityImpact" : "NONE",
  19929. "availabilityImpact" : "NONE",
  19930. "baseScore" : 5.0
  19931. },
  19932. "severity" : "MEDIUM",
  19933. "exploitabilityScore" : 10.0,
  19934. "impactScore" : 2.9,
  19935. "acInsufInfo" : false,
  19936. "obtainAllPrivilege" : false,
  19937. "obtainUserPrivilege" : false,
  19938. "obtainOtherPrivilege" : false,
  19939. "userInteractionRequired" : false
  19940. }
  19941. },
  19942. "publishedDate" : "2021-04-30T03:15Z",
  19943. "lastModifiedDate" : "2021-05-09T03:39Z"
  19944. }, {
  19945. "cve" : {
  19946. "data_type" : "CVE",
  19947. "data_format" : "MITRE",
  19948. "data_version" : "4.0",
  19949. "CVE_data_meta" : {
  19950. "ID" : "CVE-2020-18070",
  19951. "ASSIGNER" : "cve@mitre.org"
  19952. },
  19953. "problemtype" : {
  19954. "problemtype_data" : [ {
  19955. "description" : [ {
  19956. "lang" : "en",
  19957. "value" : "CWE-22"
  19958. } ]
  19959. } ]
  19960. },
  19961. "references" : {
  19962. "reference_data" : [ {
  19963. "url" : "https://github.com/idreamsoft/iCMS/issues/46",
  19964. "name" : "https://github.com/idreamsoft/iCMS/issues/46",
  19965. "refsource" : "MISC",
  19966. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  19967. } ]
  19968. },
  19969. "description" : {
  19970. "description_data" : [ {
  19971. "lang" : "en",
  19972. "value" : "Path Traversal in iCMS v7.0.13 allows remote attackers to delete folders by injecting commands into a crafted HTTP request to the \"do_del()\" method of the component \"database.admincp.php\"."
  19973. } ]
  19974. }
  19975. },
  19976. "configurations" : {
  19977. "CVE_data_version" : "4.0",
  19978. "nodes" : [ {
  19979. "operator" : "OR",
  19980. "children" : [ ],
  19981. "cpe_match" : [ {
  19982. "vulnerable" : true,
  19983. "cpe23Uri" : "cpe:2.3:a:idreamsoft:icms:7.0.13:*:*:*:*:*:*:*",
  19984. "cpe_name" : [ ]
  19985. } ]
  19986. } ]
  19987. },
  19988. "impact" : {
  19989. "baseMetricV3" : {
  19990. "cvssV3" : {
  19991. "version" : "3.1",
  19992. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
  19993. "attackVector" : "NETWORK",
  19994. "attackComplexity" : "LOW",
  19995. "privilegesRequired" : "NONE",
  19996. "userInteraction" : "NONE",
  19997. "scope" : "UNCHANGED",
  19998. "confidentialityImpact" : "NONE",
  19999. "integrityImpact" : "HIGH",
  20000. "availabilityImpact" : "HIGH",
  20001. "baseScore" : 9.1,
  20002. "baseSeverity" : "CRITICAL"
  20003. },
  20004. "exploitabilityScore" : 3.9,
  20005. "impactScore" : 5.2
  20006. },
  20007. "baseMetricV2" : {
  20008. "cvssV2" : {
  20009. "version" : "2.0",
  20010. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:P",
  20011. "accessVector" : "NETWORK",
  20012. "accessComplexity" : "LOW",
  20013. "authentication" : "NONE",
  20014. "confidentialityImpact" : "NONE",
  20015. "integrityImpact" : "PARTIAL",
  20016. "availabilityImpact" : "PARTIAL",
  20017. "baseScore" : 6.4
  20018. },
  20019. "severity" : "MEDIUM",
  20020. "exploitabilityScore" : 10.0,
  20021. "impactScore" : 4.9,
  20022. "acInsufInfo" : false,
  20023. "obtainAllPrivilege" : false,
  20024. "obtainUserPrivilege" : false,
  20025. "obtainOtherPrivilege" : false,
  20026. "userInteractionRequired" : false
  20027. }
  20028. },
  20029. "publishedDate" : "2021-04-30T00:15Z",
  20030. "lastModifiedDate" : "2021-05-03T18:41Z"
  20031. }, {
  20032. "cve" : {
  20033. "data_type" : "CVE",
  20034. "data_format" : "MITRE",
  20035. "data_version" : "4.0",
  20036. "CVE_data_meta" : {
  20037. "ID" : "CVE-2020-18035",
  20038. "ASSIGNER" : "cve@mitre.org"
  20039. },
  20040. "problemtype" : {
  20041. "problemtype_data" : [ {
  20042. "description" : [ {
  20043. "lang" : "en",
  20044. "value" : "CWE-79"
  20045. } ]
  20046. } ]
  20047. },
  20048. "references" : {
  20049. "reference_data" : [ {
  20050. "url" : "https://github.com/zchuanzhao/jeesns/issues/8",
  20051. "name" : "https://github.com/zchuanzhao/jeesns/issues/8",
  20052. "refsource" : "MISC",
  20053. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  20054. } ]
  20055. },
  20056. "description" : {
  20057. "description_data" : [ {
  20058. "lang" : "en",
  20059. "value" : "Cross Site Scripting (XSS) in Jeesns v1.4.2 allows remote attackers to execute arbitrary code by injecting commands into the \"CKEditorFuncNum\" parameter in the component \"CkeditorUploadController.java\"."
  20060. } ]
  20061. }
  20062. },
  20063. "configurations" : {
  20064. "CVE_data_version" : "4.0",
  20065. "nodes" : [ {
  20066. "operator" : "OR",
  20067. "children" : [ ],
  20068. "cpe_match" : [ {
  20069. "vulnerable" : true,
  20070. "cpe23Uri" : "cpe:2.3:a:jeesns:jeesns:1.4.2:*:*:*:*:*:*:*",
  20071. "cpe_name" : [ ]
  20072. } ]
  20073. } ]
  20074. },
  20075. "impact" : {
  20076. "baseMetricV3" : {
  20077. "cvssV3" : {
  20078. "version" : "3.1",
  20079. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  20080. "attackVector" : "NETWORK",
  20081. "attackComplexity" : "LOW",
  20082. "privilegesRequired" : "NONE",
  20083. "userInteraction" : "REQUIRED",
  20084. "scope" : "CHANGED",
  20085. "confidentialityImpact" : "LOW",
  20086. "integrityImpact" : "LOW",
  20087. "availabilityImpact" : "NONE",
  20088. "baseScore" : 6.1,
  20089. "baseSeverity" : "MEDIUM"
  20090. },
  20091. "exploitabilityScore" : 2.8,
  20092. "impactScore" : 2.7
  20093. },
  20094. "baseMetricV2" : {
  20095. "cvssV2" : {
  20096. "version" : "2.0",
  20097. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  20098. "accessVector" : "NETWORK",
  20099. "accessComplexity" : "MEDIUM",
  20100. "authentication" : "NONE",
  20101. "confidentialityImpact" : "NONE",
  20102. "integrityImpact" : "PARTIAL",
  20103. "availabilityImpact" : "NONE",
  20104. "baseScore" : 4.3
  20105. },
  20106. "severity" : "MEDIUM",
  20107. "exploitabilityScore" : 8.6,
  20108. "impactScore" : 2.9,
  20109. "acInsufInfo" : false,
  20110. "obtainAllPrivilege" : false,
  20111. "obtainUserPrivilege" : false,
  20112. "obtainOtherPrivilege" : false,
  20113. "userInteractionRequired" : true
  20114. }
  20115. },
  20116. "publishedDate" : "2021-04-29T23:15Z",
  20117. "lastModifiedDate" : "2021-05-03T18:13Z"
  20118. }, {
  20119. "cve" : {
  20120. "data_type" : "CVE",
  20121. "data_format" : "MITRE",
  20122. "data_version" : "4.0",
  20123. "CVE_data_meta" : {
  20124. "ID" : "CVE-2021-1087",
  20125. "ASSIGNER" : "psirt@nvidia.com"
  20126. },
  20127. "problemtype" : {
  20128. "problemtype_data" : [ {
  20129. "description" : [ {
  20130. "lang" : "en",
  20131. "value" : "CWE-200"
  20132. } ]
  20133. } ]
  20134. },
  20135. "references" : {
  20136. "reference_data" : [ {
  20137. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20138. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20139. "refsource" : "CONFIRM",
  20140. "tags" : [ "Vendor Advisory" ]
  20141. } ]
  20142. },
  20143. "description" : {
  20144. "description_data" : [ {
  20145. "lang" : "en",
  20146. "value" : "NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin), which could allow an attacker to retrieve information that could lead to a Address Space Layout Randomization (ASLR) bypass. This affects vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior to 8.7)."
  20147. } ]
  20148. }
  20149. },
  20150. "configurations" : {
  20151. "CVE_data_version" : "4.0",
  20152. "nodes" : [ {
  20153. "operator" : "AND",
  20154. "children" : [ {
  20155. "operator" : "OR",
  20156. "children" : [ ],
  20157. "cpe_match" : [ {
  20158. "vulnerable" : true,
  20159. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20160. "versionStartIncluding" : "8.0:",
  20161. "versionEndExcluding" : "8.7:",
  20162. "cpe_name" : [ ]
  20163. } ]
  20164. }, {
  20165. "operator" : "OR",
  20166. "children" : [ ],
  20167. "cpe_match" : [ {
  20168. "vulnerable" : false,
  20169. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  20170. "cpe_name" : [ ]
  20171. }, {
  20172. "vulnerable" : false,
  20173. "cpe23Uri" : "cpe:2.3:o:nutanix:ahv:-:*:*:*:*:*:*:*",
  20174. "cpe_name" : [ ]
  20175. }, {
  20176. "vulnerable" : false,
  20177. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  20178. "cpe_name" : [ ]
  20179. }, {
  20180. "vulnerable" : false,
  20181. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  20182. "cpe_name" : [ ]
  20183. } ]
  20184. } ],
  20185. "cpe_match" : [ ]
  20186. }, {
  20187. "operator" : "AND",
  20188. "children" : [ {
  20189. "operator" : "OR",
  20190. "children" : [ ],
  20191. "cpe_match" : [ {
  20192. "vulnerable" : true,
  20193. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20194. "versionStartIncluding" : "11.0:",
  20195. "versionEndExcluding" : "11.4:",
  20196. "cpe_name" : [ ]
  20197. }, {
  20198. "vulnerable" : true,
  20199. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20200. "versionStartIncluding" : "12.0:",
  20201. "versionEndExcluding" : "12.2:",
  20202. "cpe_name" : [ ]
  20203. } ]
  20204. }, {
  20205. "operator" : "OR",
  20206. "children" : [ ],
  20207. "cpe_match" : [ {
  20208. "vulnerable" : false,
  20209. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  20210. "cpe_name" : [ ]
  20211. }, {
  20212. "vulnerable" : false,
  20213. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  20214. "cpe_name" : [ ]
  20215. }, {
  20216. "vulnerable" : false,
  20217. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  20218. "cpe_name" : [ ]
  20219. } ]
  20220. } ],
  20221. "cpe_match" : [ ]
  20222. } ]
  20223. },
  20224. "impact" : {
  20225. "baseMetricV3" : {
  20226. "cvssV3" : {
  20227. "version" : "3.1",
  20228. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  20229. "attackVector" : "LOCAL",
  20230. "attackComplexity" : "LOW",
  20231. "privilegesRequired" : "LOW",
  20232. "userInteraction" : "NONE",
  20233. "scope" : "UNCHANGED",
  20234. "confidentialityImpact" : "HIGH",
  20235. "integrityImpact" : "NONE",
  20236. "availabilityImpact" : "NONE",
  20237. "baseScore" : 5.5,
  20238. "baseSeverity" : "MEDIUM"
  20239. },
  20240. "exploitabilityScore" : 1.8,
  20241. "impactScore" : 3.6
  20242. },
  20243. "baseMetricV2" : {
  20244. "cvssV2" : {
  20245. "version" : "2.0",
  20246. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  20247. "accessVector" : "LOCAL",
  20248. "accessComplexity" : "LOW",
  20249. "authentication" : "NONE",
  20250. "confidentialityImpact" : "PARTIAL",
  20251. "integrityImpact" : "NONE",
  20252. "availabilityImpact" : "NONE",
  20253. "baseScore" : 2.1
  20254. },
  20255. "severity" : "LOW",
  20256. "exploitabilityScore" : 3.9,
  20257. "impactScore" : 2.9,
  20258. "acInsufInfo" : false,
  20259. "obtainAllPrivilege" : false,
  20260. "obtainUserPrivilege" : false,
  20261. "obtainOtherPrivilege" : false,
  20262. "userInteractionRequired" : false
  20263. }
  20264. },
  20265. "publishedDate" : "2021-04-29T19:15Z",
  20266. "lastModifiedDate" : "2021-05-07T20:37Z"
  20267. }, {
  20268. "cve" : {
  20269. "data_type" : "CVE",
  20270. "data_format" : "MITRE",
  20271. "data_version" : "4.0",
  20272. "CVE_data_meta" : {
  20273. "ID" : "CVE-2021-1086",
  20274. "ASSIGNER" : "psirt@nvidia.com"
  20275. },
  20276. "problemtype" : {
  20277. "problemtype_data" : [ {
  20278. "description" : [ {
  20279. "lang" : "en",
  20280. "value" : "CWE-863"
  20281. } ]
  20282. } ]
  20283. },
  20284. "references" : {
  20285. "reference_data" : [ {
  20286. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20287. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20288. "refsource" : "CONFIRM",
  20289. "tags" : [ "Vendor Advisory" ]
  20290. } ]
  20291. },
  20292. "description" : {
  20293. "description_data" : [ {
  20294. "lang" : "en",
  20295. "value" : "NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin) where it allows guests to control unauthorized resources, which may lead to integrity and confidentiality loss or information disclosure. This affects vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior to 8.7)."
  20296. } ]
  20297. }
  20298. },
  20299. "configurations" : {
  20300. "CVE_data_version" : "4.0",
  20301. "nodes" : [ {
  20302. "operator" : "AND",
  20303. "children" : [ {
  20304. "operator" : "OR",
  20305. "children" : [ ],
  20306. "cpe_match" : [ {
  20307. "vulnerable" : true,
  20308. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20309. "versionStartIncluding" : "8.0:",
  20310. "versionEndExcluding" : "8.7:",
  20311. "cpe_name" : [ ]
  20312. } ]
  20313. }, {
  20314. "operator" : "OR",
  20315. "children" : [ ],
  20316. "cpe_match" : [ {
  20317. "vulnerable" : false,
  20318. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  20319. "cpe_name" : [ ]
  20320. }, {
  20321. "vulnerable" : false,
  20322. "cpe23Uri" : "cpe:2.3:o:nutanix:ahv:-:*:*:*:*:*:*:*",
  20323. "cpe_name" : [ ]
  20324. }, {
  20325. "vulnerable" : false,
  20326. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  20327. "cpe_name" : [ ]
  20328. }, {
  20329. "vulnerable" : false,
  20330. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  20331. "cpe_name" : [ ]
  20332. } ]
  20333. } ],
  20334. "cpe_match" : [ ]
  20335. }, {
  20336. "operator" : "AND",
  20337. "children" : [ {
  20338. "operator" : "OR",
  20339. "children" : [ ],
  20340. "cpe_match" : [ {
  20341. "vulnerable" : true,
  20342. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20343. "versionStartIncluding" : "11.0:",
  20344. "versionEndExcluding" : "11.4:",
  20345. "cpe_name" : [ ]
  20346. }, {
  20347. "vulnerable" : true,
  20348. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20349. "versionStartIncluding" : "12.0:",
  20350. "versionEndExcluding" : "12.2:",
  20351. "cpe_name" : [ ]
  20352. } ]
  20353. }, {
  20354. "operator" : "OR",
  20355. "children" : [ ],
  20356. "cpe_match" : [ {
  20357. "vulnerable" : false,
  20358. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  20359. "cpe_name" : [ ]
  20360. }, {
  20361. "vulnerable" : false,
  20362. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  20363. "cpe_name" : [ ]
  20364. }, {
  20365. "vulnerable" : false,
  20366. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  20367. "cpe_name" : [ ]
  20368. } ]
  20369. } ],
  20370. "cpe_match" : [ ]
  20371. } ]
  20372. },
  20373. "impact" : {
  20374. "baseMetricV3" : {
  20375. "cvssV3" : {
  20376. "version" : "3.1",
  20377. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
  20378. "attackVector" : "LOCAL",
  20379. "attackComplexity" : "LOW",
  20380. "privilegesRequired" : "LOW",
  20381. "userInteraction" : "NONE",
  20382. "scope" : "UNCHANGED",
  20383. "confidentialityImpact" : "HIGH",
  20384. "integrityImpact" : "HIGH",
  20385. "availabilityImpact" : "NONE",
  20386. "baseScore" : 7.1,
  20387. "baseSeverity" : "HIGH"
  20388. },
  20389. "exploitabilityScore" : 1.8,
  20390. "impactScore" : 5.2
  20391. },
  20392. "baseMetricV2" : {
  20393. "cvssV2" : {
  20394. "version" : "2.0",
  20395. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:N",
  20396. "accessVector" : "LOCAL",
  20397. "accessComplexity" : "LOW",
  20398. "authentication" : "NONE",
  20399. "confidentialityImpact" : "PARTIAL",
  20400. "integrityImpact" : "PARTIAL",
  20401. "availabilityImpact" : "NONE",
  20402. "baseScore" : 3.6
  20403. },
  20404. "severity" : "LOW",
  20405. "exploitabilityScore" : 3.9,
  20406. "impactScore" : 4.9,
  20407. "acInsufInfo" : false,
  20408. "obtainAllPrivilege" : false,
  20409. "obtainUserPrivilege" : false,
  20410. "obtainOtherPrivilege" : false,
  20411. "userInteractionRequired" : false
  20412. }
  20413. },
  20414. "publishedDate" : "2021-04-29T19:15Z",
  20415. "lastModifiedDate" : "2021-05-07T20:04Z"
  20416. }, {
  20417. "cve" : {
  20418. "data_type" : "CVE",
  20419. "data_format" : "MITRE",
  20420. "data_version" : "4.0",
  20421. "CVE_data_meta" : {
  20422. "ID" : "CVE-2021-1085",
  20423. "ASSIGNER" : "psirt@nvidia.com"
  20424. },
  20425. "problemtype" : {
  20426. "problemtype_data" : [ {
  20427. "description" : [ {
  20428. "lang" : "en",
  20429. "value" : "CWE-20"
  20430. } ]
  20431. } ]
  20432. },
  20433. "references" : {
  20434. "reference_data" : [ {
  20435. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20436. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20437. "refsource" : "CONFIRM",
  20438. "tags" : [ "Vendor Advisory" ]
  20439. } ]
  20440. },
  20441. "description" : {
  20442. "description_data" : [ {
  20443. "lang" : "en",
  20444. "value" : "NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where there is the potential to write to a shared memory location and manipulate the data after the data has been validated, which may lead to denial of service and escalation of privileges. This affects vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior to 8.7)."
  20445. } ]
  20446. }
  20447. },
  20448. "configurations" : {
  20449. "CVE_data_version" : "4.0",
  20450. "nodes" : [ {
  20451. "operator" : "AND",
  20452. "children" : [ {
  20453. "operator" : "OR",
  20454. "children" : [ ],
  20455. "cpe_match" : [ {
  20456. "vulnerable" : true,
  20457. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20458. "versionStartIncluding" : "8.0:",
  20459. "versionEndExcluding" : "8.7:",
  20460. "cpe_name" : [ ]
  20461. } ]
  20462. }, {
  20463. "operator" : "OR",
  20464. "children" : [ ],
  20465. "cpe_match" : [ {
  20466. "vulnerable" : false,
  20467. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  20468. "cpe_name" : [ ]
  20469. }, {
  20470. "vulnerable" : false,
  20471. "cpe23Uri" : "cpe:2.3:o:nutanix:ahv:-:*:*:*:*:*:*:*",
  20472. "cpe_name" : [ ]
  20473. }, {
  20474. "vulnerable" : false,
  20475. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  20476. "cpe_name" : [ ]
  20477. }, {
  20478. "vulnerable" : false,
  20479. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  20480. "cpe_name" : [ ]
  20481. } ]
  20482. } ],
  20483. "cpe_match" : [ ]
  20484. }, {
  20485. "operator" : "AND",
  20486. "children" : [ {
  20487. "operator" : "OR",
  20488. "children" : [ ],
  20489. "cpe_match" : [ {
  20490. "vulnerable" : true,
  20491. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20492. "versionStartIncluding" : "11.0:",
  20493. "versionEndExcluding" : "11.4:",
  20494. "cpe_name" : [ ]
  20495. }, {
  20496. "vulnerable" : true,
  20497. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20498. "versionStartIncluding" : "12.0:",
  20499. "versionEndExcluding" : "12.2:",
  20500. "cpe_name" : [ ]
  20501. } ]
  20502. }, {
  20503. "operator" : "OR",
  20504. "children" : [ ],
  20505. "cpe_match" : [ {
  20506. "vulnerable" : false,
  20507. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  20508. "cpe_name" : [ ]
  20509. }, {
  20510. "vulnerable" : false,
  20511. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  20512. "cpe_name" : [ ]
  20513. }, {
  20514. "vulnerable" : false,
  20515. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  20516. "cpe_name" : [ ]
  20517. } ]
  20518. } ],
  20519. "cpe_match" : [ ]
  20520. } ]
  20521. },
  20522. "impact" : {
  20523. "baseMetricV3" : {
  20524. "cvssV3" : {
  20525. "version" : "3.1",
  20526. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  20527. "attackVector" : "LOCAL",
  20528. "attackComplexity" : "LOW",
  20529. "privilegesRequired" : "LOW",
  20530. "userInteraction" : "NONE",
  20531. "scope" : "UNCHANGED",
  20532. "confidentialityImpact" : "HIGH",
  20533. "integrityImpact" : "HIGH",
  20534. "availabilityImpact" : "HIGH",
  20535. "baseScore" : 7.8,
  20536. "baseSeverity" : "HIGH"
  20537. },
  20538. "exploitabilityScore" : 1.8,
  20539. "impactScore" : 5.9
  20540. },
  20541. "baseMetricV2" : {
  20542. "cvssV2" : {
  20543. "version" : "2.0",
  20544. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  20545. "accessVector" : "LOCAL",
  20546. "accessComplexity" : "LOW",
  20547. "authentication" : "NONE",
  20548. "confidentialityImpact" : "PARTIAL",
  20549. "integrityImpact" : "PARTIAL",
  20550. "availabilityImpact" : "PARTIAL",
  20551. "baseScore" : 4.6
  20552. },
  20553. "severity" : "MEDIUM",
  20554. "exploitabilityScore" : 3.9,
  20555. "impactScore" : 6.4,
  20556. "acInsufInfo" : false,
  20557. "obtainAllPrivilege" : false,
  20558. "obtainUserPrivilege" : false,
  20559. "obtainOtherPrivilege" : false,
  20560. "userInteractionRequired" : false
  20561. }
  20562. },
  20563. "publishedDate" : "2021-04-29T19:15Z",
  20564. "lastModifiedDate" : "2021-05-07T20:13Z"
  20565. }, {
  20566. "cve" : {
  20567. "data_type" : "CVE",
  20568. "data_format" : "MITRE",
  20569. "data_version" : "4.0",
  20570. "CVE_data_meta" : {
  20571. "ID" : "CVE-2021-1084",
  20572. "ASSIGNER" : "psirt@nvidia.com"
  20573. },
  20574. "problemtype" : {
  20575. "problemtype_data" : [ {
  20576. "description" : [ {
  20577. "lang" : "en",
  20578. "value" : "CWE-20"
  20579. } ]
  20580. } ]
  20581. },
  20582. "references" : {
  20583. "reference_data" : [ {
  20584. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20585. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20586. "refsource" : "CONFIRM",
  20587. "tags" : [ "Vendor Advisory" ]
  20588. } ]
  20589. },
  20590. "description" : {
  20591. "description_data" : [ {
  20592. "lang" : "en",
  20593. "value" : "NVIDIA vGPU driver contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 12.x (prior to 12.2) and version 11.x (prior to 11.4)."
  20594. } ]
  20595. }
  20596. },
  20597. "configurations" : {
  20598. "CVE_data_version" : "4.0",
  20599. "nodes" : [ {
  20600. "operator" : "AND",
  20601. "children" : [ {
  20602. "operator" : "OR",
  20603. "children" : [ ],
  20604. "cpe_match" : [ {
  20605. "vulnerable" : true,
  20606. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20607. "versionStartIncluding" : "11.0:",
  20608. "versionEndExcluding" : "11.4:",
  20609. "cpe_name" : [ ]
  20610. }, {
  20611. "vulnerable" : true,
  20612. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20613. "versionStartIncluding" : "12.0:",
  20614. "versionEndExcluding" : "12.2:",
  20615. "cpe_name" : [ ]
  20616. } ]
  20617. }, {
  20618. "operator" : "OR",
  20619. "children" : [ ],
  20620. "cpe_match" : [ {
  20621. "vulnerable" : false,
  20622. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  20623. "cpe_name" : [ ]
  20624. }, {
  20625. "vulnerable" : false,
  20626. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
  20627. "cpe_name" : [ ]
  20628. }, {
  20629. "vulnerable" : false,
  20630. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  20631. "cpe_name" : [ ]
  20632. }, {
  20633. "vulnerable" : false,
  20634. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  20635. "cpe_name" : [ ]
  20636. }, {
  20637. "vulnerable" : false,
  20638. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  20639. "cpe_name" : [ ]
  20640. } ]
  20641. } ],
  20642. "cpe_match" : [ ]
  20643. } ]
  20644. },
  20645. "impact" : {
  20646. "baseMetricV3" : {
  20647. "cvssV3" : {
  20648. "version" : "3.1",
  20649. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
  20650. "attackVector" : "LOCAL",
  20651. "attackComplexity" : "LOW",
  20652. "privilegesRequired" : "LOW",
  20653. "userInteraction" : "NONE",
  20654. "scope" : "UNCHANGED",
  20655. "confidentialityImpact" : "NONE",
  20656. "integrityImpact" : "HIGH",
  20657. "availabilityImpact" : "HIGH",
  20658. "baseScore" : 7.1,
  20659. "baseSeverity" : "HIGH"
  20660. },
  20661. "exploitabilityScore" : 1.8,
  20662. "impactScore" : 5.2
  20663. },
  20664. "baseMetricV2" : {
  20665. "cvssV2" : {
  20666. "version" : "2.0",
  20667. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:P/A:P",
  20668. "accessVector" : "LOCAL",
  20669. "accessComplexity" : "LOW",
  20670. "authentication" : "NONE",
  20671. "confidentialityImpact" : "NONE",
  20672. "integrityImpact" : "PARTIAL",
  20673. "availabilityImpact" : "PARTIAL",
  20674. "baseScore" : 3.6
  20675. },
  20676. "severity" : "LOW",
  20677. "exploitabilityScore" : 3.9,
  20678. "impactScore" : 4.9,
  20679. "acInsufInfo" : false,
  20680. "obtainAllPrivilege" : false,
  20681. "obtainUserPrivilege" : false,
  20682. "obtainOtherPrivilege" : false,
  20683. "userInteractionRequired" : false
  20684. }
  20685. },
  20686. "publishedDate" : "2021-04-29T19:15Z",
  20687. "lastModifiedDate" : "2021-05-07T20:45Z"
  20688. }, {
  20689. "cve" : {
  20690. "data_type" : "CVE",
  20691. "data_format" : "MITRE",
  20692. "data_version" : "4.0",
  20693. "CVE_data_meta" : {
  20694. "ID" : "CVE-2021-1083",
  20695. "ASSIGNER" : "psirt@nvidia.com"
  20696. },
  20697. "problemtype" : {
  20698. "problemtype_data" : [ {
  20699. "description" : [ {
  20700. "lang" : "en",
  20701. "value" : "CWE-20"
  20702. } ]
  20703. } ]
  20704. },
  20705. "references" : {
  20706. "reference_data" : [ {
  20707. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20708. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20709. "refsource" : "CONFIRM",
  20710. "tags" : [ "Vendor Advisory" ]
  20711. } ]
  20712. },
  20713. "description" : {
  20714. "description_data" : [ {
  20715. "lang" : "en",
  20716. "value" : "NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. This affects vGPU version 12.x (prior to 12.2) and version 11.x (prior to 11.4)."
  20717. } ]
  20718. }
  20719. },
  20720. "configurations" : {
  20721. "CVE_data_version" : "4.0",
  20722. "nodes" : [ {
  20723. "operator" : "AND",
  20724. "children" : [ {
  20725. "operator" : "OR",
  20726. "children" : [ ],
  20727. "cpe_match" : [ {
  20728. "vulnerable" : true,
  20729. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20730. "versionStartIncluding" : "11.0:",
  20731. "versionEndExcluding" : "11.4:",
  20732. "cpe_name" : [ ]
  20733. }, {
  20734. "vulnerable" : true,
  20735. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20736. "versionStartIncluding" : "12.0:",
  20737. "versionEndExcluding" : "12.2:",
  20738. "cpe_name" : [ ]
  20739. } ]
  20740. }, {
  20741. "operator" : "OR",
  20742. "children" : [ ],
  20743. "cpe_match" : [ {
  20744. "vulnerable" : false,
  20745. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  20746. "cpe_name" : [ ]
  20747. }, {
  20748. "vulnerable" : false,
  20749. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
  20750. "cpe_name" : [ ]
  20751. }, {
  20752. "vulnerable" : false,
  20753. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  20754. "cpe_name" : [ ]
  20755. }, {
  20756. "vulnerable" : false,
  20757. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  20758. "cpe_name" : [ ]
  20759. }, {
  20760. "vulnerable" : false,
  20761. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  20762. "cpe_name" : [ ]
  20763. } ]
  20764. } ],
  20765. "cpe_match" : [ ]
  20766. } ]
  20767. },
  20768. "impact" : {
  20769. "baseMetricV3" : {
  20770. "cvssV3" : {
  20771. "version" : "3.1",
  20772. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  20773. "attackVector" : "LOCAL",
  20774. "attackComplexity" : "LOW",
  20775. "privilegesRequired" : "LOW",
  20776. "userInteraction" : "NONE",
  20777. "scope" : "UNCHANGED",
  20778. "confidentialityImpact" : "HIGH",
  20779. "integrityImpact" : "HIGH",
  20780. "availabilityImpact" : "HIGH",
  20781. "baseScore" : 7.8,
  20782. "baseSeverity" : "HIGH"
  20783. },
  20784. "exploitabilityScore" : 1.8,
  20785. "impactScore" : 5.9
  20786. },
  20787. "baseMetricV2" : {
  20788. "cvssV2" : {
  20789. "version" : "2.0",
  20790. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  20791. "accessVector" : "LOCAL",
  20792. "accessComplexity" : "LOW",
  20793. "authentication" : "NONE",
  20794. "confidentialityImpact" : "PARTIAL",
  20795. "integrityImpact" : "PARTIAL",
  20796. "availabilityImpact" : "PARTIAL",
  20797. "baseScore" : 4.6
  20798. },
  20799. "severity" : "MEDIUM",
  20800. "exploitabilityScore" : 3.9,
  20801. "impactScore" : 6.4,
  20802. "acInsufInfo" : false,
  20803. "obtainAllPrivilege" : false,
  20804. "obtainUserPrivilege" : false,
  20805. "obtainOtherPrivilege" : false,
  20806. "userInteractionRequired" : false
  20807. }
  20808. },
  20809. "publishedDate" : "2021-04-29T19:15Z",
  20810. "lastModifiedDate" : "2021-05-07T20:45Z"
  20811. }, {
  20812. "cve" : {
  20813. "data_type" : "CVE",
  20814. "data_format" : "MITRE",
  20815. "data_version" : "4.0",
  20816. "CVE_data_meta" : {
  20817. "ID" : "CVE-2021-1082",
  20818. "ASSIGNER" : "psirt@nvidia.com"
  20819. },
  20820. "problemtype" : {
  20821. "problemtype_data" : [ {
  20822. "description" : [ {
  20823. "lang" : "en",
  20824. "value" : "CWE-20"
  20825. } ]
  20826. } ]
  20827. },
  20828. "references" : {
  20829. "reference_data" : [ {
  20830. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20831. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20832. "refsource" : "CONFIRM",
  20833. "tags" : [ "Vendor Advisory" ]
  20834. } ]
  20835. },
  20836. "description" : {
  20837. "description_data" : [ {
  20838. "lang" : "en",
  20839. "value" : "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior to 8.7)"
  20840. } ]
  20841. }
  20842. },
  20843. "configurations" : {
  20844. "CVE_data_version" : "4.0",
  20845. "nodes" : [ {
  20846. "operator" : "AND",
  20847. "children" : [ {
  20848. "operator" : "OR",
  20849. "children" : [ ],
  20850. "cpe_match" : [ {
  20851. "vulnerable" : true,
  20852. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20853. "versionStartIncluding" : "8.0:",
  20854. "versionEndExcluding" : "8.7:",
  20855. "cpe_name" : [ ]
  20856. } ]
  20857. }, {
  20858. "operator" : "OR",
  20859. "children" : [ ],
  20860. "cpe_match" : [ {
  20861. "vulnerable" : false,
  20862. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  20863. "cpe_name" : [ ]
  20864. }, {
  20865. "vulnerable" : false,
  20866. "cpe23Uri" : "cpe:2.3:o:nutanix:ahv:-:*:*:*:*:*:*:*",
  20867. "cpe_name" : [ ]
  20868. }, {
  20869. "vulnerable" : false,
  20870. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  20871. "cpe_name" : [ ]
  20872. }, {
  20873. "vulnerable" : false,
  20874. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  20875. "cpe_name" : [ ]
  20876. } ]
  20877. } ],
  20878. "cpe_match" : [ ]
  20879. }, {
  20880. "operator" : "AND",
  20881. "children" : [ {
  20882. "operator" : "OR",
  20883. "children" : [ ],
  20884. "cpe_match" : [ {
  20885. "vulnerable" : true,
  20886. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20887. "versionStartIncluding" : "11.0:",
  20888. "versionEndExcluding" : "11.4:",
  20889. "cpe_name" : [ ]
  20890. }, {
  20891. "vulnerable" : true,
  20892. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  20893. "versionStartIncluding" : "12.0:",
  20894. "versionEndExcluding" : "12.2:",
  20895. "cpe_name" : [ ]
  20896. } ]
  20897. }, {
  20898. "operator" : "OR",
  20899. "children" : [ ],
  20900. "cpe_match" : [ {
  20901. "vulnerable" : false,
  20902. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  20903. "cpe_name" : [ ]
  20904. }, {
  20905. "vulnerable" : false,
  20906. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  20907. "cpe_name" : [ ]
  20908. }, {
  20909. "vulnerable" : false,
  20910. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  20911. "cpe_name" : [ ]
  20912. } ]
  20913. } ],
  20914. "cpe_match" : [ ]
  20915. } ]
  20916. },
  20917. "impact" : {
  20918. "baseMetricV3" : {
  20919. "cvssV3" : {
  20920. "version" : "3.1",
  20921. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  20922. "attackVector" : "LOCAL",
  20923. "attackComplexity" : "LOW",
  20924. "privilegesRequired" : "LOW",
  20925. "userInteraction" : "NONE",
  20926. "scope" : "UNCHANGED",
  20927. "confidentialityImpact" : "HIGH",
  20928. "integrityImpact" : "HIGH",
  20929. "availabilityImpact" : "HIGH",
  20930. "baseScore" : 7.8,
  20931. "baseSeverity" : "HIGH"
  20932. },
  20933. "exploitabilityScore" : 1.8,
  20934. "impactScore" : 5.9
  20935. },
  20936. "baseMetricV2" : {
  20937. "cvssV2" : {
  20938. "version" : "2.0",
  20939. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  20940. "accessVector" : "LOCAL",
  20941. "accessComplexity" : "LOW",
  20942. "authentication" : "NONE",
  20943. "confidentialityImpact" : "PARTIAL",
  20944. "integrityImpact" : "PARTIAL",
  20945. "availabilityImpact" : "PARTIAL",
  20946. "baseScore" : 4.6
  20947. },
  20948. "severity" : "MEDIUM",
  20949. "exploitabilityScore" : 3.9,
  20950. "impactScore" : 6.4,
  20951. "acInsufInfo" : false,
  20952. "obtainAllPrivilege" : false,
  20953. "obtainUserPrivilege" : false,
  20954. "obtainOtherPrivilege" : false,
  20955. "userInteractionRequired" : false
  20956. }
  20957. },
  20958. "publishedDate" : "2021-04-29T19:15Z",
  20959. "lastModifiedDate" : "2021-05-07T20:47Z"
  20960. }, {
  20961. "cve" : {
  20962. "data_type" : "CVE",
  20963. "data_format" : "MITRE",
  20964. "data_version" : "4.0",
  20965. "CVE_data_meta" : {
  20966. "ID" : "CVE-2021-1081",
  20967. "ASSIGNER" : "psirt@nvidia.com"
  20968. },
  20969. "problemtype" : {
  20970. "problemtype_data" : [ {
  20971. "description" : [ {
  20972. "lang" : "en",
  20973. "value" : "CWE-20"
  20974. } ]
  20975. } ]
  20976. },
  20977. "references" : {
  20978. "reference_data" : [ {
  20979. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20980. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  20981. "refsource" : "CONFIRM",
  20982. "tags" : [ "Vendor Advisory" ]
  20983. } ]
  20984. },
  20985. "description" : {
  20986. "description_data" : [ {
  20987. "lang" : "en",
  20988. "value" : "NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and Virtual GPU manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. This affects vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior 8.7)."
  20989. } ]
  20990. }
  20991. },
  20992. "configurations" : {
  20993. "CVE_data_version" : "4.0",
  20994. "nodes" : [ {
  20995. "operator" : "AND",
  20996. "children" : [ {
  20997. "operator" : "OR",
  20998. "children" : [ ],
  20999. "cpe_match" : [ {
  21000. "vulnerable" : true,
  21001. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  21002. "versionStartIncluding" : "8.0:",
  21003. "versionEndExcluding" : "8.7:",
  21004. "cpe_name" : [ ]
  21005. } ]
  21006. }, {
  21007. "operator" : "OR",
  21008. "children" : [ ],
  21009. "cpe_match" : [ {
  21010. "vulnerable" : false,
  21011. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  21012. "cpe_name" : [ ]
  21013. }, {
  21014. "vulnerable" : false,
  21015. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
  21016. "cpe_name" : [ ]
  21017. }, {
  21018. "vulnerable" : false,
  21019. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  21020. "cpe_name" : [ ]
  21021. }, {
  21022. "vulnerable" : false,
  21023. "cpe23Uri" : "cpe:2.3:o:nutanix:ahv:-:*:*:*:*:*:*:*",
  21024. "cpe_name" : [ ]
  21025. }, {
  21026. "vulnerable" : false,
  21027. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  21028. "cpe_name" : [ ]
  21029. }, {
  21030. "vulnerable" : false,
  21031. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  21032. "cpe_name" : [ ]
  21033. } ]
  21034. } ],
  21035. "cpe_match" : [ ]
  21036. }, {
  21037. "operator" : "AND",
  21038. "children" : [ {
  21039. "operator" : "OR",
  21040. "children" : [ ],
  21041. "cpe_match" : [ {
  21042. "vulnerable" : true,
  21043. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  21044. "versionStartIncluding" : "11.0:",
  21045. "versionEndExcluding" : "11.4:",
  21046. "cpe_name" : [ ]
  21047. }, {
  21048. "vulnerable" : true,
  21049. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  21050. "versionStartIncluding" : "12.0:",
  21051. "versionEndExcluding" : "12.2:",
  21052. "cpe_name" : [ ]
  21053. } ]
  21054. }, {
  21055. "operator" : "OR",
  21056. "children" : [ ],
  21057. "cpe_match" : [ {
  21058. "vulnerable" : false,
  21059. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  21060. "cpe_name" : [ ]
  21061. }, {
  21062. "vulnerable" : false,
  21063. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
  21064. "cpe_name" : [ ]
  21065. }, {
  21066. "vulnerable" : false,
  21067. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  21068. "cpe_name" : [ ]
  21069. }, {
  21070. "vulnerable" : false,
  21071. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  21072. "cpe_name" : [ ]
  21073. }, {
  21074. "vulnerable" : false,
  21075. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  21076. "cpe_name" : [ ]
  21077. } ]
  21078. } ],
  21079. "cpe_match" : [ ]
  21080. } ]
  21081. },
  21082. "impact" : {
  21083. "baseMetricV3" : {
  21084. "cvssV3" : {
  21085. "version" : "3.1",
  21086. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  21087. "attackVector" : "LOCAL",
  21088. "attackComplexity" : "LOW",
  21089. "privilegesRequired" : "LOW",
  21090. "userInteraction" : "NONE",
  21091. "scope" : "UNCHANGED",
  21092. "confidentialityImpact" : "HIGH",
  21093. "integrityImpact" : "HIGH",
  21094. "availabilityImpact" : "HIGH",
  21095. "baseScore" : 7.8,
  21096. "baseSeverity" : "HIGH"
  21097. },
  21098. "exploitabilityScore" : 1.8,
  21099. "impactScore" : 5.9
  21100. },
  21101. "baseMetricV2" : {
  21102. "cvssV2" : {
  21103. "version" : "2.0",
  21104. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  21105. "accessVector" : "LOCAL",
  21106. "accessComplexity" : "LOW",
  21107. "authentication" : "NONE",
  21108. "confidentialityImpact" : "PARTIAL",
  21109. "integrityImpact" : "PARTIAL",
  21110. "availabilityImpact" : "PARTIAL",
  21111. "baseScore" : 4.6
  21112. },
  21113. "severity" : "MEDIUM",
  21114. "exploitabilityScore" : 3.9,
  21115. "impactScore" : 6.4,
  21116. "acInsufInfo" : false,
  21117. "obtainAllPrivilege" : false,
  21118. "obtainUserPrivilege" : false,
  21119. "obtainOtherPrivilege" : false,
  21120. "userInteractionRequired" : false
  21121. }
  21122. },
  21123. "publishedDate" : "2021-04-29T19:15Z",
  21124. "lastModifiedDate" : "2021-05-07T20:48Z"
  21125. }, {
  21126. "cve" : {
  21127. "data_type" : "CVE",
  21128. "data_format" : "MITRE",
  21129. "data_version" : "4.0",
  21130. "CVE_data_meta" : {
  21131. "ID" : "CVE-2021-1080",
  21132. "ASSIGNER" : "psirt@nvidia.com"
  21133. },
  21134. "problemtype" : {
  21135. "problemtype_data" : [ {
  21136. "description" : [ {
  21137. "lang" : "en",
  21138. "value" : "CWE-20"
  21139. } ]
  21140. } ]
  21141. },
  21142. "references" : {
  21143. "reference_data" : [ {
  21144. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  21145. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  21146. "refsource" : "CONFIRM",
  21147. "tags" : [ "Vendor Advisory" ]
  21148. } ]
  21149. },
  21150. "description" : {
  21151. "description_data" : [ {
  21152. "lang" : "en",
  21153. "value" : "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), in which certain input data is not validated, which may lead to information disclosure, tampering of data, or denial of service. This affects vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior 8.7)."
  21154. } ]
  21155. }
  21156. },
  21157. "configurations" : {
  21158. "CVE_data_version" : "4.0",
  21159. "nodes" : [ {
  21160. "operator" : "AND",
  21161. "children" : [ {
  21162. "operator" : "OR",
  21163. "children" : [ ],
  21164. "cpe_match" : [ {
  21165. "vulnerable" : true,
  21166. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  21167. "versionStartIncluding" : "8.0:",
  21168. "versionEndExcluding" : "8.7:",
  21169. "cpe_name" : [ ]
  21170. } ]
  21171. }, {
  21172. "operator" : "OR",
  21173. "children" : [ ],
  21174. "cpe_match" : [ {
  21175. "vulnerable" : false,
  21176. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  21177. "cpe_name" : [ ]
  21178. }, {
  21179. "vulnerable" : false,
  21180. "cpe23Uri" : "cpe:2.3:o:nutanix:ahv:-:*:*:*:*:*:*:*",
  21181. "cpe_name" : [ ]
  21182. }, {
  21183. "vulnerable" : false,
  21184. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  21185. "cpe_name" : [ ]
  21186. }, {
  21187. "vulnerable" : false,
  21188. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  21189. "cpe_name" : [ ]
  21190. } ]
  21191. } ],
  21192. "cpe_match" : [ ]
  21193. }, {
  21194. "operator" : "AND",
  21195. "children" : [ {
  21196. "operator" : "OR",
  21197. "children" : [ ],
  21198. "cpe_match" : [ {
  21199. "vulnerable" : true,
  21200. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  21201. "versionStartIncluding" : "11.0:",
  21202. "versionEndExcluding" : "11.4:",
  21203. "cpe_name" : [ ]
  21204. }, {
  21205. "vulnerable" : true,
  21206. "cpe23Uri" : "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
  21207. "versionStartIncluding" : "12.0:",
  21208. "versionEndExcluding" : "12.2:",
  21209. "cpe_name" : [ ]
  21210. } ]
  21211. }, {
  21212. "operator" : "OR",
  21213. "children" : [ ],
  21214. "cpe_match" : [ {
  21215. "vulnerable" : false,
  21216. "cpe23Uri" : "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
  21217. "cpe_name" : [ ]
  21218. }, {
  21219. "vulnerable" : false,
  21220. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
  21221. "cpe_name" : [ ]
  21222. }, {
  21223. "vulnerable" : false,
  21224. "cpe23Uri" : "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
  21225. "cpe_name" : [ ]
  21226. } ]
  21227. } ],
  21228. "cpe_match" : [ ]
  21229. } ]
  21230. },
  21231. "impact" : {
  21232. "baseMetricV3" : {
  21233. "cvssV3" : {
  21234. "version" : "3.1",
  21235. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  21236. "attackVector" : "LOCAL",
  21237. "attackComplexity" : "LOW",
  21238. "privilegesRequired" : "LOW",
  21239. "userInteraction" : "NONE",
  21240. "scope" : "UNCHANGED",
  21241. "confidentialityImpact" : "HIGH",
  21242. "integrityImpact" : "HIGH",
  21243. "availabilityImpact" : "HIGH",
  21244. "baseScore" : 7.8,
  21245. "baseSeverity" : "HIGH"
  21246. },
  21247. "exploitabilityScore" : 1.8,
  21248. "impactScore" : 5.9
  21249. },
  21250. "baseMetricV2" : {
  21251. "cvssV2" : {
  21252. "version" : "2.0",
  21253. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  21254. "accessVector" : "LOCAL",
  21255. "accessComplexity" : "LOW",
  21256. "authentication" : "NONE",
  21257. "confidentialityImpact" : "PARTIAL",
  21258. "integrityImpact" : "PARTIAL",
  21259. "availabilityImpact" : "PARTIAL",
  21260. "baseScore" : 4.6
  21261. },
  21262. "severity" : "MEDIUM",
  21263. "exploitabilityScore" : 3.9,
  21264. "impactScore" : 6.4,
  21265. "acInsufInfo" : false,
  21266. "obtainAllPrivilege" : false,
  21267. "obtainUserPrivilege" : false,
  21268. "obtainOtherPrivilege" : false,
  21269. "userInteractionRequired" : false
  21270. }
  21271. },
  21272. "publishedDate" : "2021-04-29T19:15Z",
  21273. "lastModifiedDate" : "2021-05-07T20:48Z"
  21274. }, {
  21275. "cve" : {
  21276. "data_type" : "CVE",
  21277. "data_format" : "MITRE",
  21278. "data_version" : "4.0",
  21279. "CVE_data_meta" : {
  21280. "ID" : "CVE-2020-22808",
  21281. "ASSIGNER" : "cve@mitre.org"
  21282. },
  21283. "problemtype" : {
  21284. "problemtype_data" : [ {
  21285. "description" : [ {
  21286. "lang" : "en",
  21287. "value" : "CWE-79"
  21288. } ]
  21289. } ]
  21290. },
  21291. "references" : {
  21292. "reference_data" : [ {
  21293. "url" : "https://github.com/fecshop/yii2_fecshop/commit/8fac6455882333cfe3d81c4121d523813e28e31a",
  21294. "name" : "https://github.com/fecshop/yii2_fecshop/commit/8fac6455882333cfe3d81c4121d523813e28e31a",
  21295. "refsource" : "CONFIRM",
  21296. "tags" : [ "Patch", "Third Party Advisory" ]
  21297. }, {
  21298. "url" : "https://github.com/fecshop/yii2_fecshop/issues/87",
  21299. "name" : "https://github.com/fecshop/yii2_fecshop/issues/87",
  21300. "refsource" : "MISC",
  21301. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  21302. } ]
  21303. },
  21304. "description" : {
  21305. "description_data" : [ {
  21306. "lang" : "en",
  21307. "value" : "An issue was found in yii2_fecshop 2.x. There is a reflected XSS vulnerability in the check cart page."
  21308. } ]
  21309. }
  21310. },
  21311. "configurations" : {
  21312. "CVE_data_version" : "4.0",
  21313. "nodes" : [ {
  21314. "operator" : "OR",
  21315. "children" : [ ],
  21316. "cpe_match" : [ {
  21317. "vulnerable" : true,
  21318. "cpe23Uri" : "cpe:2.3:a:fecmall_project:fecmall:*:*:*:*:*:*:*:*",
  21319. "versionStartIncluding" : "2.0.0:",
  21320. "versionEndIncluding" : "2.13.3:",
  21321. "cpe_name" : [ ]
  21322. } ]
  21323. } ]
  21324. },
  21325. "impact" : {
  21326. "baseMetricV3" : {
  21327. "cvssV3" : {
  21328. "version" : "3.1",
  21329. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  21330. "attackVector" : "NETWORK",
  21331. "attackComplexity" : "LOW",
  21332. "privilegesRequired" : "NONE",
  21333. "userInteraction" : "REQUIRED",
  21334. "scope" : "CHANGED",
  21335. "confidentialityImpact" : "LOW",
  21336. "integrityImpact" : "LOW",
  21337. "availabilityImpact" : "NONE",
  21338. "baseScore" : 6.1,
  21339. "baseSeverity" : "MEDIUM"
  21340. },
  21341. "exploitabilityScore" : 2.8,
  21342. "impactScore" : 2.7
  21343. },
  21344. "baseMetricV2" : {
  21345. "cvssV2" : {
  21346. "version" : "2.0",
  21347. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  21348. "accessVector" : "NETWORK",
  21349. "accessComplexity" : "MEDIUM",
  21350. "authentication" : "NONE",
  21351. "confidentialityImpact" : "NONE",
  21352. "integrityImpact" : "PARTIAL",
  21353. "availabilityImpact" : "NONE",
  21354. "baseScore" : 4.3
  21355. },
  21356. "severity" : "MEDIUM",
  21357. "exploitabilityScore" : 8.6,
  21358. "impactScore" : 2.9,
  21359. "acInsufInfo" : false,
  21360. "obtainAllPrivilege" : false,
  21361. "obtainUserPrivilege" : false,
  21362. "obtainOtherPrivilege" : false,
  21363. "userInteractionRequired" : true
  21364. }
  21365. },
  21366. "publishedDate" : "2021-04-29T19:15Z",
  21367. "lastModifiedDate" : "2021-05-05T17:55Z"
  21368. }, {
  21369. "cve" : {
  21370. "data_type" : "CVE",
  21371. "data_format" : "MITRE",
  21372. "data_version" : "4.0",
  21373. "CVE_data_meta" : {
  21374. "ID" : "CVE-2020-22807",
  21375. "ASSIGNER" : "cve@mitre.org"
  21376. },
  21377. "problemtype" : {
  21378. "problemtype_data" : [ {
  21379. "description" : [ {
  21380. "lang" : "en",
  21381. "value" : "CWE-89"
  21382. } ]
  21383. } ]
  21384. },
  21385. "references" : {
  21386. "reference_data" : [ {
  21387. "url" : "https://cloud.tencent.com/developer/article/1612208",
  21388. "name" : "https://cloud.tencent.com/developer/article/1612208",
  21389. "refsource" : "MISC",
  21390. "tags" : [ "Exploit", "Third Party Advisory" ]
  21391. } ]
  21392. },
  21393. "description" : {
  21394. "description_data" : [ {
  21395. "lang" : "en",
  21396. "value" : "An issue was dicovered in vtiger crm 7.2. Union sql injection in the calendar exportdata feature."
  21397. } ]
  21398. }
  21399. },
  21400. "configurations" : {
  21401. "CVE_data_version" : "4.0",
  21402. "nodes" : [ {
  21403. "operator" : "OR",
  21404. "children" : [ ],
  21405. "cpe_match" : [ {
  21406. "vulnerable" : true,
  21407. "cpe23Uri" : "cpe:2.3:a:vtiger:vtiger:7.2:*:*:*:*:*:*:*",
  21408. "cpe_name" : [ ]
  21409. } ]
  21410. } ]
  21411. },
  21412. "impact" : {
  21413. "baseMetricV3" : {
  21414. "cvssV3" : {
  21415. "version" : "3.1",
  21416. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  21417. "attackVector" : "NETWORK",
  21418. "attackComplexity" : "LOW",
  21419. "privilegesRequired" : "NONE",
  21420. "userInteraction" : "NONE",
  21421. "scope" : "UNCHANGED",
  21422. "confidentialityImpact" : "HIGH",
  21423. "integrityImpact" : "HIGH",
  21424. "availabilityImpact" : "HIGH",
  21425. "baseScore" : 9.8,
  21426. "baseSeverity" : "CRITICAL"
  21427. },
  21428. "exploitabilityScore" : 3.9,
  21429. "impactScore" : 5.9
  21430. },
  21431. "baseMetricV2" : {
  21432. "cvssV2" : {
  21433. "version" : "2.0",
  21434. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  21435. "accessVector" : "NETWORK",
  21436. "accessComplexity" : "LOW",
  21437. "authentication" : "NONE",
  21438. "confidentialityImpact" : "PARTIAL",
  21439. "integrityImpact" : "PARTIAL",
  21440. "availabilityImpact" : "PARTIAL",
  21441. "baseScore" : 7.5
  21442. },
  21443. "severity" : "HIGH",
  21444. "exploitabilityScore" : 10.0,
  21445. "impactScore" : 6.4,
  21446. "acInsufInfo" : false,
  21447. "obtainAllPrivilege" : false,
  21448. "obtainUserPrivilege" : false,
  21449. "obtainOtherPrivilege" : false,
  21450. "userInteractionRequired" : false
  21451. }
  21452. },
  21453. "publishedDate" : "2021-04-29T19:15Z",
  21454. "lastModifiedDate" : "2021-05-03T18:47Z"
  21455. }, {
  21456. "cve" : {
  21457. "data_type" : "CVE",
  21458. "data_format" : "MITRE",
  21459. "data_version" : "4.0",
  21460. "CVE_data_meta" : {
  21461. "ID" : "CVE-2021-21388",
  21462. "ASSIGNER" : "security-advisories@github.com"
  21463. },
  21464. "problemtype" : {
  21465. "problemtype_data" : [ {
  21466. "description" : [ {
  21467. "lang" : "en",
  21468. "value" : "CWE-78"
  21469. } ]
  21470. } ]
  21471. },
  21472. "references" : {
  21473. "reference_data" : [ {
  21474. "url" : "https://github.com/sebhildebrandt/systeminformation/commit/0be6fcd575c05687d1076d5cd6d75af2ebae5a46",
  21475. "name" : "https://github.com/sebhildebrandt/systeminformation/commit/0be6fcd575c05687d1076d5cd6d75af2ebae5a46",
  21476. "refsource" : "MISC",
  21477. "tags" : [ "Patch", "Third Party Advisory" ]
  21478. }, {
  21479. "url" : "https://www.npmjs.com/package/systeminformation",
  21480. "name" : "https://www.npmjs.com/package/systeminformation",
  21481. "refsource" : "MISC",
  21482. "tags" : [ "Product", "Third Party Advisory" ]
  21483. }, {
  21484. "url" : "https://github.com/sebhildebrandt/systeminformation/commit/7922366d707de7f20995fc8e30ac3153636bf35f",
  21485. "name" : "https://github.com/sebhildebrandt/systeminformation/commit/7922366d707de7f20995fc8e30ac3153636bf35f",
  21486. "refsource" : "MISC",
  21487. "tags" : [ "Patch", "Third Party Advisory" ]
  21488. }, {
  21489. "url" : "https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-jff2-qjw8-5476",
  21490. "name" : "https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-jff2-qjw8-5476",
  21491. "refsource" : "CONFIRM",
  21492. "tags" : [ "Third Party Advisory" ]
  21493. }, {
  21494. "url" : "https://github.com/sebhildebrandt/systeminformation/commit/01ef56cd5824ed6da1c11b37013a027fdef67524",
  21495. "name" : "https://github.com/sebhildebrandt/systeminformation/commit/01ef56cd5824ed6da1c11b37013a027fdef67524",
  21496. "refsource" : "MISC",
  21497. "tags" : [ "Patch", "Third Party Advisory" ]
  21498. } ]
  21499. },
  21500. "description" : {
  21501. "description_data" : [ {
  21502. "lang" : "en",
  21503. "value" : "systeminformation is an open source system and OS information library for node.js. A command injection vulnerability has been discovered in versions of systeminformation prior to 5.6.4. The issue has been fixed with a parameter check on user input. Please upgrade to version >= 5.6.4. If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() and other commands. Only allow strings, reject any arrays. String sanitation works as expected."
  21504. } ]
  21505. }
  21506. },
  21507. "configurations" : {
  21508. "CVE_data_version" : "4.0",
  21509. "nodes" : [ {
  21510. "operator" : "OR",
  21511. "children" : [ ],
  21512. "cpe_match" : [ {
  21513. "vulnerable" : true,
  21514. "cpe23Uri" : "cpe:2.3:a:systeminformation:systeminformation:*:*:*:*:*:node.js:*:*",
  21515. "versionEndExcluding" : "5.6.4:",
  21516. "cpe_name" : [ ]
  21517. } ]
  21518. } ]
  21519. },
  21520. "impact" : {
  21521. "baseMetricV3" : {
  21522. "cvssV3" : {
  21523. "version" : "3.1",
  21524. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  21525. "attackVector" : "NETWORK",
  21526. "attackComplexity" : "LOW",
  21527. "privilegesRequired" : "NONE",
  21528. "userInteraction" : "NONE",
  21529. "scope" : "UNCHANGED",
  21530. "confidentialityImpact" : "HIGH",
  21531. "integrityImpact" : "HIGH",
  21532. "availabilityImpact" : "HIGH",
  21533. "baseScore" : 9.8,
  21534. "baseSeverity" : "CRITICAL"
  21535. },
  21536. "exploitabilityScore" : 3.9,
  21537. "impactScore" : 5.9
  21538. },
  21539. "baseMetricV2" : {
  21540. "cvssV2" : {
  21541. "version" : "2.0",
  21542. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  21543. "accessVector" : "NETWORK",
  21544. "accessComplexity" : "LOW",
  21545. "authentication" : "NONE",
  21546. "confidentialityImpact" : "PARTIAL",
  21547. "integrityImpact" : "PARTIAL",
  21548. "availabilityImpact" : "PARTIAL",
  21549. "baseScore" : 7.5
  21550. },
  21551. "severity" : "HIGH",
  21552. "exploitabilityScore" : 10.0,
  21553. "impactScore" : 6.4,
  21554. "acInsufInfo" : false,
  21555. "obtainAllPrivilege" : false,
  21556. "obtainUserPrivilege" : false,
  21557. "obtainOtherPrivilege" : false,
  21558. "userInteractionRequired" : false
  21559. }
  21560. },
  21561. "publishedDate" : "2021-04-29T18:15Z",
  21562. "lastModifiedDate" : "2021-05-05T20:31Z"
  21563. }, {
  21564. "cve" : {
  21565. "data_type" : "CVE",
  21566. "data_format" : "MITRE",
  21567. "data_version" : "4.0",
  21568. "CVE_data_meta" : {
  21569. "ID" : "CVE-2021-1504",
  21570. "ASSIGNER" : "psirt@cisco.com"
  21571. },
  21572. "problemtype" : {
  21573. "problemtype_data" : [ {
  21574. "description" : [ {
  21575. "lang" : "en",
  21576. "value" : "CWE-787"
  21577. } ]
  21578. } ]
  21579. },
  21580. "references" : {
  21581. "reference_data" : [ {
  21582. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-vpn-dos-fpBcpEcD",
  21583. "name" : "20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services VPN Denial of Service Vulnerabilities",
  21584. "refsource" : "CISCO",
  21585. "tags" : [ "Vendor Advisory" ]
  21586. } ]
  21587. },
  21588. "description" : {
  21589. "description_data" : [ {
  21590. "lang" : "en",
  21591. "value" : "Multiple vulnerabilities in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to lack of proper input validation of the HTTPS request. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: This vulnerability affects only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section."
  21592. } ]
  21593. }
  21594. },
  21595. "configurations" : {
  21596. "CVE_data_version" : "4.0",
  21597. "nodes" : [ {
  21598. "operator" : "OR",
  21599. "children" : [ ],
  21600. "cpe_match" : [ {
  21601. "vulnerable" : true,
  21602. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  21603. "versionStartIncluding" : "9.7:",
  21604. "versionEndExcluding" : "9.8.4.35:",
  21605. "cpe_name" : [ ]
  21606. }, {
  21607. "vulnerable" : true,
  21608. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  21609. "versionStartIncluding" : "9.9:",
  21610. "versionEndExcluding" : "9.9.2.85:",
  21611. "cpe_name" : [ ]
  21612. }, {
  21613. "vulnerable" : true,
  21614. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  21615. "versionStartIncluding" : "9.10:",
  21616. "versionEndExcluding" : "9.12.4.10:",
  21617. "cpe_name" : [ ]
  21618. }, {
  21619. "vulnerable" : true,
  21620. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  21621. "versionStartIncluding" : "9.13:",
  21622. "versionEndExcluding" : "9.13.1.21:",
  21623. "cpe_name" : [ ]
  21624. }, {
  21625. "vulnerable" : true,
  21626. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  21627. "versionStartIncluding" : "9.14:",
  21628. "versionEndExcluding" : "9.14.2.4:",
  21629. "cpe_name" : [ ]
  21630. }, {
  21631. "vulnerable" : true,
  21632. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  21633. "versionStartIncluding" : "9.15:",
  21634. "versionEndExcluding" : "9.15.1.7:",
  21635. "cpe_name" : [ ]
  21636. }, {
  21637. "vulnerable" : true,
  21638. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  21639. "versionStartIncluding" : "6.5.0:",
  21640. "versionEndExcluding" : "6.6.4:",
  21641. "cpe_name" : [ ]
  21642. }, {
  21643. "vulnerable" : true,
  21644. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  21645. "versionStartIncluding" : "6.7.0:",
  21646. "versionEndExcluding" : "6.7.0.1:",
  21647. "cpe_name" : [ ]
  21648. } ]
  21649. } ]
  21650. },
  21651. "impact" : {
  21652. "baseMetricV3" : {
  21653. "cvssV3" : {
  21654. "version" : "3.1",
  21655. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  21656. "attackVector" : "NETWORK",
  21657. "attackComplexity" : "LOW",
  21658. "privilegesRequired" : "NONE",
  21659. "userInteraction" : "NONE",
  21660. "scope" : "UNCHANGED",
  21661. "confidentialityImpact" : "NONE",
  21662. "integrityImpact" : "NONE",
  21663. "availabilityImpact" : "HIGH",
  21664. "baseScore" : 7.5,
  21665. "baseSeverity" : "HIGH"
  21666. },
  21667. "exploitabilityScore" : 3.9,
  21668. "impactScore" : 3.6
  21669. },
  21670. "baseMetricV2" : {
  21671. "cvssV2" : {
  21672. "version" : "2.0",
  21673. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  21674. "accessVector" : "NETWORK",
  21675. "accessComplexity" : "LOW",
  21676. "authentication" : "NONE",
  21677. "confidentialityImpact" : "NONE",
  21678. "integrityImpact" : "NONE",
  21679. "availabilityImpact" : "PARTIAL",
  21680. "baseScore" : 5.0
  21681. },
  21682. "severity" : "MEDIUM",
  21683. "exploitabilityScore" : 10.0,
  21684. "impactScore" : 2.9,
  21685. "acInsufInfo" : false,
  21686. "obtainAllPrivilege" : false,
  21687. "obtainUserPrivilege" : false,
  21688. "obtainOtherPrivilege" : false,
  21689. "userInteractionRequired" : false
  21690. }
  21691. },
  21692. "publishedDate" : "2021-04-29T18:15Z",
  21693. "lastModifiedDate" : "2021-05-05T20:31Z"
  21694. }, {
  21695. "cve" : {
  21696. "data_type" : "CVE",
  21697. "data_format" : "MITRE",
  21698. "data_version" : "4.0",
  21699. "CVE_data_meta" : {
  21700. "ID" : "CVE-2021-1501",
  21701. "ASSIGNER" : "psirt@cisco.com"
  21702. },
  21703. "problemtype" : {
  21704. "problemtype_data" : [ {
  21705. "description" : [ {
  21706. "lang" : "en",
  21707. "value" : "CWE-613"
  21708. } ]
  21709. } ]
  21710. },
  21711. "references" : {
  21712. "reference_data" : [ {
  21713. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-sipdos-GGwmMerC",
  21714. "name" : "20210428 Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software SIP Denial of Service Vulnerability",
  21715. "refsource" : "CISCO",
  21716. "tags" : [ "Vendor Advisory" ]
  21717. } ]
  21718. },
  21719. "description" : {
  21720. "description_data" : [ {
  21721. "lang" : "en",
  21722. "value" : "A vulnerability in the SIP inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a crash and reload of an affected device, resulting in a denial of service (DoS) condition.The vulnerability is due to a crash that occurs during a hash lookup for a SIP pinhole connection. An attacker could exploit this vulnerability by sending crafted SIP traffic through an affected device. A successful exploit could allow the attacker to cause a crash and reload of the affected device."
  21723. } ]
  21724. }
  21725. },
  21726. "configurations" : {
  21727. "CVE_data_version" : "4.0",
  21728. "nodes" : [ {
  21729. "operator" : "OR",
  21730. "children" : [ ],
  21731. "cpe_match" : [ {
  21732. "vulnerable" : true,
  21733. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  21734. "versionStartIncluding" : "9.8:",
  21735. "versionEndExcluding" : "9.8.4.34:",
  21736. "cpe_name" : [ ]
  21737. }, {
  21738. "vulnerable" : true,
  21739. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  21740. "versionStartIncluding" : "9.9:",
  21741. "versionEndExcluding" : "9.9.2.85:",
  21742. "cpe_name" : [ ]
  21743. }, {
  21744. "vulnerable" : true,
  21745. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  21746. "versionStartIncluding" : "9.10:",
  21747. "versionEndExcluding" : "9.12.4.18:",
  21748. "cpe_name" : [ ]
  21749. }, {
  21750. "vulnerable" : true,
  21751. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  21752. "versionStartIncluding" : "9.13:",
  21753. "versionEndExcluding" : "9.13.1.21:",
  21754. "cpe_name" : [ ]
  21755. }, {
  21756. "vulnerable" : true,
  21757. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  21758. "versionStartIncluding" : "9.14:",
  21759. "versionEndExcluding" : "9.14.2.13:",
  21760. "cpe_name" : [ ]
  21761. }, {
  21762. "vulnerable" : true,
  21763. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  21764. "versionStartIncluding" : "9.15:",
  21765. "versionEndExcluding" : "9.15.1.15:",
  21766. "cpe_name" : [ ]
  21767. }, {
  21768. "vulnerable" : true,
  21769. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  21770. "versionStartIncluding" : "6.2.2:",
  21771. "versionEndExcluding" : "6.4.0.12:",
  21772. "cpe_name" : [ ]
  21773. }, {
  21774. "vulnerable" : true,
  21775. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  21776. "versionStartIncluding" : "6.5.0:",
  21777. "versionEndExcluding" : "6.6.4:",
  21778. "cpe_name" : [ ]
  21779. }, {
  21780. "vulnerable" : true,
  21781. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  21782. "versionStartIncluding" : "6.7.0:",
  21783. "versionEndExcluding" : "6.7.0.2:",
  21784. "cpe_name" : [ ]
  21785. } ]
  21786. } ]
  21787. },
  21788. "impact" : {
  21789. "baseMetricV3" : {
  21790. "cvssV3" : {
  21791. "version" : "3.1",
  21792. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  21793. "attackVector" : "NETWORK",
  21794. "attackComplexity" : "LOW",
  21795. "privilegesRequired" : "NONE",
  21796. "userInteraction" : "NONE",
  21797. "scope" : "UNCHANGED",
  21798. "confidentialityImpact" : "NONE",
  21799. "integrityImpact" : "NONE",
  21800. "availabilityImpact" : "HIGH",
  21801. "baseScore" : 7.5,
  21802. "baseSeverity" : "HIGH"
  21803. },
  21804. "exploitabilityScore" : 3.9,
  21805. "impactScore" : 3.6
  21806. },
  21807. "baseMetricV2" : {
  21808. "cvssV2" : {
  21809. "version" : "2.0",
  21810. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C",
  21811. "accessVector" : "NETWORK",
  21812. "accessComplexity" : "LOW",
  21813. "authentication" : "NONE",
  21814. "confidentialityImpact" : "NONE",
  21815. "integrityImpact" : "NONE",
  21816. "availabilityImpact" : "COMPLETE",
  21817. "baseScore" : 7.8
  21818. },
  21819. "severity" : "HIGH",
  21820. "exploitabilityScore" : 10.0,
  21821. "impactScore" : 6.9,
  21822. "acInsufInfo" : false,
  21823. "obtainAllPrivilege" : false,
  21824. "obtainUserPrivilege" : false,
  21825. "obtainOtherPrivilege" : false,
  21826. "userInteractionRequired" : false
  21827. }
  21828. },
  21829. "publishedDate" : "2021-04-29T18:15Z",
  21830. "lastModifiedDate" : "2021-05-09T03:24Z"
  21831. }, {
  21832. "cve" : {
  21833. "data_type" : "CVE",
  21834. "data_format" : "MITRE",
  21835. "data_version" : "4.0",
  21836. "CVE_data_meta" : {
  21837. "ID" : "CVE-2021-1495",
  21838. "ASSIGNER" : "psirt@cisco.com"
  21839. },
  21840. "problemtype" : {
  21841. "problemtype_data" : [ {
  21842. "description" : [ {
  21843. "lang" : "en",
  21844. "value" : "CWE-755"
  21845. } ]
  21846. } ]
  21847. },
  21848. "references" : {
  21849. "reference_data" : [ {
  21850. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-fp-bp-KfDdcQhc",
  21851. "name" : "20210428 Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability",
  21852. "refsource" : "CISCO",
  21853. "tags" : [ "Vendor Advisory" ]
  21854. } ]
  21855. },
  21856. "description" : {
  21857. "description_data" : [ {
  21858. "lang" : "en",
  21859. "value" : "Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect handling of specific HTTP header parameters. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured file policy for HTTP packets and deliver a malicious payload."
  21860. } ]
  21861. }
  21862. },
  21863. "configurations" : {
  21864. "CVE_data_version" : "4.0",
  21865. "nodes" : [ {
  21866. "operator" : "OR",
  21867. "children" : [ ],
  21868. "cpe_match" : [ {
  21869. "vulnerable" : true,
  21870. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  21871. "versionEndExcluding" : "6.4.0.12:",
  21872. "cpe_name" : [ ]
  21873. }, {
  21874. "vulnerable" : true,
  21875. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  21876. "versionStartIncluding" : "6.5.0:",
  21877. "versionEndExcluding" : "6.6.4:",
  21878. "cpe_name" : [ ]
  21879. }, {
  21880. "vulnerable" : true,
  21881. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  21882. "versionStartIncluding" : "6.7.0:",
  21883. "versionEndExcluding" : "6.7.0.2:",
  21884. "cpe_name" : [ ]
  21885. } ]
  21886. }, {
  21887. "operator" : "AND",
  21888. "children" : [ {
  21889. "operator" : "OR",
  21890. "children" : [ ],
  21891. "cpe_match" : [ {
  21892. "vulnerable" : true,
  21893. "cpe23Uri" : "cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:*",
  21894. "versionStartIncluding" : "16.12:",
  21895. "versionEndExcluding" : "16.12.5:",
  21896. "cpe_name" : [ ]
  21897. }, {
  21898. "vulnerable" : true,
  21899. "cpe23Uri" : "cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:*",
  21900. "versionStartIncluding" : "17.1:",
  21901. "versionEndExcluding" : "17.3.3:",
  21902. "cpe_name" : [ ]
  21903. }, {
  21904. "vulnerable" : true,
  21905. "cpe23Uri" : "cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:*",
  21906. "versionStartIncluding" : "17.4:",
  21907. "versionEndExcluding" : "17.4.1:",
  21908. "cpe_name" : [ ]
  21909. }, {
  21910. "vulnerable" : true,
  21911. "cpe23Uri" : "cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*",
  21912. "versionEndExcluding" : "2.9.17.1:",
  21913. "cpe_name" : [ ]
  21914. } ]
  21915. }, {
  21916. "operator" : "OR",
  21917. "children" : [ ],
  21918. "cpe_match" : [ {
  21919. "vulnerable" : false,
  21920. "cpe23Uri" : "cpe:2.3:h:cisco:c8200-1n-4t:-:*:*:*:*:*:*:*",
  21921. "cpe_name" : [ ]
  21922. }, {
  21923. "vulnerable" : false,
  21924. "cpe23Uri" : "cpe:2.3:h:cisco:c8200l-1n-4t:-:*:*:*:*:*:*:*",
  21925. "cpe_name" : [ ]
  21926. }, {
  21927. "vulnerable" : false,
  21928. "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*",
  21929. "cpe_name" : [ ]
  21930. }, {
  21931. "vulnerable" : false,
  21932. "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*",
  21933. "cpe_name" : [ ]
  21934. }, {
  21935. "vulnerable" : false,
  21936. "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*",
  21937. "cpe_name" : [ ]
  21938. }, {
  21939. "vulnerable" : false,
  21940. "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*",
  21941. "cpe_name" : [ ]
  21942. }, {
  21943. "vulnerable" : false,
  21944. "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*",
  21945. "cpe_name" : [ ]
  21946. }, {
  21947. "vulnerable" : false,
  21948. "cpe23Uri" : "cpe:2.3:h:cisco:isr_1100-4g\\/6g:-:*:*:*:*:*:*:*",
  21949. "cpe_name" : [ ]
  21950. }, {
  21951. "vulnerable" : false,
  21952. "cpe23Uri" : "cpe:2.3:h:cisco:isr_1101:-:*:*:*:*:*:*:*",
  21953. "cpe_name" : [ ]
  21954. }, {
  21955. "vulnerable" : false,
  21956. "cpe23Uri" : "cpe:2.3:h:cisco:isr_1109:-:*:*:*:*:*:*:*",
  21957. "cpe_name" : [ ]
  21958. }, {
  21959. "vulnerable" : false,
  21960. "cpe23Uri" : "cpe:2.3:h:cisco:isr_1111x:-:*:*:*:*:*:*:*",
  21961. "cpe_name" : [ ]
  21962. }, {
  21963. "vulnerable" : false,
  21964. "cpe23Uri" : "cpe:2.3:h:cisco:isr_111x:-:*:*:*:*:*:*:*",
  21965. "cpe_name" : [ ]
  21966. }, {
  21967. "vulnerable" : false,
  21968. "cpe23Uri" : "cpe:2.3:h:cisco:isr_1120:-:*:*:*:*:*:*:*",
  21969. "cpe_name" : [ ]
  21970. }, {
  21971. "vulnerable" : false,
  21972. "cpe23Uri" : "cpe:2.3:h:cisco:isr_1160:-:*:*:*:*:*:*:*",
  21973. "cpe_name" : [ ]
  21974. }, {
  21975. "vulnerable" : false,
  21976. "cpe23Uri" : "cpe:2.3:h:cisco:isr_3000:-:*:*:*:*:*:*:*",
  21977. "cpe_name" : [ ]
  21978. }, {
  21979. "vulnerable" : false,
  21980. "cpe23Uri" : "cpe:2.3:h:cisco:isr_4221:-:*:*:*:*:*:*:*",
  21981. "cpe_name" : [ ]
  21982. }, {
  21983. "vulnerable" : false,
  21984. "cpe23Uri" : "cpe:2.3:h:cisco:isr_4331:-:*:*:*:*:*:*:*",
  21985. "cpe_name" : [ ]
  21986. }, {
  21987. "vulnerable" : false,
  21988. "cpe23Uri" : "cpe:2.3:h:cisco:isr_4431:-:*:*:*:*:*:*:*",
  21989. "cpe_name" : [ ]
  21990. }, {
  21991. "vulnerable" : false,
  21992. "cpe23Uri" : "cpe:2.3:h:cisco:isr_4461:-:*:*:*:*:*:*:*",
  21993. "cpe_name" : [ ]
  21994. } ]
  21995. } ],
  21996. "cpe_match" : [ ]
  21997. } ]
  21998. },
  21999. "impact" : {
  22000. "baseMetricV3" : {
  22001. "cvssV3" : {
  22002. "version" : "3.1",
  22003. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
  22004. "attackVector" : "NETWORK",
  22005. "attackComplexity" : "LOW",
  22006. "privilegesRequired" : "NONE",
  22007. "userInteraction" : "NONE",
  22008. "scope" : "UNCHANGED",
  22009. "confidentialityImpact" : "NONE",
  22010. "integrityImpact" : "LOW",
  22011. "availabilityImpact" : "NONE",
  22012. "baseScore" : 5.3,
  22013. "baseSeverity" : "MEDIUM"
  22014. },
  22015. "exploitabilityScore" : 3.9,
  22016. "impactScore" : 1.4
  22017. },
  22018. "baseMetricV2" : {
  22019. "cvssV2" : {
  22020. "version" : "2.0",
  22021. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  22022. "accessVector" : "NETWORK",
  22023. "accessComplexity" : "LOW",
  22024. "authentication" : "NONE",
  22025. "confidentialityImpact" : "NONE",
  22026. "integrityImpact" : "PARTIAL",
  22027. "availabilityImpact" : "NONE",
  22028. "baseScore" : 5.0
  22029. },
  22030. "severity" : "MEDIUM",
  22031. "exploitabilityScore" : 10.0,
  22032. "impactScore" : 2.9,
  22033. "acInsufInfo" : false,
  22034. "obtainAllPrivilege" : false,
  22035. "obtainUserPrivilege" : false,
  22036. "obtainOtherPrivilege" : false,
  22037. "userInteractionRequired" : false
  22038. }
  22039. },
  22040. "publishedDate" : "2021-04-29T18:15Z",
  22041. "lastModifiedDate" : "2021-05-09T02:35Z"
  22042. }, {
  22043. "cve" : {
  22044. "data_type" : "CVE",
  22045. "data_format" : "MITRE",
  22046. "data_version" : "4.0",
  22047. "CVE_data_meta" : {
  22048. "ID" : "CVE-2021-1493",
  22049. "ASSIGNER" : "psirt@cisco.com"
  22050. },
  22051. "problemtype" : {
  22052. "problemtype_data" : [ {
  22053. "description" : [ {
  22054. "lang" : "en",
  22055. "value" : "CWE-120"
  22056. } ]
  22057. } ]
  22058. },
  22059. "references" : {
  22060. "reference_data" : [ {
  22061. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-memc-dos-fncTyYKG",
  22062. "name" : "20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Buffer Overflow Denial of Service Vulnerability",
  22063. "refsource" : "CISCO",
  22064. "tags" : [ "Vendor Advisory" ]
  22065. } ]
  22066. },
  22067. "description" : {
  22068. "description_data" : [ {
  22069. "lang" : "en",
  22070. "value" : "A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a buffer overflow on an affected system. The vulnerability is due to insufficient boundary checks for specific data that is provided to the web services interface of an affected system. An attacker could exploit this vulnerability by sending a malicious HTTP request. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could disclose data fragments or cause the device to reload, resulting in a denial of service (DoS) condition."
  22071. } ]
  22072. }
  22073. },
  22074. "configurations" : {
  22075. "CVE_data_version" : "4.0",
  22076. "nodes" : [ {
  22077. "operator" : "OR",
  22078. "children" : [ ],
  22079. "cpe_match" : [ {
  22080. "vulnerable" : true,
  22081. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  22082. "versionStartIncluding" : "9.8:",
  22083. "versionEndExcluding" : "9.8.4.34:",
  22084. "cpe_name" : [ ]
  22085. }, {
  22086. "vulnerable" : true,
  22087. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  22088. "versionStartIncluding" : "9.9:",
  22089. "versionEndExcluding" : "9.9.2.85:",
  22090. "cpe_name" : [ ]
  22091. }, {
  22092. "vulnerable" : true,
  22093. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  22094. "versionStartIncluding" : "9.10:",
  22095. "versionEndExcluding" : "9.12.4.13:",
  22096. "cpe_name" : [ ]
  22097. }, {
  22098. "vulnerable" : true,
  22099. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  22100. "versionStartIncluding" : "9.13:",
  22101. "versionEndExcluding" : "9.13.1.21:",
  22102. "cpe_name" : [ ]
  22103. }, {
  22104. "vulnerable" : true,
  22105. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  22106. "versionStartIncluding" : "9.14:",
  22107. "versionEndExcluding" : "9.14.2.8:",
  22108. "cpe_name" : [ ]
  22109. }, {
  22110. "vulnerable" : true,
  22111. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  22112. "versionStartIncluding" : "9.15:",
  22113. "versionEndExcluding" : "9.15.1.7:",
  22114. "cpe_name" : [ ]
  22115. }, {
  22116. "vulnerable" : true,
  22117. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  22118. "versionEndExcluding" : "6.4.0.12:",
  22119. "cpe_name" : [ ]
  22120. }, {
  22121. "vulnerable" : true,
  22122. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  22123. "versionStartIncluding" : "6.5.0:",
  22124. "versionEndExcluding" : "6.6.3:",
  22125. "cpe_name" : [ ]
  22126. }, {
  22127. "vulnerable" : true,
  22128. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  22129. "versionStartIncluding" : "6.7.0:",
  22130. "versionEndExcluding" : "6.7.0.1:",
  22131. "cpe_name" : [ ]
  22132. } ]
  22133. } ]
  22134. },
  22135. "impact" : {
  22136. "baseMetricV3" : {
  22137. "cvssV3" : {
  22138. "version" : "3.1",
  22139. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
  22140. "attackVector" : "NETWORK",
  22141. "attackComplexity" : "LOW",
  22142. "privilegesRequired" : "LOW",
  22143. "userInteraction" : "NONE",
  22144. "scope" : "UNCHANGED",
  22145. "confidentialityImpact" : "LOW",
  22146. "integrityImpact" : "NONE",
  22147. "availabilityImpact" : "HIGH",
  22148. "baseScore" : 7.1,
  22149. "baseSeverity" : "HIGH"
  22150. },
  22151. "exploitabilityScore" : 2.8,
  22152. "impactScore" : 4.2
  22153. },
  22154. "baseMetricV2" : {
  22155. "cvssV2" : {
  22156. "version" : "2.0",
  22157. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:C",
  22158. "accessVector" : "NETWORK",
  22159. "accessComplexity" : "LOW",
  22160. "authentication" : "SINGLE",
  22161. "confidentialityImpact" : "PARTIAL",
  22162. "integrityImpact" : "NONE",
  22163. "availabilityImpact" : "COMPLETE",
  22164. "baseScore" : 7.5
  22165. },
  22166. "severity" : "HIGH",
  22167. "exploitabilityScore" : 8.0,
  22168. "impactScore" : 7.8,
  22169. "acInsufInfo" : true,
  22170. "obtainAllPrivilege" : false,
  22171. "obtainUserPrivilege" : false,
  22172. "obtainOtherPrivilege" : false,
  22173. "userInteractionRequired" : false
  22174. }
  22175. },
  22176. "publishedDate" : "2021-04-29T18:15Z",
  22177. "lastModifiedDate" : "2021-05-09T03:33Z"
  22178. }, {
  22179. "cve" : {
  22180. "data_type" : "CVE",
  22181. "data_format" : "MITRE",
  22182. "data_version" : "4.0",
  22183. "CVE_data_meta" : {
  22184. "ID" : "CVE-2021-1489",
  22185. "ASSIGNER" : "psirt@cisco.com"
  22186. },
  22187. "problemtype" : {
  22188. "problemtype_data" : [ {
  22189. "description" : [ {
  22190. "lang" : "en",
  22191. "value" : "CWE-400"
  22192. } ]
  22193. } ]
  22194. },
  22195. "references" : {
  22196. "reference_data" : [ {
  22197. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fdm-dos-nFES8xTN",
  22198. "name" : "20210428 Cisco Firepower Device Manager Software Filesystem Space Exhaustion Denial of Service Vulnerability",
  22199. "refsource" : "CISCO",
  22200. "tags" : [ "Vendor Advisory" ]
  22201. } ]
  22202. },
  22203. "description" : {
  22204. "description_data" : [ {
  22205. "lang" : "en",
  22206. "value" : "A vulnerability in filesystem usage management for Cisco Firepower Device Manager (FDM) Software could allow an authenticated, remote attacker to exhaust filesystem resources, resulting in a denial of service (DoS) condition on an affected device. This vulnerability is due to the insufficient management of available filesystem resources. An attacker could exploit this vulnerability by uploading files to the device and exhausting available filesystem resources. A successful exploit could allow the attacker to cause database errors and cause the device to become unresponsive to web-based management. Manual intervention is required to free filesystem resources and return the device to an operational state."
  22207. } ]
  22208. }
  22209. },
  22210. "configurations" : {
  22211. "CVE_data_version" : "4.0",
  22212. "nodes" : [ {
  22213. "operator" : "AND",
  22214. "children" : [ {
  22215. "operator" : "OR",
  22216. "children" : [ ],
  22217. "cpe_match" : [ {
  22218. "vulnerable" : true,
  22219. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_device_manager:*:*:*:*:*:*:*:*",
  22220. "versionStartIncluding" : "6.4.0:",
  22221. "versionEndExcluding" : "6.4.0.12:",
  22222. "cpe_name" : [ ]
  22223. }, {
  22224. "vulnerable" : true,
  22225. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_device_manager:*:*:*:*:*:*:*:*",
  22226. "versionStartIncluding" : "6.5.0:",
  22227. "versionEndExcluding" : "6.6.4:",
  22228. "cpe_name" : [ ]
  22229. }, {
  22230. "vulnerable" : true,
  22231. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_device_manager:*:*:*:*:*:*:*:*",
  22232. "versionStartIncluding" : "6.7.0:",
  22233. "versionEndExcluding" : "6.7.0.2:",
  22234. "cpe_name" : [ ]
  22235. } ]
  22236. }, {
  22237. "operator" : "OR",
  22238. "children" : [ ],
  22239. "cpe_match" : [ {
  22240. "vulnerable" : false,
  22241. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*",
  22242. "cpe_name" : [ ]
  22243. }, {
  22244. "vulnerable" : false,
  22245. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*",
  22246. "cpe_name" : [ ]
  22247. }, {
  22248. "vulnerable" : false,
  22249. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*",
  22250. "cpe_name" : [ ]
  22251. }, {
  22252. "vulnerable" : false,
  22253. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*",
  22254. "cpe_name" : [ ]
  22255. }, {
  22256. "vulnerable" : false,
  22257. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
  22258. "cpe_name" : [ ]
  22259. }, {
  22260. "vulnerable" : false,
  22261. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
  22262. "cpe_name" : [ ]
  22263. }, {
  22264. "vulnerable" : false,
  22265. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
  22266. "cpe_name" : [ ]
  22267. }, {
  22268. "vulnerable" : false,
  22269. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
  22270. "cpe_name" : [ ]
  22271. }, {
  22272. "vulnerable" : false,
  22273. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
  22274. "cpe_name" : [ ]
  22275. }, {
  22276. "vulnerable" : false,
  22277. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*",
  22278. "cpe_name" : [ ]
  22279. }, {
  22280. "vulnerable" : false,
  22281. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*",
  22282. "cpe_name" : [ ]
  22283. }, {
  22284. "vulnerable" : false,
  22285. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
  22286. "cpe_name" : [ ]
  22287. }, {
  22288. "vulnerable" : false,
  22289. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*",
  22290. "cpe_name" : [ ]
  22291. }, {
  22292. "vulnerable" : false,
  22293. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
  22294. "cpe_name" : [ ]
  22295. }, {
  22296. "vulnerable" : false,
  22297. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*",
  22298. "cpe_name" : [ ]
  22299. }, {
  22300. "vulnerable" : false,
  22301. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
  22302. "cpe_name" : [ ]
  22303. }, {
  22304. "vulnerable" : false,
  22305. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*",
  22306. "cpe_name" : [ ]
  22307. } ]
  22308. } ],
  22309. "cpe_match" : [ ]
  22310. } ]
  22311. },
  22312. "impact" : {
  22313. "baseMetricV3" : {
  22314. "cvssV3" : {
  22315. "version" : "3.1",
  22316. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  22317. "attackVector" : "NETWORK",
  22318. "attackComplexity" : "LOW",
  22319. "privilegesRequired" : "LOW",
  22320. "userInteraction" : "NONE",
  22321. "scope" : "UNCHANGED",
  22322. "confidentialityImpact" : "NONE",
  22323. "integrityImpact" : "NONE",
  22324. "availabilityImpact" : "HIGH",
  22325. "baseScore" : 6.5,
  22326. "baseSeverity" : "MEDIUM"
  22327. },
  22328. "exploitabilityScore" : 2.8,
  22329. "impactScore" : 3.6
  22330. },
  22331. "baseMetricV2" : {
  22332. "cvssV2" : {
  22333. "version" : "2.0",
  22334. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:C",
  22335. "accessVector" : "NETWORK",
  22336. "accessComplexity" : "LOW",
  22337. "authentication" : "SINGLE",
  22338. "confidentialityImpact" : "NONE",
  22339. "integrityImpact" : "NONE",
  22340. "availabilityImpact" : "COMPLETE",
  22341. "baseScore" : 6.8
  22342. },
  22343. "severity" : "MEDIUM",
  22344. "exploitabilityScore" : 8.0,
  22345. "impactScore" : 6.9,
  22346. "acInsufInfo" : false,
  22347. "obtainAllPrivilege" : false,
  22348. "obtainUserPrivilege" : false,
  22349. "obtainOtherPrivilege" : false,
  22350. "userInteractionRequired" : false
  22351. }
  22352. },
  22353. "publishedDate" : "2021-04-29T18:15Z",
  22354. "lastModifiedDate" : "2021-05-09T02:41Z"
  22355. }, {
  22356. "cve" : {
  22357. "data_type" : "CVE",
  22358. "data_format" : "MITRE",
  22359. "data_version" : "4.0",
  22360. "CVE_data_meta" : {
  22361. "ID" : "CVE-2021-1488",
  22362. "ASSIGNER" : "psirt@cisco.com"
  22363. },
  22364. "problemtype" : {
  22365. "problemtype_data" : [ {
  22366. "description" : [ {
  22367. "lang" : "en",
  22368. "value" : "CWE-77"
  22369. } ]
  22370. } ]
  22371. },
  22372. "references" : {
  22373. "reference_data" : [ {
  22374. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-cmdinj-TKyQfDcU",
  22375. "name" : "20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000 and 2100 Series Appliances Command Injection Vulnerability",
  22376. "refsource" : "CISCO",
  22377. "tags" : [ "Vendor Advisory" ]
  22378. } ]
  22379. },
  22380. "description" : {
  22381. "description_data" : [ {
  22382. "lang" : "en",
  22383. "value" : "A vulnerability in the upgrade process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject commands that could be executed with root privileges on the underlying operating system (OS). This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted upgrade package file to an affected device. A successful exploit could allow the attacker to inject commands that could be executed with root privileges on the underlying OS."
  22384. } ]
  22385. }
  22386. },
  22387. "configurations" : {
  22388. "CVE_data_version" : "4.0",
  22389. "nodes" : [ {
  22390. "operator" : "AND",
  22391. "children" : [ {
  22392. "operator" : "OR",
  22393. "children" : [ ],
  22394. "cpe_match" : [ {
  22395. "vulnerable" : true,
  22396. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  22397. "versionStartIncluding" : "9.13:",
  22398. "versionEndExcluding" : "9.13.1.21:",
  22399. "cpe_name" : [ ]
  22400. }, {
  22401. "vulnerable" : true,
  22402. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  22403. "versionStartIncluding" : "9.14:",
  22404. "versionEndExcluding" : "9.14.2.13:",
  22405. "cpe_name" : [ ]
  22406. }, {
  22407. "vulnerable" : true,
  22408. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  22409. "versionStartIncluding" : "9.15:",
  22410. "versionEndExcluding" : "9.15.1.10:",
  22411. "cpe_name" : [ ]
  22412. }, {
  22413. "vulnerable" : true,
  22414. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  22415. "versionStartIncluding" : "6.5.0:",
  22416. "versionEndExcluding" : "6.6.4:",
  22417. "cpe_name" : [ ]
  22418. }, {
  22419. "vulnerable" : true,
  22420. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  22421. "versionStartIncluding" : "6.7.0:",
  22422. "versionEndExcluding" : "6.7.0.2:",
  22423. "cpe_name" : [ ]
  22424. } ]
  22425. }, {
  22426. "operator" : "OR",
  22427. "children" : [ ],
  22428. "cpe_match" : [ {
  22429. "vulnerable" : false,
  22430. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*",
  22431. "cpe_name" : [ ]
  22432. }, {
  22433. "vulnerable" : false,
  22434. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*",
  22435. "cpe_name" : [ ]
  22436. }, {
  22437. "vulnerable" : false,
  22438. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*",
  22439. "cpe_name" : [ ]
  22440. }, {
  22441. "vulnerable" : false,
  22442. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*",
  22443. "cpe_name" : [ ]
  22444. }, {
  22445. "vulnerable" : false,
  22446. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
  22447. "cpe_name" : [ ]
  22448. }, {
  22449. "vulnerable" : false,
  22450. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
  22451. "cpe_name" : [ ]
  22452. }, {
  22453. "vulnerable" : false,
  22454. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
  22455. "cpe_name" : [ ]
  22456. }, {
  22457. "vulnerable" : false,
  22458. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
  22459. "cpe_name" : [ ]
  22460. } ]
  22461. } ],
  22462. "cpe_match" : [ ]
  22463. } ]
  22464. },
  22465. "impact" : {
  22466. "baseMetricV3" : {
  22467. "cvssV3" : {
  22468. "version" : "3.1",
  22469. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  22470. "attackVector" : "LOCAL",
  22471. "attackComplexity" : "LOW",
  22472. "privilegesRequired" : "HIGH",
  22473. "userInteraction" : "NONE",
  22474. "scope" : "UNCHANGED",
  22475. "confidentialityImpact" : "HIGH",
  22476. "integrityImpact" : "HIGH",
  22477. "availabilityImpact" : "HIGH",
  22478. "baseScore" : 6.7,
  22479. "baseSeverity" : "MEDIUM"
  22480. },
  22481. "exploitabilityScore" : 0.8,
  22482. "impactScore" : 5.9
  22483. },
  22484. "baseMetricV2" : {
  22485. "cvssV2" : {
  22486. "version" : "2.0",
  22487. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  22488. "accessVector" : "LOCAL",
  22489. "accessComplexity" : "LOW",
  22490. "authentication" : "NONE",
  22491. "confidentialityImpact" : "COMPLETE",
  22492. "integrityImpact" : "COMPLETE",
  22493. "availabilityImpact" : "COMPLETE",
  22494. "baseScore" : 7.2
  22495. },
  22496. "severity" : "HIGH",
  22497. "exploitabilityScore" : 3.9,
  22498. "impactScore" : 10.0,
  22499. "acInsufInfo" : false,
  22500. "obtainAllPrivilege" : false,
  22501. "obtainUserPrivilege" : false,
  22502. "obtainOtherPrivilege" : false,
  22503. "userInteractionRequired" : false
  22504. }
  22505. },
  22506. "publishedDate" : "2021-04-29T18:15Z",
  22507. "lastModifiedDate" : "2021-05-09T03:52Z"
  22508. }, {
  22509. "cve" : {
  22510. "data_type" : "CVE",
  22511. "data_format" : "MITRE",
  22512. "data_version" : "4.0",
  22513. "CVE_data_meta" : {
  22514. "ID" : "CVE-2021-1477",
  22515. "ASSIGNER" : "psirt@cisco.com"
  22516. },
  22517. "problemtype" : {
  22518. "problemtype_data" : [ {
  22519. "description" : [ {
  22520. "lang" : "en",
  22521. "value" : "CWE-269"
  22522. } ]
  22523. } ]
  22524. },
  22525. "references" : {
  22526. "reference_data" : [ {
  22527. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-iac-pZDMQ4wC",
  22528. "name" : "20210428 Cisco Firepower Management Center Software Policy Vulnerability",
  22529. "refsource" : "CISCO",
  22530. "tags" : [ "Vendor Advisory" ]
  22531. } ]
  22532. },
  22533. "description" : {
  22534. "description_data" : [ {
  22535. "lang" : "en",
  22536. "value" : "A vulnerability in an access control mechanism of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to access services beyond the scope of their authorization. This vulnerability is due to insufficient enforcement of access control in the affected software. An attacker could exploit this vulnerability by directly accessing the internal services of an affected device. A successful exploit could allow the attacker to overwrite policies and impact the configuration and operation of the affected device."
  22537. } ]
  22538. }
  22539. },
  22540. "configurations" : {
  22541. "CVE_data_version" : "4.0",
  22542. "nodes" : [ {
  22543. "operator" : "OR",
  22544. "children" : [ ],
  22545. "cpe_match" : [ {
  22546. "vulnerable" : true,
  22547. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  22548. "versionEndExcluding" : "6.4.0.12:",
  22549. "cpe_name" : [ ]
  22550. }, {
  22551. "vulnerable" : true,
  22552. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  22553. "versionStartIncluding" : "6.5.0:",
  22554. "versionEndExcluding" : "6.6.3:",
  22555. "cpe_name" : [ ]
  22556. }, {
  22557. "vulnerable" : true,
  22558. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  22559. "versionStartIncluding" : "6.7.0:",
  22560. "versionEndExcluding" : "6.7.0.2:",
  22561. "cpe_name" : [ ]
  22562. } ]
  22563. } ]
  22564. },
  22565. "impact" : {
  22566. "baseMetricV3" : {
  22567. "cvssV3" : {
  22568. "version" : "3.1",
  22569. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
  22570. "attackVector" : "NETWORK",
  22571. "attackComplexity" : "LOW",
  22572. "privilegesRequired" : "LOW",
  22573. "userInteraction" : "NONE",
  22574. "scope" : "UNCHANGED",
  22575. "confidentialityImpact" : "NONE",
  22576. "integrityImpact" : "LOW",
  22577. "availabilityImpact" : "NONE",
  22578. "baseScore" : 4.3,
  22579. "baseSeverity" : "MEDIUM"
  22580. },
  22581. "exploitabilityScore" : 2.8,
  22582. "impactScore" : 1.4
  22583. },
  22584. "baseMetricV2" : {
  22585. "cvssV2" : {
  22586. "version" : "2.0",
  22587. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:N",
  22588. "accessVector" : "NETWORK",
  22589. "accessComplexity" : "LOW",
  22590. "authentication" : "SINGLE",
  22591. "confidentialityImpact" : "NONE",
  22592. "integrityImpact" : "PARTIAL",
  22593. "availabilityImpact" : "NONE",
  22594. "baseScore" : 4.0
  22595. },
  22596. "severity" : "MEDIUM",
  22597. "exploitabilityScore" : 8.0,
  22598. "impactScore" : 2.9,
  22599. "acInsufInfo" : false,
  22600. "obtainAllPrivilege" : false,
  22601. "obtainUserPrivilege" : false,
  22602. "obtainOtherPrivilege" : false,
  22603. "userInteractionRequired" : false
  22604. }
  22605. },
  22606. "publishedDate" : "2021-04-29T18:15Z",
  22607. "lastModifiedDate" : "2021-05-09T03:16Z"
  22608. }, {
  22609. "cve" : {
  22610. "data_type" : "CVE",
  22611. "data_format" : "MITRE",
  22612. "data_version" : "4.0",
  22613. "CVE_data_meta" : {
  22614. "ID" : "CVE-2021-1476",
  22615. "ASSIGNER" : "psirt@cisco.com"
  22616. },
  22617. "problemtype" : {
  22618. "problemtype_data" : [ {
  22619. "description" : [ {
  22620. "lang" : "en",
  22621. "value" : "CWE-78"
  22622. } ]
  22623. } ]
  22624. },
  22625. "references" : {
  22626. "reference_data" : [ {
  22627. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG",
  22628. "name" : "20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability",
  22629. "refsource" : "CISCO",
  22630. "tags" : [ "Vendor Advisory" ]
  22631. } ]
  22632. },
  22633. "description" : {
  22634. "description_data" : [ {
  22635. "lang" : "en",
  22636. "value" : "A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials."
  22637. } ]
  22638. }
  22639. },
  22640. "configurations" : {
  22641. "CVE_data_version" : "4.0",
  22642. "nodes" : [ {
  22643. "operator" : "OR",
  22644. "children" : [ ],
  22645. "cpe_match" : [ {
  22646. "vulnerable" : true,
  22647. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  22648. "versionStartIncluding" : "9.13:",
  22649. "versionEndExcluding" : "9.13.1.21:",
  22650. "cpe_name" : [ ]
  22651. }, {
  22652. "vulnerable" : true,
  22653. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  22654. "versionStartIncluding" : "9.14:",
  22655. "versionEndExcluding" : "9.14.2.13:",
  22656. "cpe_name" : [ ]
  22657. }, {
  22658. "vulnerable" : true,
  22659. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  22660. "versionStartIncluding" : "9.15:",
  22661. "versionEndExcluding" : "9.15.1.10:",
  22662. "cpe_name" : [ ]
  22663. }, {
  22664. "vulnerable" : true,
  22665. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  22666. "versionStartIncluding" : "6.5.0:",
  22667. "versionEndExcluding" : "6.6.4:",
  22668. "cpe_name" : [ ]
  22669. }, {
  22670. "vulnerable" : true,
  22671. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  22672. "versionStartIncluding" : "6.7.0:",
  22673. "versionEndExcluding" : "6.7.0.2:",
  22674. "cpe_name" : [ ]
  22675. } ]
  22676. } ]
  22677. },
  22678. "impact" : {
  22679. "baseMetricV3" : {
  22680. "cvssV3" : {
  22681. "version" : "3.1",
  22682. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  22683. "attackVector" : "LOCAL",
  22684. "attackComplexity" : "LOW",
  22685. "privilegesRequired" : "HIGH",
  22686. "userInteraction" : "NONE",
  22687. "scope" : "UNCHANGED",
  22688. "confidentialityImpact" : "HIGH",
  22689. "integrityImpact" : "HIGH",
  22690. "availabilityImpact" : "HIGH",
  22691. "baseScore" : 6.7,
  22692. "baseSeverity" : "MEDIUM"
  22693. },
  22694. "exploitabilityScore" : 0.8,
  22695. "impactScore" : 5.9
  22696. },
  22697. "baseMetricV2" : {
  22698. "cvssV2" : {
  22699. "version" : "2.0",
  22700. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  22701. "accessVector" : "LOCAL",
  22702. "accessComplexity" : "LOW",
  22703. "authentication" : "NONE",
  22704. "confidentialityImpact" : "COMPLETE",
  22705. "integrityImpact" : "COMPLETE",
  22706. "availabilityImpact" : "COMPLETE",
  22707. "baseScore" : 7.2
  22708. },
  22709. "severity" : "HIGH",
  22710. "exploitabilityScore" : 3.9,
  22711. "impactScore" : 10.0,
  22712. "acInsufInfo" : false,
  22713. "obtainAllPrivilege" : false,
  22714. "obtainUserPrivilege" : false,
  22715. "obtainOtherPrivilege" : false,
  22716. "userInteractionRequired" : false
  22717. }
  22718. },
  22719. "publishedDate" : "2021-04-29T18:15Z",
  22720. "lastModifiedDate" : "2021-05-09T04:00Z"
  22721. }, {
  22722. "cve" : {
  22723. "data_type" : "CVE",
  22724. "data_format" : "MITRE",
  22725. "data_version" : "4.0",
  22726. "CVE_data_meta" : {
  22727. "ID" : "CVE-2021-1458",
  22728. "ASSIGNER" : "psirt@cisco.com"
  22729. },
  22730. "problemtype" : {
  22731. "problemtype_data" : [ {
  22732. "description" : [ {
  22733. "lang" : "en",
  22734. "value" : "CWE-79"
  22735. } ]
  22736. } ]
  22737. },
  22738. "references" : {
  22739. "reference_data" : [ {
  22740. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA",
  22741. "name" : "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities",
  22742. "refsource" : "CISCO",
  22743. "tags" : [ "Vendor Advisory" ]
  22744. } ]
  22745. },
  22746. "description" : {
  22747. "description_data" : [ {
  22748. "lang" : "en",
  22749. "value" : "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information."
  22750. } ]
  22751. }
  22752. },
  22753. "configurations" : {
  22754. "CVE_data_version" : "4.0",
  22755. "nodes" : [ {
  22756. "operator" : "OR",
  22757. "children" : [ ],
  22758. "cpe_match" : [ {
  22759. "vulnerable" : true,
  22760. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  22761. "versionEndIncluding" : "6.4.0.11:",
  22762. "cpe_name" : [ ]
  22763. }, {
  22764. "vulnerable" : true,
  22765. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  22766. "versionStartIncluding" : "6.5.0:",
  22767. "versionEndExcluding" : "6.6.3:",
  22768. "cpe_name" : [ ]
  22769. }, {
  22770. "vulnerable" : true,
  22771. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  22772. "versionStartIncluding" : "6.7.0:",
  22773. "versionEndExcluding" : "6.7.0.2:",
  22774. "cpe_name" : [ ]
  22775. } ]
  22776. } ]
  22777. },
  22778. "impact" : {
  22779. "baseMetricV3" : {
  22780. "cvssV3" : {
  22781. "version" : "3.1",
  22782. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
  22783. "attackVector" : "NETWORK",
  22784. "attackComplexity" : "LOW",
  22785. "privilegesRequired" : "HIGH",
  22786. "userInteraction" : "REQUIRED",
  22787. "scope" : "CHANGED",
  22788. "confidentialityImpact" : "LOW",
  22789. "integrityImpact" : "LOW",
  22790. "availabilityImpact" : "NONE",
  22791. "baseScore" : 4.8,
  22792. "baseSeverity" : "MEDIUM"
  22793. },
  22794. "exploitabilityScore" : 1.7,
  22795. "impactScore" : 2.7
  22796. },
  22797. "baseMetricV2" : {
  22798. "cvssV2" : {
  22799. "version" : "2.0",
  22800. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  22801. "accessVector" : "NETWORK",
  22802. "accessComplexity" : "MEDIUM",
  22803. "authentication" : "SINGLE",
  22804. "confidentialityImpact" : "NONE",
  22805. "integrityImpact" : "PARTIAL",
  22806. "availabilityImpact" : "NONE",
  22807. "baseScore" : 3.5
  22808. },
  22809. "severity" : "LOW",
  22810. "exploitabilityScore" : 6.8,
  22811. "impactScore" : 2.9,
  22812. "acInsufInfo" : false,
  22813. "obtainAllPrivilege" : false,
  22814. "obtainUserPrivilege" : false,
  22815. "obtainOtherPrivilege" : false,
  22816. "userInteractionRequired" : true
  22817. }
  22818. },
  22819. "publishedDate" : "2021-04-29T18:15Z",
  22820. "lastModifiedDate" : "2021-05-05T17:55Z"
  22821. }, {
  22822. "cve" : {
  22823. "data_type" : "CVE",
  22824. "data_format" : "MITRE",
  22825. "data_version" : "4.0",
  22826. "CVE_data_meta" : {
  22827. "ID" : "CVE-2021-1457",
  22828. "ASSIGNER" : "psirt@cisco.com"
  22829. },
  22830. "problemtype" : {
  22831. "problemtype_data" : [ {
  22832. "description" : [ {
  22833. "lang" : "en",
  22834. "value" : "CWE-79"
  22835. } ]
  22836. } ]
  22837. },
  22838. "references" : {
  22839. "reference_data" : [ {
  22840. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA",
  22841. "name" : "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities",
  22842. "refsource" : "CISCO",
  22843. "tags" : [ "Vendor Advisory" ]
  22844. } ]
  22845. },
  22846. "description" : {
  22847. "description_data" : [ {
  22848. "lang" : "en",
  22849. "value" : "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information."
  22850. } ]
  22851. }
  22852. },
  22853. "configurations" : {
  22854. "CVE_data_version" : "4.0",
  22855. "nodes" : [ {
  22856. "operator" : "OR",
  22857. "children" : [ ],
  22858. "cpe_match" : [ {
  22859. "vulnerable" : true,
  22860. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  22861. "versionEndIncluding" : "6.4.0.11:",
  22862. "cpe_name" : [ ]
  22863. }, {
  22864. "vulnerable" : true,
  22865. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  22866. "versionStartIncluding" : "6.5.0:",
  22867. "versionEndExcluding" : "6.6.3:",
  22868. "cpe_name" : [ ]
  22869. }, {
  22870. "vulnerable" : true,
  22871. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  22872. "versionStartIncluding" : "6.7.0:",
  22873. "versionEndExcluding" : "6.7.0.2:",
  22874. "cpe_name" : [ ]
  22875. } ]
  22876. } ]
  22877. },
  22878. "impact" : {
  22879. "baseMetricV3" : {
  22880. "cvssV3" : {
  22881. "version" : "3.1",
  22882. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
  22883. "attackVector" : "NETWORK",
  22884. "attackComplexity" : "LOW",
  22885. "privilegesRequired" : "HIGH",
  22886. "userInteraction" : "REQUIRED",
  22887. "scope" : "CHANGED",
  22888. "confidentialityImpact" : "LOW",
  22889. "integrityImpact" : "LOW",
  22890. "availabilityImpact" : "NONE",
  22891. "baseScore" : 4.8,
  22892. "baseSeverity" : "MEDIUM"
  22893. },
  22894. "exploitabilityScore" : 1.7,
  22895. "impactScore" : 2.7
  22896. },
  22897. "baseMetricV2" : {
  22898. "cvssV2" : {
  22899. "version" : "2.0",
  22900. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  22901. "accessVector" : "NETWORK",
  22902. "accessComplexity" : "MEDIUM",
  22903. "authentication" : "SINGLE",
  22904. "confidentialityImpact" : "NONE",
  22905. "integrityImpact" : "PARTIAL",
  22906. "availabilityImpact" : "NONE",
  22907. "baseScore" : 3.5
  22908. },
  22909. "severity" : "LOW",
  22910. "exploitabilityScore" : 6.8,
  22911. "impactScore" : 2.9,
  22912. "acInsufInfo" : false,
  22913. "obtainAllPrivilege" : false,
  22914. "obtainUserPrivilege" : false,
  22915. "obtainOtherPrivilege" : false,
  22916. "userInteractionRequired" : true
  22917. }
  22918. },
  22919. "publishedDate" : "2021-04-29T18:15Z",
  22920. "lastModifiedDate" : "2021-05-05T17:59Z"
  22921. }, {
  22922. "cve" : {
  22923. "data_type" : "CVE",
  22924. "data_format" : "MITRE",
  22925. "data_version" : "4.0",
  22926. "CVE_data_meta" : {
  22927. "ID" : "CVE-2021-1456",
  22928. "ASSIGNER" : "psirt@cisco.com"
  22929. },
  22930. "problemtype" : {
  22931. "problemtype_data" : [ {
  22932. "description" : [ {
  22933. "lang" : "en",
  22934. "value" : "CWE-79"
  22935. } ]
  22936. } ]
  22937. },
  22938. "references" : {
  22939. "reference_data" : [ {
  22940. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA",
  22941. "name" : "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities",
  22942. "refsource" : "CISCO",
  22943. "tags" : [ "Vendor Advisory" ]
  22944. } ]
  22945. },
  22946. "description" : {
  22947. "description_data" : [ {
  22948. "lang" : "en",
  22949. "value" : "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information."
  22950. } ]
  22951. }
  22952. },
  22953. "configurations" : {
  22954. "CVE_data_version" : "4.0",
  22955. "nodes" : [ {
  22956. "operator" : "OR",
  22957. "children" : [ ],
  22958. "cpe_match" : [ {
  22959. "vulnerable" : true,
  22960. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  22961. "versionEndIncluding" : "6.4.0.11:",
  22962. "cpe_name" : [ ]
  22963. }, {
  22964. "vulnerable" : true,
  22965. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  22966. "versionStartIncluding" : "6.5.0:",
  22967. "versionEndExcluding" : "6.6.3:",
  22968. "cpe_name" : [ ]
  22969. }, {
  22970. "vulnerable" : true,
  22971. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  22972. "versionStartIncluding" : "6.7.0:",
  22973. "versionEndExcluding" : "6.7.0.2:",
  22974. "cpe_name" : [ ]
  22975. } ]
  22976. } ]
  22977. },
  22978. "impact" : {
  22979. "baseMetricV3" : {
  22980. "cvssV3" : {
  22981. "version" : "3.1",
  22982. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
  22983. "attackVector" : "NETWORK",
  22984. "attackComplexity" : "LOW",
  22985. "privilegesRequired" : "HIGH",
  22986. "userInteraction" : "REQUIRED",
  22987. "scope" : "CHANGED",
  22988. "confidentialityImpact" : "LOW",
  22989. "integrityImpact" : "LOW",
  22990. "availabilityImpact" : "NONE",
  22991. "baseScore" : 4.8,
  22992. "baseSeverity" : "MEDIUM"
  22993. },
  22994. "exploitabilityScore" : 1.7,
  22995. "impactScore" : 2.7
  22996. },
  22997. "baseMetricV2" : {
  22998. "cvssV2" : {
  22999. "version" : "2.0",
  23000. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  23001. "accessVector" : "NETWORK",
  23002. "accessComplexity" : "MEDIUM",
  23003. "authentication" : "SINGLE",
  23004. "confidentialityImpact" : "NONE",
  23005. "integrityImpact" : "PARTIAL",
  23006. "availabilityImpact" : "NONE",
  23007. "baseScore" : 3.5
  23008. },
  23009. "severity" : "LOW",
  23010. "exploitabilityScore" : 6.8,
  23011. "impactScore" : 2.9,
  23012. "acInsufInfo" : false,
  23013. "obtainAllPrivilege" : false,
  23014. "obtainUserPrivilege" : false,
  23015. "obtainOtherPrivilege" : false,
  23016. "userInteractionRequired" : true
  23017. }
  23018. },
  23019. "publishedDate" : "2021-04-29T18:15Z",
  23020. "lastModifiedDate" : "2021-05-05T17:59Z"
  23021. }, {
  23022. "cve" : {
  23023. "data_type" : "CVE",
  23024. "data_format" : "MITRE",
  23025. "data_version" : "4.0",
  23026. "CVE_data_meta" : {
  23027. "ID" : "CVE-2021-1455",
  23028. "ASSIGNER" : "psirt@cisco.com"
  23029. },
  23030. "problemtype" : {
  23031. "problemtype_data" : [ {
  23032. "description" : [ {
  23033. "lang" : "en",
  23034. "value" : "CWE-79"
  23035. } ]
  23036. } ]
  23037. },
  23038. "references" : {
  23039. "reference_data" : [ {
  23040. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yT8LNSeA",
  23041. "name" : "20210428 Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities",
  23042. "refsource" : "CISCO",
  23043. "tags" : [ "Vendor Advisory" ]
  23044. } ]
  23045. },
  23046. "description" : {
  23047. "description_data" : [ {
  23048. "lang" : "en",
  23049. "value" : "Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information."
  23050. } ]
  23051. }
  23052. },
  23053. "configurations" : {
  23054. "CVE_data_version" : "4.0",
  23055. "nodes" : [ {
  23056. "operator" : "OR",
  23057. "children" : [ ],
  23058. "cpe_match" : [ {
  23059. "vulnerable" : true,
  23060. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  23061. "versionEndIncluding" : "6.4.0.11:",
  23062. "cpe_name" : [ ]
  23063. }, {
  23064. "vulnerable" : true,
  23065. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  23066. "versionStartIncluding" : "6.5.0:",
  23067. "versionEndExcluding" : "6.6.3:",
  23068. "cpe_name" : [ ]
  23069. }, {
  23070. "vulnerable" : true,
  23071. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*",
  23072. "versionStartIncluding" : "6.7.0:",
  23073. "versionEndExcluding" : "6.7.0.2:",
  23074. "cpe_name" : [ ]
  23075. } ]
  23076. } ]
  23077. },
  23078. "impact" : {
  23079. "baseMetricV3" : {
  23080. "cvssV3" : {
  23081. "version" : "3.1",
  23082. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
  23083. "attackVector" : "NETWORK",
  23084. "attackComplexity" : "LOW",
  23085. "privilegesRequired" : "HIGH",
  23086. "userInteraction" : "REQUIRED",
  23087. "scope" : "CHANGED",
  23088. "confidentialityImpact" : "LOW",
  23089. "integrityImpact" : "LOW",
  23090. "availabilityImpact" : "NONE",
  23091. "baseScore" : 4.8,
  23092. "baseSeverity" : "MEDIUM"
  23093. },
  23094. "exploitabilityScore" : 1.7,
  23095. "impactScore" : 2.7
  23096. },
  23097. "baseMetricV2" : {
  23098. "cvssV2" : {
  23099. "version" : "2.0",
  23100. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  23101. "accessVector" : "NETWORK",
  23102. "accessComplexity" : "MEDIUM",
  23103. "authentication" : "SINGLE",
  23104. "confidentialityImpact" : "NONE",
  23105. "integrityImpact" : "PARTIAL",
  23106. "availabilityImpact" : "NONE",
  23107. "baseScore" : 3.5
  23108. },
  23109. "severity" : "LOW",
  23110. "exploitabilityScore" : 6.8,
  23111. "impactScore" : 2.9,
  23112. "acInsufInfo" : false,
  23113. "obtainAllPrivilege" : false,
  23114. "obtainUserPrivilege" : false,
  23115. "obtainOtherPrivilege" : false,
  23116. "userInteractionRequired" : true
  23117. }
  23118. },
  23119. "publishedDate" : "2021-04-29T18:15Z",
  23120. "lastModifiedDate" : "2021-05-05T17:31Z"
  23121. }, {
  23122. "cve" : {
  23123. "data_type" : "CVE",
  23124. "data_format" : "MITRE",
  23125. "data_version" : "4.0",
  23126. "CVE_data_meta" : {
  23127. "ID" : "CVE-2021-1448",
  23128. "ASSIGNER" : "psirt@cisco.com"
  23129. },
  23130. "problemtype" : {
  23131. "problemtype_data" : [ {
  23132. "description" : [ {
  23133. "lang" : "en",
  23134. "value" : "CWE-20"
  23135. } ]
  23136. } ]
  23137. },
  23138. "references" : {
  23139. "reference_data" : [ {
  23140. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmdinj-vWY5wqZT",
  23141. "name" : "20210428 Cisco Firepower Threat Defense Software Command Injection Vulnerability",
  23142. "refsource" : "CISCO",
  23143. "tags" : [ "Vendor Advisory" ]
  23144. } ]
  23145. },
  23146. "description" : {
  23147. "description_data" : [ {
  23148. "lang" : "en",
  23149. "value" : "A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges on the underlying operating system of an affected device that is running in multi-instance mode. This vulnerability is due to insufficient validation of user-supplied command arguments. An attacker could exploit this vulnerability by submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges."
  23150. } ]
  23151. }
  23152. },
  23153. "configurations" : {
  23154. "CVE_data_version" : "4.0",
  23155. "nodes" : [ {
  23156. "operator" : "AND",
  23157. "children" : [ {
  23158. "operator" : "OR",
  23159. "children" : [ ],
  23160. "cpe_match" : [ {
  23161. "vulnerable" : true,
  23162. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  23163. "versionStartIncluding" : "6.4.0",
  23164. "versionEndExcluding" : "6.4.0.10",
  23165. "cpe_name" : [ ]
  23166. }, {
  23167. "vulnerable" : true,
  23168. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  23169. "versionStartIncluding" : "6.5.0",
  23170. "versionEndExcluding" : "6.5.0.5",
  23171. "cpe_name" : [ ]
  23172. }, {
  23173. "vulnerable" : true,
  23174. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  23175. "versionStartIncluding" : "6.6.0",
  23176. "versionEndExcluding" : "6.6.1",
  23177. "cpe_name" : [ ]
  23178. } ]
  23179. }, {
  23180. "operator" : "OR",
  23181. "children" : [ ],
  23182. "cpe_match" : [ {
  23183. "vulnerable" : false,
  23184. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
  23185. "cpe_name" : [ ]
  23186. }, {
  23187. "vulnerable" : false,
  23188. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*",
  23189. "cpe_name" : [ ]
  23190. }, {
  23191. "vulnerable" : false,
  23192. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*",
  23193. "cpe_name" : [ ]
  23194. }, {
  23195. "vulnerable" : false,
  23196. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
  23197. "cpe_name" : [ ]
  23198. }, {
  23199. "vulnerable" : false,
  23200. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*",
  23201. "cpe_name" : [ ]
  23202. }, {
  23203. "vulnerable" : false,
  23204. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
  23205. "cpe_name" : [ ]
  23206. }, {
  23207. "vulnerable" : false,
  23208. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*",
  23209. "cpe_name" : [ ]
  23210. }, {
  23211. "vulnerable" : false,
  23212. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
  23213. "cpe_name" : [ ]
  23214. }, {
  23215. "vulnerable" : false,
  23216. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*",
  23217. "cpe_name" : [ ]
  23218. } ]
  23219. } ],
  23220. "cpe_match" : [ ]
  23221. } ]
  23222. },
  23223. "impact" : {
  23224. "baseMetricV3" : {
  23225. "cvssV3" : {
  23226. "version" : "3.1",
  23227. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  23228. "attackVector" : "LOCAL",
  23229. "attackComplexity" : "LOW",
  23230. "privilegesRequired" : "LOW",
  23231. "userInteraction" : "NONE",
  23232. "scope" : "UNCHANGED",
  23233. "confidentialityImpact" : "HIGH",
  23234. "integrityImpact" : "HIGH",
  23235. "availabilityImpact" : "HIGH",
  23236. "baseScore" : 7.8,
  23237. "baseSeverity" : "HIGH"
  23238. },
  23239. "exploitabilityScore" : 1.8,
  23240. "impactScore" : 5.9
  23241. },
  23242. "baseMetricV2" : {
  23243. "cvssV2" : {
  23244. "version" : "2.0",
  23245. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  23246. "accessVector" : "LOCAL",
  23247. "accessComplexity" : "LOW",
  23248. "authentication" : "NONE",
  23249. "confidentialityImpact" : "COMPLETE",
  23250. "integrityImpact" : "COMPLETE",
  23251. "availabilityImpact" : "COMPLETE",
  23252. "baseScore" : 7.2
  23253. },
  23254. "severity" : "HIGH",
  23255. "exploitabilityScore" : 3.9,
  23256. "impactScore" : 10.0,
  23257. "acInsufInfo" : false,
  23258. "obtainAllPrivilege" : false,
  23259. "obtainUserPrivilege" : false,
  23260. "obtainOtherPrivilege" : false,
  23261. "userInteractionRequired" : false
  23262. }
  23263. },
  23264. "publishedDate" : "2021-04-29T18:15Z",
  23265. "lastModifiedDate" : "2021-05-09T02:56Z"
  23266. }, {
  23267. "cve" : {
  23268. "data_type" : "CVE",
  23269. "data_format" : "MITRE",
  23270. "data_version" : "4.0",
  23271. "CVE_data_meta" : {
  23272. "ID" : "CVE-2021-1445",
  23273. "ASSIGNER" : "psirt@cisco.com"
  23274. },
  23275. "problemtype" : {
  23276. "problemtype_data" : [ {
  23277. "description" : [ {
  23278. "lang" : "en",
  23279. "value" : "CWE-787"
  23280. } ]
  23281. } ]
  23282. },
  23283. "references" : {
  23284. "reference_data" : [ {
  23285. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-vpn-dos-fpBcpEcD",
  23286. "name" : "20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services VPN Denial of Service Vulnerabilities",
  23287. "refsource" : "CISCO",
  23288. "tags" : [ "Vendor Advisory" ]
  23289. } ]
  23290. },
  23291. "description" : {
  23292. "description_data" : [ {
  23293. "lang" : "en",
  23294. "value" : "Multiple vulnerabilities in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to lack of proper input validation of the HTTPS request. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: This vulnerability affects only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section."
  23295. } ]
  23296. }
  23297. },
  23298. "configurations" : {
  23299. "CVE_data_version" : "4.0",
  23300. "nodes" : [ {
  23301. "operator" : "OR",
  23302. "children" : [ ],
  23303. "cpe_match" : [ {
  23304. "vulnerable" : true,
  23305. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  23306. "versionStartIncluding" : "9.7:",
  23307. "versionEndExcluding" : "9.8.4.34:",
  23308. "cpe_name" : [ ]
  23309. }, {
  23310. "vulnerable" : true,
  23311. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  23312. "versionStartIncluding" : "9.9:",
  23313. "versionEndExcluding" : "9.9.2.85:",
  23314. "cpe_name" : [ ]
  23315. }, {
  23316. "vulnerable" : true,
  23317. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  23318. "versionStartIncluding" : "9.10:",
  23319. "versionEndExcluding" : "9.12.4.13:",
  23320. "cpe_name" : [ ]
  23321. }, {
  23322. "vulnerable" : true,
  23323. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  23324. "versionStartIncluding" : "9.13:",
  23325. "versionEndExcluding" : "9.13.1.21:",
  23326. "cpe_name" : [ ]
  23327. }, {
  23328. "vulnerable" : true,
  23329. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  23330. "versionStartIncluding" : "9.14:",
  23331. "versionEndExcluding" : "9.14.2.8:",
  23332. "cpe_name" : [ ]
  23333. }, {
  23334. "vulnerable" : true,
  23335. "cpe23Uri" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
  23336. "versionStartIncluding" : "9.15:",
  23337. "versionEndExcluding" : "9.15.1.7:",
  23338. "cpe_name" : [ ]
  23339. }, {
  23340. "vulnerable" : true,
  23341. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  23342. "versionStartIncluding" : "6.5.0:",
  23343. "versionEndExcluding" : "6.6.4:",
  23344. "cpe_name" : [ ]
  23345. }, {
  23346. "vulnerable" : true,
  23347. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  23348. "versionStartIncluding" : "6.7.0:",
  23349. "versionEndExcluding" : "6.7.0.1:",
  23350. "cpe_name" : [ ]
  23351. } ]
  23352. } ]
  23353. },
  23354. "impact" : {
  23355. "baseMetricV3" : {
  23356. "cvssV3" : {
  23357. "version" : "3.1",
  23358. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  23359. "attackVector" : "NETWORK",
  23360. "attackComplexity" : "LOW",
  23361. "privilegesRequired" : "NONE",
  23362. "userInteraction" : "NONE",
  23363. "scope" : "UNCHANGED",
  23364. "confidentialityImpact" : "NONE",
  23365. "integrityImpact" : "NONE",
  23366. "availabilityImpact" : "HIGH",
  23367. "baseScore" : 7.5,
  23368. "baseSeverity" : "HIGH"
  23369. },
  23370. "exploitabilityScore" : 3.9,
  23371. "impactScore" : 3.6
  23372. },
  23373. "baseMetricV2" : {
  23374. "cvssV2" : {
  23375. "version" : "2.0",
  23376. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  23377. "accessVector" : "NETWORK",
  23378. "accessComplexity" : "LOW",
  23379. "authentication" : "NONE",
  23380. "confidentialityImpact" : "NONE",
  23381. "integrityImpact" : "NONE",
  23382. "availabilityImpact" : "PARTIAL",
  23383. "baseScore" : 5.0
  23384. },
  23385. "severity" : "MEDIUM",
  23386. "exploitabilityScore" : 10.0,
  23387. "impactScore" : 2.9,
  23388. "acInsufInfo" : false,
  23389. "obtainAllPrivilege" : false,
  23390. "obtainUserPrivilege" : false,
  23391. "obtainOtherPrivilege" : false,
  23392. "userInteractionRequired" : false
  23393. }
  23394. },
  23395. "publishedDate" : "2021-04-29T18:15Z",
  23396. "lastModifiedDate" : "2021-05-05T17:32Z"
  23397. }, {
  23398. "cve" : {
  23399. "data_type" : "CVE",
  23400. "data_format" : "MITRE",
  23401. "data_version" : "4.0",
  23402. "CVE_data_meta" : {
  23403. "ID" : "CVE-2021-1402",
  23404. "ASSIGNER" : "psirt@cisco.com"
  23405. },
  23406. "problemtype" : {
  23407. "problemtype_data" : [ {
  23408. "description" : [ {
  23409. "lang" : "en",
  23410. "value" : "CWE-119"
  23411. } ]
  23412. } ]
  23413. },
  23414. "references" : {
  23415. "reference_data" : [ {
  23416. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-ssl-decrypt-dos-DdyLuK6c",
  23417. "name" : "20210428 Cisco Firepower Threat Defense Software SSL Decryption Policy Denial of Service Vulnerability",
  23418. "refsource" : "CISCO",
  23419. "tags" : [ "Vendor Advisory" ]
  23420. } ]
  23421. },
  23422. "description" : {
  23423. "description_data" : [ {
  23424. "lang" : "en",
  23425. "value" : "A vulnerability in the software-based SSL/TLS message handler of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of SSL/TLS messages when the device performs software-based SSL decryption. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message through an affected device. SSL/TLS messages sent to an affected device do not trigger this vulnerability. A successful exploit could allow the attacker to cause a process to crash. This crash would then trigger a reload of the device. No manual intervention is needed to recover the device after the reload."
  23426. } ]
  23427. }
  23428. },
  23429. "configurations" : {
  23430. "CVE_data_version" : "4.0",
  23431. "nodes" : [ {
  23432. "operator" : "AND",
  23433. "children" : [ {
  23434. "operator" : "OR",
  23435. "children" : [ ],
  23436. "cpe_match" : [ {
  23437. "vulnerable" : true,
  23438. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  23439. "versionStartIncluding" : "6.3.0:",
  23440. "versionEndExcluding" : "6.4.0:",
  23441. "cpe_name" : [ ]
  23442. }, {
  23443. "vulnerable" : true,
  23444. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  23445. "versionStartIncluding" : "6.5.0:",
  23446. "versionEndExcluding" : "6.6.0:",
  23447. "cpe_name" : [ ]
  23448. } ]
  23449. }, {
  23450. "operator" : "OR",
  23451. "children" : [ ],
  23452. "cpe_match" : [ {
  23453. "vulnerable" : false,
  23454. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense_virtual:-:*:*:*:*:*:*:*",
  23455. "cpe_name" : [ ]
  23456. }, {
  23457. "vulnerable" : false,
  23458. "cpe23Uri" : "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*",
  23459. "cpe_name" : [ ]
  23460. }, {
  23461. "vulnerable" : false,
  23462. "cpe23Uri" : "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*",
  23463. "cpe_name" : [ ]
  23464. }, {
  23465. "vulnerable" : false,
  23466. "cpe23Uri" : "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*",
  23467. "cpe_name" : [ ]
  23468. }, {
  23469. "vulnerable" : false,
  23470. "cpe23Uri" : "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*",
  23471. "cpe_name" : [ ]
  23472. }, {
  23473. "vulnerable" : false,
  23474. "cpe23Uri" : "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*",
  23475. "cpe_name" : [ ]
  23476. }, {
  23477. "vulnerable" : false,
  23478. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*",
  23479. "cpe_name" : [ ]
  23480. }, {
  23481. "vulnerable" : false,
  23482. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*",
  23483. "cpe_name" : [ ]
  23484. }, {
  23485. "vulnerable" : false,
  23486. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*",
  23487. "cpe_name" : [ ]
  23488. }, {
  23489. "vulnerable" : false,
  23490. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*",
  23491. "cpe_name" : [ ]
  23492. }, {
  23493. "vulnerable" : false,
  23494. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
  23495. "cpe_name" : [ ]
  23496. }, {
  23497. "vulnerable" : false,
  23498. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
  23499. "cpe_name" : [ ]
  23500. }, {
  23501. "vulnerable" : false,
  23502. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
  23503. "cpe_name" : [ ]
  23504. }, {
  23505. "vulnerable" : false,
  23506. "cpe23Uri" : "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
  23507. "cpe_name" : [ ]
  23508. }, {
  23509. "vulnerable" : false,
  23510. "cpe23Uri" : "cpe:2.3:h:cisco:isa_3000:-:*:*:*:*:*:*:*",
  23511. "cpe_name" : [ ]
  23512. } ]
  23513. } ],
  23514. "cpe_match" : [ ]
  23515. } ]
  23516. },
  23517. "impact" : {
  23518. "baseMetricV3" : {
  23519. "cvssV3" : {
  23520. "version" : "3.1",
  23521. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
  23522. "attackVector" : "NETWORK",
  23523. "attackComplexity" : "LOW",
  23524. "privilegesRequired" : "NONE",
  23525. "userInteraction" : "NONE",
  23526. "scope" : "CHANGED",
  23527. "confidentialityImpact" : "NONE",
  23528. "integrityImpact" : "NONE",
  23529. "availabilityImpact" : "HIGH",
  23530. "baseScore" : 8.6,
  23531. "baseSeverity" : "HIGH"
  23532. },
  23533. "exploitabilityScore" : 3.9,
  23534. "impactScore" : 4.0
  23535. },
  23536. "baseMetricV2" : {
  23537. "cvssV2" : {
  23538. "version" : "2.0",
  23539. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C",
  23540. "accessVector" : "NETWORK",
  23541. "accessComplexity" : "LOW",
  23542. "authentication" : "NONE",
  23543. "confidentialityImpact" : "NONE",
  23544. "integrityImpact" : "NONE",
  23545. "availabilityImpact" : "COMPLETE",
  23546. "baseScore" : 7.8
  23547. },
  23548. "severity" : "HIGH",
  23549. "exploitabilityScore" : 10.0,
  23550. "impactScore" : 6.9,
  23551. "acInsufInfo" : false,
  23552. "obtainAllPrivilege" : false,
  23553. "obtainUserPrivilege" : false,
  23554. "obtainOtherPrivilege" : false,
  23555. "userInteractionRequired" : false
  23556. }
  23557. },
  23558. "publishedDate" : "2021-04-29T18:15Z",
  23559. "lastModifiedDate" : "2021-05-10T12:30Z"
  23560. }, {
  23561. "cve" : {
  23562. "data_type" : "CVE",
  23563. "data_format" : "MITRE",
  23564. "data_version" : "4.0",
  23565. "CVE_data_meta" : {
  23566. "ID" : "CVE-2021-1369",
  23567. "ASSIGNER" : "psirt@cisco.com"
  23568. },
  23569. "problemtype" : {
  23570. "problemtype_data" : [ {
  23571. "description" : [ {
  23572. "lang" : "en",
  23573. "value" : "CWE-611"
  23574. } ]
  23575. } ]
  23576. },
  23577. "references" : {
  23578. "reference_data" : [ {
  23579. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fdm-xxe-zR7sxPfs",
  23580. "name" : "20210428 Cisco Firepower Device Manager On-Box Software XML External Entity Vulnerability",
  23581. "refsource" : "CISCO",
  23582. "tags" : [ "Vendor Advisory" ]
  23583. } ]
  23584. },
  23585. "description" : {
  23586. "description_data" : [ {
  23587. "lang" : "en",
  23588. "value" : "A vulnerability in the REST API of Cisco Firepower Device Manager (FDM) On-Box Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected device. This vulnerability is due to the improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by sending malicious requests that contain references in XML entities to an affected system. A successful exploit could allow the attacker to retrieve files from the local system, resulting in the disclosure of sensitive information or causing a partial denial of service (DoS) condition on the affected device."
  23589. } ]
  23590. }
  23591. },
  23592. "configurations" : {
  23593. "CVE_data_version" : "4.0",
  23594. "nodes" : [ {
  23595. "operator" : "OR",
  23596. "children" : [ ],
  23597. "cpe_match" : [ {
  23598. "vulnerable" : true,
  23599. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_device_manager:*:*:*:*:*:*:*:*",
  23600. "versionEndExcluding" : "6.5.0.5:",
  23601. "cpe_name" : [ ]
  23602. }, {
  23603. "vulnerable" : true,
  23604. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_device_manager:*:*:*:*:*:*:*:*",
  23605. "versionStartIncluding" : "6.6.0:",
  23606. "versionEndExcluding" : "6.6.3:",
  23607. "cpe_name" : [ ]
  23608. } ]
  23609. } ]
  23610. },
  23611. "impact" : {
  23612. "baseMetricV3" : {
  23613. "cvssV3" : {
  23614. "version" : "3.1",
  23615. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
  23616. "attackVector" : "NETWORK",
  23617. "attackComplexity" : "LOW",
  23618. "privilegesRequired" : "LOW",
  23619. "userInteraction" : "NONE",
  23620. "scope" : "UNCHANGED",
  23621. "confidentialityImpact" : "LOW",
  23622. "integrityImpact" : "NONE",
  23623. "availabilityImpact" : "LOW",
  23624. "baseScore" : 5.4,
  23625. "baseSeverity" : "MEDIUM"
  23626. },
  23627. "exploitabilityScore" : 2.8,
  23628. "impactScore" : 2.5
  23629. },
  23630. "baseMetricV2" : {
  23631. "cvssV2" : {
  23632. "version" : "2.0",
  23633. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:P",
  23634. "accessVector" : "NETWORK",
  23635. "accessComplexity" : "LOW",
  23636. "authentication" : "SINGLE",
  23637. "confidentialityImpact" : "PARTIAL",
  23638. "integrityImpact" : "NONE",
  23639. "availabilityImpact" : "PARTIAL",
  23640. "baseScore" : 5.5
  23641. },
  23642. "severity" : "MEDIUM",
  23643. "exploitabilityScore" : 8.0,
  23644. "impactScore" : 4.9,
  23645. "acInsufInfo" : false,
  23646. "obtainAllPrivilege" : false,
  23647. "obtainUserPrivilege" : false,
  23648. "obtainOtherPrivilege" : false,
  23649. "userInteractionRequired" : false
  23650. }
  23651. },
  23652. "publishedDate" : "2021-04-29T18:15Z",
  23653. "lastModifiedDate" : "2021-05-05T20:27Z"
  23654. }, {
  23655. "cve" : {
  23656. "data_type" : "CVE",
  23657. "data_format" : "MITRE",
  23658. "data_version" : "4.0",
  23659. "CVE_data_meta" : {
  23660. "ID" : "CVE-2021-1256",
  23661. "ASSIGNER" : "psirt@cisco.com"
  23662. },
  23663. "problemtype" : {
  23664. "problemtype_data" : [ {
  23665. "description" : [ {
  23666. "lang" : "en",
  23667. "value" : "CWE-552"
  23668. } ]
  23669. } ]
  23670. },
  23671. "references" : {
  23672. "reference_data" : [ {
  23673. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-file-overwrite-XknRjGdB",
  23674. "name" : "20210428 Cisco Firepower Threat Defense Software Command File Overwrite Vulnerability",
  23675. "refsource" : "CISCO",
  23676. "tags" : [ "Vendor Advisory" ]
  23677. } ]
  23678. },
  23679. "description" : {
  23680. "description_data" : [ {
  23681. "lang" : "en",
  23682. "value" : "A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to overwrite files on the file system of an affected device by using directory traversal techniques. A successful exploit could cause system instability if important system files are overwritten. This vulnerability is due to insufficient validation of user input for the file path in a specific CLI command. An attacker could exploit this vulnerability by logging in to a targeted device and issuing a specific CLI command with crafted user input. A successful exploit could allow the attacker to overwrite arbitrary files on the file system of the affected device. The attacker would need valid user credentials on the device."
  23683. } ]
  23684. }
  23685. },
  23686. "configurations" : {
  23687. "CVE_data_version" : "4.0",
  23688. "nodes" : [ {
  23689. "operator" : "OR",
  23690. "children" : [ ],
  23691. "cpe_match" : [ {
  23692. "vulnerable" : true,
  23693. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  23694. "versionEndIncluding" : "6.4.0:",
  23695. "cpe_name" : [ ]
  23696. }, {
  23697. "vulnerable" : true,
  23698. "cpe23Uri" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
  23699. "versionStartIncluding" : "6.6.0:",
  23700. "versionEndExcluding" : "6.6.4:",
  23701. "cpe_name" : [ ]
  23702. } ]
  23703. } ]
  23704. },
  23705. "impact" : {
  23706. "baseMetricV3" : {
  23707. "cvssV3" : {
  23708. "version" : "3.1",
  23709. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
  23710. "attackVector" : "LOCAL",
  23711. "attackComplexity" : "LOW",
  23712. "privilegesRequired" : "HIGH",
  23713. "userInteraction" : "NONE",
  23714. "scope" : "UNCHANGED",
  23715. "confidentialityImpact" : "NONE",
  23716. "integrityImpact" : "HIGH",
  23717. "availabilityImpact" : "HIGH",
  23718. "baseScore" : 6.0,
  23719. "baseSeverity" : "MEDIUM"
  23720. },
  23721. "exploitabilityScore" : 0.8,
  23722. "impactScore" : 5.2
  23723. },
  23724. "baseMetricV2" : {
  23725. "cvssV2" : {
  23726. "version" : "2.0",
  23727. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:P/A:P",
  23728. "accessVector" : "LOCAL",
  23729. "accessComplexity" : "LOW",
  23730. "authentication" : "NONE",
  23731. "confidentialityImpact" : "NONE",
  23732. "integrityImpact" : "PARTIAL",
  23733. "availabilityImpact" : "PARTIAL",
  23734. "baseScore" : 3.6
  23735. },
  23736. "severity" : "LOW",
  23737. "exploitabilityScore" : 3.9,
  23738. "impactScore" : 4.9,
  23739. "acInsufInfo" : false,
  23740. "obtainAllPrivilege" : false,
  23741. "obtainUserPrivilege" : false,
  23742. "obtainOtherPrivilege" : false,
  23743. "userInteractionRequired" : false
  23744. }
  23745. },
  23746. "publishedDate" : "2021-04-29T18:15Z",
  23747. "lastModifiedDate" : "2021-05-09T03:05Z"
  23748. }, {
  23749. "cve" : {
  23750. "data_type" : "CVE",
  23751. "data_format" : "MITRE",
  23752. "data_version" : "4.0",
  23753. "CVE_data_meta" : {
  23754. "ID" : "CVE-2020-18032",
  23755. "ASSIGNER" : "cve@mitre.org"
  23756. },
  23757. "problemtype" : {
  23758. "problemtype_data" : [ {
  23759. "description" : [ {
  23760. "lang" : "en",
  23761. "value" : "CWE-120"
  23762. } ]
  23763. } ]
  23764. },
  23765. "references" : {
  23766. "reference_data" : [ {
  23767. "url" : "https://gitlab.com/graphviz/graphviz/-/issues/1700",
  23768. "name" : "https://gitlab.com/graphviz/graphviz/-/issues/1700",
  23769. "refsource" : "MISC",
  23770. "tags" : [ "Exploit", "Third Party Advisory" ]
  23771. } ]
  23772. },
  23773. "description" : {
  23774. "description_data" : [ {
  23775. "lang" : "en",
  23776. "value" : "Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by loading a crafted file into the \"lib/common/shapes.c\" component."
  23777. } ]
  23778. }
  23779. },
  23780. "configurations" : {
  23781. "CVE_data_version" : "4.0",
  23782. "nodes" : [ {
  23783. "operator" : "OR",
  23784. "children" : [ ],
  23785. "cpe_match" : [ {
  23786. "vulnerable" : true,
  23787. "cpe23Uri" : "cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*",
  23788. "versionEndIncluding" : "2020-04-13:",
  23789. "cpe_name" : [ ]
  23790. } ]
  23791. } ]
  23792. },
  23793. "impact" : {
  23794. "baseMetricV3" : {
  23795. "cvssV3" : {
  23796. "version" : "3.1",
  23797. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  23798. "attackVector" : "NETWORK",
  23799. "attackComplexity" : "LOW",
  23800. "privilegesRequired" : "NONE",
  23801. "userInteraction" : "NONE",
  23802. "scope" : "UNCHANGED",
  23803. "confidentialityImpact" : "HIGH",
  23804. "integrityImpact" : "HIGH",
  23805. "availabilityImpact" : "HIGH",
  23806. "baseScore" : 9.8,
  23807. "baseSeverity" : "CRITICAL"
  23808. },
  23809. "exploitabilityScore" : 3.9,
  23810. "impactScore" : 5.9
  23811. },
  23812. "baseMetricV2" : {
  23813. "cvssV2" : {
  23814. "version" : "2.0",
  23815. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  23816. "accessVector" : "NETWORK",
  23817. "accessComplexity" : "LOW",
  23818. "authentication" : "NONE",
  23819. "confidentialityImpact" : "PARTIAL",
  23820. "integrityImpact" : "PARTIAL",
  23821. "availabilityImpact" : "PARTIAL",
  23822. "baseScore" : 7.5
  23823. },
  23824. "severity" : "HIGH",
  23825. "exploitabilityScore" : 10.0,
  23826. "impactScore" : 6.4,
  23827. "acInsufInfo" : false,
  23828. "obtainAllPrivilege" : false,
  23829. "obtainUserPrivilege" : false,
  23830. "obtainOtherPrivilege" : false,
  23831. "userInteractionRequired" : false
  23832. }
  23833. },
  23834. "publishedDate" : "2021-04-29T18:15Z",
  23835. "lastModifiedDate" : "2021-05-09T01:16Z"
  23836. }, {
  23837. "cve" : {
  23838. "data_type" : "CVE",
  23839. "data_format" : "MITRE",
  23840. "data_version" : "4.0",
  23841. "CVE_data_meta" : {
  23842. "ID" : "CVE-2021-31438",
  23843. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  23844. },
  23845. "problemtype" : {
  23846. "problemtype_data" : [ {
  23847. "description" : [ {
  23848. "lang" : "en",
  23849. "value" : "CWE-787"
  23850. } ]
  23851. } ]
  23852. },
  23853. "references" : {
  23854. "reference_data" : [ {
  23855. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-481/",
  23856. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-481/",
  23857. "refsource" : "MISC",
  23858. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  23859. }, {
  23860. "url" : "https://www.foxitsoftware.com/support/security-bulletins.html",
  23861. "name" : "https://www.foxitsoftware.com/support/security-bulletins.html",
  23862. "refsource" : "MISC",
  23863. "tags" : [ "Vendor Advisory" ]
  23864. } ]
  23865. },
  23866. "description" : {
  23867. "description_data" : [ {
  23868. "lang" : "en",
  23869. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.931. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PSP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12443."
  23870. } ]
  23871. }
  23872. },
  23873. "configurations" : {
  23874. "CVE_data_version" : "4.0",
  23875. "nodes" : [ {
  23876. "operator" : "AND",
  23877. "children" : [ {
  23878. "operator" : "OR",
  23879. "children" : [ ],
  23880. "cpe_match" : [ {
  23881. "vulnerable" : true,
  23882. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*",
  23883. "versionEndIncluding" : "3.6.6.933",
  23884. "cpe_name" : [ ]
  23885. } ]
  23886. }, {
  23887. "operator" : "OR",
  23888. "children" : [ ],
  23889. "cpe_match" : [ {
  23890. "vulnerable" : false,
  23891. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  23892. "cpe_name" : [ ]
  23893. } ]
  23894. } ],
  23895. "cpe_match" : [ ]
  23896. } ]
  23897. },
  23898. "impact" : {
  23899. "baseMetricV3" : {
  23900. "cvssV3" : {
  23901. "version" : "3.1",
  23902. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  23903. "attackVector" : "LOCAL",
  23904. "attackComplexity" : "LOW",
  23905. "privilegesRequired" : "NONE",
  23906. "userInteraction" : "REQUIRED",
  23907. "scope" : "UNCHANGED",
  23908. "confidentialityImpact" : "HIGH",
  23909. "integrityImpact" : "HIGH",
  23910. "availabilityImpact" : "HIGH",
  23911. "baseScore" : 7.8,
  23912. "baseSeverity" : "HIGH"
  23913. },
  23914. "exploitabilityScore" : 1.8,
  23915. "impactScore" : 5.9
  23916. },
  23917. "baseMetricV2" : {
  23918. "cvssV2" : {
  23919. "version" : "2.0",
  23920. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  23921. "accessVector" : "NETWORK",
  23922. "accessComplexity" : "MEDIUM",
  23923. "authentication" : "NONE",
  23924. "confidentialityImpact" : "PARTIAL",
  23925. "integrityImpact" : "PARTIAL",
  23926. "availabilityImpact" : "PARTIAL",
  23927. "baseScore" : 6.8
  23928. },
  23929. "severity" : "MEDIUM",
  23930. "exploitabilityScore" : 8.6,
  23931. "impactScore" : 6.4,
  23932. "acInsufInfo" : false,
  23933. "obtainAllPrivilege" : false,
  23934. "obtainUserPrivilege" : false,
  23935. "obtainOtherPrivilege" : false,
  23936. "userInteractionRequired" : true
  23937. }
  23938. },
  23939. "publishedDate" : "2021-04-29T17:15Z",
  23940. "lastModifiedDate" : "2021-05-05T02:34Z"
  23941. }, {
  23942. "cve" : {
  23943. "data_type" : "CVE",
  23944. "data_format" : "MITRE",
  23945. "data_version" : "4.0",
  23946. "CVE_data_meta" : {
  23947. "ID" : "CVE-2021-31437",
  23948. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  23949. },
  23950. "problemtype" : {
  23951. "problemtype_data" : [ {
  23952. "description" : [ {
  23953. "lang" : "en",
  23954. "value" : "CWE-787"
  23955. } ]
  23956. } ]
  23957. },
  23958. "references" : {
  23959. "reference_data" : [ {
  23960. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-480/",
  23961. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-480/",
  23962. "refsource" : "MISC",
  23963. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  23964. }, {
  23965. "url" : "https://www.foxitsoftware.com/support/security-bulletins.html",
  23966. "name" : "https://www.foxitsoftware.com/support/security-bulletins.html",
  23967. "refsource" : "MISC",
  23968. "tags" : [ "Vendor Advisory" ]
  23969. } ]
  23970. },
  23971. "description" : {
  23972. "description_data" : [ {
  23973. "lang" : "en",
  23974. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.931. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12384."
  23975. } ]
  23976. }
  23977. },
  23978. "configurations" : {
  23979. "CVE_data_version" : "4.0",
  23980. "nodes" : [ {
  23981. "operator" : "AND",
  23982. "children" : [ {
  23983. "operator" : "OR",
  23984. "children" : [ ],
  23985. "cpe_match" : [ {
  23986. "vulnerable" : true,
  23987. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*",
  23988. "versionEndIncluding" : "3.6.6.933",
  23989. "cpe_name" : [ ]
  23990. } ]
  23991. }, {
  23992. "operator" : "OR",
  23993. "children" : [ ],
  23994. "cpe_match" : [ {
  23995. "vulnerable" : false,
  23996. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  23997. "cpe_name" : [ ]
  23998. } ]
  23999. } ],
  24000. "cpe_match" : [ ]
  24001. } ]
  24002. },
  24003. "impact" : {
  24004. "baseMetricV3" : {
  24005. "cvssV3" : {
  24006. "version" : "3.1",
  24007. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  24008. "attackVector" : "LOCAL",
  24009. "attackComplexity" : "LOW",
  24010. "privilegesRequired" : "NONE",
  24011. "userInteraction" : "REQUIRED",
  24012. "scope" : "UNCHANGED",
  24013. "confidentialityImpact" : "HIGH",
  24014. "integrityImpact" : "HIGH",
  24015. "availabilityImpact" : "HIGH",
  24016. "baseScore" : 7.8,
  24017. "baseSeverity" : "HIGH"
  24018. },
  24019. "exploitabilityScore" : 1.8,
  24020. "impactScore" : 5.9
  24021. },
  24022. "baseMetricV2" : {
  24023. "cvssV2" : {
  24024. "version" : "2.0",
  24025. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  24026. "accessVector" : "NETWORK",
  24027. "accessComplexity" : "MEDIUM",
  24028. "authentication" : "NONE",
  24029. "confidentialityImpact" : "PARTIAL",
  24030. "integrityImpact" : "PARTIAL",
  24031. "availabilityImpact" : "PARTIAL",
  24032. "baseScore" : 6.8
  24033. },
  24034. "severity" : "MEDIUM",
  24035. "exploitabilityScore" : 8.6,
  24036. "impactScore" : 6.4,
  24037. "acInsufInfo" : false,
  24038. "obtainAllPrivilege" : false,
  24039. "obtainUserPrivilege" : false,
  24040. "obtainOtherPrivilege" : false,
  24041. "userInteractionRequired" : true
  24042. }
  24043. },
  24044. "publishedDate" : "2021-04-29T17:15Z",
  24045. "lastModifiedDate" : "2021-05-05T02:35Z"
  24046. }, {
  24047. "cve" : {
  24048. "data_type" : "CVE",
  24049. "data_format" : "MITRE",
  24050. "data_version" : "4.0",
  24051. "CVE_data_meta" : {
  24052. "ID" : "CVE-2021-31436",
  24053. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  24054. },
  24055. "problemtype" : {
  24056. "problemtype_data" : [ {
  24057. "description" : [ {
  24058. "lang" : "en",
  24059. "value" : "CWE-787"
  24060. } ]
  24061. } ]
  24062. },
  24063. "references" : {
  24064. "reference_data" : [ {
  24065. "url" : "https://www.foxitsoftware.com/support/security-bulletins.html",
  24066. "name" : "https://www.foxitsoftware.com/support/security-bulletins.html",
  24067. "refsource" : "MISC",
  24068. "tags" : [ "Vendor Advisory" ]
  24069. }, {
  24070. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-479/",
  24071. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-479/",
  24072. "refsource" : "MISC",
  24073. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  24074. } ]
  24075. },
  24076. "description" : {
  24077. "description_data" : [ {
  24078. "lang" : "en",
  24079. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.931. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of SGI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12376."
  24080. } ]
  24081. }
  24082. },
  24083. "configurations" : {
  24084. "CVE_data_version" : "4.0",
  24085. "nodes" : [ {
  24086. "operator" : "AND",
  24087. "children" : [ {
  24088. "operator" : "OR",
  24089. "children" : [ ],
  24090. "cpe_match" : [ {
  24091. "vulnerable" : true,
  24092. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*",
  24093. "versionEndIncluding" : "3.6.6.933",
  24094. "cpe_name" : [ ]
  24095. } ]
  24096. }, {
  24097. "operator" : "OR",
  24098. "children" : [ ],
  24099. "cpe_match" : [ {
  24100. "vulnerable" : false,
  24101. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  24102. "cpe_name" : [ ]
  24103. } ]
  24104. } ],
  24105. "cpe_match" : [ ]
  24106. } ]
  24107. },
  24108. "impact" : {
  24109. "baseMetricV3" : {
  24110. "cvssV3" : {
  24111. "version" : "3.1",
  24112. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  24113. "attackVector" : "LOCAL",
  24114. "attackComplexity" : "LOW",
  24115. "privilegesRequired" : "NONE",
  24116. "userInteraction" : "REQUIRED",
  24117. "scope" : "UNCHANGED",
  24118. "confidentialityImpact" : "HIGH",
  24119. "integrityImpact" : "HIGH",
  24120. "availabilityImpact" : "HIGH",
  24121. "baseScore" : 7.8,
  24122. "baseSeverity" : "HIGH"
  24123. },
  24124. "exploitabilityScore" : 1.8,
  24125. "impactScore" : 5.9
  24126. },
  24127. "baseMetricV2" : {
  24128. "cvssV2" : {
  24129. "version" : "2.0",
  24130. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  24131. "accessVector" : "NETWORK",
  24132. "accessComplexity" : "MEDIUM",
  24133. "authentication" : "NONE",
  24134. "confidentialityImpact" : "PARTIAL",
  24135. "integrityImpact" : "PARTIAL",
  24136. "availabilityImpact" : "PARTIAL",
  24137. "baseScore" : 6.8
  24138. },
  24139. "severity" : "MEDIUM",
  24140. "exploitabilityScore" : 8.6,
  24141. "impactScore" : 6.4,
  24142. "acInsufInfo" : false,
  24143. "obtainAllPrivilege" : false,
  24144. "obtainUserPrivilege" : false,
  24145. "obtainOtherPrivilege" : false,
  24146. "userInteractionRequired" : true
  24147. }
  24148. },
  24149. "publishedDate" : "2021-04-29T17:15Z",
  24150. "lastModifiedDate" : "2021-05-05T02:35Z"
  24151. }, {
  24152. "cve" : {
  24153. "data_type" : "CVE",
  24154. "data_format" : "MITRE",
  24155. "data_version" : "4.0",
  24156. "CVE_data_meta" : {
  24157. "ID" : "CVE-2021-31435",
  24158. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  24159. },
  24160. "problemtype" : {
  24161. "problemtype_data" : [ {
  24162. "description" : [ {
  24163. "lang" : "en",
  24164. "value" : "CWE-457"
  24165. } ]
  24166. } ]
  24167. },
  24168. "references" : {
  24169. "reference_data" : [ {
  24170. "url" : "https://www.foxitsoftware.com/support/security-bulletins.html",
  24171. "name" : "https://www.foxitsoftware.com/support/security-bulletins.html",
  24172. "refsource" : "MISC",
  24173. "tags" : [ "Vendor Advisory" ]
  24174. }, {
  24175. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-478/",
  24176. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-478/",
  24177. "refsource" : "MISC",
  24178. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  24179. } ]
  24180. },
  24181. "description" : {
  24182. "description_data" : [ {
  24183. "lang" : "en",
  24184. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.931. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CMP files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12331."
  24185. } ]
  24186. }
  24187. },
  24188. "configurations" : {
  24189. "CVE_data_version" : "4.0",
  24190. "nodes" : [ {
  24191. "operator" : "AND",
  24192. "children" : [ {
  24193. "operator" : "OR",
  24194. "children" : [ ],
  24195. "cpe_match" : [ {
  24196. "vulnerable" : true,
  24197. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*",
  24198. "versionEndIncluding" : "3.6.6.933",
  24199. "cpe_name" : [ ]
  24200. } ]
  24201. }, {
  24202. "operator" : "OR",
  24203. "children" : [ ],
  24204. "cpe_match" : [ {
  24205. "vulnerable" : false,
  24206. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  24207. "cpe_name" : [ ]
  24208. } ]
  24209. } ],
  24210. "cpe_match" : [ ]
  24211. } ]
  24212. },
  24213. "impact" : {
  24214. "baseMetricV3" : {
  24215. "cvssV3" : {
  24216. "version" : "3.1",
  24217. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  24218. "attackVector" : "LOCAL",
  24219. "attackComplexity" : "LOW",
  24220. "privilegesRequired" : "NONE",
  24221. "userInteraction" : "REQUIRED",
  24222. "scope" : "UNCHANGED",
  24223. "confidentialityImpact" : "HIGH",
  24224. "integrityImpact" : "HIGH",
  24225. "availabilityImpact" : "HIGH",
  24226. "baseScore" : 7.8,
  24227. "baseSeverity" : "HIGH"
  24228. },
  24229. "exploitabilityScore" : 1.8,
  24230. "impactScore" : 5.9
  24231. },
  24232. "baseMetricV2" : {
  24233. "cvssV2" : {
  24234. "version" : "2.0",
  24235. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  24236. "accessVector" : "NETWORK",
  24237. "accessComplexity" : "MEDIUM",
  24238. "authentication" : "NONE",
  24239. "confidentialityImpact" : "PARTIAL",
  24240. "integrityImpact" : "PARTIAL",
  24241. "availabilityImpact" : "PARTIAL",
  24242. "baseScore" : 6.8
  24243. },
  24244. "severity" : "MEDIUM",
  24245. "exploitabilityScore" : 8.6,
  24246. "impactScore" : 6.4,
  24247. "acInsufInfo" : false,
  24248. "obtainAllPrivilege" : false,
  24249. "obtainUserPrivilege" : false,
  24250. "obtainOtherPrivilege" : false,
  24251. "userInteractionRequired" : true
  24252. }
  24253. },
  24254. "publishedDate" : "2021-04-29T17:15Z",
  24255. "lastModifiedDate" : "2021-05-05T02:36Z"
  24256. }, {
  24257. "cve" : {
  24258. "data_type" : "CVE",
  24259. "data_format" : "MITRE",
  24260. "data_version" : "4.0",
  24261. "CVE_data_meta" : {
  24262. "ID" : "CVE-2021-31434",
  24263. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  24264. },
  24265. "problemtype" : {
  24266. "problemtype_data" : [ {
  24267. "description" : [ {
  24268. "lang" : "en",
  24269. "value" : "CWE-787"
  24270. } ]
  24271. } ]
  24272. },
  24273. "references" : {
  24274. "reference_data" : [ {
  24275. "url" : "https://www.foxitsoftware.com/support/security-bulletins.html",
  24276. "name" : "https://www.foxitsoftware.com/support/security-bulletins.html",
  24277. "refsource" : "MISC",
  24278. "tags" : [ "Vendor Advisory" ]
  24279. }, {
  24280. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-477/",
  24281. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-477/",
  24282. "refsource" : "MISC",
  24283. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  24284. } ]
  24285. },
  24286. "description" : {
  24287. "description_data" : [ {
  24288. "lang" : "en",
  24289. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.931. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPM files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12377."
  24290. } ]
  24291. }
  24292. },
  24293. "configurations" : {
  24294. "CVE_data_version" : "4.0",
  24295. "nodes" : [ {
  24296. "operator" : "AND",
  24297. "children" : [ {
  24298. "operator" : "OR",
  24299. "children" : [ ],
  24300. "cpe_match" : [ {
  24301. "vulnerable" : true,
  24302. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*",
  24303. "versionEndIncluding" : "3.6.6.933",
  24304. "cpe_name" : [ ]
  24305. } ]
  24306. }, {
  24307. "operator" : "OR",
  24308. "children" : [ ],
  24309. "cpe_match" : [ {
  24310. "vulnerable" : false,
  24311. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  24312. "cpe_name" : [ ]
  24313. } ]
  24314. } ],
  24315. "cpe_match" : [ ]
  24316. } ]
  24317. },
  24318. "impact" : {
  24319. "baseMetricV3" : {
  24320. "cvssV3" : {
  24321. "version" : "3.1",
  24322. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  24323. "attackVector" : "LOCAL",
  24324. "attackComplexity" : "LOW",
  24325. "privilegesRequired" : "NONE",
  24326. "userInteraction" : "REQUIRED",
  24327. "scope" : "UNCHANGED",
  24328. "confidentialityImpact" : "HIGH",
  24329. "integrityImpact" : "HIGH",
  24330. "availabilityImpact" : "HIGH",
  24331. "baseScore" : 7.8,
  24332. "baseSeverity" : "HIGH"
  24333. },
  24334. "exploitabilityScore" : 1.8,
  24335. "impactScore" : 5.9
  24336. },
  24337. "baseMetricV2" : {
  24338. "cvssV2" : {
  24339. "version" : "2.0",
  24340. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  24341. "accessVector" : "NETWORK",
  24342. "accessComplexity" : "MEDIUM",
  24343. "authentication" : "NONE",
  24344. "confidentialityImpact" : "PARTIAL",
  24345. "integrityImpact" : "PARTIAL",
  24346. "availabilityImpact" : "PARTIAL",
  24347. "baseScore" : 6.8
  24348. },
  24349. "severity" : "MEDIUM",
  24350. "exploitabilityScore" : 8.6,
  24351. "impactScore" : 6.4,
  24352. "acInsufInfo" : false,
  24353. "obtainAllPrivilege" : false,
  24354. "obtainUserPrivilege" : false,
  24355. "obtainOtherPrivilege" : false,
  24356. "userInteractionRequired" : true
  24357. }
  24358. },
  24359. "publishedDate" : "2021-04-29T17:15Z",
  24360. "lastModifiedDate" : "2021-05-05T02:44Z"
  24361. }, {
  24362. "cve" : {
  24363. "data_type" : "CVE",
  24364. "data_format" : "MITRE",
  24365. "data_version" : "4.0",
  24366. "CVE_data_meta" : {
  24367. "ID" : "CVE-2021-31433",
  24368. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  24369. },
  24370. "problemtype" : {
  24371. "problemtype_data" : [ {
  24372. "description" : [ {
  24373. "lang" : "en",
  24374. "value" : "CWE-787"
  24375. } ]
  24376. } ]
  24377. },
  24378. "references" : {
  24379. "reference_data" : [ {
  24380. "url" : "https://www.foxitsoftware.com/support/security-bulletins.html",
  24381. "name" : "https://www.foxitsoftware.com/support/security-bulletins.html",
  24382. "refsource" : "MISC",
  24383. "tags" : [ "Vendor Advisory" ]
  24384. }, {
  24385. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-476/",
  24386. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-476/",
  24387. "refsource" : "MISC",
  24388. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  24389. } ]
  24390. },
  24391. "description" : {
  24392. "description_data" : [ {
  24393. "lang" : "en",
  24394. "value" : "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.931. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ARW files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12333."
  24395. } ]
  24396. }
  24397. },
  24398. "configurations" : {
  24399. "CVE_data_version" : "4.0",
  24400. "nodes" : [ {
  24401. "operator" : "AND",
  24402. "children" : [ {
  24403. "operator" : "OR",
  24404. "children" : [ ],
  24405. "cpe_match" : [ {
  24406. "vulnerable" : true,
  24407. "cpe23Uri" : "cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*",
  24408. "versionEndIncluding" : "3.6.6.933",
  24409. "cpe_name" : [ ]
  24410. } ]
  24411. }, {
  24412. "operator" : "OR",
  24413. "children" : [ ],
  24414. "cpe_match" : [ {
  24415. "vulnerable" : false,
  24416. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  24417. "cpe_name" : [ ]
  24418. } ]
  24419. } ],
  24420. "cpe_match" : [ ]
  24421. } ]
  24422. },
  24423. "impact" : {
  24424. "baseMetricV3" : {
  24425. "cvssV3" : {
  24426. "version" : "3.1",
  24427. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  24428. "attackVector" : "LOCAL",
  24429. "attackComplexity" : "LOW",
  24430. "privilegesRequired" : "NONE",
  24431. "userInteraction" : "REQUIRED",
  24432. "scope" : "UNCHANGED",
  24433. "confidentialityImpact" : "HIGH",
  24434. "integrityImpact" : "HIGH",
  24435. "availabilityImpact" : "HIGH",
  24436. "baseScore" : 7.8,
  24437. "baseSeverity" : "HIGH"
  24438. },
  24439. "exploitabilityScore" : 1.8,
  24440. "impactScore" : 5.9
  24441. },
  24442. "baseMetricV2" : {
  24443. "cvssV2" : {
  24444. "version" : "2.0",
  24445. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  24446. "accessVector" : "NETWORK",
  24447. "accessComplexity" : "MEDIUM",
  24448. "authentication" : "NONE",
  24449. "confidentialityImpact" : "PARTIAL",
  24450. "integrityImpact" : "PARTIAL",
  24451. "availabilityImpact" : "PARTIAL",
  24452. "baseScore" : 6.8
  24453. },
  24454. "severity" : "MEDIUM",
  24455. "exploitabilityScore" : 8.6,
  24456. "impactScore" : 6.4,
  24457. "acInsufInfo" : false,
  24458. "obtainAllPrivilege" : false,
  24459. "obtainUserPrivilege" : false,
  24460. "obtainOtherPrivilege" : false,
  24461. "userInteractionRequired" : true
  24462. }
  24463. },
  24464. "publishedDate" : "2021-04-29T17:15Z",
  24465. "lastModifiedDate" : "2021-05-05T02:44Z"
  24466. }, {
  24467. "cve" : {
  24468. "data_type" : "CVE",
  24469. "data_format" : "MITRE",
  24470. "data_version" : "4.0",
  24471. "CVE_data_meta" : {
  24472. "ID" : "CVE-2021-31432",
  24473. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  24474. },
  24475. "problemtype" : {
  24476. "problemtype_data" : [ {
  24477. "description" : [ {
  24478. "lang" : "en",
  24479. "value" : "CWE-125"
  24480. } ]
  24481. } ]
  24482. },
  24483. "references" : {
  24484. "reference_data" : [ {
  24485. "url" : "https://kb.parallels.com/en/125013",
  24486. "name" : "https://kb.parallels.com/en/125013",
  24487. "refsource" : "MISC",
  24488. "tags" : [ "Vendor Advisory" ]
  24489. }, {
  24490. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-440/",
  24491. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-440/",
  24492. "refsource" : "MISC",
  24493. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  24494. } ]
  24495. },
  24496. "description" : {
  24497. "description_data" : [ {
  24498. "lang" : "en",
  24499. "value" : "This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the IDE virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13190."
  24500. } ]
  24501. }
  24502. },
  24503. "configurations" : {
  24504. "CVE_data_version" : "4.0",
  24505. "nodes" : [ {
  24506. "operator" : "OR",
  24507. "children" : [ ],
  24508. "cpe_match" : [ {
  24509. "vulnerable" : true,
  24510. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:15.1.5-47309:*:*:*:*:*:*:*",
  24511. "cpe_name" : [ ]
  24512. } ]
  24513. } ]
  24514. },
  24515. "impact" : {
  24516. "baseMetricV3" : {
  24517. "cvssV3" : {
  24518. "version" : "3.1",
  24519. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
  24520. "attackVector" : "LOCAL",
  24521. "attackComplexity" : "LOW",
  24522. "privilegesRequired" : "HIGH",
  24523. "userInteraction" : "NONE",
  24524. "scope" : "CHANGED",
  24525. "confidentialityImpact" : "HIGH",
  24526. "integrityImpact" : "NONE",
  24527. "availabilityImpact" : "NONE",
  24528. "baseScore" : 6.0,
  24529. "baseSeverity" : "MEDIUM"
  24530. },
  24531. "exploitabilityScore" : 1.5,
  24532. "impactScore" : 4.0
  24533. },
  24534. "baseMetricV2" : {
  24535. "cvssV2" : {
  24536. "version" : "2.0",
  24537. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  24538. "accessVector" : "LOCAL",
  24539. "accessComplexity" : "LOW",
  24540. "authentication" : "NONE",
  24541. "confidentialityImpact" : "PARTIAL",
  24542. "integrityImpact" : "NONE",
  24543. "availabilityImpact" : "NONE",
  24544. "baseScore" : 2.1
  24545. },
  24546. "severity" : "LOW",
  24547. "exploitabilityScore" : 3.9,
  24548. "impactScore" : 2.9,
  24549. "acInsufInfo" : false,
  24550. "obtainAllPrivilege" : false,
  24551. "obtainUserPrivilege" : false,
  24552. "obtainOtherPrivilege" : false,
  24553. "userInteractionRequired" : false
  24554. }
  24555. },
  24556. "publishedDate" : "2021-04-29T17:15Z",
  24557. "lastModifiedDate" : "2021-05-06T13:39Z"
  24558. }, {
  24559. "cve" : {
  24560. "data_type" : "CVE",
  24561. "data_format" : "MITRE",
  24562. "data_version" : "4.0",
  24563. "CVE_data_meta" : {
  24564. "ID" : "CVE-2021-31431",
  24565. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  24566. },
  24567. "problemtype" : {
  24568. "problemtype_data" : [ {
  24569. "description" : [ {
  24570. "lang" : "en",
  24571. "value" : "CWE-125"
  24572. } ]
  24573. } ]
  24574. },
  24575. "references" : {
  24576. "reference_data" : [ {
  24577. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-439/",
  24578. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-439/",
  24579. "refsource" : "MISC",
  24580. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  24581. }, {
  24582. "url" : "https://kb.parallels.com/en/125013",
  24583. "name" : "https://kb.parallels.com/en/125013",
  24584. "refsource" : "MISC",
  24585. "tags" : [ "Vendor Advisory" ]
  24586. } ]
  24587. },
  24588. "description" : {
  24589. "description_data" : [ {
  24590. "lang" : "en",
  24591. "value" : "This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the IDE virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13189."
  24592. } ]
  24593. }
  24594. },
  24595. "configurations" : {
  24596. "CVE_data_version" : "4.0",
  24597. "nodes" : [ {
  24598. "operator" : "OR",
  24599. "children" : [ ],
  24600. "cpe_match" : [ {
  24601. "vulnerable" : true,
  24602. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:15.1.5-47309:*:*:*:*:*:*:*",
  24603. "cpe_name" : [ ]
  24604. } ]
  24605. } ]
  24606. },
  24607. "impact" : {
  24608. "baseMetricV3" : {
  24609. "cvssV3" : {
  24610. "version" : "3.1",
  24611. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
  24612. "attackVector" : "LOCAL",
  24613. "attackComplexity" : "LOW",
  24614. "privilegesRequired" : "HIGH",
  24615. "userInteraction" : "NONE",
  24616. "scope" : "CHANGED",
  24617. "confidentialityImpact" : "HIGH",
  24618. "integrityImpact" : "NONE",
  24619. "availabilityImpact" : "NONE",
  24620. "baseScore" : 6.0,
  24621. "baseSeverity" : "MEDIUM"
  24622. },
  24623. "exploitabilityScore" : 1.5,
  24624. "impactScore" : 4.0
  24625. },
  24626. "baseMetricV2" : {
  24627. "cvssV2" : {
  24628. "version" : "2.0",
  24629. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  24630. "accessVector" : "LOCAL",
  24631. "accessComplexity" : "LOW",
  24632. "authentication" : "NONE",
  24633. "confidentialityImpact" : "PARTIAL",
  24634. "integrityImpact" : "NONE",
  24635. "availabilityImpact" : "NONE",
  24636. "baseScore" : 2.1
  24637. },
  24638. "severity" : "LOW",
  24639. "exploitabilityScore" : 3.9,
  24640. "impactScore" : 2.9,
  24641. "acInsufInfo" : false,
  24642. "obtainAllPrivilege" : false,
  24643. "obtainUserPrivilege" : false,
  24644. "obtainOtherPrivilege" : false,
  24645. "userInteractionRequired" : false
  24646. }
  24647. },
  24648. "publishedDate" : "2021-04-29T17:15Z",
  24649. "lastModifiedDate" : "2021-05-06T13:39Z"
  24650. }, {
  24651. "cve" : {
  24652. "data_type" : "CVE",
  24653. "data_format" : "MITRE",
  24654. "data_version" : "4.0",
  24655. "CVE_data_meta" : {
  24656. "ID" : "CVE-2021-31430",
  24657. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  24658. },
  24659. "problemtype" : {
  24660. "problemtype_data" : [ {
  24661. "description" : [ {
  24662. "lang" : "en",
  24663. "value" : "CWE-125"
  24664. } ]
  24665. } ]
  24666. },
  24667. "references" : {
  24668. "reference_data" : [ {
  24669. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-438/",
  24670. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-438/",
  24671. "refsource" : "MISC",
  24672. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  24673. }, {
  24674. "url" : "https://kb.parallels.com/en/125013",
  24675. "name" : "https://kb.parallels.com/en/125013",
  24676. "refsource" : "MISC",
  24677. "tags" : [ "Vendor Advisory" ]
  24678. } ]
  24679. },
  24680. "description" : {
  24681. "description_data" : [ {
  24682. "lang" : "en",
  24683. "value" : "This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the IDE virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13188."
  24684. } ]
  24685. }
  24686. },
  24687. "configurations" : {
  24688. "CVE_data_version" : "4.0",
  24689. "nodes" : [ {
  24690. "operator" : "OR",
  24691. "children" : [ ],
  24692. "cpe_match" : [ {
  24693. "vulnerable" : true,
  24694. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:15.1.5-47309:*:*:*:*:*:*:*",
  24695. "cpe_name" : [ ]
  24696. } ]
  24697. } ]
  24698. },
  24699. "impact" : {
  24700. "baseMetricV3" : {
  24701. "cvssV3" : {
  24702. "version" : "3.1",
  24703. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
  24704. "attackVector" : "LOCAL",
  24705. "attackComplexity" : "LOW",
  24706. "privilegesRequired" : "HIGH",
  24707. "userInteraction" : "NONE",
  24708. "scope" : "CHANGED",
  24709. "confidentialityImpact" : "HIGH",
  24710. "integrityImpact" : "NONE",
  24711. "availabilityImpact" : "NONE",
  24712. "baseScore" : 6.0,
  24713. "baseSeverity" : "MEDIUM"
  24714. },
  24715. "exploitabilityScore" : 1.5,
  24716. "impactScore" : 4.0
  24717. },
  24718. "baseMetricV2" : {
  24719. "cvssV2" : {
  24720. "version" : "2.0",
  24721. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  24722. "accessVector" : "LOCAL",
  24723. "accessComplexity" : "LOW",
  24724. "authentication" : "NONE",
  24725. "confidentialityImpact" : "PARTIAL",
  24726. "integrityImpact" : "NONE",
  24727. "availabilityImpact" : "NONE",
  24728. "baseScore" : 2.1
  24729. },
  24730. "severity" : "LOW",
  24731. "exploitabilityScore" : 3.9,
  24732. "impactScore" : 2.9,
  24733. "acInsufInfo" : false,
  24734. "obtainAllPrivilege" : false,
  24735. "obtainUserPrivilege" : false,
  24736. "obtainOtherPrivilege" : false,
  24737. "userInteractionRequired" : false
  24738. }
  24739. },
  24740. "publishedDate" : "2021-04-29T17:15Z",
  24741. "lastModifiedDate" : "2021-05-06T13:37Z"
  24742. }, {
  24743. "cve" : {
  24744. "data_type" : "CVE",
  24745. "data_format" : "MITRE",
  24746. "data_version" : "4.0",
  24747. "CVE_data_meta" : {
  24748. "ID" : "CVE-2021-31429",
  24749. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  24750. },
  24751. "problemtype" : {
  24752. "problemtype_data" : [ {
  24753. "description" : [ {
  24754. "lang" : "en",
  24755. "value" : "CWE-122"
  24756. } ]
  24757. } ]
  24758. },
  24759. "references" : {
  24760. "reference_data" : [ {
  24761. "url" : "https://kb.parallels.com/en/125013",
  24762. "name" : "https://kb.parallels.com/en/125013",
  24763. "refsource" : "MISC",
  24764. "tags" : [ "Vendor Advisory" ]
  24765. }, {
  24766. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-437/",
  24767. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-437/",
  24768. "refsource" : "MISC",
  24769. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  24770. } ]
  24771. },
  24772. "description" : {
  24773. "description_data" : [ {
  24774. "lang" : "en",
  24775. "value" : "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the IDE virtual device. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13187."
  24776. } ]
  24777. }
  24778. },
  24779. "configurations" : {
  24780. "CVE_data_version" : "4.0",
  24781. "nodes" : [ {
  24782. "operator" : "OR",
  24783. "children" : [ ],
  24784. "cpe_match" : [ {
  24785. "vulnerable" : true,
  24786. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:15.1.5-47309:*:*:*:*:*:*:*",
  24787. "cpe_name" : [ ]
  24788. } ]
  24789. } ]
  24790. },
  24791. "impact" : {
  24792. "baseMetricV3" : {
  24793. "cvssV3" : {
  24794. "version" : "3.1",
  24795. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
  24796. "attackVector" : "LOCAL",
  24797. "attackComplexity" : "LOW",
  24798. "privilegesRequired" : "HIGH",
  24799. "userInteraction" : "NONE",
  24800. "scope" : "CHANGED",
  24801. "confidentialityImpact" : "HIGH",
  24802. "integrityImpact" : "HIGH",
  24803. "availabilityImpact" : "HIGH",
  24804. "baseScore" : 8.2,
  24805. "baseSeverity" : "HIGH"
  24806. },
  24807. "exploitabilityScore" : 1.5,
  24808. "impactScore" : 6.0
  24809. },
  24810. "baseMetricV2" : {
  24811. "cvssV2" : {
  24812. "version" : "2.0",
  24813. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  24814. "accessVector" : "LOCAL",
  24815. "accessComplexity" : "LOW",
  24816. "authentication" : "NONE",
  24817. "confidentialityImpact" : "PARTIAL",
  24818. "integrityImpact" : "PARTIAL",
  24819. "availabilityImpact" : "PARTIAL",
  24820. "baseScore" : 4.6
  24821. },
  24822. "severity" : "MEDIUM",
  24823. "exploitabilityScore" : 3.9,
  24824. "impactScore" : 6.4,
  24825. "acInsufInfo" : false,
  24826. "obtainAllPrivilege" : false,
  24827. "obtainUserPrivilege" : false,
  24828. "obtainOtherPrivilege" : false,
  24829. "userInteractionRequired" : false
  24830. }
  24831. },
  24832. "publishedDate" : "2021-04-29T17:15Z",
  24833. "lastModifiedDate" : "2021-05-06T13:34Z"
  24834. }, {
  24835. "cve" : {
  24836. "data_type" : "CVE",
  24837. "data_format" : "MITRE",
  24838. "data_version" : "4.0",
  24839. "CVE_data_meta" : {
  24840. "ID" : "CVE-2021-31428",
  24841. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  24842. },
  24843. "problemtype" : {
  24844. "problemtype_data" : [ {
  24845. "description" : [ {
  24846. "lang" : "en",
  24847. "value" : "CWE-122"
  24848. } ]
  24849. } ]
  24850. },
  24851. "references" : {
  24852. "reference_data" : [ {
  24853. "url" : "https://kb.parallels.com/en/125013",
  24854. "name" : "https://kb.parallels.com/en/125013",
  24855. "refsource" : "MISC",
  24856. "tags" : [ "Vendor Advisory" ]
  24857. }, {
  24858. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-436/",
  24859. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-436/",
  24860. "refsource" : "MISC",
  24861. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  24862. } ]
  24863. },
  24864. "description" : {
  24865. "description_data" : [ {
  24866. "lang" : "en",
  24867. "value" : "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the IDE virtual device. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13186."
  24868. } ]
  24869. }
  24870. },
  24871. "configurations" : {
  24872. "CVE_data_version" : "4.0",
  24873. "nodes" : [ {
  24874. "operator" : "OR",
  24875. "children" : [ ],
  24876. "cpe_match" : [ {
  24877. "vulnerable" : true,
  24878. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:15.1.5-47309:*:*:*:*:*:*:*",
  24879. "cpe_name" : [ ]
  24880. } ]
  24881. } ]
  24882. },
  24883. "impact" : {
  24884. "baseMetricV3" : {
  24885. "cvssV3" : {
  24886. "version" : "3.1",
  24887. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
  24888. "attackVector" : "LOCAL",
  24889. "attackComplexity" : "LOW",
  24890. "privilegesRequired" : "HIGH",
  24891. "userInteraction" : "NONE",
  24892. "scope" : "CHANGED",
  24893. "confidentialityImpact" : "HIGH",
  24894. "integrityImpact" : "HIGH",
  24895. "availabilityImpact" : "HIGH",
  24896. "baseScore" : 8.2,
  24897. "baseSeverity" : "HIGH"
  24898. },
  24899. "exploitabilityScore" : 1.5,
  24900. "impactScore" : 6.0
  24901. },
  24902. "baseMetricV2" : {
  24903. "cvssV2" : {
  24904. "version" : "2.0",
  24905. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  24906. "accessVector" : "LOCAL",
  24907. "accessComplexity" : "LOW",
  24908. "authentication" : "NONE",
  24909. "confidentialityImpact" : "PARTIAL",
  24910. "integrityImpact" : "PARTIAL",
  24911. "availabilityImpact" : "PARTIAL",
  24912. "baseScore" : 4.6
  24913. },
  24914. "severity" : "MEDIUM",
  24915. "exploitabilityScore" : 3.9,
  24916. "impactScore" : 6.4,
  24917. "acInsufInfo" : false,
  24918. "obtainAllPrivilege" : false,
  24919. "obtainUserPrivilege" : false,
  24920. "obtainOtherPrivilege" : false,
  24921. "userInteractionRequired" : false
  24922. }
  24923. },
  24924. "publishedDate" : "2021-04-29T17:15Z",
  24925. "lastModifiedDate" : "2021-05-06T13:28Z"
  24926. }, {
  24927. "cve" : {
  24928. "data_type" : "CVE",
  24929. "data_format" : "MITRE",
  24930. "data_version" : "4.0",
  24931. "CVE_data_meta" : {
  24932. "ID" : "CVE-2021-31427",
  24933. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  24934. },
  24935. "problemtype" : {
  24936. "problemtype_data" : [ {
  24937. "description" : [ {
  24938. "lang" : "en",
  24939. "value" : "CWE-367"
  24940. }, {
  24941. "lang" : "en",
  24942. "value" : "CWE-667"
  24943. } ]
  24944. } ]
  24945. },
  24946. "references" : {
  24947. "reference_data" : [ {
  24948. "url" : "https://kb.parallels.com/en/125013",
  24949. "name" : "https://kb.parallels.com/en/125013",
  24950. "refsource" : "MISC",
  24951. "tags" : [ "Vendor Advisory" ]
  24952. }, {
  24953. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-435/",
  24954. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-435/",
  24955. "refsource" : "MISC",
  24956. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  24957. } ]
  24958. },
  24959. "description" : {
  24960. "description_data" : [ {
  24961. "lang" : "en",
  24962. "value" : "This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Open Tools Gate component. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13082."
  24963. } ]
  24964. }
  24965. },
  24966. "configurations" : {
  24967. "CVE_data_version" : "4.0",
  24968. "nodes" : [ {
  24969. "operator" : "OR",
  24970. "children" : [ ],
  24971. "cpe_match" : [ {
  24972. "vulnerable" : true,
  24973. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:15.1.5-47309:*:*:*:*:*:*:*",
  24974. "cpe_name" : [ ]
  24975. } ]
  24976. } ]
  24977. },
  24978. "impact" : {
  24979. "baseMetricV3" : {
  24980. "cvssV3" : {
  24981. "version" : "3.1",
  24982. "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
  24983. "attackVector" : "LOCAL",
  24984. "attackComplexity" : "HIGH",
  24985. "privilegesRequired" : "LOW",
  24986. "userInteraction" : "NONE",
  24987. "scope" : "CHANGED",
  24988. "confidentialityImpact" : "HIGH",
  24989. "integrityImpact" : "NONE",
  24990. "availabilityImpact" : "NONE",
  24991. "baseScore" : 5.6,
  24992. "baseSeverity" : "MEDIUM"
  24993. },
  24994. "exploitabilityScore" : 1.1,
  24995. "impactScore" : 4.0
  24996. },
  24997. "baseMetricV2" : {
  24998. "cvssV2" : {
  24999. "version" : "2.0",
  25000. "vectorString" : "AV:L/AC:M/Au:N/C:P/I:N/A:N",
  25001. "accessVector" : "LOCAL",
  25002. "accessComplexity" : "MEDIUM",
  25003. "authentication" : "NONE",
  25004. "confidentialityImpact" : "PARTIAL",
  25005. "integrityImpact" : "NONE",
  25006. "availabilityImpact" : "NONE",
  25007. "baseScore" : 1.9
  25008. },
  25009. "severity" : "LOW",
  25010. "exploitabilityScore" : 3.4,
  25011. "impactScore" : 2.9,
  25012. "acInsufInfo" : false,
  25013. "obtainAllPrivilege" : false,
  25014. "obtainUserPrivilege" : false,
  25015. "obtainOtherPrivilege" : false,
  25016. "userInteractionRequired" : false
  25017. }
  25018. },
  25019. "publishedDate" : "2021-04-29T17:15Z",
  25020. "lastModifiedDate" : "2021-05-05T20:44Z"
  25021. }, {
  25022. "cve" : {
  25023. "data_type" : "CVE",
  25024. "data_format" : "MITRE",
  25025. "data_version" : "4.0",
  25026. "CVE_data_meta" : {
  25027. "ID" : "CVE-2021-31426",
  25028. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  25029. },
  25030. "problemtype" : {
  25031. "problemtype_data" : [ {
  25032. "description" : [ {
  25033. "lang" : "en",
  25034. "value" : "CWE-190"
  25035. } ]
  25036. } ]
  25037. },
  25038. "references" : {
  25039. "reference_data" : [ {
  25040. "url" : "https://kb.parallels.com/en/125013",
  25041. "name" : "https://kb.parallels.com/en/125013",
  25042. "refsource" : "MISC",
  25043. "tags" : [ "Vendor Advisory" ]
  25044. }, {
  25045. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-433/",
  25046. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-433/",
  25047. "refsource" : "MISC",
  25048. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  25049. } ]
  25050. },
  25051. "description" : {
  25052. "description_data" : [ {
  25053. "lang" : "en",
  25054. "value" : "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.2-49151. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Parallels Tools component. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel on the target guest system. Was ZDI-CAN-12791."
  25055. } ]
  25056. }
  25057. },
  25058. "configurations" : {
  25059. "CVE_data_version" : "4.0",
  25060. "nodes" : [ {
  25061. "operator" : "OR",
  25062. "children" : [ ],
  25063. "cpe_match" : [ {
  25064. "vulnerable" : true,
  25065. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:16.1.2-49151:*:*:*:*:*:*:*",
  25066. "cpe_name" : [ ]
  25067. } ]
  25068. } ]
  25069. },
  25070. "impact" : {
  25071. "baseMetricV3" : {
  25072. "cvssV3" : {
  25073. "version" : "3.1",
  25074. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
  25075. "attackVector" : "LOCAL",
  25076. "attackComplexity" : "LOW",
  25077. "privilegesRequired" : "LOW",
  25078. "userInteraction" : "NONE",
  25079. "scope" : "CHANGED",
  25080. "confidentialityImpact" : "HIGH",
  25081. "integrityImpact" : "HIGH",
  25082. "availabilityImpact" : "HIGH",
  25083. "baseScore" : 8.8,
  25084. "baseSeverity" : "HIGH"
  25085. },
  25086. "exploitabilityScore" : 2.0,
  25087. "impactScore" : 6.0
  25088. },
  25089. "baseMetricV2" : {
  25090. "cvssV2" : {
  25091. "version" : "2.0",
  25092. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  25093. "accessVector" : "LOCAL",
  25094. "accessComplexity" : "LOW",
  25095. "authentication" : "NONE",
  25096. "confidentialityImpact" : "COMPLETE",
  25097. "integrityImpact" : "COMPLETE",
  25098. "availabilityImpact" : "COMPLETE",
  25099. "baseScore" : 7.2
  25100. },
  25101. "severity" : "HIGH",
  25102. "exploitabilityScore" : 3.9,
  25103. "impactScore" : 10.0,
  25104. "acInsufInfo" : false,
  25105. "obtainAllPrivilege" : false,
  25106. "obtainUserPrivilege" : false,
  25107. "obtainOtherPrivilege" : false,
  25108. "userInteractionRequired" : false
  25109. }
  25110. },
  25111. "publishedDate" : "2021-04-29T17:15Z",
  25112. "lastModifiedDate" : "2021-05-05T20:42Z"
  25113. }, {
  25114. "cve" : {
  25115. "data_type" : "CVE",
  25116. "data_format" : "MITRE",
  25117. "data_version" : "4.0",
  25118. "CVE_data_meta" : {
  25119. "ID" : "CVE-2021-31425",
  25120. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  25121. },
  25122. "problemtype" : {
  25123. "problemtype_data" : [ {
  25124. "description" : [ {
  25125. "lang" : "en",
  25126. "value" : "CWE-190"
  25127. } ]
  25128. } ]
  25129. },
  25130. "references" : {
  25131. "reference_data" : [ {
  25132. "url" : "https://kb.parallels.com/en/125013",
  25133. "name" : "https://kb.parallels.com/en/125013",
  25134. "refsource" : "MISC",
  25135. "tags" : [ "Vendor Advisory" ]
  25136. }, {
  25137. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-432/",
  25138. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-432/",
  25139. "refsource" : "MISC",
  25140. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  25141. } ]
  25142. },
  25143. "description" : {
  25144. "description_data" : [ {
  25145. "lang" : "en",
  25146. "value" : "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.2-49151. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Parallels Tools component. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel on the target guest system. Was ZDI-CAN-12790."
  25147. } ]
  25148. }
  25149. },
  25150. "configurations" : {
  25151. "CVE_data_version" : "4.0",
  25152. "nodes" : [ {
  25153. "operator" : "OR",
  25154. "children" : [ ],
  25155. "cpe_match" : [ {
  25156. "vulnerable" : true,
  25157. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:16.1.2-49151:*:*:*:*:*:*:*",
  25158. "cpe_name" : [ ]
  25159. } ]
  25160. } ]
  25161. },
  25162. "impact" : {
  25163. "baseMetricV3" : {
  25164. "cvssV3" : {
  25165. "version" : "3.1",
  25166. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
  25167. "attackVector" : "LOCAL",
  25168. "attackComplexity" : "LOW",
  25169. "privilegesRequired" : "LOW",
  25170. "userInteraction" : "NONE",
  25171. "scope" : "CHANGED",
  25172. "confidentialityImpact" : "HIGH",
  25173. "integrityImpact" : "HIGH",
  25174. "availabilityImpact" : "HIGH",
  25175. "baseScore" : 8.8,
  25176. "baseSeverity" : "HIGH"
  25177. },
  25178. "exploitabilityScore" : 2.0,
  25179. "impactScore" : 6.0
  25180. },
  25181. "baseMetricV2" : {
  25182. "cvssV2" : {
  25183. "version" : "2.0",
  25184. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  25185. "accessVector" : "LOCAL",
  25186. "accessComplexity" : "LOW",
  25187. "authentication" : "NONE",
  25188. "confidentialityImpact" : "COMPLETE",
  25189. "integrityImpact" : "COMPLETE",
  25190. "availabilityImpact" : "COMPLETE",
  25191. "baseScore" : 7.2
  25192. },
  25193. "severity" : "HIGH",
  25194. "exploitabilityScore" : 3.9,
  25195. "impactScore" : 10.0,
  25196. "acInsufInfo" : false,
  25197. "obtainAllPrivilege" : false,
  25198. "obtainUserPrivilege" : false,
  25199. "obtainOtherPrivilege" : false,
  25200. "userInteractionRequired" : false
  25201. }
  25202. },
  25203. "publishedDate" : "2021-04-29T17:15Z",
  25204. "lastModifiedDate" : "2021-05-07T18:34Z"
  25205. }, {
  25206. "cve" : {
  25207. "data_type" : "CVE",
  25208. "data_format" : "MITRE",
  25209. "data_version" : "4.0",
  25210. "CVE_data_meta" : {
  25211. "ID" : "CVE-2021-31424",
  25212. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  25213. },
  25214. "problemtype" : {
  25215. "problemtype_data" : [ {
  25216. "description" : [ {
  25217. "lang" : "en",
  25218. "value" : "CWE-122"
  25219. } ]
  25220. } ]
  25221. },
  25222. "references" : {
  25223. "reference_data" : [ {
  25224. "url" : "https://kb.parallels.com/en/125013",
  25225. "name" : "https://kb.parallels.com/en/125013",
  25226. "refsource" : "MISC",
  25227. "tags" : [ "Vendor Advisory" ]
  25228. }, {
  25229. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-434/",
  25230. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-434/",
  25231. "refsource" : "MISC",
  25232. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  25233. } ]
  25234. },
  25235. "description" : {
  25236. "description_data" : [ {
  25237. "lang" : "en",
  25238. "value" : "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Open Tools Gate component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-12848."
  25239. } ]
  25240. }
  25241. },
  25242. "configurations" : {
  25243. "CVE_data_version" : "4.0",
  25244. "nodes" : [ {
  25245. "operator" : "OR",
  25246. "children" : [ ],
  25247. "cpe_match" : [ {
  25248. "vulnerable" : true,
  25249. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:15.1.5-47309:*:*:*:*:*:*:*",
  25250. "cpe_name" : [ ]
  25251. } ]
  25252. } ]
  25253. },
  25254. "impact" : {
  25255. "baseMetricV3" : {
  25256. "cvssV3" : {
  25257. "version" : "3.1",
  25258. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
  25259. "attackVector" : "LOCAL",
  25260. "attackComplexity" : "LOW",
  25261. "privilegesRequired" : "LOW",
  25262. "userInteraction" : "NONE",
  25263. "scope" : "CHANGED",
  25264. "confidentialityImpact" : "HIGH",
  25265. "integrityImpact" : "HIGH",
  25266. "availabilityImpact" : "HIGH",
  25267. "baseScore" : 8.8,
  25268. "baseSeverity" : "HIGH"
  25269. },
  25270. "exploitabilityScore" : 2.0,
  25271. "impactScore" : 6.0
  25272. },
  25273. "baseMetricV2" : {
  25274. "cvssV2" : {
  25275. "version" : "2.0",
  25276. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  25277. "accessVector" : "LOCAL",
  25278. "accessComplexity" : "LOW",
  25279. "authentication" : "NONE",
  25280. "confidentialityImpact" : "PARTIAL",
  25281. "integrityImpact" : "PARTIAL",
  25282. "availabilityImpact" : "PARTIAL",
  25283. "baseScore" : 4.6
  25284. },
  25285. "severity" : "MEDIUM",
  25286. "exploitabilityScore" : 3.9,
  25287. "impactScore" : 6.4,
  25288. "acInsufInfo" : false,
  25289. "obtainAllPrivilege" : false,
  25290. "obtainUserPrivilege" : false,
  25291. "obtainOtherPrivilege" : false,
  25292. "userInteractionRequired" : false
  25293. }
  25294. },
  25295. "publishedDate" : "2021-04-29T17:15Z",
  25296. "lastModifiedDate" : "2021-05-10T12:57Z"
  25297. }, {
  25298. "cve" : {
  25299. "data_type" : "CVE",
  25300. "data_format" : "MITRE",
  25301. "data_version" : "4.0",
  25302. "CVE_data_meta" : {
  25303. "ID" : "CVE-2021-31423",
  25304. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  25305. },
  25306. "problemtype" : {
  25307. "problemtype_data" : [ {
  25308. "description" : [ {
  25309. "lang" : "en",
  25310. "value" : "CWE-908"
  25311. } ]
  25312. } ]
  25313. },
  25314. "references" : {
  25315. "reference_data" : [ {
  25316. "url" : "https://kb.parallels.com/en/125013",
  25317. "name" : "https://kb.parallels.com/en/125013",
  25318. "refsource" : "MISC",
  25319. "tags" : [ "Vendor Advisory" ]
  25320. }, {
  25321. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-431/",
  25322. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-431/",
  25323. "refsource" : "MISC",
  25324. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  25325. } ]
  25326. },
  25327. "description" : {
  25328. "description_data" : [ {
  25329. "lang" : "en",
  25330. "value" : "This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-12528."
  25331. } ]
  25332. }
  25333. },
  25334. "configurations" : {
  25335. "CVE_data_version" : "4.0",
  25336. "nodes" : [ {
  25337. "operator" : "OR",
  25338. "children" : [ ],
  25339. "cpe_match" : [ {
  25340. "vulnerable" : true,
  25341. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:15.1.5-47309:*:*:*:*:*:*:*",
  25342. "cpe_name" : [ ]
  25343. } ]
  25344. } ]
  25345. },
  25346. "impact" : {
  25347. "baseMetricV3" : {
  25348. "cvssV3" : {
  25349. "version" : "3.1",
  25350. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
  25351. "attackVector" : "LOCAL",
  25352. "attackComplexity" : "LOW",
  25353. "privilegesRequired" : "HIGH",
  25354. "userInteraction" : "NONE",
  25355. "scope" : "CHANGED",
  25356. "confidentialityImpact" : "HIGH",
  25357. "integrityImpact" : "NONE",
  25358. "availabilityImpact" : "NONE",
  25359. "baseScore" : 6.0,
  25360. "baseSeverity" : "MEDIUM"
  25361. },
  25362. "exploitabilityScore" : 1.5,
  25363. "impactScore" : 4.0
  25364. },
  25365. "baseMetricV2" : {
  25366. "cvssV2" : {
  25367. "version" : "2.0",
  25368. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  25369. "accessVector" : "LOCAL",
  25370. "accessComplexity" : "LOW",
  25371. "authentication" : "NONE",
  25372. "confidentialityImpact" : "PARTIAL",
  25373. "integrityImpact" : "NONE",
  25374. "availabilityImpact" : "NONE",
  25375. "baseScore" : 2.1
  25376. },
  25377. "severity" : "LOW",
  25378. "exploitabilityScore" : 3.9,
  25379. "impactScore" : 2.9,
  25380. "acInsufInfo" : false,
  25381. "obtainAllPrivilege" : false,
  25382. "obtainUserPrivilege" : false,
  25383. "obtainOtherPrivilege" : false,
  25384. "userInteractionRequired" : false
  25385. }
  25386. },
  25387. "publishedDate" : "2021-04-29T17:15Z",
  25388. "lastModifiedDate" : "2021-05-07T02:24Z"
  25389. }, {
  25390. "cve" : {
  25391. "data_type" : "CVE",
  25392. "data_format" : "MITRE",
  25393. "data_version" : "4.0",
  25394. "CVE_data_meta" : {
  25395. "ID" : "CVE-2021-31422",
  25396. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  25397. },
  25398. "problemtype" : {
  25399. "problemtype_data" : [ {
  25400. "description" : [ {
  25401. "lang" : "en",
  25402. "value" : "CWE-367"
  25403. }, {
  25404. "lang" : "en",
  25405. "value" : "CWE-667"
  25406. } ]
  25407. } ]
  25408. },
  25409. "references" : {
  25410. "reference_data" : [ {
  25411. "url" : "https://kb.parallels.com/en/125013",
  25412. "name" : "https://kb.parallels.com/en/125013",
  25413. "refsource" : "MISC",
  25414. "tags" : [ "Vendor Advisory" ]
  25415. }, {
  25416. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-430/",
  25417. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-430/",
  25418. "refsource" : "MISC",
  25419. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  25420. } ]
  25421. },
  25422. "description" : {
  25423. "description_data" : [ {
  25424. "lang" : "en",
  25425. "value" : "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.1-49141. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the e1000e virtual device. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-12527."
  25426. } ]
  25427. }
  25428. },
  25429. "configurations" : {
  25430. "CVE_data_version" : "4.0",
  25431. "nodes" : [ {
  25432. "operator" : "OR",
  25433. "children" : [ ],
  25434. "cpe_match" : [ {
  25435. "vulnerable" : true,
  25436. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:16.1.1-49141:*:*:*:*:*:*:*",
  25437. "cpe_name" : [ ]
  25438. } ]
  25439. } ]
  25440. },
  25441. "impact" : {
  25442. "baseMetricV3" : {
  25443. "cvssV3" : {
  25444. "version" : "3.1",
  25445. "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
  25446. "attackVector" : "LOCAL",
  25447. "attackComplexity" : "HIGH",
  25448. "privilegesRequired" : "HIGH",
  25449. "userInteraction" : "NONE",
  25450. "scope" : "CHANGED",
  25451. "confidentialityImpact" : "HIGH",
  25452. "integrityImpact" : "HIGH",
  25453. "availabilityImpact" : "HIGH",
  25454. "baseScore" : 7.5,
  25455. "baseSeverity" : "HIGH"
  25456. },
  25457. "exploitabilityScore" : 0.8,
  25458. "impactScore" : 6.0
  25459. },
  25460. "baseMetricV2" : {
  25461. "cvssV2" : {
  25462. "version" : "2.0",
  25463. "vectorString" : "AV:L/AC:M/Au:N/C:P/I:P/A:P",
  25464. "accessVector" : "LOCAL",
  25465. "accessComplexity" : "MEDIUM",
  25466. "authentication" : "NONE",
  25467. "confidentialityImpact" : "PARTIAL",
  25468. "integrityImpact" : "PARTIAL",
  25469. "availabilityImpact" : "PARTIAL",
  25470. "baseScore" : 4.4
  25471. },
  25472. "severity" : "MEDIUM",
  25473. "exploitabilityScore" : 3.4,
  25474. "impactScore" : 6.4,
  25475. "acInsufInfo" : false,
  25476. "obtainAllPrivilege" : false,
  25477. "obtainUserPrivilege" : false,
  25478. "obtainOtherPrivilege" : false,
  25479. "userInteractionRequired" : false
  25480. }
  25481. },
  25482. "publishedDate" : "2021-04-29T17:15Z",
  25483. "lastModifiedDate" : "2021-05-10T13:49Z"
  25484. }, {
  25485. "cve" : {
  25486. "data_type" : "CVE",
  25487. "data_format" : "MITRE",
  25488. "data_version" : "4.0",
  25489. "CVE_data_meta" : {
  25490. "ID" : "CVE-2021-31421",
  25491. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  25492. },
  25493. "problemtype" : {
  25494. "problemtype_data" : [ {
  25495. "description" : [ {
  25496. "lang" : "en",
  25497. "value" : "CWE-22"
  25498. } ]
  25499. } ]
  25500. },
  25501. "references" : {
  25502. "reference_data" : [ {
  25503. "url" : "https://kb.parallels.com/en/125013",
  25504. "name" : "https://kb.parallels.com/en/125013",
  25505. "refsource" : "MISC",
  25506. "tags" : [ "Vendor Advisory" ]
  25507. }, {
  25508. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-425/",
  25509. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-425/",
  25510. "refsource" : "MISC",
  25511. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  25512. } ]
  25513. },
  25514. "description" : {
  25515. "description_data" : [ {
  25516. "lang" : "en",
  25517. "value" : "This vulnerability allows local attackers to delete arbitrary files on affected installations of Parallels Desktop 16.1.1-49141. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete arbitrary files in the context of the hypervisor. Was ZDI-CAN-12129."
  25518. } ]
  25519. }
  25520. },
  25521. "configurations" : {
  25522. "CVE_data_version" : "4.0",
  25523. "nodes" : [ {
  25524. "operator" : "OR",
  25525. "children" : [ ],
  25526. "cpe_match" : [ {
  25527. "vulnerable" : true,
  25528. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:16.1.1-49141:*:*:*:*:*:*:*",
  25529. "cpe_name" : [ ]
  25530. } ]
  25531. } ]
  25532. },
  25533. "impact" : {
  25534. "baseMetricV3" : {
  25535. "cvssV3" : {
  25536. "version" : "3.1",
  25537. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
  25538. "attackVector" : "LOCAL",
  25539. "attackComplexity" : "LOW",
  25540. "privilegesRequired" : "HIGH",
  25541. "userInteraction" : "NONE",
  25542. "scope" : "CHANGED",
  25543. "confidentialityImpact" : "NONE",
  25544. "integrityImpact" : "HIGH",
  25545. "availabilityImpact" : "NONE",
  25546. "baseScore" : 6.0,
  25547. "baseSeverity" : "MEDIUM"
  25548. },
  25549. "exploitabilityScore" : 1.5,
  25550. "impactScore" : 4.0
  25551. },
  25552. "baseMetricV2" : {
  25553. "cvssV2" : {
  25554. "version" : "2.0",
  25555. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:P/A:N",
  25556. "accessVector" : "LOCAL",
  25557. "accessComplexity" : "LOW",
  25558. "authentication" : "NONE",
  25559. "confidentialityImpact" : "NONE",
  25560. "integrityImpact" : "PARTIAL",
  25561. "availabilityImpact" : "NONE",
  25562. "baseScore" : 2.1
  25563. },
  25564. "severity" : "LOW",
  25565. "exploitabilityScore" : 3.9,
  25566. "impactScore" : 2.9,
  25567. "acInsufInfo" : false,
  25568. "obtainAllPrivilege" : false,
  25569. "obtainUserPrivilege" : false,
  25570. "obtainOtherPrivilege" : false,
  25571. "userInteractionRequired" : false
  25572. }
  25573. },
  25574. "publishedDate" : "2021-04-29T17:15Z",
  25575. "lastModifiedDate" : "2021-05-10T13:55Z"
  25576. }, {
  25577. "cve" : {
  25578. "data_type" : "CVE",
  25579. "data_format" : "MITRE",
  25580. "data_version" : "4.0",
  25581. "CVE_data_meta" : {
  25582. "ID" : "CVE-2021-31420",
  25583. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  25584. },
  25585. "problemtype" : {
  25586. "problemtype_data" : [ {
  25587. "description" : [ {
  25588. "lang" : "en",
  25589. "value" : "CWE-121"
  25590. } ]
  25591. } ]
  25592. },
  25593. "references" : {
  25594. "reference_data" : [ {
  25595. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-428/",
  25596. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-428/",
  25597. "refsource" : "MISC",
  25598. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  25599. }, {
  25600. "url" : "https://kb.parallels.com/en/125013",
  25601. "name" : "https://kb.parallels.com/en/125013",
  25602. "refsource" : "MISC",
  25603. "tags" : [ "Vendor Advisory" ]
  25604. } ]
  25605. },
  25606. "description" : {
  25607. "description_data" : [ {
  25608. "lang" : "en",
  25609. "value" : "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.0-48950. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-12220."
  25610. } ]
  25611. }
  25612. },
  25613. "configurations" : {
  25614. "CVE_data_version" : "4.0",
  25615. "nodes" : [ {
  25616. "operator" : "OR",
  25617. "children" : [ ],
  25618. "cpe_match" : [ {
  25619. "vulnerable" : true,
  25620. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:16.1.0-48950:*:*:*:*:*:*:*",
  25621. "cpe_name" : [ ]
  25622. } ]
  25623. } ]
  25624. },
  25625. "impact" : {
  25626. "baseMetricV3" : {
  25627. "cvssV3" : {
  25628. "version" : "3.1",
  25629. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
  25630. "attackVector" : "LOCAL",
  25631. "attackComplexity" : "LOW",
  25632. "privilegesRequired" : "LOW",
  25633. "userInteraction" : "NONE",
  25634. "scope" : "CHANGED",
  25635. "confidentialityImpact" : "HIGH",
  25636. "integrityImpact" : "HIGH",
  25637. "availabilityImpact" : "HIGH",
  25638. "baseScore" : 8.8,
  25639. "baseSeverity" : "HIGH"
  25640. },
  25641. "exploitabilityScore" : 2.0,
  25642. "impactScore" : 6.0
  25643. },
  25644. "baseMetricV2" : {
  25645. "cvssV2" : {
  25646. "version" : "2.0",
  25647. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  25648. "accessVector" : "LOCAL",
  25649. "accessComplexity" : "LOW",
  25650. "authentication" : "NONE",
  25651. "confidentialityImpact" : "PARTIAL",
  25652. "integrityImpact" : "PARTIAL",
  25653. "availabilityImpact" : "PARTIAL",
  25654. "baseScore" : 4.6
  25655. },
  25656. "severity" : "MEDIUM",
  25657. "exploitabilityScore" : 3.9,
  25658. "impactScore" : 6.4,
  25659. "acInsufInfo" : false,
  25660. "obtainAllPrivilege" : false,
  25661. "obtainUserPrivilege" : false,
  25662. "obtainOtherPrivilege" : false,
  25663. "userInteractionRequired" : false
  25664. }
  25665. },
  25666. "publishedDate" : "2021-04-29T17:15Z",
  25667. "lastModifiedDate" : "2021-05-06T19:11Z"
  25668. }, {
  25669. "cve" : {
  25670. "data_type" : "CVE",
  25671. "data_format" : "MITRE",
  25672. "data_version" : "4.0",
  25673. "CVE_data_meta" : {
  25674. "ID" : "CVE-2021-31419",
  25675. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  25676. },
  25677. "problemtype" : {
  25678. "problemtype_data" : [ {
  25679. "description" : [ {
  25680. "lang" : "en",
  25681. "value" : "CWE-908"
  25682. } ]
  25683. } ]
  25684. },
  25685. "references" : {
  25686. "reference_data" : [ {
  25687. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-427/",
  25688. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-427/",
  25689. "refsource" : "MISC",
  25690. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  25691. }, {
  25692. "url" : "https://kb.parallels.com/en/125013",
  25693. "name" : "https://kb.parallels.com/en/125013",
  25694. "refsource" : "MISC",
  25695. "tags" : [ "Vendor Advisory" ]
  25696. } ]
  25697. },
  25698. "description" : {
  25699. "description_data" : [ {
  25700. "lang" : "en",
  25701. "value" : "This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.4-47270. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-12136."
  25702. } ]
  25703. }
  25704. },
  25705. "configurations" : {
  25706. "CVE_data_version" : "4.0",
  25707. "nodes" : [ {
  25708. "operator" : "OR",
  25709. "children" : [ ],
  25710. "cpe_match" : [ {
  25711. "vulnerable" : true,
  25712. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:15.1.4-47270:*:*:*:*:*:*:*",
  25713. "cpe_name" : [ ]
  25714. } ]
  25715. } ]
  25716. },
  25717. "impact" : {
  25718. "baseMetricV3" : {
  25719. "cvssV3" : {
  25720. "version" : "3.1",
  25721. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
  25722. "attackVector" : "LOCAL",
  25723. "attackComplexity" : "LOW",
  25724. "privilegesRequired" : "LOW",
  25725. "userInteraction" : "NONE",
  25726. "scope" : "CHANGED",
  25727. "confidentialityImpact" : "HIGH",
  25728. "integrityImpact" : "NONE",
  25729. "availabilityImpact" : "NONE",
  25730. "baseScore" : 6.5,
  25731. "baseSeverity" : "MEDIUM"
  25732. },
  25733. "exploitabilityScore" : 2.0,
  25734. "impactScore" : 4.0
  25735. },
  25736. "baseMetricV2" : {
  25737. "cvssV2" : {
  25738. "version" : "2.0",
  25739. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  25740. "accessVector" : "LOCAL",
  25741. "accessComplexity" : "LOW",
  25742. "authentication" : "NONE",
  25743. "confidentialityImpact" : "PARTIAL",
  25744. "integrityImpact" : "NONE",
  25745. "availabilityImpact" : "NONE",
  25746. "baseScore" : 2.1
  25747. },
  25748. "severity" : "LOW",
  25749. "exploitabilityScore" : 3.9,
  25750. "impactScore" : 2.9,
  25751. "acInsufInfo" : false,
  25752. "obtainAllPrivilege" : false,
  25753. "obtainUserPrivilege" : false,
  25754. "obtainOtherPrivilege" : false,
  25755. "userInteractionRequired" : false
  25756. }
  25757. },
  25758. "publishedDate" : "2021-04-29T17:15Z",
  25759. "lastModifiedDate" : "2021-05-06T19:11Z"
  25760. }, {
  25761. "cve" : {
  25762. "data_type" : "CVE",
  25763. "data_format" : "MITRE",
  25764. "data_version" : "4.0",
  25765. "CVE_data_meta" : {
  25766. "ID" : "CVE-2021-31418",
  25767. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  25768. },
  25769. "problemtype" : {
  25770. "problemtype_data" : [ {
  25771. "description" : [ {
  25772. "lang" : "en",
  25773. "value" : "CWE-908"
  25774. } ]
  25775. } ]
  25776. },
  25777. "references" : {
  25778. "reference_data" : [ {
  25779. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-429/",
  25780. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-429/",
  25781. "refsource" : "MISC",
  25782. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  25783. }, {
  25784. "url" : "https://kb.parallels.com/en/125013",
  25785. "name" : "https://kb.parallels.com/en/125013",
  25786. "refsource" : "MISC",
  25787. "tags" : [ "Vendor Advisory" ]
  25788. } ]
  25789. },
  25790. "description" : {
  25791. "description_data" : [ {
  25792. "lang" : "en",
  25793. "value" : "This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.4-47270. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-12221."
  25794. } ]
  25795. }
  25796. },
  25797. "configurations" : {
  25798. "CVE_data_version" : "4.0",
  25799. "nodes" : [ {
  25800. "operator" : "OR",
  25801. "children" : [ ],
  25802. "cpe_match" : [ {
  25803. "vulnerable" : true,
  25804. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:15.1.4-47270:*:*:*:*:*:*:*",
  25805. "cpe_name" : [ ]
  25806. } ]
  25807. } ]
  25808. },
  25809. "impact" : {
  25810. "baseMetricV3" : {
  25811. "cvssV3" : {
  25812. "version" : "3.1",
  25813. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
  25814. "attackVector" : "LOCAL",
  25815. "attackComplexity" : "LOW",
  25816. "privilegesRequired" : "LOW",
  25817. "userInteraction" : "NONE",
  25818. "scope" : "CHANGED",
  25819. "confidentialityImpact" : "HIGH",
  25820. "integrityImpact" : "NONE",
  25821. "availabilityImpact" : "NONE",
  25822. "baseScore" : 6.5,
  25823. "baseSeverity" : "MEDIUM"
  25824. },
  25825. "exploitabilityScore" : 2.0,
  25826. "impactScore" : 4.0
  25827. },
  25828. "baseMetricV2" : {
  25829. "cvssV2" : {
  25830. "version" : "2.0",
  25831. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  25832. "accessVector" : "LOCAL",
  25833. "accessComplexity" : "LOW",
  25834. "authentication" : "NONE",
  25835. "confidentialityImpact" : "PARTIAL",
  25836. "integrityImpact" : "NONE",
  25837. "availabilityImpact" : "NONE",
  25838. "baseScore" : 2.1
  25839. },
  25840. "severity" : "LOW",
  25841. "exploitabilityScore" : 3.9,
  25842. "impactScore" : 2.9,
  25843. "acInsufInfo" : false,
  25844. "obtainAllPrivilege" : false,
  25845. "obtainUserPrivilege" : false,
  25846. "obtainOtherPrivilege" : false,
  25847. "userInteractionRequired" : false
  25848. }
  25849. },
  25850. "publishedDate" : "2021-04-29T17:15Z",
  25851. "lastModifiedDate" : "2021-05-06T19:10Z"
  25852. }, {
  25853. "cve" : {
  25854. "data_type" : "CVE",
  25855. "data_format" : "MITRE",
  25856. "data_version" : "4.0",
  25857. "CVE_data_meta" : {
  25858. "ID" : "CVE-2021-31417",
  25859. "ASSIGNER" : "zdi-disclosures@trendmicro.com"
  25860. },
  25861. "problemtype" : {
  25862. "problemtype_data" : [ {
  25863. "description" : [ {
  25864. "lang" : "en",
  25865. "value" : "CWE-908"
  25866. } ]
  25867. } ]
  25868. },
  25869. "references" : {
  25870. "reference_data" : [ {
  25871. "url" : "https://kb.parallels.com/en/125013",
  25872. "name" : "https://kb.parallels.com/en/125013",
  25873. "refsource" : "MISC",
  25874. "tags" : [ "Vendor Advisory" ]
  25875. }, {
  25876. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-426/",
  25877. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-426/",
  25878. "refsource" : "MISC",
  25879. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  25880. } ]
  25881. },
  25882. "description" : {
  25883. "description_data" : [ {
  25884. "lang" : "en",
  25885. "value" : "This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.4-47270. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-12131."
  25886. } ]
  25887. }
  25888. },
  25889. "configurations" : {
  25890. "CVE_data_version" : "4.0",
  25891. "nodes" : [ {
  25892. "operator" : "OR",
  25893. "children" : [ ],
  25894. "cpe_match" : [ {
  25895. "vulnerable" : true,
  25896. "cpe23Uri" : "cpe:2.3:a:parallels:parallels_desktop:15.1.4-47270:*:*:*:*:*:*:*",
  25897. "cpe_name" : [ ]
  25898. } ]
  25899. } ]
  25900. },
  25901. "impact" : {
  25902. "baseMetricV3" : {
  25903. "cvssV3" : {
  25904. "version" : "3.1",
  25905. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
  25906. "attackVector" : "LOCAL",
  25907. "attackComplexity" : "LOW",
  25908. "privilegesRequired" : "LOW",
  25909. "userInteraction" : "NONE",
  25910. "scope" : "CHANGED",
  25911. "confidentialityImpact" : "HIGH",
  25912. "integrityImpact" : "NONE",
  25913. "availabilityImpact" : "NONE",
  25914. "baseScore" : 6.5,
  25915. "baseSeverity" : "MEDIUM"
  25916. },
  25917. "exploitabilityScore" : 2.0,
  25918. "impactScore" : 4.0
  25919. },
  25920. "baseMetricV2" : {
  25921. "cvssV2" : {
  25922. "version" : "2.0",
  25923. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  25924. "accessVector" : "LOCAL",
  25925. "accessComplexity" : "LOW",
  25926. "authentication" : "NONE",
  25927. "confidentialityImpact" : "PARTIAL",
  25928. "integrityImpact" : "NONE",
  25929. "availabilityImpact" : "NONE",
  25930. "baseScore" : 2.1
  25931. },
  25932. "severity" : "LOW",
  25933. "exploitabilityScore" : 3.9,
  25934. "impactScore" : 2.9,
  25935. "acInsufInfo" : false,
  25936. "obtainAllPrivilege" : false,
  25937. "obtainUserPrivilege" : false,
  25938. "obtainOtherPrivilege" : false,
  25939. "userInteractionRequired" : false
  25940. }
  25941. },
  25942. "publishedDate" : "2021-04-29T17:15Z",
  25943. "lastModifiedDate" : "2021-05-06T19:09Z"
  25944. }, {
  25945. "cve" : {
  25946. "data_type" : "CVE",
  25947. "data_format" : "MITRE",
  25948. "data_version" : "4.0",
  25949. "CVE_data_meta" : {
  25950. "ID" : "CVE-2021-30048",
  25951. "ASSIGNER" : "cve@mitre.org"
  25952. },
  25953. "problemtype" : {
  25954. "problemtype_data" : [ {
  25955. "description" : [ {
  25956. "lang" : "en",
  25957. "value" : "CWE-22"
  25958. } ]
  25959. } ]
  25960. },
  25961. "references" : {
  25962. "reference_data" : [ {
  25963. "url" : "https://github.com/201206030/novel-plus/issues/39",
  25964. "name" : "https://github.com/201206030/novel-plus/issues/39",
  25965. "refsource" : "MISC",
  25966. "tags" : [ "Exploit", "Third Party Advisory" ]
  25967. }, {
  25968. "url" : "https://www.exploit-db.com/exploits/49724",
  25969. "name" : "https://www.exploit-db.com/exploits/49724",
  25970. "refsource" : "MISC",
  25971. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  25972. } ]
  25973. },
  25974. "description" : {
  25975. "description_data" : [ {
  25976. "lang" : "en",
  25977. "value" : "Directory Traversal in the fileDownload function in com/java2nb/common/controller/FileController.java in Novel-plus (?????-plus) 3.5.1 allows attackers to read arbitrary files via the filePath parameter."
  25978. } ]
  25979. }
  25980. },
  25981. "configurations" : {
  25982. "CVE_data_version" : "4.0",
  25983. "nodes" : [ {
  25984. "operator" : "OR",
  25985. "children" : [ ],
  25986. "cpe_match" : [ {
  25987. "vulnerable" : true,
  25988. "cpe23Uri" : "cpe:2.3:a:novel_boutique_house-plus_project:novel_boutique_house-plus:3.5.1:*:*:*:*:*:*:*",
  25989. "cpe_name" : [ ]
  25990. } ]
  25991. } ]
  25992. },
  25993. "impact" : {
  25994. "baseMetricV3" : {
  25995. "cvssV3" : {
  25996. "version" : "3.1",
  25997. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  25998. "attackVector" : "NETWORK",
  25999. "attackComplexity" : "LOW",
  26000. "privilegesRequired" : "NONE",
  26001. "userInteraction" : "NONE",
  26002. "scope" : "UNCHANGED",
  26003. "confidentialityImpact" : "LOW",
  26004. "integrityImpact" : "NONE",
  26005. "availabilityImpact" : "NONE",
  26006. "baseScore" : 5.3,
  26007. "baseSeverity" : "MEDIUM"
  26008. },
  26009. "exploitabilityScore" : 3.9,
  26010. "impactScore" : 1.4
  26011. },
  26012. "baseMetricV2" : {
  26013. "cvssV2" : {
  26014. "version" : "2.0",
  26015. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  26016. "accessVector" : "NETWORK",
  26017. "accessComplexity" : "LOW",
  26018. "authentication" : "NONE",
  26019. "confidentialityImpact" : "PARTIAL",
  26020. "integrityImpact" : "NONE",
  26021. "availabilityImpact" : "NONE",
  26022. "baseScore" : 5.0
  26023. },
  26024. "severity" : "MEDIUM",
  26025. "exploitabilityScore" : 10.0,
  26026. "impactScore" : 2.9,
  26027. "acInsufInfo" : false,
  26028. "obtainAllPrivilege" : false,
  26029. "obtainUserPrivilege" : false,
  26030. "obtainOtherPrivilege" : false,
  26031. "userInteractionRequired" : false
  26032. }
  26033. },
  26034. "publishedDate" : "2021-04-29T17:15Z",
  26035. "lastModifiedDate" : "2021-05-08T03:44Z"
  26036. }, {
  26037. "cve" : {
  26038. "data_type" : "CVE",
  26039. "data_format" : "MITRE",
  26040. "data_version" : "4.0",
  26041. "CVE_data_meta" : {
  26042. "ID" : "CVE-2021-21415",
  26043. "ASSIGNER" : "security-advisories@github.com"
  26044. },
  26045. "problemtype" : {
  26046. "problemtype_data" : [ {
  26047. "description" : [ {
  26048. "lang" : "en",
  26049. "value" : "CWE-94"
  26050. } ]
  26051. } ]
  26052. },
  26053. "references" : {
  26054. "reference_data" : [ {
  26055. "url" : "https://marketplace.visualstudio.com/items?itemName=Prisma.prisma-insider",
  26056. "name" : "https://marketplace.visualstudio.com/items?itemName=Prisma.prisma-insider",
  26057. "refsource" : "MISC",
  26058. "tags" : [ "Product" ]
  26059. }, {
  26060. "url" : "https://github.com/prisma/language-tools/pull/750",
  26061. "name" : "https://github.com/prisma/language-tools/pull/750",
  26062. "refsource" : "MISC",
  26063. "tags" : [ "Patch", "Third Party Advisory" ]
  26064. }, {
  26065. "url" : "https://github.com/prisma/language-tools/security/advisories/GHSA-4rf9-43m7-x828",
  26066. "name" : "https://github.com/prisma/language-tools/security/advisories/GHSA-4rf9-43m7-x828",
  26067. "refsource" : "CONFIRM",
  26068. "tags" : [ "Third Party Advisory" ]
  26069. }, {
  26070. "url" : "https://marketplace.visualstudio.com/items?itemName=Prisma.prisma",
  26071. "name" : "https://marketplace.visualstudio.com/items?itemName=Prisma.prisma",
  26072. "refsource" : "MISC",
  26073. "tags" : [ "Product" ]
  26074. } ]
  26075. },
  26076. "description" : {
  26077. "description_data" : [ {
  26078. "lang" : "en",
  26079. "value" : "Prisma VS Code a VSCode extension for Prisma schema files. This is a Remote Code Execution Vulnerability that affects all versions of the Prisma VS Code extension older than 2.20.0. If a custom binary path for the Prisma format binary is set in VS Code Settings, for example by downloading a project that has a .vscode/settings.json file that sets a value for \"prismaFmtBinPath\". That custom binary is executed when auto-formatting is triggered by VS Code or when validation checks are triggered after each keypress on a *.prisma file. Fixed in versions 2.20.0 and 20.0.27. As a workaround users can either edit or delete the `.vscode/settings.json` file or check if the binary is malicious and delete it."
  26080. } ]
  26081. }
  26082. },
  26083. "configurations" : {
  26084. "CVE_data_version" : "4.0",
  26085. "nodes" : [ {
  26086. "operator" : "OR",
  26087. "children" : [ ],
  26088. "cpe_match" : [ {
  26089. "vulnerable" : true,
  26090. "cpe23Uri" : "cpe:2.3:a:prisma:language-tools:*:*:*:*:*:visual_studio_code:*:*",
  26091. "versionEndExcluding" : "2.20.0:",
  26092. "cpe_name" : [ ]
  26093. } ]
  26094. } ]
  26095. },
  26096. "impact" : {
  26097. "baseMetricV3" : {
  26098. "cvssV3" : {
  26099. "version" : "3.1",
  26100. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  26101. "attackVector" : "LOCAL",
  26102. "attackComplexity" : "LOW",
  26103. "privilegesRequired" : "NONE",
  26104. "userInteraction" : "REQUIRED",
  26105. "scope" : "UNCHANGED",
  26106. "confidentialityImpact" : "HIGH",
  26107. "integrityImpact" : "HIGH",
  26108. "availabilityImpact" : "HIGH",
  26109. "baseScore" : 7.8,
  26110. "baseSeverity" : "HIGH"
  26111. },
  26112. "exploitabilityScore" : 1.8,
  26113. "impactScore" : 5.9
  26114. },
  26115. "baseMetricV2" : {
  26116. "cvssV2" : {
  26117. "version" : "2.0",
  26118. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  26119. "accessVector" : "NETWORK",
  26120. "accessComplexity" : "MEDIUM",
  26121. "authentication" : "NONE",
  26122. "confidentialityImpact" : "PARTIAL",
  26123. "integrityImpact" : "PARTIAL",
  26124. "availabilityImpact" : "PARTIAL",
  26125. "baseScore" : 6.8
  26126. },
  26127. "severity" : "MEDIUM",
  26128. "exploitabilityScore" : 8.6,
  26129. "impactScore" : 6.4,
  26130. "acInsufInfo" : false,
  26131. "obtainAllPrivilege" : false,
  26132. "obtainUserPrivilege" : false,
  26133. "obtainOtherPrivilege" : false,
  26134. "userInteractionRequired" : true
  26135. }
  26136. },
  26137. "publishedDate" : "2021-04-29T17:15Z",
  26138. "lastModifiedDate" : "2021-05-09T02:02Z"
  26139. }, {
  26140. "cve" : {
  26141. "data_type" : "CVE",
  26142. "data_format" : "MITRE",
  26143. "data_version" : "4.0",
  26144. "CVE_data_meta" : {
  26145. "ID" : "CVE-2021-30234",
  26146. "ASSIGNER" : "cve@mitre.org"
  26147. },
  26148. "problemtype" : {
  26149. "problemtype_data" : [ {
  26150. "description" : [ {
  26151. "lang" : "en",
  26152. "value" : "CWE-77"
  26153. } ]
  26154. } ]
  26155. },
  26156. "references" : {
  26157. "reference_data" : [ {
  26158. "url" : "http://iot.10086.cn/?l=en-us",
  26159. "name" : "http://iot.10086.cn/?l=en-us",
  26160. "refsource" : "MISC",
  26161. "tags" : [ "Product" ]
  26162. }, {
  26163. "url" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26164. "name" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26165. "refsource" : "MISC",
  26166. "tags" : [ "Third Party Advisory" ]
  26167. }, {
  26168. "url" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection7.md",
  26169. "name" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection7.md",
  26170. "refsource" : "MISC",
  26171. "tags" : [ "Exploit", "Third Party Advisory" ]
  26172. } ]
  26173. },
  26174. "description" : {
  26175. "description_data" : [ {
  26176. "lang" : "en",
  26177. "value" : "The api/ZRIGMP/set_MLD_PROXY interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the MLD_PROXY_WAN_CONNECT parameter."
  26178. } ]
  26179. }
  26180. },
  26181. "configurations" : {
  26182. "CVE_data_version" : "4.0",
  26183. "nodes" : [ {
  26184. "operator" : "AND",
  26185. "children" : [ {
  26186. "operator" : "OR",
  26187. "children" : [ ],
  26188. "cpe_match" : [ {
  26189. "vulnerable" : true,
  26190. "cpe23Uri" : "cpe:2.3:o:chinamobile:an_lianbao_wf-1_firmware:1.0.1:*:*:*:*:*:*:*",
  26191. "cpe_name" : [ ]
  26192. } ]
  26193. }, {
  26194. "operator" : "OR",
  26195. "children" : [ ],
  26196. "cpe_match" : [ {
  26197. "vulnerable" : false,
  26198. "cpe23Uri" : "cpe:2.3:h:chinamobile:an_lianbao_wf-1:-:*:*:*:*:*:*:*",
  26199. "cpe_name" : [ ]
  26200. } ]
  26201. } ],
  26202. "cpe_match" : [ ]
  26203. } ]
  26204. },
  26205. "impact" : {
  26206. "baseMetricV3" : {
  26207. "cvssV3" : {
  26208. "version" : "3.1",
  26209. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  26210. "attackVector" : "NETWORK",
  26211. "attackComplexity" : "LOW",
  26212. "privilegesRequired" : "NONE",
  26213. "userInteraction" : "NONE",
  26214. "scope" : "UNCHANGED",
  26215. "confidentialityImpact" : "HIGH",
  26216. "integrityImpact" : "HIGH",
  26217. "availabilityImpact" : "HIGH",
  26218. "baseScore" : 9.8,
  26219. "baseSeverity" : "CRITICAL"
  26220. },
  26221. "exploitabilityScore" : 3.9,
  26222. "impactScore" : 5.9
  26223. },
  26224. "baseMetricV2" : {
  26225. "cvssV2" : {
  26226. "version" : "2.0",
  26227. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  26228. "accessVector" : "NETWORK",
  26229. "accessComplexity" : "LOW",
  26230. "authentication" : "NONE",
  26231. "confidentialityImpact" : "PARTIAL",
  26232. "integrityImpact" : "PARTIAL",
  26233. "availabilityImpact" : "PARTIAL",
  26234. "baseScore" : 7.5
  26235. },
  26236. "severity" : "HIGH",
  26237. "exploitabilityScore" : 10.0,
  26238. "impactScore" : 6.4,
  26239. "acInsufInfo" : false,
  26240. "obtainAllPrivilege" : false,
  26241. "obtainUserPrivilege" : false,
  26242. "obtainOtherPrivilege" : false,
  26243. "userInteractionRequired" : false
  26244. }
  26245. },
  26246. "publishedDate" : "2021-04-29T16:15Z",
  26247. "lastModifiedDate" : "2021-05-07T18:25Z"
  26248. }, {
  26249. "cve" : {
  26250. "data_type" : "CVE",
  26251. "data_format" : "MITRE",
  26252. "data_version" : "4.0",
  26253. "CVE_data_meta" : {
  26254. "ID" : "CVE-2021-30233",
  26255. "ASSIGNER" : "cve@mitre.org"
  26256. },
  26257. "problemtype" : {
  26258. "problemtype_data" : [ {
  26259. "description" : [ {
  26260. "lang" : "en",
  26261. "value" : "CWE-77"
  26262. } ]
  26263. } ]
  26264. },
  26265. "references" : {
  26266. "reference_data" : [ {
  26267. "url" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection8.md",
  26268. "name" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection8.md",
  26269. "refsource" : "MISC",
  26270. "tags" : [ "Exploit", "Third Party Advisory" ]
  26271. }, {
  26272. "url" : "http://iot.10086.cn/?l=en-us",
  26273. "name" : "http://iot.10086.cn/?l=en-us",
  26274. "refsource" : "MISC",
  26275. "tags" : [ "Product" ]
  26276. }, {
  26277. "url" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26278. "name" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26279. "refsource" : "MISC",
  26280. "tags" : [ "Third Party Advisory" ]
  26281. } ]
  26282. },
  26283. "description" : {
  26284. "description_data" : [ {
  26285. "lang" : "en",
  26286. "value" : "The api/ZRIptv/setIptvInfo interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the iptv_vlan parameter."
  26287. } ]
  26288. }
  26289. },
  26290. "configurations" : {
  26291. "CVE_data_version" : "4.0",
  26292. "nodes" : [ {
  26293. "operator" : "AND",
  26294. "children" : [ {
  26295. "operator" : "OR",
  26296. "children" : [ ],
  26297. "cpe_match" : [ {
  26298. "vulnerable" : true,
  26299. "cpe23Uri" : "cpe:2.3:o:chinamobile:an_lianbao_wf-1_firmware:1.0.1:*:*:*:*:*:*:*",
  26300. "cpe_name" : [ ]
  26301. } ]
  26302. }, {
  26303. "operator" : "OR",
  26304. "children" : [ ],
  26305. "cpe_match" : [ {
  26306. "vulnerable" : false,
  26307. "cpe23Uri" : "cpe:2.3:h:chinamobile:an_lianbao_wf-1:-:*:*:*:*:*:*:*",
  26308. "cpe_name" : [ ]
  26309. } ]
  26310. } ],
  26311. "cpe_match" : [ ]
  26312. } ]
  26313. },
  26314. "impact" : {
  26315. "baseMetricV3" : {
  26316. "cvssV3" : {
  26317. "version" : "3.1",
  26318. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  26319. "attackVector" : "NETWORK",
  26320. "attackComplexity" : "LOW",
  26321. "privilegesRequired" : "NONE",
  26322. "userInteraction" : "NONE",
  26323. "scope" : "UNCHANGED",
  26324. "confidentialityImpact" : "HIGH",
  26325. "integrityImpact" : "HIGH",
  26326. "availabilityImpact" : "HIGH",
  26327. "baseScore" : 9.8,
  26328. "baseSeverity" : "CRITICAL"
  26329. },
  26330. "exploitabilityScore" : 3.9,
  26331. "impactScore" : 5.9
  26332. },
  26333. "baseMetricV2" : {
  26334. "cvssV2" : {
  26335. "version" : "2.0",
  26336. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  26337. "accessVector" : "NETWORK",
  26338. "accessComplexity" : "LOW",
  26339. "authentication" : "NONE",
  26340. "confidentialityImpact" : "PARTIAL",
  26341. "integrityImpact" : "PARTIAL",
  26342. "availabilityImpact" : "PARTIAL",
  26343. "baseScore" : 7.5
  26344. },
  26345. "severity" : "HIGH",
  26346. "exploitabilityScore" : 10.0,
  26347. "impactScore" : 6.4,
  26348. "acInsufInfo" : false,
  26349. "obtainAllPrivilege" : false,
  26350. "obtainUserPrivilege" : false,
  26351. "obtainOtherPrivilege" : false,
  26352. "userInteractionRequired" : false
  26353. }
  26354. },
  26355. "publishedDate" : "2021-04-29T16:15Z",
  26356. "lastModifiedDate" : "2021-05-06T21:15Z"
  26357. }, {
  26358. "cve" : {
  26359. "data_type" : "CVE",
  26360. "data_format" : "MITRE",
  26361. "data_version" : "4.0",
  26362. "CVE_data_meta" : {
  26363. "ID" : "CVE-2021-30232",
  26364. "ASSIGNER" : "cve@mitre.org"
  26365. },
  26366. "problemtype" : {
  26367. "problemtype_data" : [ {
  26368. "description" : [ {
  26369. "lang" : "en",
  26370. "value" : "CWE-77"
  26371. } ]
  26372. } ]
  26373. },
  26374. "references" : {
  26375. "reference_data" : [ {
  26376. "url" : "http://iot.10086.cn/?l=en-us",
  26377. "name" : "http://iot.10086.cn/?l=en-us",
  26378. "refsource" : "MISC",
  26379. "tags" : [ "Product" ]
  26380. }, {
  26381. "url" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26382. "name" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26383. "refsource" : "MISC",
  26384. "tags" : [ "Third Party Advisory" ]
  26385. }, {
  26386. "url" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection6.md",
  26387. "name" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection6.md",
  26388. "refsource" : "MISC",
  26389. "tags" : [ "Exploit", "Third Party Advisory" ]
  26390. } ]
  26391. },
  26392. "description" : {
  26393. "description_data" : [ {
  26394. "lang" : "en",
  26395. "value" : "The api/ZRIGMP/set_IGMP_PROXY interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the IGMP_PROXY_WAN_CONNECT parameter."
  26396. } ]
  26397. }
  26398. },
  26399. "configurations" : {
  26400. "CVE_data_version" : "4.0",
  26401. "nodes" : [ {
  26402. "operator" : "AND",
  26403. "children" : [ {
  26404. "operator" : "OR",
  26405. "children" : [ ],
  26406. "cpe_match" : [ {
  26407. "vulnerable" : true,
  26408. "cpe23Uri" : "cpe:2.3:o:chinamobile:an_lianbao_wf-1_firmware:1.0.1:*:*:*:*:*:*:*",
  26409. "cpe_name" : [ ]
  26410. } ]
  26411. }, {
  26412. "operator" : "OR",
  26413. "children" : [ ],
  26414. "cpe_match" : [ {
  26415. "vulnerable" : false,
  26416. "cpe23Uri" : "cpe:2.3:h:chinamobile:an_lianbao_wf-1:-:*:*:*:*:*:*:*",
  26417. "cpe_name" : [ ]
  26418. } ]
  26419. } ],
  26420. "cpe_match" : [ ]
  26421. } ]
  26422. },
  26423. "impact" : {
  26424. "baseMetricV3" : {
  26425. "cvssV3" : {
  26426. "version" : "3.1",
  26427. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  26428. "attackVector" : "NETWORK",
  26429. "attackComplexity" : "LOW",
  26430. "privilegesRequired" : "NONE",
  26431. "userInteraction" : "NONE",
  26432. "scope" : "UNCHANGED",
  26433. "confidentialityImpact" : "HIGH",
  26434. "integrityImpact" : "HIGH",
  26435. "availabilityImpact" : "HIGH",
  26436. "baseScore" : 9.8,
  26437. "baseSeverity" : "CRITICAL"
  26438. },
  26439. "exploitabilityScore" : 3.9,
  26440. "impactScore" : 5.9
  26441. },
  26442. "baseMetricV2" : {
  26443. "cvssV2" : {
  26444. "version" : "2.0",
  26445. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  26446. "accessVector" : "NETWORK",
  26447. "accessComplexity" : "LOW",
  26448. "authentication" : "NONE",
  26449. "confidentialityImpact" : "PARTIAL",
  26450. "integrityImpact" : "PARTIAL",
  26451. "availabilityImpact" : "PARTIAL",
  26452. "baseScore" : 7.5
  26453. },
  26454. "severity" : "HIGH",
  26455. "exploitabilityScore" : 10.0,
  26456. "impactScore" : 6.4,
  26457. "acInsufInfo" : false,
  26458. "obtainAllPrivilege" : false,
  26459. "obtainUserPrivilege" : false,
  26460. "obtainOtherPrivilege" : false,
  26461. "userInteractionRequired" : false
  26462. }
  26463. },
  26464. "publishedDate" : "2021-04-29T16:15Z",
  26465. "lastModifiedDate" : "2021-05-06T21:15Z"
  26466. }, {
  26467. "cve" : {
  26468. "data_type" : "CVE",
  26469. "data_format" : "MITRE",
  26470. "data_version" : "4.0",
  26471. "CVE_data_meta" : {
  26472. "ID" : "CVE-2021-30231",
  26473. "ASSIGNER" : "cve@mitre.org"
  26474. },
  26475. "problemtype" : {
  26476. "problemtype_data" : [ {
  26477. "description" : [ {
  26478. "lang" : "en",
  26479. "value" : "CWE-77"
  26480. } ]
  26481. } ]
  26482. },
  26483. "references" : {
  26484. "reference_data" : [ {
  26485. "url" : "http://iot.10086.cn/?l=en-us",
  26486. "name" : "http://iot.10086.cn/?l=en-us",
  26487. "refsource" : "MISC",
  26488. "tags" : [ "Product" ]
  26489. }, {
  26490. "url" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26491. "name" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26492. "refsource" : "MISC",
  26493. "tags" : [ "Third Party Advisory" ]
  26494. }, {
  26495. "url" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection4.md",
  26496. "name" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection4.md",
  26497. "refsource" : "MISC",
  26498. "tags" : [ "Exploit", "Third Party Advisory" ]
  26499. } ]
  26500. },
  26501. "description" : {
  26502. "description_data" : [ {
  26503. "lang" : "en",
  26504. "value" : "The api/zrDm/set_ZRElink interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the bssaddr, abiaddr, devtoken, devid, elinksync, or elink_proc_enable parameter."
  26505. } ]
  26506. }
  26507. },
  26508. "configurations" : {
  26509. "CVE_data_version" : "4.0",
  26510. "nodes" : [ {
  26511. "operator" : "AND",
  26512. "children" : [ {
  26513. "operator" : "OR",
  26514. "children" : [ ],
  26515. "cpe_match" : [ {
  26516. "vulnerable" : true,
  26517. "cpe23Uri" : "cpe:2.3:o:chinamobile:an_lianbao_wf-1_firmware:1.0.1:*:*:*:*:*:*:*",
  26518. "cpe_name" : [ ]
  26519. } ]
  26520. }, {
  26521. "operator" : "OR",
  26522. "children" : [ ],
  26523. "cpe_match" : [ {
  26524. "vulnerable" : false,
  26525. "cpe23Uri" : "cpe:2.3:h:chinamobile:an_lianbao_wf-1:-:*:*:*:*:*:*:*",
  26526. "cpe_name" : [ ]
  26527. } ]
  26528. } ],
  26529. "cpe_match" : [ ]
  26530. } ]
  26531. },
  26532. "impact" : {
  26533. "baseMetricV3" : {
  26534. "cvssV3" : {
  26535. "version" : "3.1",
  26536. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  26537. "attackVector" : "NETWORK",
  26538. "attackComplexity" : "LOW",
  26539. "privilegesRequired" : "NONE",
  26540. "userInteraction" : "NONE",
  26541. "scope" : "UNCHANGED",
  26542. "confidentialityImpact" : "HIGH",
  26543. "integrityImpact" : "HIGH",
  26544. "availabilityImpact" : "HIGH",
  26545. "baseScore" : 9.8,
  26546. "baseSeverity" : "CRITICAL"
  26547. },
  26548. "exploitabilityScore" : 3.9,
  26549. "impactScore" : 5.9
  26550. },
  26551. "baseMetricV2" : {
  26552. "cvssV2" : {
  26553. "version" : "2.0",
  26554. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  26555. "accessVector" : "NETWORK",
  26556. "accessComplexity" : "LOW",
  26557. "authentication" : "NONE",
  26558. "confidentialityImpact" : "PARTIAL",
  26559. "integrityImpact" : "PARTIAL",
  26560. "availabilityImpact" : "PARTIAL",
  26561. "baseScore" : 7.5
  26562. },
  26563. "severity" : "HIGH",
  26564. "exploitabilityScore" : 10.0,
  26565. "impactScore" : 6.4,
  26566. "acInsufInfo" : false,
  26567. "obtainAllPrivilege" : false,
  26568. "obtainUserPrivilege" : false,
  26569. "obtainOtherPrivilege" : false,
  26570. "userInteractionRequired" : false
  26571. }
  26572. },
  26573. "publishedDate" : "2021-04-29T16:15Z",
  26574. "lastModifiedDate" : "2021-05-07T18:31Z"
  26575. }, {
  26576. "cve" : {
  26577. "data_type" : "CVE",
  26578. "data_format" : "MITRE",
  26579. "data_version" : "4.0",
  26580. "CVE_data_meta" : {
  26581. "ID" : "CVE-2021-30230",
  26582. "ASSIGNER" : "cve@mitre.org"
  26583. },
  26584. "problemtype" : {
  26585. "problemtype_data" : [ {
  26586. "description" : [ {
  26587. "lang" : "en",
  26588. "value" : "CWE-77"
  26589. } ]
  26590. } ]
  26591. },
  26592. "references" : {
  26593. "reference_data" : [ {
  26594. "url" : "http://iot.10086.cn/?l=en-us",
  26595. "name" : "http://iot.10086.cn/?l=en-us",
  26596. "refsource" : "MISC",
  26597. "tags" : [ "Product" ]
  26598. }, {
  26599. "url" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26600. "name" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26601. "refsource" : "MISC",
  26602. "tags" : [ "Third Party Advisory" ]
  26603. }, {
  26604. "url" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection5.md",
  26605. "name" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection5.md",
  26606. "refsource" : "MISC",
  26607. "tags" : [ "Exploit", "Third Party Advisory" ]
  26608. } ]
  26609. },
  26610. "description" : {
  26611. "description_data" : [ {
  26612. "lang" : "en",
  26613. "value" : "The api/ZRFirmware/set_time_zone interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the zonename parameter."
  26614. } ]
  26615. }
  26616. },
  26617. "configurations" : {
  26618. "CVE_data_version" : "4.0",
  26619. "nodes" : [ {
  26620. "operator" : "AND",
  26621. "children" : [ {
  26622. "operator" : "OR",
  26623. "children" : [ ],
  26624. "cpe_match" : [ {
  26625. "vulnerable" : true,
  26626. "cpe23Uri" : "cpe:2.3:o:chinamobile:an_lianbao_wf-1_firmware:1.0.1:*:*:*:*:*:*:*",
  26627. "cpe_name" : [ ]
  26628. } ]
  26629. }, {
  26630. "operator" : "OR",
  26631. "children" : [ ],
  26632. "cpe_match" : [ {
  26633. "vulnerable" : false,
  26634. "cpe23Uri" : "cpe:2.3:h:chinamobile:an_lianbao_wf-1:-:*:*:*:*:*:*:*",
  26635. "cpe_name" : [ ]
  26636. } ]
  26637. } ],
  26638. "cpe_match" : [ ]
  26639. } ]
  26640. },
  26641. "impact" : {
  26642. "baseMetricV3" : {
  26643. "cvssV3" : {
  26644. "version" : "3.1",
  26645. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  26646. "attackVector" : "NETWORK",
  26647. "attackComplexity" : "LOW",
  26648. "privilegesRequired" : "NONE",
  26649. "userInteraction" : "NONE",
  26650. "scope" : "UNCHANGED",
  26651. "confidentialityImpact" : "HIGH",
  26652. "integrityImpact" : "HIGH",
  26653. "availabilityImpact" : "HIGH",
  26654. "baseScore" : 9.8,
  26655. "baseSeverity" : "CRITICAL"
  26656. },
  26657. "exploitabilityScore" : 3.9,
  26658. "impactScore" : 5.9
  26659. },
  26660. "baseMetricV2" : {
  26661. "cvssV2" : {
  26662. "version" : "2.0",
  26663. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  26664. "accessVector" : "NETWORK",
  26665. "accessComplexity" : "LOW",
  26666. "authentication" : "NONE",
  26667. "confidentialityImpact" : "PARTIAL",
  26668. "integrityImpact" : "PARTIAL",
  26669. "availabilityImpact" : "PARTIAL",
  26670. "baseScore" : 7.5
  26671. },
  26672. "severity" : "HIGH",
  26673. "exploitabilityScore" : 10.0,
  26674. "impactScore" : 6.4,
  26675. "acInsufInfo" : false,
  26676. "obtainAllPrivilege" : false,
  26677. "obtainUserPrivilege" : false,
  26678. "obtainOtherPrivilege" : false,
  26679. "userInteractionRequired" : false
  26680. }
  26681. },
  26682. "publishedDate" : "2021-04-29T16:15Z",
  26683. "lastModifiedDate" : "2021-05-07T18:30Z"
  26684. }, {
  26685. "cve" : {
  26686. "data_type" : "CVE",
  26687. "data_format" : "MITRE",
  26688. "data_version" : "4.0",
  26689. "CVE_data_meta" : {
  26690. "ID" : "CVE-2021-30229",
  26691. "ASSIGNER" : "cve@mitre.org"
  26692. },
  26693. "problemtype" : {
  26694. "problemtype_data" : [ {
  26695. "description" : [ {
  26696. "lang" : "en",
  26697. "value" : "CWE-77"
  26698. } ]
  26699. } ]
  26700. },
  26701. "references" : {
  26702. "reference_data" : [ {
  26703. "url" : "http://iot.10086.cn/?l=en-us",
  26704. "name" : "http://iot.10086.cn/?l=en-us",
  26705. "refsource" : "MISC",
  26706. "tags" : [ "Product" ]
  26707. }, {
  26708. "url" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26709. "name" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26710. "refsource" : "MISC",
  26711. "tags" : [ "Third Party Advisory" ]
  26712. }, {
  26713. "url" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection3.md",
  26714. "name" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection3.md",
  26715. "refsource" : "MISC",
  26716. "tags" : [ "Exploit", "Third Party Advisory" ]
  26717. } ]
  26718. },
  26719. "description" : {
  26720. "description_data" : [ {
  26721. "lang" : "en",
  26722. "value" : "The api/zrDm/set_zrDm interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the dm_enable, AppKey, or Pwd parameter."
  26723. } ]
  26724. }
  26725. },
  26726. "configurations" : {
  26727. "CVE_data_version" : "4.0",
  26728. "nodes" : [ {
  26729. "operator" : "AND",
  26730. "children" : [ {
  26731. "operator" : "OR",
  26732. "children" : [ ],
  26733. "cpe_match" : [ {
  26734. "vulnerable" : true,
  26735. "cpe23Uri" : "cpe:2.3:o:chinamobile:an_lianbao_wf-1_firmware:1.0.1:*:*:*:*:*:*:*",
  26736. "cpe_name" : [ ]
  26737. } ]
  26738. }, {
  26739. "operator" : "OR",
  26740. "children" : [ ],
  26741. "cpe_match" : [ {
  26742. "vulnerable" : false,
  26743. "cpe23Uri" : "cpe:2.3:h:chinamobile:an_lianbao_wf-1:-:*:*:*:*:*:*:*",
  26744. "cpe_name" : [ ]
  26745. } ]
  26746. } ],
  26747. "cpe_match" : [ ]
  26748. } ]
  26749. },
  26750. "impact" : {
  26751. "baseMetricV3" : {
  26752. "cvssV3" : {
  26753. "version" : "3.1",
  26754. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  26755. "attackVector" : "NETWORK",
  26756. "attackComplexity" : "LOW",
  26757. "privilegesRequired" : "LOW",
  26758. "userInteraction" : "NONE",
  26759. "scope" : "UNCHANGED",
  26760. "confidentialityImpact" : "HIGH",
  26761. "integrityImpact" : "HIGH",
  26762. "availabilityImpact" : "HIGH",
  26763. "baseScore" : 8.8,
  26764. "baseSeverity" : "HIGH"
  26765. },
  26766. "exploitabilityScore" : 2.8,
  26767. "impactScore" : 5.9
  26768. },
  26769. "baseMetricV2" : {
  26770. "cvssV2" : {
  26771. "version" : "2.0",
  26772. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  26773. "accessVector" : "NETWORK",
  26774. "accessComplexity" : "LOW",
  26775. "authentication" : "SINGLE",
  26776. "confidentialityImpact" : "PARTIAL",
  26777. "integrityImpact" : "PARTIAL",
  26778. "availabilityImpact" : "PARTIAL",
  26779. "baseScore" : 6.5
  26780. },
  26781. "severity" : "MEDIUM",
  26782. "exploitabilityScore" : 8.0,
  26783. "impactScore" : 6.4,
  26784. "acInsufInfo" : false,
  26785. "obtainAllPrivilege" : false,
  26786. "obtainUserPrivilege" : false,
  26787. "obtainOtherPrivilege" : false,
  26788. "userInteractionRequired" : false
  26789. }
  26790. },
  26791. "publishedDate" : "2021-04-29T16:15Z",
  26792. "lastModifiedDate" : "2021-05-07T18:30Z"
  26793. }, {
  26794. "cve" : {
  26795. "data_type" : "CVE",
  26796. "data_format" : "MITRE",
  26797. "data_version" : "4.0",
  26798. "CVE_data_meta" : {
  26799. "ID" : "CVE-2021-30228",
  26800. "ASSIGNER" : "cve@mitre.org"
  26801. },
  26802. "problemtype" : {
  26803. "problemtype_data" : [ {
  26804. "description" : [ {
  26805. "lang" : "en",
  26806. "value" : "CWE-77"
  26807. } ]
  26808. } ]
  26809. },
  26810. "references" : {
  26811. "reference_data" : [ {
  26812. "url" : "http://iot.10086.cn/?l=en-us",
  26813. "name" : "http://iot.10086.cn/?l=en-us",
  26814. "refsource" : "MISC",
  26815. "tags" : [ "Product" ]
  26816. }, {
  26817. "url" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26818. "name" : "https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520",
  26819. "refsource" : "MISC",
  26820. "tags" : [ "Third Party Advisory" ]
  26821. }, {
  26822. "url" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection2.md",
  26823. "name" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection2.md",
  26824. "refsource" : "MISC",
  26825. "tags" : [ "Exploit", "Third Party Advisory" ]
  26826. } ]
  26827. },
  26828. "description" : {
  26829. "description_data" : [ {
  26830. "lang" : "en",
  26831. "value" : "The api/ZRAndlink/set_ZRAndlink interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the iandlink_proc_enable parameter."
  26832. } ]
  26833. }
  26834. },
  26835. "configurations" : {
  26836. "CVE_data_version" : "4.0",
  26837. "nodes" : [ {
  26838. "operator" : "AND",
  26839. "children" : [ {
  26840. "operator" : "OR",
  26841. "children" : [ ],
  26842. "cpe_match" : [ {
  26843. "vulnerable" : true,
  26844. "cpe23Uri" : "cpe:2.3:o:chinamobile:an_lianbao_wf-1_firmware:1.0.1:*:*:*:*:*:*:*",
  26845. "cpe_name" : [ ]
  26846. } ]
  26847. }, {
  26848. "operator" : "OR",
  26849. "children" : [ ],
  26850. "cpe_match" : [ {
  26851. "vulnerable" : false,
  26852. "cpe23Uri" : "cpe:2.3:h:chinamobile:an_lianbao_wf-1:-:*:*:*:*:*:*:*",
  26853. "cpe_name" : [ ]
  26854. } ]
  26855. } ],
  26856. "cpe_match" : [ ]
  26857. } ]
  26858. },
  26859. "impact" : {
  26860. "baseMetricV3" : {
  26861. "cvssV3" : {
  26862. "version" : "3.1",
  26863. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  26864. "attackVector" : "NETWORK",
  26865. "attackComplexity" : "LOW",
  26866. "privilegesRequired" : "NONE",
  26867. "userInteraction" : "NONE",
  26868. "scope" : "UNCHANGED",
  26869. "confidentialityImpact" : "HIGH",
  26870. "integrityImpact" : "HIGH",
  26871. "availabilityImpact" : "HIGH",
  26872. "baseScore" : 9.8,
  26873. "baseSeverity" : "CRITICAL"
  26874. },
  26875. "exploitabilityScore" : 3.9,
  26876. "impactScore" : 5.9
  26877. },
  26878. "baseMetricV2" : {
  26879. "cvssV2" : {
  26880. "version" : "2.0",
  26881. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  26882. "accessVector" : "NETWORK",
  26883. "accessComplexity" : "LOW",
  26884. "authentication" : "NONE",
  26885. "confidentialityImpact" : "PARTIAL",
  26886. "integrityImpact" : "PARTIAL",
  26887. "availabilityImpact" : "PARTIAL",
  26888. "baseScore" : 7.5
  26889. },
  26890. "severity" : "HIGH",
  26891. "exploitabilityScore" : 10.0,
  26892. "impactScore" : 6.4,
  26893. "acInsufInfo" : false,
  26894. "obtainAllPrivilege" : false,
  26895. "obtainUserPrivilege" : false,
  26896. "obtainOtherPrivilege" : false,
  26897. "userInteractionRequired" : false
  26898. }
  26899. },
  26900. "publishedDate" : "2021-04-29T16:15Z",
  26901. "lastModifiedDate" : "2021-05-07T18:29Z"
  26902. }, {
  26903. "cve" : {
  26904. "data_type" : "CVE",
  26905. "data_format" : "MITRE",
  26906. "data_version" : "4.0",
  26907. "CVE_data_meta" : {
  26908. "ID" : "CVE-2021-30227",
  26909. "ASSIGNER" : "cve@mitre.org"
  26910. },
  26911. "problemtype" : {
  26912. "problemtype_data" : [ {
  26913. "description" : [ {
  26914. "lang" : "en",
  26915. "value" : "CWE-79"
  26916. } ]
  26917. } ]
  26918. },
  26919. "references" : {
  26920. "reference_data" : [ {
  26921. "url" : "https://github.com/emlog/emlog/issues/79",
  26922. "name" : "https://github.com/emlog/emlog/issues/79",
  26923. "refsource" : "MISC",
  26924. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  26925. } ]
  26926. },
  26927. "description" : {
  26928. "description_data" : [ {
  26929. "lang" : "en",
  26930. "value" : "Cross Site Scripting (XSS) vulnerability in the article comments feature in emlog 6.0."
  26931. } ]
  26932. }
  26933. },
  26934. "configurations" : {
  26935. "CVE_data_version" : "4.0",
  26936. "nodes" : [ {
  26937. "operator" : "OR",
  26938. "children" : [ ],
  26939. "cpe_match" : [ {
  26940. "vulnerable" : true,
  26941. "cpe23Uri" : "cpe:2.3:a:emlog:emlog:6.0.0:-:*:*:*:*:*:*",
  26942. "cpe_name" : [ ]
  26943. } ]
  26944. } ]
  26945. },
  26946. "impact" : {
  26947. "baseMetricV3" : {
  26948. "cvssV3" : {
  26949. "version" : "3.1",
  26950. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  26951. "attackVector" : "NETWORK",
  26952. "attackComplexity" : "LOW",
  26953. "privilegesRequired" : "NONE",
  26954. "userInteraction" : "REQUIRED",
  26955. "scope" : "CHANGED",
  26956. "confidentialityImpact" : "LOW",
  26957. "integrityImpact" : "LOW",
  26958. "availabilityImpact" : "NONE",
  26959. "baseScore" : 6.1,
  26960. "baseSeverity" : "MEDIUM"
  26961. },
  26962. "exploitabilityScore" : 2.8,
  26963. "impactScore" : 2.7
  26964. },
  26965. "baseMetricV2" : {
  26966. "cvssV2" : {
  26967. "version" : "2.0",
  26968. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  26969. "accessVector" : "NETWORK",
  26970. "accessComplexity" : "MEDIUM",
  26971. "authentication" : "NONE",
  26972. "confidentialityImpact" : "NONE",
  26973. "integrityImpact" : "PARTIAL",
  26974. "availabilityImpact" : "NONE",
  26975. "baseScore" : 4.3
  26976. },
  26977. "severity" : "MEDIUM",
  26978. "exploitabilityScore" : 8.6,
  26979. "impactScore" : 2.9,
  26980. "acInsufInfo" : false,
  26981. "obtainAllPrivilege" : false,
  26982. "obtainUserPrivilege" : false,
  26983. "obtainOtherPrivilege" : false,
  26984. "userInteractionRequired" : true
  26985. }
  26986. },
  26987. "publishedDate" : "2021-04-29T16:15Z",
  26988. "lastModifiedDate" : "2021-05-03T18:03Z"
  26989. }, {
  26990. "cve" : {
  26991. "data_type" : "CVE",
  26992. "data_format" : "MITRE",
  26993. "data_version" : "4.0",
  26994. "CVE_data_meta" : {
  26995. "ID" : "CVE-2021-29350",
  26996. "ASSIGNER" : "cve@mitre.org"
  26997. },
  26998. "problemtype" : {
  26999. "problemtype_data" : [ {
  27000. "description" : [ {
  27001. "lang" : "en",
  27002. "value" : "CWE-89"
  27003. } ]
  27004. } ]
  27005. },
  27006. "references" : {
  27007. "reference_data" : [ {
  27008. "url" : "https://github.com/XD-519/Doc/blob/main/sql%20injection.md",
  27009. "name" : "https://github.com/XD-519/Doc/blob/main/sql%20injection.md",
  27010. "refsource" : "MISC",
  27011. "tags" : [ "Exploit", "Third Party Advisory" ]
  27012. } ]
  27013. },
  27014. "description" : {
  27015. "description_data" : [ {
  27016. "lang" : "en",
  27017. "value" : "SQL injection in the getip function in conn/function.php in ??100-???????? 1.1 allows remote attackers to inject arbitrary SQL commands via the X-Forwarded-For header to admin/product_add.php."
  27018. } ]
  27019. }
  27020. },
  27021. "configurations" : {
  27022. "CVE_data_version" : "4.0",
  27023. "nodes" : [ {
  27024. "operator" : "OR",
  27025. "children" : [ ],
  27026. "cpe_match" : [ {
  27027. "vulnerable" : true,
  27028. "cpe23Uri" : "cpe:2.3:a:shipment_100-design_material_download_system_project:shipment_100-design_material_download_system:1.1:*:*:*:*:*:*:*",
  27029. "cpe_name" : [ ]
  27030. } ]
  27031. } ]
  27032. },
  27033. "impact" : {
  27034. "baseMetricV3" : {
  27035. "cvssV3" : {
  27036. "version" : "3.1",
  27037. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  27038. "attackVector" : "NETWORK",
  27039. "attackComplexity" : "LOW",
  27040. "privilegesRequired" : "HIGH",
  27041. "userInteraction" : "NONE",
  27042. "scope" : "UNCHANGED",
  27043. "confidentialityImpact" : "HIGH",
  27044. "integrityImpact" : "HIGH",
  27045. "availabilityImpact" : "HIGH",
  27046. "baseScore" : 7.2,
  27047. "baseSeverity" : "HIGH"
  27048. },
  27049. "exploitabilityScore" : 1.2,
  27050. "impactScore" : 5.9
  27051. },
  27052. "baseMetricV2" : {
  27053. "cvssV2" : {
  27054. "version" : "2.0",
  27055. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  27056. "accessVector" : "NETWORK",
  27057. "accessComplexity" : "LOW",
  27058. "authentication" : "SINGLE",
  27059. "confidentialityImpact" : "PARTIAL",
  27060. "integrityImpact" : "PARTIAL",
  27061. "availabilityImpact" : "PARTIAL",
  27062. "baseScore" : 6.5
  27063. },
  27064. "severity" : "MEDIUM",
  27065. "exploitabilityScore" : 8.0,
  27066. "impactScore" : 6.4,
  27067. "acInsufInfo" : false,
  27068. "obtainAllPrivilege" : false,
  27069. "obtainUserPrivilege" : false,
  27070. "obtainOtherPrivilege" : false,
  27071. "userInteractionRequired" : false
  27072. }
  27073. },
  27074. "publishedDate" : "2021-04-29T16:15Z",
  27075. "lastModifiedDate" : "2021-05-09T02:26Z"
  27076. }, {
  27077. "cve" : {
  27078. "data_type" : "CVE",
  27079. "data_format" : "MITRE",
  27080. "data_version" : "4.0",
  27081. "CVE_data_meta" : {
  27082. "ID" : "CVE-2021-25812",
  27083. "ASSIGNER" : "cve@mitre.org"
  27084. },
  27085. "problemtype" : {
  27086. "problemtype_data" : [ {
  27087. "description" : [ {
  27088. "lang" : "en",
  27089. "value" : "CWE-77"
  27090. } ]
  27091. } ]
  27092. },
  27093. "references" : {
  27094. "reference_data" : [ {
  27095. "url" : "https://www.zhipinmall.com/prodetail?id=1266#skuId=3020",
  27096. "name" : "https://www.zhipinmall.com/prodetail?id=1266#skuId=3020",
  27097. "refsource" : "MISC",
  27098. "tags" : [ "Third Party Advisory" ]
  27099. }, {
  27100. "url" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection.md",
  27101. "name" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection.md",
  27102. "refsource" : "MISC",
  27103. "tags" : [ "Third Party Advisory" ]
  27104. }, {
  27105. "url" : "http://iot.10086.cn/?l=en-us",
  27106. "name" : "http://iot.10086.cn/?l=en-us",
  27107. "refsource" : "MISC",
  27108. "tags" : [ "Product" ]
  27109. } ]
  27110. },
  27111. "description" : {
  27112. "description_data" : [ {
  27113. "lang" : "en",
  27114. "value" : "Command injection vulnerability in China Mobile An Lianbao WF-1 1.01 via the 'ip' parameter with a POST request to /api/ZRQos/set_online_client."
  27115. } ]
  27116. }
  27117. },
  27118. "configurations" : {
  27119. "CVE_data_version" : "4.0",
  27120. "nodes" : [ {
  27121. "operator" : "AND",
  27122. "children" : [ {
  27123. "operator" : "OR",
  27124. "children" : [ ],
  27125. "cpe_match" : [ {
  27126. "vulnerable" : true,
  27127. "cpe23Uri" : "cpe:2.3:o:chinamobile:an_lianbao_wf-1_firmware:1.0.1:*:*:*:*:*:*:*",
  27128. "cpe_name" : [ ]
  27129. } ]
  27130. }, {
  27131. "operator" : "OR",
  27132. "children" : [ ],
  27133. "cpe_match" : [ {
  27134. "vulnerable" : false,
  27135. "cpe23Uri" : "cpe:2.3:h:chinamobile:an_lianbao_wf-1:-:*:*:*:*:*:*:*",
  27136. "cpe_name" : [ ]
  27137. } ]
  27138. } ],
  27139. "cpe_match" : [ ]
  27140. } ]
  27141. },
  27142. "impact" : {
  27143. "baseMetricV3" : {
  27144. "cvssV3" : {
  27145. "version" : "3.1",
  27146. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  27147. "attackVector" : "NETWORK",
  27148. "attackComplexity" : "LOW",
  27149. "privilegesRequired" : "NONE",
  27150. "userInteraction" : "NONE",
  27151. "scope" : "UNCHANGED",
  27152. "confidentialityImpact" : "HIGH",
  27153. "integrityImpact" : "HIGH",
  27154. "availabilityImpact" : "HIGH",
  27155. "baseScore" : 9.8,
  27156. "baseSeverity" : "CRITICAL"
  27157. },
  27158. "exploitabilityScore" : 3.9,
  27159. "impactScore" : 5.9
  27160. },
  27161. "baseMetricV2" : {
  27162. "cvssV2" : {
  27163. "version" : "2.0",
  27164. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  27165. "accessVector" : "NETWORK",
  27166. "accessComplexity" : "LOW",
  27167. "authentication" : "NONE",
  27168. "confidentialityImpact" : "PARTIAL",
  27169. "integrityImpact" : "PARTIAL",
  27170. "availabilityImpact" : "PARTIAL",
  27171. "baseScore" : 7.5
  27172. },
  27173. "severity" : "HIGH",
  27174. "exploitabilityScore" : 10.0,
  27175. "impactScore" : 6.4,
  27176. "acInsufInfo" : false,
  27177. "obtainAllPrivilege" : false,
  27178. "obtainUserPrivilege" : false,
  27179. "obtainOtherPrivilege" : false,
  27180. "userInteractionRequired" : false
  27181. }
  27182. },
  27183. "publishedDate" : "2021-04-29T16:15Z",
  27184. "lastModifiedDate" : "2021-05-07T18:31Z"
  27185. }, {
  27186. "cve" : {
  27187. "data_type" : "CVE",
  27188. "data_format" : "MITRE",
  27189. "data_version" : "4.0",
  27190. "CVE_data_meta" : {
  27191. "ID" : "CVE-2021-25811",
  27192. "ASSIGNER" : "cve@mitre.org"
  27193. },
  27194. "problemtype" : {
  27195. "problemtype_data" : [ {
  27196. "description" : [ {
  27197. "lang" : "en",
  27198. "value" : "NVD-CWE-noinfo"
  27199. } ]
  27200. } ]
  27201. },
  27202. "references" : {
  27203. "reference_data" : [ {
  27204. "url" : "https://www.mercusys.com/en/",
  27205. "name" : "https://www.mercusys.com/en/",
  27206. "refsource" : "MISC",
  27207. "tags" : [ "Vendor Advisory" ]
  27208. }, {
  27209. "url" : "https://www.mercurycom.com.cn/product-521-1.html",
  27210. "name" : "https://www.mercurycom.com.cn/product-521-1.html",
  27211. "refsource" : "MISC",
  27212. "tags" : [ "Product", "Vendor Advisory" ]
  27213. }, {
  27214. "url" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/Mercury%20Router%20X18g%20v1.0.5%20Denial%20of%20Service.md",
  27215. "name" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/Mercury%20Router%20X18g%20v1.0.5%20Denial%20of%20Service.md",
  27216. "refsource" : "MISC",
  27217. "tags" : [ "Broken Link" ]
  27218. } ]
  27219. },
  27220. "description" : {
  27221. "description_data" : [ {
  27222. "lang" : "en",
  27223. "value" : "MERCUSYS Mercury X18G 1.0.5 devices allow Denial of service via a crafted value to the POST listen_http_lan parameter. Upon subsequent device restarts after this vulnerability is exploted the device will not be able to access the webserver unless the listen_http_lan parameter to uhttpd.json is manually fixed."
  27224. } ]
  27225. }
  27226. },
  27227. "configurations" : {
  27228. "CVE_data_version" : "4.0",
  27229. "nodes" : [ {
  27230. "operator" : "AND",
  27231. "children" : [ {
  27232. "operator" : "OR",
  27233. "children" : [ ],
  27234. "cpe_match" : [ {
  27235. "vulnerable" : true,
  27236. "cpe23Uri" : "cpe:2.3:o:mercusys:mercury_x18g_firmware:1.0.5:*:*:*:*:*:*:*",
  27237. "cpe_name" : [ ]
  27238. } ]
  27239. }, {
  27240. "operator" : "OR",
  27241. "children" : [ ],
  27242. "cpe_match" : [ {
  27243. "vulnerable" : false,
  27244. "cpe23Uri" : "cpe:2.3:h:mercusys:mercury_x18g:-:*:*:*:*:*:*:*",
  27245. "cpe_name" : [ ]
  27246. } ]
  27247. } ],
  27248. "cpe_match" : [ ]
  27249. } ]
  27250. },
  27251. "impact" : {
  27252. "baseMetricV3" : {
  27253. "cvssV3" : {
  27254. "version" : "3.1",
  27255. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  27256. "attackVector" : "NETWORK",
  27257. "attackComplexity" : "LOW",
  27258. "privilegesRequired" : "NONE",
  27259. "userInteraction" : "NONE",
  27260. "scope" : "UNCHANGED",
  27261. "confidentialityImpact" : "NONE",
  27262. "integrityImpact" : "NONE",
  27263. "availabilityImpact" : "HIGH",
  27264. "baseScore" : 7.5,
  27265. "baseSeverity" : "HIGH"
  27266. },
  27267. "exploitabilityScore" : 3.9,
  27268. "impactScore" : 3.6
  27269. },
  27270. "baseMetricV2" : {
  27271. "cvssV2" : {
  27272. "version" : "2.0",
  27273. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C",
  27274. "accessVector" : "NETWORK",
  27275. "accessComplexity" : "LOW",
  27276. "authentication" : "NONE",
  27277. "confidentialityImpact" : "NONE",
  27278. "integrityImpact" : "NONE",
  27279. "availabilityImpact" : "COMPLETE",
  27280. "baseScore" : 7.8
  27281. },
  27282. "severity" : "HIGH",
  27283. "exploitabilityScore" : 10.0,
  27284. "impactScore" : 6.9,
  27285. "acInsufInfo" : false,
  27286. "obtainAllPrivilege" : false,
  27287. "obtainUserPrivilege" : false,
  27288. "obtainOtherPrivilege" : false,
  27289. "userInteractionRequired" : false
  27290. }
  27291. },
  27292. "publishedDate" : "2021-04-29T16:15Z",
  27293. "lastModifiedDate" : "2021-05-08T04:04Z"
  27294. }, {
  27295. "cve" : {
  27296. "data_type" : "CVE",
  27297. "data_format" : "MITRE",
  27298. "data_version" : "4.0",
  27299. "CVE_data_meta" : {
  27300. "ID" : "CVE-2021-25810",
  27301. "ASSIGNER" : "cve@mitre.org"
  27302. },
  27303. "problemtype" : {
  27304. "problemtype_data" : [ {
  27305. "description" : [ {
  27306. "lang" : "en",
  27307. "value" : "CWE-79"
  27308. } ]
  27309. } ]
  27310. },
  27311. "references" : {
  27312. "reference_data" : [ {
  27313. "url" : "https://www.mercusys.com/en/",
  27314. "name" : "https://www.mercusys.com/en/",
  27315. "refsource" : "MISC",
  27316. "tags" : [ "Vendor Advisory" ]
  27317. }, {
  27318. "url" : "https://www.mercurycom.com.cn/product-521-1.html",
  27319. "name" : "https://www.mercurycom.com.cn/product-521-1.html",
  27320. "refsource" : "MISC",
  27321. "tags" : [ "Broken Link" ]
  27322. }, {
  27323. "url" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/Mercury%20Router%20X18g%20v1.0.5%20Stored%20XSS.md",
  27324. "name" : "https://github.com/pokerfacett/MY_REQUEST/blob/master/Mercury%20Router%20X18g%20v1.0.5%20Stored%20XSS.md",
  27325. "refsource" : "MISC",
  27326. "tags" : [ "Exploit", "Third Party Advisory" ]
  27327. } ]
  27328. },
  27329. "description" : {
  27330. "description_data" : [ {
  27331. "lang" : "en",
  27332. "value" : "Cross site Scripting (XSS) vulnerability in MERCUSYS Mercury X18G 1.0.5 devices, via crafted values to the 'src_dport_start', 'src_dport_end', and 'dest_port' parameters."
  27333. } ]
  27334. }
  27335. },
  27336. "configurations" : {
  27337. "CVE_data_version" : "4.0",
  27338. "nodes" : [ {
  27339. "operator" : "AND",
  27340. "children" : [ {
  27341. "operator" : "OR",
  27342. "children" : [ ],
  27343. "cpe_match" : [ {
  27344. "vulnerable" : true,
  27345. "cpe23Uri" : "cpe:2.3:o:mercusys:mercury_x18g_firmware:1.0.5:*:*:*:*:*:*:*",
  27346. "cpe_name" : [ ]
  27347. } ]
  27348. }, {
  27349. "operator" : "OR",
  27350. "children" : [ ],
  27351. "cpe_match" : [ {
  27352. "vulnerable" : false,
  27353. "cpe23Uri" : "cpe:2.3:h:mercusys:mercury_x18g:-:*:*:*:*:*:*:*",
  27354. "cpe_name" : [ ]
  27355. } ]
  27356. } ],
  27357. "cpe_match" : [ ]
  27358. } ]
  27359. },
  27360. "impact" : {
  27361. "baseMetricV3" : {
  27362. "cvssV3" : {
  27363. "version" : "3.1",
  27364. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  27365. "attackVector" : "NETWORK",
  27366. "attackComplexity" : "LOW",
  27367. "privilegesRequired" : "NONE",
  27368. "userInteraction" : "REQUIRED",
  27369. "scope" : "CHANGED",
  27370. "confidentialityImpact" : "LOW",
  27371. "integrityImpact" : "LOW",
  27372. "availabilityImpact" : "NONE",
  27373. "baseScore" : 6.1,
  27374. "baseSeverity" : "MEDIUM"
  27375. },
  27376. "exploitabilityScore" : 2.8,
  27377. "impactScore" : 2.7
  27378. },
  27379. "baseMetricV2" : {
  27380. "cvssV2" : {
  27381. "version" : "2.0",
  27382. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  27383. "accessVector" : "NETWORK",
  27384. "accessComplexity" : "MEDIUM",
  27385. "authentication" : "NONE",
  27386. "confidentialityImpact" : "NONE",
  27387. "integrityImpact" : "PARTIAL",
  27388. "availabilityImpact" : "NONE",
  27389. "baseScore" : 4.3
  27390. },
  27391. "severity" : "MEDIUM",
  27392. "exploitabilityScore" : 8.6,
  27393. "impactScore" : 2.9,
  27394. "acInsufInfo" : false,
  27395. "obtainAllPrivilege" : false,
  27396. "obtainUserPrivilege" : false,
  27397. "obtainOtherPrivilege" : false,
  27398. "userInteractionRequired" : true
  27399. }
  27400. },
  27401. "publishedDate" : "2021-04-29T16:15Z",
  27402. "lastModifiedDate" : "2021-05-05T20:11Z"
  27403. }, {
  27404. "cve" : {
  27405. "data_type" : "CVE",
  27406. "data_format" : "MITRE",
  27407. "data_version" : "4.0",
  27408. "CVE_data_meta" : {
  27409. "ID" : "CVE-2021-20294",
  27410. "ASSIGNER" : "secalert@redhat.com"
  27411. },
  27412. "problemtype" : {
  27413. "problemtype_data" : [ {
  27414. "description" : [ {
  27415. "lang" : "en",
  27416. "value" : "CWE-119"
  27417. } ]
  27418. } ]
  27419. },
  27420. "references" : {
  27421. "reference_data" : [ {
  27422. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1943533",
  27423. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1943533",
  27424. "refsource" : "MISC",
  27425. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  27426. }, {
  27427. "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=26929",
  27428. "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=26929",
  27429. "refsource" : "MISC",
  27430. "tags" : [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
  27431. } ]
  27432. },
  27433. "description" : {
  27434. "description_data" : [ {
  27435. "lang" : "en",
  27436. "value" : "A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow, out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality, integrity, and availability."
  27437. } ]
  27438. }
  27439. },
  27440. "configurations" : {
  27441. "CVE_data_version" : "4.0",
  27442. "nodes" : [ {
  27443. "operator" : "OR",
  27444. "children" : [ ],
  27445. "cpe_match" : [ {
  27446. "vulnerable" : true,
  27447. "cpe23Uri" : "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
  27448. "versionEndExcluding" : "2.35.2",
  27449. "cpe_name" : [ ]
  27450. } ]
  27451. } ]
  27452. },
  27453. "impact" : {
  27454. "baseMetricV3" : {
  27455. "cvssV3" : {
  27456. "version" : "3.1",
  27457. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  27458. "attackVector" : "LOCAL",
  27459. "attackComplexity" : "LOW",
  27460. "privilegesRequired" : "NONE",
  27461. "userInteraction" : "REQUIRED",
  27462. "scope" : "UNCHANGED",
  27463. "confidentialityImpact" : "HIGH",
  27464. "integrityImpact" : "HIGH",
  27465. "availabilityImpact" : "HIGH",
  27466. "baseScore" : 7.8,
  27467. "baseSeverity" : "HIGH"
  27468. },
  27469. "exploitabilityScore" : 1.8,
  27470. "impactScore" : 5.9
  27471. },
  27472. "baseMetricV2" : {
  27473. "cvssV2" : {
  27474. "version" : "2.0",
  27475. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  27476. "accessVector" : "NETWORK",
  27477. "accessComplexity" : "MEDIUM",
  27478. "authentication" : "NONE",
  27479. "confidentialityImpact" : "PARTIAL",
  27480. "integrityImpact" : "PARTIAL",
  27481. "availabilityImpact" : "PARTIAL",
  27482. "baseScore" : 6.8
  27483. },
  27484. "severity" : "MEDIUM",
  27485. "exploitabilityScore" : 8.6,
  27486. "impactScore" : 6.4,
  27487. "acInsufInfo" : false,
  27488. "obtainAllPrivilege" : false,
  27489. "obtainUserPrivilege" : false,
  27490. "obtainOtherPrivilege" : false,
  27491. "userInteractionRequired" : true
  27492. }
  27493. },
  27494. "publishedDate" : "2021-04-29T16:15Z",
  27495. "lastModifiedDate" : "2021-05-09T01:34Z"
  27496. }, {
  27497. "cve" : {
  27498. "data_type" : "CVE",
  27499. "data_format" : "MITRE",
  27500. "data_version" : "4.0",
  27501. "CVE_data_meta" : {
  27502. "ID" : "CVE-2021-20228",
  27503. "ASSIGNER" : "secalert@redhat.com"
  27504. },
  27505. "problemtype" : {
  27506. "problemtype_data" : [ {
  27507. "description" : [ {
  27508. "lang" : "en",
  27509. "value" : "CWE-200"
  27510. }, {
  27511. "lang" : "en",
  27512. "value" : "CWE-522"
  27513. } ]
  27514. } ]
  27515. },
  27516. "references" : {
  27517. "reference_data" : [ {
  27518. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1925002",
  27519. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1925002",
  27520. "refsource" : "MISC",
  27521. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  27522. }, {
  27523. "url" : "https://github.com/ansible/ansible/pull/73487",
  27524. "name" : "https://github.com/ansible/ansible/pull/73487",
  27525. "refsource" : "MISC",
  27526. "tags" : [ "Patch", "Third Party Advisory" ]
  27527. } ]
  27528. },
  27529. "description" : {
  27530. "description_data" : [ {
  27531. "lang" : "en",
  27532. "value" : "A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality."
  27533. } ]
  27534. }
  27535. },
  27536. "configurations" : {
  27537. "CVE_data_version" : "4.0",
  27538. "nodes" : [ {
  27539. "operator" : "OR",
  27540. "children" : [ ],
  27541. "cpe_match" : [ {
  27542. "vulnerable" : true,
  27543. "cpe23Uri" : "cpe:2.3:a:redhat:ansible_engine:2.9.18:*:*:*:*:*:*:*",
  27544. "cpe_name" : [ ]
  27545. } ]
  27546. }, {
  27547. "operator" : "OR",
  27548. "children" : [ ],
  27549. "cpe_match" : [ {
  27550. "vulnerable" : true,
  27551. "cpe23Uri" : "cpe:2.3:a:redhat:ansible_automation_platform:1.2:*:*:*:*:*:*:*",
  27552. "cpe_name" : [ ]
  27553. }, {
  27554. "vulnerable" : true,
  27555. "cpe23Uri" : "cpe:2.3:a:redhat:ansible_engine:2.0:*:*:*:*:*:*:*",
  27556. "cpe_name" : [ ]
  27557. }, {
  27558. "vulnerable" : true,
  27559. "cpe23Uri" : "cpe:2.3:a:redhat:ansible_engine:2.9:*:*:*:*:*:*:*",
  27560. "cpe_name" : [ ]
  27561. }, {
  27562. "vulnerable" : true,
  27563. "cpe23Uri" : "cpe:2.3:a:redhat:ansible_tower:3.0:*:*:*:*:*:*:*",
  27564. "cpe_name" : [ ]
  27565. } ]
  27566. } ]
  27567. },
  27568. "impact" : {
  27569. "baseMetricV3" : {
  27570. "cvssV3" : {
  27571. "version" : "3.1",
  27572. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  27573. "attackVector" : "NETWORK",
  27574. "attackComplexity" : "LOW",
  27575. "privilegesRequired" : "NONE",
  27576. "userInteraction" : "NONE",
  27577. "scope" : "UNCHANGED",
  27578. "confidentialityImpact" : "HIGH",
  27579. "integrityImpact" : "NONE",
  27580. "availabilityImpact" : "NONE",
  27581. "baseScore" : 7.5,
  27582. "baseSeverity" : "HIGH"
  27583. },
  27584. "exploitabilityScore" : 3.9,
  27585. "impactScore" : 3.6
  27586. },
  27587. "baseMetricV2" : {
  27588. "cvssV2" : {
  27589. "version" : "2.0",
  27590. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  27591. "accessVector" : "NETWORK",
  27592. "accessComplexity" : "LOW",
  27593. "authentication" : "NONE",
  27594. "confidentialityImpact" : "PARTIAL",
  27595. "integrityImpact" : "NONE",
  27596. "availabilityImpact" : "NONE",
  27597. "baseScore" : 5.0
  27598. },
  27599. "severity" : "MEDIUM",
  27600. "exploitabilityScore" : 10.0,
  27601. "impactScore" : 2.9,
  27602. "acInsufInfo" : false,
  27603. "obtainAllPrivilege" : false,
  27604. "obtainUserPrivilege" : false,
  27605. "obtainOtherPrivilege" : false,
  27606. "userInteractionRequired" : false
  27607. }
  27608. },
  27609. "publishedDate" : "2021-04-29T16:15Z",
  27610. "lastModifiedDate" : "2021-05-03T20:43Z"
  27611. }, {
  27612. "cve" : {
  27613. "data_type" : "CVE",
  27614. "data_format" : "MITRE",
  27615. "data_version" : "4.0",
  27616. "CVE_data_meta" : {
  27617. "ID" : "CVE-2021-30224",
  27618. "ASSIGNER" : "cve@mitre.org"
  27619. },
  27620. "problemtype" : {
  27621. "problemtype_data" : [ {
  27622. "description" : [ {
  27623. "lang" : "en",
  27624. "value" : "CWE-352"
  27625. } ]
  27626. } ]
  27627. },
  27628. "references" : {
  27629. "reference_data" : [ {
  27630. "url" : "https://forum.rukovoditel.net/viewtopic.php?f=19&t=2760",
  27631. "name" : "https://forum.rukovoditel.net/viewtopic.php?f=19&t=2760",
  27632. "refsource" : "MISC",
  27633. "tags" : [ "Exploit", "Vendor Advisory" ]
  27634. }, {
  27635. "url" : "https://gist.github.com/victomteng1997/d5f2db1d37aed5792c28685068ec41e2",
  27636. "name" : "https://gist.github.com/victomteng1997/d5f2db1d37aed5792c28685068ec41e2",
  27637. "refsource" : "MISC",
  27638. "tags" : [ "Patch", "Third Party Advisory" ]
  27639. } ]
  27640. },
  27641. "description" : {
  27642. "description_data" : [ {
  27643. "lang" : "en",
  27644. "value" : "Cross Site Request Forgery (CSRF) in Rukovoditel v2.8.3 allows attackers to create an admin user with an arbitrary credentials."
  27645. } ]
  27646. }
  27647. },
  27648. "configurations" : {
  27649. "CVE_data_version" : "4.0",
  27650. "nodes" : [ {
  27651. "operator" : "OR",
  27652. "children" : [ ],
  27653. "cpe_match" : [ {
  27654. "vulnerable" : true,
  27655. "cpe23Uri" : "cpe:2.3:a:rukovoditel:rukovoditel:2.8.3:*:*:*:*:*:*:*",
  27656. "cpe_name" : [ ]
  27657. } ]
  27658. } ]
  27659. },
  27660. "impact" : {
  27661. "baseMetricV3" : {
  27662. "cvssV3" : {
  27663. "version" : "3.1",
  27664. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  27665. "attackVector" : "NETWORK",
  27666. "attackComplexity" : "LOW",
  27667. "privilegesRequired" : "NONE",
  27668. "userInteraction" : "REQUIRED",
  27669. "scope" : "UNCHANGED",
  27670. "confidentialityImpact" : "HIGH",
  27671. "integrityImpact" : "HIGH",
  27672. "availabilityImpact" : "HIGH",
  27673. "baseScore" : 8.8,
  27674. "baseSeverity" : "HIGH"
  27675. },
  27676. "exploitabilityScore" : 2.8,
  27677. "impactScore" : 5.9
  27678. },
  27679. "baseMetricV2" : {
  27680. "cvssV2" : {
  27681. "version" : "2.0",
  27682. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  27683. "accessVector" : "NETWORK",
  27684. "accessComplexity" : "MEDIUM",
  27685. "authentication" : "NONE",
  27686. "confidentialityImpact" : "PARTIAL",
  27687. "integrityImpact" : "PARTIAL",
  27688. "availabilityImpact" : "PARTIAL",
  27689. "baseScore" : 6.8
  27690. },
  27691. "severity" : "MEDIUM",
  27692. "exploitabilityScore" : 8.6,
  27693. "impactScore" : 6.4,
  27694. "acInsufInfo" : false,
  27695. "obtainAllPrivilege" : false,
  27696. "obtainUserPrivilege" : false,
  27697. "obtainOtherPrivilege" : false,
  27698. "userInteractionRequired" : true
  27699. }
  27700. },
  27701. "publishedDate" : "2021-04-29T15:15Z",
  27702. "lastModifiedDate" : "2021-05-03T18:03Z"
  27703. }, {
  27704. "cve" : {
  27705. "data_type" : "CVE",
  27706. "data_format" : "MITRE",
  27707. "data_version" : "4.0",
  27708. "CVE_data_meta" : {
  27709. "ID" : "CVE-2021-30219",
  27710. "ASSIGNER" : "cve@mitre.org"
  27711. },
  27712. "problemtype" : {
  27713. "problemtype_data" : [ {
  27714. "description" : [ {
  27715. "lang" : "en",
  27716. "value" : "CWE-476"
  27717. } ]
  27718. } ]
  27719. },
  27720. "references" : {
  27721. "reference_data" : [ {
  27722. "url" : "https://github.com/michaelforney/samurai/commit/d2af3bc375e2a77139c3a28d6128c60cd8d08655",
  27723. "name" : "https://github.com/michaelforney/samurai/commit/d2af3bc375e2a77139c3a28d6128c60cd8d08655",
  27724. "refsource" : "MISC",
  27725. "tags" : [ "Patch", "Third Party Advisory" ]
  27726. }, {
  27727. "url" : "https://github.com/michaelforney/samurai/issues/68",
  27728. "name" : "https://github.com/michaelforney/samurai/issues/68",
  27729. "refsource" : "MISC",
  27730. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  27731. } ]
  27732. },
  27733. "description" : {
  27734. "description_data" : [ {
  27735. "lang" : "en",
  27736. "value" : "samurai 1.2 has a NULL pointer dereference in printstatus() function in build.c via a crafted build file."
  27737. } ]
  27738. }
  27739. },
  27740. "configurations" : {
  27741. "CVE_data_version" : "4.0",
  27742. "nodes" : [ {
  27743. "operator" : "OR",
  27744. "children" : [ ],
  27745. "cpe_match" : [ {
  27746. "vulnerable" : true,
  27747. "cpe23Uri" : "cpe:2.3:a:samurai_project:samurai:1.2:*:*:*:*:*:*:*",
  27748. "cpe_name" : [ ]
  27749. } ]
  27750. } ]
  27751. },
  27752. "impact" : {
  27753. "baseMetricV3" : {
  27754. "cvssV3" : {
  27755. "version" : "3.1",
  27756. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  27757. "attackVector" : "LOCAL",
  27758. "attackComplexity" : "LOW",
  27759. "privilegesRequired" : "NONE",
  27760. "userInteraction" : "REQUIRED",
  27761. "scope" : "UNCHANGED",
  27762. "confidentialityImpact" : "NONE",
  27763. "integrityImpact" : "NONE",
  27764. "availabilityImpact" : "HIGH",
  27765. "baseScore" : 5.5,
  27766. "baseSeverity" : "MEDIUM"
  27767. },
  27768. "exploitabilityScore" : 1.8,
  27769. "impactScore" : 3.6
  27770. },
  27771. "baseMetricV2" : {
  27772. "cvssV2" : {
  27773. "version" : "2.0",
  27774. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  27775. "accessVector" : "NETWORK",
  27776. "accessComplexity" : "MEDIUM",
  27777. "authentication" : "NONE",
  27778. "confidentialityImpact" : "NONE",
  27779. "integrityImpact" : "NONE",
  27780. "availabilityImpact" : "PARTIAL",
  27781. "baseScore" : 4.3
  27782. },
  27783. "severity" : "MEDIUM",
  27784. "exploitabilityScore" : 8.6,
  27785. "impactScore" : 2.9,
  27786. "acInsufInfo" : false,
  27787. "obtainAllPrivilege" : false,
  27788. "obtainUserPrivilege" : false,
  27789. "obtainOtherPrivilege" : false,
  27790. "userInteractionRequired" : true
  27791. }
  27792. },
  27793. "publishedDate" : "2021-04-29T15:15Z",
  27794. "lastModifiedDate" : "2021-05-03T18:01Z"
  27795. }, {
  27796. "cve" : {
  27797. "data_type" : "CVE",
  27798. "data_format" : "MITRE",
  27799. "data_version" : "4.0",
  27800. "CVE_data_meta" : {
  27801. "ID" : "CVE-2021-30218",
  27802. "ASSIGNER" : "cve@mitre.org"
  27803. },
  27804. "problemtype" : {
  27805. "problemtype_data" : [ {
  27806. "description" : [ {
  27807. "lang" : "en",
  27808. "value" : "CWE-476"
  27809. } ]
  27810. } ]
  27811. },
  27812. "references" : {
  27813. "reference_data" : [ {
  27814. "url" : "https://github.com/michaelforney/samurai/commit/e84b6d99c85043fa1ba54851ee500540ec206918",
  27815. "name" : "https://github.com/michaelforney/samurai/commit/e84b6d99c85043fa1ba54851ee500540ec206918",
  27816. "refsource" : "MISC",
  27817. "tags" : [ "Patch", "Third Party Advisory" ]
  27818. }, {
  27819. "url" : "https://github.com/michaelforney/samurai/issues/67",
  27820. "name" : "https://github.com/michaelforney/samurai/issues/67",
  27821. "refsource" : "MISC",
  27822. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  27823. } ]
  27824. },
  27825. "description" : {
  27826. "description_data" : [ {
  27827. "lang" : "en",
  27828. "value" : "samurai 1.2 has a NULL pointer dereference in writefile() in util.c via a crafted build file."
  27829. } ]
  27830. }
  27831. },
  27832. "configurations" : {
  27833. "CVE_data_version" : "4.0",
  27834. "nodes" : [ {
  27835. "operator" : "OR",
  27836. "children" : [ ],
  27837. "cpe_match" : [ {
  27838. "vulnerable" : true,
  27839. "cpe23Uri" : "cpe:2.3:a:samurai_project:samurai:1.2:*:*:*:*:*:*:*",
  27840. "cpe_name" : [ ]
  27841. } ]
  27842. } ]
  27843. },
  27844. "impact" : {
  27845. "baseMetricV3" : {
  27846. "cvssV3" : {
  27847. "version" : "3.1",
  27848. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  27849. "attackVector" : "LOCAL",
  27850. "attackComplexity" : "LOW",
  27851. "privilegesRequired" : "NONE",
  27852. "userInteraction" : "REQUIRED",
  27853. "scope" : "UNCHANGED",
  27854. "confidentialityImpact" : "NONE",
  27855. "integrityImpact" : "NONE",
  27856. "availabilityImpact" : "HIGH",
  27857. "baseScore" : 5.5,
  27858. "baseSeverity" : "MEDIUM"
  27859. },
  27860. "exploitabilityScore" : 1.8,
  27861. "impactScore" : 3.6
  27862. },
  27863. "baseMetricV2" : {
  27864. "cvssV2" : {
  27865. "version" : "2.0",
  27866. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  27867. "accessVector" : "NETWORK",
  27868. "accessComplexity" : "MEDIUM",
  27869. "authentication" : "NONE",
  27870. "confidentialityImpact" : "NONE",
  27871. "integrityImpact" : "NONE",
  27872. "availabilityImpact" : "PARTIAL",
  27873. "baseScore" : 4.3
  27874. },
  27875. "severity" : "MEDIUM",
  27876. "exploitabilityScore" : 8.6,
  27877. "impactScore" : 2.9,
  27878. "acInsufInfo" : false,
  27879. "obtainAllPrivilege" : false,
  27880. "obtainUserPrivilege" : false,
  27881. "obtainOtherPrivilege" : false,
  27882. "userInteractionRequired" : true
  27883. }
  27884. },
  27885. "publishedDate" : "2021-04-29T15:15Z",
  27886. "lastModifiedDate" : "2021-05-03T18:02Z"
  27887. }, {
  27888. "cve" : {
  27889. "data_type" : "CVE",
  27890. "data_format" : "MITRE",
  27891. "data_version" : "4.0",
  27892. "CVE_data_meta" : {
  27893. "ID" : "CVE-2021-30027",
  27894. "ASSIGNER" : "cve@mitre.org"
  27895. },
  27896. "problemtype" : {
  27897. "problemtype_data" : [ {
  27898. "description" : [ {
  27899. "lang" : "en",
  27900. "value" : "CWE-908"
  27901. } ]
  27902. } ]
  27903. },
  27904. "references" : {
  27905. "reference_data" : [ {
  27906. "url" : "https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19",
  27907. "name" : "https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19",
  27908. "refsource" : "MISC",
  27909. "tags" : [ "Patch", "Third Party Advisory" ]
  27910. }, {
  27911. "url" : "https://github.com/mity/md4c/issues/155",
  27912. "name" : "https://github.com/mity/md4c/issues/155",
  27913. "refsource" : "MISC",
  27914. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  27915. } ]
  27916. },
  27917. "description" : {
  27918. "description_data" : [ {
  27919. "lang" : "en",
  27920. "value" : "md_analyze_line in md4c.c in md4c 0.4.7 allows attackers to trigger use of uninitialized memory, and cause a denial of service via a malformed Markdown document."
  27921. } ]
  27922. }
  27923. },
  27924. "configurations" : {
  27925. "CVE_data_version" : "4.0",
  27926. "nodes" : [ {
  27927. "operator" : "OR",
  27928. "children" : [ ],
  27929. "cpe_match" : [ {
  27930. "vulnerable" : true,
  27931. "cpe23Uri" : "cpe:2.3:a:md4c_project:md4c:0.4.7:*:*:*:*:*:*:*",
  27932. "cpe_name" : [ ]
  27933. } ]
  27934. } ]
  27935. },
  27936. "impact" : {
  27937. "baseMetricV3" : {
  27938. "cvssV3" : {
  27939. "version" : "3.1",
  27940. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  27941. "attackVector" : "LOCAL",
  27942. "attackComplexity" : "LOW",
  27943. "privilegesRequired" : "NONE",
  27944. "userInteraction" : "REQUIRED",
  27945. "scope" : "UNCHANGED",
  27946. "confidentialityImpact" : "NONE",
  27947. "integrityImpact" : "NONE",
  27948. "availabilityImpact" : "HIGH",
  27949. "baseScore" : 5.5,
  27950. "baseSeverity" : "MEDIUM"
  27951. },
  27952. "exploitabilityScore" : 1.8,
  27953. "impactScore" : 3.6
  27954. },
  27955. "baseMetricV2" : {
  27956. "cvssV2" : {
  27957. "version" : "2.0",
  27958. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  27959. "accessVector" : "NETWORK",
  27960. "accessComplexity" : "MEDIUM",
  27961. "authentication" : "NONE",
  27962. "confidentialityImpact" : "NONE",
  27963. "integrityImpact" : "NONE",
  27964. "availabilityImpact" : "PARTIAL",
  27965. "baseScore" : 4.3
  27966. },
  27967. "severity" : "MEDIUM",
  27968. "exploitabilityScore" : 8.6,
  27969. "impactScore" : 2.9,
  27970. "acInsufInfo" : false,
  27971. "obtainAllPrivilege" : false,
  27972. "obtainUserPrivilege" : false,
  27973. "obtainOtherPrivilege" : false,
  27974. "userInteractionRequired" : true
  27975. }
  27976. },
  27977. "publishedDate" : "2021-04-29T15:15Z",
  27978. "lastModifiedDate" : "2021-05-09T01:25Z"
  27979. }, {
  27980. "cve" : {
  27981. "data_type" : "CVE",
  27982. "data_format" : "MITRE",
  27983. "data_version" : "4.0",
  27984. "CVE_data_meta" : {
  27985. "ID" : "CVE-2021-28280",
  27986. "ASSIGNER" : "cve@mitre.org"
  27987. },
  27988. "problemtype" : {
  27989. "problemtype_data" : [ {
  27990. "description" : [ {
  27991. "lang" : "en",
  27992. "value" : "CWE-79"
  27993. } ]
  27994. } ]
  27995. },
  27996. "references" : {
  27997. "reference_data" : [ {
  27998. "url" : "https://anotepad.com/notes/2skndayt",
  27999. "name" : "https://anotepad.com/notes/2skndayt",
  28000. "refsource" : "MISC",
  28001. "tags" : [ "Exploit", "Third Party Advisory" ]
  28002. }, {
  28003. "url" : "https://github.com/PHPFusion/PHPFusion/commit/da9f89ae70219f357fba6fffd2dae1ec886d8a3b",
  28004. "name" : "https://github.com/PHPFusion/PHPFusion/commit/da9f89ae70219f357fba6fffd2dae1ec886d8a3b",
  28005. "refsource" : "MISC",
  28006. "tags" : [ "Patch", "Third Party Advisory" ]
  28007. }, {
  28008. "url" : "https://github.com/PHPFusion/PHPFusion/commit/fda266c3bb35c650a8c4c51b6923abdfb66ef5cd",
  28009. "name" : "https://github.com/PHPFusion/PHPFusion/commit/fda266c3bb35c650a8c4c51b6923abdfb66ef5cd",
  28010. "refsource" : "MISC",
  28011. "tags" : [ "Patch", "Third Party Advisory" ]
  28012. }, {
  28013. "url" : "https://github.com/PHPFusion/PHPFusion/commit/1c2b32321cf11ed1cd3ff835f8da0d172c849ce6",
  28014. "name" : "https://github.com/PHPFusion/PHPFusion/commit/1c2b32321cf11ed1cd3ff835f8da0d172c849ce6",
  28015. "refsource" : "MISC",
  28016. "tags" : [ "Patch", "Third Party Advisory" ]
  28017. }, {
  28018. "url" : "https://github.com/PHPFusion/PHPFusion/commit/08d6c2ea49bd06fcce32275252f5f25abe61965c",
  28019. "name" : "https://github.com/PHPFusion/PHPFusion/commit/08d6c2ea49bd06fcce32275252f5f25abe61965c",
  28020. "refsource" : "MISC",
  28021. "tags" : [ "Patch", "Third Party Advisory" ]
  28022. } ]
  28023. },
  28024. "description" : {
  28025. "description_data" : [ {
  28026. "lang" : "en",
  28027. "value" : "CSRF + Cross-site scripting (XSS) vulnerability in search.php in PHPFusion 9.03.110 allows remote attackers to inject arbitrary web script or HTML"
  28028. } ]
  28029. }
  28030. },
  28031. "configurations" : {
  28032. "CVE_data_version" : "4.0",
  28033. "nodes" : [ {
  28034. "operator" : "OR",
  28035. "children" : [ ],
  28036. "cpe_match" : [ {
  28037. "vulnerable" : true,
  28038. "cpe23Uri" : "cpe:2.3:a:php-fusion:phpfusion:9.03.110:*:*:*:*:*:*:*",
  28039. "cpe_name" : [ ]
  28040. } ]
  28041. } ]
  28042. },
  28043. "impact" : {
  28044. "baseMetricV3" : {
  28045. "cvssV3" : {
  28046. "version" : "3.1",
  28047. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  28048. "attackVector" : "NETWORK",
  28049. "attackComplexity" : "LOW",
  28050. "privilegesRequired" : "NONE",
  28051. "userInteraction" : "REQUIRED",
  28052. "scope" : "CHANGED",
  28053. "confidentialityImpact" : "LOW",
  28054. "integrityImpact" : "LOW",
  28055. "availabilityImpact" : "NONE",
  28056. "baseScore" : 6.1,
  28057. "baseSeverity" : "MEDIUM"
  28058. },
  28059. "exploitabilityScore" : 2.8,
  28060. "impactScore" : 2.7
  28061. },
  28062. "baseMetricV2" : {
  28063. "cvssV2" : {
  28064. "version" : "2.0",
  28065. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  28066. "accessVector" : "NETWORK",
  28067. "accessComplexity" : "MEDIUM",
  28068. "authentication" : "NONE",
  28069. "confidentialityImpact" : "NONE",
  28070. "integrityImpact" : "PARTIAL",
  28071. "availabilityImpact" : "NONE",
  28072. "baseScore" : 4.3
  28073. },
  28074. "severity" : "MEDIUM",
  28075. "exploitabilityScore" : 8.6,
  28076. "impactScore" : 2.9,
  28077. "acInsufInfo" : false,
  28078. "obtainAllPrivilege" : false,
  28079. "obtainUserPrivilege" : false,
  28080. "obtainOtherPrivilege" : false,
  28081. "userInteractionRequired" : true
  28082. }
  28083. },
  28084. "publishedDate" : "2021-04-29T15:15Z",
  28085. "lastModifiedDate" : "2021-05-08T04:30Z"
  28086. }, {
  28087. "cve" : {
  28088. "data_type" : "CVE",
  28089. "data_format" : "MITRE",
  28090. "data_version" : "4.0",
  28091. "CVE_data_meta" : {
  28092. "ID" : "CVE-2021-27651",
  28093. "ASSIGNER" : "security@pega.com"
  28094. },
  28095. "problemtype" : {
  28096. "problemtype_data" : [ {
  28097. "description" : [ {
  28098. "lang" : "en",
  28099. "value" : "CWE-287"
  28100. }, {
  28101. "lang" : "en",
  28102. "value" : "CWE-640"
  28103. } ]
  28104. } ]
  28105. },
  28106. "references" : {
  28107. "reference_data" : [ {
  28108. "url" : "https://collaborate.pega.com/discussion/pega-security-advisory-a21-hotfix-matrix",
  28109. "name" : "https://collaborate.pega.com/discussion/pega-security-advisory-a21-hotfix-matrix",
  28110. "refsource" : "CONFIRM",
  28111. "tags" : [ "Release Notes", "Vendor Advisory" ]
  28112. } ]
  28113. },
  28114. "description" : {
  28115. "description_data" : [ {
  28116. "lang" : "en",
  28117. "value" : "In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks."
  28118. } ]
  28119. }
  28120. },
  28121. "configurations" : {
  28122. "CVE_data_version" : "4.0",
  28123. "nodes" : [ {
  28124. "operator" : "OR",
  28125. "children" : [ ],
  28126. "cpe_match" : [ {
  28127. "vulnerable" : true,
  28128. "cpe23Uri" : "cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*",
  28129. "versionStartIncluding" : "8.2.1",
  28130. "versionEndIncluding" : "8.5.2",
  28131. "cpe_name" : [ ]
  28132. } ]
  28133. } ]
  28134. },
  28135. "impact" : {
  28136. "baseMetricV3" : {
  28137. "cvssV3" : {
  28138. "version" : "3.1",
  28139. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  28140. "attackVector" : "NETWORK",
  28141. "attackComplexity" : "LOW",
  28142. "privilegesRequired" : "NONE",
  28143. "userInteraction" : "NONE",
  28144. "scope" : "UNCHANGED",
  28145. "confidentialityImpact" : "HIGH",
  28146. "integrityImpact" : "HIGH",
  28147. "availabilityImpact" : "HIGH",
  28148. "baseScore" : 9.8,
  28149. "baseSeverity" : "CRITICAL"
  28150. },
  28151. "exploitabilityScore" : 3.9,
  28152. "impactScore" : 5.9
  28153. },
  28154. "baseMetricV2" : {
  28155. "cvssV2" : {
  28156. "version" : "2.0",
  28157. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  28158. "accessVector" : "NETWORK",
  28159. "accessComplexity" : "LOW",
  28160. "authentication" : "NONE",
  28161. "confidentialityImpact" : "PARTIAL",
  28162. "integrityImpact" : "PARTIAL",
  28163. "availabilityImpact" : "PARTIAL",
  28164. "baseScore" : 7.5
  28165. },
  28166. "severity" : "HIGH",
  28167. "exploitabilityScore" : 10.0,
  28168. "impactScore" : 6.4,
  28169. "acInsufInfo" : false,
  28170. "obtainAllPrivilege" : false,
  28171. "obtainUserPrivilege" : false,
  28172. "obtainOtherPrivilege" : false,
  28173. "userInteractionRequired" : false
  28174. }
  28175. },
  28176. "publishedDate" : "2021-04-29T15:15Z",
  28177. "lastModifiedDate" : "2021-05-03T19:15Z"
  28178. }, {
  28179. "cve" : {
  28180. "data_type" : "CVE",
  28181. "data_format" : "MITRE",
  28182. "data_version" : "4.0",
  28183. "CVE_data_meta" : {
  28184. "ID" : "CVE-2021-20095",
  28185. "ASSIGNER" : "vulnreport@tenable.com"
  28186. },
  28187. "problemtype" : {
  28188. "problemtype_data" : [ {
  28189. "description" : [ {
  28190. "lang" : "en",
  28191. "value" : "CWE-22"
  28192. } ]
  28193. } ]
  28194. },
  28195. "references" : {
  28196. "reference_data" : [ {
  28197. "url" : "https://www.tenable.com/security/research/tra-2021-14",
  28198. "name" : "https://www.tenable.com/security/research/tra-2021-14",
  28199. "refsource" : "MISC",
  28200. "tags" : [ "Exploit", "Third Party Advisory" ]
  28201. }, {
  28202. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKXUEWVKU5WASYSAFXQP6SFSDOG773RV/",
  28203. "name" : "FEDORA-2021-7e2a143808",
  28204. "refsource" : "FEDORA",
  28205. "tags" : [ ]
  28206. }, {
  28207. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MORYINYUSYI6XLC4UKPRGGFD2WMO7GSM/",
  28208. "name" : "FEDORA-2021-a499f89369",
  28209. "refsource" : "FEDORA",
  28210. "tags" : [ ]
  28211. } ]
  28212. },
  28213. "description" : {
  28214. "description_data" : [ {
  28215. "lang" : "en",
  28216. "value" : "Relative Path Traversal in Babel 2.9.0 allows an attacker to load arbitrary locale files on disk and execute arbitrary code."
  28217. } ]
  28218. }
  28219. },
  28220. "configurations" : {
  28221. "CVE_data_version" : "4.0",
  28222. "nodes" : [ {
  28223. "operator" : "OR",
  28224. "children" : [ ],
  28225. "cpe_match" : [ {
  28226. "vulnerable" : true,
  28227. "cpe23Uri" : "cpe:2.3:a:pocoo:babel:2.9.0:*:*:*:*:*:*:*",
  28228. "cpe_name" : [ ]
  28229. } ]
  28230. } ]
  28231. },
  28232. "impact" : {
  28233. "baseMetricV3" : {
  28234. "cvssV3" : {
  28235. "version" : "3.1",
  28236. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  28237. "attackVector" : "LOCAL",
  28238. "attackComplexity" : "LOW",
  28239. "privilegesRequired" : "LOW",
  28240. "userInteraction" : "NONE",
  28241. "scope" : "UNCHANGED",
  28242. "confidentialityImpact" : "HIGH",
  28243. "integrityImpact" : "HIGH",
  28244. "availabilityImpact" : "HIGH",
  28245. "baseScore" : 7.8,
  28246. "baseSeverity" : "HIGH"
  28247. },
  28248. "exploitabilityScore" : 1.8,
  28249. "impactScore" : 5.9
  28250. },
  28251. "baseMetricV2" : {
  28252. "cvssV2" : {
  28253. "version" : "2.0",
  28254. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  28255. "accessVector" : "LOCAL",
  28256. "accessComplexity" : "LOW",
  28257. "authentication" : "NONE",
  28258. "confidentialityImpact" : "PARTIAL",
  28259. "integrityImpact" : "PARTIAL",
  28260. "availabilityImpact" : "PARTIAL",
  28261. "baseScore" : 4.6
  28262. },
  28263. "severity" : "MEDIUM",
  28264. "exploitabilityScore" : 3.9,
  28265. "impactScore" : 6.4,
  28266. "acInsufInfo" : false,
  28267. "obtainAllPrivilege" : false,
  28268. "obtainUserPrivilege" : false,
  28269. "obtainOtherPrivilege" : false,
  28270. "userInteractionRequired" : false
  28271. }
  28272. },
  28273. "publishedDate" : "2021-04-29T15:15Z",
  28274. "lastModifiedDate" : "2021-05-09T03:15Z"
  28275. }, {
  28276. "cve" : {
  28277. "data_type" : "CVE",
  28278. "data_format" : "MITRE",
  28279. "data_version" : "4.0",
  28280. "CVE_data_meta" : {
  28281. "ID" : "CVE-2021-20092",
  28282. "ASSIGNER" : "vulnreport@tenable.com"
  28283. },
  28284. "problemtype" : {
  28285. "problemtype_data" : [ {
  28286. "description" : [ {
  28287. "lang" : "en",
  28288. "value" : "CWE-200"
  28289. } ]
  28290. } ]
  28291. },
  28292. "references" : {
  28293. "reference_data" : [ {
  28294. "url" : "https://www.tenable.com/security/research/tra-2021-13",
  28295. "name" : "https://www.tenable.com/security/research/tra-2021-13",
  28296. "refsource" : "MISC",
  28297. "tags" : [ "Third Party Advisory" ]
  28298. } ]
  28299. },
  28300. "description" : {
  28301. "description_data" : [ {
  28302. "lang" : "en",
  28303. "value" : "The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly restrict access to sensitive information from an unauthorized actor."
  28304. } ]
  28305. }
  28306. },
  28307. "configurations" : {
  28308. "CVE_data_version" : "4.0",
  28309. "nodes" : [ {
  28310. "operator" : "AND",
  28311. "children" : [ {
  28312. "operator" : "OR",
  28313. "children" : [ ],
  28314. "cpe_match" : [ {
  28315. "vulnerable" : true,
  28316. "cpe23Uri" : "cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:*",
  28317. "versionEndIncluding" : "1.02",
  28318. "cpe_name" : [ ]
  28319. } ]
  28320. }, {
  28321. "operator" : "OR",
  28322. "children" : [ ],
  28323. "cpe_match" : [ {
  28324. "vulnerable" : false,
  28325. "cpe23Uri" : "cpe:2.3:h:buffalo:wsr-2533dhpl2-bk:-:*:*:*:*:*:*:*",
  28326. "cpe_name" : [ ]
  28327. } ]
  28328. } ],
  28329. "cpe_match" : [ ]
  28330. }, {
  28331. "operator" : "AND",
  28332. "children" : [ {
  28333. "operator" : "OR",
  28334. "children" : [ ],
  28335. "cpe_match" : [ {
  28336. "vulnerable" : true,
  28337. "cpe23Uri" : "cpe:2.3:o:buffalo:wsr-2533dhp3-bk_firmware:*:*:*:*:*:*:*:*",
  28338. "versionEndIncluding" : "1.24",
  28339. "cpe_name" : [ ]
  28340. } ]
  28341. }, {
  28342. "operator" : "OR",
  28343. "children" : [ ],
  28344. "cpe_match" : [ {
  28345. "vulnerable" : false,
  28346. "cpe23Uri" : "cpe:2.3:h:buffalo:wsr-2533dhp3-bk:-:*:*:*:*:*:*:*",
  28347. "cpe_name" : [ ]
  28348. } ]
  28349. } ],
  28350. "cpe_match" : [ ]
  28351. } ]
  28352. },
  28353. "impact" : {
  28354. "baseMetricV3" : {
  28355. "cvssV3" : {
  28356. "version" : "3.1",
  28357. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  28358. "attackVector" : "NETWORK",
  28359. "attackComplexity" : "LOW",
  28360. "privilegesRequired" : "NONE",
  28361. "userInteraction" : "NONE",
  28362. "scope" : "UNCHANGED",
  28363. "confidentialityImpact" : "HIGH",
  28364. "integrityImpact" : "NONE",
  28365. "availabilityImpact" : "NONE",
  28366. "baseScore" : 7.5,
  28367. "baseSeverity" : "HIGH"
  28368. },
  28369. "exploitabilityScore" : 3.9,
  28370. "impactScore" : 3.6
  28371. },
  28372. "baseMetricV2" : {
  28373. "cvssV2" : {
  28374. "version" : "2.0",
  28375. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  28376. "accessVector" : "NETWORK",
  28377. "accessComplexity" : "LOW",
  28378. "authentication" : "NONE",
  28379. "confidentialityImpact" : "PARTIAL",
  28380. "integrityImpact" : "NONE",
  28381. "availabilityImpact" : "NONE",
  28382. "baseScore" : 5.0
  28383. },
  28384. "severity" : "MEDIUM",
  28385. "exploitabilityScore" : 10.0,
  28386. "impactScore" : 2.9,
  28387. "acInsufInfo" : false,
  28388. "obtainAllPrivilege" : false,
  28389. "obtainUserPrivilege" : false,
  28390. "obtainOtherPrivilege" : false,
  28391. "userInteractionRequired" : false
  28392. }
  28393. },
  28394. "publishedDate" : "2021-04-29T15:15Z",
  28395. "lastModifiedDate" : "2021-05-05T18:02Z"
  28396. }, {
  28397. "cve" : {
  28398. "data_type" : "CVE",
  28399. "data_format" : "MITRE",
  28400. "data_version" : "4.0",
  28401. "CVE_data_meta" : {
  28402. "ID" : "CVE-2021-20091",
  28403. "ASSIGNER" : "vulnreport@tenable.com"
  28404. },
  28405. "problemtype" : {
  28406. "problemtype_data" : [ {
  28407. "description" : [ {
  28408. "lang" : "en",
  28409. "value" : "NVD-CWE-noinfo"
  28410. } ]
  28411. } ]
  28412. },
  28413. "references" : {
  28414. "reference_data" : [ {
  28415. "url" : "https://www.tenable.com/security/research/tra-2021-13",
  28416. "name" : "https://www.tenable.com/security/research/tra-2021-13",
  28417. "refsource" : "MISC",
  28418. "tags" : [ "Third Party Advisory" ]
  28419. } ]
  28420. },
  28421. "description" : {
  28422. "description_data" : [ {
  28423. "lang" : "en",
  28424. "value" : "The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly sanitize user input. An authenticated remote attacker could leverage this vulnerability to alter device configuration, potentially gaining remote code execution."
  28425. } ]
  28426. }
  28427. },
  28428. "configurations" : {
  28429. "CVE_data_version" : "4.0",
  28430. "nodes" : [ {
  28431. "operator" : "AND",
  28432. "children" : [ {
  28433. "operator" : "OR",
  28434. "children" : [ ],
  28435. "cpe_match" : [ {
  28436. "vulnerable" : true,
  28437. "cpe23Uri" : "cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:*",
  28438. "versionEndIncluding" : "1.02",
  28439. "cpe_name" : [ ]
  28440. } ]
  28441. }, {
  28442. "operator" : "OR",
  28443. "children" : [ ],
  28444. "cpe_match" : [ {
  28445. "vulnerable" : false,
  28446. "cpe23Uri" : "cpe:2.3:h:buffalo:wsr-2533dhpl2-bk:-:*:*:*:*:*:*:*",
  28447. "cpe_name" : [ ]
  28448. } ]
  28449. } ],
  28450. "cpe_match" : [ ]
  28451. }, {
  28452. "operator" : "AND",
  28453. "children" : [ {
  28454. "operator" : "OR",
  28455. "children" : [ ],
  28456. "cpe_match" : [ {
  28457. "vulnerable" : true,
  28458. "cpe23Uri" : "cpe:2.3:o:buffalo:wsr-2533dhp3-bk_firmware:*:*:*:*:*:*:*:*",
  28459. "versionEndIncluding" : "1.24",
  28460. "cpe_name" : [ ]
  28461. } ]
  28462. }, {
  28463. "operator" : "OR",
  28464. "children" : [ ],
  28465. "cpe_match" : [ {
  28466. "vulnerable" : false,
  28467. "cpe23Uri" : "cpe:2.3:h:buffalo:wsr-2533dhp3-bk:-:*:*:*:*:*:*:*",
  28468. "cpe_name" : [ ]
  28469. } ]
  28470. } ],
  28471. "cpe_match" : [ ]
  28472. } ]
  28473. },
  28474. "impact" : {
  28475. "baseMetricV3" : {
  28476. "cvssV3" : {
  28477. "version" : "3.1",
  28478. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  28479. "attackVector" : "NETWORK",
  28480. "attackComplexity" : "LOW",
  28481. "privilegesRequired" : "LOW",
  28482. "userInteraction" : "NONE",
  28483. "scope" : "UNCHANGED",
  28484. "confidentialityImpact" : "HIGH",
  28485. "integrityImpact" : "HIGH",
  28486. "availabilityImpact" : "HIGH",
  28487. "baseScore" : 8.8,
  28488. "baseSeverity" : "HIGH"
  28489. },
  28490. "exploitabilityScore" : 2.8,
  28491. "impactScore" : 5.9
  28492. },
  28493. "baseMetricV2" : {
  28494. "cvssV2" : {
  28495. "version" : "2.0",
  28496. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  28497. "accessVector" : "NETWORK",
  28498. "accessComplexity" : "LOW",
  28499. "authentication" : "SINGLE",
  28500. "confidentialityImpact" : "PARTIAL",
  28501. "integrityImpact" : "PARTIAL",
  28502. "availabilityImpact" : "PARTIAL",
  28503. "baseScore" : 6.5
  28504. },
  28505. "severity" : "MEDIUM",
  28506. "exploitabilityScore" : 8.0,
  28507. "impactScore" : 6.4,
  28508. "acInsufInfo" : false,
  28509. "obtainAllPrivilege" : false,
  28510. "obtainUserPrivilege" : false,
  28511. "obtainOtherPrivilege" : false,
  28512. "userInteractionRequired" : false
  28513. }
  28514. },
  28515. "publishedDate" : "2021-04-29T15:15Z",
  28516. "lastModifiedDate" : "2021-05-05T18:01Z"
  28517. }, {
  28518. "cve" : {
  28519. "data_type" : "CVE",
  28520. "data_format" : "MITRE",
  28521. "data_version" : "4.0",
  28522. "CVE_data_meta" : {
  28523. "ID" : "CVE-2021-20090",
  28524. "ASSIGNER" : "vulnreport@tenable.com"
  28525. },
  28526. "problemtype" : {
  28527. "problemtype_data" : [ {
  28528. "description" : [ {
  28529. "lang" : "en",
  28530. "value" : "CWE-22"
  28531. } ]
  28532. } ]
  28533. },
  28534. "references" : {
  28535. "reference_data" : [ {
  28536. "url" : "https://www.tenable.com/security/research/tra-2021-13",
  28537. "name" : "https://www.tenable.com/security/research/tra-2021-13",
  28538. "refsource" : "MISC",
  28539. "tags" : [ "Third Party Advisory" ]
  28540. } ]
  28541. },
  28542. "description" : {
  28543. "description_data" : [ {
  28544. "lang" : "en",
  28545. "value" : "A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication."
  28546. } ]
  28547. }
  28548. },
  28549. "configurations" : {
  28550. "CVE_data_version" : "4.0",
  28551. "nodes" : [ {
  28552. "operator" : "AND",
  28553. "children" : [ {
  28554. "operator" : "OR",
  28555. "children" : [ ],
  28556. "cpe_match" : [ {
  28557. "vulnerable" : true,
  28558. "cpe23Uri" : "cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:*",
  28559. "versionEndIncluding" : "1.02",
  28560. "cpe_name" : [ ]
  28561. } ]
  28562. }, {
  28563. "operator" : "OR",
  28564. "children" : [ ],
  28565. "cpe_match" : [ {
  28566. "vulnerable" : false,
  28567. "cpe23Uri" : "cpe:2.3:h:buffalo:wsr-2533dhpl2-bk:-:*:*:*:*:*:*:*",
  28568. "cpe_name" : [ ]
  28569. } ]
  28570. } ],
  28571. "cpe_match" : [ ]
  28572. }, {
  28573. "operator" : "AND",
  28574. "children" : [ {
  28575. "operator" : "OR",
  28576. "children" : [ ],
  28577. "cpe_match" : [ {
  28578. "vulnerable" : true,
  28579. "cpe23Uri" : "cpe:2.3:o:buffalo:wsr-2533dhp3-bk_firmware:*:*:*:*:*:*:*:*",
  28580. "versionEndIncluding" : "1.24",
  28581. "cpe_name" : [ ]
  28582. } ]
  28583. }, {
  28584. "operator" : "OR",
  28585. "children" : [ ],
  28586. "cpe_match" : [ {
  28587. "vulnerable" : false,
  28588. "cpe23Uri" : "cpe:2.3:h:buffalo:wsr-2533dhp3-bk:-:*:*:*:*:*:*:*",
  28589. "cpe_name" : [ ]
  28590. } ]
  28591. } ],
  28592. "cpe_match" : [ ]
  28593. } ]
  28594. },
  28595. "impact" : {
  28596. "baseMetricV3" : {
  28597. "cvssV3" : {
  28598. "version" : "3.1",
  28599. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  28600. "attackVector" : "NETWORK",
  28601. "attackComplexity" : "LOW",
  28602. "privilegesRequired" : "NONE",
  28603. "userInteraction" : "NONE",
  28604. "scope" : "UNCHANGED",
  28605. "confidentialityImpact" : "HIGH",
  28606. "integrityImpact" : "HIGH",
  28607. "availabilityImpact" : "HIGH",
  28608. "baseScore" : 9.8,
  28609. "baseSeverity" : "CRITICAL"
  28610. },
  28611. "exploitabilityScore" : 3.9,
  28612. "impactScore" : 5.9
  28613. },
  28614. "baseMetricV2" : {
  28615. "cvssV2" : {
  28616. "version" : "2.0",
  28617. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  28618. "accessVector" : "NETWORK",
  28619. "accessComplexity" : "LOW",
  28620. "authentication" : "NONE",
  28621. "confidentialityImpact" : "PARTIAL",
  28622. "integrityImpact" : "PARTIAL",
  28623. "availabilityImpact" : "PARTIAL",
  28624. "baseScore" : 7.5
  28625. },
  28626. "severity" : "HIGH",
  28627. "exploitabilityScore" : 10.0,
  28628. "impactScore" : 6.4,
  28629. "acInsufInfo" : false,
  28630. "obtainAllPrivilege" : false,
  28631. "obtainUserPrivilege" : false,
  28632. "obtainOtherPrivilege" : false,
  28633. "userInteractionRequired" : false
  28634. }
  28635. },
  28636. "publishedDate" : "2021-04-29T15:15Z",
  28637. "lastModifiedDate" : "2021-05-08T04:41Z"
  28638. }, {
  28639. "cve" : {
  28640. "data_type" : "CVE",
  28641. "data_format" : "MITRE",
  28642. "data_version" : "4.0",
  28643. "CVE_data_meta" : {
  28644. "ID" : "CVE-2020-22002",
  28645. "ASSIGNER" : "cve@mitre.org"
  28646. },
  28647. "problemtype" : {
  28648. "problemtype_data" : [ {
  28649. "description" : [ {
  28650. "lang" : "en",
  28651. "value" : "CWE-918"
  28652. } ]
  28653. } ]
  28654. },
  28655. "references" : {
  28656. "reference_data" : [ {
  28657. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/172839",
  28658. "name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/172839",
  28659. "refsource" : "MISC",
  28660. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  28661. }, {
  28662. "url" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5545.php",
  28663. "name" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5545.php",
  28664. "refsource" : "MISC",
  28665. "tags" : [ "Exploit", "Third Party Advisory" ]
  28666. } ]
  28667. },
  28668. "description" : {
  28669. "description_data" : [ {
  28670. "lang" : "en",
  28671. "value" : "An Unauthenticated Server-Side Request Forgery (SSRF) vulnerability exists in Inim Electronics Smartliving SmartLAN/G/SI <=6.x within the GetImage functionality. The application parses user supplied data in the GET parameter 'host' to construct an image request to the service through onvif.cgi. Since no validation is carried out on the parameter, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host."
  28672. } ]
  28673. }
  28674. },
  28675. "configurations" : {
  28676. "CVE_data_version" : "4.0",
  28677. "nodes" : [ {
  28678. "operator" : "AND",
  28679. "children" : [ {
  28680. "operator" : "OR",
  28681. "children" : [ ],
  28682. "cpe_match" : [ {
  28683. "vulnerable" : true,
  28684. "cpe23Uri" : "cpe:2.3:o:inim:smartliving_505_firmware:-:*:*:*:*:*:*:*",
  28685. "cpe_name" : [ ]
  28686. } ]
  28687. }, {
  28688. "operator" : "OR",
  28689. "children" : [ ],
  28690. "cpe_match" : [ {
  28691. "vulnerable" : false,
  28692. "cpe23Uri" : "cpe:2.3:h:inim:smartliving_505:-:*:*:*:*:*:*:*",
  28693. "cpe_name" : [ ]
  28694. } ]
  28695. } ],
  28696. "cpe_match" : [ ]
  28697. }, {
  28698. "operator" : "AND",
  28699. "children" : [ {
  28700. "operator" : "OR",
  28701. "children" : [ ],
  28702. "cpe_match" : [ {
  28703. "vulnerable" : true,
  28704. "cpe23Uri" : "cpe:2.3:o:inim:smartliving_515_firmware:-:*:*:*:*:*:*:*",
  28705. "cpe_name" : [ ]
  28706. } ]
  28707. }, {
  28708. "operator" : "OR",
  28709. "children" : [ ],
  28710. "cpe_match" : [ {
  28711. "vulnerable" : false,
  28712. "cpe23Uri" : "cpe:2.3:h:inim:smartliving_515:-:*:*:*:*:*:*:*",
  28713. "cpe_name" : [ ]
  28714. } ]
  28715. } ],
  28716. "cpe_match" : [ ]
  28717. }, {
  28718. "operator" : "AND",
  28719. "children" : [ {
  28720. "operator" : "OR",
  28721. "children" : [ ],
  28722. "cpe_match" : [ {
  28723. "vulnerable" : true,
  28724. "cpe23Uri" : "cpe:2.3:o:inim:smartliving_1050_firmware:-:*:*:*:*:*:*:*",
  28725. "cpe_name" : [ ]
  28726. } ]
  28727. }, {
  28728. "operator" : "OR",
  28729. "children" : [ ],
  28730. "cpe_match" : [ {
  28731. "vulnerable" : false,
  28732. "cpe23Uri" : "cpe:2.3:h:inim:smartliving_1050:-:*:*:*:*:*:*:*",
  28733. "cpe_name" : [ ]
  28734. } ]
  28735. } ],
  28736. "cpe_match" : [ ]
  28737. }, {
  28738. "operator" : "AND",
  28739. "children" : [ {
  28740. "operator" : "OR",
  28741. "children" : [ ],
  28742. "cpe_match" : [ {
  28743. "vulnerable" : true,
  28744. "cpe23Uri" : "cpe:2.3:o:inim:smartliving_1050g3_firmware:-:*:*:*:*:*:*:*",
  28745. "cpe_name" : [ ]
  28746. } ]
  28747. }, {
  28748. "operator" : "OR",
  28749. "children" : [ ],
  28750. "cpe_match" : [ {
  28751. "vulnerable" : false,
  28752. "cpe23Uri" : "cpe:2.3:h:inim:smartliving_1050g3:-:*:*:*:*:*:*:*",
  28753. "cpe_name" : [ ]
  28754. } ]
  28755. } ],
  28756. "cpe_match" : [ ]
  28757. }, {
  28758. "operator" : "AND",
  28759. "children" : [ {
  28760. "operator" : "OR",
  28761. "children" : [ ],
  28762. "cpe_match" : [ {
  28763. "vulnerable" : true,
  28764. "cpe23Uri" : "cpe:2.3:o:inim:smartliving_10100l_firmware:-:*:*:*:*:*:*:*",
  28765. "cpe_name" : [ ]
  28766. } ]
  28767. }, {
  28768. "operator" : "OR",
  28769. "children" : [ ],
  28770. "cpe_match" : [ {
  28771. "vulnerable" : false,
  28772. "cpe23Uri" : "cpe:2.3:h:inim:smartliving_10100l:-:*:*:*:*:*:*:*",
  28773. "cpe_name" : [ ]
  28774. } ]
  28775. } ],
  28776. "cpe_match" : [ ]
  28777. }, {
  28778. "operator" : "AND",
  28779. "children" : [ {
  28780. "operator" : "OR",
  28781. "children" : [ ],
  28782. "cpe_match" : [ {
  28783. "vulnerable" : true,
  28784. "cpe23Uri" : "cpe:2.3:o:inim:smartliving_10100lg3_firmware:-:*:*:*:*:*:*:*",
  28785. "cpe_name" : [ ]
  28786. } ]
  28787. }, {
  28788. "operator" : "OR",
  28789. "children" : [ ],
  28790. "cpe_match" : [ {
  28791. "vulnerable" : false,
  28792. "cpe23Uri" : "cpe:2.3:h:inim:smartliving_10100lg3:-:*:*:*:*:*:*:*",
  28793. "cpe_name" : [ ]
  28794. } ]
  28795. } ],
  28796. "cpe_match" : [ ]
  28797. } ]
  28798. },
  28799. "impact" : {
  28800. "baseMetricV3" : {
  28801. "cvssV3" : {
  28802. "version" : "3.1",
  28803. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
  28804. "attackVector" : "NETWORK",
  28805. "attackComplexity" : "LOW",
  28806. "privilegesRequired" : "NONE",
  28807. "userInteraction" : "NONE",
  28808. "scope" : "UNCHANGED",
  28809. "confidentialityImpact" : "NONE",
  28810. "integrityImpact" : "HIGH",
  28811. "availabilityImpact" : "NONE",
  28812. "baseScore" : 7.5,
  28813. "baseSeverity" : "HIGH"
  28814. },
  28815. "exploitabilityScore" : 3.9,
  28816. "impactScore" : 3.6
  28817. },
  28818. "baseMetricV2" : {
  28819. "cvssV2" : {
  28820. "version" : "2.0",
  28821. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  28822. "accessVector" : "NETWORK",
  28823. "accessComplexity" : "LOW",
  28824. "authentication" : "NONE",
  28825. "confidentialityImpact" : "NONE",
  28826. "integrityImpact" : "PARTIAL",
  28827. "availabilityImpact" : "NONE",
  28828. "baseScore" : 5.0
  28829. },
  28830. "severity" : "MEDIUM",
  28831. "exploitabilityScore" : 10.0,
  28832. "impactScore" : 2.9,
  28833. "acInsufInfo" : false,
  28834. "obtainAllPrivilege" : false,
  28835. "obtainUserPrivilege" : false,
  28836. "obtainOtherPrivilege" : false,
  28837. "userInteractionRequired" : false
  28838. }
  28839. },
  28840. "publishedDate" : "2021-04-29T15:15Z",
  28841. "lastModifiedDate" : "2021-05-05T17:56Z"
  28842. }, {
  28843. "cve" : {
  28844. "data_type" : "CVE",
  28845. "data_format" : "MITRE",
  28846. "data_version" : "4.0",
  28847. "CVE_data_meta" : {
  28848. "ID" : "CVE-2020-21997",
  28849. "ASSIGNER" : "cve@mitre.org"
  28850. },
  28851. "problemtype" : {
  28852. "problemtype_data" : [ {
  28853. "description" : [ {
  28854. "lang" : "en",
  28855. "value" : "CWE-200"
  28856. } ]
  28857. } ]
  28858. },
  28859. "references" : {
  28860. "reference_data" : [ {
  28861. "url" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5541.php",
  28862. "name" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5541.php",
  28863. "refsource" : "MISC",
  28864. "tags" : [ "Exploit", "Third Party Advisory" ]
  28865. }, {
  28866. "url" : "https://www.exploit-db.com/exploits/47596",
  28867. "name" : "Exploit Database",
  28868. "refsource" : "EXPLOIT-DB",
  28869. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  28870. } ]
  28871. },
  28872. "description" : {
  28873. "description_data" : [ {
  28874. "lang" : "en",
  28875. "value" : "Smartwares HOME easy <=1.0.9 is vulnerable to an unauthenticated database backup download and information disclosure vulnerability. An attacker could disclose sensitive and clear-text information resulting in authentication bypass, session hijacking and full system control."
  28876. } ]
  28877. }
  28878. },
  28879. "configurations" : {
  28880. "CVE_data_version" : "4.0",
  28881. "nodes" : [ {
  28882. "operator" : "AND",
  28883. "children" : [ {
  28884. "operator" : "OR",
  28885. "children" : [ ],
  28886. "cpe_match" : [ {
  28887. "vulnerable" : true,
  28888. "cpe23Uri" : "cpe:2.3:o:smartwares:home_easy_firmware:*:*:*:*:*:*:*:*",
  28889. "versionEndIncluding" : "1.0.9",
  28890. "cpe_name" : [ ]
  28891. } ]
  28892. }, {
  28893. "operator" : "OR",
  28894. "children" : [ ],
  28895. "cpe_match" : [ {
  28896. "vulnerable" : false,
  28897. "cpe23Uri" : "cpe:2.3:h:smartwares:home_easy:-:*:*:*:*:*:*:*",
  28898. "cpe_name" : [ ]
  28899. } ]
  28900. } ],
  28901. "cpe_match" : [ ]
  28902. } ]
  28903. },
  28904. "impact" : {
  28905. "baseMetricV3" : {
  28906. "cvssV3" : {
  28907. "version" : "3.1",
  28908. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  28909. "attackVector" : "NETWORK",
  28910. "attackComplexity" : "LOW",
  28911. "privilegesRequired" : "NONE",
  28912. "userInteraction" : "NONE",
  28913. "scope" : "UNCHANGED",
  28914. "confidentialityImpact" : "HIGH",
  28915. "integrityImpact" : "NONE",
  28916. "availabilityImpact" : "NONE",
  28917. "baseScore" : 7.5,
  28918. "baseSeverity" : "HIGH"
  28919. },
  28920. "exploitabilityScore" : 3.9,
  28921. "impactScore" : 3.6
  28922. },
  28923. "baseMetricV2" : {
  28924. "cvssV2" : {
  28925. "version" : "2.0",
  28926. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  28927. "accessVector" : "NETWORK",
  28928. "accessComplexity" : "LOW",
  28929. "authentication" : "NONE",
  28930. "confidentialityImpact" : "PARTIAL",
  28931. "integrityImpact" : "NONE",
  28932. "availabilityImpact" : "NONE",
  28933. "baseScore" : 5.0
  28934. },
  28935. "severity" : "MEDIUM",
  28936. "exploitabilityScore" : 10.0,
  28937. "impactScore" : 2.9,
  28938. "acInsufInfo" : false,
  28939. "obtainAllPrivilege" : false,
  28940. "obtainUserPrivilege" : false,
  28941. "obtainOtherPrivilege" : false,
  28942. "userInteractionRequired" : false
  28943. }
  28944. },
  28945. "publishedDate" : "2021-04-29T15:15Z",
  28946. "lastModifiedDate" : "2021-05-05T20:35Z"
  28947. }, {
  28948. "cve" : {
  28949. "data_type" : "CVE",
  28950. "data_format" : "MITRE",
  28951. "data_version" : "4.0",
  28952. "CVE_data_meta" : {
  28953. "ID" : "CVE-2021-29141",
  28954. "ASSIGNER" : "security-alert@hpe.com"
  28955. },
  28956. "problemtype" : {
  28957. "problemtype_data" : [ {
  28958. "description" : [ {
  28959. "lang" : "en",
  28960. "value" : "CWE-863"
  28961. } ]
  28962. } ]
  28963. },
  28964. "references" : {
  28965. "reference_data" : [ {
  28966. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  28967. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  28968. "refsource" : "MISC",
  28969. "tags" : [ "Vendor Advisory" ]
  28970. } ]
  28971. },
  28972. "description" : {
  28973. "description_data" : [ {
  28974. "lang" : "en",
  28975. "value" : "A remote disclosure of sensitive information vulnerability was discovered in Aruba ClearPass Policy Manager version(s) prior to 6.9.5, 6.8.9, 6.7.14-HF1. Aruba has released patches for Aruba ClearPass Policy Manager that address this security vulnerability."
  28976. } ]
  28977. }
  28978. },
  28979. "configurations" : {
  28980. "CVE_data_version" : "4.0",
  28981. "nodes" : [ {
  28982. "operator" : "OR",
  28983. "children" : [ ],
  28984. "cpe_match" : [ {
  28985. "vulnerable" : true,
  28986. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  28987. "versionStartIncluding" : "6.7.0",
  28988. "versionEndExcluding" : "6.7.14",
  28989. "cpe_name" : [ ]
  28990. }, {
  28991. "vulnerable" : true,
  28992. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  28993. "versionStartIncluding" : "6.8.0",
  28994. "versionEndExcluding" : "6.8.5",
  28995. "cpe_name" : [ ]
  28996. } ]
  28997. } ]
  28998. },
  28999. "impact" : {
  29000. "baseMetricV3" : {
  29001. "cvssV3" : {
  29002. "version" : "3.1",
  29003. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  29004. "attackVector" : "NETWORK",
  29005. "attackComplexity" : "LOW",
  29006. "privilegesRequired" : "LOW",
  29007. "userInteraction" : "NONE",
  29008. "scope" : "UNCHANGED",
  29009. "confidentialityImpact" : "HIGH",
  29010. "integrityImpact" : "NONE",
  29011. "availabilityImpact" : "NONE",
  29012. "baseScore" : 6.5,
  29013. "baseSeverity" : "MEDIUM"
  29014. },
  29015. "exploitabilityScore" : 2.8,
  29016. "impactScore" : 3.6
  29017. },
  29018. "baseMetricV2" : {
  29019. "cvssV2" : {
  29020. "version" : "2.0",
  29021. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
  29022. "accessVector" : "NETWORK",
  29023. "accessComplexity" : "LOW",
  29024. "authentication" : "SINGLE",
  29025. "confidentialityImpact" : "PARTIAL",
  29026. "integrityImpact" : "NONE",
  29027. "availabilityImpact" : "NONE",
  29028. "baseScore" : 4.0
  29029. },
  29030. "severity" : "MEDIUM",
  29031. "exploitabilityScore" : 8.0,
  29032. "impactScore" : 2.9,
  29033. "acInsufInfo" : false,
  29034. "obtainAllPrivilege" : false,
  29035. "obtainUserPrivilege" : false,
  29036. "obtainOtherPrivilege" : false,
  29037. "userInteractionRequired" : false
  29038. }
  29039. },
  29040. "publishedDate" : "2021-04-29T14:15Z",
  29041. "lastModifiedDate" : "2021-05-07T15:31Z"
  29042. }, {
  29043. "cve" : {
  29044. "data_type" : "CVE",
  29045. "data_format" : "MITRE",
  29046. "data_version" : "4.0",
  29047. "CVE_data_meta" : {
  29048. "ID" : "CVE-2021-29139",
  29049. "ASSIGNER" : "security-alert@hpe.com"
  29050. },
  29051. "problemtype" : {
  29052. "problemtype_data" : [ {
  29053. "description" : [ {
  29054. "lang" : "en",
  29055. "value" : "CWE-79"
  29056. } ]
  29057. } ]
  29058. },
  29059. "references" : {
  29060. "reference_data" : [ {
  29061. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29062. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29063. "refsource" : "MISC",
  29064. "tags" : [ "Vendor Advisory" ]
  29065. } ]
  29066. },
  29067. "description" : {
  29068. "description_data" : [ {
  29069. "lang" : "en",
  29070. "value" : "A remote cross-site scripting (XSS) vulnerability was discovered in Aruba ClearPass Policy Manager version(s) prior to 6.9.5, 6.8.9, 6.7.14-HF1. Aruba has released patches for Aruba ClearPass Policy Manager that address this security vulnerability."
  29071. } ]
  29072. }
  29073. },
  29074. "configurations" : {
  29075. "CVE_data_version" : "4.0",
  29076. "nodes" : [ {
  29077. "operator" : "OR",
  29078. "children" : [ ],
  29079. "cpe_match" : [ {
  29080. "vulnerable" : true,
  29081. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29082. "versionStartIncluding" : "6.7.0",
  29083. "versionEndExcluding" : "6.7.14",
  29084. "cpe_name" : [ ]
  29085. }, {
  29086. "vulnerable" : true,
  29087. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:6.7.14:-:*:*:*:*:*:*",
  29088. "cpe_name" : [ ]
  29089. }, {
  29090. "vulnerable" : true,
  29091. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29092. "versionStartIncluding" : "6.8.0",
  29093. "versionEndExcluding" : "6.8.9",
  29094. "cpe_name" : [ ]
  29095. }, {
  29096. "vulnerable" : true,
  29097. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29098. "versionStartIncluding" : "6.9.0",
  29099. "versionEndExcluding" : "6.9.5",
  29100. "cpe_name" : [ ]
  29101. } ]
  29102. } ]
  29103. },
  29104. "impact" : {
  29105. "baseMetricV3" : {
  29106. "cvssV3" : {
  29107. "version" : "3.1",
  29108. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
  29109. "attackVector" : "NETWORK",
  29110. "attackComplexity" : "LOW",
  29111. "privilegesRequired" : "HIGH",
  29112. "userInteraction" : "REQUIRED",
  29113. "scope" : "CHANGED",
  29114. "confidentialityImpact" : "LOW",
  29115. "integrityImpact" : "LOW",
  29116. "availabilityImpact" : "NONE",
  29117. "baseScore" : 4.8,
  29118. "baseSeverity" : "MEDIUM"
  29119. },
  29120. "exploitabilityScore" : 1.7,
  29121. "impactScore" : 2.7
  29122. },
  29123. "baseMetricV2" : {
  29124. "cvssV2" : {
  29125. "version" : "2.0",
  29126. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  29127. "accessVector" : "NETWORK",
  29128. "accessComplexity" : "MEDIUM",
  29129. "authentication" : "SINGLE",
  29130. "confidentialityImpact" : "NONE",
  29131. "integrityImpact" : "PARTIAL",
  29132. "availabilityImpact" : "NONE",
  29133. "baseScore" : 3.5
  29134. },
  29135. "severity" : "LOW",
  29136. "exploitabilityScore" : 6.8,
  29137. "impactScore" : 2.9,
  29138. "acInsufInfo" : false,
  29139. "obtainAllPrivilege" : false,
  29140. "obtainUserPrivilege" : false,
  29141. "obtainOtherPrivilege" : false,
  29142. "userInteractionRequired" : true
  29143. }
  29144. },
  29145. "publishedDate" : "2021-04-29T14:15Z",
  29146. "lastModifiedDate" : "2021-05-07T14:47Z"
  29147. }, {
  29148. "cve" : {
  29149. "data_type" : "CVE",
  29150. "data_format" : "MITRE",
  29151. "data_version" : "4.0",
  29152. "CVE_data_meta" : {
  29153. "ID" : "CVE-2020-21990",
  29154. "ASSIGNER" : "cve@mitre.org"
  29155. },
  29156. "problemtype" : {
  29157. "problemtype_data" : [ {
  29158. "description" : [ {
  29159. "lang" : "en",
  29160. "value" : "CWE-863"
  29161. } ]
  29162. } ]
  29163. },
  29164. "references" : {
  29165. "reference_data" : [ {
  29166. "url" : "https://www.exploit-db.com/exploits/47824",
  29167. "name" : "Exploit Database",
  29168. "refsource" : "EXPLOIT-DB",
  29169. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  29170. }, {
  29171. "url" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php",
  29172. "name" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php",
  29173. "refsource" : "MISC",
  29174. "tags" : [ "Exploit", "Third Party Advisory" ]
  29175. } ]
  29176. },
  29177. "description" : {
  29178. "description_data" : [ {
  29179. "lang" : "en",
  29180. "value" : "Emmanuel MyDomoAtHome (MDAH) REST API REST API Domoticz ISS Gateway 0.2.40 is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information."
  29181. } ]
  29182. }
  29183. },
  29184. "configurations" : {
  29185. "CVE_data_version" : "4.0",
  29186. "nodes" : [ {
  29187. "operator" : "OR",
  29188. "children" : [ ],
  29189. "cpe_match" : [ {
  29190. "vulnerable" : true,
  29191. "cpe23Uri" : "cpe:2.3:a:domoticz:mydomoathome:0.240:*:*:*:*:node.js:*:*",
  29192. "cpe_name" : [ ]
  29193. } ]
  29194. } ]
  29195. },
  29196. "impact" : {
  29197. "baseMetricV3" : {
  29198. "cvssV3" : {
  29199. "version" : "3.1",
  29200. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  29201. "attackVector" : "NETWORK",
  29202. "attackComplexity" : "LOW",
  29203. "privilegesRequired" : "NONE",
  29204. "userInteraction" : "NONE",
  29205. "scope" : "UNCHANGED",
  29206. "confidentialityImpact" : "HIGH",
  29207. "integrityImpact" : "NONE",
  29208. "availabilityImpact" : "NONE",
  29209. "baseScore" : 7.5,
  29210. "baseSeverity" : "HIGH"
  29211. },
  29212. "exploitabilityScore" : 3.9,
  29213. "impactScore" : 3.6
  29214. },
  29215. "baseMetricV2" : {
  29216. "cvssV2" : {
  29217. "version" : "2.0",
  29218. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  29219. "accessVector" : "NETWORK",
  29220. "accessComplexity" : "LOW",
  29221. "authentication" : "NONE",
  29222. "confidentialityImpact" : "PARTIAL",
  29223. "integrityImpact" : "NONE",
  29224. "availabilityImpact" : "NONE",
  29225. "baseScore" : 5.0
  29226. },
  29227. "severity" : "MEDIUM",
  29228. "exploitabilityScore" : 10.0,
  29229. "impactScore" : 2.9,
  29230. "acInsufInfo" : false,
  29231. "obtainAllPrivilege" : false,
  29232. "obtainUserPrivilege" : false,
  29233. "obtainOtherPrivilege" : false,
  29234. "userInteractionRequired" : false
  29235. }
  29236. },
  29237. "publishedDate" : "2021-04-29T14:15Z",
  29238. "lastModifiedDate" : "2021-05-08T04:57Z"
  29239. }, {
  29240. "cve" : {
  29241. "data_type" : "CVE",
  29242. "data_format" : "MITRE",
  29243. "data_version" : "4.0",
  29244. "CVE_data_meta" : {
  29245. "ID" : "CVE-2021-29142",
  29246. "ASSIGNER" : "security-alert@hpe.com"
  29247. },
  29248. "problemtype" : {
  29249. "problemtype_data" : [ {
  29250. "description" : [ {
  29251. "lang" : "en",
  29252. "value" : "CWE-79"
  29253. } ]
  29254. } ]
  29255. },
  29256. "references" : {
  29257. "reference_data" : [ {
  29258. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29259. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29260. "refsource" : "MISC",
  29261. "tags" : [ "Vendor Advisory" ]
  29262. } ]
  29263. },
  29264. "description" : {
  29265. "description_data" : [ {
  29266. "lang" : "en",
  29267. "value" : "A remote cross-site scripting (XSS) vulnerability was discovered in Aruba ClearPass Policy Manager version(s) prior to 6.9.5, 6.8.9, 6.7.14-HF1. Aruba has released patches for Aruba ClearPass Policy Manager that address this security vulnerability."
  29268. } ]
  29269. }
  29270. },
  29271. "configurations" : {
  29272. "CVE_data_version" : "4.0",
  29273. "nodes" : [ {
  29274. "operator" : "OR",
  29275. "children" : [ ],
  29276. "cpe_match" : [ {
  29277. "vulnerable" : true,
  29278. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29279. "versionStartIncluding" : "6.7.0",
  29280. "versionEndExcluding" : "6.7.14",
  29281. "cpe_name" : [ ]
  29282. }, {
  29283. "vulnerable" : true,
  29284. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:6.7.14:-:*:*:*:*:*:*",
  29285. "cpe_name" : [ ]
  29286. }, {
  29287. "vulnerable" : true,
  29288. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29289. "versionStartIncluding" : "6.8.0",
  29290. "versionEndExcluding" : "6.8.9",
  29291. "cpe_name" : [ ]
  29292. }, {
  29293. "vulnerable" : true,
  29294. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29295. "versionStartIncluding" : "6.9.0",
  29296. "versionEndExcluding" : "6.9.5",
  29297. "cpe_name" : [ ]
  29298. } ]
  29299. } ]
  29300. },
  29301. "impact" : {
  29302. "baseMetricV3" : {
  29303. "cvssV3" : {
  29304. "version" : "3.1",
  29305. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
  29306. "attackVector" : "NETWORK",
  29307. "attackComplexity" : "LOW",
  29308. "privilegesRequired" : "HIGH",
  29309. "userInteraction" : "REQUIRED",
  29310. "scope" : "CHANGED",
  29311. "confidentialityImpact" : "LOW",
  29312. "integrityImpact" : "LOW",
  29313. "availabilityImpact" : "NONE",
  29314. "baseScore" : 4.8,
  29315. "baseSeverity" : "MEDIUM"
  29316. },
  29317. "exploitabilityScore" : 1.7,
  29318. "impactScore" : 2.7
  29319. },
  29320. "baseMetricV2" : {
  29321. "cvssV2" : {
  29322. "version" : "2.0",
  29323. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  29324. "accessVector" : "NETWORK",
  29325. "accessComplexity" : "MEDIUM",
  29326. "authentication" : "SINGLE",
  29327. "confidentialityImpact" : "NONE",
  29328. "integrityImpact" : "PARTIAL",
  29329. "availabilityImpact" : "NONE",
  29330. "baseScore" : 3.5
  29331. },
  29332. "severity" : "LOW",
  29333. "exploitabilityScore" : 6.8,
  29334. "impactScore" : 2.9,
  29335. "acInsufInfo" : false,
  29336. "obtainAllPrivilege" : false,
  29337. "obtainUserPrivilege" : false,
  29338. "obtainOtherPrivilege" : false,
  29339. "userInteractionRequired" : true
  29340. }
  29341. },
  29342. "publishedDate" : "2021-04-29T13:15Z",
  29343. "lastModifiedDate" : "2021-05-07T15:17Z"
  29344. }, {
  29345. "cve" : {
  29346. "data_type" : "CVE",
  29347. "data_format" : "MITRE",
  29348. "data_version" : "4.0",
  29349. "CVE_data_meta" : {
  29350. "ID" : "CVE-2021-29140",
  29351. "ASSIGNER" : "security-alert@hpe.com"
  29352. },
  29353. "problemtype" : {
  29354. "problemtype_data" : [ {
  29355. "description" : [ {
  29356. "lang" : "en",
  29357. "value" : "CWE-611"
  29358. } ]
  29359. } ]
  29360. },
  29361. "references" : {
  29362. "reference_data" : [ {
  29363. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29364. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29365. "refsource" : "MISC",
  29366. "tags" : [ "Vendor Advisory" ]
  29367. } ]
  29368. },
  29369. "description" : {
  29370. "description_data" : [ {
  29371. "lang" : "en",
  29372. "value" : "A remote XML external entity (XXE) vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.9, 6.7.14-HF1. Aruba has released patches for Aruba ClearPass Policy Manager that address this security vulnerability."
  29373. } ]
  29374. }
  29375. },
  29376. "configurations" : {
  29377. "CVE_data_version" : "4.0",
  29378. "nodes" : [ {
  29379. "operator" : "OR",
  29380. "children" : [ ],
  29381. "cpe_match" : [ {
  29382. "vulnerable" : true,
  29383. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29384. "versionStartIncluding" : "6.7.0",
  29385. "versionEndExcluding" : "6.7.13",
  29386. "cpe_name" : [ ]
  29387. }, {
  29388. "vulnerable" : true,
  29389. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29390. "versionStartIncluding" : "6.8.0",
  29391. "versionEndExcluding" : "6.8.4",
  29392. "cpe_name" : [ ]
  29393. } ]
  29394. } ]
  29395. },
  29396. "impact" : {
  29397. "baseMetricV3" : {
  29398. "cvssV3" : {
  29399. "version" : "3.1",
  29400. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
  29401. "attackVector" : "NETWORK",
  29402. "attackComplexity" : "LOW",
  29403. "privilegesRequired" : "NONE",
  29404. "userInteraction" : "NONE",
  29405. "scope" : "UNCHANGED",
  29406. "confidentialityImpact" : "HIGH",
  29407. "integrityImpact" : "NONE",
  29408. "availabilityImpact" : "LOW",
  29409. "baseScore" : 8.2,
  29410. "baseSeverity" : "HIGH"
  29411. },
  29412. "exploitabilityScore" : 3.9,
  29413. "impactScore" : 4.2
  29414. },
  29415. "baseMetricV2" : {
  29416. "cvssV2" : {
  29417. "version" : "2.0",
  29418. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:P",
  29419. "accessVector" : "NETWORK",
  29420. "accessComplexity" : "LOW",
  29421. "authentication" : "NONE",
  29422. "confidentialityImpact" : "PARTIAL",
  29423. "integrityImpact" : "NONE",
  29424. "availabilityImpact" : "PARTIAL",
  29425. "baseScore" : 6.4
  29426. },
  29427. "severity" : "MEDIUM",
  29428. "exploitabilityScore" : 10.0,
  29429. "impactScore" : 4.9,
  29430. "acInsufInfo" : false,
  29431. "obtainAllPrivilege" : false,
  29432. "obtainUserPrivilege" : false,
  29433. "obtainOtherPrivilege" : false,
  29434. "userInteractionRequired" : false
  29435. }
  29436. },
  29437. "publishedDate" : "2021-04-29T13:15Z",
  29438. "lastModifiedDate" : "2021-05-07T15:12Z"
  29439. }, {
  29440. "cve" : {
  29441. "data_type" : "CVE",
  29442. "data_format" : "MITRE",
  29443. "data_version" : "4.0",
  29444. "CVE_data_meta" : {
  29445. "ID" : "CVE-2021-29138",
  29446. "ASSIGNER" : "security-alert@hpe.com"
  29447. },
  29448. "problemtype" : {
  29449. "problemtype_data" : [ {
  29450. "description" : [ {
  29451. "lang" : "en",
  29452. "value" : "CWE-522"
  29453. } ]
  29454. } ]
  29455. },
  29456. "references" : {
  29457. "reference_data" : [ {
  29458. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29459. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29460. "refsource" : "MISC",
  29461. "tags" : [ "Vendor Advisory" ]
  29462. } ]
  29463. },
  29464. "description" : {
  29465. "description_data" : [ {
  29466. "lang" : "en",
  29467. "value" : "A remote disclosure of privileged information vulnerability was discovered in Aruba ClearPass Policy Manager version(s) prior to 6.9.5, 6.8.9, 6.7.14-HF1. Aruba has released patches for Aruba ClearPass Policy Manager that address this security vulnerability."
  29468. } ]
  29469. }
  29470. },
  29471. "configurations" : {
  29472. "CVE_data_version" : "4.0",
  29473. "nodes" : [ {
  29474. "operator" : "OR",
  29475. "children" : [ ],
  29476. "cpe_match" : [ {
  29477. "vulnerable" : true,
  29478. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29479. "versionStartIncluding" : "6.7.0",
  29480. "versionEndExcluding" : "6.7.5",
  29481. "cpe_name" : [ ]
  29482. }, {
  29483. "vulnerable" : true,
  29484. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29485. "versionStartIncluding" : "6.8.0",
  29486. "versionEndExcluding" : "6.8.1",
  29487. "cpe_name" : [ ]
  29488. } ]
  29489. } ]
  29490. },
  29491. "impact" : {
  29492. "baseMetricV3" : {
  29493. "cvssV3" : {
  29494. "version" : "3.1",
  29495. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  29496. "attackVector" : "NETWORK",
  29497. "attackComplexity" : "LOW",
  29498. "privilegesRequired" : "LOW",
  29499. "userInteraction" : "NONE",
  29500. "scope" : "UNCHANGED",
  29501. "confidentialityImpact" : "HIGH",
  29502. "integrityImpact" : "NONE",
  29503. "availabilityImpact" : "NONE",
  29504. "baseScore" : 6.5,
  29505. "baseSeverity" : "MEDIUM"
  29506. },
  29507. "exploitabilityScore" : 2.8,
  29508. "impactScore" : 3.6
  29509. },
  29510. "baseMetricV2" : {
  29511. "cvssV2" : {
  29512. "version" : "2.0",
  29513. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
  29514. "accessVector" : "NETWORK",
  29515. "accessComplexity" : "LOW",
  29516. "authentication" : "SINGLE",
  29517. "confidentialityImpact" : "PARTIAL",
  29518. "integrityImpact" : "NONE",
  29519. "availabilityImpact" : "NONE",
  29520. "baseScore" : 4.0
  29521. },
  29522. "severity" : "MEDIUM",
  29523. "exploitabilityScore" : 8.0,
  29524. "impactScore" : 2.9,
  29525. "acInsufInfo" : false,
  29526. "obtainAllPrivilege" : false,
  29527. "obtainUserPrivilege" : false,
  29528. "obtainOtherPrivilege" : false,
  29529. "userInteractionRequired" : false
  29530. }
  29531. },
  29532. "publishedDate" : "2021-04-29T13:15Z",
  29533. "lastModifiedDate" : "2021-05-07T15:01Z"
  29534. }, {
  29535. "cve" : {
  29536. "data_type" : "CVE",
  29537. "data_format" : "MITRE",
  29538. "data_version" : "4.0",
  29539. "CVE_data_meta" : {
  29540. "ID" : "CVE-2021-29147",
  29541. "ASSIGNER" : "security-alert@hpe.com"
  29542. },
  29543. "problemtype" : {
  29544. "problemtype_data" : [ {
  29545. "description" : [ {
  29546. "lang" : "en",
  29547. "value" : "CWE-78"
  29548. } ]
  29549. } ]
  29550. },
  29551. "references" : {
  29552. "reference_data" : [ {
  29553. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29554. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29555. "refsource" : "MISC",
  29556. "tags" : [ "Vendor Advisory" ]
  29557. } ]
  29558. },
  29559. "description" : {
  29560. "description_data" : [ {
  29561. "lang" : "en",
  29562. "value" : "A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s) prior to 6.9.5, 6.8.9, 6.7.14-HF1. Aruba has released patches for Aruba ClearPass Policy Manager that address this security vulnerability."
  29563. } ]
  29564. }
  29565. },
  29566. "configurations" : {
  29567. "CVE_data_version" : "4.0",
  29568. "nodes" : [ {
  29569. "operator" : "OR",
  29570. "children" : [ ],
  29571. "cpe_match" : [ {
  29572. "vulnerable" : true,
  29573. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29574. "versionStartIncluding" : "6.7.0",
  29575. "versionEndExcluding" : "6.7.14",
  29576. "cpe_name" : [ ]
  29577. }, {
  29578. "vulnerable" : true,
  29579. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:6.7.14:-:*:*:*:*:*:*",
  29580. "cpe_name" : [ ]
  29581. }, {
  29582. "vulnerable" : true,
  29583. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29584. "versionStartIncluding" : "6.8.0",
  29585. "versionEndExcluding" : "6.8.8",
  29586. "cpe_name" : [ ]
  29587. }, {
  29588. "vulnerable" : true,
  29589. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29590. "versionStartIncluding" : "6.9.0",
  29591. "versionEndExcluding" : "6.9.4",
  29592. "cpe_name" : [ ]
  29593. } ]
  29594. } ]
  29595. },
  29596. "impact" : {
  29597. "baseMetricV3" : {
  29598. "cvssV3" : {
  29599. "version" : "3.1",
  29600. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  29601. "attackVector" : "NETWORK",
  29602. "attackComplexity" : "LOW",
  29603. "privilegesRequired" : "LOW",
  29604. "userInteraction" : "NONE",
  29605. "scope" : "UNCHANGED",
  29606. "confidentialityImpact" : "HIGH",
  29607. "integrityImpact" : "HIGH",
  29608. "availabilityImpact" : "HIGH",
  29609. "baseScore" : 8.8,
  29610. "baseSeverity" : "HIGH"
  29611. },
  29612. "exploitabilityScore" : 2.8,
  29613. "impactScore" : 5.9
  29614. },
  29615. "baseMetricV2" : {
  29616. "cvssV2" : {
  29617. "version" : "2.0",
  29618. "vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C",
  29619. "accessVector" : "NETWORK",
  29620. "accessComplexity" : "LOW",
  29621. "authentication" : "SINGLE",
  29622. "confidentialityImpact" : "COMPLETE",
  29623. "integrityImpact" : "COMPLETE",
  29624. "availabilityImpact" : "COMPLETE",
  29625. "baseScore" : 9.0
  29626. },
  29627. "severity" : "HIGH",
  29628. "exploitabilityScore" : 8.0,
  29629. "impactScore" : 10.0,
  29630. "acInsufInfo" : false,
  29631. "obtainAllPrivilege" : false,
  29632. "obtainUserPrivilege" : false,
  29633. "obtainOtherPrivilege" : false,
  29634. "userInteractionRequired" : false
  29635. }
  29636. },
  29637. "publishedDate" : "2021-04-29T12:15Z",
  29638. "lastModifiedDate" : "2021-05-07T21:48Z"
  29639. }, {
  29640. "cve" : {
  29641. "data_type" : "CVE",
  29642. "data_format" : "MITRE",
  29643. "data_version" : "4.0",
  29644. "CVE_data_meta" : {
  29645. "ID" : "CVE-2021-29146",
  29646. "ASSIGNER" : "security-alert@hpe.com"
  29647. },
  29648. "problemtype" : {
  29649. "problemtype_data" : [ {
  29650. "description" : [ {
  29651. "lang" : "en",
  29652. "value" : "CWE-79"
  29653. } ]
  29654. } ]
  29655. },
  29656. "references" : {
  29657. "reference_data" : [ {
  29658. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29659. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29660. "refsource" : "MISC",
  29661. "tags" : [ "Vendor Advisory" ]
  29662. } ]
  29663. },
  29664. "description" : {
  29665. "description_data" : [ {
  29666. "lang" : "en",
  29667. "value" : "A remote cross-site scripting (XSS) vulnerability was discovered in Aruba ClearPass Policy Manager version(s) prior to 6.9.5, 6.8.9, 6.7.14-HF1. Aruba has released patches for Aruba ClearPass Policy Manager that address this security vulnerability."
  29668. } ]
  29669. }
  29670. },
  29671. "configurations" : {
  29672. "CVE_data_version" : "4.0",
  29673. "nodes" : [ {
  29674. "operator" : "OR",
  29675. "children" : [ ],
  29676. "cpe_match" : [ {
  29677. "vulnerable" : true,
  29678. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29679. "versionStartIncluding" : "6.7.0",
  29680. "versionEndExcluding" : "6.7.14",
  29681. "cpe_name" : [ ]
  29682. }, {
  29683. "vulnerable" : true,
  29684. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:6.7.14:-:*:*:*:*:*:*",
  29685. "cpe_name" : [ ]
  29686. }, {
  29687. "vulnerable" : true,
  29688. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29689. "versionStartIncluding" : "6.8.0",
  29690. "versionEndExcluding" : "6.8.9",
  29691. "cpe_name" : [ ]
  29692. }, {
  29693. "vulnerable" : true,
  29694. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29695. "versionStartIncluding" : "6.9.0",
  29696. "versionEndExcluding" : "6.9.5",
  29697. "cpe_name" : [ ]
  29698. } ]
  29699. } ]
  29700. },
  29701. "impact" : {
  29702. "baseMetricV3" : {
  29703. "cvssV3" : {
  29704. "version" : "3.1",
  29705. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  29706. "attackVector" : "NETWORK",
  29707. "attackComplexity" : "LOW",
  29708. "privilegesRequired" : "LOW",
  29709. "userInteraction" : "REQUIRED",
  29710. "scope" : "CHANGED",
  29711. "confidentialityImpact" : "LOW",
  29712. "integrityImpact" : "LOW",
  29713. "availabilityImpact" : "NONE",
  29714. "baseScore" : 5.4,
  29715. "baseSeverity" : "MEDIUM"
  29716. },
  29717. "exploitabilityScore" : 2.3,
  29718. "impactScore" : 2.7
  29719. },
  29720. "baseMetricV2" : {
  29721. "cvssV2" : {
  29722. "version" : "2.0",
  29723. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  29724. "accessVector" : "NETWORK",
  29725. "accessComplexity" : "MEDIUM",
  29726. "authentication" : "SINGLE",
  29727. "confidentialityImpact" : "NONE",
  29728. "integrityImpact" : "PARTIAL",
  29729. "availabilityImpact" : "NONE",
  29730. "baseScore" : 3.5
  29731. },
  29732. "severity" : "LOW",
  29733. "exploitabilityScore" : 6.8,
  29734. "impactScore" : 2.9,
  29735. "acInsufInfo" : false,
  29736. "obtainAllPrivilege" : false,
  29737. "obtainUserPrivilege" : false,
  29738. "obtainOtherPrivilege" : false,
  29739. "userInteractionRequired" : true
  29740. }
  29741. },
  29742. "publishedDate" : "2021-04-29T12:15Z",
  29743. "lastModifiedDate" : "2021-05-07T21:49Z"
  29744. }, {
  29745. "cve" : {
  29746. "data_type" : "CVE",
  29747. "data_format" : "MITRE",
  29748. "data_version" : "4.0",
  29749. "CVE_data_meta" : {
  29750. "ID" : "CVE-2021-29145",
  29751. "ASSIGNER" : "security-alert@hpe.com"
  29752. },
  29753. "problemtype" : {
  29754. "problemtype_data" : [ {
  29755. "description" : [ {
  29756. "lang" : "en",
  29757. "value" : "CWE-918"
  29758. } ]
  29759. } ]
  29760. },
  29761. "references" : {
  29762. "reference_data" : [ {
  29763. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29764. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29765. "refsource" : "MISC",
  29766. "tags" : [ "Vendor Advisory" ]
  29767. } ]
  29768. },
  29769. "description" : {
  29770. "description_data" : [ {
  29771. "lang" : "en",
  29772. "value" : "A remote server side request forgery (SSRF) remote code execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s) prior to 6.9.5, 6.8.9, 6.7.14-HF1. Aruba has released patches for Aruba ClearPass Policy Manager that address this security vulnerability."
  29773. } ]
  29774. }
  29775. },
  29776. "configurations" : {
  29777. "CVE_data_version" : "4.0",
  29778. "nodes" : [ {
  29779. "operator" : "OR",
  29780. "children" : [ ],
  29781. "cpe_match" : [ {
  29782. "vulnerable" : true,
  29783. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29784. "versionStartIncluding" : "6.7.0",
  29785. "versionEndExcluding" : "6.7.14",
  29786. "cpe_name" : [ ]
  29787. }, {
  29788. "vulnerable" : true,
  29789. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29790. "versionStartIncluding" : "6.8.0",
  29791. "versionEndExcluding" : "6.8.6",
  29792. "cpe_name" : [ ]
  29793. }, {
  29794. "vulnerable" : true,
  29795. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29796. "versionStartIncluding" : "6.9.0",
  29797. "versionEndExcluding" : "6.9.1",
  29798. "cpe_name" : [ ]
  29799. } ]
  29800. } ]
  29801. },
  29802. "impact" : {
  29803. "baseMetricV3" : {
  29804. "cvssV3" : {
  29805. "version" : "3.1",
  29806. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  29807. "attackVector" : "NETWORK",
  29808. "attackComplexity" : "LOW",
  29809. "privilegesRequired" : "NONE",
  29810. "userInteraction" : "NONE",
  29811. "scope" : "UNCHANGED",
  29812. "confidentialityImpact" : "HIGH",
  29813. "integrityImpact" : "HIGH",
  29814. "availabilityImpact" : "HIGH",
  29815. "baseScore" : 9.8,
  29816. "baseSeverity" : "CRITICAL"
  29817. },
  29818. "exploitabilityScore" : 3.9,
  29819. "impactScore" : 5.9
  29820. },
  29821. "baseMetricV2" : {
  29822. "cvssV2" : {
  29823. "version" : "2.0",
  29824. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  29825. "accessVector" : "NETWORK",
  29826. "accessComplexity" : "LOW",
  29827. "authentication" : "NONE",
  29828. "confidentialityImpact" : "PARTIAL",
  29829. "integrityImpact" : "PARTIAL",
  29830. "availabilityImpact" : "PARTIAL",
  29831. "baseScore" : 7.5
  29832. },
  29833. "severity" : "HIGH",
  29834. "exploitabilityScore" : 10.0,
  29835. "impactScore" : 6.4,
  29836. "acInsufInfo" : false,
  29837. "obtainAllPrivilege" : false,
  29838. "obtainUserPrivilege" : false,
  29839. "obtainOtherPrivilege" : false,
  29840. "userInteractionRequired" : false
  29841. }
  29842. },
  29843. "publishedDate" : "2021-04-29T12:15Z",
  29844. "lastModifiedDate" : "2021-05-10T14:06Z"
  29845. }, {
  29846. "cve" : {
  29847. "data_type" : "CVE",
  29848. "data_format" : "MITRE",
  29849. "data_version" : "4.0",
  29850. "CVE_data_meta" : {
  29851. "ID" : "CVE-2021-29144",
  29852. "ASSIGNER" : "security-alert@hpe.com"
  29853. },
  29854. "problemtype" : {
  29855. "problemtype_data" : [ {
  29856. "description" : [ {
  29857. "lang" : "en",
  29858. "value" : "CWE-863"
  29859. } ]
  29860. } ]
  29861. },
  29862. "references" : {
  29863. "reference_data" : [ {
  29864. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29865. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  29866. "refsource" : "MISC",
  29867. "tags" : [ "Vendor Advisory" ]
  29868. } ]
  29869. },
  29870. "description" : {
  29871. "description_data" : [ {
  29872. "lang" : "en",
  29873. "value" : "A remote disclosure of sensitive information vulnerability was discovered in Aruba ClearPass Policy Manager version(s) prior to 6.9.5, 6.8.9, 6.7.14-HF1. Aruba has released patches for Aruba ClearPass Policy Manager that address this security vulnerability."
  29874. } ]
  29875. }
  29876. },
  29877. "configurations" : {
  29878. "CVE_data_version" : "4.0",
  29879. "nodes" : [ {
  29880. "operator" : "OR",
  29881. "children" : [ ],
  29882. "cpe_match" : [ {
  29883. "vulnerable" : true,
  29884. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29885. "versionStartIncluding" : "6.7.0",
  29886. "versionEndExcluding" : "6.7.14",
  29887. "cpe_name" : [ ]
  29888. }, {
  29889. "vulnerable" : true,
  29890. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*",
  29891. "versionStartIncluding" : "6.8.0",
  29892. "versionEndExcluding" : "6.8.5",
  29893. "cpe_name" : [ ]
  29894. } ]
  29895. } ]
  29896. },
  29897. "impact" : {
  29898. "baseMetricV3" : {
  29899. "cvssV3" : {
  29900. "version" : "3.1",
  29901. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  29902. "attackVector" : "NETWORK",
  29903. "attackComplexity" : "LOW",
  29904. "privilegesRequired" : "LOW",
  29905. "userInteraction" : "NONE",
  29906. "scope" : "UNCHANGED",
  29907. "confidentialityImpact" : "HIGH",
  29908. "integrityImpact" : "NONE",
  29909. "availabilityImpact" : "NONE",
  29910. "baseScore" : 6.5,
  29911. "baseSeverity" : "MEDIUM"
  29912. },
  29913. "exploitabilityScore" : 2.8,
  29914. "impactScore" : 3.6
  29915. },
  29916. "baseMetricV2" : {
  29917. "cvssV2" : {
  29918. "version" : "2.0",
  29919. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
  29920. "accessVector" : "NETWORK",
  29921. "accessComplexity" : "LOW",
  29922. "authentication" : "SINGLE",
  29923. "confidentialityImpact" : "PARTIAL",
  29924. "integrityImpact" : "NONE",
  29925. "availabilityImpact" : "NONE",
  29926. "baseScore" : 4.0
  29927. },
  29928. "severity" : "MEDIUM",
  29929. "exploitabilityScore" : 8.0,
  29930. "impactScore" : 2.9,
  29931. "acInsufInfo" : false,
  29932. "obtainAllPrivilege" : false,
  29933. "obtainUserPrivilege" : false,
  29934. "obtainOtherPrivilege" : false,
  29935. "userInteractionRequired" : false
  29936. }
  29937. },
  29938. "publishedDate" : "2021-04-29T12:15Z",
  29939. "lastModifiedDate" : "2021-05-10T14:09Z"
  29940. }, {
  29941. "cve" : {
  29942. "data_type" : "CVE",
  29943. "data_format" : "MITRE",
  29944. "data_version" : "4.0",
  29945. "CVE_data_meta" : {
  29946. "ID" : "CVE-2021-29137",
  29947. "ASSIGNER" : "security-alert@hpe.com"
  29948. },
  29949. "problemtype" : {
  29950. "problemtype_data" : [ {
  29951. "description" : [ {
  29952. "lang" : "en",
  29953. "value" : "CWE-601"
  29954. } ]
  29955. } ]
  29956. },
  29957. "references" : {
  29958. "reference_data" : [ {
  29959. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  29960. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  29961. "refsource" : "MISC",
  29962. "tags" : [ "Vendor Advisory" ]
  29963. } ]
  29964. },
  29965. "description" : {
  29966. "description_data" : [ {
  29967. "lang" : "en",
  29968. "value" : "A remote URL redirection vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability."
  29969. } ]
  29970. }
  29971. },
  29972. "configurations" : {
  29973. "CVE_data_version" : "4.0",
  29974. "nodes" : [ {
  29975. "operator" : "OR",
  29976. "children" : [ ],
  29977. "cpe_match" : [ {
  29978. "vulnerable" : true,
  29979. "cpe23Uri" : "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
  29980. "versionEndExcluding" : "8.2.12.1",
  29981. "cpe_name" : [ ]
  29982. } ]
  29983. } ]
  29984. },
  29985. "impact" : {
  29986. "baseMetricV3" : {
  29987. "cvssV3" : {
  29988. "version" : "3.1",
  29989. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  29990. "attackVector" : "NETWORK",
  29991. "attackComplexity" : "LOW",
  29992. "privilegesRequired" : "NONE",
  29993. "userInteraction" : "REQUIRED",
  29994. "scope" : "CHANGED",
  29995. "confidentialityImpact" : "LOW",
  29996. "integrityImpact" : "LOW",
  29997. "availabilityImpact" : "NONE",
  29998. "baseScore" : 6.1,
  29999. "baseSeverity" : "MEDIUM"
  30000. },
  30001. "exploitabilityScore" : 2.8,
  30002. "impactScore" : 2.7
  30003. },
  30004. "baseMetricV2" : {
  30005. "cvssV2" : {
  30006. "version" : "2.0",
  30007. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:N",
  30008. "accessVector" : "NETWORK",
  30009. "accessComplexity" : "MEDIUM",
  30010. "authentication" : "NONE",
  30011. "confidentialityImpact" : "PARTIAL",
  30012. "integrityImpact" : "PARTIAL",
  30013. "availabilityImpact" : "NONE",
  30014. "baseScore" : 5.8
  30015. },
  30016. "severity" : "MEDIUM",
  30017. "exploitabilityScore" : 8.6,
  30018. "impactScore" : 4.9,
  30019. "acInsufInfo" : false,
  30020. "obtainAllPrivilege" : false,
  30021. "obtainUserPrivilege" : false,
  30022. "obtainOtherPrivilege" : false,
  30023. "userInteractionRequired" : true
  30024. }
  30025. },
  30026. "publishedDate" : "2021-04-29T12:15Z",
  30027. "lastModifiedDate" : "2021-05-03T20:57Z"
  30028. }, {
  30029. "cve" : {
  30030. "data_type" : "CVE",
  30031. "data_format" : "MITRE",
  30032. "data_version" : "4.0",
  30033. "CVE_data_meta" : {
  30034. "ID" : "CVE-2021-25167",
  30035. "ASSIGNER" : "security-alert@hpe.com"
  30036. },
  30037. "problemtype" : {
  30038. "problemtype_data" : [ {
  30039. "description" : [ {
  30040. "lang" : "en",
  30041. "value" : "CWE-269"
  30042. } ]
  30043. } ]
  30044. },
  30045. "references" : {
  30046. "reference_data" : [ {
  30047. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  30048. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  30049. "refsource" : "MISC",
  30050. "tags" : [ "Vendor Advisory" ]
  30051. } ]
  30052. },
  30053. "description" : {
  30054. "description_data" : [ {
  30055. "lang" : "en",
  30056. "value" : "A remote unauthorized access vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability."
  30057. } ]
  30058. }
  30059. },
  30060. "configurations" : {
  30061. "CVE_data_version" : "4.0",
  30062. "nodes" : [ {
  30063. "operator" : "OR",
  30064. "children" : [ ],
  30065. "cpe_match" : [ {
  30066. "vulnerable" : true,
  30067. "cpe23Uri" : "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
  30068. "versionEndExcluding" : "8.2.12.1",
  30069. "cpe_name" : [ ]
  30070. } ]
  30071. } ]
  30072. },
  30073. "impact" : {
  30074. "baseMetricV3" : {
  30075. "cvssV3" : {
  30076. "version" : "3.1",
  30077. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  30078. "attackVector" : "NETWORK",
  30079. "attackComplexity" : "LOW",
  30080. "privilegesRequired" : "LOW",
  30081. "userInteraction" : "NONE",
  30082. "scope" : "UNCHANGED",
  30083. "confidentialityImpact" : "HIGH",
  30084. "integrityImpact" : "HIGH",
  30085. "availabilityImpact" : "HIGH",
  30086. "baseScore" : 8.8,
  30087. "baseSeverity" : "HIGH"
  30088. },
  30089. "exploitabilityScore" : 2.8,
  30090. "impactScore" : 5.9
  30091. },
  30092. "baseMetricV2" : {
  30093. "cvssV2" : {
  30094. "version" : "2.0",
  30095. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  30096. "accessVector" : "NETWORK",
  30097. "accessComplexity" : "LOW",
  30098. "authentication" : "SINGLE",
  30099. "confidentialityImpact" : "PARTIAL",
  30100. "integrityImpact" : "PARTIAL",
  30101. "availabilityImpact" : "PARTIAL",
  30102. "baseScore" : 6.5
  30103. },
  30104. "severity" : "MEDIUM",
  30105. "exploitabilityScore" : 8.0,
  30106. "impactScore" : 6.4,
  30107. "acInsufInfo" : false,
  30108. "obtainAllPrivilege" : false,
  30109. "obtainUserPrivilege" : false,
  30110. "obtainOtherPrivilege" : false,
  30111. "userInteractionRequired" : false
  30112. }
  30113. },
  30114. "publishedDate" : "2021-04-29T11:15Z",
  30115. "lastModifiedDate" : "2021-05-03T21:02Z"
  30116. }, {
  30117. "cve" : {
  30118. "data_type" : "CVE",
  30119. "data_format" : "MITRE",
  30120. "data_version" : "4.0",
  30121. "CVE_data_meta" : {
  30122. "ID" : "CVE-2021-25166",
  30123. "ASSIGNER" : "security-alert@hpe.com"
  30124. },
  30125. "problemtype" : {
  30126. "problemtype_data" : [ {
  30127. "description" : [ {
  30128. "lang" : "en",
  30129. "value" : "CWE-77"
  30130. } ]
  30131. } ]
  30132. },
  30133. "references" : {
  30134. "reference_data" : [ {
  30135. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  30136. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  30137. "refsource" : "MISC",
  30138. "tags" : [ "Vendor Advisory" ]
  30139. } ]
  30140. },
  30141. "description" : {
  30142. "description_data" : [ {
  30143. "lang" : "en",
  30144. "value" : "A remote unauthorized access vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability."
  30145. } ]
  30146. }
  30147. },
  30148. "configurations" : {
  30149. "CVE_data_version" : "4.0",
  30150. "nodes" : [ {
  30151. "operator" : "OR",
  30152. "children" : [ ],
  30153. "cpe_match" : [ {
  30154. "vulnerable" : true,
  30155. "cpe23Uri" : "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
  30156. "versionEndExcluding" : "8.2.12.1",
  30157. "cpe_name" : [ ]
  30158. } ]
  30159. } ]
  30160. },
  30161. "impact" : {
  30162. "baseMetricV3" : {
  30163. "cvssV3" : {
  30164. "version" : "3.1",
  30165. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  30166. "attackVector" : "NETWORK",
  30167. "attackComplexity" : "LOW",
  30168. "privilegesRequired" : "LOW",
  30169. "userInteraction" : "NONE",
  30170. "scope" : "UNCHANGED",
  30171. "confidentialityImpact" : "HIGH",
  30172. "integrityImpact" : "HIGH",
  30173. "availabilityImpact" : "HIGH",
  30174. "baseScore" : 8.8,
  30175. "baseSeverity" : "HIGH"
  30176. },
  30177. "exploitabilityScore" : 2.8,
  30178. "impactScore" : 5.9
  30179. },
  30180. "baseMetricV2" : {
  30181. "cvssV2" : {
  30182. "version" : "2.0",
  30183. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  30184. "accessVector" : "NETWORK",
  30185. "accessComplexity" : "LOW",
  30186. "authentication" : "SINGLE",
  30187. "confidentialityImpact" : "PARTIAL",
  30188. "integrityImpact" : "PARTIAL",
  30189. "availabilityImpact" : "PARTIAL",
  30190. "baseScore" : 6.5
  30191. },
  30192. "severity" : "MEDIUM",
  30193. "exploitabilityScore" : 8.0,
  30194. "impactScore" : 6.4,
  30195. "acInsufInfo" : false,
  30196. "obtainAllPrivilege" : false,
  30197. "obtainUserPrivilege" : false,
  30198. "obtainOtherPrivilege" : false,
  30199. "userInteractionRequired" : false
  30200. }
  30201. },
  30202. "publishedDate" : "2021-04-29T11:15Z",
  30203. "lastModifiedDate" : "2021-05-03T21:12Z"
  30204. }, {
  30205. "cve" : {
  30206. "data_type" : "CVE",
  30207. "data_format" : "MITRE",
  30208. "data_version" : "4.0",
  30209. "CVE_data_meta" : {
  30210. "ID" : "CVE-2021-25163",
  30211. "ASSIGNER" : "security-alert@hpe.com"
  30212. },
  30213. "problemtype" : {
  30214. "problemtype_data" : [ {
  30215. "description" : [ {
  30216. "lang" : "en",
  30217. "value" : "CWE-611"
  30218. } ]
  30219. } ]
  30220. },
  30221. "references" : {
  30222. "reference_data" : [ {
  30223. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  30224. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  30225. "refsource" : "MISC",
  30226. "tags" : [ "Vendor Advisory" ]
  30227. } ]
  30228. },
  30229. "description" : {
  30230. "description_data" : [ {
  30231. "lang" : "en",
  30232. "value" : "A remote XML external entity vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability."
  30233. } ]
  30234. }
  30235. },
  30236. "configurations" : {
  30237. "CVE_data_version" : "4.0",
  30238. "nodes" : [ {
  30239. "operator" : "OR",
  30240. "children" : [ ],
  30241. "cpe_match" : [ {
  30242. "vulnerable" : true,
  30243. "cpe23Uri" : "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
  30244. "versionEndExcluding" : "8.2.12.1",
  30245. "cpe_name" : [ ]
  30246. } ]
  30247. } ]
  30248. },
  30249. "impact" : {
  30250. "baseMetricV3" : {
  30251. "cvssV3" : {
  30252. "version" : "3.1",
  30253. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
  30254. "attackVector" : "NETWORK",
  30255. "attackComplexity" : "LOW",
  30256. "privilegesRequired" : "LOW",
  30257. "userInteraction" : "NONE",
  30258. "scope" : "UNCHANGED",
  30259. "confidentialityImpact" : "HIGH",
  30260. "integrityImpact" : "NONE",
  30261. "availabilityImpact" : "HIGH",
  30262. "baseScore" : 8.1,
  30263. "baseSeverity" : "HIGH"
  30264. },
  30265. "exploitabilityScore" : 2.8,
  30266. "impactScore" : 5.2
  30267. },
  30268. "baseMetricV2" : {
  30269. "cvssV2" : {
  30270. "version" : "2.0",
  30271. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:P",
  30272. "accessVector" : "NETWORK",
  30273. "accessComplexity" : "LOW",
  30274. "authentication" : "SINGLE",
  30275. "confidentialityImpact" : "PARTIAL",
  30276. "integrityImpact" : "NONE",
  30277. "availabilityImpact" : "PARTIAL",
  30278. "baseScore" : 5.5
  30279. },
  30280. "severity" : "MEDIUM",
  30281. "exploitabilityScore" : 8.0,
  30282. "impactScore" : 4.9,
  30283. "acInsufInfo" : false,
  30284. "obtainAllPrivilege" : false,
  30285. "obtainUserPrivilege" : false,
  30286. "obtainOtherPrivilege" : false,
  30287. "userInteractionRequired" : false
  30288. }
  30289. },
  30290. "publishedDate" : "2021-04-29T11:15Z",
  30291. "lastModifiedDate" : "2021-05-03T23:02Z"
  30292. }, {
  30293. "cve" : {
  30294. "data_type" : "CVE",
  30295. "data_format" : "MITRE",
  30296. "data_version" : "4.0",
  30297. "CVE_data_meta" : {
  30298. "ID" : "CVE-2021-31879",
  30299. "ASSIGNER" : "cve@mitre.org"
  30300. },
  30301. "problemtype" : {
  30302. "problemtype_data" : [ {
  30303. "description" : [ {
  30304. "lang" : "en",
  30305. "value" : "CWE-601"
  30306. } ]
  30307. } ]
  30308. },
  30309. "references" : {
  30310. "reference_data" : [ {
  30311. "url" : "https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html",
  30312. "name" : "https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html",
  30313. "refsource" : "MISC",
  30314. "tags" : [ "Mailing List", "Vendor Advisory" ]
  30315. } ]
  30316. },
  30317. "description" : {
  30318. "description_data" : [ {
  30319. "lang" : "en",
  30320. "value" : "GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007."
  30321. } ]
  30322. }
  30323. },
  30324. "configurations" : {
  30325. "CVE_data_version" : "4.0",
  30326. "nodes" : [ {
  30327. "operator" : "OR",
  30328. "children" : [ ],
  30329. "cpe_match" : [ {
  30330. "vulnerable" : true,
  30331. "cpe23Uri" : "cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*",
  30332. "versionEndIncluding" : "1.21.1",
  30333. "cpe_name" : [ ]
  30334. } ]
  30335. } ]
  30336. },
  30337. "impact" : {
  30338. "baseMetricV3" : {
  30339. "cvssV3" : {
  30340. "version" : "3.1",
  30341. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  30342. "attackVector" : "NETWORK",
  30343. "attackComplexity" : "LOW",
  30344. "privilegesRequired" : "NONE",
  30345. "userInteraction" : "REQUIRED",
  30346. "scope" : "CHANGED",
  30347. "confidentialityImpact" : "LOW",
  30348. "integrityImpact" : "LOW",
  30349. "availabilityImpact" : "NONE",
  30350. "baseScore" : 6.1,
  30351. "baseSeverity" : "MEDIUM"
  30352. },
  30353. "exploitabilityScore" : 2.8,
  30354. "impactScore" : 2.7
  30355. },
  30356. "baseMetricV2" : {
  30357. "cvssV2" : {
  30358. "version" : "2.0",
  30359. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:N",
  30360. "accessVector" : "NETWORK",
  30361. "accessComplexity" : "MEDIUM",
  30362. "authentication" : "NONE",
  30363. "confidentialityImpact" : "PARTIAL",
  30364. "integrityImpact" : "PARTIAL",
  30365. "availabilityImpact" : "NONE",
  30366. "baseScore" : 5.8
  30367. },
  30368. "severity" : "MEDIUM",
  30369. "exploitabilityScore" : 8.6,
  30370. "impactScore" : 4.9,
  30371. "acInsufInfo" : false,
  30372. "obtainAllPrivilege" : false,
  30373. "obtainUserPrivilege" : false,
  30374. "obtainOtherPrivilege" : false,
  30375. "userInteractionRequired" : true
  30376. }
  30377. },
  30378. "publishedDate" : "2021-04-29T05:15Z",
  30379. "lastModifiedDate" : "2021-05-06T21:24Z"
  30380. }, {
  30381. "cve" : {
  30382. "data_type" : "CVE",
  30383. "data_format" : "MITRE",
  30384. "data_version" : "4.0",
  30385. "CVE_data_meta" : {
  30386. "ID" : "CVE-2021-25216",
  30387. "ASSIGNER" : "security-officer@isc.org"
  30388. },
  30389. "problemtype" : {
  30390. "problemtype_data" : [ {
  30391. "description" : [ ]
  30392. } ]
  30393. },
  30394. "references" : {
  30395. "reference_data" : [ {
  30396. "url" : "https://kb.isc.org/v1/docs/cve-2021-25215",
  30397. "name" : "https://kb.isc.org/v1/docs/cve-2021-25215",
  30398. "refsource" : "CONFIRM",
  30399. "tags" : [ ]
  30400. }, {
  30401. "url" : "http://www.openwall.com/lists/oss-security/2021/04/29/1",
  30402. "name" : "[oss-security] 20210428 ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)",
  30403. "refsource" : "MLIST",
  30404. "tags" : [ ]
  30405. }, {
  30406. "url" : "http://www.openwall.com/lists/oss-security/2021/04/29/2",
  30407. "name" : "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)",
  30408. "refsource" : "MLIST",
  30409. "tags" : [ ]
  30410. }, {
  30411. "url" : "http://www.openwall.com/lists/oss-security/2021/04/29/3",
  30412. "name" : "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)",
  30413. "refsource" : "MLIST",
  30414. "tags" : [ ]
  30415. }, {
  30416. "url" : "http://www.openwall.com/lists/oss-security/2021/04/29/4",
  30417. "name" : "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)",
  30418. "refsource" : "MLIST",
  30419. "tags" : [ ]
  30420. }, {
  30421. "url" : "https://www.debian.org/security/2021/dsa-4909",
  30422. "name" : "DSA-4909",
  30423. "refsource" : "DEBIAN",
  30424. "tags" : [ ]
  30425. }, {
  30426. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html",
  30427. "name" : "[debian-lts-announce] 20210504 [SECURITY] [DLA 2647-1] bind9 security update",
  30428. "refsource" : "MLIST",
  30429. "tags" : [ ]
  30430. } ]
  30431. },
  30432. "description" : {
  30433. "description_data" : [ {
  30434. "lang" : "en",
  30435. "value" : "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security."
  30436. } ]
  30437. }
  30438. },
  30439. "configurations" : {
  30440. "CVE_data_version" : "4.0",
  30441. "nodes" : [ ]
  30442. },
  30443. "impact" : { },
  30444. "publishedDate" : "2021-04-29T01:15Z",
  30445. "lastModifiedDate" : "2021-05-04T14:15Z"
  30446. }, {
  30447. "cve" : {
  30448. "data_type" : "CVE",
  30449. "data_format" : "MITRE",
  30450. "data_version" : "4.0",
  30451. "CVE_data_meta" : {
  30452. "ID" : "CVE-2021-25215",
  30453. "ASSIGNER" : "security-officer@isc.org"
  30454. },
  30455. "problemtype" : {
  30456. "problemtype_data" : [ {
  30457. "description" : [ {
  30458. "lang" : "en",
  30459. "value" : "CWE-617"
  30460. } ]
  30461. } ]
  30462. },
  30463. "references" : {
  30464. "reference_data" : [ {
  30465. "url" : "https://kb.isc.org/v1/docs/cve-2021-25215",
  30466. "name" : "https://kb.isc.org/v1/docs/cve-2021-25215",
  30467. "refsource" : "CONFIRM",
  30468. "tags" : [ "Vendor Advisory" ]
  30469. }, {
  30470. "url" : "http://www.openwall.com/lists/oss-security/2021/04/29/1",
  30471. "name" : "[oss-security] 20210428 ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)",
  30472. "refsource" : "MLIST",
  30473. "tags" : [ "Mailing List", "Third Party Advisory" ]
  30474. }, {
  30475. "url" : "http://www.openwall.com/lists/oss-security/2021/04/29/2",
  30476. "name" : "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)",
  30477. "refsource" : "MLIST",
  30478. "tags" : [ "Mailing List", "Third Party Advisory" ]
  30479. }, {
  30480. "url" : "http://www.openwall.com/lists/oss-security/2021/04/29/3",
  30481. "name" : "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)",
  30482. "refsource" : "MLIST",
  30483. "tags" : [ "Mailing List", "Third Party Advisory" ]
  30484. }, {
  30485. "url" : "http://www.openwall.com/lists/oss-security/2021/04/29/4",
  30486. "name" : "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)",
  30487. "refsource" : "MLIST",
  30488. "tags" : [ "Mailing List", "Third Party Advisory" ]
  30489. }, {
  30490. "url" : "https://www.debian.org/security/2021/dsa-4909",
  30491. "name" : "DSA-4909",
  30492. "refsource" : "DEBIAN",
  30493. "tags" : [ "Third Party Advisory" ]
  30494. }, {
  30495. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html",
  30496. "name" : "[debian-lts-announce] 20210504 [SECURITY] [DLA 2647-1] bind9 security update",
  30497. "refsource" : "MLIST",
  30498. "tags" : [ "Mailing List", "Third Party Advisory" ]
  30499. }, {
  30500. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/",
  30501. "name" : "FEDORA-2021-ace61cbee1",
  30502. "refsource" : "FEDORA",
  30503. "tags" : [ "Mailing List", "Third Party Advisory" ]
  30504. }, {
  30505. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/",
  30506. "name" : "FEDORA-2021-47f23870ec",
  30507. "refsource" : "FEDORA",
  30508. "tags" : [ ]
  30509. } ]
  30510. },
  30511. "description" : {
  30512. "description_data" : [ {
  30513. "lang" : "en",
  30514. "value" : "In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9."
  30515. } ]
  30516. }
  30517. },
  30518. "configurations" : {
  30519. "CVE_data_version" : "4.0",
  30520. "nodes" : [ {
  30521. "operator" : "OR",
  30522. "children" : [ ],
  30523. "cpe_match" : [ {
  30524. "vulnerable" : true,
  30525. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  30526. "cpe_name" : [ ]
  30527. }, {
  30528. "vulnerable" : true,
  30529. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  30530. "cpe_name" : [ ]
  30531. } ]
  30532. }, {
  30533. "operator" : "OR",
  30534. "children" : [ ],
  30535. "cpe_match" : [ {
  30536. "vulnerable" : true,
  30537. "cpe23Uri" : "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*",
  30538. "versionStartIncluding" : "9.0.0",
  30539. "versionEndExcluding" : "9.11.31",
  30540. "cpe_name" : [ ]
  30541. }, {
  30542. "vulnerable" : true,
  30543. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*",
  30544. "cpe_name" : [ ]
  30545. }, {
  30546. "vulnerable" : true,
  30547. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.9.12:s1:*:*:supported_preview:*:*:*",
  30548. "cpe_name" : [ ]
  30549. }, {
  30550. "vulnerable" : true,
  30551. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:*",
  30552. "cpe_name" : [ ]
  30553. }, {
  30554. "vulnerable" : true,
  30555. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*",
  30556. "cpe_name" : [ ]
  30557. }, {
  30558. "vulnerable" : true,
  30559. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:*",
  30560. "cpe_name" : [ ]
  30561. }, {
  30562. "vulnerable" : true,
  30563. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*",
  30564. "cpe_name" : [ ]
  30565. }, {
  30566. "vulnerable" : true,
  30567. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*",
  30568. "cpe_name" : [ ]
  30569. }, {
  30570. "vulnerable" : true,
  30571. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*",
  30572. "cpe_name" : [ ]
  30573. }, {
  30574. "vulnerable" : true,
  30575. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:*",
  30576. "cpe_name" : [ ]
  30577. }, {
  30578. "vulnerable" : true,
  30579. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*",
  30580. "cpe_name" : [ ]
  30581. }, {
  30582. "vulnerable" : true,
  30583. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*",
  30584. "cpe_name" : [ ]
  30585. }, {
  30586. "vulnerable" : true,
  30587. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*",
  30588. "cpe_name" : [ ]
  30589. }, {
  30590. "vulnerable" : true,
  30591. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:*",
  30592. "cpe_name" : [ ]
  30593. }, {
  30594. "vulnerable" : true,
  30595. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*",
  30596. "cpe_name" : [ ]
  30597. }, {
  30598. "vulnerable" : true,
  30599. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:*",
  30600. "cpe_name" : [ ]
  30601. }, {
  30602. "vulnerable" : true,
  30603. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:*",
  30604. "cpe_name" : [ ]
  30605. }, {
  30606. "vulnerable" : true,
  30607. "cpe23Uri" : "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*",
  30608. "versionStartIncluding" : "9.12.0",
  30609. "versionEndExcluding" : "9.16.15",
  30610. "cpe_name" : [ ]
  30611. }, {
  30612. "vulnerable" : true,
  30613. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*",
  30614. "cpe_name" : [ ]
  30615. }, {
  30616. "vulnerable" : true,
  30617. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*",
  30618. "cpe_name" : [ ]
  30619. }, {
  30620. "vulnerable" : true,
  30621. "cpe23Uri" : "cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*",
  30622. "cpe_name" : [ ]
  30623. }, {
  30624. "vulnerable" : true,
  30625. "cpe23Uri" : "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*",
  30626. "versionStartIncluding" : "9.17.0",
  30627. "versionEndExcluding" : "9.17.12",
  30628. "cpe_name" : [ ]
  30629. } ]
  30630. }, {
  30631. "operator" : "OR",
  30632. "children" : [ ],
  30633. "cpe_match" : [ {
  30634. "vulnerable" : true,
  30635. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  30636. "cpe_name" : [ ]
  30637. } ]
  30638. } ]
  30639. },
  30640. "impact" : {
  30641. "baseMetricV3" : {
  30642. "cvssV3" : {
  30643. "version" : "3.1",
  30644. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  30645. "attackVector" : "NETWORK",
  30646. "attackComplexity" : "LOW",
  30647. "privilegesRequired" : "NONE",
  30648. "userInteraction" : "NONE",
  30649. "scope" : "UNCHANGED",
  30650. "confidentialityImpact" : "NONE",
  30651. "integrityImpact" : "NONE",
  30652. "availabilityImpact" : "HIGH",
  30653. "baseScore" : 7.5,
  30654. "baseSeverity" : "HIGH"
  30655. },
  30656. "exploitabilityScore" : 3.9,
  30657. "impactScore" : 3.6
  30658. },
  30659. "baseMetricV2" : {
  30660. "cvssV2" : {
  30661. "version" : "2.0",
  30662. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  30663. "accessVector" : "NETWORK",
  30664. "accessComplexity" : "LOW",
  30665. "authentication" : "NONE",
  30666. "confidentialityImpact" : "NONE",
  30667. "integrityImpact" : "NONE",
  30668. "availabilityImpact" : "PARTIAL",
  30669. "baseScore" : 5.0
  30670. },
  30671. "severity" : "MEDIUM",
  30672. "exploitabilityScore" : 10.0,
  30673. "impactScore" : 2.9,
  30674. "acInsufInfo" : false,
  30675. "obtainAllPrivilege" : false,
  30676. "obtainUserPrivilege" : false,
  30677. "obtainOtherPrivilege" : false,
  30678. "userInteractionRequired" : false
  30679. }
  30680. },
  30681. "publishedDate" : "2021-04-29T01:15Z",
  30682. "lastModifiedDate" : "2021-05-09T03:15Z"
  30683. }, {
  30684. "cve" : {
  30685. "data_type" : "CVE",
  30686. "data_format" : "MITRE",
  30687. "data_version" : "4.0",
  30688. "CVE_data_meta" : {
  30689. "ID" : "CVE-2021-25214",
  30690. "ASSIGNER" : "security-officer@isc.org"
  30691. },
  30692. "problemtype" : {
  30693. "problemtype_data" : [ {
  30694. "description" : [ ]
  30695. } ]
  30696. },
  30697. "references" : {
  30698. "reference_data" : [ {
  30699. "url" : "https://kb.isc.org/v1/docs/cve-2021-25214",
  30700. "name" : "https://kb.isc.org/v1/docs/cve-2021-25214",
  30701. "refsource" : "CONFIRM",
  30702. "tags" : [ ]
  30703. }, {
  30704. "url" : "http://www.openwall.com/lists/oss-security/2021/04/29/1",
  30705. "name" : "[oss-security] 20210428 ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)",
  30706. "refsource" : "MLIST",
  30707. "tags" : [ ]
  30708. }, {
  30709. "url" : "http://www.openwall.com/lists/oss-security/2021/04/29/2",
  30710. "name" : "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)",
  30711. "refsource" : "MLIST",
  30712. "tags" : [ ]
  30713. }, {
  30714. "url" : "http://www.openwall.com/lists/oss-security/2021/04/29/3",
  30715. "name" : "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)",
  30716. "refsource" : "MLIST",
  30717. "tags" : [ ]
  30718. }, {
  30719. "url" : "http://www.openwall.com/lists/oss-security/2021/04/29/4",
  30720. "name" : "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)",
  30721. "refsource" : "MLIST",
  30722. "tags" : [ ]
  30723. }, {
  30724. "url" : "https://www.debian.org/security/2021/dsa-4909",
  30725. "name" : "DSA-4909",
  30726. "refsource" : "DEBIAN",
  30727. "tags" : [ ]
  30728. }, {
  30729. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html",
  30730. "name" : "[debian-lts-announce] 20210504 [SECURITY] [DLA 2647-1] bind9 security update",
  30731. "refsource" : "MLIST",
  30732. "tags" : [ ]
  30733. }, {
  30734. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/",
  30735. "name" : "FEDORA-2021-ace61cbee1",
  30736. "refsource" : "FEDORA",
  30737. "tags" : [ ]
  30738. }, {
  30739. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/",
  30740. "name" : "FEDORA-2021-47f23870ec",
  30741. "refsource" : "FEDORA",
  30742. "tags" : [ ]
  30743. } ]
  30744. },
  30745. "description" : {
  30746. "description_data" : [ {
  30747. "lang" : "en",
  30748. "value" : "In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed."
  30749. } ]
  30750. }
  30751. },
  30752. "configurations" : {
  30753. "CVE_data_version" : "4.0",
  30754. "nodes" : [ ]
  30755. },
  30756. "impact" : { },
  30757. "publishedDate" : "2021-04-29T01:15Z",
  30758. "lastModifiedDate" : "2021-05-09T03:15Z"
  30759. }, {
  30760. "cve" : {
  30761. "data_type" : "CVE",
  30762. "data_format" : "MITRE",
  30763. "data_version" : "4.0",
  30764. "CVE_data_meta" : {
  30765. "ID" : "CVE-2021-21414",
  30766. "ASSIGNER" : "security-advisories@github.com"
  30767. },
  30768. "problemtype" : {
  30769. "problemtype_data" : [ {
  30770. "description" : [ {
  30771. "lang" : "en",
  30772. "value" : "CWE-78"
  30773. } ]
  30774. } ]
  30775. },
  30776. "references" : {
  30777. "reference_data" : [ {
  30778. "url" : "https://github.com/prisma/prisma/pull/6245",
  30779. "name" : "https://github.com/prisma/prisma/pull/6245",
  30780. "refsource" : "MISC",
  30781. "tags" : [ "Patch", "Third Party Advisory" ]
  30782. }, {
  30783. "url" : "https://github.com/prisma/prisma/security/advisories/GHSA-pxcc-hj8w-fmm7",
  30784. "name" : "https://github.com/prisma/prisma/security/advisories/GHSA-pxcc-hj8w-fmm7",
  30785. "refsource" : "CONFIRM",
  30786. "tags" : [ "Third Party Advisory" ]
  30787. } ]
  30788. },
  30789. "description" : {
  30790. "description_data" : [ {
  30791. "lang" : "en",
  30792. "value" : "Prisma is an open source ORM for Node.js & TypeScript. As of today, we are not aware of any Prisma users or external consumers of the `@prisma/sdk` package who are affected by this security vulnerability. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. It only affects the `getPackedPackage` function and this function is not advertised and only used for tests & building our CLI, no malicious code was found after checking our codebase."
  30793. } ]
  30794. }
  30795. },
  30796. "configurations" : {
  30797. "CVE_data_version" : "4.0",
  30798. "nodes" : [ {
  30799. "operator" : "OR",
  30800. "children" : [ ],
  30801. "cpe_match" : [ {
  30802. "vulnerable" : true,
  30803. "cpe23Uri" : "cpe:2.3:a:prisma:prisma:*:*:*:*:*:node.js:*:*",
  30804. "versionEndExcluding" : "2.20.0",
  30805. "cpe_name" : [ ]
  30806. } ]
  30807. } ]
  30808. },
  30809. "impact" : {
  30810. "baseMetricV3" : {
  30811. "cvssV3" : {
  30812. "version" : "3.1",
  30813. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  30814. "attackVector" : "NETWORK",
  30815. "attackComplexity" : "LOW",
  30816. "privilegesRequired" : "HIGH",
  30817. "userInteraction" : "NONE",
  30818. "scope" : "UNCHANGED",
  30819. "confidentialityImpact" : "HIGH",
  30820. "integrityImpact" : "HIGH",
  30821. "availabilityImpact" : "HIGH",
  30822. "baseScore" : 7.2,
  30823. "baseSeverity" : "HIGH"
  30824. },
  30825. "exploitabilityScore" : 1.2,
  30826. "impactScore" : 5.9
  30827. },
  30828. "baseMetricV2" : {
  30829. "cvssV2" : {
  30830. "version" : "2.0",
  30831. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  30832. "accessVector" : "NETWORK",
  30833. "accessComplexity" : "LOW",
  30834. "authentication" : "SINGLE",
  30835. "confidentialityImpact" : "PARTIAL",
  30836. "integrityImpact" : "PARTIAL",
  30837. "availabilityImpact" : "PARTIAL",
  30838. "baseScore" : 6.5
  30839. },
  30840. "severity" : "MEDIUM",
  30841. "exploitabilityScore" : 8.0,
  30842. "impactScore" : 6.4,
  30843. "acInsufInfo" : false,
  30844. "obtainAllPrivilege" : false,
  30845. "obtainUserPrivilege" : false,
  30846. "obtainOtherPrivilege" : false,
  30847. "userInteractionRequired" : false
  30848. }
  30849. },
  30850. "publishedDate" : "2021-04-29T01:15Z",
  30851. "lastModifiedDate" : "2021-05-08T03:54Z"
  30852. }, {
  30853. "cve" : {
  30854. "data_type" : "CVE",
  30855. "data_format" : "MITRE",
  30856. "data_version" : "4.0",
  30857. "CVE_data_meta" : {
  30858. "ID" : "CVE-2021-2321",
  30859. "ASSIGNER" : "secalert_us@oracle.com"
  30860. },
  30861. "problemtype" : {
  30862. "problemtype_data" : [ {
  30863. "description" : [ {
  30864. "lang" : "en",
  30865. "value" : "CWE-125"
  30866. } ]
  30867. } ]
  30868. },
  30869. "references" : {
  30870. "reference_data" : [ {
  30871. "url" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  30872. "name" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  30873. "refsource" : "MISC",
  30874. "tags" : [ "Patch", "Vendor Advisory" ]
  30875. } ]
  30876. },
  30877. "description" : {
  30878. "description_data" : [ {
  30879. "lang" : "en",
  30880. "value" : "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)."
  30881. } ]
  30882. }
  30883. },
  30884. "configurations" : {
  30885. "CVE_data_version" : "4.0",
  30886. "nodes" : [ {
  30887. "operator" : "OR",
  30888. "children" : [ ],
  30889. "cpe_match" : [ {
  30890. "vulnerable" : true,
  30891. "cpe23Uri" : "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
  30892. "versionEndExcluding" : "6.1.20",
  30893. "cpe_name" : [ ]
  30894. } ]
  30895. } ]
  30896. },
  30897. "impact" : {
  30898. "baseMetricV3" : {
  30899. "cvssV3" : {
  30900. "version" : "3.1",
  30901. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
  30902. "attackVector" : "LOCAL",
  30903. "attackComplexity" : "LOW",
  30904. "privilegesRequired" : "HIGH",
  30905. "userInteraction" : "NONE",
  30906. "scope" : "CHANGED",
  30907. "confidentialityImpact" : "HIGH",
  30908. "integrityImpact" : "NONE",
  30909. "availabilityImpact" : "NONE",
  30910. "baseScore" : 6.0,
  30911. "baseSeverity" : "MEDIUM"
  30912. },
  30913. "exploitabilityScore" : 1.5,
  30914. "impactScore" : 4.0
  30915. },
  30916. "baseMetricV2" : {
  30917. "cvssV2" : {
  30918. "version" : "2.0",
  30919. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  30920. "accessVector" : "LOCAL",
  30921. "accessComplexity" : "LOW",
  30922. "authentication" : "NONE",
  30923. "confidentialityImpact" : "PARTIAL",
  30924. "integrityImpact" : "NONE",
  30925. "availabilityImpact" : "NONE",
  30926. "baseScore" : 2.1
  30927. },
  30928. "severity" : "LOW",
  30929. "exploitabilityScore" : 3.9,
  30930. "impactScore" : 2.9,
  30931. "acInsufInfo" : false,
  30932. "obtainAllPrivilege" : false,
  30933. "obtainUserPrivilege" : false,
  30934. "obtainOtherPrivilege" : false,
  30935. "userInteractionRequired" : false
  30936. }
  30937. },
  30938. "publishedDate" : "2021-04-28T22:15Z",
  30939. "lastModifiedDate" : "2021-05-07T15:55Z"
  30940. }, {
  30941. "cve" : {
  30942. "data_type" : "CVE",
  30943. "data_format" : "MITRE",
  30944. "data_version" : "4.0",
  30945. "CVE_data_meta" : {
  30946. "ID" : "CVE-2021-29483",
  30947. "ASSIGNER" : "security-advisories@github.com"
  30948. },
  30949. "problemtype" : {
  30950. "problemtype_data" : [ {
  30951. "description" : [ {
  30952. "lang" : "en",
  30953. "value" : "CWE-200"
  30954. } ]
  30955. } ]
  30956. },
  30957. "references" : {
  30958. "reference_data" : [ {
  30959. "url" : "https://github.com/miraheze/ManageWiki/security/advisories/GHSA-jmc9-rv2f-g8vv",
  30960. "name" : "https://github.com/miraheze/ManageWiki/security/advisories/GHSA-jmc9-rv2f-g8vv",
  30961. "refsource" : "CONFIRM",
  30962. "tags" : [ "Mitigation", "Patch", "Third Party Advisory" ]
  30963. }, {
  30964. "url" : "https://phabricator.miraheze.org/T7213",
  30965. "name" : "https://phabricator.miraheze.org/T7213",
  30966. "refsource" : "MISC",
  30967. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  30968. }, {
  30969. "url" : "https://github.com/miraheze/ManageWiki/commit/befb83c66f5b643e174897ea41a8a46679b26304",
  30970. "name" : "https://github.com/miraheze/ManageWiki/commit/befb83c66f5b643e174897ea41a8a46679b26304",
  30971. "refsource" : "MISC",
  30972. "tags" : [ "Patch", "Third Party Advisory" ]
  30973. } ]
  30974. },
  30975. "description" : {
  30976. "description_data" : [ {
  30977. "lang" : "en",
  30978. "value" : "ManageWiki is an extension to the MediaWiki project. The 'wikiconfig' API leaked the value of private configuration variables set through the ManageWiki variable to all users. This has been patched by https://github.com/miraheze/ManageWiki/compare/99f3b2c8af18...befb83c66f5b.patch. If you are unable to patch set `$wgAPIListModules['wikiconfig'] = 'ApiQueryDisabled';` or remove private config as a workaround."
  30979. } ]
  30980. }
  30981. },
  30982. "configurations" : {
  30983. "CVE_data_version" : "4.0",
  30984. "nodes" : [ {
  30985. "operator" : "OR",
  30986. "children" : [ ],
  30987. "cpe_match" : [ {
  30988. "vulnerable" : true,
  30989. "cpe23Uri" : "cpe:2.3:a:miraheze:managewiki:*:*:*:*:*:*:*:*",
  30990. "versionEndExcluding" : "2021-04-28",
  30991. "cpe_name" : [ ]
  30992. } ]
  30993. } ]
  30994. },
  30995. "impact" : {
  30996. "baseMetricV3" : {
  30997. "cvssV3" : {
  30998. "version" : "3.1",
  30999. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  31000. "attackVector" : "NETWORK",
  31001. "attackComplexity" : "LOW",
  31002. "privilegesRequired" : "NONE",
  31003. "userInteraction" : "NONE",
  31004. "scope" : "UNCHANGED",
  31005. "confidentialityImpact" : "HIGH",
  31006. "integrityImpact" : "NONE",
  31007. "availabilityImpact" : "NONE",
  31008. "baseScore" : 7.5,
  31009. "baseSeverity" : "HIGH"
  31010. },
  31011. "exploitabilityScore" : 3.9,
  31012. "impactScore" : 3.6
  31013. },
  31014. "baseMetricV2" : {
  31015. "cvssV2" : {
  31016. "version" : "2.0",
  31017. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  31018. "accessVector" : "NETWORK",
  31019. "accessComplexity" : "LOW",
  31020. "authentication" : "NONE",
  31021. "confidentialityImpact" : "PARTIAL",
  31022. "integrityImpact" : "NONE",
  31023. "availabilityImpact" : "NONE",
  31024. "baseScore" : 5.0
  31025. },
  31026. "severity" : "MEDIUM",
  31027. "exploitabilityScore" : 10.0,
  31028. "impactScore" : 2.9,
  31029. "acInsufInfo" : false,
  31030. "obtainAllPrivilege" : false,
  31031. "obtainUserPrivilege" : false,
  31032. "obtainOtherPrivilege" : false,
  31033. "userInteractionRequired" : false
  31034. }
  31035. },
  31036. "publishedDate" : "2021-04-28T22:15Z",
  31037. "lastModifiedDate" : "2021-05-08T02:26Z"
  31038. }, {
  31039. "cve" : {
  31040. "data_type" : "CVE",
  31041. "data_format" : "MITRE",
  31042. "data_version" : "4.0",
  31043. "CVE_data_meta" : {
  31044. "ID" : "CVE-2020-7038",
  31045. "ASSIGNER" : "securityalerts@avaya.com"
  31046. },
  31047. "problemtype" : {
  31048. "problemtype_data" : [ {
  31049. "description" : [ {
  31050. "lang" : "en",
  31051. "value" : "CWE-863"
  31052. } ]
  31053. } ]
  31054. },
  31055. "references" : {
  31056. "reference_data" : [ {
  31057. "url" : "https://support.avaya.com/css/P8/documents/101075574",
  31058. "name" : "https://support.avaya.com/css/P8/documents/101075574",
  31059. "refsource" : "CONFIRM",
  31060. "tags" : [ "Vendor Advisory" ]
  31061. } ]
  31062. },
  31063. "description" : {
  31064. "description_data" : [ {
  31065. "lang" : "en",
  31066. "value" : "A vulnerability was discovered in Management component of Avaya Equinox Conferencing that could potentially allow an unauthenticated, remote attacker to gain access to screen sharing and whiteboard sessions. The affected versions of Management component of Avaya Equinox Conferencing include all 3.x versions before 3.17. Avaya Equinox Conferencing is now offered as Avaya Meetings Server."
  31067. } ]
  31068. }
  31069. },
  31070. "configurations" : {
  31071. "CVE_data_version" : "4.0",
  31072. "nodes" : [ {
  31073. "operator" : "OR",
  31074. "children" : [ ],
  31075. "cpe_match" : [ {
  31076. "vulnerable" : true,
  31077. "cpe23Uri" : "cpe:2.3:a:avaya:equinox_conferencing:*:*:*:*:*:*:*:*",
  31078. "versionStartIncluding" : "9.0.0",
  31079. "versionEndExcluding" : "9.1.11",
  31080. "cpe_name" : [ ]
  31081. } ]
  31082. } ]
  31083. },
  31084. "impact" : {
  31085. "baseMetricV3" : {
  31086. "cvssV3" : {
  31087. "version" : "3.1",
  31088. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  31089. "attackVector" : "NETWORK",
  31090. "attackComplexity" : "LOW",
  31091. "privilegesRequired" : "NONE",
  31092. "userInteraction" : "NONE",
  31093. "scope" : "UNCHANGED",
  31094. "confidentialityImpact" : "HIGH",
  31095. "integrityImpact" : "NONE",
  31096. "availabilityImpact" : "NONE",
  31097. "baseScore" : 7.5,
  31098. "baseSeverity" : "HIGH"
  31099. },
  31100. "exploitabilityScore" : 3.9,
  31101. "impactScore" : 3.6
  31102. },
  31103. "baseMetricV2" : {
  31104. "cvssV2" : {
  31105. "version" : "2.0",
  31106. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  31107. "accessVector" : "NETWORK",
  31108. "accessComplexity" : "LOW",
  31109. "authentication" : "NONE",
  31110. "confidentialityImpact" : "PARTIAL",
  31111. "integrityImpact" : "NONE",
  31112. "availabilityImpact" : "NONE",
  31113. "baseScore" : 5.0
  31114. },
  31115. "severity" : "MEDIUM",
  31116. "exploitabilityScore" : 10.0,
  31117. "impactScore" : 2.9,
  31118. "acInsufInfo" : false,
  31119. "obtainAllPrivilege" : false,
  31120. "obtainUserPrivilege" : false,
  31121. "obtainOtherPrivilege" : false,
  31122. "userInteractionRequired" : false
  31123. }
  31124. },
  31125. "publishedDate" : "2021-04-28T22:15Z",
  31126. "lastModifiedDate" : "2021-05-08T02:19Z"
  31127. }, {
  31128. "cve" : {
  31129. "data_type" : "CVE",
  31130. "data_format" : "MITRE",
  31131. "data_version" : "4.0",
  31132. "CVE_data_meta" : {
  31133. "ID" : "CVE-2020-7037",
  31134. "ASSIGNER" : "securityalerts@avaya.com"
  31135. },
  31136. "problemtype" : {
  31137. "problemtype_data" : [ {
  31138. "description" : [ {
  31139. "lang" : "en",
  31140. "value" : "CWE-611"
  31141. } ]
  31142. } ]
  31143. },
  31144. "references" : {
  31145. "reference_data" : [ {
  31146. "url" : "https://support.avaya.com/css/P8/documents/101075574",
  31147. "name" : "https://support.avaya.com/css/P8/documents/101075574",
  31148. "refsource" : "CONFIRM",
  31149. "tags" : [ "Vendor Advisory" ]
  31150. } ]
  31151. },
  31152. "description" : {
  31153. "description_data" : [ {
  31154. "lang" : "en",
  31155. "value" : "An XML External Entities (XXE) vulnerability in Media Server component of Avaya Equinox Conferencing could allow an authenticated, remote attacker to gain read access to information that is stored on an affected system or even potentially lead to a denial of service. The affected versions of Avaya Equinox Conferencing includes all 9.x versions before 9.1.11. Equinox Conferencing is now offered as Avaya Meetings Server."
  31156. } ]
  31157. }
  31158. },
  31159. "configurations" : {
  31160. "CVE_data_version" : "4.0",
  31161. "nodes" : [ {
  31162. "operator" : "OR",
  31163. "children" : [ ],
  31164. "cpe_match" : [ {
  31165. "vulnerable" : true,
  31166. "cpe23Uri" : "cpe:2.3:a:avaya:equinox_conferencing:*:*:*:*:*:*:*:*",
  31167. "versionStartIncluding" : "9.0.0",
  31168. "versionEndExcluding" : "9.1.11",
  31169. "cpe_name" : [ ]
  31170. } ]
  31171. } ]
  31172. },
  31173. "impact" : {
  31174. "baseMetricV3" : {
  31175. "cvssV3" : {
  31176. "version" : "3.1",
  31177. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
  31178. "attackVector" : "NETWORK",
  31179. "attackComplexity" : "LOW",
  31180. "privilegesRequired" : "LOW",
  31181. "userInteraction" : "NONE",
  31182. "scope" : "UNCHANGED",
  31183. "confidentialityImpact" : "HIGH",
  31184. "integrityImpact" : "NONE",
  31185. "availabilityImpact" : "HIGH",
  31186. "baseScore" : 8.1,
  31187. "baseSeverity" : "HIGH"
  31188. },
  31189. "exploitabilityScore" : 2.8,
  31190. "impactScore" : 5.2
  31191. },
  31192. "baseMetricV2" : {
  31193. "cvssV2" : {
  31194. "version" : "2.0",
  31195. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:P",
  31196. "accessVector" : "NETWORK",
  31197. "accessComplexity" : "LOW",
  31198. "authentication" : "SINGLE",
  31199. "confidentialityImpact" : "PARTIAL",
  31200. "integrityImpact" : "NONE",
  31201. "availabilityImpact" : "PARTIAL",
  31202. "baseScore" : 5.5
  31203. },
  31204. "severity" : "MEDIUM",
  31205. "exploitabilityScore" : 8.0,
  31206. "impactScore" : 4.9,
  31207. "acInsufInfo" : false,
  31208. "obtainAllPrivilege" : false,
  31209. "obtainUserPrivilege" : false,
  31210. "obtainOtherPrivilege" : false,
  31211. "userInteractionRequired" : false
  31212. }
  31213. },
  31214. "publishedDate" : "2021-04-28T22:15Z",
  31215. "lastModifiedDate" : "2021-05-07T01:22Z"
  31216. }, {
  31217. "cve" : {
  31218. "data_type" : "CVE",
  31219. "data_format" : "MITRE",
  31220. "data_version" : "4.0",
  31221. "CVE_data_meta" : {
  31222. "ID" : "CVE-2020-22790",
  31223. "ASSIGNER" : "cve@mitre.org"
  31224. },
  31225. "problemtype" : {
  31226. "problemtype_data" : [ {
  31227. "description" : [ {
  31228. "lang" : "en",
  31229. "value" : "CWE-79"
  31230. } ]
  31231. } ]
  31232. },
  31233. "references" : {
  31234. "reference_data" : [ {
  31235. "url" : "https://mexicanpentester.com/2020/04/09/vulnerabilities-in-fme-server-versions-2019-2-and-2020-0-beta-and-probably-previous-versions/",
  31236. "name" : "https://mexicanpentester.com/2020/04/09/vulnerabilities-in-fme-server-versions-2019-2-and-2020-0-beta-and-probably-previous-versions/",
  31237. "refsource" : "MISC",
  31238. "tags" : [ "Exploit", "Third Party Advisory" ]
  31239. } ]
  31240. },
  31241. "description" : {
  31242. "description_data" : [ {
  31243. "lang" : "en",
  31244. "value" : "Authenticated Stored XSS in FME Server versions 2019.2 and 2020.0 Beta allows a remote attacker to execute codeby injecting arbitrary web script or HTML via modifying the name of the users. The XSS is executed when an administrator access the logs."
  31245. } ]
  31246. }
  31247. },
  31248. "configurations" : {
  31249. "CVE_data_version" : "4.0",
  31250. "nodes" : [ {
  31251. "operator" : "OR",
  31252. "children" : [ ],
  31253. "cpe_match" : [ {
  31254. "vulnerable" : true,
  31255. "cpe23Uri" : "cpe:2.3:a:safe:fme_server:2019.2:*:*:*:*:*:*:*",
  31256. "cpe_name" : [ ]
  31257. }, {
  31258. "vulnerable" : true,
  31259. "cpe23Uri" : "cpe:2.3:a:safe:fme_server:2020.0:beta:*:*:*:*:*:*",
  31260. "cpe_name" : [ ]
  31261. } ]
  31262. } ]
  31263. },
  31264. "impact" : {
  31265. "baseMetricV3" : {
  31266. "cvssV3" : {
  31267. "version" : "3.1",
  31268. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  31269. "attackVector" : "NETWORK",
  31270. "attackComplexity" : "LOW",
  31271. "privilegesRequired" : "LOW",
  31272. "userInteraction" : "REQUIRED",
  31273. "scope" : "CHANGED",
  31274. "confidentialityImpact" : "LOW",
  31275. "integrityImpact" : "LOW",
  31276. "availabilityImpact" : "NONE",
  31277. "baseScore" : 5.4,
  31278. "baseSeverity" : "MEDIUM"
  31279. },
  31280. "exploitabilityScore" : 2.3,
  31281. "impactScore" : 2.7
  31282. },
  31283. "baseMetricV2" : {
  31284. "cvssV2" : {
  31285. "version" : "2.0",
  31286. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  31287. "accessVector" : "NETWORK",
  31288. "accessComplexity" : "MEDIUM",
  31289. "authentication" : "SINGLE",
  31290. "confidentialityImpact" : "NONE",
  31291. "integrityImpact" : "PARTIAL",
  31292. "availabilityImpact" : "NONE",
  31293. "baseScore" : 3.5
  31294. },
  31295. "severity" : "LOW",
  31296. "exploitabilityScore" : 6.8,
  31297. "impactScore" : 2.9,
  31298. "acInsufInfo" : false,
  31299. "obtainAllPrivilege" : false,
  31300. "obtainUserPrivilege" : false,
  31301. "obtainOtherPrivilege" : false,
  31302. "userInteractionRequired" : true
  31303. }
  31304. },
  31305. "publishedDate" : "2021-04-28T21:15Z",
  31306. "lastModifiedDate" : "2021-05-07T02:54Z"
  31307. }, {
  31308. "cve" : {
  31309. "data_type" : "CVE",
  31310. "data_format" : "MITRE",
  31311. "data_version" : "4.0",
  31312. "CVE_data_meta" : {
  31313. "ID" : "CVE-2020-22789",
  31314. "ASSIGNER" : "cve@mitre.org"
  31315. },
  31316. "problemtype" : {
  31317. "problemtype_data" : [ {
  31318. "description" : [ {
  31319. "lang" : "en",
  31320. "value" : "CWE-79"
  31321. } ]
  31322. } ]
  31323. },
  31324. "references" : {
  31325. "reference_data" : [ {
  31326. "url" : "https://mexicanpentester.com/2020/04/09/vulnerabilities-in-fme-server-versions-2019-2-and-2020-0-beta-and-probably-previous-versions/",
  31327. "name" : "https://mexicanpentester.com/2020/04/09/vulnerabilities-in-fme-server-versions-2019-2-and-2020-0-beta-and-probably-previous-versions/",
  31328. "refsource" : "MISC",
  31329. "tags" : [ "Exploit", "Vendor Advisory" ]
  31330. } ]
  31331. },
  31332. "description" : {
  31333. "description_data" : [ {
  31334. "lang" : "en",
  31335. "value" : "Unauthenticated Stored XSS in FME Server versions 2019.2 and 2020.0 Beta allows a remote attacker to gain admin privileges by injecting arbitrary web script or HTML via the login page. The XSS is executed when an administrator accesses the logs."
  31336. } ]
  31337. }
  31338. },
  31339. "configurations" : {
  31340. "CVE_data_version" : "4.0",
  31341. "nodes" : [ {
  31342. "operator" : "OR",
  31343. "children" : [ ],
  31344. "cpe_match" : [ {
  31345. "vulnerable" : true,
  31346. "cpe23Uri" : "cpe:2.3:a:safe:fme_server:2019.2:*:*:*:*:*:*:*",
  31347. "cpe_name" : [ ]
  31348. }, {
  31349. "vulnerable" : true,
  31350. "cpe23Uri" : "cpe:2.3:a:safe:fme_server:2020.0:beta:*:*:*:*:*:*",
  31351. "cpe_name" : [ ]
  31352. } ]
  31353. } ]
  31354. },
  31355. "impact" : {
  31356. "baseMetricV3" : {
  31357. "cvssV3" : {
  31358. "version" : "3.1",
  31359. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  31360. "attackVector" : "NETWORK",
  31361. "attackComplexity" : "LOW",
  31362. "privilegesRequired" : "NONE",
  31363. "userInteraction" : "REQUIRED",
  31364. "scope" : "CHANGED",
  31365. "confidentialityImpact" : "LOW",
  31366. "integrityImpact" : "LOW",
  31367. "availabilityImpact" : "NONE",
  31368. "baseScore" : 6.1,
  31369. "baseSeverity" : "MEDIUM"
  31370. },
  31371. "exploitabilityScore" : 2.8,
  31372. "impactScore" : 2.7
  31373. },
  31374. "baseMetricV2" : {
  31375. "cvssV2" : {
  31376. "version" : "2.0",
  31377. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  31378. "accessVector" : "NETWORK",
  31379. "accessComplexity" : "MEDIUM",
  31380. "authentication" : "NONE",
  31381. "confidentialityImpact" : "NONE",
  31382. "integrityImpact" : "PARTIAL",
  31383. "availabilityImpact" : "NONE",
  31384. "baseScore" : 4.3
  31385. },
  31386. "severity" : "MEDIUM",
  31387. "exploitabilityScore" : 8.6,
  31388. "impactScore" : 2.9,
  31389. "acInsufInfo" : false,
  31390. "obtainAllPrivilege" : false,
  31391. "obtainUserPrivilege" : false,
  31392. "obtainOtherPrivilege" : false,
  31393. "userInteractionRequired" : true
  31394. }
  31395. },
  31396. "publishedDate" : "2021-04-28T21:15Z",
  31397. "lastModifiedDate" : "2021-05-07T02:52Z"
  31398. }, {
  31399. "cve" : {
  31400. "data_type" : "CVE",
  31401. "data_format" : "MITRE",
  31402. "data_version" : "4.0",
  31403. "CVE_data_meta" : {
  31404. "ID" : "CVE-2020-22785",
  31405. "ASSIGNER" : "cve@mitre.org"
  31406. },
  31407. "problemtype" : {
  31408. "problemtype_data" : [ {
  31409. "description" : [ {
  31410. "lang" : "en",
  31411. "value" : "CWE-770"
  31412. } ]
  31413. } ]
  31414. },
  31415. "references" : {
  31416. "reference_data" : [ {
  31417. "url" : "https://github.com/ether/etherpad-lite/pull/3833",
  31418. "name" : "https://github.com/ether/etherpad-lite/pull/3833",
  31419. "refsource" : "CONFIRM",
  31420. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  31421. } ]
  31422. },
  31423. "description" : {
  31424. "description_data" : [ {
  31425. "lang" : "en",
  31426. "value" : "Etherpad < 1.8.3 is affected by a missing lock check which could cause a denial of service. Aggressively targeting random pad import endpoints with empty data would flatten all pads due to lack of rate limiting and missing ownership check."
  31427. } ]
  31428. }
  31429. },
  31430. "configurations" : {
  31431. "CVE_data_version" : "4.0",
  31432. "nodes" : [ {
  31433. "operator" : "OR",
  31434. "children" : [ ],
  31435. "cpe_match" : [ {
  31436. "vulnerable" : true,
  31437. "cpe23Uri" : "cpe:2.3:a:etherpad:etherpad:*:*:*:*:*:*:*:*",
  31438. "versionEndExcluding" : "1.8.3",
  31439. "cpe_name" : [ ]
  31440. } ]
  31441. } ]
  31442. },
  31443. "impact" : {
  31444. "baseMetricV3" : {
  31445. "cvssV3" : {
  31446. "version" : "3.1",
  31447. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  31448. "attackVector" : "NETWORK",
  31449. "attackComplexity" : "LOW",
  31450. "privilegesRequired" : "NONE",
  31451. "userInteraction" : "NONE",
  31452. "scope" : "UNCHANGED",
  31453. "confidentialityImpact" : "NONE",
  31454. "integrityImpact" : "NONE",
  31455. "availabilityImpact" : "HIGH",
  31456. "baseScore" : 7.5,
  31457. "baseSeverity" : "HIGH"
  31458. },
  31459. "exploitabilityScore" : 3.9,
  31460. "impactScore" : 3.6
  31461. },
  31462. "baseMetricV2" : {
  31463. "cvssV2" : {
  31464. "version" : "2.0",
  31465. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  31466. "accessVector" : "NETWORK",
  31467. "accessComplexity" : "LOW",
  31468. "authentication" : "NONE",
  31469. "confidentialityImpact" : "NONE",
  31470. "integrityImpact" : "NONE",
  31471. "availabilityImpact" : "PARTIAL",
  31472. "baseScore" : 5.0
  31473. },
  31474. "severity" : "MEDIUM",
  31475. "exploitabilityScore" : 10.0,
  31476. "impactScore" : 2.9,
  31477. "acInsufInfo" : false,
  31478. "obtainAllPrivilege" : false,
  31479. "obtainUserPrivilege" : false,
  31480. "obtainOtherPrivilege" : false,
  31481. "userInteractionRequired" : false
  31482. }
  31483. },
  31484. "publishedDate" : "2021-04-28T21:15Z",
  31485. "lastModifiedDate" : "2021-05-05T19:39Z"
  31486. }, {
  31487. "cve" : {
  31488. "data_type" : "CVE",
  31489. "data_format" : "MITRE",
  31490. "data_version" : "4.0",
  31491. "CVE_data_meta" : {
  31492. "ID" : "CVE-2020-22784",
  31493. "ASSIGNER" : "cve@mitre.org"
  31494. },
  31495. "problemtype" : {
  31496. "problemtype_data" : [ {
  31497. "description" : [ {
  31498. "lang" : "en",
  31499. "value" : "CWE-863"
  31500. } ]
  31501. } ]
  31502. },
  31503. "references" : {
  31504. "reference_data" : [ {
  31505. "url" : "https://github.com/ether/ueberDB/commit/e8b58d03534ade8d83c2d1946a8350a23952531e",
  31506. "name" : "https://github.com/ether/ueberDB/commit/e8b58d03534ade8d83c2d1946a8350a23952531e",
  31507. "refsource" : "CONFIRM",
  31508. "tags" : [ "Patch", "Third Party Advisory" ]
  31509. } ]
  31510. },
  31511. "description" : {
  31512. "description_data" : [ {
  31513. "lang" : "en",
  31514. "value" : "In Etherpad UeberDB < 0.4.4, due to MySQL omitting trailing spaces on char / varchar columns during comparisons, retrieving database records using UeberDB's MySQL connector could allow bypassing access controls enforced on key names."
  31515. } ]
  31516. }
  31517. },
  31518. "configurations" : {
  31519. "CVE_data_version" : "4.0",
  31520. "nodes" : [ {
  31521. "operator" : "OR",
  31522. "children" : [ ],
  31523. "cpe_match" : [ {
  31524. "vulnerable" : true,
  31525. "cpe23Uri" : "cpe:2.3:a:etherpad:ueberdb:*:*:*:*:*:*:*:*",
  31526. "versionEndExcluding" : "1.4.8",
  31527. "cpe_name" : [ ]
  31528. } ]
  31529. } ]
  31530. },
  31531. "impact" : {
  31532. "baseMetricV3" : {
  31533. "cvssV3" : {
  31534. "version" : "3.1",
  31535. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
  31536. "attackVector" : "NETWORK",
  31537. "attackComplexity" : "LOW",
  31538. "privilegesRequired" : "NONE",
  31539. "userInteraction" : "NONE",
  31540. "scope" : "UNCHANGED",
  31541. "confidentialityImpact" : "NONE",
  31542. "integrityImpact" : "HIGH",
  31543. "availabilityImpact" : "NONE",
  31544. "baseScore" : 7.5,
  31545. "baseSeverity" : "HIGH"
  31546. },
  31547. "exploitabilityScore" : 3.9,
  31548. "impactScore" : 3.6
  31549. },
  31550. "baseMetricV2" : {
  31551. "cvssV2" : {
  31552. "version" : "2.0",
  31553. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  31554. "accessVector" : "NETWORK",
  31555. "accessComplexity" : "LOW",
  31556. "authentication" : "NONE",
  31557. "confidentialityImpact" : "NONE",
  31558. "integrityImpact" : "PARTIAL",
  31559. "availabilityImpact" : "NONE",
  31560. "baseScore" : 5.0
  31561. },
  31562. "severity" : "MEDIUM",
  31563. "exploitabilityScore" : 10.0,
  31564. "impactScore" : 2.9,
  31565. "acInsufInfo" : false,
  31566. "obtainAllPrivilege" : false,
  31567. "obtainUserPrivilege" : false,
  31568. "obtainOtherPrivilege" : false,
  31569. "userInteractionRequired" : false
  31570. }
  31571. },
  31572. "publishedDate" : "2021-04-28T21:15Z",
  31573. "lastModifiedDate" : "2021-05-06T22:07Z"
  31574. }, {
  31575. "cve" : {
  31576. "data_type" : "CVE",
  31577. "data_format" : "MITRE",
  31578. "data_version" : "4.0",
  31579. "CVE_data_meta" : {
  31580. "ID" : "CVE-2020-22783",
  31581. "ASSIGNER" : "cve@mitre.org"
  31582. },
  31583. "problemtype" : {
  31584. "problemtype_data" : [ {
  31585. "description" : [ {
  31586. "lang" : "en",
  31587. "value" : "CWE-312"
  31588. } ]
  31589. } ]
  31590. },
  31591. "references" : {
  31592. "reference_data" : [ {
  31593. "url" : "https://github.com/ether/etherpad-lite/issues/3421",
  31594. "name" : "https://github.com/ether/etherpad-lite/issues/3421",
  31595. "refsource" : "CONFIRM",
  31596. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  31597. }, {
  31598. "url" : "https://github.com/ether/etherpad-lite/commit/53f126082a8b3d094e48b159f0f0bc8a5db4b2f4",
  31599. "name" : "https://github.com/ether/etherpad-lite/commit/53f126082a8b3d094e48b159f0f0bc8a5db4b2f4",
  31600. "refsource" : "MISC",
  31601. "tags" : [ "Patch", "Third Party Advisory" ]
  31602. } ]
  31603. },
  31604. "description" : {
  31605. "description_data" : [ {
  31606. "lang" : "en",
  31607. "value" : "Etherpad <1.8.3 stored passwords used by users insecurely in the database and in log files. This affects every database backend supported by Etherpad."
  31608. } ]
  31609. }
  31610. },
  31611. "configurations" : {
  31612. "CVE_data_version" : "4.0",
  31613. "nodes" : [ {
  31614. "operator" : "OR",
  31615. "children" : [ ],
  31616. "cpe_match" : [ {
  31617. "vulnerable" : true,
  31618. "cpe23Uri" : "cpe:2.3:a:etherpad:etherpad:*:*:*:*:*:*:*:*",
  31619. "versionEndExcluding" : "1.8.3",
  31620. "cpe_name" : [ ]
  31621. } ]
  31622. } ]
  31623. },
  31624. "impact" : {
  31625. "baseMetricV3" : {
  31626. "cvssV3" : {
  31627. "version" : "3.1",
  31628. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  31629. "attackVector" : "NETWORK",
  31630. "attackComplexity" : "LOW",
  31631. "privilegesRequired" : "LOW",
  31632. "userInteraction" : "NONE",
  31633. "scope" : "UNCHANGED",
  31634. "confidentialityImpact" : "HIGH",
  31635. "integrityImpact" : "NONE",
  31636. "availabilityImpact" : "NONE",
  31637. "baseScore" : 6.5,
  31638. "baseSeverity" : "MEDIUM"
  31639. },
  31640. "exploitabilityScore" : 2.8,
  31641. "impactScore" : 3.6
  31642. },
  31643. "baseMetricV2" : {
  31644. "cvssV2" : {
  31645. "version" : "2.0",
  31646. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
  31647. "accessVector" : "NETWORK",
  31648. "accessComplexity" : "LOW",
  31649. "authentication" : "SINGLE",
  31650. "confidentialityImpact" : "PARTIAL",
  31651. "integrityImpact" : "NONE",
  31652. "availabilityImpact" : "NONE",
  31653. "baseScore" : 4.0
  31654. },
  31655. "severity" : "MEDIUM",
  31656. "exploitabilityScore" : 8.0,
  31657. "impactScore" : 2.9,
  31658. "acInsufInfo" : false,
  31659. "obtainAllPrivilege" : false,
  31660. "obtainUserPrivilege" : false,
  31661. "obtainOtherPrivilege" : false,
  31662. "userInteractionRequired" : false
  31663. }
  31664. },
  31665. "publishedDate" : "2021-04-28T21:15Z",
  31666. "lastModifiedDate" : "2021-05-05T19:58Z"
  31667. }, {
  31668. "cve" : {
  31669. "data_type" : "CVE",
  31670. "data_format" : "MITRE",
  31671. "data_version" : "4.0",
  31672. "CVE_data_meta" : {
  31673. "ID" : "CVE-2020-22782",
  31674. "ASSIGNER" : "cve@mitre.org"
  31675. },
  31676. "problemtype" : {
  31677. "problemtype_data" : [ {
  31678. "description" : [ {
  31679. "lang" : "en",
  31680. "value" : "NVD-CWE-noinfo"
  31681. } ]
  31682. } ]
  31683. },
  31684. "references" : {
  31685. "reference_data" : [ {
  31686. "url" : "https://github.com/ether/etherpad-lite/issues/3825",
  31687. "name" : "https://github.com/ether/etherpad-lite/issues/3825",
  31688. "refsource" : "CONFIRM",
  31689. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  31690. } ]
  31691. },
  31692. "description" : {
  31693. "description_data" : [ {
  31694. "lang" : "en",
  31695. "value" : "Etherpad < 1.8.3 is affected by a denial of service in the import functionality. Upload of binary file to the import endpoint would crash the instance."
  31696. } ]
  31697. }
  31698. },
  31699. "configurations" : {
  31700. "CVE_data_version" : "4.0",
  31701. "nodes" : [ {
  31702. "operator" : "OR",
  31703. "children" : [ ],
  31704. "cpe_match" : [ {
  31705. "vulnerable" : true,
  31706. "cpe23Uri" : "cpe:2.3:a:etherpad:etherpad:*:*:*:*:*:*:*:*",
  31707. "versionEndExcluding" : "1.8.3",
  31708. "cpe_name" : [ ]
  31709. } ]
  31710. } ]
  31711. },
  31712. "impact" : {
  31713. "baseMetricV3" : {
  31714. "cvssV3" : {
  31715. "version" : "3.1",
  31716. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  31717. "attackVector" : "NETWORK",
  31718. "attackComplexity" : "LOW",
  31719. "privilegesRequired" : "NONE",
  31720. "userInteraction" : "NONE",
  31721. "scope" : "UNCHANGED",
  31722. "confidentialityImpact" : "NONE",
  31723. "integrityImpact" : "NONE",
  31724. "availabilityImpact" : "HIGH",
  31725. "baseScore" : 7.5,
  31726. "baseSeverity" : "HIGH"
  31727. },
  31728. "exploitabilityScore" : 3.9,
  31729. "impactScore" : 3.6
  31730. },
  31731. "baseMetricV2" : {
  31732. "cvssV2" : {
  31733. "version" : "2.0",
  31734. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  31735. "accessVector" : "NETWORK",
  31736. "accessComplexity" : "LOW",
  31737. "authentication" : "NONE",
  31738. "confidentialityImpact" : "NONE",
  31739. "integrityImpact" : "NONE",
  31740. "availabilityImpact" : "PARTIAL",
  31741. "baseScore" : 5.0
  31742. },
  31743. "severity" : "MEDIUM",
  31744. "exploitabilityScore" : 10.0,
  31745. "impactScore" : 2.9,
  31746. "acInsufInfo" : false,
  31747. "obtainAllPrivilege" : false,
  31748. "obtainUserPrivilege" : false,
  31749. "obtainOtherPrivilege" : false,
  31750. "userInteractionRequired" : false
  31751. }
  31752. },
  31753. "publishedDate" : "2021-04-28T21:15Z",
  31754. "lastModifiedDate" : "2021-05-05T20:07Z"
  31755. }, {
  31756. "cve" : {
  31757. "data_type" : "CVE",
  31758. "data_format" : "MITRE",
  31759. "data_version" : "4.0",
  31760. "CVE_data_meta" : {
  31761. "ID" : "CVE-2020-22781",
  31762. "ASSIGNER" : "cve@mitre.org"
  31763. },
  31764. "problemtype" : {
  31765. "problemtype_data" : [ {
  31766. "description" : [ {
  31767. "lang" : "en",
  31768. "value" : "CWE-89"
  31769. } ]
  31770. } ]
  31771. },
  31772. "references" : {
  31773. "reference_data" : [ {
  31774. "url" : "https://github.com/ether/etherpad-lite/issues/3502",
  31775. "name" : "https://github.com/ether/etherpad-lite/issues/3502",
  31776. "refsource" : "CONFIRM",
  31777. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  31778. } ]
  31779. },
  31780. "description" : {
  31781. "description_data" : [ {
  31782. "lang" : "en",
  31783. "value" : "In Etherpad < 1.8.3, a specially crafted URI would raise an unhandled exception in the cache mechanism and cause a denial of service (crash the instance)."
  31784. } ]
  31785. }
  31786. },
  31787. "configurations" : {
  31788. "CVE_data_version" : "4.0",
  31789. "nodes" : [ {
  31790. "operator" : "OR",
  31791. "children" : [ ],
  31792. "cpe_match" : [ {
  31793. "vulnerable" : true,
  31794. "cpe23Uri" : "cpe:2.3:a:etherpad:etherpad:*:*:*:*:*:*:*:*",
  31795. "versionEndExcluding" : "1.8.3",
  31796. "cpe_name" : [ ]
  31797. } ]
  31798. } ]
  31799. },
  31800. "impact" : {
  31801. "baseMetricV3" : {
  31802. "cvssV3" : {
  31803. "version" : "3.1",
  31804. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  31805. "attackVector" : "NETWORK",
  31806. "attackComplexity" : "LOW",
  31807. "privilegesRequired" : "NONE",
  31808. "userInteraction" : "NONE",
  31809. "scope" : "UNCHANGED",
  31810. "confidentialityImpact" : "NONE",
  31811. "integrityImpact" : "NONE",
  31812. "availabilityImpact" : "HIGH",
  31813. "baseScore" : 7.5,
  31814. "baseSeverity" : "HIGH"
  31815. },
  31816. "exploitabilityScore" : 3.9,
  31817. "impactScore" : 3.6
  31818. },
  31819. "baseMetricV2" : {
  31820. "cvssV2" : {
  31821. "version" : "2.0",
  31822. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  31823. "accessVector" : "NETWORK",
  31824. "accessComplexity" : "LOW",
  31825. "authentication" : "NONE",
  31826. "confidentialityImpact" : "NONE",
  31827. "integrityImpact" : "NONE",
  31828. "availabilityImpact" : "PARTIAL",
  31829. "baseScore" : 5.0
  31830. },
  31831. "severity" : "MEDIUM",
  31832. "exploitabilityScore" : 10.0,
  31833. "impactScore" : 2.9,
  31834. "acInsufInfo" : false,
  31835. "obtainAllPrivilege" : false,
  31836. "obtainUserPrivilege" : false,
  31837. "obtainOtherPrivilege" : false,
  31838. "userInteractionRequired" : false
  31839. }
  31840. },
  31841. "publishedDate" : "2021-04-28T21:15Z",
  31842. "lastModifiedDate" : "2021-05-05T20:19Z"
  31843. }, {
  31844. "cve" : {
  31845. "data_type" : "CVE",
  31846. "data_format" : "MITRE",
  31847. "data_version" : "4.0",
  31848. "CVE_data_meta" : {
  31849. "ID" : "CVE-2021-25165",
  31850. "ASSIGNER" : "security-alert@hpe.com"
  31851. },
  31852. "problemtype" : {
  31853. "problemtype_data" : [ {
  31854. "description" : [ {
  31855. "lang" : "en",
  31856. "value" : "CWE-611"
  31857. } ]
  31858. } ]
  31859. },
  31860. "references" : {
  31861. "reference_data" : [ {
  31862. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  31863. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  31864. "refsource" : "MISC",
  31865. "tags" : [ "Vendor Advisory" ]
  31866. } ]
  31867. },
  31868. "description" : {
  31869. "description_data" : [ {
  31870. "lang" : "en",
  31871. "value" : "A remote XML external entity vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability."
  31872. } ]
  31873. }
  31874. },
  31875. "configurations" : {
  31876. "CVE_data_version" : "4.0",
  31877. "nodes" : [ {
  31878. "operator" : "OR",
  31879. "children" : [ ],
  31880. "cpe_match" : [ {
  31881. "vulnerable" : true,
  31882. "cpe23Uri" : "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
  31883. "versionEndExcluding" : "8.2.12.1",
  31884. "cpe_name" : [ ]
  31885. } ]
  31886. } ]
  31887. },
  31888. "impact" : {
  31889. "baseMetricV3" : {
  31890. "cvssV3" : {
  31891. "version" : "3.1",
  31892. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
  31893. "attackVector" : "NETWORK",
  31894. "attackComplexity" : "LOW",
  31895. "privilegesRequired" : "LOW",
  31896. "userInteraction" : "NONE",
  31897. "scope" : "UNCHANGED",
  31898. "confidentialityImpact" : "HIGH",
  31899. "integrityImpact" : "NONE",
  31900. "availabilityImpact" : "HIGH",
  31901. "baseScore" : 8.1,
  31902. "baseSeverity" : "HIGH"
  31903. },
  31904. "exploitabilityScore" : 2.8,
  31905. "impactScore" : 5.2
  31906. },
  31907. "baseMetricV2" : {
  31908. "cvssV2" : {
  31909. "version" : "2.0",
  31910. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:P",
  31911. "accessVector" : "NETWORK",
  31912. "accessComplexity" : "LOW",
  31913. "authentication" : "SINGLE",
  31914. "confidentialityImpact" : "PARTIAL",
  31915. "integrityImpact" : "NONE",
  31916. "availabilityImpact" : "PARTIAL",
  31917. "baseScore" : 5.5
  31918. },
  31919. "severity" : "MEDIUM",
  31920. "exploitabilityScore" : 8.0,
  31921. "impactScore" : 4.9,
  31922. "acInsufInfo" : false,
  31923. "obtainAllPrivilege" : false,
  31924. "obtainUserPrivilege" : false,
  31925. "obtainOtherPrivilege" : false,
  31926. "userInteractionRequired" : false
  31927. }
  31928. },
  31929. "publishedDate" : "2021-04-28T20:15Z",
  31930. "lastModifiedDate" : "2021-05-07T02:32Z"
  31931. }, {
  31932. "cve" : {
  31933. "data_type" : "CVE",
  31934. "data_format" : "MITRE",
  31935. "data_version" : "4.0",
  31936. "CVE_data_meta" : {
  31937. "ID" : "CVE-2021-25164",
  31938. "ASSIGNER" : "security-alert@hpe.com"
  31939. },
  31940. "problemtype" : {
  31941. "problemtype_data" : [ {
  31942. "description" : [ {
  31943. "lang" : "en",
  31944. "value" : "CWE-611"
  31945. } ]
  31946. } ]
  31947. },
  31948. "references" : {
  31949. "reference_data" : [ {
  31950. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  31951. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  31952. "refsource" : "MISC",
  31953. "tags" : [ "Vendor Advisory" ]
  31954. } ]
  31955. },
  31956. "description" : {
  31957. "description_data" : [ {
  31958. "lang" : "en",
  31959. "value" : "A remote XML external entity vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability."
  31960. } ]
  31961. }
  31962. },
  31963. "configurations" : {
  31964. "CVE_data_version" : "4.0",
  31965. "nodes" : [ {
  31966. "operator" : "OR",
  31967. "children" : [ ],
  31968. "cpe_match" : [ {
  31969. "vulnerable" : true,
  31970. "cpe23Uri" : "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
  31971. "versionEndExcluding" : "8.2.12.1",
  31972. "cpe_name" : [ ]
  31973. } ]
  31974. } ]
  31975. },
  31976. "impact" : {
  31977. "baseMetricV3" : {
  31978. "cvssV3" : {
  31979. "version" : "3.1",
  31980. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
  31981. "attackVector" : "NETWORK",
  31982. "attackComplexity" : "LOW",
  31983. "privilegesRequired" : "HIGH",
  31984. "userInteraction" : "NONE",
  31985. "scope" : "UNCHANGED",
  31986. "confidentialityImpact" : "HIGH",
  31987. "integrityImpact" : "NONE",
  31988. "availabilityImpact" : "HIGH",
  31989. "baseScore" : 6.5,
  31990. "baseSeverity" : "MEDIUM"
  31991. },
  31992. "exploitabilityScore" : 1.2,
  31993. "impactScore" : 5.2
  31994. },
  31995. "baseMetricV2" : {
  31996. "cvssV2" : {
  31997. "version" : "2.0",
  31998. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:P",
  31999. "accessVector" : "NETWORK",
  32000. "accessComplexity" : "LOW",
  32001. "authentication" : "SINGLE",
  32002. "confidentialityImpact" : "PARTIAL",
  32003. "integrityImpact" : "NONE",
  32004. "availabilityImpact" : "PARTIAL",
  32005. "baseScore" : 5.5
  32006. },
  32007. "severity" : "MEDIUM",
  32008. "exploitabilityScore" : 8.0,
  32009. "impactScore" : 4.9,
  32010. "acInsufInfo" : false,
  32011. "obtainAllPrivilege" : false,
  32012. "obtainUserPrivilege" : false,
  32013. "obtainOtherPrivilege" : false,
  32014. "userInteractionRequired" : false
  32015. }
  32016. },
  32017. "publishedDate" : "2021-04-28T20:15Z",
  32018. "lastModifiedDate" : "2021-05-07T02:49Z"
  32019. }, {
  32020. "cve" : {
  32021. "data_type" : "CVE",
  32022. "data_format" : "MITRE",
  32023. "data_version" : "4.0",
  32024. "CVE_data_meta" : {
  32025. "ID" : "CVE-2021-29482",
  32026. "ASSIGNER" : "security-advisories@github.com"
  32027. },
  32028. "problemtype" : {
  32029. "problemtype_data" : [ {
  32030. "description" : [ {
  32031. "lang" : "en",
  32032. "value" : "CWE-835"
  32033. } ]
  32034. } ]
  32035. },
  32036. "references" : {
  32037. "reference_data" : [ {
  32038. "url" : "https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27",
  32039. "name" : "https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27",
  32040. "refsource" : "CONFIRM",
  32041. "tags" : [ "Third Party Advisory" ]
  32042. }, {
  32043. "url" : "https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b",
  32044. "name" : "https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b",
  32045. "refsource" : "MISC",
  32046. "tags" : [ "Patch", "Third Party Advisory" ]
  32047. } ]
  32048. },
  32049. "description" : {
  32050. "description_data" : [ {
  32051. "lang" : "en",
  32052. "value" : "xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. The problem has been fixed in release v0.5.8. As a workaround users can limit the size of the compressed file input to a reasonable size for their use case. The standard library had recently the same issue and got the CVE-2020-16845 allocated."
  32053. } ]
  32054. }
  32055. },
  32056. "configurations" : {
  32057. "CVE_data_version" : "4.0",
  32058. "nodes" : [ {
  32059. "operator" : "OR",
  32060. "children" : [ ],
  32061. "cpe_match" : [ {
  32062. "vulnerable" : true,
  32063. "cpe23Uri" : "cpe:2.3:a:xz_project:xz:*:*:*:*:*:*:*:*",
  32064. "versionEndExcluding" : "0.5.8",
  32065. "cpe_name" : [ ]
  32066. } ]
  32067. } ]
  32068. },
  32069. "impact" : {
  32070. "baseMetricV3" : {
  32071. "cvssV3" : {
  32072. "version" : "3.1",
  32073. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  32074. "attackVector" : "NETWORK",
  32075. "attackComplexity" : "LOW",
  32076. "privilegesRequired" : "NONE",
  32077. "userInteraction" : "NONE",
  32078. "scope" : "UNCHANGED",
  32079. "confidentialityImpact" : "NONE",
  32080. "integrityImpact" : "NONE",
  32081. "availabilityImpact" : "HIGH",
  32082. "baseScore" : 7.5,
  32083. "baseSeverity" : "HIGH"
  32084. },
  32085. "exploitabilityScore" : 3.9,
  32086. "impactScore" : 3.6
  32087. },
  32088. "baseMetricV2" : {
  32089. "cvssV2" : {
  32090. "version" : "2.0",
  32091. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  32092. "accessVector" : "NETWORK",
  32093. "accessComplexity" : "LOW",
  32094. "authentication" : "NONE",
  32095. "confidentialityImpact" : "NONE",
  32096. "integrityImpact" : "NONE",
  32097. "availabilityImpact" : "PARTIAL",
  32098. "baseScore" : 5.0
  32099. },
  32100. "severity" : "MEDIUM",
  32101. "exploitabilityScore" : 10.0,
  32102. "impactScore" : 2.9,
  32103. "acInsufInfo" : false,
  32104. "obtainAllPrivilege" : false,
  32105. "obtainUserPrivilege" : false,
  32106. "obtainOtherPrivilege" : false,
  32107. "userInteractionRequired" : false
  32108. }
  32109. },
  32110. "publishedDate" : "2021-04-28T19:15Z",
  32111. "lastModifiedDate" : "2021-05-07T01:30Z"
  32112. }, {
  32113. "cve" : {
  32114. "data_type" : "CVE",
  32115. "data_format" : "MITRE",
  32116. "data_version" : "4.0",
  32117. "CVE_data_meta" : {
  32118. "ID" : "CVE-2021-25154",
  32119. "ASSIGNER" : "security-alert@hpe.com"
  32120. },
  32121. "problemtype" : {
  32122. "problemtype_data" : [ {
  32123. "description" : [ {
  32124. "lang" : "en",
  32125. "value" : "CWE-269"
  32126. } ]
  32127. } ]
  32128. },
  32129. "references" : {
  32130. "reference_data" : [ {
  32131. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  32132. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  32133. "refsource" : "MISC",
  32134. "tags" : [ "Vendor Advisory" ]
  32135. } ]
  32136. },
  32137. "description" : {
  32138. "description_data" : [ {
  32139. "lang" : "en",
  32140. "value" : "A remote escalation of privilege vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability."
  32141. } ]
  32142. }
  32143. },
  32144. "configurations" : {
  32145. "CVE_data_version" : "4.0",
  32146. "nodes" : [ {
  32147. "operator" : "OR",
  32148. "children" : [ ],
  32149. "cpe_match" : [ {
  32150. "vulnerable" : true,
  32151. "cpe23Uri" : "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
  32152. "versionEndExcluding" : "8.2.12.1",
  32153. "cpe_name" : [ ]
  32154. } ]
  32155. } ]
  32156. },
  32157. "impact" : {
  32158. "baseMetricV3" : {
  32159. "cvssV3" : {
  32160. "version" : "3.1",
  32161. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
  32162. "attackVector" : "NETWORK",
  32163. "attackComplexity" : "HIGH",
  32164. "privilegesRequired" : "LOW",
  32165. "userInteraction" : "NONE",
  32166. "scope" : "UNCHANGED",
  32167. "confidentialityImpact" : "HIGH",
  32168. "integrityImpact" : "HIGH",
  32169. "availabilityImpact" : "HIGH",
  32170. "baseScore" : 7.5,
  32171. "baseSeverity" : "HIGH"
  32172. },
  32173. "exploitabilityScore" : 1.6,
  32174. "impactScore" : 5.9
  32175. },
  32176. "baseMetricV2" : {
  32177. "cvssV2" : {
  32178. "version" : "2.0",
  32179. "vectorString" : "AV:N/AC:M/Au:S/C:P/I:P/A:P",
  32180. "accessVector" : "NETWORK",
  32181. "accessComplexity" : "MEDIUM",
  32182. "authentication" : "SINGLE",
  32183. "confidentialityImpact" : "PARTIAL",
  32184. "integrityImpact" : "PARTIAL",
  32185. "availabilityImpact" : "PARTIAL",
  32186. "baseScore" : 6.0
  32187. },
  32188. "severity" : "MEDIUM",
  32189. "exploitabilityScore" : 6.8,
  32190. "impactScore" : 6.4,
  32191. "acInsufInfo" : false,
  32192. "obtainAllPrivilege" : false,
  32193. "obtainUserPrivilege" : false,
  32194. "obtainOtherPrivilege" : false,
  32195. "userInteractionRequired" : false
  32196. }
  32197. },
  32198. "publishedDate" : "2021-04-28T19:15Z",
  32199. "lastModifiedDate" : "2021-05-05T20:38Z"
  32200. }, {
  32201. "cve" : {
  32202. "data_type" : "CVE",
  32203. "data_format" : "MITRE",
  32204. "data_version" : "4.0",
  32205. "CVE_data_meta" : {
  32206. "ID" : "CVE-2021-25153",
  32207. "ASSIGNER" : "security-alert@hpe.com"
  32208. },
  32209. "problemtype" : {
  32210. "problemtype_data" : [ {
  32211. "description" : [ {
  32212. "lang" : "en",
  32213. "value" : "CWE-89"
  32214. } ]
  32215. } ]
  32216. },
  32217. "references" : {
  32218. "reference_data" : [ {
  32219. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  32220. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  32221. "refsource" : "MISC",
  32222. "tags" : [ "Vendor Advisory" ]
  32223. } ]
  32224. },
  32225. "description" : {
  32226. "description_data" : [ {
  32227. "lang" : "en",
  32228. "value" : "A remote SQL injection vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability."
  32229. } ]
  32230. }
  32231. },
  32232. "configurations" : {
  32233. "CVE_data_version" : "4.0",
  32234. "nodes" : [ {
  32235. "operator" : "OR",
  32236. "children" : [ ],
  32237. "cpe_match" : [ {
  32238. "vulnerable" : true,
  32239. "cpe23Uri" : "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
  32240. "versionEndExcluding" : "8.2.12.1",
  32241. "cpe_name" : [ ]
  32242. } ]
  32243. } ]
  32244. },
  32245. "impact" : {
  32246. "baseMetricV3" : {
  32247. "cvssV3" : {
  32248. "version" : "3.1",
  32249. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
  32250. "attackVector" : "NETWORK",
  32251. "attackComplexity" : "LOW",
  32252. "privilegesRequired" : "LOW",
  32253. "userInteraction" : "NONE",
  32254. "scope" : "UNCHANGED",
  32255. "confidentialityImpact" : "HIGH",
  32256. "integrityImpact" : "HIGH",
  32257. "availabilityImpact" : "NONE",
  32258. "baseScore" : 8.1,
  32259. "baseSeverity" : "HIGH"
  32260. },
  32261. "exploitabilityScore" : 2.8,
  32262. "impactScore" : 5.2
  32263. },
  32264. "baseMetricV2" : {
  32265. "cvssV2" : {
  32266. "version" : "2.0",
  32267. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:N",
  32268. "accessVector" : "NETWORK",
  32269. "accessComplexity" : "LOW",
  32270. "authentication" : "SINGLE",
  32271. "confidentialityImpact" : "PARTIAL",
  32272. "integrityImpact" : "PARTIAL",
  32273. "availabilityImpact" : "NONE",
  32274. "baseScore" : 5.5
  32275. },
  32276. "severity" : "MEDIUM",
  32277. "exploitabilityScore" : 8.0,
  32278. "impactScore" : 4.9,
  32279. "acInsufInfo" : false,
  32280. "obtainAllPrivilege" : false,
  32281. "obtainUserPrivilege" : false,
  32282. "obtainOtherPrivilege" : false,
  32283. "userInteractionRequired" : false
  32284. }
  32285. },
  32286. "publishedDate" : "2021-04-28T19:15Z",
  32287. "lastModifiedDate" : "2021-05-05T20:37Z"
  32288. }, {
  32289. "cve" : {
  32290. "data_type" : "CVE",
  32291. "data_format" : "MITRE",
  32292. "data_version" : "4.0",
  32293. "CVE_data_meta" : {
  32294. "ID" : "CVE-2021-25151",
  32295. "ASSIGNER" : "security-alert@hpe.com"
  32296. },
  32297. "problemtype" : {
  32298. "problemtype_data" : [ {
  32299. "description" : [ {
  32300. "lang" : "en",
  32301. "value" : "CWE-502"
  32302. } ]
  32303. } ]
  32304. },
  32305. "references" : {
  32306. "reference_data" : [ {
  32307. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  32308. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  32309. "refsource" : "MISC",
  32310. "tags" : [ "Vendor Advisory" ]
  32311. } ]
  32312. },
  32313. "description" : {
  32314. "description_data" : [ {
  32315. "lang" : "en",
  32316. "value" : "A remote insecure deserialization vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability."
  32317. } ]
  32318. }
  32319. },
  32320. "configurations" : {
  32321. "CVE_data_version" : "4.0",
  32322. "nodes" : [ {
  32323. "operator" : "OR",
  32324. "children" : [ ],
  32325. "cpe_match" : [ {
  32326. "vulnerable" : true,
  32327. "cpe23Uri" : "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
  32328. "versionEndExcluding" : "8.2.12.1",
  32329. "cpe_name" : [ ]
  32330. } ]
  32331. } ]
  32332. },
  32333. "impact" : {
  32334. "baseMetricV3" : {
  32335. "cvssV3" : {
  32336. "version" : "3.1",
  32337. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  32338. "attackVector" : "NETWORK",
  32339. "attackComplexity" : "LOW",
  32340. "privilegesRequired" : "LOW",
  32341. "userInteraction" : "NONE",
  32342. "scope" : "UNCHANGED",
  32343. "confidentialityImpact" : "HIGH",
  32344. "integrityImpact" : "HIGH",
  32345. "availabilityImpact" : "HIGH",
  32346. "baseScore" : 8.8,
  32347. "baseSeverity" : "HIGH"
  32348. },
  32349. "exploitabilityScore" : 2.8,
  32350. "impactScore" : 5.9
  32351. },
  32352. "baseMetricV2" : {
  32353. "cvssV2" : {
  32354. "version" : "2.0",
  32355. "vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C",
  32356. "accessVector" : "NETWORK",
  32357. "accessComplexity" : "LOW",
  32358. "authentication" : "SINGLE",
  32359. "confidentialityImpact" : "COMPLETE",
  32360. "integrityImpact" : "COMPLETE",
  32361. "availabilityImpact" : "COMPLETE",
  32362. "baseScore" : 9.0
  32363. },
  32364. "severity" : "HIGH",
  32365. "exploitabilityScore" : 8.0,
  32366. "impactScore" : 10.0,
  32367. "acInsufInfo" : false,
  32368. "obtainAllPrivilege" : false,
  32369. "obtainUserPrivilege" : false,
  32370. "obtainOtherPrivilege" : false,
  32371. "userInteractionRequired" : false
  32372. }
  32373. },
  32374. "publishedDate" : "2021-04-28T19:15Z",
  32375. "lastModifiedDate" : "2021-05-07T02:36Z"
  32376. }, {
  32377. "cve" : {
  32378. "data_type" : "CVE",
  32379. "data_format" : "MITRE",
  32380. "data_version" : "4.0",
  32381. "CVE_data_meta" : {
  32382. "ID" : "CVE-2021-23364",
  32383. "ASSIGNER" : "report@snyk.io"
  32384. },
  32385. "problemtype" : {
  32386. "problemtype_data" : [ {
  32387. "description" : [ {
  32388. "lang" : "en",
  32389. "value" : "NVD-CWE-Other"
  32390. } ]
  32391. } ]
  32392. },
  32393. "references" : {
  32394. "reference_data" : [ {
  32395. "url" : "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182",
  32396. "name" : "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182",
  32397. "refsource" : "MISC",
  32398. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  32399. }, {
  32400. "url" : "https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98",
  32401. "name" : "https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98",
  32402. "refsource" : "MISC",
  32403. "tags" : [ "Patch", "Third Party Advisory" ]
  32404. }, {
  32405. "url" : "https://github.com/browserslist/browserslist/pull/593",
  32406. "name" : "https://github.com/browserslist/browserslist/pull/593",
  32407. "refsource" : "MISC",
  32408. "tags" : [ "Third Party Advisory" ]
  32409. }, {
  32410. "url" : "https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474",
  32411. "name" : "https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474",
  32412. "refsource" : "MISC",
  32413. "tags" : [ "Broken Link" ]
  32414. }, {
  32415. "url" : "https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194",
  32416. "name" : "https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194",
  32417. "refsource" : "MISC",
  32418. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  32419. } ]
  32420. },
  32421. "description" : {
  32422. "description_data" : [ {
  32423. "lang" : "en",
  32424. "value" : "The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries."
  32425. } ]
  32426. }
  32427. },
  32428. "configurations" : {
  32429. "CVE_data_version" : "4.0",
  32430. "nodes" : [ {
  32431. "operator" : "OR",
  32432. "children" : [ ],
  32433. "cpe_match" : [ {
  32434. "vulnerable" : true,
  32435. "cpe23Uri" : "cpe:2.3:a:browserslist_project:browserslist:*:*:*:*:*:node.js:*:*",
  32436. "versionStartIncluding" : "4.0.0",
  32437. "versionEndExcluding" : "4.16.5",
  32438. "cpe_name" : [ ]
  32439. } ]
  32440. } ]
  32441. },
  32442. "impact" : {
  32443. "baseMetricV3" : {
  32444. "cvssV3" : {
  32445. "version" : "3.1",
  32446. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
  32447. "attackVector" : "NETWORK",
  32448. "attackComplexity" : "LOW",
  32449. "privilegesRequired" : "NONE",
  32450. "userInteraction" : "NONE",
  32451. "scope" : "UNCHANGED",
  32452. "confidentialityImpact" : "NONE",
  32453. "integrityImpact" : "NONE",
  32454. "availabilityImpact" : "LOW",
  32455. "baseScore" : 5.3,
  32456. "baseSeverity" : "MEDIUM"
  32457. },
  32458. "exploitabilityScore" : 3.9,
  32459. "impactScore" : 1.4
  32460. },
  32461. "baseMetricV2" : {
  32462. "cvssV2" : {
  32463. "version" : "2.0",
  32464. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  32465. "accessVector" : "NETWORK",
  32466. "accessComplexity" : "LOW",
  32467. "authentication" : "NONE",
  32468. "confidentialityImpact" : "NONE",
  32469. "integrityImpact" : "NONE",
  32470. "availabilityImpact" : "PARTIAL",
  32471. "baseScore" : 5.0
  32472. },
  32473. "severity" : "MEDIUM",
  32474. "exploitabilityScore" : 10.0,
  32475. "impactScore" : 2.9,
  32476. "acInsufInfo" : false,
  32477. "obtainAllPrivilege" : false,
  32478. "obtainUserPrivilege" : false,
  32479. "obtainOtherPrivilege" : false,
  32480. "userInteractionRequired" : false
  32481. }
  32482. },
  32483. "publishedDate" : "2021-04-28T16:15Z",
  32484. "lastModifiedDate" : "2021-05-05T20:15Z"
  32485. }, {
  32486. "cve" : {
  32487. "data_type" : "CVE",
  32488. "data_format" : "MITRE",
  32489. "data_version" : "4.0",
  32490. "CVE_data_meta" : {
  32491. "ID" : "CVE-2020-18022",
  32492. "ASSIGNER" : "cve@mitre.org"
  32493. },
  32494. "problemtype" : {
  32495. "problemtype_data" : [ {
  32496. "description" : [ {
  32497. "lang" : "en",
  32498. "value" : "CWE-79"
  32499. } ]
  32500. } ]
  32501. },
  32502. "references" : {
  32503. "reference_data" : [ {
  32504. "url" : "https://github.com/hpj233/qibocms/blob/master/v7",
  32505. "name" : "https://github.com/hpj233/qibocms/blob/master/v7",
  32506. "refsource" : "MISC",
  32507. "tags" : [ "Exploit", "Third Party Advisory" ]
  32508. } ]
  32509. },
  32510. "description" : {
  32511. "description_data" : [ {
  32512. "lang" : "en",
  32513. "value" : "Cross Site Scripting (XSS) in Qibosoft QiboCMS v7 and earlier allows remote attackers to execute arbitrary code or obtain sensitive information by injecting arbitrary commands in a HTTP request to the \"ewebeditor\\3.1.1\\kindeditor.js\" component."
  32514. } ]
  32515. }
  32516. },
  32517. "configurations" : {
  32518. "CVE_data_version" : "4.0",
  32519. "nodes" : [ {
  32520. "operator" : "OR",
  32521. "children" : [ ],
  32522. "cpe_match" : [ {
  32523. "vulnerable" : true,
  32524. "cpe23Uri" : "cpe:2.3:a:qibosoft:qibocms:v7:*:*:*:*:*:*:*",
  32525. "cpe_name" : [ ]
  32526. } ]
  32527. } ]
  32528. },
  32529. "impact" : {
  32530. "baseMetricV3" : {
  32531. "cvssV3" : {
  32532. "version" : "3.1",
  32533. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  32534. "attackVector" : "NETWORK",
  32535. "attackComplexity" : "LOW",
  32536. "privilegesRequired" : "NONE",
  32537. "userInteraction" : "REQUIRED",
  32538. "scope" : "CHANGED",
  32539. "confidentialityImpact" : "LOW",
  32540. "integrityImpact" : "LOW",
  32541. "availabilityImpact" : "NONE",
  32542. "baseScore" : 6.1,
  32543. "baseSeverity" : "MEDIUM"
  32544. },
  32545. "exploitabilityScore" : 2.8,
  32546. "impactScore" : 2.7
  32547. },
  32548. "baseMetricV2" : {
  32549. "cvssV2" : {
  32550. "version" : "2.0",
  32551. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  32552. "accessVector" : "NETWORK",
  32553. "accessComplexity" : "MEDIUM",
  32554. "authentication" : "NONE",
  32555. "confidentialityImpact" : "NONE",
  32556. "integrityImpact" : "PARTIAL",
  32557. "availabilityImpact" : "NONE",
  32558. "baseScore" : 4.3
  32559. },
  32560. "severity" : "MEDIUM",
  32561. "exploitabilityScore" : 8.6,
  32562. "impactScore" : 2.9,
  32563. "acInsufInfo" : false,
  32564. "obtainAllPrivilege" : false,
  32565. "obtainUserPrivilege" : false,
  32566. "obtainOtherPrivilege" : false,
  32567. "userInteractionRequired" : false
  32568. }
  32569. },
  32570. "publishedDate" : "2021-04-28T16:15Z",
  32571. "lastModifiedDate" : "2021-05-10T14:13Z"
  32572. }, {
  32573. "cve" : {
  32574. "data_type" : "CVE",
  32575. "data_format" : "MITRE",
  32576. "data_version" : "4.0",
  32577. "CVE_data_meta" : {
  32578. "ID" : "CVE-2020-17999",
  32579. "ASSIGNER" : "cve@mitre.org"
  32580. },
  32581. "problemtype" : {
  32582. "problemtype_data" : [ {
  32583. "description" : [ {
  32584. "lang" : "en",
  32585. "value" : "CWE-79"
  32586. } ]
  32587. } ]
  32588. },
  32589. "references" : {
  32590. "reference_data" : [ {
  32591. "url" : "https://github.com/bg5sbk/MiniCMS/issues/27",
  32592. "name" : "https://github.com/bg5sbk/MiniCMS/issues/27",
  32593. "refsource" : "MISC",
  32594. "tags" : [ "Exploit", "Third Party Advisory" ]
  32595. } ]
  32596. },
  32597. "description" : {
  32598. "description_data" : [ {
  32599. "lang" : "en",
  32600. "value" : "Cross Site Scripting (XSS) in MiniCMS v1.10 allows remote attackers to execute arbitrary code by injecting commands via a crafted HTTP request to the component \"/mc-admin/post-edit.php\"."
  32601. } ]
  32602. }
  32603. },
  32604. "configurations" : {
  32605. "CVE_data_version" : "4.0",
  32606. "nodes" : [ {
  32607. "operator" : "OR",
  32608. "children" : [ ],
  32609. "cpe_match" : [ {
  32610. "vulnerable" : true,
  32611. "cpe23Uri" : "cpe:2.3:a:1234n:minicms:1.10:*:*:*:*:*:*:*",
  32612. "cpe_name" : [ ]
  32613. } ]
  32614. } ]
  32615. },
  32616. "impact" : {
  32617. "baseMetricV3" : {
  32618. "cvssV3" : {
  32619. "version" : "3.1",
  32620. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  32621. "attackVector" : "NETWORK",
  32622. "attackComplexity" : "LOW",
  32623. "privilegesRequired" : "NONE",
  32624. "userInteraction" : "REQUIRED",
  32625. "scope" : "CHANGED",
  32626. "confidentialityImpact" : "LOW",
  32627. "integrityImpact" : "LOW",
  32628. "availabilityImpact" : "NONE",
  32629. "baseScore" : 6.1,
  32630. "baseSeverity" : "MEDIUM"
  32631. },
  32632. "exploitabilityScore" : 2.8,
  32633. "impactScore" : 2.7
  32634. },
  32635. "baseMetricV2" : {
  32636. "cvssV2" : {
  32637. "version" : "2.0",
  32638. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  32639. "accessVector" : "NETWORK",
  32640. "accessComplexity" : "MEDIUM",
  32641. "authentication" : "NONE",
  32642. "confidentialityImpact" : "NONE",
  32643. "integrityImpact" : "PARTIAL",
  32644. "availabilityImpact" : "NONE",
  32645. "baseScore" : 4.3
  32646. },
  32647. "severity" : "MEDIUM",
  32648. "exploitabilityScore" : 8.6,
  32649. "impactScore" : 2.9,
  32650. "acInsufInfo" : false,
  32651. "obtainAllPrivilege" : false,
  32652. "obtainUserPrivilege" : false,
  32653. "obtainOtherPrivilege" : false,
  32654. "userInteractionRequired" : true
  32655. }
  32656. },
  32657. "publishedDate" : "2021-04-28T16:15Z",
  32658. "lastModifiedDate" : "2021-05-05T20:15Z"
  32659. }, {
  32660. "cve" : {
  32661. "data_type" : "CVE",
  32662. "data_format" : "MITRE",
  32663. "data_version" : "4.0",
  32664. "CVE_data_meta" : {
  32665. "ID" : "CVE-2021-25147",
  32666. "ASSIGNER" : "security-alert@hpe.com"
  32667. },
  32668. "problemtype" : {
  32669. "problemtype_data" : [ {
  32670. "description" : [ {
  32671. "lang" : "en",
  32672. "value" : "CWE-287"
  32673. } ]
  32674. } ]
  32675. },
  32676. "references" : {
  32677. "reference_data" : [ {
  32678. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  32679. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-010.txt",
  32680. "refsource" : "MISC",
  32681. "tags" : [ "Vendor Advisory" ]
  32682. } ]
  32683. },
  32684. "description" : {
  32685. "description_data" : [ {
  32686. "lang" : "en",
  32687. "value" : "A remote authentication restriction bypass vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability."
  32688. } ]
  32689. }
  32690. },
  32691. "configurations" : {
  32692. "CVE_data_version" : "4.0",
  32693. "nodes" : [ {
  32694. "operator" : "OR",
  32695. "children" : [ ],
  32696. "cpe_match" : [ {
  32697. "vulnerable" : true,
  32698. "cpe23Uri" : "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
  32699. "versionEndExcluding" : "8.2.12.1",
  32700. "cpe_name" : [ ]
  32701. } ]
  32702. } ]
  32703. },
  32704. "impact" : {
  32705. "baseMetricV3" : {
  32706. "cvssV3" : {
  32707. "version" : "3.1",
  32708. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
  32709. "attackVector" : "NETWORK",
  32710. "attackComplexity" : "HIGH",
  32711. "privilegesRequired" : "NONE",
  32712. "userInteraction" : "NONE",
  32713. "scope" : "UNCHANGED",
  32714. "confidentialityImpact" : "HIGH",
  32715. "integrityImpact" : "HIGH",
  32716. "availabilityImpact" : "HIGH",
  32717. "baseScore" : 8.1,
  32718. "baseSeverity" : "HIGH"
  32719. },
  32720. "exploitabilityScore" : 2.2,
  32721. "impactScore" : 5.9
  32722. },
  32723. "baseMetricV2" : {
  32724. "cvssV2" : {
  32725. "version" : "2.0",
  32726. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  32727. "accessVector" : "NETWORK",
  32728. "accessComplexity" : "MEDIUM",
  32729. "authentication" : "NONE",
  32730. "confidentialityImpact" : "PARTIAL",
  32731. "integrityImpact" : "PARTIAL",
  32732. "availabilityImpact" : "PARTIAL",
  32733. "baseScore" : 6.8
  32734. },
  32735. "severity" : "MEDIUM",
  32736. "exploitabilityScore" : 8.6,
  32737. "impactScore" : 6.4,
  32738. "acInsufInfo" : false,
  32739. "obtainAllPrivilege" : false,
  32740. "obtainUserPrivilege" : false,
  32741. "obtainOtherPrivilege" : false,
  32742. "userInteractionRequired" : false
  32743. }
  32744. },
  32745. "publishedDate" : "2021-04-28T15:15Z",
  32746. "lastModifiedDate" : "2021-05-08T03:30Z"
  32747. }, {
  32748. "cve" : {
  32749. "data_type" : "CVE",
  32750. "data_format" : "MITRE",
  32751. "data_version" : "4.0",
  32752. "CVE_data_meta" : {
  32753. "ID" : "CVE-2020-7123",
  32754. "ASSIGNER" : "security-alert@hpe.com"
  32755. },
  32756. "problemtype" : {
  32757. "problemtype_data" : [ {
  32758. "description" : [ {
  32759. "lang" : "en",
  32760. "value" : "CWE-269"
  32761. } ]
  32762. } ]
  32763. },
  32764. "references" : {
  32765. "reference_data" : [ {
  32766. "url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  32767. "name" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt",
  32768. "refsource" : "MISC",
  32769. "tags" : [ "Vendor Advisory" ]
  32770. } ]
  32771. },
  32772. "description" : {
  32773. "description_data" : [ {
  32774. "lang" : "en",
  32775. "value" : "A local escalation of privilege vulnerability was discovered in Aruba ClearPass Policy Manager version(s) prior to 6.9.5, 6.8.9, 6.7.14-HF1. Aruba has released patches for Aruba ClearPass Policy Manager that address this security vulnerability."
  32776. } ]
  32777. }
  32778. },
  32779. "configurations" : {
  32780. "CVE_data_version" : "4.0",
  32781. "nodes" : [ {
  32782. "operator" : "OR",
  32783. "children" : [ ],
  32784. "cpe_match" : [ {
  32785. "vulnerable" : true,
  32786. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*",
  32787. "versionStartIncluding" : "6.7.0",
  32788. "versionEndExcluding" : "6.7.12",
  32789. "cpe_name" : [ ]
  32790. }, {
  32791. "vulnerable" : true,
  32792. "cpe23Uri" : "cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*",
  32793. "versionStartIncluding" : "6.8.0",
  32794. "versionEndExcluding" : "6.8.5",
  32795. "cpe_name" : [ ]
  32796. } ]
  32797. } ]
  32798. },
  32799. "impact" : {
  32800. "baseMetricV3" : {
  32801. "cvssV3" : {
  32802. "version" : "3.1",
  32803. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  32804. "attackVector" : "LOCAL",
  32805. "attackComplexity" : "LOW",
  32806. "privilegesRequired" : "LOW",
  32807. "userInteraction" : "NONE",
  32808. "scope" : "UNCHANGED",
  32809. "confidentialityImpact" : "HIGH",
  32810. "integrityImpact" : "HIGH",
  32811. "availabilityImpact" : "HIGH",
  32812. "baseScore" : 7.8,
  32813. "baseSeverity" : "HIGH"
  32814. },
  32815. "exploitabilityScore" : 1.8,
  32816. "impactScore" : 5.9
  32817. },
  32818. "baseMetricV2" : {
  32819. "cvssV2" : {
  32820. "version" : "2.0",
  32821. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  32822. "accessVector" : "LOCAL",
  32823. "accessComplexity" : "LOW",
  32824. "authentication" : "NONE",
  32825. "confidentialityImpact" : "COMPLETE",
  32826. "integrityImpact" : "COMPLETE",
  32827. "availabilityImpact" : "COMPLETE",
  32828. "baseScore" : 7.2
  32829. },
  32830. "severity" : "HIGH",
  32831. "exploitabilityScore" : 3.9,
  32832. "impactScore" : 10.0,
  32833. "acInsufInfo" : false,
  32834. "obtainAllPrivilege" : false,
  32835. "obtainUserPrivilege" : false,
  32836. "obtainOtherPrivilege" : false,
  32837. "userInteractionRequired" : false
  32838. }
  32839. },
  32840. "publishedDate" : "2021-04-28T15:15Z",
  32841. "lastModifiedDate" : "2021-05-06T22:13Z"
  32842. }, {
  32843. "cve" : {
  32844. "data_type" : "CVE",
  32845. "data_format" : "MITRE",
  32846. "data_version" : "4.0",
  32847. "CVE_data_meta" : {
  32848. "ID" : "CVE-2020-21993",
  32849. "ASSIGNER" : "cve@mitre.org"
  32850. },
  32851. "problemtype" : {
  32852. "problemtype_data" : [ {
  32853. "description" : [ {
  32854. "lang" : "en",
  32855. "value" : "CWE-79"
  32856. } ]
  32857. } ]
  32858. },
  32859. "references" : {
  32860. "reference_data" : [ {
  32861. "url" : "https://cxsecurity.com/issue/WLB-2020010032",
  32862. "name" : "https://cxsecurity.com/issue/WLB-2020010032",
  32863. "refsource" : "MISC",
  32864. "tags" : [ "Exploit", "Third Party Advisory" ]
  32865. }, {
  32866. "url" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5551.php",
  32867. "name" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5551.php",
  32868. "refsource" : "MISC",
  32869. "tags" : [ "Exploit", "Third Party Advisory" ]
  32870. } ]
  32871. },
  32872. "description" : {
  32873. "description_data" : [ {
  32874. "lang" : "en",
  32875. "value" : "In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site."
  32876. } ]
  32877. }
  32878. },
  32879. "configurations" : {
  32880. "CVE_data_version" : "4.0",
  32881. "nodes" : [ {
  32882. "operator" : "OR",
  32883. "children" : [ ],
  32884. "cpe_match" : [ {
  32885. "vulnerable" : true,
  32886. "cpe23Uri" : "cpe:2.3:a:wems:enterprise_manager:2.19.7959:*:*:*:*:*:*:*",
  32887. "cpe_name" : [ ]
  32888. }, {
  32889. "vulnerable" : true,
  32890. "cpe23Uri" : "cpe:2.3:a:wems:enterprise_manager:2.55.8782:*:*:*:*:*:*:*",
  32891. "cpe_name" : [ ]
  32892. }, {
  32893. "vulnerable" : true,
  32894. "cpe23Uri" : "cpe:2.3:a:wems:enterprise_manager:2.55.8806:*:*:*:*:*:*:*",
  32895. "cpe_name" : [ ]
  32896. }, {
  32897. "vulnerable" : true,
  32898. "cpe23Uri" : "cpe:2.3:a:wems:enterprise_manager:2.58.8903:*:*:*:*:*:*:*",
  32899. "cpe_name" : [ ]
  32900. } ]
  32901. } ]
  32902. },
  32903. "impact" : {
  32904. "baseMetricV3" : {
  32905. "cvssV3" : {
  32906. "version" : "3.1",
  32907. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  32908. "attackVector" : "NETWORK",
  32909. "attackComplexity" : "LOW",
  32910. "privilegesRequired" : "NONE",
  32911. "userInteraction" : "REQUIRED",
  32912. "scope" : "CHANGED",
  32913. "confidentialityImpact" : "LOW",
  32914. "integrityImpact" : "LOW",
  32915. "availabilityImpact" : "NONE",
  32916. "baseScore" : 6.1,
  32917. "baseSeverity" : "MEDIUM"
  32918. },
  32919. "exploitabilityScore" : 2.8,
  32920. "impactScore" : 2.7
  32921. },
  32922. "baseMetricV2" : {
  32923. "cvssV2" : {
  32924. "version" : "2.0",
  32925. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  32926. "accessVector" : "NETWORK",
  32927. "accessComplexity" : "MEDIUM",
  32928. "authentication" : "NONE",
  32929. "confidentialityImpact" : "NONE",
  32930. "integrityImpact" : "PARTIAL",
  32931. "availabilityImpact" : "NONE",
  32932. "baseScore" : 4.3
  32933. },
  32934. "severity" : "MEDIUM",
  32935. "exploitabilityScore" : 8.6,
  32936. "impactScore" : 2.9,
  32937. "acInsufInfo" : false,
  32938. "obtainAllPrivilege" : false,
  32939. "obtainUserPrivilege" : false,
  32940. "obtainOtherPrivilege" : false,
  32941. "userInteractionRequired" : true
  32942. }
  32943. },
  32944. "publishedDate" : "2021-04-28T15:15Z",
  32945. "lastModifiedDate" : "2021-05-05T20:25Z"
  32946. }, {
  32947. "cve" : {
  32948. "data_type" : "CVE",
  32949. "data_format" : "MITRE",
  32950. "data_version" : "4.0",
  32951. "CVE_data_meta" : {
  32952. "ID" : "CVE-2021-3508",
  32953. "ASSIGNER" : "security@elastic.co"
  32954. },
  32955. "problemtype" : {
  32956. "problemtype_data" : [ {
  32957. "description" : [ {
  32958. "lang" : "en",
  32959. "value" : "CWE-835"
  32960. } ]
  32961. } ]
  32962. },
  32963. "references" : {
  32964. "reference_data" : [ {
  32965. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1951198",
  32966. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1951198",
  32967. "refsource" : "MISC",
  32968. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  32969. }, {
  32970. "url" : "https://github.com/enferex/pdfresurrect/issues/17",
  32971. "name" : "https://github.com/enferex/pdfresurrect/issues/17",
  32972. "refsource" : "MISC",
  32973. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  32974. } ]
  32975. },
  32976. "description" : {
  32977. "description_data" : [ {
  32978. "lang" : "en",
  32979. "value" : "A flaw was found in PDFResurrect in version 0.22b. There is an infinite loop in get_xref_linear_skipped() in pdf.c via a crafted PDF file."
  32980. } ]
  32981. }
  32982. },
  32983. "configurations" : {
  32984. "CVE_data_version" : "4.0",
  32985. "nodes" : [ {
  32986. "operator" : "OR",
  32987. "children" : [ ],
  32988. "cpe_match" : [ {
  32989. "vulnerable" : true,
  32990. "cpe23Uri" : "cpe:2.3:a:pdfresurrect_project:pdfresurrect:0.22b:*:*:*:*:*:*:*",
  32991. "cpe_name" : [ ]
  32992. } ]
  32993. } ]
  32994. },
  32995. "impact" : {
  32996. "baseMetricV3" : {
  32997. "cvssV3" : {
  32998. "version" : "3.1",
  32999. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  33000. "attackVector" : "LOCAL",
  33001. "attackComplexity" : "LOW",
  33002. "privilegesRequired" : "NONE",
  33003. "userInteraction" : "REQUIRED",
  33004. "scope" : "UNCHANGED",
  33005. "confidentialityImpact" : "NONE",
  33006. "integrityImpact" : "NONE",
  33007. "availabilityImpact" : "HIGH",
  33008. "baseScore" : 5.5,
  33009. "baseSeverity" : "MEDIUM"
  33010. },
  33011. "exploitabilityScore" : 1.8,
  33012. "impactScore" : 3.6
  33013. },
  33014. "baseMetricV2" : {
  33015. "cvssV2" : {
  33016. "version" : "2.0",
  33017. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  33018. "accessVector" : "NETWORK",
  33019. "accessComplexity" : "MEDIUM",
  33020. "authentication" : "NONE",
  33021. "confidentialityImpact" : "NONE",
  33022. "integrityImpact" : "NONE",
  33023. "availabilityImpact" : "PARTIAL",
  33024. "baseScore" : 4.3
  33025. },
  33026. "severity" : "MEDIUM",
  33027. "exploitabilityScore" : 8.6,
  33028. "impactScore" : 2.9,
  33029. "acInsufInfo" : false,
  33030. "obtainAllPrivilege" : false,
  33031. "obtainUserPrivilege" : false,
  33032. "obtainOtherPrivilege" : false,
  33033. "userInteractionRequired" : true
  33034. }
  33035. },
  33036. "publishedDate" : "2021-04-28T14:15Z",
  33037. "lastModifiedDate" : "2021-05-05T20:16Z"
  33038. }, {
  33039. "cve" : {
  33040. "data_type" : "CVE",
  33041. "data_format" : "MITRE",
  33042. "data_version" : "4.0",
  33043. "CVE_data_meta" : {
  33044. "ID" : "CVE-2021-29388",
  33045. "ASSIGNER" : "cve@mitre.org"
  33046. },
  33047. "problemtype" : {
  33048. "problemtype_data" : [ {
  33049. "description" : [ {
  33050. "lang" : "en",
  33051. "value" : "CWE-79"
  33052. } ]
  33053. } ]
  33054. },
  33055. "references" : {
  33056. "reference_data" : [ {
  33057. "url" : "https://www.sourcecodester.com/php/14403/budget-management-system.html",
  33058. "name" : "https://www.sourcecodester.com/php/14403/budget-management-system.html",
  33059. "refsource" : "MISC",
  33060. "tags" : [ "Product" ]
  33061. }, {
  33062. "url" : "https://www.exploit-db.com/exploits/49723",
  33063. "name" : "https://www.exploit-db.com/exploits/49723",
  33064. "refsource" : "MISC",
  33065. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  33066. } ]
  33067. },
  33068. "description" : {
  33069. "description_data" : [ {
  33070. "lang" : "en",
  33071. "value" : "A stored cross-site scripting (XSS) vulnerability in SourceCodester Budget Management System 1.0 allows users to inject and store arbitrary JavaScript code in index.php via vulnerable field 'Budget Title'."
  33072. } ]
  33073. }
  33074. },
  33075. "configurations" : {
  33076. "CVE_data_version" : "4.0",
  33077. "nodes" : [ {
  33078. "operator" : "OR",
  33079. "children" : [ ],
  33080. "cpe_match" : [ {
  33081. "vulnerable" : true,
  33082. "cpe23Uri" : "cpe:2.3:a:budget_management_system_project:budget_management_system:1.0:*:*:*:*:*:*:*",
  33083. "cpe_name" : [ ]
  33084. } ]
  33085. } ]
  33086. },
  33087. "impact" : {
  33088. "baseMetricV3" : {
  33089. "cvssV3" : {
  33090. "version" : "3.1",
  33091. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  33092. "attackVector" : "NETWORK",
  33093. "attackComplexity" : "LOW",
  33094. "privilegesRequired" : "LOW",
  33095. "userInteraction" : "REQUIRED",
  33096. "scope" : "CHANGED",
  33097. "confidentialityImpact" : "LOW",
  33098. "integrityImpact" : "LOW",
  33099. "availabilityImpact" : "NONE",
  33100. "baseScore" : 5.4,
  33101. "baseSeverity" : "MEDIUM"
  33102. },
  33103. "exploitabilityScore" : 2.3,
  33104. "impactScore" : 2.7
  33105. },
  33106. "baseMetricV2" : {
  33107. "cvssV2" : {
  33108. "version" : "2.0",
  33109. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  33110. "accessVector" : "NETWORK",
  33111. "accessComplexity" : "MEDIUM",
  33112. "authentication" : "SINGLE",
  33113. "confidentialityImpact" : "NONE",
  33114. "integrityImpact" : "PARTIAL",
  33115. "availabilityImpact" : "NONE",
  33116. "baseScore" : 3.5
  33117. },
  33118. "severity" : "LOW",
  33119. "exploitabilityScore" : 6.8,
  33120. "impactScore" : 2.9,
  33121. "acInsufInfo" : false,
  33122. "obtainAllPrivilege" : false,
  33123. "obtainUserPrivilege" : false,
  33124. "obtainOtherPrivilege" : false,
  33125. "userInteractionRequired" : true
  33126. }
  33127. },
  33128. "publishedDate" : "2021-04-28T14:15Z",
  33129. "lastModifiedDate" : "2021-05-05T20:33Z"
  33130. }, {
  33131. "cve" : {
  33132. "data_type" : "CVE",
  33133. "data_format" : "MITRE",
  33134. "data_version" : "4.0",
  33135. "CVE_data_meta" : {
  33136. "ID" : "CVE-2021-29387",
  33137. "ASSIGNER" : "cve@mitre.org"
  33138. },
  33139. "problemtype" : {
  33140. "problemtype_data" : [ {
  33141. "description" : [ {
  33142. "lang" : "en",
  33143. "value" : "CWE-79"
  33144. } ]
  33145. } ]
  33146. },
  33147. "references" : {
  33148. "reference_data" : [ {
  33149. "url" : "https://www.exploit-db.com/exploits/49722",
  33150. "name" : "https://www.exploit-db.com/exploits/49722",
  33151. "refsource" : "MISC",
  33152. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  33153. }, {
  33154. "url" : "https://www.sourcecodester.com/php/11327/equipment-inventory.html",
  33155. "name" : "https://www.sourcecodester.com/php/11327/equipment-inventory.html",
  33156. "refsource" : "MISC",
  33157. "tags" : [ "Product" ]
  33158. } ]
  33159. },
  33160. "description" : {
  33161. "description_data" : [ {
  33162. "lang" : "en",
  33163. "value" : "Multiple stored cross-site scripting (XSS) vulnerabilities in Sourcecodester Equipment Inventory System 1.0 allow remote attackers to inject arbitrary javascript via any \"Add\" sections, such as Add Item , Employee and Position or others in the Name Parameters."
  33164. } ]
  33165. }
  33166. },
  33167. "configurations" : {
  33168. "CVE_data_version" : "4.0",
  33169. "nodes" : [ {
  33170. "operator" : "OR",
  33171. "children" : [ ],
  33172. "cpe_match" : [ {
  33173. "vulnerable" : true,
  33174. "cpe23Uri" : "cpe:2.3:a:equipment_inventory_system_project:equipment_inventory_system:1.0:*:*:*:*:*:*:*",
  33175. "cpe_name" : [ ]
  33176. } ]
  33177. } ]
  33178. },
  33179. "impact" : {
  33180. "baseMetricV3" : {
  33181. "cvssV3" : {
  33182. "version" : "3.1",
  33183. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  33184. "attackVector" : "NETWORK",
  33185. "attackComplexity" : "LOW",
  33186. "privilegesRequired" : "LOW",
  33187. "userInteraction" : "REQUIRED",
  33188. "scope" : "CHANGED",
  33189. "confidentialityImpact" : "LOW",
  33190. "integrityImpact" : "LOW",
  33191. "availabilityImpact" : "NONE",
  33192. "baseScore" : 5.4,
  33193. "baseSeverity" : "MEDIUM"
  33194. },
  33195. "exploitabilityScore" : 2.3,
  33196. "impactScore" : 2.7
  33197. },
  33198. "baseMetricV2" : {
  33199. "cvssV2" : {
  33200. "version" : "2.0",
  33201. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  33202. "accessVector" : "NETWORK",
  33203. "accessComplexity" : "MEDIUM",
  33204. "authentication" : "SINGLE",
  33205. "confidentialityImpact" : "NONE",
  33206. "integrityImpact" : "PARTIAL",
  33207. "availabilityImpact" : "NONE",
  33208. "baseScore" : 3.5
  33209. },
  33210. "severity" : "LOW",
  33211. "exploitabilityScore" : 6.8,
  33212. "impactScore" : 2.9,
  33213. "acInsufInfo" : false,
  33214. "obtainAllPrivilege" : false,
  33215. "obtainUserPrivilege" : false,
  33216. "obtainOtherPrivilege" : false,
  33217. "userInteractionRequired" : true
  33218. }
  33219. },
  33220. "publishedDate" : "2021-04-28T14:15Z",
  33221. "lastModifiedDate" : "2021-05-05T20:33Z"
  33222. }, {
  33223. "cve" : {
  33224. "data_type" : "CVE",
  33225. "data_format" : "MITRE",
  33226. "data_version" : "4.0",
  33227. "CVE_data_meta" : {
  33228. "ID" : "CVE-2021-29159",
  33229. "ASSIGNER" : "cve@mitre.org"
  33230. },
  33231. "problemtype" : {
  33232. "problemtype_data" : [ {
  33233. "description" : [ {
  33234. "lang" : "en",
  33235. "value" : "CWE-79"
  33236. } ]
  33237. } ]
  33238. },
  33239. "references" : {
  33240. "reference_data" : [ {
  33241. "url" : "https://support.sonatype.com/hc/en-us/categories/201980768-Welcome-to-the-Sonatype-Support-Knowledge-Base",
  33242. "name" : "https://support.sonatype.com/hc/en-us/categories/201980768-Welcome-to-the-Sonatype-Support-Knowledge-Base",
  33243. "refsource" : "MISC",
  33244. "tags" : [ "Vendor Advisory" ]
  33245. }, {
  33246. "url" : "https://support.sonatype.com/hc/en-us/articles/1500005031082",
  33247. "name" : "https://support.sonatype.com/hc/en-us/articles/1500005031082",
  33248. "refsource" : "MISC",
  33249. "tags" : [ "Vendor Advisory" ]
  33250. } ]
  33251. },
  33252. "description" : {
  33253. "description_data" : [ {
  33254. "lang" : "en",
  33255. "value" : "A cross-site scripting (XSS) vulnerability has been discovered in Nexus Repository Manager 3.x before 3.30.1. An attacker with a local account can create entities with crafted properties that, when viewed by an administrator, can execute arbitrary JavaScript in the context of the NXRM application."
  33256. } ]
  33257. }
  33258. },
  33259. "configurations" : {
  33260. "CVE_data_version" : "4.0",
  33261. "nodes" : [ {
  33262. "operator" : "OR",
  33263. "children" : [ ],
  33264. "cpe_match" : [ {
  33265. "vulnerable" : true,
  33266. "cpe23Uri" : "cpe:2.3:a:sonatype:nexus_repository_manager:*:*:*:*:*:*:*:*",
  33267. "versionStartIncluding" : "3.23.0",
  33268. "versionEndExcluding" : "3.30.1",
  33269. "cpe_name" : [ ]
  33270. } ]
  33271. } ]
  33272. },
  33273. "impact" : {
  33274. "baseMetricV3" : {
  33275. "cvssV3" : {
  33276. "version" : "3.1",
  33277. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  33278. "attackVector" : "NETWORK",
  33279. "attackComplexity" : "LOW",
  33280. "privilegesRequired" : "NONE",
  33281. "userInteraction" : "REQUIRED",
  33282. "scope" : "CHANGED",
  33283. "confidentialityImpact" : "LOW",
  33284. "integrityImpact" : "LOW",
  33285. "availabilityImpact" : "NONE",
  33286. "baseScore" : 6.1,
  33287. "baseSeverity" : "MEDIUM"
  33288. },
  33289. "exploitabilityScore" : 2.8,
  33290. "impactScore" : 2.7
  33291. },
  33292. "baseMetricV2" : {
  33293. "cvssV2" : {
  33294. "version" : "2.0",
  33295. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  33296. "accessVector" : "NETWORK",
  33297. "accessComplexity" : "MEDIUM",
  33298. "authentication" : "NONE",
  33299. "confidentialityImpact" : "NONE",
  33300. "integrityImpact" : "PARTIAL",
  33301. "availabilityImpact" : "NONE",
  33302. "baseScore" : 4.3
  33303. },
  33304. "severity" : "MEDIUM",
  33305. "exploitabilityScore" : 8.6,
  33306. "impactScore" : 2.9,
  33307. "acInsufInfo" : false,
  33308. "obtainAllPrivilege" : false,
  33309. "obtainUserPrivilege" : false,
  33310. "obtainOtherPrivilege" : false,
  33311. "userInteractionRequired" : true
  33312. }
  33313. },
  33314. "publishedDate" : "2021-04-28T14:15Z",
  33315. "lastModifiedDate" : "2021-05-05T20:16Z"
  33316. }, {
  33317. "cve" : {
  33318. "data_type" : "CVE",
  33319. "data_format" : "MITRE",
  33320. "data_version" : "4.0",
  33321. "CVE_data_meta" : {
  33322. "ID" : "CVE-2020-18020",
  33323. "ASSIGNER" : "cve@mitre.org"
  33324. },
  33325. "problemtype" : {
  33326. "problemtype_data" : [ {
  33327. "description" : [ {
  33328. "lang" : "en",
  33329. "value" : "CWE-89"
  33330. } ]
  33331. } ]
  33332. },
  33333. "references" : {
  33334. "reference_data" : [ {
  33335. "url" : "https://gitee.com/koyshe/phpshe/issues/IQ8S8",
  33336. "name" : "https://gitee.com/koyshe/phpshe/issues/IQ8S8",
  33337. "refsource" : "MISC",
  33338. "tags" : [ "Exploit", "Third Party Advisory" ]
  33339. } ]
  33340. },
  33341. "description" : {
  33342. "description_data" : [ {
  33343. "lang" : "en",
  33344. "value" : "SQL Injection in PHPSHE Mall System v1.7 allows remote attackers to execute arbitrary code by injecting SQL commands into the \"user_phone\" parameter of a crafted HTTP request to the \"admin.php\" component."
  33345. } ]
  33346. }
  33347. },
  33348. "configurations" : {
  33349. "CVE_data_version" : "4.0",
  33350. "nodes" : [ {
  33351. "operator" : "OR",
  33352. "children" : [ ],
  33353. "cpe_match" : [ {
  33354. "vulnerable" : true,
  33355. "cpe23Uri" : "cpe:2.3:a:phpshe:mall_system:1.7:*:*:*:*:*:*:*",
  33356. "cpe_name" : [ ]
  33357. } ]
  33358. } ]
  33359. },
  33360. "impact" : {
  33361. "baseMetricV3" : {
  33362. "cvssV3" : {
  33363. "version" : "3.1",
  33364. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  33365. "attackVector" : "NETWORK",
  33366. "attackComplexity" : "LOW",
  33367. "privilegesRequired" : "NONE",
  33368. "userInteraction" : "NONE",
  33369. "scope" : "UNCHANGED",
  33370. "confidentialityImpact" : "HIGH",
  33371. "integrityImpact" : "HIGH",
  33372. "availabilityImpact" : "HIGH",
  33373. "baseScore" : 9.8,
  33374. "baseSeverity" : "CRITICAL"
  33375. },
  33376. "exploitabilityScore" : 3.9,
  33377. "impactScore" : 5.9
  33378. },
  33379. "baseMetricV2" : {
  33380. "cvssV2" : {
  33381. "version" : "2.0",
  33382. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  33383. "accessVector" : "NETWORK",
  33384. "accessComplexity" : "LOW",
  33385. "authentication" : "NONE",
  33386. "confidentialityImpact" : "PARTIAL",
  33387. "integrityImpact" : "PARTIAL",
  33388. "availabilityImpact" : "PARTIAL",
  33389. "baseScore" : 7.5
  33390. },
  33391. "severity" : "HIGH",
  33392. "exploitabilityScore" : 10.0,
  33393. "impactScore" : 6.4,
  33394. "acInsufInfo" : false,
  33395. "obtainAllPrivilege" : false,
  33396. "obtainUserPrivilege" : false,
  33397. "obtainOtherPrivilege" : false,
  33398. "userInteractionRequired" : false
  33399. }
  33400. },
  33401. "publishedDate" : "2021-04-28T14:15Z",
  33402. "lastModifiedDate" : "2021-05-05T20:25Z"
  33403. }, {
  33404. "cve" : {
  33405. "data_type" : "CVE",
  33406. "data_format" : "MITRE",
  33407. "data_version" : "4.0",
  33408. "CVE_data_meta" : {
  33409. "ID" : "CVE-2020-18019",
  33410. "ASSIGNER" : "cve@mitre.org"
  33411. },
  33412. "problemtype" : {
  33413. "problemtype_data" : [ {
  33414. "description" : [ {
  33415. "lang" : "en",
  33416. "value" : "CWE-89"
  33417. } ]
  33418. } ]
  33419. },
  33420. "references" : {
  33421. "reference_data" : [ {
  33422. "url" : "https://github.com/si1ence90/xinhu1.8.3_SqlInject",
  33423. "name" : "https://github.com/si1ence90/xinhu1.8.3_SqlInject",
  33424. "refsource" : "MISC",
  33425. "tags" : [ "Exploit", "Third Party Advisory" ]
  33426. } ]
  33427. },
  33428. "description" : {
  33429. "description_data" : [ {
  33430. "lang" : "en",
  33431. "value" : "SQL Injection in Xinhu OA System v1.8.3 allows remote attackers to obtain sensitive information by injecting arbitrary commands into the \"typeid\" variable of the \"createfolderAjax\" function in the \"mode_worcAction.php\" component."
  33432. } ]
  33433. }
  33434. },
  33435. "configurations" : {
  33436. "CVE_data_version" : "4.0",
  33437. "nodes" : [ {
  33438. "operator" : "OR",
  33439. "children" : [ ],
  33440. "cpe_match" : [ {
  33441. "vulnerable" : true,
  33442. "cpe23Uri" : "cpe:2.3:a:xinfu:oa_system:1.8.3:*:*:*:*:*:*:*",
  33443. "cpe_name" : [ ]
  33444. } ]
  33445. } ]
  33446. },
  33447. "impact" : {
  33448. "baseMetricV3" : {
  33449. "cvssV3" : {
  33450. "version" : "3.1",
  33451. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  33452. "attackVector" : "NETWORK",
  33453. "attackComplexity" : "LOW",
  33454. "privilegesRequired" : "NONE",
  33455. "userInteraction" : "NONE",
  33456. "scope" : "UNCHANGED",
  33457. "confidentialityImpact" : "HIGH",
  33458. "integrityImpact" : "NONE",
  33459. "availabilityImpact" : "NONE",
  33460. "baseScore" : 7.5,
  33461. "baseSeverity" : "HIGH"
  33462. },
  33463. "exploitabilityScore" : 3.9,
  33464. "impactScore" : 3.6
  33465. },
  33466. "baseMetricV2" : {
  33467. "cvssV2" : {
  33468. "version" : "2.0",
  33469. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  33470. "accessVector" : "NETWORK",
  33471. "accessComplexity" : "LOW",
  33472. "authentication" : "NONE",
  33473. "confidentialityImpact" : "PARTIAL",
  33474. "integrityImpact" : "NONE",
  33475. "availabilityImpact" : "NONE",
  33476. "baseScore" : 5.0
  33477. },
  33478. "severity" : "MEDIUM",
  33479. "exploitabilityScore" : 10.0,
  33480. "impactScore" : 2.9,
  33481. "acInsufInfo" : false,
  33482. "obtainAllPrivilege" : false,
  33483. "obtainUserPrivilege" : false,
  33484. "obtainOtherPrivilege" : false,
  33485. "userInteractionRequired" : false
  33486. }
  33487. },
  33488. "publishedDate" : "2021-04-28T14:15Z",
  33489. "lastModifiedDate" : "2021-05-05T20:24Z"
  33490. }, {
  33491. "cve" : {
  33492. "data_type" : "CVE",
  33493. "data_format" : "MITRE",
  33494. "data_version" : "4.0",
  33495. "CVE_data_meta" : {
  33496. "ID" : "CVE-2021-22332",
  33497. "ASSIGNER" : "psirt@huawei.com"
  33498. },
  33499. "problemtype" : {
  33500. "problemtype_data" : [ {
  33501. "description" : [ {
  33502. "lang" : "en",
  33503. "value" : "CWE-415"
  33504. } ]
  33505. } ]
  33506. },
  33507. "references" : {
  33508. "reference_data" : [ {
  33509. "url" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-doublefree-en",
  33510. "name" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-doublefree-en",
  33511. "refsource" : "MISC",
  33512. "tags" : [ "Vendor Advisory" ]
  33513. } ]
  33514. },
  33515. "description" : {
  33516. "description_data" : [ {
  33517. "lang" : "en",
  33518. "value" : "There is a pointer double free vulnerability in some versions of CloudEngine 5800, CloudEngine 6800, CloudEngine 7800 and CloudEngine 12800. When a function is called, the same memory pointer is copied to two functional modules. Attackers can exploit this vulnerability by performing a malicious operation to cause the pointer double free. This may lead to module crash, compromising normal service."
  33519. } ]
  33520. }
  33521. },
  33522. "configurations" : {
  33523. "CVE_data_version" : "4.0",
  33524. "nodes" : [ {
  33525. "operator" : "AND",
  33526. "children" : [ {
  33527. "operator" : "OR",
  33528. "children" : [ ],
  33529. "cpe_match" : [ {
  33530. "vulnerable" : true,
  33531. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
  33532. "cpe_name" : [ ]
  33533. }, {
  33534. "vulnerable" : true,
  33535. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r003c00spc810:*:*:*:*:*:*:*",
  33536. "cpe_name" : [ ]
  33537. }, {
  33538. "vulnerable" : true,
  33539. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r005c00spc800:*:*:*:*:*:*:*",
  33540. "cpe_name" : [ ]
  33541. }, {
  33542. "vulnerable" : true,
  33543. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r005c10spc800:*:*:*:*:*:*:*",
  33544. "cpe_name" : [ ]
  33545. } ]
  33546. }, {
  33547. "operator" : "OR",
  33548. "children" : [ ],
  33549. "cpe_match" : [ {
  33550. "vulnerable" : false,
  33551. "cpe23Uri" : "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*",
  33552. "cpe_name" : [ ]
  33553. } ]
  33554. } ],
  33555. "cpe_match" : [ ]
  33556. }, {
  33557. "operator" : "AND",
  33558. "children" : [ {
  33559. "operator" : "OR",
  33560. "children" : [ ],
  33561. "cpe_match" : [ {
  33562. "vulnerable" : true,
  33563. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
  33564. "cpe_name" : [ ]
  33565. }, {
  33566. "vulnerable" : true,
  33567. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r003c00spc810:*:*:*:*:*:*:*",
  33568. "cpe_name" : [ ]
  33569. }, {
  33570. "vulnerable" : true,
  33571. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r005c00spc800:*:*:*:*:*:*:*",
  33572. "cpe_name" : [ ]
  33573. }, {
  33574. "vulnerable" : true,
  33575. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r005c10spc800:*:*:*:*:*:*:*",
  33576. "cpe_name" : [ ]
  33577. } ]
  33578. }, {
  33579. "operator" : "OR",
  33580. "children" : [ ],
  33581. "cpe_match" : [ {
  33582. "vulnerable" : false,
  33583. "cpe23Uri" : "cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*",
  33584. "cpe_name" : [ ]
  33585. } ]
  33586. } ],
  33587. "cpe_match" : [ ]
  33588. }, {
  33589. "operator" : "AND",
  33590. "children" : [ {
  33591. "operator" : "OR",
  33592. "children" : [ ],
  33593. "cpe_match" : [ {
  33594. "vulnerable" : true,
  33595. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
  33596. "cpe_name" : [ ]
  33597. }, {
  33598. "vulnerable" : true,
  33599. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r003c00spc810:*:*:*:*:*:*:*",
  33600. "cpe_name" : [ ]
  33601. }, {
  33602. "vulnerable" : true,
  33603. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r005c00spc800:*:*:*:*:*:*:*",
  33604. "cpe_name" : [ ]
  33605. }, {
  33606. "vulnerable" : true,
  33607. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r005c10spc800:*:*:*:*:*:*:*",
  33608. "cpe_name" : [ ]
  33609. } ]
  33610. }, {
  33611. "operator" : "OR",
  33612. "children" : [ ],
  33613. "cpe_match" : [ {
  33614. "vulnerable" : false,
  33615. "cpe23Uri" : "cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*",
  33616. "cpe_name" : [ ]
  33617. } ]
  33618. } ],
  33619. "cpe_match" : [ ]
  33620. }, {
  33621. "operator" : "AND",
  33622. "children" : [ {
  33623. "operator" : "OR",
  33624. "children" : [ ],
  33625. "cpe_match" : [ {
  33626. "vulnerable" : true,
  33627. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
  33628. "cpe_name" : [ ]
  33629. }, {
  33630. "vulnerable" : true,
  33631. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r003c00spc810:*:*:*:*:*:*:*",
  33632. "cpe_name" : [ ]
  33633. }, {
  33634. "vulnerable" : true,
  33635. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r005c00spc800:*:*:*:*:*:*:*",
  33636. "cpe_name" : [ ]
  33637. }, {
  33638. "vulnerable" : true,
  33639. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r005c10spc800:*:*:*:*:*:*:*",
  33640. "cpe_name" : [ ]
  33641. } ]
  33642. }, {
  33643. "operator" : "OR",
  33644. "children" : [ ],
  33645. "cpe_match" : [ {
  33646. "vulnerable" : false,
  33647. "cpe23Uri" : "cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*",
  33648. "cpe_name" : [ ]
  33649. } ]
  33650. } ],
  33651. "cpe_match" : [ ]
  33652. } ]
  33653. },
  33654. "impact" : {
  33655. "baseMetricV3" : {
  33656. "cvssV3" : {
  33657. "version" : "3.1",
  33658. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  33659. "attackVector" : "NETWORK",
  33660. "attackComplexity" : "LOW",
  33661. "privilegesRequired" : "NONE",
  33662. "userInteraction" : "NONE",
  33663. "scope" : "UNCHANGED",
  33664. "confidentialityImpact" : "NONE",
  33665. "integrityImpact" : "NONE",
  33666. "availabilityImpact" : "HIGH",
  33667. "baseScore" : 7.5,
  33668. "baseSeverity" : "HIGH"
  33669. },
  33670. "exploitabilityScore" : 3.9,
  33671. "impactScore" : 3.6
  33672. },
  33673. "baseMetricV2" : {
  33674. "cvssV2" : {
  33675. "version" : "2.0",
  33676. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  33677. "accessVector" : "NETWORK",
  33678. "accessComplexity" : "LOW",
  33679. "authentication" : "NONE",
  33680. "confidentialityImpact" : "NONE",
  33681. "integrityImpact" : "NONE",
  33682. "availabilityImpact" : "PARTIAL",
  33683. "baseScore" : 5.0
  33684. },
  33685. "severity" : "MEDIUM",
  33686. "exploitabilityScore" : 10.0,
  33687. "impactScore" : 2.9,
  33688. "acInsufInfo" : false,
  33689. "obtainAllPrivilege" : false,
  33690. "obtainUserPrivilege" : false,
  33691. "obtainOtherPrivilege" : false,
  33692. "userInteractionRequired" : false
  33693. }
  33694. },
  33695. "publishedDate" : "2021-04-28T13:15Z",
  33696. "lastModifiedDate" : "2021-05-08T02:54Z"
  33697. }, {
  33698. "cve" : {
  33699. "data_type" : "CVE",
  33700. "data_format" : "MITRE",
  33701. "data_version" : "4.0",
  33702. "CVE_data_meta" : {
  33703. "ID" : "CVE-2021-22331",
  33704. "ASSIGNER" : "psirt@huawei.com"
  33705. },
  33706. "problemtype" : {
  33707. "problemtype_data" : [ {
  33708. "description" : [ {
  33709. "lang" : "en",
  33710. "value" : "CWE-74"
  33711. } ]
  33712. } ]
  33713. },
  33714. "references" : {
  33715. "reference_data" : [ {
  33716. "url" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-js-en",
  33717. "name" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-js-en",
  33718. "refsource" : "MISC",
  33719. "tags" : [ "Vendor Advisory" ]
  33720. } ]
  33721. },
  33722. "description" : {
  33723. "description_data" : [ {
  33724. "lang" : "en",
  33725. "value" : "There is a JavaScript injection vulnerability in certain Huawei smartphones. A module does not verify some inputs sufficiently. Attackers can exploit this vulnerability by sending a malicious application request to launch JavaScript injection. This may compromise normal service. Affected product versions include HUAWEI P30 versions earlier than 10.1.0.165(C01E165R2P11), 11.0.0.118(C635E2R1P3), 11.0.0.120(C00E120R2P5), 11.0.0.138(C10E4R5P3), 11.0.0.138(C185E4R7P3), 11.0.0.138(C432E8R2P3), 11.0.0.138(C461E4R3P3), 11.0.0.138(C605E4R1P3), and 11.0.0.138(C636E4R3P3)."
  33726. } ]
  33727. }
  33728. },
  33729. "configurations" : {
  33730. "CVE_data_version" : "4.0",
  33731. "nodes" : [ {
  33732. "operator" : "AND",
  33733. "children" : [ {
  33734. "operator" : "OR",
  33735. "children" : [ ],
  33736. "cpe_match" : [ {
  33737. "vulnerable" : true,
  33738. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
  33739. "versionEndExcluding" : "10.1.0.165\\(c01e165r2p11\\)",
  33740. "cpe_name" : [ ]
  33741. } ]
  33742. }, {
  33743. "operator" : "OR",
  33744. "children" : [ ],
  33745. "cpe_match" : [ {
  33746. "vulnerable" : false,
  33747. "cpe23Uri" : "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
  33748. "cpe_name" : [ ]
  33749. } ]
  33750. } ],
  33751. "cpe_match" : [ ]
  33752. }, {
  33753. "operator" : "AND",
  33754. "children" : [ {
  33755. "operator" : "OR",
  33756. "children" : [ ],
  33757. "cpe_match" : [ {
  33758. "vulnerable" : true,
  33759. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
  33760. "versionEndExcluding" : "11.0.0.118\\(c635e2r1p3\\)",
  33761. "cpe_name" : [ ]
  33762. } ]
  33763. }, {
  33764. "operator" : "OR",
  33765. "children" : [ ],
  33766. "cpe_match" : [ {
  33767. "vulnerable" : false,
  33768. "cpe23Uri" : "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
  33769. "cpe_name" : [ ]
  33770. } ]
  33771. } ],
  33772. "cpe_match" : [ ]
  33773. }, {
  33774. "operator" : "AND",
  33775. "children" : [ {
  33776. "operator" : "OR",
  33777. "children" : [ ],
  33778. "cpe_match" : [ {
  33779. "vulnerable" : true,
  33780. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
  33781. "versionEndExcluding" : "11.0.0.120\\(c00e120r2p5\\)",
  33782. "cpe_name" : [ ]
  33783. } ]
  33784. }, {
  33785. "operator" : "OR",
  33786. "children" : [ ],
  33787. "cpe_match" : [ {
  33788. "vulnerable" : false,
  33789. "cpe23Uri" : "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
  33790. "cpe_name" : [ ]
  33791. } ]
  33792. } ],
  33793. "cpe_match" : [ ]
  33794. }, {
  33795. "operator" : "AND",
  33796. "children" : [ {
  33797. "operator" : "OR",
  33798. "children" : [ ],
  33799. "cpe_match" : [ {
  33800. "vulnerable" : true,
  33801. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
  33802. "versionEndExcluding" : "11.0.0.138\\(c10e4r5p3\\)",
  33803. "cpe_name" : [ ]
  33804. } ]
  33805. }, {
  33806. "operator" : "OR",
  33807. "children" : [ ],
  33808. "cpe_match" : [ {
  33809. "vulnerable" : false,
  33810. "cpe23Uri" : "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
  33811. "cpe_name" : [ ]
  33812. } ]
  33813. } ],
  33814. "cpe_match" : [ ]
  33815. }, {
  33816. "operator" : "AND",
  33817. "children" : [ {
  33818. "operator" : "OR",
  33819. "children" : [ ],
  33820. "cpe_match" : [ {
  33821. "vulnerable" : true,
  33822. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
  33823. "versionEndExcluding" : "11.0.0.138\\(c185e4r7p3\\)",
  33824. "cpe_name" : [ ]
  33825. } ]
  33826. }, {
  33827. "operator" : "OR",
  33828. "children" : [ ],
  33829. "cpe_match" : [ {
  33830. "vulnerable" : false,
  33831. "cpe23Uri" : "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
  33832. "cpe_name" : [ ]
  33833. } ]
  33834. } ],
  33835. "cpe_match" : [ ]
  33836. }, {
  33837. "operator" : "AND",
  33838. "children" : [ {
  33839. "operator" : "OR",
  33840. "children" : [ ],
  33841. "cpe_match" : [ {
  33842. "vulnerable" : true,
  33843. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
  33844. "versionEndExcluding" : "11.0.0.138\\(c432e8r2p3\\)",
  33845. "cpe_name" : [ ]
  33846. } ]
  33847. }, {
  33848. "operator" : "OR",
  33849. "children" : [ ],
  33850. "cpe_match" : [ {
  33851. "vulnerable" : false,
  33852. "cpe23Uri" : "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
  33853. "cpe_name" : [ ]
  33854. } ]
  33855. } ],
  33856. "cpe_match" : [ ]
  33857. }, {
  33858. "operator" : "AND",
  33859. "children" : [ {
  33860. "operator" : "OR",
  33861. "children" : [ ],
  33862. "cpe_match" : [ {
  33863. "vulnerable" : true,
  33864. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
  33865. "versionEndExcluding" : "11.0.0.138\\(c461e4r3p3\\)",
  33866. "cpe_name" : [ ]
  33867. } ]
  33868. }, {
  33869. "operator" : "OR",
  33870. "children" : [ ],
  33871. "cpe_match" : [ {
  33872. "vulnerable" : false,
  33873. "cpe23Uri" : "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
  33874. "cpe_name" : [ ]
  33875. } ]
  33876. } ],
  33877. "cpe_match" : [ ]
  33878. }, {
  33879. "operator" : "AND",
  33880. "children" : [ {
  33881. "operator" : "OR",
  33882. "children" : [ ],
  33883. "cpe_match" : [ {
  33884. "vulnerable" : true,
  33885. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
  33886. "versionEndExcluding" : "11.0.0.138\\(c605e4r1p3\\)",
  33887. "cpe_name" : [ ]
  33888. } ]
  33889. }, {
  33890. "operator" : "OR",
  33891. "children" : [ ],
  33892. "cpe_match" : [ {
  33893. "vulnerable" : false,
  33894. "cpe23Uri" : "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
  33895. "cpe_name" : [ ]
  33896. } ]
  33897. } ],
  33898. "cpe_match" : [ ]
  33899. }, {
  33900. "operator" : "AND",
  33901. "children" : [ {
  33902. "operator" : "OR",
  33903. "children" : [ ],
  33904. "cpe_match" : [ {
  33905. "vulnerable" : true,
  33906. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
  33907. "versionEndExcluding" : "11.0.0.138\\(c636e4r3p3\\)",
  33908. "cpe_name" : [ ]
  33909. } ]
  33910. }, {
  33911. "operator" : "OR",
  33912. "children" : [ ],
  33913. "cpe_match" : [ {
  33914. "vulnerable" : false,
  33915. "cpe23Uri" : "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
  33916. "cpe_name" : [ ]
  33917. } ]
  33918. } ],
  33919. "cpe_match" : [ ]
  33920. } ]
  33921. },
  33922. "impact" : {
  33923. "baseMetricV3" : {
  33924. "cvssV3" : {
  33925. "version" : "3.1",
  33926. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  33927. "attackVector" : "NETWORK",
  33928. "attackComplexity" : "LOW",
  33929. "privilegesRequired" : "NONE",
  33930. "userInteraction" : "NONE",
  33931. "scope" : "UNCHANGED",
  33932. "confidentialityImpact" : "NONE",
  33933. "integrityImpact" : "NONE",
  33934. "availabilityImpact" : "HIGH",
  33935. "baseScore" : 7.5,
  33936. "baseSeverity" : "HIGH"
  33937. },
  33938. "exploitabilityScore" : 3.9,
  33939. "impactScore" : 3.6
  33940. },
  33941. "baseMetricV2" : {
  33942. "cvssV2" : {
  33943. "version" : "2.0",
  33944. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  33945. "accessVector" : "NETWORK",
  33946. "accessComplexity" : "LOW",
  33947. "authentication" : "NONE",
  33948. "confidentialityImpact" : "NONE",
  33949. "integrityImpact" : "NONE",
  33950. "availabilityImpact" : "PARTIAL",
  33951. "baseScore" : 5.0
  33952. },
  33953. "severity" : "MEDIUM",
  33954. "exploitabilityScore" : 10.0,
  33955. "impactScore" : 2.9,
  33956. "acInsufInfo" : false,
  33957. "obtainAllPrivilege" : false,
  33958. "obtainUserPrivilege" : false,
  33959. "obtainOtherPrivilege" : false,
  33960. "userInteractionRequired" : false
  33961. }
  33962. },
  33963. "publishedDate" : "2021-04-28T13:15Z",
  33964. "lastModifiedDate" : "2021-05-08T03:26Z"
  33965. }, {
  33966. "cve" : {
  33967. "data_type" : "CVE",
  33968. "data_format" : "MITRE",
  33969. "data_version" : "4.0",
  33970. "CVE_data_meta" : {
  33971. "ID" : "CVE-2021-22514",
  33972. "ASSIGNER" : "security@microfocus.com"
  33973. },
  33974. "problemtype" : {
  33975. "problemtype_data" : [ {
  33976. "description" : [ {
  33977. "lang" : "en",
  33978. "value" : "CWE-94"
  33979. } ]
  33980. } ]
  33981. },
  33982. "references" : {
  33983. "reference_data" : [ {
  33984. "url" : "https://softwaresupport.softwaregrp.com/doc/KM03806649",
  33985. "name" : "https://softwaresupport.softwaregrp.com/doc/KM03806649",
  33986. "refsource" : "MISC",
  33987. "tags" : [ "Vendor Advisory" ]
  33988. } ]
  33989. },
  33990. "description" : {
  33991. "description_data" : [ {
  33992. "lang" : "en",
  33993. "value" : "An arbitrary code execution vulnerability exists in Micro Focus Application Performance Management, affecting versions 9.40, 9.50 and 9.51. The vulnerability could allow remote attackers to execute arbitrary code on affected installations of APM."
  33994. } ]
  33995. }
  33996. },
  33997. "configurations" : {
  33998. "CVE_data_version" : "4.0",
  33999. "nodes" : [ {
  34000. "operator" : "OR",
  34001. "children" : [ ],
  34002. "cpe_match" : [ {
  34003. "vulnerable" : true,
  34004. "cpe23Uri" : "cpe:2.3:a:microfocus:application_performance_management:9.40:*:*:*:*:*:*:*",
  34005. "cpe_name" : [ ]
  34006. }, {
  34007. "vulnerable" : true,
  34008. "cpe23Uri" : "cpe:2.3:a:microfocus:application_performance_management:9.50:*:*:*:*:*:*:*",
  34009. "cpe_name" : [ ]
  34010. }, {
  34011. "vulnerable" : true,
  34012. "cpe23Uri" : "cpe:2.3:a:microfocus:application_performance_management:9.51:*:*:*:*:*:*:*",
  34013. "cpe_name" : [ ]
  34014. } ]
  34015. } ]
  34016. },
  34017. "impact" : {
  34018. "baseMetricV3" : {
  34019. "cvssV3" : {
  34020. "version" : "3.1",
  34021. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  34022. "attackVector" : "NETWORK",
  34023. "attackComplexity" : "LOW",
  34024. "privilegesRequired" : "NONE",
  34025. "userInteraction" : "NONE",
  34026. "scope" : "UNCHANGED",
  34027. "confidentialityImpact" : "HIGH",
  34028. "integrityImpact" : "HIGH",
  34029. "availabilityImpact" : "HIGH",
  34030. "baseScore" : 9.8,
  34031. "baseSeverity" : "CRITICAL"
  34032. },
  34033. "exploitabilityScore" : 3.9,
  34034. "impactScore" : 5.9
  34035. },
  34036. "baseMetricV2" : {
  34037. "cvssV2" : {
  34038. "version" : "2.0",
  34039. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  34040. "accessVector" : "NETWORK",
  34041. "accessComplexity" : "LOW",
  34042. "authentication" : "NONE",
  34043. "confidentialityImpact" : "PARTIAL",
  34044. "integrityImpact" : "PARTIAL",
  34045. "availabilityImpact" : "PARTIAL",
  34046. "baseScore" : 7.5
  34047. },
  34048. "severity" : "HIGH",
  34049. "exploitabilityScore" : 10.0,
  34050. "impactScore" : 6.4,
  34051. "acInsufInfo" : false,
  34052. "obtainAllPrivilege" : false,
  34053. "obtainUserPrivilege" : false,
  34054. "obtainOtherPrivilege" : false,
  34055. "userInteractionRequired" : false
  34056. }
  34057. },
  34058. "publishedDate" : "2021-04-28T12:15Z",
  34059. "lastModifiedDate" : "2021-05-08T02:52Z"
  34060. }, {
  34061. "cve" : {
  34062. "data_type" : "CVE",
  34063. "data_format" : "MITRE",
  34064. "data_version" : "4.0",
  34065. "CVE_data_meta" : {
  34066. "ID" : "CVE-2021-22393",
  34067. "ASSIGNER" : "psirt@huawei.com"
  34068. },
  34069. "problemtype" : {
  34070. "problemtype_data" : [ {
  34071. "description" : [ {
  34072. "lang" : "en",
  34073. "value" : "NVD-CWE-noinfo"
  34074. } ]
  34075. } ]
  34076. },
  34077. "references" : {
  34078. "reference_data" : [ {
  34079. "url" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210324-01-dos-en",
  34080. "name" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210324-01-dos-en",
  34081. "refsource" : "MISC",
  34082. "tags" : [ "Vendor Advisory" ]
  34083. } ]
  34084. },
  34085. "description" : {
  34086. "description_data" : [ {
  34087. "lang" : "en",
  34088. "value" : "There is a denial of service vulnerability in some versions of CloudEngine 5800, CloudEngine 6800, CloudEngine 7800 and CloudEngine 12800. The affected product cannot deal with some messages because of module design weakness . Attackers can exploit this vulnerability by sending a large amount of specific messages to cause denial of service. This can compromise normal service."
  34089. } ]
  34090. }
  34091. },
  34092. "configurations" : {
  34093. "CVE_data_version" : "4.0",
  34094. "nodes" : [ {
  34095. "operator" : "AND",
  34096. "children" : [ {
  34097. "operator" : "OR",
  34098. "children" : [ ],
  34099. "cpe_match" : [ {
  34100. "vulnerable" : true,
  34101. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
  34102. "cpe_name" : [ ]
  34103. }, {
  34104. "vulnerable" : true,
  34105. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r003c00spc810:*:*:*:*:*:*:*",
  34106. "cpe_name" : [ ]
  34107. }, {
  34108. "vulnerable" : true,
  34109. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r005c00spc800:*:*:*:*:*:*:*",
  34110. "cpe_name" : [ ]
  34111. }, {
  34112. "vulnerable" : true,
  34113. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r005c10spc800:*:*:*:*:*:*:*",
  34114. "cpe_name" : [ ]
  34115. } ]
  34116. }, {
  34117. "operator" : "OR",
  34118. "children" : [ ],
  34119. "cpe_match" : [ {
  34120. "vulnerable" : false,
  34121. "cpe23Uri" : "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*",
  34122. "cpe_name" : [ ]
  34123. } ]
  34124. } ],
  34125. "cpe_match" : [ ]
  34126. }, {
  34127. "operator" : "AND",
  34128. "children" : [ {
  34129. "operator" : "OR",
  34130. "children" : [ ],
  34131. "cpe_match" : [ {
  34132. "vulnerable" : true,
  34133. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_5800:v200r002c50spc800:*:*:*:*:*:*:*",
  34134. "cpe_name" : [ ]
  34135. }, {
  34136. "vulnerable" : true,
  34137. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_5800:v200r003c00spc810:*:*:*:*:*:*:*",
  34138. "cpe_name" : [ ]
  34139. }, {
  34140. "vulnerable" : true,
  34141. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_5800:v200r005c00spc800:*:*:*:*:*:*:*",
  34142. "cpe_name" : [ ]
  34143. }, {
  34144. "vulnerable" : true,
  34145. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_5800:v200r005c10spc800:*:*:*:*:*:*:*",
  34146. "cpe_name" : [ ]
  34147. } ]
  34148. }, {
  34149. "operator" : "OR",
  34150. "children" : [ ],
  34151. "cpe_match" : [ {
  34152. "vulnerable" : false,
  34153. "cpe23Uri" : "cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*",
  34154. "cpe_name" : [ ]
  34155. } ]
  34156. } ],
  34157. "cpe_match" : [ ]
  34158. }, {
  34159. "operator" : "AND",
  34160. "children" : [ {
  34161. "operator" : "OR",
  34162. "children" : [ ],
  34163. "cpe_match" : [ {
  34164. "vulnerable" : true,
  34165. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
  34166. "cpe_name" : [ ]
  34167. }, {
  34168. "vulnerable" : true,
  34169. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r003c00spc810:*:*:*:*:*:*:*",
  34170. "cpe_name" : [ ]
  34171. }, {
  34172. "vulnerable" : true,
  34173. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r005c00spc800:*:*:*:*:*:*:*",
  34174. "cpe_name" : [ ]
  34175. }, {
  34176. "vulnerable" : true,
  34177. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r005c10spc800:*:*:*:*:*:*:*",
  34178. "cpe_name" : [ ]
  34179. } ]
  34180. }, {
  34181. "operator" : "OR",
  34182. "children" : [ ],
  34183. "cpe_match" : [ {
  34184. "vulnerable" : false,
  34185. "cpe23Uri" : "cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*",
  34186. "cpe_name" : [ ]
  34187. } ]
  34188. } ],
  34189. "cpe_match" : [ ]
  34190. }, {
  34191. "operator" : "AND",
  34192. "children" : [ {
  34193. "operator" : "OR",
  34194. "children" : [ ],
  34195. "cpe_match" : [ {
  34196. "vulnerable" : true,
  34197. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
  34198. "cpe_name" : [ ]
  34199. }, {
  34200. "vulnerable" : true,
  34201. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r003c00spc810:*:*:*:*:*:*:*",
  34202. "cpe_name" : [ ]
  34203. }, {
  34204. "vulnerable" : true,
  34205. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r005c00spc800:*:*:*:*:*:*:*",
  34206. "cpe_name" : [ ]
  34207. }, {
  34208. "vulnerable" : true,
  34209. "cpe23Uri" : "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r005c10spc800:*:*:*:*:*:*:*",
  34210. "cpe_name" : [ ]
  34211. } ]
  34212. }, {
  34213. "operator" : "OR",
  34214. "children" : [ ],
  34215. "cpe_match" : [ {
  34216. "vulnerable" : false,
  34217. "cpe23Uri" : "cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*",
  34218. "cpe_name" : [ ]
  34219. } ]
  34220. } ],
  34221. "cpe_match" : [ ]
  34222. } ]
  34223. },
  34224. "impact" : {
  34225. "baseMetricV3" : {
  34226. "cvssV3" : {
  34227. "version" : "3.1",
  34228. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  34229. "attackVector" : "NETWORK",
  34230. "attackComplexity" : "LOW",
  34231. "privilegesRequired" : "NONE",
  34232. "userInteraction" : "NONE",
  34233. "scope" : "UNCHANGED",
  34234. "confidentialityImpact" : "NONE",
  34235. "integrityImpact" : "NONE",
  34236. "availabilityImpact" : "HIGH",
  34237. "baseScore" : 7.5,
  34238. "baseSeverity" : "HIGH"
  34239. },
  34240. "exploitabilityScore" : 3.9,
  34241. "impactScore" : 3.6
  34242. },
  34243. "baseMetricV2" : {
  34244. "cvssV2" : {
  34245. "version" : "2.0",
  34246. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  34247. "accessVector" : "NETWORK",
  34248. "accessComplexity" : "LOW",
  34249. "authentication" : "NONE",
  34250. "confidentialityImpact" : "NONE",
  34251. "integrityImpact" : "NONE",
  34252. "availabilityImpact" : "PARTIAL",
  34253. "baseScore" : 5.0
  34254. },
  34255. "severity" : "MEDIUM",
  34256. "exploitabilityScore" : 10.0,
  34257. "impactScore" : 2.9,
  34258. "acInsufInfo" : false,
  34259. "obtainAllPrivilege" : false,
  34260. "obtainUserPrivilege" : false,
  34261. "obtainOtherPrivilege" : false,
  34262. "userInteractionRequired" : false
  34263. }
  34264. },
  34265. "publishedDate" : "2021-04-28T12:15Z",
  34266. "lastModifiedDate" : "2021-05-08T03:14Z"
  34267. }, {
  34268. "cve" : {
  34269. "data_type" : "CVE",
  34270. "data_format" : "MITRE",
  34271. "data_version" : "4.0",
  34272. "CVE_data_meta" : {
  34273. "ID" : "CVE-2021-22330",
  34274. "ASSIGNER" : "psirt@huawei.com"
  34275. },
  34276. "problemtype" : {
  34277. "problemtype_data" : [ {
  34278. "description" : [ {
  34279. "lang" : "en",
  34280. "value" : "CWE-787"
  34281. } ]
  34282. } ]
  34283. },
  34284. "references" : {
  34285. "reference_data" : [ {
  34286. "url" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-p30-en",
  34287. "name" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-p30-en",
  34288. "refsource" : "MISC",
  34289. "tags" : [ "Vendor Advisory" ]
  34290. } ]
  34291. },
  34292. "description" : {
  34293. "description_data" : [ {
  34294. "lang" : "en",
  34295. "value" : "There is an out of bounds write vulnerability in Huawei Smartphone HUAWEI P30 versions 9.1.0.131(C00E130R1P21) when processing a message. An unauthenticated attacker can exploit this vulnerability by sending specific message to the target device. Due to insufficient validation of the input parameter, successful exploit can cause the process and the service to be abnormal."
  34296. } ]
  34297. }
  34298. },
  34299. "configurations" : {
  34300. "CVE_data_version" : "4.0",
  34301. "nodes" : [ {
  34302. "operator" : "AND",
  34303. "children" : [ {
  34304. "operator" : "OR",
  34305. "children" : [ ],
  34306. "cpe_match" : [ {
  34307. "vulnerable" : true,
  34308. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:9.1.0.131\\(c00e130r1p21\\):*:*:*:*:*:*:*",
  34309. "cpe_name" : [ ]
  34310. } ]
  34311. }, {
  34312. "operator" : "OR",
  34313. "children" : [ ],
  34314. "cpe_match" : [ {
  34315. "vulnerable" : false,
  34316. "cpe23Uri" : "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
  34317. "cpe_name" : [ ]
  34318. } ]
  34319. } ],
  34320. "cpe_match" : [ ]
  34321. } ]
  34322. },
  34323. "impact" : {
  34324. "baseMetricV3" : {
  34325. "cvssV3" : {
  34326. "version" : "3.1",
  34327. "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  34328. "attackVector" : "ADJACENT_NETWORK",
  34329. "attackComplexity" : "LOW",
  34330. "privilegesRequired" : "NONE",
  34331. "userInteraction" : "NONE",
  34332. "scope" : "UNCHANGED",
  34333. "confidentialityImpact" : "NONE",
  34334. "integrityImpact" : "NONE",
  34335. "availabilityImpact" : "HIGH",
  34336. "baseScore" : 6.5,
  34337. "baseSeverity" : "MEDIUM"
  34338. },
  34339. "exploitabilityScore" : 2.8,
  34340. "impactScore" : 3.6
  34341. },
  34342. "baseMetricV2" : {
  34343. "cvssV2" : {
  34344. "version" : "2.0",
  34345. "vectorString" : "AV:A/AC:L/Au:N/C:N/I:N/A:P",
  34346. "accessVector" : "ADJACENT_NETWORK",
  34347. "accessComplexity" : "LOW",
  34348. "authentication" : "NONE",
  34349. "confidentialityImpact" : "NONE",
  34350. "integrityImpact" : "NONE",
  34351. "availabilityImpact" : "PARTIAL",
  34352. "baseScore" : 3.3
  34353. },
  34354. "severity" : "LOW",
  34355. "exploitabilityScore" : 6.5,
  34356. "impactScore" : 2.9,
  34357. "acInsufInfo" : false,
  34358. "obtainAllPrivilege" : false,
  34359. "obtainUserPrivilege" : false,
  34360. "obtainOtherPrivilege" : false,
  34361. "userInteractionRequired" : false
  34362. }
  34363. },
  34364. "publishedDate" : "2021-04-28T12:15Z",
  34365. "lastModifiedDate" : "2021-05-08T02:49Z"
  34366. }, {
  34367. "cve" : {
  34368. "data_type" : "CVE",
  34369. "data_format" : "MITRE",
  34370. "data_version" : "4.0",
  34371. "CVE_data_meta" : {
  34372. "ID" : "CVE-2021-22327",
  34373. "ASSIGNER" : "psirt@huawei.com"
  34374. },
  34375. "problemtype" : {
  34376. "problemtype_data" : [ {
  34377. "description" : [ {
  34378. "lang" : "en",
  34379. "value" : "CWE-787"
  34380. } ]
  34381. } ]
  34382. },
  34383. "references" : {
  34384. "reference_data" : [ {
  34385. "url" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-smartphone-en",
  34386. "name" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-smartphone-en",
  34387. "refsource" : "MISC",
  34388. "tags" : [ "Vendor Advisory" ]
  34389. } ]
  34390. },
  34391. "description" : {
  34392. "description_data" : [ {
  34393. "lang" : "en",
  34394. "value" : "There is an arbitrary memory write vulnerability in Huawei smart phone when processing file parsing. Due to insufficient validation of the input files, successful exploit could cause certain service abnormal. Affected product versions include:HUAWEI P30 versions 10.0.0.186(C10E7R5P1), 10.0.0.186(C461E4R3P1), 10.0.0.188(C00E85R2P11), 10.0.0.188(C01E88R2P11),10.0.0.188(C605E19R1P3), 10.0.0.190(C185E4R7P1), 10.0.0.190(C431E22R2P5), 10.0.0.190(C432E22R2P5),10.0.0.190(C605E19R1P3), 10.0.0.190(C636E4R3P4), 10.0.0.192(C635E3R2P4)."
  34395. } ]
  34396. }
  34397. },
  34398. "configurations" : {
  34399. "CVE_data_version" : "4.0",
  34400. "nodes" : [ {
  34401. "operator" : "AND",
  34402. "children" : [ {
  34403. "operator" : "OR",
  34404. "children" : [ ],
  34405. "cpe_match" : [ {
  34406. "vulnerable" : true,
  34407. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:10.0.0.186\\(c10e7r5p1\\):*:*:*:*:*:*:*",
  34408. "cpe_name" : [ ]
  34409. }, {
  34410. "vulnerable" : true,
  34411. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:10.0.0.186\\(c461e4r3p1\\):*:*:*:*:*:*:*",
  34412. "cpe_name" : [ ]
  34413. }, {
  34414. "vulnerable" : true,
  34415. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:10.0.0.188\\(c00e85r2p11\\):*:*:*:*:*:*:*",
  34416. "cpe_name" : [ ]
  34417. }, {
  34418. "vulnerable" : true,
  34419. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:10.0.0.188\\(c01e88r2p11\\):*:*:*:*:*:*:*",
  34420. "cpe_name" : [ ]
  34421. }, {
  34422. "vulnerable" : true,
  34423. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:10.0.0.188\\(c605e19r1p3\\):*:*:*:*:*:*:*",
  34424. "cpe_name" : [ ]
  34425. }, {
  34426. "vulnerable" : true,
  34427. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\(c185e4r7p1\\):*:*:*:*:*:*:*",
  34428. "cpe_name" : [ ]
  34429. }, {
  34430. "vulnerable" : true,
  34431. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\(c431e22r2p5\\):*:*:*:*:*:*:*",
  34432. "cpe_name" : [ ]
  34433. }, {
  34434. "vulnerable" : true,
  34435. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\(c432e22r2p5\\):*:*:*:*:*:*:*",
  34436. "cpe_name" : [ ]
  34437. }, {
  34438. "vulnerable" : true,
  34439. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\(c605e19r1p3\\):*:*:*:*:*:*:*",
  34440. "cpe_name" : [ ]
  34441. }, {
  34442. "vulnerable" : true,
  34443. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\(c636e4r3p4\\):*:*:*:*:*:*:*",
  34444. "cpe_name" : [ ]
  34445. }, {
  34446. "vulnerable" : true,
  34447. "cpe23Uri" : "cpe:2.3:o:huawei:p30_firmware:10.0.0.192\\(c635e3r2p4\\):*:*:*:*:*:*:*",
  34448. "cpe_name" : [ ]
  34449. } ]
  34450. }, {
  34451. "operator" : "OR",
  34452. "children" : [ ],
  34453. "cpe_match" : [ {
  34454. "vulnerable" : false,
  34455. "cpe23Uri" : "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
  34456. "cpe_name" : [ ]
  34457. } ]
  34458. } ],
  34459. "cpe_match" : [ ]
  34460. } ]
  34461. },
  34462. "impact" : {
  34463. "baseMetricV3" : {
  34464. "cvssV3" : {
  34465. "version" : "3.1",
  34466. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  34467. "attackVector" : "NETWORK",
  34468. "attackComplexity" : "LOW",
  34469. "privilegesRequired" : "NONE",
  34470. "userInteraction" : "REQUIRED",
  34471. "scope" : "UNCHANGED",
  34472. "confidentialityImpact" : "NONE",
  34473. "integrityImpact" : "NONE",
  34474. "availabilityImpact" : "HIGH",
  34475. "baseScore" : 6.5,
  34476. "baseSeverity" : "MEDIUM"
  34477. },
  34478. "exploitabilityScore" : 2.8,
  34479. "impactScore" : 3.6
  34480. },
  34481. "baseMetricV2" : {
  34482. "cvssV2" : {
  34483. "version" : "2.0",
  34484. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  34485. "accessVector" : "NETWORK",
  34486. "accessComplexity" : "MEDIUM",
  34487. "authentication" : "NONE",
  34488. "confidentialityImpact" : "NONE",
  34489. "integrityImpact" : "NONE",
  34490. "availabilityImpact" : "PARTIAL",
  34491. "baseScore" : 4.3
  34492. },
  34493. "severity" : "MEDIUM",
  34494. "exploitabilityScore" : 8.6,
  34495. "impactScore" : 2.9,
  34496. "acInsufInfo" : false,
  34497. "obtainAllPrivilege" : false,
  34498. "obtainUserPrivilege" : false,
  34499. "obtainOtherPrivilege" : false,
  34500. "userInteractionRequired" : true
  34501. }
  34502. },
  34503. "publishedDate" : "2021-04-28T12:15Z",
  34504. "lastModifiedDate" : "2021-05-08T04:21Z"
  34505. }, {
  34506. "cve" : {
  34507. "data_type" : "CVE",
  34508. "data_format" : "MITRE",
  34509. "data_version" : "4.0",
  34510. "CVE_data_meta" : {
  34511. "ID" : "CVE-2021-30169",
  34512. "ASSIGNER" : "cve@cert.org.tw"
  34513. },
  34514. "problemtype" : {
  34515. "problemtype_data" : [ {
  34516. "description" : [ {
  34517. "lang" : "en",
  34518. "value" : "CWE-200"
  34519. } ]
  34520. } ]
  34521. },
  34522. "references" : {
  34523. "reference_data" : [ {
  34524. "url" : "https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf",
  34525. "name" : "https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf",
  34526. "refsource" : "MISC",
  34527. "tags" : [ "Vendor Advisory" ]
  34528. }, {
  34529. "url" : "https://www.twcert.org.tw/tw/cp-132-4679-d308c-1.html",
  34530. "name" : "https://www.twcert.org.tw/tw/cp-132-4679-d308c-1.html",
  34531. "refsource" : "MISC",
  34532. "tags" : [ "Third Party Advisory" ]
  34533. }, {
  34534. "url" : "https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388",
  34535. "name" : "https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388",
  34536. "refsource" : "MISC",
  34537. "tags" : [ "Third Party Advisory" ]
  34538. }, {
  34539. "url" : "https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e",
  34540. "name" : "https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e",
  34541. "refsource" : "MISC",
  34542. "tags" : [ "Third Party Advisory" ]
  34543. } ]
  34544. },
  34545. "description" : {
  34546. "description_data" : [ {
  34547. "lang" : "en",
  34548. "value" : "The sensitive information of webcam device is not properly protected. Remote attackers can unauthentically grant user’s credential."
  34549. } ]
  34550. }
  34551. },
  34552. "configurations" : {
  34553. "CVE_data_version" : "4.0",
  34554. "nodes" : [ {
  34555. "operator" : "AND",
  34556. "children" : [ {
  34557. "operator" : "OR",
  34558. "children" : [ ],
  34559. "cpe_match" : [ {
  34560. "vulnerable" : true,
  34561. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8852e2_firmware:*:*:*:*:*:*:*:*",
  34562. "versionEndExcluding" : "7.1.94.8908",
  34563. "cpe_name" : [ ]
  34564. } ]
  34565. }, {
  34566. "operator" : "OR",
  34567. "children" : [ ],
  34568. "cpe_match" : [ {
  34569. "vulnerable" : false,
  34570. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8852e2:-:*:*:*:*:*:*:*",
  34571. "cpe_name" : [ ]
  34572. } ]
  34573. } ],
  34574. "cpe_match" : [ ]
  34575. }, {
  34576. "operator" : "AND",
  34577. "children" : [ {
  34578. "operator" : "OR",
  34579. "children" : [ ],
  34580. "cpe_match" : [ {
  34581. "vulnerable" : true,
  34582. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8852e4_firmware:*:*:*:*:*:*:*:*",
  34583. "versionEndExcluding" : "7.1.94.8908",
  34584. "cpe_name" : [ ]
  34585. } ]
  34586. }, {
  34587. "operator" : "OR",
  34588. "children" : [ ],
  34589. "cpe_match" : [ {
  34590. "vulnerable" : false,
  34591. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8852e4:-:*:*:*:*:*:*:*",
  34592. "cpe_name" : [ ]
  34593. } ]
  34594. } ],
  34595. "cpe_match" : [ ]
  34596. }, {
  34597. "operator" : "AND",
  34598. "children" : [ {
  34599. "operator" : "OR",
  34600. "children" : [ ],
  34601. "cpe_match" : [ {
  34602. "vulnerable" : true,
  34603. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6852e2_firmware:*:*:*:*:*:*:*:*",
  34604. "versionEndExcluding" : "7.1.94.8908",
  34605. "cpe_name" : [ ]
  34606. } ]
  34607. }, {
  34608. "operator" : "OR",
  34609. "children" : [ ],
  34610. "cpe_match" : [ {
  34611. "vulnerable" : false,
  34612. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6852e2:-:*:*:*:*:*:*:*",
  34613. "cpe_name" : [ ]
  34614. } ]
  34615. } ],
  34616. "cpe_match" : [ ]
  34617. }, {
  34618. "operator" : "AND",
  34619. "children" : [ {
  34620. "operator" : "OR",
  34621. "children" : [ ],
  34622. "cpe_match" : [ {
  34623. "vulnerable" : true,
  34624. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6852e4_firmware:*:*:*:*:*:*:*:*",
  34625. "versionEndExcluding" : "7.1.94.8908",
  34626. "cpe_name" : [ ]
  34627. } ]
  34628. }, {
  34629. "operator" : "OR",
  34630. "children" : [ ],
  34631. "cpe_match" : [ {
  34632. "vulnerable" : false,
  34633. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6852e4:-:*:*:*:*:*:*:*",
  34634. "cpe_name" : [ ]
  34635. } ]
  34636. } ],
  34637. "cpe_match" : [ ]
  34638. }, {
  34639. "operator" : "AND",
  34640. "children" : [ {
  34641. "operator" : "OR",
  34642. "children" : [ ],
  34643. "cpe_match" : [ {
  34644. "vulnerable" : true,
  34645. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6552e2_firmware:*:*:*:*:*:*:*:*",
  34646. "versionEndExcluding" : "7.1.94.8908",
  34647. "cpe_name" : [ ]
  34648. } ]
  34649. }, {
  34650. "operator" : "OR",
  34651. "children" : [ ],
  34652. "cpe_match" : [ {
  34653. "vulnerable" : false,
  34654. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6552e2:-:*:*:*:*:*:*:*",
  34655. "cpe_name" : [ ]
  34656. } ]
  34657. } ],
  34658. "cpe_match" : [ ]
  34659. }, {
  34660. "operator" : "AND",
  34661. "children" : [ {
  34662. "operator" : "OR",
  34663. "children" : [ ],
  34664. "cpe_match" : [ {
  34665. "vulnerable" : true,
  34666. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6552e4_firmware:*:*:*:*:*:*:*:*",
  34667. "versionEndExcluding" : "7.1.94.8908",
  34668. "cpe_name" : [ ]
  34669. } ]
  34670. }, {
  34671. "operator" : "OR",
  34672. "children" : [ ],
  34673. "cpe_match" : [ {
  34674. "vulnerable" : false,
  34675. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6552e4:-:*:*:*:*:*:*:*",
  34676. "cpe_name" : [ ]
  34677. } ]
  34678. } ],
  34679. "cpe_match" : [ ]
  34680. }, {
  34681. "operator" : "AND",
  34682. "children" : [ {
  34683. "operator" : "OR",
  34684. "children" : [ ],
  34685. "cpe_match" : [ {
  34686. "vulnerable" : true,
  34687. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6352ae2_firmware:*:*:*:*:*:*:*:*",
  34688. "versionEndExcluding" : "7.1.94.8908",
  34689. "cpe_name" : [ ]
  34690. } ]
  34691. }, {
  34692. "operator" : "OR",
  34693. "children" : [ ],
  34694. "cpe_match" : [ {
  34695. "vulnerable" : false,
  34696. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6352ae2:-:*:*:*:*:*:*:*",
  34697. "cpe_name" : [ ]
  34698. } ]
  34699. } ],
  34700. "cpe_match" : [ ]
  34701. }, {
  34702. "operator" : "AND",
  34703. "children" : [ {
  34704. "operator" : "OR",
  34705. "children" : [ ],
  34706. "cpe_match" : [ {
  34707. "vulnerable" : true,
  34708. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6352ae4_firmware:*:*:*:*:*:*:*:*",
  34709. "versionEndExcluding" : "7.1.94.8908",
  34710. "cpe_name" : [ ]
  34711. } ]
  34712. }, {
  34713. "operator" : "OR",
  34714. "children" : [ ],
  34715. "cpe_match" : [ {
  34716. "vulnerable" : false,
  34717. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6352ae4:-:*:*:*:*:*:*:*",
  34718. "cpe_name" : [ ]
  34719. } ]
  34720. } ],
  34721. "cpe_match" : [ ]
  34722. }, {
  34723. "operator" : "AND",
  34724. "children" : [ {
  34725. "operator" : "OR",
  34726. "children" : [ ],
  34727. "cpe_match" : [ {
  34728. "vulnerable" : true,
  34729. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r3052ae2_firmware:*:*:*:*:*:*:*:*",
  34730. "versionEndExcluding" : "7.1.94.8908",
  34731. "cpe_name" : [ ]
  34732. } ]
  34733. }, {
  34734. "operator" : "OR",
  34735. "children" : [ ],
  34736. "cpe_match" : [ {
  34737. "vulnerable" : false,
  34738. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r3052ae2:-:*:*:*:*:*:*:*",
  34739. "cpe_name" : [ ]
  34740. } ]
  34741. } ],
  34742. "cpe_match" : [ ]
  34743. }, {
  34744. "operator" : "AND",
  34745. "children" : [ {
  34746. "operator" : "OR",
  34747. "children" : [ ],
  34748. "cpe_match" : [ {
  34749. "vulnerable" : true,
  34750. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2g1052_firmware:*:*:*:*:*:*:*:*",
  34751. "versionEndExcluding" : "7.1.94.8908",
  34752. "cpe_name" : [ ]
  34753. } ]
  34754. }, {
  34755. "operator" : "OR",
  34756. "children" : [ ],
  34757. "cpe_match" : [ {
  34758. "vulnerable" : false,
  34759. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2g1052:-:*:*:*:*:*:*:*",
  34760. "cpe_name" : [ ]
  34761. } ]
  34762. } ],
  34763. "cpe_match" : [ ]
  34764. }, {
  34765. "operator" : "AND",
  34766. "children" : [ {
  34767. "operator" : "OR",
  34768. "children" : [ ],
  34769. "cpe_match" : [ {
  34770. "vulnerable" : true,
  34771. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8822e2_firmware:*:*:*:*:*:*:*:*",
  34772. "versionEndExcluding" : "7.1.94.8908",
  34773. "cpe_name" : [ ]
  34774. } ]
  34775. }, {
  34776. "operator" : "OR",
  34777. "children" : [ ],
  34778. "cpe_match" : [ {
  34779. "vulnerable" : false,
  34780. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8822e2:-:*:*:*:*:*:*:*",
  34781. "cpe_name" : [ ]
  34782. } ]
  34783. } ],
  34784. "cpe_match" : [ ]
  34785. }, {
  34786. "operator" : "AND",
  34787. "children" : [ {
  34788. "operator" : "OR",
  34789. "children" : [ ],
  34790. "cpe_match" : [ {
  34791. "vulnerable" : true,
  34792. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8822e4_firmware:*:*:*:*:*:*:*:*",
  34793. "versionEndExcluding" : "7.1.94.8908",
  34794. "cpe_name" : [ ]
  34795. } ]
  34796. }, {
  34797. "operator" : "OR",
  34798. "children" : [ ],
  34799. "cpe_match" : [ {
  34800. "vulnerable" : false,
  34801. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8822e4:-:*:*:*:*:*:*:*",
  34802. "cpe_name" : [ ]
  34803. } ]
  34804. } ],
  34805. "cpe_match" : [ ]
  34806. }, {
  34807. "operator" : "AND",
  34808. "children" : [ {
  34809. "operator" : "OR",
  34810. "children" : [ ],
  34811. "cpe_match" : [ {
  34812. "vulnerable" : true,
  34813. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6822e2_firmware:*:*:*:*:*:*:*:*",
  34814. "versionEndExcluding" : "7.1.94.8908",
  34815. "cpe_name" : [ ]
  34816. } ]
  34817. }, {
  34818. "operator" : "OR",
  34819. "children" : [ ],
  34820. "cpe_match" : [ {
  34821. "vulnerable" : false,
  34822. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6822e2:-:*:*:*:*:*:*:*",
  34823. "cpe_name" : [ ]
  34824. } ]
  34825. } ],
  34826. "cpe_match" : [ ]
  34827. }, {
  34828. "operator" : "AND",
  34829. "children" : [ {
  34830. "operator" : "OR",
  34831. "children" : [ ],
  34832. "cpe_match" : [ {
  34833. "vulnerable" : true,
  34834. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6822e4_firmware:*:*:*:*:*:*:*:*",
  34835. "versionEndExcluding" : "7.1.94.8908",
  34836. "cpe_name" : [ ]
  34837. } ]
  34838. }, {
  34839. "operator" : "OR",
  34840. "children" : [ ],
  34841. "cpe_match" : [ {
  34842. "vulnerable" : false,
  34843. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6822e4:-:*:*:*:*:*:*:*",
  34844. "cpe_name" : [ ]
  34845. } ]
  34846. } ],
  34847. "cpe_match" : [ ]
  34848. }, {
  34849. "operator" : "AND",
  34850. "children" : [ {
  34851. "operator" : "OR",
  34852. "children" : [ ],
  34853. "cpe_match" : [ {
  34854. "vulnerable" : true,
  34855. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6522e2_firmware:*:*:*:*:*:*:*:*",
  34856. "versionEndExcluding" : "7.1.94.8908",
  34857. "cpe_name" : [ ]
  34858. } ]
  34859. }, {
  34860. "operator" : "OR",
  34861. "children" : [ ],
  34862. "cpe_match" : [ {
  34863. "vulnerable" : false,
  34864. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6522e2:-:*:*:*:*:*:*:*",
  34865. "cpe_name" : [ ]
  34866. } ]
  34867. } ],
  34868. "cpe_match" : [ ]
  34869. }, {
  34870. "operator" : "AND",
  34871. "children" : [ {
  34872. "operator" : "OR",
  34873. "children" : [ ],
  34874. "cpe_match" : [ {
  34875. "vulnerable" : true,
  34876. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6522e4_firmware:*:*:*:*:*:*:*:*",
  34877. "versionEndExcluding" : "7.1.94.8908",
  34878. "cpe_name" : [ ]
  34879. } ]
  34880. }, {
  34881. "operator" : "OR",
  34882. "children" : [ ],
  34883. "cpe_match" : [ {
  34884. "vulnerable" : false,
  34885. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6522e4:-:*:*:*:*:*:*:*",
  34886. "cpe_name" : [ ]
  34887. } ]
  34888. } ],
  34889. "cpe_match" : [ ]
  34890. }, {
  34891. "operator" : "AND",
  34892. "children" : [ {
  34893. "operator" : "OR",
  34894. "children" : [ ],
  34895. "cpe_match" : [ {
  34896. "vulnerable" : true,
  34897. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6322ae2_firmware:*:*:*:*:*:*:*:*",
  34898. "versionEndExcluding" : "7.1.94.8908",
  34899. "cpe_name" : [ ]
  34900. } ]
  34901. }, {
  34902. "operator" : "OR",
  34903. "children" : [ ],
  34904. "cpe_match" : [ {
  34905. "vulnerable" : false,
  34906. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6322ae2:-:*:*:*:*:*:*:*",
  34907. "cpe_name" : [ ]
  34908. } ]
  34909. } ],
  34910. "cpe_match" : [ ]
  34911. }, {
  34912. "operator" : "AND",
  34913. "children" : [ {
  34914. "operator" : "OR",
  34915. "children" : [ ],
  34916. "cpe_match" : [ {
  34917. "vulnerable" : true,
  34918. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6322ae4_firmware:*:*:*:*:*:*:*:*",
  34919. "versionEndExcluding" : "7.1.94.8908",
  34920. "cpe_name" : [ ]
  34921. } ]
  34922. }, {
  34923. "operator" : "OR",
  34924. "children" : [ ],
  34925. "cpe_match" : [ {
  34926. "vulnerable" : false,
  34927. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6322ae4:-:*:*:*:*:*:*:*",
  34928. "cpe_name" : [ ]
  34929. } ]
  34930. } ],
  34931. "cpe_match" : [ ]
  34932. }, {
  34933. "operator" : "AND",
  34934. "children" : [ {
  34935. "operator" : "OR",
  34936. "children" : [ ],
  34937. "cpe_match" : [ {
  34938. "vulnerable" : true,
  34939. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r3022ae2_firmware:*:*:*:*:*:*:*:*",
  34940. "versionEndExcluding" : "7.1.94.8908",
  34941. "cpe_name" : [ ]
  34942. } ]
  34943. }, {
  34944. "operator" : "OR",
  34945. "children" : [ ],
  34946. "cpe_match" : [ {
  34947. "vulnerable" : false,
  34948. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r3022ae2:-:*:*:*:*:*:*:*",
  34949. "cpe_name" : [ ]
  34950. } ]
  34951. } ],
  34952. "cpe_match" : [ ]
  34953. }, {
  34954. "operator" : "AND",
  34955. "children" : [ {
  34956. "operator" : "OR",
  34957. "children" : [ ],
  34958. "cpe_match" : [ {
  34959. "vulnerable" : true,
  34960. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2g1022_firmware:*:*:*:*:*:*:*:*",
  34961. "versionEndExcluding" : "7.1.94.8908",
  34962. "cpe_name" : [ ]
  34963. } ]
  34964. }, {
  34965. "operator" : "OR",
  34966. "children" : [ ],
  34967. "cpe_match" : [ {
  34968. "vulnerable" : false,
  34969. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2g1022:-:*:*:*:*:*:*:*",
  34970. "cpe_name" : [ ]
  34971. } ]
  34972. } ],
  34973. "cpe_match" : [ ]
  34974. }, {
  34975. "operator" : "AND",
  34976. "children" : [ {
  34977. "operator" : "OR",
  34978. "children" : [ ],
  34979. "cpe_match" : [ {
  34980. "vulnerable" : true,
  34981. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2g1022x_firmware:*:*:*:*:*:*:*:*",
  34982. "versionEndExcluding" : "7.1.94.8908",
  34983. "cpe_name" : [ ]
  34984. } ]
  34985. }, {
  34986. "operator" : "OR",
  34987. "children" : [ ],
  34988. "cpe_match" : [ {
  34989. "vulnerable" : false,
  34990. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2g1022x:-:*:*:*:*:*:*:*",
  34991. "cpe_name" : [ ]
  34992. } ]
  34993. } ],
  34994. "cpe_match" : [ ]
  34995. }, {
  34996. "operator" : "AND",
  34997. "children" : [ {
  34998. "operator" : "OR",
  34999. "children" : [ ],
  35000. "cpe_match" : [ {
  35001. "vulnerable" : true,
  35002. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8852ax_firmware:*:*:*:*:*:*:*:*",
  35003. "versionEndExcluding" : "7.1.94.8908",
  35004. "cpe_name" : [ ]
  35005. } ]
  35006. }, {
  35007. "operator" : "OR",
  35008. "children" : [ ],
  35009. "cpe_match" : [ {
  35010. "vulnerable" : false,
  35011. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8852ax:-:*:*:*:*:*:*:*",
  35012. "cpe_name" : [ ]
  35013. } ]
  35014. } ],
  35015. "cpe_match" : [ ]
  35016. }, {
  35017. "operator" : "AND",
  35018. "children" : [ {
  35019. "operator" : "OR",
  35020. "children" : [ ],
  35021. "cpe_match" : [ {
  35022. "vulnerable" : true,
  35023. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8152x-p_firmware:*:*:*:*:*:*:*:*",
  35024. "versionEndExcluding" : "7.1.94.8908",
  35025. "cpe_name" : [ ]
  35026. } ]
  35027. }, {
  35028. "operator" : "OR",
  35029. "children" : [ ],
  35030. "cpe_match" : [ {
  35031. "vulnerable" : false,
  35032. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8152x-p:-:*:*:*:*:*:*:*",
  35033. "cpe_name" : [ ]
  35034. } ]
  35035. } ],
  35036. "cpe_match" : [ ]
  35037. }, {
  35038. "operator" : "AND",
  35039. "children" : [ {
  35040. "operator" : "OR",
  35041. "children" : [ ],
  35042. "cpe_match" : [ {
  35043. "vulnerable" : true,
  35044. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8152x2-p_firmware:*:*:*:*:*:*:*:*",
  35045. "versionEndExcluding" : "7.1.94.8908",
  35046. "cpe_name" : [ ]
  35047. } ]
  35048. }, {
  35049. "operator" : "OR",
  35050. "children" : [ ],
  35051. "cpe_match" : [ {
  35052. "vulnerable" : false,
  35053. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8152x2-p:-:*:*:*:*:*:*:*",
  35054. "cpe_name" : [ ]
  35055. } ]
  35056. } ],
  35057. "cpe_match" : [ ]
  35058. }, {
  35059. "operator" : "AND",
  35060. "children" : [ {
  35061. "operator" : "OR",
  35062. "children" : [ ],
  35063. "cpe_match" : [ {
  35064. "vulnerable" : true,
  35065. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8052ex25_firmware:*:*:*:*:*:*:*:*",
  35066. "versionEndExcluding" : "7.1.94.8908",
  35067. "cpe_name" : [ ]
  35068. } ]
  35069. }, {
  35070. "operator" : "OR",
  35071. "children" : [ ],
  35072. "cpe_match" : [ {
  35073. "vulnerable" : false,
  35074. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8052ex25:-:*:*:*:*:*:*:*",
  35075. "cpe_name" : [ ]
  35076. } ]
  35077. } ],
  35078. "cpe_match" : [ ]
  35079. }, {
  35080. "operator" : "AND",
  35081. "children" : [ {
  35082. "operator" : "OR",
  35083. "children" : [ ],
  35084. "cpe_match" : [ {
  35085. "vulnerable" : true,
  35086. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6552x_firmware:*:*:*:*:*:*:*:*",
  35087. "versionEndExcluding" : "7.1.94.8908",
  35088. "cpe_name" : [ ]
  35089. } ]
  35090. }, {
  35091. "operator" : "OR",
  35092. "children" : [ ],
  35093. "cpe_match" : [ {
  35094. "vulnerable" : false,
  35095. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6552x:-:*:*:*:*:*:*:*",
  35096. "cpe_name" : [ ]
  35097. } ]
  35098. } ],
  35099. "cpe_match" : [ ]
  35100. }, {
  35101. "operator" : "AND",
  35102. "children" : [ {
  35103. "operator" : "OR",
  35104. "children" : [ ],
  35105. "cpe_match" : [ {
  35106. "vulnerable" : true,
  35107. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6452ax_firmware:*:*:*:*:*:*:*:*",
  35108. "versionEndExcluding" : "7.1.94.8908",
  35109. "cpe_name" : [ ]
  35110. } ]
  35111. }, {
  35112. "operator" : "OR",
  35113. "children" : [ ],
  35114. "cpe_match" : [ {
  35115. "vulnerable" : false,
  35116. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6452ax:-:*:*:*:*:*:*:*",
  35117. "cpe_name" : [ ]
  35118. } ]
  35119. } ],
  35120. "cpe_match" : [ ]
  35121. }, {
  35122. "operator" : "AND",
  35123. "children" : [ {
  35124. "operator" : "OR",
  35125. "children" : [ ],
  35126. "cpe_match" : [ {
  35127. "vulnerable" : true,
  35128. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6452ax-p_firmware:*:*:*:*:*:*:*:*",
  35129. "versionEndExcluding" : "7.1.94.8908",
  35130. "cpe_name" : [ ]
  35131. } ]
  35132. }, {
  35133. "operator" : "OR",
  35134. "children" : [ ],
  35135. "cpe_match" : [ {
  35136. "vulnerable" : false,
  35137. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6452ax-p:-:*:*:*:*:*:*:*",
  35138. "cpe_name" : [ ]
  35139. } ]
  35140. } ],
  35141. "cpe_match" : [ ]
  35142. }, {
  35143. "operator" : "AND",
  35144. "children" : [ {
  35145. "operator" : "OR",
  35146. "children" : [ ],
  35147. "cpe_match" : [ {
  35148. "vulnerable" : true,
  35149. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8822ax_firmware:*:*:*:*:*:*:*:*",
  35150. "versionEndExcluding" : "7.1.94.8908",
  35151. "cpe_name" : [ ]
  35152. } ]
  35153. }, {
  35154. "operator" : "OR",
  35155. "children" : [ ],
  35156. "cpe_match" : [ {
  35157. "vulnerable" : false,
  35158. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8822ax:-:*:*:*:*:*:*:*",
  35159. "cpe_name" : [ ]
  35160. } ]
  35161. } ],
  35162. "cpe_match" : [ ]
  35163. }, {
  35164. "operator" : "AND",
  35165. "children" : [ {
  35166. "operator" : "OR",
  35167. "children" : [ ],
  35168. "cpe_match" : [ {
  35169. "vulnerable" : true,
  35170. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8122x-p_firmware:*:*:*:*:*:*:*:*",
  35171. "versionEndExcluding" : "7.1.94.8908",
  35172. "cpe_name" : [ ]
  35173. } ]
  35174. }, {
  35175. "operator" : "OR",
  35176. "children" : [ ],
  35177. "cpe_match" : [ {
  35178. "vulnerable" : false,
  35179. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8122x-p:-:*:*:*:*:*:*:*",
  35180. "cpe_name" : [ ]
  35181. } ]
  35182. } ],
  35183. "cpe_match" : [ ]
  35184. }, {
  35185. "operator" : "AND",
  35186. "children" : [ {
  35187. "operator" : "OR",
  35188. "children" : [ ],
  35189. "cpe_match" : [ {
  35190. "vulnerable" : true,
  35191. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8122x2-p_firmware:*:*:*:*:*:*:*:*",
  35192. "versionEndExcluding" : "7.1.94.8908",
  35193. "cpe_name" : [ ]
  35194. } ]
  35195. }, {
  35196. "operator" : "OR",
  35197. "children" : [ ],
  35198. "cpe_match" : [ {
  35199. "vulnerable" : false,
  35200. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8122x2-p:-:*:*:*:*:*:*:*",
  35201. "cpe_name" : [ ]
  35202. } ]
  35203. } ],
  35204. "cpe_match" : [ ]
  35205. }, {
  35206. "operator" : "AND",
  35207. "children" : [ {
  35208. "operator" : "OR",
  35209. "children" : [ ],
  35210. "cpe_match" : [ {
  35211. "vulnerable" : true,
  35212. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8022ex25_firmware:*:*:*:*:*:*:*:*",
  35213. "versionEndExcluding" : "7.1.94.8908",
  35214. "cpe_name" : [ ]
  35215. } ]
  35216. }, {
  35217. "operator" : "OR",
  35218. "children" : [ ],
  35219. "cpe_match" : [ {
  35220. "vulnerable" : false,
  35221. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8022ex25:-:*:*:*:*:*:*:*",
  35222. "cpe_name" : [ ]
  35223. } ]
  35224. } ],
  35225. "cpe_match" : [ ]
  35226. }, {
  35227. "operator" : "AND",
  35228. "children" : [ {
  35229. "operator" : "OR",
  35230. "children" : [ ],
  35231. "cpe_match" : [ {
  35232. "vulnerable" : true,
  35233. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6522x_firmware:*:*:*:*:*:*:*:*",
  35234. "versionEndExcluding" : "7.1.94.8908",
  35235. "cpe_name" : [ ]
  35236. } ]
  35237. }, {
  35238. "operator" : "OR",
  35239. "children" : [ ],
  35240. "cpe_match" : [ {
  35241. "vulnerable" : false,
  35242. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6522x:-:*:*:*:*:*:*:*",
  35243. "cpe_name" : [ ]
  35244. } ]
  35245. } ],
  35246. "cpe_match" : [ ]
  35247. }, {
  35248. "operator" : "AND",
  35249. "children" : [ {
  35250. "operator" : "OR",
  35251. "children" : [ ],
  35252. "cpe_match" : [ {
  35253. "vulnerable" : true,
  35254. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6422ax_firmware:*:*:*:*:*:*:*:*",
  35255. "versionEndExcluding" : "7.1.94.8908",
  35256. "cpe_name" : [ ]
  35257. } ]
  35258. }, {
  35259. "operator" : "OR",
  35260. "children" : [ ],
  35261. "cpe_match" : [ {
  35262. "vulnerable" : false,
  35263. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6422ax:-:*:*:*:*:*:*:*",
  35264. "cpe_name" : [ ]
  35265. } ]
  35266. } ],
  35267. "cpe_match" : [ ]
  35268. }, {
  35269. "operator" : "AND",
  35270. "children" : [ {
  35271. "operator" : "OR",
  35272. "children" : [ ],
  35273. "cpe_match" : [ {
  35274. "vulnerable" : true,
  35275. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6422ax-p_firmware:*:*:*:*:*:*:*:*",
  35276. "versionEndExcluding" : "7.1.94.8908",
  35277. "cpe_name" : [ ]
  35278. } ]
  35279. }, {
  35280. "operator" : "OR",
  35281. "children" : [ ],
  35282. "cpe_match" : [ {
  35283. "vulnerable" : false,
  35284. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6422ax-p:-:*:*:*:*:*:*:*",
  35285. "cpe_name" : [ ]
  35286. } ]
  35287. } ],
  35288. "cpe_match" : [ ]
  35289. }, {
  35290. "operator" : "AND",
  35291. "children" : [ {
  35292. "operator" : "OR",
  35293. "children" : [ ],
  35294. "cpe_match" : [ {
  35295. "vulnerable" : true,
  35296. "cpe23Uri" : "cpe:2.3:o:meritlilin:p3r6322e2_firmware:*:*:*:*:*:*:*:*",
  35297. "versionEndExcluding" : "7.1.94.8908",
  35298. "cpe_name" : [ ]
  35299. } ]
  35300. }, {
  35301. "operator" : "OR",
  35302. "children" : [ ],
  35303. "cpe_match" : [ {
  35304. "vulnerable" : false,
  35305. "cpe23Uri" : "cpe:2.3:h:meritlilin:p3r6322e2:-:*:*:*:*:*:*:*",
  35306. "cpe_name" : [ ]
  35307. } ]
  35308. } ],
  35309. "cpe_match" : [ ]
  35310. }, {
  35311. "operator" : "AND",
  35312. "children" : [ {
  35313. "operator" : "OR",
  35314. "children" : [ ],
  35315. "cpe_match" : [ {
  35316. "vulnerable" : true,
  35317. "cpe23Uri" : "cpe:2.3:o:meritlilin:p3r6522e2_firmware:*:*:*:*:*:*:*:*",
  35318. "versionEndExcluding" : "7.1.94.8908",
  35319. "cpe_name" : [ ]
  35320. } ]
  35321. }, {
  35322. "operator" : "OR",
  35323. "children" : [ ],
  35324. "cpe_match" : [ {
  35325. "vulnerable" : false,
  35326. "cpe23Uri" : "cpe:2.3:h:meritlilin:p3r6522e2:-:*:*:*:*:*:*:*",
  35327. "cpe_name" : [ ]
  35328. } ]
  35329. } ],
  35330. "cpe_match" : [ ]
  35331. }, {
  35332. "operator" : "AND",
  35333. "children" : [ {
  35334. "operator" : "OR",
  35335. "children" : [ ],
  35336. "cpe_match" : [ {
  35337. "vulnerable" : true,
  35338. "cpe23Uri" : "cpe:2.3:o:meritlilin:p3r8822e2_firmware:*:*:*:*:*:*:*:*",
  35339. "versionEndExcluding" : "7.1.94.8908",
  35340. "cpe_name" : [ ]
  35341. } ]
  35342. }, {
  35343. "operator" : "OR",
  35344. "children" : [ ],
  35345. "cpe_match" : [ {
  35346. "vulnerable" : false,
  35347. "cpe23Uri" : "cpe:2.3:h:meritlilin:p3r8822e2:-:*:*:*:*:*:*:*",
  35348. "cpe_name" : [ ]
  35349. } ]
  35350. } ],
  35351. "cpe_match" : [ ]
  35352. }, {
  35353. "operator" : "AND",
  35354. "children" : [ {
  35355. "operator" : "OR",
  35356. "children" : [ ],
  35357. "cpe_match" : [ {
  35358. "vulnerable" : true,
  35359. "cpe23Uri" : "cpe:2.3:o:meritlilin:z3r6422x3_firmware:*:*:*:*:*:*:*:*",
  35360. "versionEndExcluding" : "7.1.94.8908",
  35361. "cpe_name" : [ ]
  35362. } ]
  35363. }, {
  35364. "operator" : "OR",
  35365. "children" : [ ],
  35366. "cpe_match" : [ {
  35367. "vulnerable" : false,
  35368. "cpe23Uri" : "cpe:2.3:h:meritlilin:z3r6422x3:-:*:*:*:*:*:*:*",
  35369. "cpe_name" : [ ]
  35370. } ]
  35371. } ],
  35372. "cpe_match" : [ ]
  35373. }, {
  35374. "operator" : "AND",
  35375. "children" : [ {
  35376. "operator" : "OR",
  35377. "children" : [ ],
  35378. "cpe_match" : [ {
  35379. "vulnerable" : true,
  35380. "cpe23Uri" : "cpe:2.3:o:meritlilin:z3r6522x_firmware:*:*:*:*:*:*:*:*",
  35381. "versionEndExcluding" : "7.1.94.8908",
  35382. "cpe_name" : [ ]
  35383. } ]
  35384. }, {
  35385. "operator" : "OR",
  35386. "children" : [ ],
  35387. "cpe_match" : [ {
  35388. "vulnerable" : false,
  35389. "cpe23Uri" : "cpe:2.3:h:meritlilin:z3r6522x:-:*:*:*:*:*:*:*",
  35390. "cpe_name" : [ ]
  35391. } ]
  35392. } ],
  35393. "cpe_match" : [ ]
  35394. }, {
  35395. "operator" : "AND",
  35396. "children" : [ {
  35397. "operator" : "OR",
  35398. "children" : [ ],
  35399. "cpe_match" : [ {
  35400. "vulnerable" : true,
  35401. "cpe23Uri" : "cpe:2.3:o:meritlilin:z3r8922x3_firmware:*:*:*:*:*:*:*:*",
  35402. "versionEndExcluding" : "7.1.94.8908",
  35403. "cpe_name" : [ ]
  35404. } ]
  35405. }, {
  35406. "operator" : "OR",
  35407. "children" : [ ],
  35408. "cpe_match" : [ {
  35409. "vulnerable" : false,
  35410. "cpe23Uri" : "cpe:2.3:h:meritlilin:z3r8922x3:-:*:*:*:*:*:*:*",
  35411. "cpe_name" : [ ]
  35412. } ]
  35413. } ],
  35414. "cpe_match" : [ ]
  35415. } ]
  35416. },
  35417. "impact" : {
  35418. "baseMetricV3" : {
  35419. "cvssV3" : {
  35420. "version" : "3.1",
  35421. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  35422. "attackVector" : "NETWORK",
  35423. "attackComplexity" : "LOW",
  35424. "privilegesRequired" : "NONE",
  35425. "userInteraction" : "NONE",
  35426. "scope" : "UNCHANGED",
  35427. "confidentialityImpact" : "HIGH",
  35428. "integrityImpact" : "NONE",
  35429. "availabilityImpact" : "NONE",
  35430. "baseScore" : 7.5,
  35431. "baseSeverity" : "HIGH"
  35432. },
  35433. "exploitabilityScore" : 3.9,
  35434. "impactScore" : 3.6
  35435. },
  35436. "baseMetricV2" : {
  35437. "cvssV2" : {
  35438. "version" : "2.0",
  35439. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  35440. "accessVector" : "NETWORK",
  35441. "accessComplexity" : "LOW",
  35442. "authentication" : "NONE",
  35443. "confidentialityImpact" : "PARTIAL",
  35444. "integrityImpact" : "NONE",
  35445. "availabilityImpact" : "NONE",
  35446. "baseScore" : 5.0
  35447. },
  35448. "severity" : "MEDIUM",
  35449. "exploitabilityScore" : 10.0,
  35450. "impactScore" : 2.9,
  35451. "acInsufInfo" : false,
  35452. "obtainAllPrivilege" : false,
  35453. "obtainUserPrivilege" : false,
  35454. "obtainOtherPrivilege" : false,
  35455. "userInteractionRequired" : false
  35456. }
  35457. },
  35458. "publishedDate" : "2021-04-28T10:15Z",
  35459. "lastModifiedDate" : "2021-05-07T19:13Z"
  35460. }, {
  35461. "cve" : {
  35462. "data_type" : "CVE",
  35463. "data_format" : "MITRE",
  35464. "data_version" : "4.0",
  35465. "CVE_data_meta" : {
  35466. "ID" : "CVE-2021-30168",
  35467. "ASSIGNER" : "cve@cert.org.tw"
  35468. },
  35469. "problemtype" : {
  35470. "problemtype_data" : [ {
  35471. "description" : [ {
  35472. "lang" : "en",
  35473. "value" : "CWE-200"
  35474. } ]
  35475. } ]
  35476. },
  35477. "references" : {
  35478. "reference_data" : [ {
  35479. "url" : "https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf",
  35480. "name" : "https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf",
  35481. "refsource" : "MISC",
  35482. "tags" : [ "Vendor Advisory" ]
  35483. }, {
  35484. "url" : "https://www.twcert.org.tw/tw/cp-132-4678-aad70-1.html",
  35485. "name" : "https://www.twcert.org.tw/tw/cp-132-4678-aad70-1.html",
  35486. "refsource" : "MISC",
  35487. "tags" : [ "Third Party Advisory" ]
  35488. }, {
  35489. "url" : "https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388",
  35490. "name" : "https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388",
  35491. "refsource" : "MISC",
  35492. "tags" : [ "Third Party Advisory" ]
  35493. }, {
  35494. "url" : "https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e",
  35495. "name" : "https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e",
  35496. "refsource" : "MISC",
  35497. "tags" : [ "Third Party Advisory" ]
  35498. } ]
  35499. },
  35500. "description" : {
  35501. "description_data" : [ {
  35502. "lang" : "en",
  35503. "value" : "The sensitive information of webcam device is not properly protected. Remote attackers can unauthentically grant administrator’s credential and further control the devices."
  35504. } ]
  35505. }
  35506. },
  35507. "configurations" : {
  35508. "CVE_data_version" : "4.0",
  35509. "nodes" : [ {
  35510. "operator" : "AND",
  35511. "children" : [ {
  35512. "operator" : "OR",
  35513. "children" : [ ],
  35514. "cpe_match" : [ {
  35515. "vulnerable" : true,
  35516. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8852e2_firmware:*:*:*:*:*:*:*:*",
  35517. "versionEndExcluding" : "7.1.94.8908",
  35518. "cpe_name" : [ ]
  35519. } ]
  35520. }, {
  35521. "operator" : "OR",
  35522. "children" : [ ],
  35523. "cpe_match" : [ {
  35524. "vulnerable" : false,
  35525. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8852e2:-:*:*:*:*:*:*:*",
  35526. "cpe_name" : [ ]
  35527. } ]
  35528. } ],
  35529. "cpe_match" : [ ]
  35530. }, {
  35531. "operator" : "AND",
  35532. "children" : [ {
  35533. "operator" : "OR",
  35534. "children" : [ ],
  35535. "cpe_match" : [ {
  35536. "vulnerable" : true,
  35537. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8852e4_firmware:*:*:*:*:*:*:*:*",
  35538. "versionEndExcluding" : "7.1.94.8908",
  35539. "cpe_name" : [ ]
  35540. } ]
  35541. }, {
  35542. "operator" : "OR",
  35543. "children" : [ ],
  35544. "cpe_match" : [ {
  35545. "vulnerable" : false,
  35546. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8852e4:-:*:*:*:*:*:*:*",
  35547. "cpe_name" : [ ]
  35548. } ]
  35549. } ],
  35550. "cpe_match" : [ ]
  35551. }, {
  35552. "operator" : "AND",
  35553. "children" : [ {
  35554. "operator" : "OR",
  35555. "children" : [ ],
  35556. "cpe_match" : [ {
  35557. "vulnerable" : true,
  35558. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6852e2_firmware:*:*:*:*:*:*:*:*",
  35559. "versionEndExcluding" : "7.1.94.8908",
  35560. "cpe_name" : [ ]
  35561. } ]
  35562. }, {
  35563. "operator" : "OR",
  35564. "children" : [ ],
  35565. "cpe_match" : [ {
  35566. "vulnerable" : false,
  35567. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6852e2:-:*:*:*:*:*:*:*",
  35568. "cpe_name" : [ ]
  35569. } ]
  35570. } ],
  35571. "cpe_match" : [ ]
  35572. }, {
  35573. "operator" : "AND",
  35574. "children" : [ {
  35575. "operator" : "OR",
  35576. "children" : [ ],
  35577. "cpe_match" : [ {
  35578. "vulnerable" : true,
  35579. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6852e4_firmware:*:*:*:*:*:*:*:*",
  35580. "versionEndExcluding" : "7.1.94.8908",
  35581. "cpe_name" : [ ]
  35582. } ]
  35583. }, {
  35584. "operator" : "OR",
  35585. "children" : [ ],
  35586. "cpe_match" : [ {
  35587. "vulnerable" : false,
  35588. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6852e4:-:*:*:*:*:*:*:*",
  35589. "cpe_name" : [ ]
  35590. } ]
  35591. } ],
  35592. "cpe_match" : [ ]
  35593. }, {
  35594. "operator" : "AND",
  35595. "children" : [ {
  35596. "operator" : "OR",
  35597. "children" : [ ],
  35598. "cpe_match" : [ {
  35599. "vulnerable" : true,
  35600. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6552e2_firmware:*:*:*:*:*:*:*:*",
  35601. "versionEndExcluding" : "7.1.94.8908",
  35602. "cpe_name" : [ ]
  35603. } ]
  35604. }, {
  35605. "operator" : "OR",
  35606. "children" : [ ],
  35607. "cpe_match" : [ {
  35608. "vulnerable" : false,
  35609. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6552e2:-:*:*:*:*:*:*:*",
  35610. "cpe_name" : [ ]
  35611. } ]
  35612. } ],
  35613. "cpe_match" : [ ]
  35614. }, {
  35615. "operator" : "AND",
  35616. "children" : [ {
  35617. "operator" : "OR",
  35618. "children" : [ ],
  35619. "cpe_match" : [ {
  35620. "vulnerable" : true,
  35621. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6552e4_firmware:*:*:*:*:*:*:*:*",
  35622. "versionEndExcluding" : "7.1.94.8908",
  35623. "cpe_name" : [ ]
  35624. } ]
  35625. }, {
  35626. "operator" : "OR",
  35627. "children" : [ ],
  35628. "cpe_match" : [ {
  35629. "vulnerable" : false,
  35630. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6552e4:-:*:*:*:*:*:*:*",
  35631. "cpe_name" : [ ]
  35632. } ]
  35633. } ],
  35634. "cpe_match" : [ ]
  35635. }, {
  35636. "operator" : "AND",
  35637. "children" : [ {
  35638. "operator" : "OR",
  35639. "children" : [ ],
  35640. "cpe_match" : [ {
  35641. "vulnerable" : true,
  35642. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6352ae2_firmware:*:*:*:*:*:*:*:*",
  35643. "versionEndExcluding" : "7.1.94.8908",
  35644. "cpe_name" : [ ]
  35645. } ]
  35646. }, {
  35647. "operator" : "OR",
  35648. "children" : [ ],
  35649. "cpe_match" : [ {
  35650. "vulnerable" : false,
  35651. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6352ae2:-:*:*:*:*:*:*:*",
  35652. "cpe_name" : [ ]
  35653. } ]
  35654. } ],
  35655. "cpe_match" : [ ]
  35656. }, {
  35657. "operator" : "AND",
  35658. "children" : [ {
  35659. "operator" : "OR",
  35660. "children" : [ ],
  35661. "cpe_match" : [ {
  35662. "vulnerable" : true,
  35663. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6352ae4_firmware:*:*:*:*:*:*:*:*",
  35664. "versionEndExcluding" : "7.1.94.8908",
  35665. "cpe_name" : [ ]
  35666. } ]
  35667. }, {
  35668. "operator" : "OR",
  35669. "children" : [ ],
  35670. "cpe_match" : [ {
  35671. "vulnerable" : false,
  35672. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6352ae4:-:*:*:*:*:*:*:*",
  35673. "cpe_name" : [ ]
  35674. } ]
  35675. } ],
  35676. "cpe_match" : [ ]
  35677. }, {
  35678. "operator" : "AND",
  35679. "children" : [ {
  35680. "operator" : "OR",
  35681. "children" : [ ],
  35682. "cpe_match" : [ {
  35683. "vulnerable" : true,
  35684. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r3052ae2_firmware:*:*:*:*:*:*:*:*",
  35685. "versionEndExcluding" : "7.1.94.8908",
  35686. "cpe_name" : [ ]
  35687. } ]
  35688. }, {
  35689. "operator" : "OR",
  35690. "children" : [ ],
  35691. "cpe_match" : [ {
  35692. "vulnerable" : false,
  35693. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r3052ae2:-:*:*:*:*:*:*:*",
  35694. "cpe_name" : [ ]
  35695. } ]
  35696. } ],
  35697. "cpe_match" : [ ]
  35698. }, {
  35699. "operator" : "AND",
  35700. "children" : [ {
  35701. "operator" : "OR",
  35702. "children" : [ ],
  35703. "cpe_match" : [ {
  35704. "vulnerable" : true,
  35705. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2g1052_firmware:*:*:*:*:*:*:*:*",
  35706. "versionEndExcluding" : "7.1.94.8908",
  35707. "cpe_name" : [ ]
  35708. } ]
  35709. }, {
  35710. "operator" : "OR",
  35711. "children" : [ ],
  35712. "cpe_match" : [ {
  35713. "vulnerable" : false,
  35714. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2g1052:-:*:*:*:*:*:*:*",
  35715. "cpe_name" : [ ]
  35716. } ]
  35717. } ],
  35718. "cpe_match" : [ ]
  35719. }, {
  35720. "operator" : "AND",
  35721. "children" : [ {
  35722. "operator" : "OR",
  35723. "children" : [ ],
  35724. "cpe_match" : [ {
  35725. "vulnerable" : true,
  35726. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8822e2_firmware:*:*:*:*:*:*:*:*",
  35727. "versionEndExcluding" : "7.1.94.8908",
  35728. "cpe_name" : [ ]
  35729. } ]
  35730. }, {
  35731. "operator" : "OR",
  35732. "children" : [ ],
  35733. "cpe_match" : [ {
  35734. "vulnerable" : false,
  35735. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8822e2:-:*:*:*:*:*:*:*",
  35736. "cpe_name" : [ ]
  35737. } ]
  35738. } ],
  35739. "cpe_match" : [ ]
  35740. }, {
  35741. "operator" : "AND",
  35742. "children" : [ {
  35743. "operator" : "OR",
  35744. "children" : [ ],
  35745. "cpe_match" : [ {
  35746. "vulnerable" : true,
  35747. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8822e4_firmware:*:*:*:*:*:*:*:*",
  35748. "versionEndExcluding" : "7.1.94.8908",
  35749. "cpe_name" : [ ]
  35750. } ]
  35751. }, {
  35752. "operator" : "OR",
  35753. "children" : [ ],
  35754. "cpe_match" : [ {
  35755. "vulnerable" : false,
  35756. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8822e4:-:*:*:*:*:*:*:*",
  35757. "cpe_name" : [ ]
  35758. } ]
  35759. } ],
  35760. "cpe_match" : [ ]
  35761. }, {
  35762. "operator" : "AND",
  35763. "children" : [ {
  35764. "operator" : "OR",
  35765. "children" : [ ],
  35766. "cpe_match" : [ {
  35767. "vulnerable" : true,
  35768. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6822e2_firmware:*:*:*:*:*:*:*:*",
  35769. "versionEndExcluding" : "7.1.94.8908",
  35770. "cpe_name" : [ ]
  35771. } ]
  35772. }, {
  35773. "operator" : "OR",
  35774. "children" : [ ],
  35775. "cpe_match" : [ {
  35776. "vulnerable" : false,
  35777. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6822e2:-:*:*:*:*:*:*:*",
  35778. "cpe_name" : [ ]
  35779. } ]
  35780. } ],
  35781. "cpe_match" : [ ]
  35782. }, {
  35783. "operator" : "AND",
  35784. "children" : [ {
  35785. "operator" : "OR",
  35786. "children" : [ ],
  35787. "cpe_match" : [ {
  35788. "vulnerable" : true,
  35789. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6822e4_firmware:*:*:*:*:*:*:*:*",
  35790. "versionEndExcluding" : "7.1.94.8908",
  35791. "cpe_name" : [ ]
  35792. } ]
  35793. }, {
  35794. "operator" : "OR",
  35795. "children" : [ ],
  35796. "cpe_match" : [ {
  35797. "vulnerable" : false,
  35798. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6822e4:-:*:*:*:*:*:*:*",
  35799. "cpe_name" : [ ]
  35800. } ]
  35801. } ],
  35802. "cpe_match" : [ ]
  35803. }, {
  35804. "operator" : "AND",
  35805. "children" : [ {
  35806. "operator" : "OR",
  35807. "children" : [ ],
  35808. "cpe_match" : [ {
  35809. "vulnerable" : true,
  35810. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6522e2_firmware:*:*:*:*:*:*:*:*",
  35811. "versionEndExcluding" : "7.1.94.8908",
  35812. "cpe_name" : [ ]
  35813. } ]
  35814. }, {
  35815. "operator" : "OR",
  35816. "children" : [ ],
  35817. "cpe_match" : [ {
  35818. "vulnerable" : false,
  35819. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6522e2:-:*:*:*:*:*:*:*",
  35820. "cpe_name" : [ ]
  35821. } ]
  35822. } ],
  35823. "cpe_match" : [ ]
  35824. }, {
  35825. "operator" : "AND",
  35826. "children" : [ {
  35827. "operator" : "OR",
  35828. "children" : [ ],
  35829. "cpe_match" : [ {
  35830. "vulnerable" : true,
  35831. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6522e4_firmware:*:*:*:*:*:*:*:*",
  35832. "versionEndExcluding" : "7.1.94.8908",
  35833. "cpe_name" : [ ]
  35834. } ]
  35835. }, {
  35836. "operator" : "OR",
  35837. "children" : [ ],
  35838. "cpe_match" : [ {
  35839. "vulnerable" : false,
  35840. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6522e4:-:*:*:*:*:*:*:*",
  35841. "cpe_name" : [ ]
  35842. } ]
  35843. } ],
  35844. "cpe_match" : [ ]
  35845. }, {
  35846. "operator" : "AND",
  35847. "children" : [ {
  35848. "operator" : "OR",
  35849. "children" : [ ],
  35850. "cpe_match" : [ {
  35851. "vulnerable" : true,
  35852. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6322ae2_firmware:*:*:*:*:*:*:*:*",
  35853. "versionEndExcluding" : "7.1.94.8908",
  35854. "cpe_name" : [ ]
  35855. } ]
  35856. }, {
  35857. "operator" : "OR",
  35858. "children" : [ ],
  35859. "cpe_match" : [ {
  35860. "vulnerable" : false,
  35861. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6322ae2:-:*:*:*:*:*:*:*",
  35862. "cpe_name" : [ ]
  35863. } ]
  35864. } ],
  35865. "cpe_match" : [ ]
  35866. }, {
  35867. "operator" : "AND",
  35868. "children" : [ {
  35869. "operator" : "OR",
  35870. "children" : [ ],
  35871. "cpe_match" : [ {
  35872. "vulnerable" : true,
  35873. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6322ae4_firmware:*:*:*:*:*:*:*:*",
  35874. "versionEndExcluding" : "7.1.94.8908",
  35875. "cpe_name" : [ ]
  35876. } ]
  35877. }, {
  35878. "operator" : "OR",
  35879. "children" : [ ],
  35880. "cpe_match" : [ {
  35881. "vulnerable" : false,
  35882. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6322ae4:-:*:*:*:*:*:*:*",
  35883. "cpe_name" : [ ]
  35884. } ]
  35885. } ],
  35886. "cpe_match" : [ ]
  35887. }, {
  35888. "operator" : "AND",
  35889. "children" : [ {
  35890. "operator" : "OR",
  35891. "children" : [ ],
  35892. "cpe_match" : [ {
  35893. "vulnerable" : true,
  35894. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r3022ae2_firmware:*:*:*:*:*:*:*:*",
  35895. "versionEndExcluding" : "7.1.94.8908",
  35896. "cpe_name" : [ ]
  35897. } ]
  35898. }, {
  35899. "operator" : "OR",
  35900. "children" : [ ],
  35901. "cpe_match" : [ {
  35902. "vulnerable" : false,
  35903. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r3022ae2:-:*:*:*:*:*:*:*",
  35904. "cpe_name" : [ ]
  35905. } ]
  35906. } ],
  35907. "cpe_match" : [ ]
  35908. }, {
  35909. "operator" : "AND",
  35910. "children" : [ {
  35911. "operator" : "OR",
  35912. "children" : [ ],
  35913. "cpe_match" : [ {
  35914. "vulnerable" : true,
  35915. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2g1022_firmware:*:*:*:*:*:*:*:*",
  35916. "versionEndExcluding" : "7.1.94.8908",
  35917. "cpe_name" : [ ]
  35918. } ]
  35919. }, {
  35920. "operator" : "OR",
  35921. "children" : [ ],
  35922. "cpe_match" : [ {
  35923. "vulnerable" : false,
  35924. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2g1022:-:*:*:*:*:*:*:*",
  35925. "cpe_name" : [ ]
  35926. } ]
  35927. } ],
  35928. "cpe_match" : [ ]
  35929. }, {
  35930. "operator" : "AND",
  35931. "children" : [ {
  35932. "operator" : "OR",
  35933. "children" : [ ],
  35934. "cpe_match" : [ {
  35935. "vulnerable" : true,
  35936. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2g1022x_firmware:*:*:*:*:*:*:*:*",
  35937. "versionEndExcluding" : "7.1.94.8908",
  35938. "cpe_name" : [ ]
  35939. } ]
  35940. }, {
  35941. "operator" : "OR",
  35942. "children" : [ ],
  35943. "cpe_match" : [ {
  35944. "vulnerable" : false,
  35945. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2g1022x:-:*:*:*:*:*:*:*",
  35946. "cpe_name" : [ ]
  35947. } ]
  35948. } ],
  35949. "cpe_match" : [ ]
  35950. }, {
  35951. "operator" : "AND",
  35952. "children" : [ {
  35953. "operator" : "OR",
  35954. "children" : [ ],
  35955. "cpe_match" : [ {
  35956. "vulnerable" : true,
  35957. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8852ax_firmware:*:*:*:*:*:*:*:*",
  35958. "versionEndExcluding" : "7.1.94.8908",
  35959. "cpe_name" : [ ]
  35960. } ]
  35961. }, {
  35962. "operator" : "OR",
  35963. "children" : [ ],
  35964. "cpe_match" : [ {
  35965. "vulnerable" : false,
  35966. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8852ax:-:*:*:*:*:*:*:*",
  35967. "cpe_name" : [ ]
  35968. } ]
  35969. } ],
  35970. "cpe_match" : [ ]
  35971. }, {
  35972. "operator" : "AND",
  35973. "children" : [ {
  35974. "operator" : "OR",
  35975. "children" : [ ],
  35976. "cpe_match" : [ {
  35977. "vulnerable" : true,
  35978. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8152x-p_firmware:*:*:*:*:*:*:*:*",
  35979. "versionEndExcluding" : "7.1.94.8908",
  35980. "cpe_name" : [ ]
  35981. } ]
  35982. }, {
  35983. "operator" : "OR",
  35984. "children" : [ ],
  35985. "cpe_match" : [ {
  35986. "vulnerable" : false,
  35987. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8152x-p:-:*:*:*:*:*:*:*",
  35988. "cpe_name" : [ ]
  35989. } ]
  35990. } ],
  35991. "cpe_match" : [ ]
  35992. }, {
  35993. "operator" : "AND",
  35994. "children" : [ {
  35995. "operator" : "OR",
  35996. "children" : [ ],
  35997. "cpe_match" : [ {
  35998. "vulnerable" : true,
  35999. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8152x2-p_firmware:*:*:*:*:*:*:*:*",
  36000. "versionEndExcluding" : "7.1.94.8908",
  36001. "cpe_name" : [ ]
  36002. } ]
  36003. }, {
  36004. "operator" : "OR",
  36005. "children" : [ ],
  36006. "cpe_match" : [ {
  36007. "vulnerable" : false,
  36008. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8152x2-p:-:*:*:*:*:*:*:*",
  36009. "cpe_name" : [ ]
  36010. } ]
  36011. } ],
  36012. "cpe_match" : [ ]
  36013. }, {
  36014. "operator" : "AND",
  36015. "children" : [ {
  36016. "operator" : "OR",
  36017. "children" : [ ],
  36018. "cpe_match" : [ {
  36019. "vulnerable" : true,
  36020. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8052ex25_firmware:*:*:*:*:*:*:*:*",
  36021. "versionEndExcluding" : "7.1.94.8908",
  36022. "cpe_name" : [ ]
  36023. } ]
  36024. }, {
  36025. "operator" : "OR",
  36026. "children" : [ ],
  36027. "cpe_match" : [ {
  36028. "vulnerable" : false,
  36029. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8052ex25:-:*:*:*:*:*:*:*",
  36030. "cpe_name" : [ ]
  36031. } ]
  36032. } ],
  36033. "cpe_match" : [ ]
  36034. }, {
  36035. "operator" : "AND",
  36036. "children" : [ {
  36037. "operator" : "OR",
  36038. "children" : [ ],
  36039. "cpe_match" : [ {
  36040. "vulnerable" : true,
  36041. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6552x_firmware:*:*:*:*:*:*:*:*",
  36042. "versionEndExcluding" : "7.1.94.8908",
  36043. "cpe_name" : [ ]
  36044. } ]
  36045. }, {
  36046. "operator" : "OR",
  36047. "children" : [ ],
  36048. "cpe_match" : [ {
  36049. "vulnerable" : false,
  36050. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6552x:-:*:*:*:*:*:*:*",
  36051. "cpe_name" : [ ]
  36052. } ]
  36053. } ],
  36054. "cpe_match" : [ ]
  36055. }, {
  36056. "operator" : "AND",
  36057. "children" : [ {
  36058. "operator" : "OR",
  36059. "children" : [ ],
  36060. "cpe_match" : [ {
  36061. "vulnerable" : true,
  36062. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6452ax_firmware:*:*:*:*:*:*:*:*",
  36063. "versionEndExcluding" : "7.1.94.8908",
  36064. "cpe_name" : [ ]
  36065. } ]
  36066. }, {
  36067. "operator" : "OR",
  36068. "children" : [ ],
  36069. "cpe_match" : [ {
  36070. "vulnerable" : false,
  36071. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6452ax:-:*:*:*:*:*:*:*",
  36072. "cpe_name" : [ ]
  36073. } ]
  36074. } ],
  36075. "cpe_match" : [ ]
  36076. }, {
  36077. "operator" : "AND",
  36078. "children" : [ {
  36079. "operator" : "OR",
  36080. "children" : [ ],
  36081. "cpe_match" : [ {
  36082. "vulnerable" : true,
  36083. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6452ax-p_firmware:*:*:*:*:*:*:*:*",
  36084. "versionEndExcluding" : "7.1.94.8908",
  36085. "cpe_name" : [ ]
  36086. } ]
  36087. }, {
  36088. "operator" : "OR",
  36089. "children" : [ ],
  36090. "cpe_match" : [ {
  36091. "vulnerable" : false,
  36092. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6452ax-p:-:*:*:*:*:*:*:*",
  36093. "cpe_name" : [ ]
  36094. } ]
  36095. } ],
  36096. "cpe_match" : [ ]
  36097. }, {
  36098. "operator" : "AND",
  36099. "children" : [ {
  36100. "operator" : "OR",
  36101. "children" : [ ],
  36102. "cpe_match" : [ {
  36103. "vulnerable" : true,
  36104. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8822ax_firmware:*:*:*:*:*:*:*:*",
  36105. "versionEndExcluding" : "7.1.94.8908",
  36106. "cpe_name" : [ ]
  36107. } ]
  36108. }, {
  36109. "operator" : "OR",
  36110. "children" : [ ],
  36111. "cpe_match" : [ {
  36112. "vulnerable" : false,
  36113. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8822ax:-:*:*:*:*:*:*:*",
  36114. "cpe_name" : [ ]
  36115. } ]
  36116. } ],
  36117. "cpe_match" : [ ]
  36118. }, {
  36119. "operator" : "AND",
  36120. "children" : [ {
  36121. "operator" : "OR",
  36122. "children" : [ ],
  36123. "cpe_match" : [ {
  36124. "vulnerable" : true,
  36125. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8122x-p_firmware:*:*:*:*:*:*:*:*",
  36126. "versionEndExcluding" : "7.1.94.8908",
  36127. "cpe_name" : [ ]
  36128. } ]
  36129. }, {
  36130. "operator" : "OR",
  36131. "children" : [ ],
  36132. "cpe_match" : [ {
  36133. "vulnerable" : false,
  36134. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8122x-p:-:*:*:*:*:*:*:*",
  36135. "cpe_name" : [ ]
  36136. } ]
  36137. } ],
  36138. "cpe_match" : [ ]
  36139. }, {
  36140. "operator" : "AND",
  36141. "children" : [ {
  36142. "operator" : "OR",
  36143. "children" : [ ],
  36144. "cpe_match" : [ {
  36145. "vulnerable" : true,
  36146. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8122x2-p_firmware:*:*:*:*:*:*:*:*",
  36147. "versionEndExcluding" : "7.1.94.8908",
  36148. "cpe_name" : [ ]
  36149. } ]
  36150. }, {
  36151. "operator" : "OR",
  36152. "children" : [ ],
  36153. "cpe_match" : [ {
  36154. "vulnerable" : false,
  36155. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8122x2-p:-:*:*:*:*:*:*:*",
  36156. "cpe_name" : [ ]
  36157. } ]
  36158. } ],
  36159. "cpe_match" : [ ]
  36160. }, {
  36161. "operator" : "AND",
  36162. "children" : [ {
  36163. "operator" : "OR",
  36164. "children" : [ ],
  36165. "cpe_match" : [ {
  36166. "vulnerable" : true,
  36167. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8022ex25_firmware:*:*:*:*:*:*:*:*",
  36168. "versionEndExcluding" : "7.1.94.8908",
  36169. "cpe_name" : [ ]
  36170. } ]
  36171. }, {
  36172. "operator" : "OR",
  36173. "children" : [ ],
  36174. "cpe_match" : [ {
  36175. "vulnerable" : false,
  36176. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8022ex25:-:*:*:*:*:*:*:*",
  36177. "cpe_name" : [ ]
  36178. } ]
  36179. } ],
  36180. "cpe_match" : [ ]
  36181. }, {
  36182. "operator" : "AND",
  36183. "children" : [ {
  36184. "operator" : "OR",
  36185. "children" : [ ],
  36186. "cpe_match" : [ {
  36187. "vulnerable" : true,
  36188. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6522x_firmware:*:*:*:*:*:*:*:*",
  36189. "versionEndExcluding" : "7.1.94.8908",
  36190. "cpe_name" : [ ]
  36191. } ]
  36192. }, {
  36193. "operator" : "OR",
  36194. "children" : [ ],
  36195. "cpe_match" : [ {
  36196. "vulnerable" : false,
  36197. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6522x:-:*:*:*:*:*:*:*",
  36198. "cpe_name" : [ ]
  36199. } ]
  36200. } ],
  36201. "cpe_match" : [ ]
  36202. }, {
  36203. "operator" : "AND",
  36204. "children" : [ {
  36205. "operator" : "OR",
  36206. "children" : [ ],
  36207. "cpe_match" : [ {
  36208. "vulnerable" : true,
  36209. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6422ax_firmware:*:*:*:*:*:*:*:*",
  36210. "versionEndExcluding" : "7.1.94.8908",
  36211. "cpe_name" : [ ]
  36212. } ]
  36213. }, {
  36214. "operator" : "OR",
  36215. "children" : [ ],
  36216. "cpe_match" : [ {
  36217. "vulnerable" : false,
  36218. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6422ax:-:*:*:*:*:*:*:*",
  36219. "cpe_name" : [ ]
  36220. } ]
  36221. } ],
  36222. "cpe_match" : [ ]
  36223. }, {
  36224. "operator" : "AND",
  36225. "children" : [ {
  36226. "operator" : "OR",
  36227. "children" : [ ],
  36228. "cpe_match" : [ {
  36229. "vulnerable" : true,
  36230. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6422ax-p_firmware:*:*:*:*:*:*:*:*",
  36231. "versionEndExcluding" : "7.1.94.8908",
  36232. "cpe_name" : [ ]
  36233. } ]
  36234. }, {
  36235. "operator" : "OR",
  36236. "children" : [ ],
  36237. "cpe_match" : [ {
  36238. "vulnerable" : false,
  36239. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6422ax-p:-:*:*:*:*:*:*:*",
  36240. "cpe_name" : [ ]
  36241. } ]
  36242. } ],
  36243. "cpe_match" : [ ]
  36244. }, {
  36245. "operator" : "AND",
  36246. "children" : [ {
  36247. "operator" : "OR",
  36248. "children" : [ ],
  36249. "cpe_match" : [ {
  36250. "vulnerable" : true,
  36251. "cpe23Uri" : "cpe:2.3:o:meritlilin:p3r6322e2_firmware:*:*:*:*:*:*:*:*",
  36252. "versionEndExcluding" : "7.1.94.8908",
  36253. "cpe_name" : [ ]
  36254. } ]
  36255. }, {
  36256. "operator" : "OR",
  36257. "children" : [ ],
  36258. "cpe_match" : [ {
  36259. "vulnerable" : false,
  36260. "cpe23Uri" : "cpe:2.3:h:meritlilin:p3r6322e2:-:*:*:*:*:*:*:*",
  36261. "cpe_name" : [ ]
  36262. } ]
  36263. } ],
  36264. "cpe_match" : [ ]
  36265. }, {
  36266. "operator" : "AND",
  36267. "children" : [ {
  36268. "operator" : "OR",
  36269. "children" : [ ],
  36270. "cpe_match" : [ {
  36271. "vulnerable" : true,
  36272. "cpe23Uri" : "cpe:2.3:o:meritlilin:p3r6522e2_firmware:*:*:*:*:*:*:*:*",
  36273. "versionEndExcluding" : "7.1.94.8908",
  36274. "cpe_name" : [ ]
  36275. } ]
  36276. }, {
  36277. "operator" : "OR",
  36278. "children" : [ ],
  36279. "cpe_match" : [ {
  36280. "vulnerable" : false,
  36281. "cpe23Uri" : "cpe:2.3:h:meritlilin:p3r6522e2:-:*:*:*:*:*:*:*",
  36282. "cpe_name" : [ ]
  36283. } ]
  36284. } ],
  36285. "cpe_match" : [ ]
  36286. }, {
  36287. "operator" : "AND",
  36288. "children" : [ {
  36289. "operator" : "OR",
  36290. "children" : [ ],
  36291. "cpe_match" : [ {
  36292. "vulnerable" : true,
  36293. "cpe23Uri" : "cpe:2.3:o:meritlilin:p3r8822e2_firmware:*:*:*:*:*:*:*:*",
  36294. "versionEndExcluding" : "7.1.94.8908",
  36295. "cpe_name" : [ ]
  36296. } ]
  36297. }, {
  36298. "operator" : "OR",
  36299. "children" : [ ],
  36300. "cpe_match" : [ {
  36301. "vulnerable" : false,
  36302. "cpe23Uri" : "cpe:2.3:h:meritlilin:p3r8822e2:-:*:*:*:*:*:*:*",
  36303. "cpe_name" : [ ]
  36304. } ]
  36305. } ],
  36306. "cpe_match" : [ ]
  36307. }, {
  36308. "operator" : "AND",
  36309. "children" : [ {
  36310. "operator" : "OR",
  36311. "children" : [ ],
  36312. "cpe_match" : [ {
  36313. "vulnerable" : true,
  36314. "cpe23Uri" : "cpe:2.3:o:meritlilin:z3r6422x3_firmware:*:*:*:*:*:*:*:*",
  36315. "versionEndExcluding" : "7.1.94.8908",
  36316. "cpe_name" : [ ]
  36317. } ]
  36318. }, {
  36319. "operator" : "OR",
  36320. "children" : [ ],
  36321. "cpe_match" : [ {
  36322. "vulnerable" : false,
  36323. "cpe23Uri" : "cpe:2.3:h:meritlilin:z3r6422x3:-:*:*:*:*:*:*:*",
  36324. "cpe_name" : [ ]
  36325. } ]
  36326. } ],
  36327. "cpe_match" : [ ]
  36328. }, {
  36329. "operator" : "AND",
  36330. "children" : [ {
  36331. "operator" : "OR",
  36332. "children" : [ ],
  36333. "cpe_match" : [ {
  36334. "vulnerable" : true,
  36335. "cpe23Uri" : "cpe:2.3:o:meritlilin:z3r6522x_firmware:*:*:*:*:*:*:*:*",
  36336. "versionEndExcluding" : "7.1.94.8908",
  36337. "cpe_name" : [ ]
  36338. } ]
  36339. }, {
  36340. "operator" : "OR",
  36341. "children" : [ ],
  36342. "cpe_match" : [ {
  36343. "vulnerable" : false,
  36344. "cpe23Uri" : "cpe:2.3:h:meritlilin:z3r6522x:-:*:*:*:*:*:*:*",
  36345. "cpe_name" : [ ]
  36346. } ]
  36347. } ],
  36348. "cpe_match" : [ ]
  36349. }, {
  36350. "operator" : "AND",
  36351. "children" : [ {
  36352. "operator" : "OR",
  36353. "children" : [ ],
  36354. "cpe_match" : [ {
  36355. "vulnerable" : true,
  36356. "cpe23Uri" : "cpe:2.3:o:meritlilin:z3r8922x3_firmware:*:*:*:*:*:*:*:*",
  36357. "versionEndExcluding" : "7.1.94.8908",
  36358. "cpe_name" : [ ]
  36359. } ]
  36360. }, {
  36361. "operator" : "OR",
  36362. "children" : [ ],
  36363. "cpe_match" : [ {
  36364. "vulnerable" : false,
  36365. "cpe23Uri" : "cpe:2.3:h:meritlilin:z3r8922x3:-:*:*:*:*:*:*:*",
  36366. "cpe_name" : [ ]
  36367. } ]
  36368. } ],
  36369. "cpe_match" : [ ]
  36370. } ]
  36371. },
  36372. "impact" : {
  36373. "baseMetricV3" : {
  36374. "cvssV3" : {
  36375. "version" : "3.1",
  36376. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  36377. "attackVector" : "NETWORK",
  36378. "attackComplexity" : "LOW",
  36379. "privilegesRequired" : "NONE",
  36380. "userInteraction" : "NONE",
  36381. "scope" : "UNCHANGED",
  36382. "confidentialityImpact" : "HIGH",
  36383. "integrityImpact" : "HIGH",
  36384. "availabilityImpact" : "HIGH",
  36385. "baseScore" : 9.8,
  36386. "baseSeverity" : "CRITICAL"
  36387. },
  36388. "exploitabilityScore" : 3.9,
  36389. "impactScore" : 5.9
  36390. },
  36391. "baseMetricV2" : {
  36392. "cvssV2" : {
  36393. "version" : "2.0",
  36394. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  36395. "accessVector" : "NETWORK",
  36396. "accessComplexity" : "LOW",
  36397. "authentication" : "NONE",
  36398. "confidentialityImpact" : "PARTIAL",
  36399. "integrityImpact" : "PARTIAL",
  36400. "availabilityImpact" : "PARTIAL",
  36401. "baseScore" : 7.5
  36402. },
  36403. "severity" : "HIGH",
  36404. "exploitabilityScore" : 10.0,
  36405. "impactScore" : 6.4,
  36406. "acInsufInfo" : false,
  36407. "obtainAllPrivilege" : false,
  36408. "obtainUserPrivilege" : false,
  36409. "obtainOtherPrivilege" : false,
  36410. "userInteractionRequired" : false
  36411. }
  36412. },
  36413. "publishedDate" : "2021-04-28T10:15Z",
  36414. "lastModifiedDate" : "2021-05-07T19:20Z"
  36415. }, {
  36416. "cve" : {
  36417. "data_type" : "CVE",
  36418. "data_format" : "MITRE",
  36419. "data_version" : "4.0",
  36420. "CVE_data_meta" : {
  36421. "ID" : "CVE-2021-30167",
  36422. "ASSIGNER" : "cve@cert.org.tw"
  36423. },
  36424. "problemtype" : {
  36425. "problemtype_data" : [ {
  36426. "description" : [ {
  36427. "lang" : "en",
  36428. "value" : "CWE-522"
  36429. } ]
  36430. } ]
  36431. },
  36432. "references" : {
  36433. "reference_data" : [ {
  36434. "url" : "https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf",
  36435. "name" : "https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf",
  36436. "refsource" : "MISC",
  36437. "tags" : [ "Vendor Advisory" ]
  36438. }, {
  36439. "url" : "https://www.twcert.org.tw/tw/cp-132-4676-391a5-1.html",
  36440. "name" : "https://www.twcert.org.tw/tw/cp-132-4676-391a5-1.html",
  36441. "refsource" : "MISC",
  36442. "tags" : [ "Not Applicable" ]
  36443. }, {
  36444. "url" : "https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388",
  36445. "name" : "https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388",
  36446. "refsource" : "MISC",
  36447. "tags" : [ "Third Party Advisory" ]
  36448. }, {
  36449. "url" : "https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e",
  36450. "name" : "https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e",
  36451. "refsource" : "MISC",
  36452. "tags" : [ "Third Party Advisory" ]
  36453. } ]
  36454. },
  36455. "description" : {
  36456. "description_data" : [ {
  36457. "lang" : "en",
  36458. "value" : "The manage users profile services of the network camera device allows an authenticated. Remote attackers can modify URL parameters and further amend user’s information and escalate privileges to control the devices."
  36459. } ]
  36460. }
  36461. },
  36462. "configurations" : {
  36463. "CVE_data_version" : "4.0",
  36464. "nodes" : [ {
  36465. "operator" : "AND",
  36466. "children" : [ {
  36467. "operator" : "OR",
  36468. "children" : [ ],
  36469. "cpe_match" : [ {
  36470. "vulnerable" : true,
  36471. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8852e2_firmware:*:*:*:*:*:*:*:*",
  36472. "versionEndExcluding" : "7.1.94.8908",
  36473. "cpe_name" : [ ]
  36474. } ]
  36475. }, {
  36476. "operator" : "OR",
  36477. "children" : [ ],
  36478. "cpe_match" : [ {
  36479. "vulnerable" : false,
  36480. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8852e2:-:*:*:*:*:*:*:*",
  36481. "cpe_name" : [ ]
  36482. } ]
  36483. } ],
  36484. "cpe_match" : [ ]
  36485. }, {
  36486. "operator" : "AND",
  36487. "children" : [ {
  36488. "operator" : "OR",
  36489. "children" : [ ],
  36490. "cpe_match" : [ {
  36491. "vulnerable" : true,
  36492. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8852e4_firmware:*:*:*:*:*:*:*:*",
  36493. "versionEndExcluding" : "7.1.94.8908",
  36494. "cpe_name" : [ ]
  36495. } ]
  36496. }, {
  36497. "operator" : "OR",
  36498. "children" : [ ],
  36499. "cpe_match" : [ {
  36500. "vulnerable" : false,
  36501. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8852e4:-:*:*:*:*:*:*:*",
  36502. "cpe_name" : [ ]
  36503. } ]
  36504. } ],
  36505. "cpe_match" : [ ]
  36506. }, {
  36507. "operator" : "AND",
  36508. "children" : [ {
  36509. "operator" : "OR",
  36510. "children" : [ ],
  36511. "cpe_match" : [ {
  36512. "vulnerable" : true,
  36513. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6852e2_firmware:*:*:*:*:*:*:*:*",
  36514. "versionEndExcluding" : "7.1.94.8908",
  36515. "cpe_name" : [ ]
  36516. } ]
  36517. }, {
  36518. "operator" : "OR",
  36519. "children" : [ ],
  36520. "cpe_match" : [ {
  36521. "vulnerable" : false,
  36522. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6852e2:-:*:*:*:*:*:*:*",
  36523. "cpe_name" : [ ]
  36524. } ]
  36525. } ],
  36526. "cpe_match" : [ ]
  36527. }, {
  36528. "operator" : "AND",
  36529. "children" : [ {
  36530. "operator" : "OR",
  36531. "children" : [ ],
  36532. "cpe_match" : [ {
  36533. "vulnerable" : true,
  36534. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6852e4_firmware:*:*:*:*:*:*:*:*",
  36535. "versionEndExcluding" : "7.1.94.8908",
  36536. "cpe_name" : [ ]
  36537. } ]
  36538. }, {
  36539. "operator" : "OR",
  36540. "children" : [ ],
  36541. "cpe_match" : [ {
  36542. "vulnerable" : false,
  36543. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6852e4:-:*:*:*:*:*:*:*",
  36544. "cpe_name" : [ ]
  36545. } ]
  36546. } ],
  36547. "cpe_match" : [ ]
  36548. }, {
  36549. "operator" : "AND",
  36550. "children" : [ {
  36551. "operator" : "OR",
  36552. "children" : [ ],
  36553. "cpe_match" : [ {
  36554. "vulnerable" : true,
  36555. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6552e2_firmware:*:*:*:*:*:*:*:*",
  36556. "versionEndExcluding" : "7.1.94.8908",
  36557. "cpe_name" : [ ]
  36558. } ]
  36559. }, {
  36560. "operator" : "OR",
  36561. "children" : [ ],
  36562. "cpe_match" : [ {
  36563. "vulnerable" : false,
  36564. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6552e2:-:*:*:*:*:*:*:*",
  36565. "cpe_name" : [ ]
  36566. } ]
  36567. } ],
  36568. "cpe_match" : [ ]
  36569. }, {
  36570. "operator" : "AND",
  36571. "children" : [ {
  36572. "operator" : "OR",
  36573. "children" : [ ],
  36574. "cpe_match" : [ {
  36575. "vulnerable" : true,
  36576. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6552e4_firmware:*:*:*:*:*:*:*:*",
  36577. "versionEndExcluding" : "7.1.94.8908",
  36578. "cpe_name" : [ ]
  36579. } ]
  36580. }, {
  36581. "operator" : "OR",
  36582. "children" : [ ],
  36583. "cpe_match" : [ {
  36584. "vulnerable" : false,
  36585. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6552e4:-:*:*:*:*:*:*:*",
  36586. "cpe_name" : [ ]
  36587. } ]
  36588. } ],
  36589. "cpe_match" : [ ]
  36590. }, {
  36591. "operator" : "AND",
  36592. "children" : [ {
  36593. "operator" : "OR",
  36594. "children" : [ ],
  36595. "cpe_match" : [ {
  36596. "vulnerable" : true,
  36597. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6352ae2_firmware:*:*:*:*:*:*:*:*",
  36598. "versionEndExcluding" : "7.1.94.8908",
  36599. "cpe_name" : [ ]
  36600. } ]
  36601. }, {
  36602. "operator" : "OR",
  36603. "children" : [ ],
  36604. "cpe_match" : [ {
  36605. "vulnerable" : false,
  36606. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6352ae2:-:*:*:*:*:*:*:*",
  36607. "cpe_name" : [ ]
  36608. } ]
  36609. } ],
  36610. "cpe_match" : [ ]
  36611. }, {
  36612. "operator" : "AND",
  36613. "children" : [ {
  36614. "operator" : "OR",
  36615. "children" : [ ],
  36616. "cpe_match" : [ {
  36617. "vulnerable" : true,
  36618. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6352ae4_firmware:*:*:*:*:*:*:*:*",
  36619. "versionEndExcluding" : "7.1.94.8908",
  36620. "cpe_name" : [ ]
  36621. } ]
  36622. }, {
  36623. "operator" : "OR",
  36624. "children" : [ ],
  36625. "cpe_match" : [ {
  36626. "vulnerable" : false,
  36627. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6352ae4:-:*:*:*:*:*:*:*",
  36628. "cpe_name" : [ ]
  36629. } ]
  36630. } ],
  36631. "cpe_match" : [ ]
  36632. }, {
  36633. "operator" : "AND",
  36634. "children" : [ {
  36635. "operator" : "OR",
  36636. "children" : [ ],
  36637. "cpe_match" : [ {
  36638. "vulnerable" : true,
  36639. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r3052ae2_firmware:*:*:*:*:*:*:*:*",
  36640. "versionEndExcluding" : "7.1.94.8908",
  36641. "cpe_name" : [ ]
  36642. } ]
  36643. }, {
  36644. "operator" : "OR",
  36645. "children" : [ ],
  36646. "cpe_match" : [ {
  36647. "vulnerable" : false,
  36648. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r3052ae2:-:*:*:*:*:*:*:*",
  36649. "cpe_name" : [ ]
  36650. } ]
  36651. } ],
  36652. "cpe_match" : [ ]
  36653. }, {
  36654. "operator" : "AND",
  36655. "children" : [ {
  36656. "operator" : "OR",
  36657. "children" : [ ],
  36658. "cpe_match" : [ {
  36659. "vulnerable" : true,
  36660. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2g1052_firmware:*:*:*:*:*:*:*:*",
  36661. "versionEndExcluding" : "7.1.94.8908",
  36662. "cpe_name" : [ ]
  36663. } ]
  36664. }, {
  36665. "operator" : "OR",
  36666. "children" : [ ],
  36667. "cpe_match" : [ {
  36668. "vulnerable" : false,
  36669. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2g1052:-:*:*:*:*:*:*:*",
  36670. "cpe_name" : [ ]
  36671. } ]
  36672. } ],
  36673. "cpe_match" : [ ]
  36674. }, {
  36675. "operator" : "AND",
  36676. "children" : [ {
  36677. "operator" : "OR",
  36678. "children" : [ ],
  36679. "cpe_match" : [ {
  36680. "vulnerable" : true,
  36681. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8822e2_firmware:*:*:*:*:*:*:*:*",
  36682. "versionEndExcluding" : "7.1.94.8908",
  36683. "cpe_name" : [ ]
  36684. } ]
  36685. }, {
  36686. "operator" : "OR",
  36687. "children" : [ ],
  36688. "cpe_match" : [ {
  36689. "vulnerable" : false,
  36690. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8822e2:-:*:*:*:*:*:*:*",
  36691. "cpe_name" : [ ]
  36692. } ]
  36693. } ],
  36694. "cpe_match" : [ ]
  36695. }, {
  36696. "operator" : "AND",
  36697. "children" : [ {
  36698. "operator" : "OR",
  36699. "children" : [ ],
  36700. "cpe_match" : [ {
  36701. "vulnerable" : true,
  36702. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8822e4_firmware:*:*:*:*:*:*:*:*",
  36703. "versionEndExcluding" : "7.1.94.8908",
  36704. "cpe_name" : [ ]
  36705. } ]
  36706. }, {
  36707. "operator" : "OR",
  36708. "children" : [ ],
  36709. "cpe_match" : [ {
  36710. "vulnerable" : false,
  36711. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8822e4:-:*:*:*:*:*:*:*",
  36712. "cpe_name" : [ ]
  36713. } ]
  36714. } ],
  36715. "cpe_match" : [ ]
  36716. }, {
  36717. "operator" : "AND",
  36718. "children" : [ {
  36719. "operator" : "OR",
  36720. "children" : [ ],
  36721. "cpe_match" : [ {
  36722. "vulnerable" : true,
  36723. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6822e2_firmware:*:*:*:*:*:*:*:*",
  36724. "versionEndExcluding" : "7.1.94.8908",
  36725. "cpe_name" : [ ]
  36726. } ]
  36727. }, {
  36728. "operator" : "OR",
  36729. "children" : [ ],
  36730. "cpe_match" : [ {
  36731. "vulnerable" : false,
  36732. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6822e2:-:*:*:*:*:*:*:*",
  36733. "cpe_name" : [ ]
  36734. } ]
  36735. } ],
  36736. "cpe_match" : [ ]
  36737. }, {
  36738. "operator" : "AND",
  36739. "children" : [ {
  36740. "operator" : "OR",
  36741. "children" : [ ],
  36742. "cpe_match" : [ {
  36743. "vulnerable" : true,
  36744. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6822e4_firmware:*:*:*:*:*:*:*:*",
  36745. "versionEndExcluding" : "7.1.94.8908",
  36746. "cpe_name" : [ ]
  36747. } ]
  36748. }, {
  36749. "operator" : "OR",
  36750. "children" : [ ],
  36751. "cpe_match" : [ {
  36752. "vulnerable" : false,
  36753. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6822e4:-:*:*:*:*:*:*:*",
  36754. "cpe_name" : [ ]
  36755. } ]
  36756. } ],
  36757. "cpe_match" : [ ]
  36758. }, {
  36759. "operator" : "AND",
  36760. "children" : [ {
  36761. "operator" : "OR",
  36762. "children" : [ ],
  36763. "cpe_match" : [ {
  36764. "vulnerable" : true,
  36765. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6522e2_firmware:*:*:*:*:*:*:*:*",
  36766. "versionEndExcluding" : "7.1.94.8908",
  36767. "cpe_name" : [ ]
  36768. } ]
  36769. }, {
  36770. "operator" : "OR",
  36771. "children" : [ ],
  36772. "cpe_match" : [ {
  36773. "vulnerable" : false,
  36774. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6522e2:-:*:*:*:*:*:*:*",
  36775. "cpe_name" : [ ]
  36776. } ]
  36777. } ],
  36778. "cpe_match" : [ ]
  36779. }, {
  36780. "operator" : "AND",
  36781. "children" : [ {
  36782. "operator" : "OR",
  36783. "children" : [ ],
  36784. "cpe_match" : [ {
  36785. "vulnerable" : true,
  36786. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6522e4_firmware:*:*:*:*:*:*:*:*",
  36787. "versionEndExcluding" : "7.1.94.8908",
  36788. "cpe_name" : [ ]
  36789. } ]
  36790. }, {
  36791. "operator" : "OR",
  36792. "children" : [ ],
  36793. "cpe_match" : [ {
  36794. "vulnerable" : false,
  36795. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6522e4:-:*:*:*:*:*:*:*",
  36796. "cpe_name" : [ ]
  36797. } ]
  36798. } ],
  36799. "cpe_match" : [ ]
  36800. }, {
  36801. "operator" : "AND",
  36802. "children" : [ {
  36803. "operator" : "OR",
  36804. "children" : [ ],
  36805. "cpe_match" : [ {
  36806. "vulnerable" : true,
  36807. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6322ae2_firmware:*:*:*:*:*:*:*:*",
  36808. "versionEndExcluding" : "7.1.94.8908",
  36809. "cpe_name" : [ ]
  36810. } ]
  36811. }, {
  36812. "operator" : "OR",
  36813. "children" : [ ],
  36814. "cpe_match" : [ {
  36815. "vulnerable" : false,
  36816. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6322ae2:-:*:*:*:*:*:*:*",
  36817. "cpe_name" : [ ]
  36818. } ]
  36819. } ],
  36820. "cpe_match" : [ ]
  36821. }, {
  36822. "operator" : "AND",
  36823. "children" : [ {
  36824. "operator" : "OR",
  36825. "children" : [ ],
  36826. "cpe_match" : [ {
  36827. "vulnerable" : true,
  36828. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6322ae4_firmware:*:*:*:*:*:*:*:*",
  36829. "versionEndExcluding" : "7.1.94.8908",
  36830. "cpe_name" : [ ]
  36831. } ]
  36832. }, {
  36833. "operator" : "OR",
  36834. "children" : [ ],
  36835. "cpe_match" : [ {
  36836. "vulnerable" : false,
  36837. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6322ae4:-:*:*:*:*:*:*:*",
  36838. "cpe_name" : [ ]
  36839. } ]
  36840. } ],
  36841. "cpe_match" : [ ]
  36842. }, {
  36843. "operator" : "AND",
  36844. "children" : [ {
  36845. "operator" : "OR",
  36846. "children" : [ ],
  36847. "cpe_match" : [ {
  36848. "vulnerable" : true,
  36849. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r3022ae2_firmware:*:*:*:*:*:*:*:*",
  36850. "versionEndExcluding" : "7.1.94.8908",
  36851. "cpe_name" : [ ]
  36852. } ]
  36853. }, {
  36854. "operator" : "OR",
  36855. "children" : [ ],
  36856. "cpe_match" : [ {
  36857. "vulnerable" : false,
  36858. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r3022ae2:-:*:*:*:*:*:*:*",
  36859. "cpe_name" : [ ]
  36860. } ]
  36861. } ],
  36862. "cpe_match" : [ ]
  36863. }, {
  36864. "operator" : "AND",
  36865. "children" : [ {
  36866. "operator" : "OR",
  36867. "children" : [ ],
  36868. "cpe_match" : [ {
  36869. "vulnerable" : true,
  36870. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2g1022_firmware:*:*:*:*:*:*:*:*",
  36871. "versionEndExcluding" : "7.1.94.8908",
  36872. "cpe_name" : [ ]
  36873. } ]
  36874. }, {
  36875. "operator" : "OR",
  36876. "children" : [ ],
  36877. "cpe_match" : [ {
  36878. "vulnerable" : false,
  36879. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2g1022:-:*:*:*:*:*:*:*",
  36880. "cpe_name" : [ ]
  36881. } ]
  36882. } ],
  36883. "cpe_match" : [ ]
  36884. }, {
  36885. "operator" : "AND",
  36886. "children" : [ {
  36887. "operator" : "OR",
  36888. "children" : [ ],
  36889. "cpe_match" : [ {
  36890. "vulnerable" : true,
  36891. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2g1022x_firmware:*:*:*:*:*:*:*:*",
  36892. "versionEndExcluding" : "7.1.94.8908",
  36893. "cpe_name" : [ ]
  36894. } ]
  36895. }, {
  36896. "operator" : "OR",
  36897. "children" : [ ],
  36898. "cpe_match" : [ {
  36899. "vulnerable" : false,
  36900. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2g1022x:-:*:*:*:*:*:*:*",
  36901. "cpe_name" : [ ]
  36902. } ]
  36903. } ],
  36904. "cpe_match" : [ ]
  36905. }, {
  36906. "operator" : "AND",
  36907. "children" : [ {
  36908. "operator" : "OR",
  36909. "children" : [ ],
  36910. "cpe_match" : [ {
  36911. "vulnerable" : true,
  36912. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8852ax_firmware:*:*:*:*:*:*:*:*",
  36913. "versionEndExcluding" : "7.1.94.8908",
  36914. "cpe_name" : [ ]
  36915. } ]
  36916. }, {
  36917. "operator" : "OR",
  36918. "children" : [ ],
  36919. "cpe_match" : [ {
  36920. "vulnerable" : false,
  36921. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8852ax:-:*:*:*:*:*:*:*",
  36922. "cpe_name" : [ ]
  36923. } ]
  36924. } ],
  36925. "cpe_match" : [ ]
  36926. }, {
  36927. "operator" : "AND",
  36928. "children" : [ {
  36929. "operator" : "OR",
  36930. "children" : [ ],
  36931. "cpe_match" : [ {
  36932. "vulnerable" : true,
  36933. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8152x-p_firmware:*:*:*:*:*:*:*:*",
  36934. "versionEndExcluding" : "7.1.94.8908",
  36935. "cpe_name" : [ ]
  36936. } ]
  36937. }, {
  36938. "operator" : "OR",
  36939. "children" : [ ],
  36940. "cpe_match" : [ {
  36941. "vulnerable" : false,
  36942. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8152x-p:-:*:*:*:*:*:*:*",
  36943. "cpe_name" : [ ]
  36944. } ]
  36945. } ],
  36946. "cpe_match" : [ ]
  36947. }, {
  36948. "operator" : "AND",
  36949. "children" : [ {
  36950. "operator" : "OR",
  36951. "children" : [ ],
  36952. "cpe_match" : [ {
  36953. "vulnerable" : true,
  36954. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8152x2-p_firmware:*:*:*:*:*:*:*:*",
  36955. "versionEndExcluding" : "7.1.94.8908",
  36956. "cpe_name" : [ ]
  36957. } ]
  36958. }, {
  36959. "operator" : "OR",
  36960. "children" : [ ],
  36961. "cpe_match" : [ {
  36962. "vulnerable" : false,
  36963. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8152x2-p:-:*:*:*:*:*:*:*",
  36964. "cpe_name" : [ ]
  36965. } ]
  36966. } ],
  36967. "cpe_match" : [ ]
  36968. }, {
  36969. "operator" : "AND",
  36970. "children" : [ {
  36971. "operator" : "OR",
  36972. "children" : [ ],
  36973. "cpe_match" : [ {
  36974. "vulnerable" : true,
  36975. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8052ex25_firmware:*:*:*:*:*:*:*:*",
  36976. "versionEndExcluding" : "7.1.94.8908",
  36977. "cpe_name" : [ ]
  36978. } ]
  36979. }, {
  36980. "operator" : "OR",
  36981. "children" : [ ],
  36982. "cpe_match" : [ {
  36983. "vulnerable" : false,
  36984. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8052ex25:-:*:*:*:*:*:*:*",
  36985. "cpe_name" : [ ]
  36986. } ]
  36987. } ],
  36988. "cpe_match" : [ ]
  36989. }, {
  36990. "operator" : "AND",
  36991. "children" : [ {
  36992. "operator" : "OR",
  36993. "children" : [ ],
  36994. "cpe_match" : [ {
  36995. "vulnerable" : true,
  36996. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6552x_firmware:*:*:*:*:*:*:*:*",
  36997. "versionEndExcluding" : "7.1.94.8908",
  36998. "cpe_name" : [ ]
  36999. } ]
  37000. }, {
  37001. "operator" : "OR",
  37002. "children" : [ ],
  37003. "cpe_match" : [ {
  37004. "vulnerable" : false,
  37005. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6552x:-:*:*:*:*:*:*:*",
  37006. "cpe_name" : [ ]
  37007. } ]
  37008. } ],
  37009. "cpe_match" : [ ]
  37010. }, {
  37011. "operator" : "AND",
  37012. "children" : [ {
  37013. "operator" : "OR",
  37014. "children" : [ ],
  37015. "cpe_match" : [ {
  37016. "vulnerable" : true,
  37017. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6452ax_firmware:*:*:*:*:*:*:*:*",
  37018. "versionEndExcluding" : "7.1.94.8908",
  37019. "cpe_name" : [ ]
  37020. } ]
  37021. }, {
  37022. "operator" : "OR",
  37023. "children" : [ ],
  37024. "cpe_match" : [ {
  37025. "vulnerable" : false,
  37026. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6452ax:-:*:*:*:*:*:*:*",
  37027. "cpe_name" : [ ]
  37028. } ]
  37029. } ],
  37030. "cpe_match" : [ ]
  37031. }, {
  37032. "operator" : "AND",
  37033. "children" : [ {
  37034. "operator" : "OR",
  37035. "children" : [ ],
  37036. "cpe_match" : [ {
  37037. "vulnerable" : true,
  37038. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6452ax-p_firmware:*:*:*:*:*:*:*:*",
  37039. "versionEndExcluding" : "7.1.94.8908",
  37040. "cpe_name" : [ ]
  37041. } ]
  37042. }, {
  37043. "operator" : "OR",
  37044. "children" : [ ],
  37045. "cpe_match" : [ {
  37046. "vulnerable" : false,
  37047. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6452ax-p:-:*:*:*:*:*:*:*",
  37048. "cpe_name" : [ ]
  37049. } ]
  37050. } ],
  37051. "cpe_match" : [ ]
  37052. }, {
  37053. "operator" : "AND",
  37054. "children" : [ {
  37055. "operator" : "OR",
  37056. "children" : [ ],
  37057. "cpe_match" : [ {
  37058. "vulnerable" : true,
  37059. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8822ax_firmware:*:*:*:*:*:*:*:*",
  37060. "versionEndExcluding" : "7.1.94.8908",
  37061. "cpe_name" : [ ]
  37062. } ]
  37063. }, {
  37064. "operator" : "OR",
  37065. "children" : [ ],
  37066. "cpe_match" : [ {
  37067. "vulnerable" : false,
  37068. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8822ax:-:*:*:*:*:*:*:*",
  37069. "cpe_name" : [ ]
  37070. } ]
  37071. } ],
  37072. "cpe_match" : [ ]
  37073. }, {
  37074. "operator" : "AND",
  37075. "children" : [ {
  37076. "operator" : "OR",
  37077. "children" : [ ],
  37078. "cpe_match" : [ {
  37079. "vulnerable" : true,
  37080. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8122x-p_firmware:*:*:*:*:*:*:*:*",
  37081. "versionEndExcluding" : "7.1.94.8908",
  37082. "cpe_name" : [ ]
  37083. } ]
  37084. }, {
  37085. "operator" : "OR",
  37086. "children" : [ ],
  37087. "cpe_match" : [ {
  37088. "vulnerable" : false,
  37089. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8122x-p:-:*:*:*:*:*:*:*",
  37090. "cpe_name" : [ ]
  37091. } ]
  37092. } ],
  37093. "cpe_match" : [ ]
  37094. }, {
  37095. "operator" : "AND",
  37096. "children" : [ {
  37097. "operator" : "OR",
  37098. "children" : [ ],
  37099. "cpe_match" : [ {
  37100. "vulnerable" : true,
  37101. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8122x2-p_firmware:*:*:*:*:*:*:*:*",
  37102. "versionEndExcluding" : "7.1.94.8908",
  37103. "cpe_name" : [ ]
  37104. } ]
  37105. }, {
  37106. "operator" : "OR",
  37107. "children" : [ ],
  37108. "cpe_match" : [ {
  37109. "vulnerable" : false,
  37110. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8122x2-p:-:*:*:*:*:*:*:*",
  37111. "cpe_name" : [ ]
  37112. } ]
  37113. } ],
  37114. "cpe_match" : [ ]
  37115. }, {
  37116. "operator" : "AND",
  37117. "children" : [ {
  37118. "operator" : "OR",
  37119. "children" : [ ],
  37120. "cpe_match" : [ {
  37121. "vulnerable" : true,
  37122. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8022ex25_firmware:*:*:*:*:*:*:*:*",
  37123. "versionEndExcluding" : "7.1.94.8908",
  37124. "cpe_name" : [ ]
  37125. } ]
  37126. }, {
  37127. "operator" : "OR",
  37128. "children" : [ ],
  37129. "cpe_match" : [ {
  37130. "vulnerable" : false,
  37131. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8022ex25:-:*:*:*:*:*:*:*",
  37132. "cpe_name" : [ ]
  37133. } ]
  37134. } ],
  37135. "cpe_match" : [ ]
  37136. }, {
  37137. "operator" : "AND",
  37138. "children" : [ {
  37139. "operator" : "OR",
  37140. "children" : [ ],
  37141. "cpe_match" : [ {
  37142. "vulnerable" : true,
  37143. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6522x_firmware:*:*:*:*:*:*:*:*",
  37144. "versionEndExcluding" : "7.1.94.8908",
  37145. "cpe_name" : [ ]
  37146. } ]
  37147. }, {
  37148. "operator" : "OR",
  37149. "children" : [ ],
  37150. "cpe_match" : [ {
  37151. "vulnerable" : false,
  37152. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6522x:-:*:*:*:*:*:*:*",
  37153. "cpe_name" : [ ]
  37154. } ]
  37155. } ],
  37156. "cpe_match" : [ ]
  37157. }, {
  37158. "operator" : "AND",
  37159. "children" : [ {
  37160. "operator" : "OR",
  37161. "children" : [ ],
  37162. "cpe_match" : [ {
  37163. "vulnerable" : true,
  37164. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6422ax_firmware:*:*:*:*:*:*:*:*",
  37165. "versionEndExcluding" : "7.1.94.8908",
  37166. "cpe_name" : [ ]
  37167. } ]
  37168. }, {
  37169. "operator" : "OR",
  37170. "children" : [ ],
  37171. "cpe_match" : [ {
  37172. "vulnerable" : false,
  37173. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6422ax:-:*:*:*:*:*:*:*",
  37174. "cpe_name" : [ ]
  37175. } ]
  37176. } ],
  37177. "cpe_match" : [ ]
  37178. }, {
  37179. "operator" : "AND",
  37180. "children" : [ {
  37181. "operator" : "OR",
  37182. "children" : [ ],
  37183. "cpe_match" : [ {
  37184. "vulnerable" : true,
  37185. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6422ax-p_firmware:*:*:*:*:*:*:*:*",
  37186. "versionEndExcluding" : "7.1.94.8908",
  37187. "cpe_name" : [ ]
  37188. } ]
  37189. }, {
  37190. "operator" : "OR",
  37191. "children" : [ ],
  37192. "cpe_match" : [ {
  37193. "vulnerable" : false,
  37194. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6422ax-p:-:*:*:*:*:*:*:*",
  37195. "cpe_name" : [ ]
  37196. } ]
  37197. } ],
  37198. "cpe_match" : [ ]
  37199. }, {
  37200. "operator" : "AND",
  37201. "children" : [ {
  37202. "operator" : "OR",
  37203. "children" : [ ],
  37204. "cpe_match" : [ {
  37205. "vulnerable" : true,
  37206. "cpe23Uri" : "cpe:2.3:o:meritlilin:p3r6322e2_firmware:*:*:*:*:*:*:*:*",
  37207. "versionEndExcluding" : "7.1.94.8908",
  37208. "cpe_name" : [ ]
  37209. } ]
  37210. }, {
  37211. "operator" : "OR",
  37212. "children" : [ ],
  37213. "cpe_match" : [ {
  37214. "vulnerable" : false,
  37215. "cpe23Uri" : "cpe:2.3:h:meritlilin:p3r6322e2:-:*:*:*:*:*:*:*",
  37216. "cpe_name" : [ ]
  37217. } ]
  37218. } ],
  37219. "cpe_match" : [ ]
  37220. }, {
  37221. "operator" : "AND",
  37222. "children" : [ {
  37223. "operator" : "OR",
  37224. "children" : [ ],
  37225. "cpe_match" : [ {
  37226. "vulnerable" : true,
  37227. "cpe23Uri" : "cpe:2.3:o:meritlilin:p3r6522e2_firmware:*:*:*:*:*:*:*:*",
  37228. "versionEndExcluding" : "7.1.94.8908",
  37229. "cpe_name" : [ ]
  37230. } ]
  37231. }, {
  37232. "operator" : "OR",
  37233. "children" : [ ],
  37234. "cpe_match" : [ {
  37235. "vulnerable" : false,
  37236. "cpe23Uri" : "cpe:2.3:h:meritlilin:p3r6522e2:-:*:*:*:*:*:*:*",
  37237. "cpe_name" : [ ]
  37238. } ]
  37239. } ],
  37240. "cpe_match" : [ ]
  37241. }, {
  37242. "operator" : "AND",
  37243. "children" : [ {
  37244. "operator" : "OR",
  37245. "children" : [ ],
  37246. "cpe_match" : [ {
  37247. "vulnerable" : true,
  37248. "cpe23Uri" : "cpe:2.3:o:meritlilin:p3r8822e2_firmware:*:*:*:*:*:*:*:*",
  37249. "versionEndExcluding" : "7.1.94.8908",
  37250. "cpe_name" : [ ]
  37251. } ]
  37252. }, {
  37253. "operator" : "OR",
  37254. "children" : [ ],
  37255. "cpe_match" : [ {
  37256. "vulnerable" : false,
  37257. "cpe23Uri" : "cpe:2.3:h:meritlilin:p3r8822e2:-:*:*:*:*:*:*:*",
  37258. "cpe_name" : [ ]
  37259. } ]
  37260. } ],
  37261. "cpe_match" : [ ]
  37262. }, {
  37263. "operator" : "AND",
  37264. "children" : [ {
  37265. "operator" : "OR",
  37266. "children" : [ ],
  37267. "cpe_match" : [ {
  37268. "vulnerable" : true,
  37269. "cpe23Uri" : "cpe:2.3:o:meritlilin:z3r6422x3_firmware:*:*:*:*:*:*:*:*",
  37270. "versionEndExcluding" : "7.1.94.8908",
  37271. "cpe_name" : [ ]
  37272. } ]
  37273. }, {
  37274. "operator" : "OR",
  37275. "children" : [ ],
  37276. "cpe_match" : [ {
  37277. "vulnerable" : false,
  37278. "cpe23Uri" : "cpe:2.3:h:meritlilin:z3r6422x3:-:*:*:*:*:*:*:*",
  37279. "cpe_name" : [ ]
  37280. } ]
  37281. } ],
  37282. "cpe_match" : [ ]
  37283. }, {
  37284. "operator" : "AND",
  37285. "children" : [ {
  37286. "operator" : "OR",
  37287. "children" : [ ],
  37288. "cpe_match" : [ {
  37289. "vulnerable" : true,
  37290. "cpe23Uri" : "cpe:2.3:o:meritlilin:z3r6522x_firmware:*:*:*:*:*:*:*:*",
  37291. "versionEndExcluding" : "7.1.94.8908",
  37292. "cpe_name" : [ ]
  37293. } ]
  37294. }, {
  37295. "operator" : "OR",
  37296. "children" : [ ],
  37297. "cpe_match" : [ {
  37298. "vulnerable" : false,
  37299. "cpe23Uri" : "cpe:2.3:h:meritlilin:z3r6522x:-:*:*:*:*:*:*:*",
  37300. "cpe_name" : [ ]
  37301. } ]
  37302. } ],
  37303. "cpe_match" : [ ]
  37304. }, {
  37305. "operator" : "AND",
  37306. "children" : [ {
  37307. "operator" : "OR",
  37308. "children" : [ ],
  37309. "cpe_match" : [ {
  37310. "vulnerable" : true,
  37311. "cpe23Uri" : "cpe:2.3:o:meritlilin:z3r8922x3_firmware:*:*:*:*:*:*:*:*",
  37312. "versionEndExcluding" : "7.1.94.8908",
  37313. "cpe_name" : [ ]
  37314. } ]
  37315. }, {
  37316. "operator" : "OR",
  37317. "children" : [ ],
  37318. "cpe_match" : [ {
  37319. "vulnerable" : false,
  37320. "cpe23Uri" : "cpe:2.3:h:meritlilin:z3r8922x3:-:*:*:*:*:*:*:*",
  37321. "cpe_name" : [ ]
  37322. } ]
  37323. } ],
  37324. "cpe_match" : [ ]
  37325. } ]
  37326. },
  37327. "impact" : {
  37328. "baseMetricV3" : {
  37329. "cvssV3" : {
  37330. "version" : "3.1",
  37331. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  37332. "attackVector" : "NETWORK",
  37333. "attackComplexity" : "LOW",
  37334. "privilegesRequired" : "NONE",
  37335. "userInteraction" : "NONE",
  37336. "scope" : "UNCHANGED",
  37337. "confidentialityImpact" : "HIGH",
  37338. "integrityImpact" : "HIGH",
  37339. "availabilityImpact" : "HIGH",
  37340. "baseScore" : 9.8,
  37341. "baseSeverity" : "CRITICAL"
  37342. },
  37343. "exploitabilityScore" : 3.9,
  37344. "impactScore" : 5.9
  37345. },
  37346. "baseMetricV2" : {
  37347. "cvssV2" : {
  37348. "version" : "2.0",
  37349. "vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C",
  37350. "accessVector" : "NETWORK",
  37351. "accessComplexity" : "LOW",
  37352. "authentication" : "SINGLE",
  37353. "confidentialityImpact" : "COMPLETE",
  37354. "integrityImpact" : "COMPLETE",
  37355. "availabilityImpact" : "COMPLETE",
  37356. "baseScore" : 9.0
  37357. },
  37358. "severity" : "HIGH",
  37359. "exploitabilityScore" : 8.0,
  37360. "impactScore" : 10.0,
  37361. "acInsufInfo" : false,
  37362. "obtainAllPrivilege" : false,
  37363. "obtainUserPrivilege" : false,
  37364. "obtainOtherPrivilege" : false,
  37365. "userInteractionRequired" : false
  37366. }
  37367. },
  37368. "publishedDate" : "2021-04-28T10:15Z",
  37369. "lastModifiedDate" : "2021-05-07T19:12Z"
  37370. }, {
  37371. "cve" : {
  37372. "data_type" : "CVE",
  37373. "data_format" : "MITRE",
  37374. "data_version" : "4.0",
  37375. "CVE_data_meta" : {
  37376. "ID" : "CVE-2021-30166",
  37377. "ASSIGNER" : "cve@cert.org.tw"
  37378. },
  37379. "problemtype" : {
  37380. "problemtype_data" : [ {
  37381. "description" : [ {
  37382. "lang" : "en",
  37383. "value" : "CWE-78"
  37384. } ]
  37385. } ]
  37386. },
  37387. "references" : {
  37388. "reference_data" : [ {
  37389. "url" : "https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf",
  37390. "name" : "https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf",
  37391. "refsource" : "MISC",
  37392. "tags" : [ "Vendor Advisory" ]
  37393. }, {
  37394. "url" : "https://www.twcert.org.tw/tw/cp-132-4676-391a5-1.html",
  37395. "name" : "https://www.twcert.org.tw/tw/cp-132-4676-391a5-1.html",
  37396. "refsource" : "MISC",
  37397. "tags" : [ "Third Party Advisory" ]
  37398. }, {
  37399. "url" : "https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388",
  37400. "name" : "https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388",
  37401. "refsource" : "MISC",
  37402. "tags" : [ "Third Party Advisory" ]
  37403. }, {
  37404. "url" : "https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e",
  37405. "name" : "https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e",
  37406. "refsource" : "MISC",
  37407. "tags" : [ "Third Party Advisory" ]
  37408. } ]
  37409. },
  37410. "description" : {
  37411. "description_data" : [ {
  37412. "lang" : "en",
  37413. "value" : "The NTP Server configuration function of the IP camera device is not verified with special parameters. Remote attackers can perform a command Injection attack and execute arbitrary commands after logging in with the privileged permission."
  37414. } ]
  37415. }
  37416. },
  37417. "configurations" : {
  37418. "CVE_data_version" : "4.0",
  37419. "nodes" : [ {
  37420. "operator" : "AND",
  37421. "children" : [ {
  37422. "operator" : "OR",
  37423. "children" : [ ],
  37424. "cpe_match" : [ {
  37425. "vulnerable" : true,
  37426. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8852e2_firmware:*:*:*:*:*:*:*:*",
  37427. "versionEndExcluding" : "7.1.94.8908",
  37428. "cpe_name" : [ ]
  37429. } ]
  37430. }, {
  37431. "operator" : "OR",
  37432. "children" : [ ],
  37433. "cpe_match" : [ {
  37434. "vulnerable" : false,
  37435. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8852e2:-:*:*:*:*:*:*:*",
  37436. "cpe_name" : [ ]
  37437. } ]
  37438. } ],
  37439. "cpe_match" : [ ]
  37440. }, {
  37441. "operator" : "AND",
  37442. "children" : [ {
  37443. "operator" : "OR",
  37444. "children" : [ ],
  37445. "cpe_match" : [ {
  37446. "vulnerable" : true,
  37447. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8852e4_firmware:*:*:*:*:*:*:*:*",
  37448. "versionEndExcluding" : "7.1.94.8908",
  37449. "cpe_name" : [ ]
  37450. } ]
  37451. }, {
  37452. "operator" : "OR",
  37453. "children" : [ ],
  37454. "cpe_match" : [ {
  37455. "vulnerable" : false,
  37456. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8852e4:-:*:*:*:*:*:*:*",
  37457. "cpe_name" : [ ]
  37458. } ]
  37459. } ],
  37460. "cpe_match" : [ ]
  37461. }, {
  37462. "operator" : "AND",
  37463. "children" : [ {
  37464. "operator" : "OR",
  37465. "children" : [ ],
  37466. "cpe_match" : [ {
  37467. "vulnerable" : true,
  37468. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6852e2_firmware:*:*:*:*:*:*:*:*",
  37469. "versionEndExcluding" : "7.1.94.8908",
  37470. "cpe_name" : [ ]
  37471. } ]
  37472. }, {
  37473. "operator" : "OR",
  37474. "children" : [ ],
  37475. "cpe_match" : [ {
  37476. "vulnerable" : false,
  37477. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6852e2:-:*:*:*:*:*:*:*",
  37478. "cpe_name" : [ ]
  37479. } ]
  37480. } ],
  37481. "cpe_match" : [ ]
  37482. }, {
  37483. "operator" : "AND",
  37484. "children" : [ {
  37485. "operator" : "OR",
  37486. "children" : [ ],
  37487. "cpe_match" : [ {
  37488. "vulnerable" : true,
  37489. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6852e4_firmware:*:*:*:*:*:*:*:*",
  37490. "versionEndExcluding" : "7.1.94.8908",
  37491. "cpe_name" : [ ]
  37492. } ]
  37493. }, {
  37494. "operator" : "OR",
  37495. "children" : [ ],
  37496. "cpe_match" : [ {
  37497. "vulnerable" : false,
  37498. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6852e4:-:*:*:*:*:*:*:*",
  37499. "cpe_name" : [ ]
  37500. } ]
  37501. } ],
  37502. "cpe_match" : [ ]
  37503. }, {
  37504. "operator" : "AND",
  37505. "children" : [ {
  37506. "operator" : "OR",
  37507. "children" : [ ],
  37508. "cpe_match" : [ {
  37509. "vulnerable" : true,
  37510. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6552e2_firmware:*:*:*:*:*:*:*:*",
  37511. "versionEndExcluding" : "7.1.94.8908",
  37512. "cpe_name" : [ ]
  37513. } ]
  37514. }, {
  37515. "operator" : "OR",
  37516. "children" : [ ],
  37517. "cpe_match" : [ {
  37518. "vulnerable" : false,
  37519. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6552e2:-:*:*:*:*:*:*:*",
  37520. "cpe_name" : [ ]
  37521. } ]
  37522. } ],
  37523. "cpe_match" : [ ]
  37524. }, {
  37525. "operator" : "AND",
  37526. "children" : [ {
  37527. "operator" : "OR",
  37528. "children" : [ ],
  37529. "cpe_match" : [ {
  37530. "vulnerable" : true,
  37531. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6552e4_firmware:*:*:*:*:*:*:*:*",
  37532. "versionEndExcluding" : "7.1.94.8908",
  37533. "cpe_name" : [ ]
  37534. } ]
  37535. }, {
  37536. "operator" : "OR",
  37537. "children" : [ ],
  37538. "cpe_match" : [ {
  37539. "vulnerable" : false,
  37540. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6552e4:-:*:*:*:*:*:*:*",
  37541. "cpe_name" : [ ]
  37542. } ]
  37543. } ],
  37544. "cpe_match" : [ ]
  37545. }, {
  37546. "operator" : "AND",
  37547. "children" : [ {
  37548. "operator" : "OR",
  37549. "children" : [ ],
  37550. "cpe_match" : [ {
  37551. "vulnerable" : true,
  37552. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6352ae2_firmware:*:*:*:*:*:*:*:*",
  37553. "versionEndExcluding" : "7.1.94.8908",
  37554. "cpe_name" : [ ]
  37555. } ]
  37556. }, {
  37557. "operator" : "OR",
  37558. "children" : [ ],
  37559. "cpe_match" : [ {
  37560. "vulnerable" : false,
  37561. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6352ae2:-:*:*:*:*:*:*:*",
  37562. "cpe_name" : [ ]
  37563. } ]
  37564. } ],
  37565. "cpe_match" : [ ]
  37566. }, {
  37567. "operator" : "AND",
  37568. "children" : [ {
  37569. "operator" : "OR",
  37570. "children" : [ ],
  37571. "cpe_match" : [ {
  37572. "vulnerable" : true,
  37573. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6352ae4_firmware:*:*:*:*:*:*:*:*",
  37574. "versionEndExcluding" : "7.1.94.8908",
  37575. "cpe_name" : [ ]
  37576. } ]
  37577. }, {
  37578. "operator" : "OR",
  37579. "children" : [ ],
  37580. "cpe_match" : [ {
  37581. "vulnerable" : false,
  37582. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6352ae4:-:*:*:*:*:*:*:*",
  37583. "cpe_name" : [ ]
  37584. } ]
  37585. } ],
  37586. "cpe_match" : [ ]
  37587. }, {
  37588. "operator" : "AND",
  37589. "children" : [ {
  37590. "operator" : "OR",
  37591. "children" : [ ],
  37592. "cpe_match" : [ {
  37593. "vulnerable" : true,
  37594. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r3052ae2_firmware:*:*:*:*:*:*:*:*",
  37595. "versionEndExcluding" : "7.1.94.8908",
  37596. "cpe_name" : [ ]
  37597. } ]
  37598. }, {
  37599. "operator" : "OR",
  37600. "children" : [ ],
  37601. "cpe_match" : [ {
  37602. "vulnerable" : false,
  37603. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r3052ae2:-:*:*:*:*:*:*:*",
  37604. "cpe_name" : [ ]
  37605. } ]
  37606. } ],
  37607. "cpe_match" : [ ]
  37608. }, {
  37609. "operator" : "AND",
  37610. "children" : [ {
  37611. "operator" : "OR",
  37612. "children" : [ ],
  37613. "cpe_match" : [ {
  37614. "vulnerable" : true,
  37615. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2g1052_firmware:*:*:*:*:*:*:*:*",
  37616. "versionEndExcluding" : "7.1.94.8908",
  37617. "cpe_name" : [ ]
  37618. } ]
  37619. }, {
  37620. "operator" : "OR",
  37621. "children" : [ ],
  37622. "cpe_match" : [ {
  37623. "vulnerable" : false,
  37624. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2g1052:-:*:*:*:*:*:*:*",
  37625. "cpe_name" : [ ]
  37626. } ]
  37627. } ],
  37628. "cpe_match" : [ ]
  37629. }, {
  37630. "operator" : "AND",
  37631. "children" : [ {
  37632. "operator" : "OR",
  37633. "children" : [ ],
  37634. "cpe_match" : [ {
  37635. "vulnerable" : true,
  37636. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8822e2_firmware:*:*:*:*:*:*:*:*",
  37637. "versionEndExcluding" : "7.1.94.8908",
  37638. "cpe_name" : [ ]
  37639. } ]
  37640. }, {
  37641. "operator" : "OR",
  37642. "children" : [ ],
  37643. "cpe_match" : [ {
  37644. "vulnerable" : false,
  37645. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8822e2:-:*:*:*:*:*:*:*",
  37646. "cpe_name" : [ ]
  37647. } ]
  37648. } ],
  37649. "cpe_match" : [ ]
  37650. }, {
  37651. "operator" : "AND",
  37652. "children" : [ {
  37653. "operator" : "OR",
  37654. "children" : [ ],
  37655. "cpe_match" : [ {
  37656. "vulnerable" : true,
  37657. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r8822e4_firmware:*:*:*:*:*:*:*:*",
  37658. "versionEndExcluding" : "7.1.94.8908",
  37659. "cpe_name" : [ ]
  37660. } ]
  37661. }, {
  37662. "operator" : "OR",
  37663. "children" : [ ],
  37664. "cpe_match" : [ {
  37665. "vulnerable" : false,
  37666. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r8822e4:-:*:*:*:*:*:*:*",
  37667. "cpe_name" : [ ]
  37668. } ]
  37669. } ],
  37670. "cpe_match" : [ ]
  37671. }, {
  37672. "operator" : "AND",
  37673. "children" : [ {
  37674. "operator" : "OR",
  37675. "children" : [ ],
  37676. "cpe_match" : [ {
  37677. "vulnerable" : true,
  37678. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6822e2_firmware:*:*:*:*:*:*:*:*",
  37679. "versionEndExcluding" : "7.1.94.8908",
  37680. "cpe_name" : [ ]
  37681. } ]
  37682. }, {
  37683. "operator" : "OR",
  37684. "children" : [ ],
  37685. "cpe_match" : [ {
  37686. "vulnerable" : false,
  37687. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6822e2:-:*:*:*:*:*:*:*",
  37688. "cpe_name" : [ ]
  37689. } ]
  37690. } ],
  37691. "cpe_match" : [ ]
  37692. }, {
  37693. "operator" : "AND",
  37694. "children" : [ {
  37695. "operator" : "OR",
  37696. "children" : [ ],
  37697. "cpe_match" : [ {
  37698. "vulnerable" : true,
  37699. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6822e4_firmware:*:*:*:*:*:*:*:*",
  37700. "versionEndExcluding" : "7.1.94.8908",
  37701. "cpe_name" : [ ]
  37702. } ]
  37703. }, {
  37704. "operator" : "OR",
  37705. "children" : [ ],
  37706. "cpe_match" : [ {
  37707. "vulnerable" : false,
  37708. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6822e4:-:*:*:*:*:*:*:*",
  37709. "cpe_name" : [ ]
  37710. } ]
  37711. } ],
  37712. "cpe_match" : [ ]
  37713. }, {
  37714. "operator" : "AND",
  37715. "children" : [ {
  37716. "operator" : "OR",
  37717. "children" : [ ],
  37718. "cpe_match" : [ {
  37719. "vulnerable" : true,
  37720. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6522e2_firmware:*:*:*:*:*:*:*:*",
  37721. "versionEndExcluding" : "7.1.94.8908",
  37722. "cpe_name" : [ ]
  37723. } ]
  37724. }, {
  37725. "operator" : "OR",
  37726. "children" : [ ],
  37727. "cpe_match" : [ {
  37728. "vulnerable" : false,
  37729. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6522e2:-:*:*:*:*:*:*:*",
  37730. "cpe_name" : [ ]
  37731. } ]
  37732. } ],
  37733. "cpe_match" : [ ]
  37734. }, {
  37735. "operator" : "AND",
  37736. "children" : [ {
  37737. "operator" : "OR",
  37738. "children" : [ ],
  37739. "cpe_match" : [ {
  37740. "vulnerable" : true,
  37741. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6522e4_firmware:*:*:*:*:*:*:*:*",
  37742. "versionEndExcluding" : "7.1.94.8908",
  37743. "cpe_name" : [ ]
  37744. } ]
  37745. }, {
  37746. "operator" : "OR",
  37747. "children" : [ ],
  37748. "cpe_match" : [ {
  37749. "vulnerable" : false,
  37750. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6522e4:-:*:*:*:*:*:*:*",
  37751. "cpe_name" : [ ]
  37752. } ]
  37753. } ],
  37754. "cpe_match" : [ ]
  37755. }, {
  37756. "operator" : "AND",
  37757. "children" : [ {
  37758. "operator" : "OR",
  37759. "children" : [ ],
  37760. "cpe_match" : [ {
  37761. "vulnerable" : true,
  37762. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6322ae2_firmware:*:*:*:*:*:*:*:*",
  37763. "versionEndExcluding" : "7.1.94.8908",
  37764. "cpe_name" : [ ]
  37765. } ]
  37766. }, {
  37767. "operator" : "OR",
  37768. "children" : [ ],
  37769. "cpe_match" : [ {
  37770. "vulnerable" : false,
  37771. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6322ae2:-:*:*:*:*:*:*:*",
  37772. "cpe_name" : [ ]
  37773. } ]
  37774. } ],
  37775. "cpe_match" : [ ]
  37776. }, {
  37777. "operator" : "AND",
  37778. "children" : [ {
  37779. "operator" : "OR",
  37780. "children" : [ ],
  37781. "cpe_match" : [ {
  37782. "vulnerable" : true,
  37783. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r6322ae4_firmware:*:*:*:*:*:*:*:*",
  37784. "versionEndExcluding" : "7.1.94.8908",
  37785. "cpe_name" : [ ]
  37786. } ]
  37787. }, {
  37788. "operator" : "OR",
  37789. "children" : [ ],
  37790. "cpe_match" : [ {
  37791. "vulnerable" : false,
  37792. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r6322ae4:-:*:*:*:*:*:*:*",
  37793. "cpe_name" : [ ]
  37794. } ]
  37795. } ],
  37796. "cpe_match" : [ ]
  37797. }, {
  37798. "operator" : "AND",
  37799. "children" : [ {
  37800. "operator" : "OR",
  37801. "children" : [ ],
  37802. "cpe_match" : [ {
  37803. "vulnerable" : true,
  37804. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2r3022ae2_firmware:*:*:*:*:*:*:*:*",
  37805. "versionEndExcluding" : "7.1.94.8908",
  37806. "cpe_name" : [ ]
  37807. } ]
  37808. }, {
  37809. "operator" : "OR",
  37810. "children" : [ ],
  37811. "cpe_match" : [ {
  37812. "vulnerable" : false,
  37813. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2r3022ae2:-:*:*:*:*:*:*:*",
  37814. "cpe_name" : [ ]
  37815. } ]
  37816. } ],
  37817. "cpe_match" : [ ]
  37818. }, {
  37819. "operator" : "AND",
  37820. "children" : [ {
  37821. "operator" : "OR",
  37822. "children" : [ ],
  37823. "cpe_match" : [ {
  37824. "vulnerable" : true,
  37825. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2g1022_firmware:*:*:*:*:*:*:*:*",
  37826. "versionEndExcluding" : "7.1.94.8908",
  37827. "cpe_name" : [ ]
  37828. } ]
  37829. }, {
  37830. "operator" : "OR",
  37831. "children" : [ ],
  37832. "cpe_match" : [ {
  37833. "vulnerable" : false,
  37834. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2g1022:-:*:*:*:*:*:*:*",
  37835. "cpe_name" : [ ]
  37836. } ]
  37837. } ],
  37838. "cpe_match" : [ ]
  37839. }, {
  37840. "operator" : "AND",
  37841. "children" : [ {
  37842. "operator" : "OR",
  37843. "children" : [ ],
  37844. "cpe_match" : [ {
  37845. "vulnerable" : true,
  37846. "cpe23Uri" : "cpe:2.3:o:meritlilin:p2g1022x_firmware:*:*:*:*:*:*:*:*",
  37847. "versionEndExcluding" : "7.1.94.8908",
  37848. "cpe_name" : [ ]
  37849. } ]
  37850. }, {
  37851. "operator" : "OR",
  37852. "children" : [ ],
  37853. "cpe_match" : [ {
  37854. "vulnerable" : false,
  37855. "cpe23Uri" : "cpe:2.3:h:meritlilin:p2g1022x:-:*:*:*:*:*:*:*",
  37856. "cpe_name" : [ ]
  37857. } ]
  37858. } ],
  37859. "cpe_match" : [ ]
  37860. }, {
  37861. "operator" : "AND",
  37862. "children" : [ {
  37863. "operator" : "OR",
  37864. "children" : [ ],
  37865. "cpe_match" : [ {
  37866. "vulnerable" : true,
  37867. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8852ax_firmware:*:*:*:*:*:*:*:*",
  37868. "versionEndExcluding" : "7.1.94.8908",
  37869. "cpe_name" : [ ]
  37870. } ]
  37871. }, {
  37872. "operator" : "OR",
  37873. "children" : [ ],
  37874. "cpe_match" : [ {
  37875. "vulnerable" : false,
  37876. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8852ax:-:*:*:*:*:*:*:*",
  37877. "cpe_name" : [ ]
  37878. } ]
  37879. } ],
  37880. "cpe_match" : [ ]
  37881. }, {
  37882. "operator" : "AND",
  37883. "children" : [ {
  37884. "operator" : "OR",
  37885. "children" : [ ],
  37886. "cpe_match" : [ {
  37887. "vulnerable" : true,
  37888. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8152x-p_firmware:*:*:*:*:*:*:*:*",
  37889. "versionEndExcluding" : "7.1.94.8908",
  37890. "cpe_name" : [ ]
  37891. } ]
  37892. }, {
  37893. "operator" : "OR",
  37894. "children" : [ ],
  37895. "cpe_match" : [ {
  37896. "vulnerable" : false,
  37897. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8152x-p:-:*:*:*:*:*:*:*",
  37898. "cpe_name" : [ ]
  37899. } ]
  37900. } ],
  37901. "cpe_match" : [ ]
  37902. }, {
  37903. "operator" : "AND",
  37904. "children" : [ {
  37905. "operator" : "OR",
  37906. "children" : [ ],
  37907. "cpe_match" : [ {
  37908. "vulnerable" : true,
  37909. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8152x2-p_firmware:*:*:*:*:*:*:*:*",
  37910. "versionEndExcluding" : "7.1.94.8908",
  37911. "cpe_name" : [ ]
  37912. } ]
  37913. }, {
  37914. "operator" : "OR",
  37915. "children" : [ ],
  37916. "cpe_match" : [ {
  37917. "vulnerable" : false,
  37918. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8152x2-p:-:*:*:*:*:*:*:*",
  37919. "cpe_name" : [ ]
  37920. } ]
  37921. } ],
  37922. "cpe_match" : [ ]
  37923. }, {
  37924. "operator" : "AND",
  37925. "children" : [ {
  37926. "operator" : "OR",
  37927. "children" : [ ],
  37928. "cpe_match" : [ {
  37929. "vulnerable" : true,
  37930. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8052ex25_firmware:*:*:*:*:*:*:*:*",
  37931. "versionEndExcluding" : "7.1.94.8908",
  37932. "cpe_name" : [ ]
  37933. } ]
  37934. }, {
  37935. "operator" : "OR",
  37936. "children" : [ ],
  37937. "cpe_match" : [ {
  37938. "vulnerable" : false,
  37939. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8052ex25:-:*:*:*:*:*:*:*",
  37940. "cpe_name" : [ ]
  37941. } ]
  37942. } ],
  37943. "cpe_match" : [ ]
  37944. }, {
  37945. "operator" : "AND",
  37946. "children" : [ {
  37947. "operator" : "OR",
  37948. "children" : [ ],
  37949. "cpe_match" : [ {
  37950. "vulnerable" : true,
  37951. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6552x_firmware:*:*:*:*:*:*:*:*",
  37952. "versionEndExcluding" : "7.1.94.8908",
  37953. "cpe_name" : [ ]
  37954. } ]
  37955. }, {
  37956. "operator" : "OR",
  37957. "children" : [ ],
  37958. "cpe_match" : [ {
  37959. "vulnerable" : false,
  37960. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6552x:-:*:*:*:*:*:*:*",
  37961. "cpe_name" : [ ]
  37962. } ]
  37963. } ],
  37964. "cpe_match" : [ ]
  37965. }, {
  37966. "operator" : "AND",
  37967. "children" : [ {
  37968. "operator" : "OR",
  37969. "children" : [ ],
  37970. "cpe_match" : [ {
  37971. "vulnerable" : true,
  37972. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6452ax_firmware:*:*:*:*:*:*:*:*",
  37973. "versionEndExcluding" : "7.1.94.8908",
  37974. "cpe_name" : [ ]
  37975. } ]
  37976. }, {
  37977. "operator" : "OR",
  37978. "children" : [ ],
  37979. "cpe_match" : [ {
  37980. "vulnerable" : false,
  37981. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6452ax:-:*:*:*:*:*:*:*",
  37982. "cpe_name" : [ ]
  37983. } ]
  37984. } ],
  37985. "cpe_match" : [ ]
  37986. }, {
  37987. "operator" : "AND",
  37988. "children" : [ {
  37989. "operator" : "OR",
  37990. "children" : [ ],
  37991. "cpe_match" : [ {
  37992. "vulnerable" : true,
  37993. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6452ax-p_firmware:*:*:*:*:*:*:*:*",
  37994. "versionEndExcluding" : "7.1.94.8908",
  37995. "cpe_name" : [ ]
  37996. } ]
  37997. }, {
  37998. "operator" : "OR",
  37999. "children" : [ ],
  38000. "cpe_match" : [ {
  38001. "vulnerable" : false,
  38002. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6452ax-p:-:*:*:*:*:*:*:*",
  38003. "cpe_name" : [ ]
  38004. } ]
  38005. } ],
  38006. "cpe_match" : [ ]
  38007. }, {
  38008. "operator" : "AND",
  38009. "children" : [ {
  38010. "operator" : "OR",
  38011. "children" : [ ],
  38012. "cpe_match" : [ {
  38013. "vulnerable" : true,
  38014. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8822ax_firmware:*:*:*:*:*:*:*:*",
  38015. "versionEndExcluding" : "7.1.94.8908",
  38016. "cpe_name" : [ ]
  38017. } ]
  38018. }, {
  38019. "operator" : "OR",
  38020. "children" : [ ],
  38021. "cpe_match" : [ {
  38022. "vulnerable" : false,
  38023. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8822ax:-:*:*:*:*:*:*:*",
  38024. "cpe_name" : [ ]
  38025. } ]
  38026. } ],
  38027. "cpe_match" : [ ]
  38028. }, {
  38029. "operator" : "AND",
  38030. "children" : [ {
  38031. "operator" : "OR",
  38032. "children" : [ ],
  38033. "cpe_match" : [ {
  38034. "vulnerable" : true,
  38035. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8122x-p_firmware:*:*:*:*:*:*:*:*",
  38036. "versionEndExcluding" : "7.1.94.8908",
  38037. "cpe_name" : [ ]
  38038. } ]
  38039. }, {
  38040. "operator" : "OR",
  38041. "children" : [ ],
  38042. "cpe_match" : [ {
  38043. "vulnerable" : false,
  38044. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8122x-p:-:*:*:*:*:*:*:*",
  38045. "cpe_name" : [ ]
  38046. } ]
  38047. } ],
  38048. "cpe_match" : [ ]
  38049. }, {
  38050. "operator" : "AND",
  38051. "children" : [ {
  38052. "operator" : "OR",
  38053. "children" : [ ],
  38054. "cpe_match" : [ {
  38055. "vulnerable" : true,
  38056. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8122x2-p_firmware:*:*:*:*:*:*:*:*",
  38057. "versionEndExcluding" : "7.1.94.8908",
  38058. "cpe_name" : [ ]
  38059. } ]
  38060. }, {
  38061. "operator" : "OR",
  38062. "children" : [ ],
  38063. "cpe_match" : [ {
  38064. "vulnerable" : false,
  38065. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8122x2-p:-:*:*:*:*:*:*:*",
  38066. "cpe_name" : [ ]
  38067. } ]
  38068. } ],
  38069. "cpe_match" : [ ]
  38070. }, {
  38071. "operator" : "AND",
  38072. "children" : [ {
  38073. "operator" : "OR",
  38074. "children" : [ ],
  38075. "cpe_match" : [ {
  38076. "vulnerable" : true,
  38077. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r8022ex25_firmware:*:*:*:*:*:*:*:*",
  38078. "versionEndExcluding" : "7.1.94.8908",
  38079. "cpe_name" : [ ]
  38080. } ]
  38081. }, {
  38082. "operator" : "OR",
  38083. "children" : [ ],
  38084. "cpe_match" : [ {
  38085. "vulnerable" : false,
  38086. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r8022ex25:-:*:*:*:*:*:*:*",
  38087. "cpe_name" : [ ]
  38088. } ]
  38089. } ],
  38090. "cpe_match" : [ ]
  38091. }, {
  38092. "operator" : "AND",
  38093. "children" : [ {
  38094. "operator" : "OR",
  38095. "children" : [ ],
  38096. "cpe_match" : [ {
  38097. "vulnerable" : true,
  38098. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6522x_firmware:*:*:*:*:*:*:*:*",
  38099. "versionEndExcluding" : "7.1.94.8908",
  38100. "cpe_name" : [ ]
  38101. } ]
  38102. }, {
  38103. "operator" : "OR",
  38104. "children" : [ ],
  38105. "cpe_match" : [ {
  38106. "vulnerable" : false,
  38107. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6522x:-:*:*:*:*:*:*:*",
  38108. "cpe_name" : [ ]
  38109. } ]
  38110. } ],
  38111. "cpe_match" : [ ]
  38112. }, {
  38113. "operator" : "AND",
  38114. "children" : [ {
  38115. "operator" : "OR",
  38116. "children" : [ ],
  38117. "cpe_match" : [ {
  38118. "vulnerable" : true,
  38119. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6422ax_firmware:*:*:*:*:*:*:*:*",
  38120. "versionEndExcluding" : "7.1.94.8908",
  38121. "cpe_name" : [ ]
  38122. } ]
  38123. }, {
  38124. "operator" : "OR",
  38125. "children" : [ ],
  38126. "cpe_match" : [ {
  38127. "vulnerable" : false,
  38128. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6422ax:-:*:*:*:*:*:*:*",
  38129. "cpe_name" : [ ]
  38130. } ]
  38131. } ],
  38132. "cpe_match" : [ ]
  38133. }, {
  38134. "operator" : "AND",
  38135. "children" : [ {
  38136. "operator" : "OR",
  38137. "children" : [ ],
  38138. "cpe_match" : [ {
  38139. "vulnerable" : true,
  38140. "cpe23Uri" : "cpe:2.3:o:meritlilin:z2r6422ax-p_firmware:*:*:*:*:*:*:*:*",
  38141. "versionEndExcluding" : "7.1.94.8908",
  38142. "cpe_name" : [ ]
  38143. } ]
  38144. }, {
  38145. "operator" : "OR",
  38146. "children" : [ ],
  38147. "cpe_match" : [ {
  38148. "vulnerable" : false,
  38149. "cpe23Uri" : "cpe:2.3:h:meritlilin:z2r6422ax-p:-:*:*:*:*:*:*:*",
  38150. "cpe_name" : [ ]
  38151. } ]
  38152. } ],
  38153. "cpe_match" : [ ]
  38154. }, {
  38155. "operator" : "AND",
  38156. "children" : [ {
  38157. "operator" : "OR",
  38158. "children" : [ ],
  38159. "cpe_match" : [ {
  38160. "vulnerable" : true,
  38161. "cpe23Uri" : "cpe:2.3:o:meritlilin:p3r6322e2_firmware:*:*:*:*:*:*:*:*",
  38162. "versionEndExcluding" : "7.1.94.8908",
  38163. "cpe_name" : [ ]
  38164. } ]
  38165. }, {
  38166. "operator" : "OR",
  38167. "children" : [ ],
  38168. "cpe_match" : [ {
  38169. "vulnerable" : false,
  38170. "cpe23Uri" : "cpe:2.3:h:meritlilin:p3r6322e2:-:*:*:*:*:*:*:*",
  38171. "cpe_name" : [ ]
  38172. } ]
  38173. } ],
  38174. "cpe_match" : [ ]
  38175. }, {
  38176. "operator" : "AND",
  38177. "children" : [ {
  38178. "operator" : "OR",
  38179. "children" : [ ],
  38180. "cpe_match" : [ {
  38181. "vulnerable" : true,
  38182. "cpe23Uri" : "cpe:2.3:o:meritlilin:p3r6522e2_firmware:*:*:*:*:*:*:*:*",
  38183. "versionEndExcluding" : "7.1.94.8908",
  38184. "cpe_name" : [ ]
  38185. } ]
  38186. }, {
  38187. "operator" : "OR",
  38188. "children" : [ ],
  38189. "cpe_match" : [ {
  38190. "vulnerable" : false,
  38191. "cpe23Uri" : "cpe:2.3:h:meritlilin:p3r6522e2:-:*:*:*:*:*:*:*",
  38192. "cpe_name" : [ ]
  38193. } ]
  38194. } ],
  38195. "cpe_match" : [ ]
  38196. }, {
  38197. "operator" : "AND",
  38198. "children" : [ {
  38199. "operator" : "OR",
  38200. "children" : [ ],
  38201. "cpe_match" : [ {
  38202. "vulnerable" : true,
  38203. "cpe23Uri" : "cpe:2.3:o:meritlilin:p3r8822e2_firmware:*:*:*:*:*:*:*:*",
  38204. "versionEndExcluding" : "7.1.94.8908",
  38205. "cpe_name" : [ ]
  38206. } ]
  38207. }, {
  38208. "operator" : "OR",
  38209. "children" : [ ],
  38210. "cpe_match" : [ {
  38211. "vulnerable" : false,
  38212. "cpe23Uri" : "cpe:2.3:h:meritlilin:p3r8822e2:-:*:*:*:*:*:*:*",
  38213. "cpe_name" : [ ]
  38214. } ]
  38215. } ],
  38216. "cpe_match" : [ ]
  38217. }, {
  38218. "operator" : "AND",
  38219. "children" : [ {
  38220. "operator" : "OR",
  38221. "children" : [ ],
  38222. "cpe_match" : [ {
  38223. "vulnerable" : true,
  38224. "cpe23Uri" : "cpe:2.3:o:meritlilin:z3r6422x3_firmware:*:*:*:*:*:*:*:*",
  38225. "versionEndExcluding" : "7.1.94.8908",
  38226. "cpe_name" : [ ]
  38227. } ]
  38228. }, {
  38229. "operator" : "OR",
  38230. "children" : [ ],
  38231. "cpe_match" : [ {
  38232. "vulnerable" : false,
  38233. "cpe23Uri" : "cpe:2.3:h:meritlilin:z3r6422x3:-:*:*:*:*:*:*:*",
  38234. "cpe_name" : [ ]
  38235. } ]
  38236. } ],
  38237. "cpe_match" : [ ]
  38238. }, {
  38239. "operator" : "AND",
  38240. "children" : [ {
  38241. "operator" : "OR",
  38242. "children" : [ ],
  38243. "cpe_match" : [ {
  38244. "vulnerable" : true,
  38245. "cpe23Uri" : "cpe:2.3:o:meritlilin:z3r6522x_firmware:*:*:*:*:*:*:*:*",
  38246. "versionEndExcluding" : "7.1.94.8908",
  38247. "cpe_name" : [ ]
  38248. } ]
  38249. }, {
  38250. "operator" : "OR",
  38251. "children" : [ ],
  38252. "cpe_match" : [ {
  38253. "vulnerable" : false,
  38254. "cpe23Uri" : "cpe:2.3:h:meritlilin:z3r6522x:-:*:*:*:*:*:*:*",
  38255. "cpe_name" : [ ]
  38256. } ]
  38257. } ],
  38258. "cpe_match" : [ ]
  38259. }, {
  38260. "operator" : "AND",
  38261. "children" : [ {
  38262. "operator" : "OR",
  38263. "children" : [ ],
  38264. "cpe_match" : [ {
  38265. "vulnerable" : true,
  38266. "cpe23Uri" : "cpe:2.3:o:meritlilin:z3r8922x3_firmware:*:*:*:*:*:*:*:*",
  38267. "versionEndExcluding" : "7.1.94.8908",
  38268. "cpe_name" : [ ]
  38269. } ]
  38270. }, {
  38271. "operator" : "OR",
  38272. "children" : [ ],
  38273. "cpe_match" : [ {
  38274. "vulnerable" : false,
  38275. "cpe23Uri" : "cpe:2.3:h:meritlilin:z3r8922x3:-:*:*:*:*:*:*:*",
  38276. "cpe_name" : [ ]
  38277. } ]
  38278. } ],
  38279. "cpe_match" : [ ]
  38280. } ]
  38281. },
  38282. "impact" : {
  38283. "baseMetricV3" : {
  38284. "cvssV3" : {
  38285. "version" : "3.1",
  38286. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  38287. "attackVector" : "NETWORK",
  38288. "attackComplexity" : "LOW",
  38289. "privilegesRequired" : "HIGH",
  38290. "userInteraction" : "NONE",
  38291. "scope" : "UNCHANGED",
  38292. "confidentialityImpact" : "HIGH",
  38293. "integrityImpact" : "HIGH",
  38294. "availabilityImpact" : "HIGH",
  38295. "baseScore" : 7.2,
  38296. "baseSeverity" : "HIGH"
  38297. },
  38298. "exploitabilityScore" : 1.2,
  38299. "impactScore" : 5.9
  38300. },
  38301. "baseMetricV2" : {
  38302. "cvssV2" : {
  38303. "version" : "2.0",
  38304. "vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C",
  38305. "accessVector" : "NETWORK",
  38306. "accessComplexity" : "LOW",
  38307. "authentication" : "SINGLE",
  38308. "confidentialityImpact" : "COMPLETE",
  38309. "integrityImpact" : "COMPLETE",
  38310. "availabilityImpact" : "COMPLETE",
  38311. "baseScore" : 9.0
  38312. },
  38313. "severity" : "HIGH",
  38314. "exploitabilityScore" : 8.0,
  38315. "impactScore" : 10.0,
  38316. "acInsufInfo" : false,
  38317. "obtainAllPrivilege" : false,
  38318. "obtainUserPrivilege" : false,
  38319. "obtainOtherPrivilege" : false,
  38320. "userInteractionRequired" : false
  38321. }
  38322. },
  38323. "publishedDate" : "2021-04-28T10:15Z",
  38324. "lastModifiedDate" : "2021-05-05T20:36Z"
  38325. }, {
  38326. "cve" : {
  38327. "data_type" : "CVE",
  38328. "data_format" : "MITRE",
  38329. "data_version" : "4.0",
  38330. "CVE_data_meta" : {
  38331. "ID" : "CVE-2021-31866",
  38332. "ASSIGNER" : "cve@mitre.org"
  38333. },
  38334. "problemtype" : {
  38335. "problemtype_data" : [ {
  38336. "description" : [ {
  38337. "lang" : "en",
  38338. "value" : "CWE-203"
  38339. } ]
  38340. } ]
  38341. },
  38342. "references" : {
  38343. "reference_data" : [ {
  38344. "url" : "https://www.redmine.org/projects/redmine/wiki/Security_Advisories",
  38345. "name" : "https://www.redmine.org/projects/redmine/wiki/Security_Advisories",
  38346. "refsource" : "MISC",
  38347. "tags" : [ "Vendor Advisory" ]
  38348. }, {
  38349. "url" : "https://www.redmine.org/news/131",
  38350. "name" : "https://www.redmine.org/news/131",
  38351. "refsource" : "MISC",
  38352. "tags" : [ "Vendor Advisory" ]
  38353. } ]
  38354. },
  38355. "description" : {
  38356. "description_data" : [ {
  38357. "lang" : "en",
  38358. "value" : "Redmine before 4.0.9 and 4.1.x before 4.1.3 allows an attacker to learn the values of internal authentication keys by observing timing differences in string comparison operations within SysController and MailHandlerController."
  38359. } ]
  38360. }
  38361. },
  38362. "configurations" : {
  38363. "CVE_data_version" : "4.0",
  38364. "nodes" : [ {
  38365. "operator" : "OR",
  38366. "children" : [ ],
  38367. "cpe_match" : [ {
  38368. "vulnerable" : true,
  38369. "cpe23Uri" : "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
  38370. "versionEndExcluding" : "4.0.9",
  38371. "cpe_name" : [ ]
  38372. }, {
  38373. "vulnerable" : true,
  38374. "cpe23Uri" : "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
  38375. "versionStartIncluding" : "4.1.0",
  38376. "versionEndExcluding" : "4.1.3",
  38377. "cpe_name" : [ ]
  38378. } ]
  38379. } ]
  38380. },
  38381. "impact" : {
  38382. "baseMetricV3" : {
  38383. "cvssV3" : {
  38384. "version" : "3.1",
  38385. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  38386. "attackVector" : "NETWORK",
  38387. "attackComplexity" : "LOW",
  38388. "privilegesRequired" : "NONE",
  38389. "userInteraction" : "NONE",
  38390. "scope" : "UNCHANGED",
  38391. "confidentialityImpact" : "LOW",
  38392. "integrityImpact" : "NONE",
  38393. "availabilityImpact" : "NONE",
  38394. "baseScore" : 5.3,
  38395. "baseSeverity" : "MEDIUM"
  38396. },
  38397. "exploitabilityScore" : 3.9,
  38398. "impactScore" : 1.4
  38399. },
  38400. "baseMetricV2" : {
  38401. "cvssV2" : {
  38402. "version" : "2.0",
  38403. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  38404. "accessVector" : "NETWORK",
  38405. "accessComplexity" : "LOW",
  38406. "authentication" : "NONE",
  38407. "confidentialityImpact" : "PARTIAL",
  38408. "integrityImpact" : "NONE",
  38409. "availabilityImpact" : "NONE",
  38410. "baseScore" : 5.0
  38411. },
  38412. "severity" : "MEDIUM",
  38413. "exploitabilityScore" : 10.0,
  38414. "impactScore" : 2.9,
  38415. "acInsufInfo" : false,
  38416. "obtainAllPrivilege" : false,
  38417. "obtainUserPrivilege" : false,
  38418. "obtainOtherPrivilege" : false,
  38419. "userInteractionRequired" : false
  38420. }
  38421. },
  38422. "publishedDate" : "2021-04-28T07:15Z",
  38423. "lastModifiedDate" : "2021-05-10T14:59Z"
  38424. }, {
  38425. "cve" : {
  38426. "data_type" : "CVE",
  38427. "data_format" : "MITRE",
  38428. "data_version" : "4.0",
  38429. "CVE_data_meta" : {
  38430. "ID" : "CVE-2021-31865",
  38431. "ASSIGNER" : "cve@mitre.org"
  38432. },
  38433. "problemtype" : {
  38434. "problemtype_data" : [ {
  38435. "description" : [ {
  38436. "lang" : "en",
  38437. "value" : "CWE-863"
  38438. } ]
  38439. } ]
  38440. },
  38441. "references" : {
  38442. "reference_data" : [ {
  38443. "url" : "https://www.redmine.org/projects/redmine/wiki/Security_Advisories",
  38444. "name" : "https://www.redmine.org/projects/redmine/wiki/Security_Advisories",
  38445. "refsource" : "MISC",
  38446. "tags" : [ "Vendor Advisory" ]
  38447. }, {
  38448. "url" : "https://www.redmine.org/news/131",
  38449. "name" : "https://www.redmine.org/news/131",
  38450. "refsource" : "MISC",
  38451. "tags" : [ "Vendor Advisory" ]
  38452. } ]
  38453. },
  38454. "description" : {
  38455. "description_data" : [ {
  38456. "lang" : "en",
  38457. "value" : "Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1 allows users to circumvent the allowed filename extensions of uploaded attachments."
  38458. } ]
  38459. }
  38460. },
  38461. "configurations" : {
  38462. "CVE_data_version" : "4.0",
  38463. "nodes" : [ {
  38464. "operator" : "OR",
  38465. "children" : [ ],
  38466. "cpe_match" : [ {
  38467. "vulnerable" : true,
  38468. "cpe23Uri" : "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
  38469. "versionEndExcluding" : "4.0.9",
  38470. "cpe_name" : [ ]
  38471. }, {
  38472. "vulnerable" : true,
  38473. "cpe23Uri" : "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
  38474. "versionStartIncluding" : "4.1.0",
  38475. "versionEndExcluding" : "4.1.3",
  38476. "cpe_name" : [ ]
  38477. }, {
  38478. "vulnerable" : true,
  38479. "cpe23Uri" : "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
  38480. "versionStartIncluding" : "4.2.0",
  38481. "versionEndExcluding" : "4.2.1",
  38482. "cpe_name" : [ ]
  38483. } ]
  38484. } ]
  38485. },
  38486. "impact" : {
  38487. "baseMetricV3" : {
  38488. "cvssV3" : {
  38489. "version" : "3.1",
  38490. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
  38491. "attackVector" : "NETWORK",
  38492. "attackComplexity" : "LOW",
  38493. "privilegesRequired" : "NONE",
  38494. "userInteraction" : "NONE",
  38495. "scope" : "UNCHANGED",
  38496. "confidentialityImpact" : "NONE",
  38497. "integrityImpact" : "LOW",
  38498. "availabilityImpact" : "NONE",
  38499. "baseScore" : 5.3,
  38500. "baseSeverity" : "MEDIUM"
  38501. },
  38502. "exploitabilityScore" : 3.9,
  38503. "impactScore" : 1.4
  38504. },
  38505. "baseMetricV2" : {
  38506. "cvssV2" : {
  38507. "version" : "2.0",
  38508. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  38509. "accessVector" : "NETWORK",
  38510. "accessComplexity" : "LOW",
  38511. "authentication" : "NONE",
  38512. "confidentialityImpact" : "NONE",
  38513. "integrityImpact" : "PARTIAL",
  38514. "availabilityImpact" : "NONE",
  38515. "baseScore" : 5.0
  38516. },
  38517. "severity" : "MEDIUM",
  38518. "exploitabilityScore" : 10.0,
  38519. "impactScore" : 2.9,
  38520. "acInsufInfo" : false,
  38521. "obtainAllPrivilege" : false,
  38522. "obtainUserPrivilege" : false,
  38523. "obtainOtherPrivilege" : false,
  38524. "userInteractionRequired" : false
  38525. }
  38526. },
  38527. "publishedDate" : "2021-04-28T07:15Z",
  38528. "lastModifiedDate" : "2021-05-10T15:12Z"
  38529. }, {
  38530. "cve" : {
  38531. "data_type" : "CVE",
  38532. "data_format" : "MITRE",
  38533. "data_version" : "4.0",
  38534. "CVE_data_meta" : {
  38535. "ID" : "CVE-2021-31864",
  38536. "ASSIGNER" : "cve@mitre.org"
  38537. },
  38538. "problemtype" : {
  38539. "problemtype_data" : [ {
  38540. "description" : [ {
  38541. "lang" : "en",
  38542. "value" : "CWE-863"
  38543. } ]
  38544. } ]
  38545. },
  38546. "references" : {
  38547. "reference_data" : [ {
  38548. "url" : "https://www.redmine.org/projects/redmine/wiki/Security_Advisories",
  38549. "name" : "https://www.redmine.org/projects/redmine/wiki/Security_Advisories",
  38550. "refsource" : "MISC",
  38551. "tags" : [ "Vendor Advisory" ]
  38552. }, {
  38553. "url" : "https://www.redmine.org/news/131",
  38554. "name" : "https://www.redmine.org/news/131",
  38555. "refsource" : "MISC",
  38556. "tags" : [ "Vendor Advisory" ]
  38557. } ]
  38558. },
  38559. "description" : {
  38560. "description_data" : [ {
  38561. "lang" : "en",
  38562. "value" : "Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1 allows attackers to bypass the add_issue_notes permission requirement by leveraging the incoming mail handler."
  38563. } ]
  38564. }
  38565. },
  38566. "configurations" : {
  38567. "CVE_data_version" : "4.0",
  38568. "nodes" : [ {
  38569. "operator" : "OR",
  38570. "children" : [ ],
  38571. "cpe_match" : [ {
  38572. "vulnerable" : true,
  38573. "cpe23Uri" : "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
  38574. "versionEndExcluding" : "4.0.9",
  38575. "cpe_name" : [ ]
  38576. }, {
  38577. "vulnerable" : true,
  38578. "cpe23Uri" : "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
  38579. "versionStartIncluding" : "4.1.0",
  38580. "versionEndExcluding" : "4.1.3",
  38581. "cpe_name" : [ ]
  38582. }, {
  38583. "vulnerable" : true,
  38584. "cpe23Uri" : "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
  38585. "versionStartIncluding" : "4.2.0",
  38586. "versionEndExcluding" : "4.2.1",
  38587. "cpe_name" : [ ]
  38588. } ]
  38589. } ]
  38590. },
  38591. "impact" : {
  38592. "baseMetricV3" : {
  38593. "cvssV3" : {
  38594. "version" : "3.1",
  38595. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
  38596. "attackVector" : "NETWORK",
  38597. "attackComplexity" : "LOW",
  38598. "privilegesRequired" : "NONE",
  38599. "userInteraction" : "NONE",
  38600. "scope" : "UNCHANGED",
  38601. "confidentialityImpact" : "NONE",
  38602. "integrityImpact" : "LOW",
  38603. "availabilityImpact" : "NONE",
  38604. "baseScore" : 5.3,
  38605. "baseSeverity" : "MEDIUM"
  38606. },
  38607. "exploitabilityScore" : 3.9,
  38608. "impactScore" : 1.4
  38609. },
  38610. "baseMetricV2" : {
  38611. "cvssV2" : {
  38612. "version" : "2.0",
  38613. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  38614. "accessVector" : "NETWORK",
  38615. "accessComplexity" : "LOW",
  38616. "authentication" : "NONE",
  38617. "confidentialityImpact" : "NONE",
  38618. "integrityImpact" : "PARTIAL",
  38619. "availabilityImpact" : "NONE",
  38620. "baseScore" : 5.0
  38621. },
  38622. "severity" : "MEDIUM",
  38623. "exploitabilityScore" : 10.0,
  38624. "impactScore" : 2.9,
  38625. "acInsufInfo" : false,
  38626. "obtainAllPrivilege" : false,
  38627. "obtainUserPrivilege" : false,
  38628. "obtainOtherPrivilege" : false,
  38629. "userInteractionRequired" : false
  38630. }
  38631. },
  38632. "publishedDate" : "2021-04-28T07:15Z",
  38633. "lastModifiedDate" : "2021-05-10T15:18Z"
  38634. }, {
  38635. "cve" : {
  38636. "data_type" : "CVE",
  38637. "data_format" : "MITRE",
  38638. "data_version" : "4.0",
  38639. "CVE_data_meta" : {
  38640. "ID" : "CVE-2021-31863",
  38641. "ASSIGNER" : "cve@mitre.org"
  38642. },
  38643. "problemtype" : {
  38644. "problemtype_data" : [ {
  38645. "description" : [ {
  38646. "lang" : "en",
  38647. "value" : "CWE-20"
  38648. } ]
  38649. } ]
  38650. },
  38651. "references" : {
  38652. "reference_data" : [ {
  38653. "url" : "https://www.redmine.org/projects/redmine/wiki/Security_Advisories",
  38654. "name" : "https://www.redmine.org/projects/redmine/wiki/Security_Advisories",
  38655. "refsource" : "MISC",
  38656. "tags" : [ "Vendor Advisory" ]
  38657. }, {
  38658. "url" : "https://www.redmine.org/news/131",
  38659. "name" : "https://www.redmine.org/news/131",
  38660. "refsource" : "MISC",
  38661. "tags" : [ "Vendor Advisory" ]
  38662. } ]
  38663. },
  38664. "description" : {
  38665. "description_data" : [ {
  38666. "lang" : "en",
  38667. "value" : "Insufficient input validation in the Git repository integration of Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1 allows Redmine users to read arbitrary local files accessible by the application server process."
  38668. } ]
  38669. }
  38670. },
  38671. "configurations" : {
  38672. "CVE_data_version" : "4.0",
  38673. "nodes" : [ {
  38674. "operator" : "OR",
  38675. "children" : [ ],
  38676. "cpe_match" : [ {
  38677. "vulnerable" : true,
  38678. "cpe23Uri" : "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
  38679. "versionEndExcluding" : "4.0.9",
  38680. "cpe_name" : [ ]
  38681. }, {
  38682. "vulnerable" : true,
  38683. "cpe23Uri" : "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
  38684. "versionStartIncluding" : "4.1.0",
  38685. "versionEndExcluding" : "4.1.3",
  38686. "cpe_name" : [ ]
  38687. }, {
  38688. "vulnerable" : true,
  38689. "cpe23Uri" : "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
  38690. "versionStartIncluding" : "4.2.0",
  38691. "versionEndExcluding" : "4.2.1",
  38692. "cpe_name" : [ ]
  38693. } ]
  38694. } ]
  38695. },
  38696. "impact" : {
  38697. "baseMetricV3" : {
  38698. "cvssV3" : {
  38699. "version" : "3.1",
  38700. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  38701. "attackVector" : "NETWORK",
  38702. "attackComplexity" : "LOW",
  38703. "privilegesRequired" : "NONE",
  38704. "userInteraction" : "NONE",
  38705. "scope" : "UNCHANGED",
  38706. "confidentialityImpact" : "HIGH",
  38707. "integrityImpact" : "NONE",
  38708. "availabilityImpact" : "NONE",
  38709. "baseScore" : 7.5,
  38710. "baseSeverity" : "HIGH"
  38711. },
  38712. "exploitabilityScore" : 3.9,
  38713. "impactScore" : 3.6
  38714. },
  38715. "baseMetricV2" : {
  38716. "cvssV2" : {
  38717. "version" : "2.0",
  38718. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  38719. "accessVector" : "NETWORK",
  38720. "accessComplexity" : "LOW",
  38721. "authentication" : "NONE",
  38722. "confidentialityImpact" : "PARTIAL",
  38723. "integrityImpact" : "NONE",
  38724. "availabilityImpact" : "NONE",
  38725. "baseScore" : 5.0
  38726. },
  38727. "severity" : "MEDIUM",
  38728. "exploitabilityScore" : 10.0,
  38729. "impactScore" : 2.9,
  38730. "acInsufInfo" : false,
  38731. "obtainAllPrivilege" : false,
  38732. "obtainUserPrivilege" : false,
  38733. "obtainOtherPrivilege" : false,
  38734. "userInteractionRequired" : false
  38735. }
  38736. },
  38737. "publishedDate" : "2021-04-28T07:15Z",
  38738. "lastModifiedDate" : "2021-05-10T15:16Z"
  38739. }, {
  38740. "cve" : {
  38741. "data_type" : "CVE",
  38742. "data_format" : "MITRE",
  38743. "data_version" : "4.0",
  38744. "CVE_data_meta" : {
  38745. "ID" : "CVE-2021-31779",
  38746. "ASSIGNER" : "cve@mitre.org"
  38747. },
  38748. "problemtype" : {
  38749. "problemtype_data" : [ {
  38750. "description" : [ {
  38751. "lang" : "en",
  38752. "value" : "CWE-918"
  38753. } ]
  38754. } ]
  38755. },
  38756. "references" : {
  38757. "reference_data" : [ {
  38758. "url" : "https://typo3.org/security/advisory/typo3-ext-sa-2021-006",
  38759. "name" : "https://typo3.org/security/advisory/typo3-ext-sa-2021-006",
  38760. "refsource" : "MISC",
  38761. "tags" : [ "Patch", "Third Party Advisory" ]
  38762. } ]
  38763. },
  38764. "description" : {
  38765. "description_data" : [ {
  38766. "lang" : "en",
  38767. "value" : "The yoast_seo (aka Yoast SEO) extension before 7.2.1 for TYPO3 allows SSRF via a backend user account."
  38768. } ]
  38769. }
  38770. },
  38771. "configurations" : {
  38772. "CVE_data_version" : "4.0",
  38773. "nodes" : [ {
  38774. "operator" : "OR",
  38775. "children" : [ ],
  38776. "cpe_match" : [ {
  38777. "vulnerable" : true,
  38778. "cpe23Uri" : "cpe:2.3:a:yoast:yoast_seo:*:*:*:*:*:typo3:*:*",
  38779. "versionEndExcluding" : "7.2.1",
  38780. "cpe_name" : [ ]
  38781. } ]
  38782. } ]
  38783. },
  38784. "impact" : {
  38785. "baseMetricV3" : {
  38786. "cvssV3" : {
  38787. "version" : "3.1",
  38788. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
  38789. "attackVector" : "NETWORK",
  38790. "attackComplexity" : "LOW",
  38791. "privilegesRequired" : "LOW",
  38792. "userInteraction" : "NONE",
  38793. "scope" : "CHANGED",
  38794. "confidentialityImpact" : "LOW",
  38795. "integrityImpact" : "LOW",
  38796. "availabilityImpact" : "NONE",
  38797. "baseScore" : 6.4,
  38798. "baseSeverity" : "MEDIUM"
  38799. },
  38800. "exploitabilityScore" : 3.1,
  38801. "impactScore" : 2.7
  38802. },
  38803. "baseMetricV2" : {
  38804. "cvssV2" : {
  38805. "version" : "2.0",
  38806. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:N",
  38807. "accessVector" : "NETWORK",
  38808. "accessComplexity" : "LOW",
  38809. "authentication" : "SINGLE",
  38810. "confidentialityImpact" : "PARTIAL",
  38811. "integrityImpact" : "PARTIAL",
  38812. "availabilityImpact" : "NONE",
  38813. "baseScore" : 5.5
  38814. },
  38815. "severity" : "MEDIUM",
  38816. "exploitabilityScore" : 8.0,
  38817. "impactScore" : 4.9,
  38818. "acInsufInfo" : false,
  38819. "obtainAllPrivilege" : false,
  38820. "obtainUserPrivilege" : false,
  38821. "obtainOtherPrivilege" : false,
  38822. "userInteractionRequired" : false
  38823. }
  38824. },
  38825. "publishedDate" : "2021-04-28T07:15Z",
  38826. "lastModifiedDate" : "2021-05-07T16:17Z"
  38827. }, {
  38828. "cve" : {
  38829. "data_type" : "CVE",
  38830. "data_format" : "MITRE",
  38831. "data_version" : "4.0",
  38832. "CVE_data_meta" : {
  38833. "ID" : "CVE-2021-31778",
  38834. "ASSIGNER" : "cve@mitre.org"
  38835. },
  38836. "problemtype" : {
  38837. "problemtype_data" : [ {
  38838. "description" : [ {
  38839. "lang" : "en",
  38840. "value" : "CWE-79"
  38841. } ]
  38842. } ]
  38843. },
  38844. "references" : {
  38845. "reference_data" : [ {
  38846. "url" : "https://typo3.org/security/advisory/typo3-ext-sa-2021-004",
  38847. "name" : "https://typo3.org/security/advisory/typo3-ext-sa-2021-004",
  38848. "refsource" : "MISC",
  38849. "tags" : [ "Patch", "Third Party Advisory" ]
  38850. } ]
  38851. },
  38852. "description" : {
  38853. "description_data" : [ {
  38854. "lang" : "en",
  38855. "value" : "The media2click (aka 2 Clicks for External Media) extension 1.x before 1.3.3 for TYPO3 allows XSS by a backend user account."
  38856. } ]
  38857. }
  38858. },
  38859. "configurations" : {
  38860. "CVE_data_version" : "4.0",
  38861. "nodes" : [ {
  38862. "operator" : "OR",
  38863. "children" : [ ],
  38864. "cpe_match" : [ {
  38865. "vulnerable" : true,
  38866. "cpe23Uri" : "cpe:2.3:a:media2click_project:media2click:*:*:*:*:*:typo3:*:*",
  38867. "versionStartIncluding" : "1.0.0",
  38868. "versionEndExcluding" : "1.3.3",
  38869. "cpe_name" : [ ]
  38870. } ]
  38871. } ]
  38872. },
  38873. "impact" : {
  38874. "baseMetricV3" : {
  38875. "cvssV3" : {
  38876. "version" : "3.1",
  38877. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  38878. "attackVector" : "NETWORK",
  38879. "attackComplexity" : "LOW",
  38880. "privilegesRequired" : "LOW",
  38881. "userInteraction" : "REQUIRED",
  38882. "scope" : "CHANGED",
  38883. "confidentialityImpact" : "LOW",
  38884. "integrityImpact" : "LOW",
  38885. "availabilityImpact" : "NONE",
  38886. "baseScore" : 5.4,
  38887. "baseSeverity" : "MEDIUM"
  38888. },
  38889. "exploitabilityScore" : 2.3,
  38890. "impactScore" : 2.7
  38891. },
  38892. "baseMetricV2" : {
  38893. "cvssV2" : {
  38894. "version" : "2.0",
  38895. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  38896. "accessVector" : "NETWORK",
  38897. "accessComplexity" : "MEDIUM",
  38898. "authentication" : "SINGLE",
  38899. "confidentialityImpact" : "NONE",
  38900. "integrityImpact" : "PARTIAL",
  38901. "availabilityImpact" : "NONE",
  38902. "baseScore" : 3.5
  38903. },
  38904. "severity" : "LOW",
  38905. "exploitabilityScore" : 6.8,
  38906. "impactScore" : 2.9,
  38907. "acInsufInfo" : false,
  38908. "obtainAllPrivilege" : false,
  38909. "obtainUserPrivilege" : false,
  38910. "obtainOtherPrivilege" : false,
  38911. "userInteractionRequired" : true
  38912. }
  38913. },
  38914. "publishedDate" : "2021-04-28T07:15Z",
  38915. "lastModifiedDate" : "2021-05-07T15:37Z"
  38916. }, {
  38917. "cve" : {
  38918. "data_type" : "CVE",
  38919. "data_format" : "MITRE",
  38920. "data_version" : "4.0",
  38921. "CVE_data_meta" : {
  38922. "ID" : "CVE-2021-31777",
  38923. "ASSIGNER" : "cve@mitre.org"
  38924. },
  38925. "problemtype" : {
  38926. "problemtype_data" : [ {
  38927. "description" : [ {
  38928. "lang" : "en",
  38929. "value" : "CWE-89"
  38930. } ]
  38931. } ]
  38932. },
  38933. "references" : {
  38934. "reference_data" : [ {
  38935. "url" : "https://typo3.org/security/advisory/typo3-ext-sa-2021-005",
  38936. "name" : "https://typo3.org/security/advisory/typo3-ext-sa-2021-005",
  38937. "refsource" : "MISC",
  38938. "tags" : [ "Patch", "Third Party Advisory" ]
  38939. }, {
  38940. "url" : "https://excellium-services.com/cert-xlm-advisory/",
  38941. "name" : "https://excellium-services.com/cert-xlm-advisory/",
  38942. "refsource" : "MISC",
  38943. "tags" : [ "Not Applicable" ]
  38944. }, {
  38945. "url" : "http://packetstormsecurity.com/files/162429/TYPO3-6.2.1-SQL-Injection.html",
  38946. "name" : "http://packetstormsecurity.com/files/162429/TYPO3-6.2.1-SQL-Injection.html",
  38947. "refsource" : "MISC",
  38948. "tags" : [ "Exploit", "Third Party Advisory" ]
  38949. } ]
  38950. },
  38951. "description" : {
  38952. "description_data" : [ {
  38953. "lang" : "en",
  38954. "value" : "The dce (aka Dynamic Content Element) extension 2.2.0 through 2.6.x before 2.6.2, and 2.7.x before 2.7.1, for TYPO3 allows SQL Injection via a backend user account."
  38955. } ]
  38956. }
  38957. },
  38958. "configurations" : {
  38959. "CVE_data_version" : "4.0",
  38960. "nodes" : [ {
  38961. "operator" : "OR",
  38962. "children" : [ ],
  38963. "cpe_match" : [ {
  38964. "vulnerable" : true,
  38965. "cpe23Uri" : "cpe:2.3:a:dynamic_content_element_project:dynamic_content_element:*:*:*:*:*:typo3:*:*",
  38966. "versionStartIncluding" : "2.2.0",
  38967. "versionEndExcluding" : "2.6.2",
  38968. "cpe_name" : [ ]
  38969. }, {
  38970. "vulnerable" : true,
  38971. "cpe23Uri" : "cpe:2.3:a:dynamic_content_element_project:dynamic_content_element:*:*:*:*:*:typo3:*:*",
  38972. "versionStartIncluding" : "2.7.0",
  38973. "versionEndExcluding" : "2.7.1",
  38974. "cpe_name" : [ ]
  38975. } ]
  38976. } ]
  38977. },
  38978. "impact" : {
  38979. "baseMetricV3" : {
  38980. "cvssV3" : {
  38981. "version" : "3.1",
  38982. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
  38983. "attackVector" : "NETWORK",
  38984. "attackComplexity" : "LOW",
  38985. "privilegesRequired" : "HIGH",
  38986. "userInteraction" : "NONE",
  38987. "scope" : "UNCHANGED",
  38988. "confidentialityImpact" : "HIGH",
  38989. "integrityImpact" : "NONE",
  38990. "availabilityImpact" : "NONE",
  38991. "baseScore" : 4.9,
  38992. "baseSeverity" : "MEDIUM"
  38993. },
  38994. "exploitabilityScore" : 1.2,
  38995. "impactScore" : 3.6
  38996. },
  38997. "baseMetricV2" : {
  38998. "cvssV2" : {
  38999. "version" : "2.0",
  39000. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
  39001. "accessVector" : "NETWORK",
  39002. "accessComplexity" : "LOW",
  39003. "authentication" : "SINGLE",
  39004. "confidentialityImpact" : "PARTIAL",
  39005. "integrityImpact" : "NONE",
  39006. "availabilityImpact" : "NONE",
  39007. "baseScore" : 4.0
  39008. },
  39009. "severity" : "MEDIUM",
  39010. "exploitabilityScore" : 8.0,
  39011. "impactScore" : 2.9,
  39012. "acInsufInfo" : false,
  39013. "obtainAllPrivilege" : false,
  39014. "obtainUserPrivilege" : false,
  39015. "obtainOtherPrivilege" : false,
  39016. "userInteractionRequired" : false
  39017. }
  39018. },
  39019. "publishedDate" : "2021-04-28T07:15Z",
  39020. "lastModifiedDate" : "2021-05-07T15:44Z"
  39021. }, {
  39022. "cve" : {
  39023. "data_type" : "CVE",
  39024. "data_format" : "MITRE",
  39025. "data_version" : "4.0",
  39026. "CVE_data_meta" : {
  39027. "ID" : "CVE-2021-31856",
  39028. "ASSIGNER" : "cve@mitre.org"
  39029. },
  39030. "problemtype" : {
  39031. "problemtype_data" : [ {
  39032. "description" : [ {
  39033. "lang" : "en",
  39034. "value" : "CWE-89"
  39035. } ]
  39036. } ]
  39037. },
  39038. "references" : {
  39039. "reference_data" : [ {
  39040. "url" : "https://meshery.io",
  39041. "name" : "https://meshery.io",
  39042. "refsource" : "MISC",
  39043. "tags" : [ "Product", "Vendor Advisory" ]
  39044. }, {
  39045. "url" : "https://github.com/layer5io/meshery/pull/2745",
  39046. "name" : "https://github.com/layer5io/meshery/pull/2745",
  39047. "refsource" : "MISC",
  39048. "tags" : [ "Patch", "Third Party Advisory" ]
  39049. } ]
  39050. },
  39051. "description" : {
  39052. "description_data" : [ {
  39053. "lang" : "en",
  39054. "value" : "A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go)."
  39055. } ]
  39056. }
  39057. },
  39058. "configurations" : {
  39059. "CVE_data_version" : "4.0",
  39060. "nodes" : [ {
  39061. "operator" : "OR",
  39062. "children" : [ ],
  39063. "cpe_match" : [ {
  39064. "vulnerable" : true,
  39065. "cpe23Uri" : "cpe:2.3:a:layer5:meshery:0.5.2:*:*:*:*:*:*:*",
  39066. "cpe_name" : [ ]
  39067. } ]
  39068. } ]
  39069. },
  39070. "impact" : {
  39071. "baseMetricV3" : {
  39072. "cvssV3" : {
  39073. "version" : "3.1",
  39074. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  39075. "attackVector" : "NETWORK",
  39076. "attackComplexity" : "LOW",
  39077. "privilegesRequired" : "NONE",
  39078. "userInteraction" : "NONE",
  39079. "scope" : "UNCHANGED",
  39080. "confidentialityImpact" : "HIGH",
  39081. "integrityImpact" : "HIGH",
  39082. "availabilityImpact" : "HIGH",
  39083. "baseScore" : 9.8,
  39084. "baseSeverity" : "CRITICAL"
  39085. },
  39086. "exploitabilityScore" : 3.9,
  39087. "impactScore" : 5.9
  39088. },
  39089. "baseMetricV2" : {
  39090. "cvssV2" : {
  39091. "version" : "2.0",
  39092. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  39093. "accessVector" : "NETWORK",
  39094. "accessComplexity" : "LOW",
  39095. "authentication" : "NONE",
  39096. "confidentialityImpact" : "PARTIAL",
  39097. "integrityImpact" : "PARTIAL",
  39098. "availabilityImpact" : "PARTIAL",
  39099. "baseScore" : 7.5
  39100. },
  39101. "severity" : "HIGH",
  39102. "exploitabilityScore" : 10.0,
  39103. "impactScore" : 6.4,
  39104. "acInsufInfo" : false,
  39105. "obtainAllPrivilege" : false,
  39106. "obtainUserPrivilege" : false,
  39107. "obtainOtherPrivilege" : false,
  39108. "userInteractionRequired" : false
  39109. }
  39110. },
  39111. "publishedDate" : "2021-04-28T06:15Z",
  39112. "lastModifiedDate" : "2021-05-06T21:56Z"
  39113. }, {
  39114. "cve" : {
  39115. "data_type" : "CVE",
  39116. "data_format" : "MITRE",
  39117. "data_version" : "4.0",
  39118. "CVE_data_meta" : {
  39119. "ID" : "CVE-2020-36326",
  39120. "ASSIGNER" : "cve@mitre.org"
  39121. },
  39122. "problemtype" : {
  39123. "problemtype_data" : [ {
  39124. "description" : [ {
  39125. "lang" : "en",
  39126. "value" : "CWE-502"
  39127. } ]
  39128. } ]
  39129. },
  39130. "references" : {
  39131. "reference_data" : [ {
  39132. "url" : "https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba21d0242c5950c56e4c6f9",
  39133. "name" : "https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba21d0242c5950c56e4c6f9",
  39134. "refsource" : "MISC",
  39135. "tags" : [ "Patch", "Third Party Advisory" ]
  39136. } ]
  39137. },
  39138. "description" : {
  39139. "description_data" : [ {
  39140. "lang" : "en",
  39141. "value" : "PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation."
  39142. } ]
  39143. }
  39144. },
  39145. "configurations" : {
  39146. "CVE_data_version" : "4.0",
  39147. "nodes" : [ {
  39148. "operator" : "OR",
  39149. "children" : [ ],
  39150. "cpe_match" : [ {
  39151. "vulnerable" : true,
  39152. "cpe23Uri" : "cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:*",
  39153. "versionStartIncluding" : "6.1.8",
  39154. "versionEndIncluding" : "6.4.0",
  39155. "cpe_name" : [ ]
  39156. } ]
  39157. } ]
  39158. },
  39159. "impact" : {
  39160. "baseMetricV3" : {
  39161. "cvssV3" : {
  39162. "version" : "3.1",
  39163. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  39164. "attackVector" : "NETWORK",
  39165. "attackComplexity" : "LOW",
  39166. "privilegesRequired" : "NONE",
  39167. "userInteraction" : "NONE",
  39168. "scope" : "UNCHANGED",
  39169. "confidentialityImpact" : "HIGH",
  39170. "integrityImpact" : "HIGH",
  39171. "availabilityImpact" : "HIGH",
  39172. "baseScore" : 9.8,
  39173. "baseSeverity" : "CRITICAL"
  39174. },
  39175. "exploitabilityScore" : 3.9,
  39176. "impactScore" : 5.9
  39177. },
  39178. "baseMetricV2" : {
  39179. "cvssV2" : {
  39180. "version" : "2.0",
  39181. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  39182. "accessVector" : "NETWORK",
  39183. "accessComplexity" : "LOW",
  39184. "authentication" : "NONE",
  39185. "confidentialityImpact" : "PARTIAL",
  39186. "integrityImpact" : "PARTIAL",
  39187. "availabilityImpact" : "PARTIAL",
  39188. "baseScore" : 7.5
  39189. },
  39190. "severity" : "HIGH",
  39191. "exploitabilityScore" : 10.0,
  39192. "impactScore" : 6.4,
  39193. "acInsufInfo" : false,
  39194. "obtainAllPrivilege" : false,
  39195. "obtainUserPrivilege" : false,
  39196. "obtainOtherPrivilege" : false,
  39197. "userInteractionRequired" : false
  39198. }
  39199. },
  39200. "publishedDate" : "2021-04-28T03:15Z",
  39201. "lastModifiedDate" : "2021-05-07T17:46Z"
  39202. }, {
  39203. "cve" : {
  39204. "data_type" : "CVE",
  39205. "data_format" : "MITRE",
  39206. "data_version" : "4.0",
  39207. "CVE_data_meta" : {
  39208. "ID" : "CVE-2021-31815",
  39209. "ASSIGNER" : "cve@mitre.org"
  39210. },
  39211. "problemtype" : {
  39212. "problemtype_data" : [ {
  39213. "description" : [ {
  39214. "lang" : "en",
  39215. "value" : "CWE-319"
  39216. } ]
  39217. } ]
  39218. },
  39219. "references" : {
  39220. "reference_data" : [ {
  39221. "url" : "https://themarkup.org/privacy/2021/04/27/google-promised-its-contact-tracing-app-was-completely-private-but-it-wasnt",
  39222. "name" : "https://themarkup.org/privacy/2021/04/27/google-promised-its-contact-tracing-app-was-completely-private-but-it-wasnt",
  39223. "refsource" : "MISC",
  39224. "tags" : [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ]
  39225. }, {
  39226. "url" : "https://blog.appcensus.io/2021/04/27/why-google-should-stop-logging-contact-tracing-data/",
  39227. "name" : "https://blog.appcensus.io/2021/04/27/why-google-should-stop-logging-contact-tracing-data/",
  39228. "refsource" : "MISC",
  39229. "tags" : [ "Exploit", "Third Party Advisory" ]
  39230. } ]
  39231. },
  39232. "description" : {
  39233. "description_data" : [ {
  39234. "lang" : "en",
  39235. "value" : "GAEN (aka Google/Apple Exposure Notifications) through 2021-04-27 on Android allows attackers to obtain sensitive information, such as a user's location history, in-person social graph, and (sometimes) COVID-19 infection status, because Rolling Proximity Identifiers and MAC addresses are written to the Android system log, and many Android devices have applications (preinstalled by the hardware manufacturer or network operator) that read system log data and send it to third parties. NOTE: a news outlet (The Markup) states that they received a vendor response indicating that fix deployment \"began several weeks ago and will be complete in the coming days.\""
  39236. } ]
  39237. }
  39238. },
  39239. "configurations" : {
  39240. "CVE_data_version" : "4.0",
  39241. "nodes" : [ {
  39242. "operator" : "OR",
  39243. "children" : [ ],
  39244. "cpe_match" : [ {
  39245. "vulnerable" : true,
  39246. "cpe23Uri" : "cpe:2.3:a:google:google\\/apple_exposure_notifications:*:*:*:*:*:android:*:*",
  39247. "versionEndIncluding" : "2021-04-27",
  39248. "cpe_name" : [ ]
  39249. } ]
  39250. } ]
  39251. },
  39252. "impact" : {
  39253. "baseMetricV3" : {
  39254. "cvssV3" : {
  39255. "version" : "3.1",
  39256. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
  39257. "attackVector" : "LOCAL",
  39258. "attackComplexity" : "LOW",
  39259. "privilegesRequired" : "LOW",
  39260. "userInteraction" : "NONE",
  39261. "scope" : "UNCHANGED",
  39262. "confidentialityImpact" : "LOW",
  39263. "integrityImpact" : "NONE",
  39264. "availabilityImpact" : "NONE",
  39265. "baseScore" : 3.3,
  39266. "baseSeverity" : "LOW"
  39267. },
  39268. "exploitabilityScore" : 1.8,
  39269. "impactScore" : 1.4
  39270. },
  39271. "baseMetricV2" : {
  39272. "cvssV2" : {
  39273. "version" : "2.0",
  39274. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  39275. "accessVector" : "LOCAL",
  39276. "accessComplexity" : "LOW",
  39277. "authentication" : "NONE",
  39278. "confidentialityImpact" : "PARTIAL",
  39279. "integrityImpact" : "NONE",
  39280. "availabilityImpact" : "NONE",
  39281. "baseScore" : 2.1
  39282. },
  39283. "severity" : "LOW",
  39284. "exploitabilityScore" : 3.9,
  39285. "impactScore" : 2.9,
  39286. "acInsufInfo" : false,
  39287. "obtainAllPrivilege" : false,
  39288. "obtainUserPrivilege" : false,
  39289. "obtainOtherPrivilege" : false,
  39290. "userInteractionRequired" : false
  39291. }
  39292. },
  39293. "publishedDate" : "2021-04-28T02:15Z",
  39294. "lastModifiedDate" : "2021-05-07T18:28Z"
  39295. }, {
  39296. "cve" : {
  39297. "data_type" : "CVE",
  39298. "data_format" : "MITRE",
  39299. "data_version" : "4.0",
  39300. "CVE_data_meta" : {
  39301. "ID" : "CVE-2021-20716",
  39302. "ASSIGNER" : "vultures@jpcert.or.jp"
  39303. },
  39304. "problemtype" : {
  39305. "problemtype_data" : [ {
  39306. "description" : [ {
  39307. "lang" : "en",
  39308. "value" : "NVD-CWE-Other"
  39309. } ]
  39310. } ]
  39311. },
  39312. "references" : {
  39313. "reference_data" : [ {
  39314. "url" : "https://www.buffalo.jp/news/detail/20210427-02.html",
  39315. "name" : "https://www.buffalo.jp/news/detail/20210427-02.html",
  39316. "refsource" : "MISC",
  39317. "tags" : [ "Vendor Advisory" ]
  39318. }, {
  39319. "url" : "https://jvn.jp/en/vu/JVNVU90274525/index.html",
  39320. "name" : "https://jvn.jp/en/vu/JVNVU90274525/index.html",
  39321. "refsource" : "MISC",
  39322. "tags" : [ "Third Party Advisory" ]
  39323. } ]
  39324. },
  39325. "description" : {
  39326. "description_data" : [ {
  39327. "lang" : "en",
  39328. "value" : "Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition."
  39329. } ]
  39330. }
  39331. },
  39332. "configurations" : {
  39333. "CVE_data_version" : "4.0",
  39334. "nodes" : [ {
  39335. "operator" : "AND",
  39336. "children" : [ {
  39337. "operator" : "OR",
  39338. "children" : [ ],
  39339. "cpe_match" : [ {
  39340. "vulnerable" : true,
  39341. "cpe23Uri" : "cpe:2.3:o:buffalo:bhr-4rv_firmware:*:*:*:*:*:*:*:*",
  39342. "versionEndIncluding" : "2.55",
  39343. "cpe_name" : [ ]
  39344. } ]
  39345. }, {
  39346. "operator" : "OR",
  39347. "children" : [ ],
  39348. "cpe_match" : [ {
  39349. "vulnerable" : false,
  39350. "cpe23Uri" : "cpe:2.3:h:buffalo:bhr-4rv:-:*:*:*:*:*:*:*",
  39351. "cpe_name" : [ ]
  39352. } ]
  39353. } ],
  39354. "cpe_match" : [ ]
  39355. }, {
  39356. "operator" : "AND",
  39357. "children" : [ {
  39358. "operator" : "OR",
  39359. "children" : [ ],
  39360. "cpe_match" : [ {
  39361. "vulnerable" : true,
  39362. "cpe23Uri" : "cpe:2.3:o:buffalo:fs-g54_firmware:*:*:*:*:*:*:*:*",
  39363. "versionEndIncluding" : "2.04",
  39364. "cpe_name" : [ ]
  39365. } ]
  39366. }, {
  39367. "operator" : "OR",
  39368. "children" : [ ],
  39369. "cpe_match" : [ {
  39370. "vulnerable" : false,
  39371. "cpe23Uri" : "cpe:2.3:h:buffalo:fs-g54:-:*:*:*:*:*:*:*",
  39372. "cpe_name" : [ ]
  39373. } ]
  39374. } ],
  39375. "cpe_match" : [ ]
  39376. }, {
  39377. "operator" : "AND",
  39378. "children" : [ {
  39379. "operator" : "OR",
  39380. "children" : [ ],
  39381. "cpe_match" : [ {
  39382. "vulnerable" : true,
  39383. "cpe23Uri" : "cpe:2.3:o:buffalo:wbr2-b11_firmware:*:*:*:*:*:*:*:*",
  39384. "versionEndIncluding" : "2.32",
  39385. "cpe_name" : [ ]
  39386. } ]
  39387. }, {
  39388. "operator" : "OR",
  39389. "children" : [ ],
  39390. "cpe_match" : [ {
  39391. "vulnerable" : false,
  39392. "cpe23Uri" : "cpe:2.3:h:buffalo:wbr2-b11:-:*:*:*:*:*:*:*",
  39393. "cpe_name" : [ ]
  39394. } ]
  39395. } ],
  39396. "cpe_match" : [ ]
  39397. }, {
  39398. "operator" : "AND",
  39399. "children" : [ {
  39400. "operator" : "OR",
  39401. "children" : [ ],
  39402. "cpe_match" : [ {
  39403. "vulnerable" : true,
  39404. "cpe23Uri" : "cpe:2.3:o:buffalo:wbr2-g54_firmware:*:*:*:*:*:*:*:*",
  39405. "versionEndIncluding" : "2.32",
  39406. "cpe_name" : [ ]
  39407. } ]
  39408. }, {
  39409. "operator" : "OR",
  39410. "children" : [ ],
  39411. "cpe_match" : [ {
  39412. "vulnerable" : false,
  39413. "cpe23Uri" : "cpe:2.3:h:buffalo:wbr2-g54:-:*:*:*:*:*:*:*",
  39414. "cpe_name" : [ ]
  39415. } ]
  39416. } ],
  39417. "cpe_match" : [ ]
  39418. }, {
  39419. "operator" : "AND",
  39420. "children" : [ {
  39421. "operator" : "OR",
  39422. "children" : [ ],
  39423. "cpe_match" : [ {
  39424. "vulnerable" : true,
  39425. "cpe23Uri" : "cpe:2.3:o:buffalo:wbr2-g54-kd_firmware:*:*:*:*:*:*:*:*",
  39426. "versionEndIncluding" : "2.32",
  39427. "cpe_name" : [ ]
  39428. } ]
  39429. }, {
  39430. "operator" : "OR",
  39431. "children" : [ ],
  39432. "cpe_match" : [ {
  39433. "vulnerable" : false,
  39434. "cpe23Uri" : "cpe:2.3:h:buffalo:wbr2-g54-kd:-:*:*:*:*:*:*:*",
  39435. "cpe_name" : [ ]
  39436. } ]
  39437. } ],
  39438. "cpe_match" : [ ]
  39439. }, {
  39440. "operator" : "AND",
  39441. "children" : [ {
  39442. "operator" : "OR",
  39443. "children" : [ ],
  39444. "cpe_match" : [ {
  39445. "vulnerable" : true,
  39446. "cpe23Uri" : "cpe:2.3:o:buffalo:wbr-b11_firmware:*:*:*:*:*:*:*:*",
  39447. "versionEndIncluding" : "2.23",
  39448. "cpe_name" : [ ]
  39449. } ]
  39450. }, {
  39451. "operator" : "OR",
  39452. "children" : [ ],
  39453. "cpe_match" : [ {
  39454. "vulnerable" : false,
  39455. "cpe23Uri" : "cpe:2.3:h:buffalo:wbr-b11:-:*:*:*:*:*:*:*",
  39456. "cpe_name" : [ ]
  39457. } ]
  39458. } ],
  39459. "cpe_match" : [ ]
  39460. }, {
  39461. "operator" : "AND",
  39462. "children" : [ {
  39463. "operator" : "OR",
  39464. "children" : [ ],
  39465. "cpe_match" : [ {
  39466. "vulnerable" : true,
  39467. "cpe23Uri" : "cpe:2.3:o:buffalo:wbr-g54_firmware:*:*:*:*:*:*:*:*",
  39468. "versionEndIncluding" : "2.23",
  39469. "cpe_name" : [ ]
  39470. } ]
  39471. }, {
  39472. "operator" : "OR",
  39473. "children" : [ ],
  39474. "cpe_match" : [ {
  39475. "vulnerable" : false,
  39476. "cpe23Uri" : "cpe:2.3:h:buffalo:wbr-g54:-:*:*:*:*:*:*:*",
  39477. "cpe_name" : [ ]
  39478. } ]
  39479. } ],
  39480. "cpe_match" : [ ]
  39481. }, {
  39482. "operator" : "AND",
  39483. "children" : [ {
  39484. "operator" : "OR",
  39485. "children" : [ ],
  39486. "cpe_match" : [ {
  39487. "vulnerable" : true,
  39488. "cpe23Uri" : "cpe:2.3:o:buffalo:wbr-g54l_firmware:*:*:*:*:*:*:*:*",
  39489. "versionEndIncluding" : "2.20",
  39490. "cpe_name" : [ ]
  39491. } ]
  39492. }, {
  39493. "operator" : "OR",
  39494. "children" : [ ],
  39495. "cpe_match" : [ {
  39496. "vulnerable" : false,
  39497. "cpe23Uri" : "cpe:2.3:h:buffalo:wbr-g54l:-:*:*:*:*:*:*:*",
  39498. "cpe_name" : [ ]
  39499. } ]
  39500. } ],
  39501. "cpe_match" : [ ]
  39502. }, {
  39503. "operator" : "AND",
  39504. "children" : [ {
  39505. "operator" : "OR",
  39506. "children" : [ ],
  39507. "cpe_match" : [ {
  39508. "vulnerable" : true,
  39509. "cpe23Uri" : "cpe:2.3:o:buffalo:whr2-a54g54_firmware:*:*:*:*:*:*:*:*",
  39510. "versionEndIncluding" : "2.25",
  39511. "cpe_name" : [ ]
  39512. } ]
  39513. }, {
  39514. "operator" : "OR",
  39515. "children" : [ ],
  39516. "cpe_match" : [ {
  39517. "vulnerable" : false,
  39518. "cpe23Uri" : "cpe:2.3:h:buffalo:whr2-a54g54:-:*:*:*:*:*:*:*",
  39519. "cpe_name" : [ ]
  39520. } ]
  39521. } ],
  39522. "cpe_match" : [ ]
  39523. }, {
  39524. "operator" : "AND",
  39525. "children" : [ {
  39526. "operator" : "OR",
  39527. "children" : [ ],
  39528. "cpe_match" : [ {
  39529. "vulnerable" : true,
  39530. "cpe23Uri" : "cpe:2.3:o:buffalo:whr2-g54_firmware:*:*:*:*:*:*:*:*",
  39531. "versionEndIncluding" : "2.23",
  39532. "cpe_name" : [ ]
  39533. } ]
  39534. }, {
  39535. "operator" : "OR",
  39536. "children" : [ ],
  39537. "cpe_match" : [ {
  39538. "vulnerable" : false,
  39539. "cpe23Uri" : "cpe:2.3:h:buffalo:whr2-g54:-:*:*:*:*:*:*:*",
  39540. "cpe_name" : [ ]
  39541. } ]
  39542. } ],
  39543. "cpe_match" : [ ]
  39544. }, {
  39545. "operator" : "AND",
  39546. "children" : [ {
  39547. "operator" : "OR",
  39548. "children" : [ ],
  39549. "cpe_match" : [ {
  39550. "vulnerable" : true,
  39551. "cpe23Uri" : "cpe:2.3:o:buffalo:whr2-g54v_firmware:*:*:*:*:*:*:*:*",
  39552. "versionEndIncluding" : "2.55",
  39553. "cpe_name" : [ ]
  39554. } ]
  39555. }, {
  39556. "operator" : "OR",
  39557. "children" : [ ],
  39558. "cpe_match" : [ {
  39559. "vulnerable" : false,
  39560. "cpe23Uri" : "cpe:2.3:h:buffalo:whr2-g54v:-:*:*:*:*:*:*:*",
  39561. "cpe_name" : [ ]
  39562. } ]
  39563. } ],
  39564. "cpe_match" : [ ]
  39565. }, {
  39566. "operator" : "AND",
  39567. "children" : [ {
  39568. "operator" : "OR",
  39569. "children" : [ ],
  39570. "cpe_match" : [ {
  39571. "vulnerable" : true,
  39572. "cpe23Uri" : "cpe:2.3:o:buffalo:whr3-ag54_firmware:*:*:*:*:*:*:*:*",
  39573. "versionEndIncluding" : "2.23",
  39574. "cpe_name" : [ ]
  39575. } ]
  39576. }, {
  39577. "operator" : "OR",
  39578. "children" : [ ],
  39579. "cpe_match" : [ {
  39580. "vulnerable" : false,
  39581. "cpe23Uri" : "cpe:2.3:h:buffalo:whr3-ag54:-:*:*:*:*:*:*:*",
  39582. "cpe_name" : [ ]
  39583. } ]
  39584. } ],
  39585. "cpe_match" : [ ]
  39586. }, {
  39587. "operator" : "AND",
  39588. "children" : [ {
  39589. "operator" : "OR",
  39590. "children" : [ ],
  39591. "cpe_match" : [ {
  39592. "vulnerable" : true,
  39593. "cpe23Uri" : "cpe:2.3:o:buffalo:whr-g54_firmware:*:*:*:*:*:*:*:*",
  39594. "versionEndIncluding" : "2.16",
  39595. "cpe_name" : [ ]
  39596. } ]
  39597. }, {
  39598. "operator" : "OR",
  39599. "children" : [ ],
  39600. "cpe_match" : [ {
  39601. "vulnerable" : false,
  39602. "cpe23Uri" : "cpe:2.3:h:buffalo:whr-g54:-:*:*:*:*:*:*:*",
  39603. "cpe_name" : [ ]
  39604. } ]
  39605. } ],
  39606. "cpe_match" : [ ]
  39607. }, {
  39608. "operator" : "AND",
  39609. "children" : [ {
  39610. "operator" : "OR",
  39611. "children" : [ ],
  39612. "cpe_match" : [ {
  39613. "vulnerable" : true,
  39614. "cpe23Uri" : "cpe:2.3:o:buffalo:whr-g54-nf_firmware:*:*:*:*:*:*:*:*",
  39615. "versionEndIncluding" : "2.10",
  39616. "cpe_name" : [ ]
  39617. } ]
  39618. }, {
  39619. "operator" : "OR",
  39620. "children" : [ ],
  39621. "cpe_match" : [ {
  39622. "vulnerable" : false,
  39623. "cpe23Uri" : "cpe:2.3:h:buffalo:whr-g54-nf:-:*:*:*:*:*:*:*",
  39624. "cpe_name" : [ ]
  39625. } ]
  39626. } ],
  39627. "cpe_match" : [ ]
  39628. }, {
  39629. "operator" : "AND",
  39630. "children" : [ {
  39631. "operator" : "OR",
  39632. "children" : [ ],
  39633. "cpe_match" : [ {
  39634. "vulnerable" : true,
  39635. "cpe23Uri" : "cpe:2.3:o:buffalo:wla2-g54_firmware:*:*:*:*:*:*:*:*",
  39636. "versionEndIncluding" : "2.24",
  39637. "cpe_name" : [ ]
  39638. } ]
  39639. }, {
  39640. "operator" : "OR",
  39641. "children" : [ ],
  39642. "cpe_match" : [ {
  39643. "vulnerable" : false,
  39644. "cpe23Uri" : "cpe:2.3:h:buffalo:wla2-g54:-:*:*:*:*:*:*:*",
  39645. "cpe_name" : [ ]
  39646. } ]
  39647. } ],
  39648. "cpe_match" : [ ]
  39649. }, {
  39650. "operator" : "AND",
  39651. "children" : [ {
  39652. "operator" : "OR",
  39653. "children" : [ ],
  39654. "cpe_match" : [ {
  39655. "vulnerable" : true,
  39656. "cpe23Uri" : "cpe:2.3:o:buffalo:wla2-g54c_firmware:*:*:*:*:*:*:*:*",
  39657. "versionEndIncluding" : "2.24",
  39658. "cpe_name" : [ ]
  39659. } ]
  39660. }, {
  39661. "operator" : "OR",
  39662. "children" : [ ],
  39663. "cpe_match" : [ {
  39664. "vulnerable" : false,
  39665. "cpe23Uri" : "cpe:2.3:h:buffalo:wla2-g54c:-:*:*:*:*:*:*:*",
  39666. "cpe_name" : [ ]
  39667. } ]
  39668. } ],
  39669. "cpe_match" : [ ]
  39670. }, {
  39671. "operator" : "AND",
  39672. "children" : [ {
  39673. "operator" : "OR",
  39674. "children" : [ ],
  39675. "cpe_match" : [ {
  39676. "vulnerable" : true,
  39677. "cpe23Uri" : "cpe:2.3:o:buffalo:wla-b11_firmware:*:*:*:*:*:*:*:*",
  39678. "versionEndIncluding" : "2.20",
  39679. "cpe_name" : [ ]
  39680. } ]
  39681. }, {
  39682. "operator" : "OR",
  39683. "children" : [ ],
  39684. "cpe_match" : [ {
  39685. "vulnerable" : false,
  39686. "cpe23Uri" : "cpe:2.3:h:buffalo:wla-b11:-:*:*:*:*:*:*:*",
  39687. "cpe_name" : [ ]
  39688. } ]
  39689. } ],
  39690. "cpe_match" : [ ]
  39691. }, {
  39692. "operator" : "AND",
  39693. "children" : [ {
  39694. "operator" : "OR",
  39695. "children" : [ ],
  39696. "cpe_match" : [ {
  39697. "vulnerable" : true,
  39698. "cpe23Uri" : "cpe:2.3:o:buffalo:wla-g54_firmware:*:*:*:*:*:*:*:*",
  39699. "versionEndIncluding" : "2.20",
  39700. "cpe_name" : [ ]
  39701. } ]
  39702. }, {
  39703. "operator" : "OR",
  39704. "children" : [ ],
  39705. "cpe_match" : [ {
  39706. "vulnerable" : false,
  39707. "cpe23Uri" : "cpe:2.3:h:buffalo:wla-g54:-:*:*:*:*:*:*:*",
  39708. "cpe_name" : [ ]
  39709. } ]
  39710. } ],
  39711. "cpe_match" : [ ]
  39712. }, {
  39713. "operator" : "AND",
  39714. "children" : [ {
  39715. "operator" : "OR",
  39716. "children" : [ ],
  39717. "cpe_match" : [ {
  39718. "vulnerable" : true,
  39719. "cpe23Uri" : "cpe:2.3:o:buffalo:wla-g54c_firmware:*:*:*:*:*:*:*:*",
  39720. "versionEndIncluding" : "2.20",
  39721. "cpe_name" : [ ]
  39722. } ]
  39723. }, {
  39724. "operator" : "OR",
  39725. "children" : [ ],
  39726. "cpe_match" : [ {
  39727. "vulnerable" : false,
  39728. "cpe23Uri" : "cpe:2.3:h:buffalo:wla-g54c:-:*:*:*:*:*:*:*",
  39729. "cpe_name" : [ ]
  39730. } ]
  39731. } ],
  39732. "cpe_match" : [ ]
  39733. }, {
  39734. "operator" : "AND",
  39735. "children" : [ {
  39736. "operator" : "OR",
  39737. "children" : [ ],
  39738. "cpe_match" : [ {
  39739. "vulnerable" : true,
  39740. "cpe23Uri" : "cpe:2.3:o:buffalo:wlah-a54g54_firmware:*:*:*:*:*:*:*:*",
  39741. "versionEndIncluding" : "2.54",
  39742. "cpe_name" : [ ]
  39743. } ]
  39744. }, {
  39745. "operator" : "OR",
  39746. "children" : [ ],
  39747. "cpe_match" : [ {
  39748. "vulnerable" : false,
  39749. "cpe23Uri" : "cpe:2.3:h:buffalo:wlah-a54g54:-:*:*:*:*:*:*:*",
  39750. "cpe_name" : [ ]
  39751. } ]
  39752. } ],
  39753. "cpe_match" : [ ]
  39754. }, {
  39755. "operator" : "AND",
  39756. "children" : [ {
  39757. "operator" : "OR",
  39758. "children" : [ ],
  39759. "cpe_match" : [ {
  39760. "vulnerable" : true,
  39761. "cpe23Uri" : "cpe:2.3:o:buffalo:wlah-am54g54_firmware:*:*:*:*:*:*:*:*",
  39762. "versionEndIncluding" : "2.54",
  39763. "cpe_name" : [ ]
  39764. } ]
  39765. }, {
  39766. "operator" : "OR",
  39767. "children" : [ ],
  39768. "cpe_match" : [ {
  39769. "vulnerable" : false,
  39770. "cpe23Uri" : "cpe:2.3:h:buffalo:wlah-am54g54:-:*:*:*:*:*:*:*",
  39771. "cpe_name" : [ ]
  39772. } ]
  39773. } ],
  39774. "cpe_match" : [ ]
  39775. }, {
  39776. "operator" : "AND",
  39777. "children" : [ {
  39778. "operator" : "OR",
  39779. "children" : [ ],
  39780. "cpe_match" : [ {
  39781. "vulnerable" : true,
  39782. "cpe23Uri" : "cpe:2.3:o:buffalo:wlah-g54_firmware:*:*:*:*:*:*:*:*",
  39783. "versionEndIncluding" : "2.54",
  39784. "cpe_name" : [ ]
  39785. } ]
  39786. }, {
  39787. "operator" : "OR",
  39788. "children" : [ ],
  39789. "cpe_match" : [ {
  39790. "vulnerable" : false,
  39791. "cpe23Uri" : "cpe:2.3:h:buffalo:wlah-g54:-:*:*:*:*:*:*:*",
  39792. "cpe_name" : [ ]
  39793. } ]
  39794. } ],
  39795. "cpe_match" : [ ]
  39796. }, {
  39797. "operator" : "AND",
  39798. "children" : [ {
  39799. "operator" : "OR",
  39800. "children" : [ ],
  39801. "cpe_match" : [ {
  39802. "vulnerable" : true,
  39803. "cpe23Uri" : "cpe:2.3:o:buffalo:wli2-tx1-ag54_firmware:*:*:*:*:*:*:*:*",
  39804. "versionEndIncluding" : "2.53",
  39805. "cpe_name" : [ ]
  39806. } ]
  39807. }, {
  39808. "operator" : "OR",
  39809. "children" : [ ],
  39810. "cpe_match" : [ {
  39811. "vulnerable" : false,
  39812. "cpe23Uri" : "cpe:2.3:h:buffalo:wli2-tx1-ag54:-:*:*:*:*:*:*:*",
  39813. "cpe_name" : [ ]
  39814. } ]
  39815. } ],
  39816. "cpe_match" : [ ]
  39817. }, {
  39818. "operator" : "AND",
  39819. "children" : [ {
  39820. "operator" : "OR",
  39821. "children" : [ ],
  39822. "cpe_match" : [ {
  39823. "vulnerable" : true,
  39824. "cpe23Uri" : "cpe:2.3:o:buffalo:wli2-tx1-amg54_firmware:*:*:*:*:*:*:*:*",
  39825. "versionEndIncluding" : "2.53",
  39826. "cpe_name" : [ ]
  39827. } ]
  39828. }, {
  39829. "operator" : "OR",
  39830. "children" : [ ],
  39831. "cpe_match" : [ {
  39832. "vulnerable" : false,
  39833. "cpe23Uri" : "cpe:2.3:h:buffalo:wli2-tx1-amg54:-:*:*:*:*:*:*:*",
  39834. "cpe_name" : [ ]
  39835. } ]
  39836. } ],
  39837. "cpe_match" : [ ]
  39838. }, {
  39839. "operator" : "AND",
  39840. "children" : [ {
  39841. "operator" : "OR",
  39842. "children" : [ ],
  39843. "cpe_match" : [ {
  39844. "vulnerable" : true,
  39845. "cpe23Uri" : "cpe:2.3:o:buffalo:wli2-tx1-g54_firmware:*:*:*:*:*:*:*:*",
  39846. "versionEndIncluding" : "2.20",
  39847. "cpe_name" : [ ]
  39848. } ]
  39849. }, {
  39850. "operator" : "OR",
  39851. "children" : [ ],
  39852. "cpe_match" : [ {
  39853. "vulnerable" : false,
  39854. "cpe23Uri" : "cpe:2.3:h:buffalo:wli2-tx1-g54:-:*:*:*:*:*:*:*",
  39855. "cpe_name" : [ ]
  39856. } ]
  39857. } ],
  39858. "cpe_match" : [ ]
  39859. }, {
  39860. "operator" : "AND",
  39861. "children" : [ {
  39862. "operator" : "OR",
  39863. "children" : [ ],
  39864. "cpe_match" : [ {
  39865. "vulnerable" : true,
  39866. "cpe23Uri" : "cpe:2.3:o:buffalo:wli3-tx1-amg54_firmware:*:*:*:*:*:*:*:*",
  39867. "versionEndIncluding" : "2.53",
  39868. "cpe_name" : [ ]
  39869. } ]
  39870. }, {
  39871. "operator" : "OR",
  39872. "children" : [ ],
  39873. "cpe_match" : [ {
  39874. "vulnerable" : false,
  39875. "cpe23Uri" : "cpe:2.3:h:buffalo:wli3-tx1-amg54:-:*:*:*:*:*:*:*",
  39876. "cpe_name" : [ ]
  39877. } ]
  39878. } ],
  39879. "cpe_match" : [ ]
  39880. }, {
  39881. "operator" : "AND",
  39882. "children" : [ {
  39883. "operator" : "OR",
  39884. "children" : [ ],
  39885. "cpe_match" : [ {
  39886. "vulnerable" : true,
  39887. "cpe23Uri" : "cpe:2.3:o:buffalo:wli3-tx1-g54_firmware:*:*:*:*:*:*:*:*",
  39888. "versionEndIncluding" : "2.53",
  39889. "cpe_name" : [ ]
  39890. } ]
  39891. }, {
  39892. "operator" : "OR",
  39893. "children" : [ ],
  39894. "cpe_match" : [ {
  39895. "vulnerable" : false,
  39896. "cpe23Uri" : "cpe:2.3:h:buffalo:wli3-tx1-g54:-:*:*:*:*:*:*:*",
  39897. "cpe_name" : [ ]
  39898. } ]
  39899. } ],
  39900. "cpe_match" : [ ]
  39901. }, {
  39902. "operator" : "AND",
  39903. "children" : [ {
  39904. "operator" : "OR",
  39905. "children" : [ ],
  39906. "cpe_match" : [ {
  39907. "vulnerable" : true,
  39908. "cpe23Uri" : "cpe:2.3:o:buffalo:wli-t1-b11_firmware:*:*:*:*:*:*:*:*",
  39909. "versionEndIncluding" : "2.20",
  39910. "cpe_name" : [ ]
  39911. } ]
  39912. }, {
  39913. "operator" : "OR",
  39914. "children" : [ ],
  39915. "cpe_match" : [ {
  39916. "vulnerable" : false,
  39917. "cpe23Uri" : "cpe:2.3:h:buffalo:wli-t1-b11:-:*:*:*:*:*:*:*",
  39918. "cpe_name" : [ ]
  39919. } ]
  39920. } ],
  39921. "cpe_match" : [ ]
  39922. }, {
  39923. "operator" : "AND",
  39924. "children" : [ {
  39925. "operator" : "OR",
  39926. "children" : [ ],
  39927. "cpe_match" : [ {
  39928. "vulnerable" : true,
  39929. "cpe23Uri" : "cpe:2.3:o:buffalo:wli-tx1-g54_firmware:*:*:*:*:*:*:*:*",
  39930. "versionEndIncluding" : "2.20",
  39931. "cpe_name" : [ ]
  39932. } ]
  39933. }, {
  39934. "operator" : "OR",
  39935. "children" : [ ],
  39936. "cpe_match" : [ {
  39937. "vulnerable" : false,
  39938. "cpe23Uri" : "cpe:2.3:h:buffalo:wli-tx1-g54:-:*:*:*:*:*:*:*",
  39939. "cpe_name" : [ ]
  39940. } ]
  39941. } ],
  39942. "cpe_match" : [ ]
  39943. }, {
  39944. "operator" : "AND",
  39945. "children" : [ {
  39946. "operator" : "OR",
  39947. "children" : [ ],
  39948. "cpe_match" : [ {
  39949. "vulnerable" : true,
  39950. "cpe23Uri" : "cpe:2.3:o:buffalo:wvr-g54-nf_firmware:*:*:*:*:*:*:*:*",
  39951. "versionEndIncluding" : "2.02",
  39952. "cpe_name" : [ ]
  39953. } ]
  39954. }, {
  39955. "operator" : "OR",
  39956. "children" : [ ],
  39957. "cpe_match" : [ {
  39958. "vulnerable" : false,
  39959. "cpe23Uri" : "cpe:2.3:h:buffalo:wvr-g54-nf:-:*:*:*:*:*:*:*",
  39960. "cpe_name" : [ ]
  39961. } ]
  39962. } ],
  39963. "cpe_match" : [ ]
  39964. }, {
  39965. "operator" : "AND",
  39966. "children" : [ {
  39967. "operator" : "OR",
  39968. "children" : [ ],
  39969. "cpe_match" : [ {
  39970. "vulnerable" : true,
  39971. "cpe23Uri" : "cpe:2.3:o:buffalo:wzr-g108_firmware:*:*:*:*:*:*:*:*",
  39972. "versionEndIncluding" : "2.41",
  39973. "cpe_name" : [ ]
  39974. } ]
  39975. }, {
  39976. "operator" : "OR",
  39977. "children" : [ ],
  39978. "cpe_match" : [ {
  39979. "vulnerable" : false,
  39980. "cpe23Uri" : "cpe:2.3:h:buffalo:wzr-g108:-:*:*:*:*:*:*:*",
  39981. "cpe_name" : [ ]
  39982. } ]
  39983. } ],
  39984. "cpe_match" : [ ]
  39985. }, {
  39986. "operator" : "AND",
  39987. "children" : [ {
  39988. "operator" : "OR",
  39989. "children" : [ ],
  39990. "cpe_match" : [ {
  39991. "vulnerable" : true,
  39992. "cpe23Uri" : "cpe:2.3:o:buffalo:wzr-g54_firmware:*:*:*:*:*:*:*:*",
  39993. "versionEndIncluding" : "2.41",
  39994. "cpe_name" : [ ]
  39995. } ]
  39996. }, {
  39997. "operator" : "OR",
  39998. "children" : [ ],
  39999. "cpe_match" : [ {
  40000. "vulnerable" : false,
  40001. "cpe23Uri" : "cpe:2.3:h:buffalo:wzr-g54:-:*:*:*:*:*:*:*",
  40002. "cpe_name" : [ ]
  40003. } ]
  40004. } ],
  40005. "cpe_match" : [ ]
  40006. }, {
  40007. "operator" : "AND",
  40008. "children" : [ {
  40009. "operator" : "OR",
  40010. "children" : [ ],
  40011. "cpe_match" : [ {
  40012. "vulnerable" : true,
  40013. "cpe23Uri" : "cpe:2.3:o:buffalo:wzr-hp-g54_firmware:*:*:*:*:*:*:*:*",
  40014. "versionEndIncluding" : "2.41",
  40015. "cpe_name" : [ ]
  40016. } ]
  40017. }, {
  40018. "operator" : "OR",
  40019. "children" : [ ],
  40020. "cpe_match" : [ {
  40021. "vulnerable" : false,
  40022. "cpe23Uri" : "cpe:2.3:h:buffalo:wzr-hp-g54:-:*:*:*:*:*:*:*",
  40023. "cpe_name" : [ ]
  40024. } ]
  40025. } ],
  40026. "cpe_match" : [ ]
  40027. }, {
  40028. "operator" : "AND",
  40029. "children" : [ {
  40030. "operator" : "OR",
  40031. "children" : [ ],
  40032. "cpe_match" : [ {
  40033. "vulnerable" : true,
  40034. "cpe23Uri" : "cpe:2.3:o:buffalo:wzr-rs-g54_firmware:*:*:*:*:*:*:*:*",
  40035. "versionEndIncluding" : "2.55",
  40036. "cpe_name" : [ ]
  40037. } ]
  40038. }, {
  40039. "operator" : "OR",
  40040. "children" : [ ],
  40041. "cpe_match" : [ {
  40042. "vulnerable" : false,
  40043. "cpe23Uri" : "cpe:2.3:h:buffalo:wzr-rs-g54:-:*:*:*:*:*:*:*",
  40044. "cpe_name" : [ ]
  40045. } ]
  40046. } ],
  40047. "cpe_match" : [ ]
  40048. }, {
  40049. "operator" : "AND",
  40050. "children" : [ {
  40051. "operator" : "OR",
  40052. "children" : [ ],
  40053. "cpe_match" : [ {
  40054. "vulnerable" : true,
  40055. "cpe23Uri" : "cpe:2.3:o:buffalo:wzr-rs-g54hp_firmware:*:*:*:*:*:*:*:*",
  40056. "versionEndIncluding" : "2.55",
  40057. "cpe_name" : [ ]
  40058. } ]
  40059. }, {
  40060. "operator" : "OR",
  40061. "children" : [ ],
  40062. "cpe_match" : [ {
  40063. "vulnerable" : false,
  40064. "cpe23Uri" : "cpe:2.3:h:buffalo:wzr-rs-g54hp:-:*:*:*:*:*:*:*",
  40065. "cpe_name" : [ ]
  40066. } ]
  40067. } ],
  40068. "cpe_match" : [ ]
  40069. } ]
  40070. },
  40071. "impact" : {
  40072. "baseMetricV3" : {
  40073. "cvssV3" : {
  40074. "version" : "3.1",
  40075. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  40076. "attackVector" : "NETWORK",
  40077. "attackComplexity" : "LOW",
  40078. "privilegesRequired" : "NONE",
  40079. "userInteraction" : "NONE",
  40080. "scope" : "UNCHANGED",
  40081. "confidentialityImpact" : "HIGH",
  40082. "integrityImpact" : "HIGH",
  40083. "availabilityImpact" : "HIGH",
  40084. "baseScore" : 9.8,
  40085. "baseSeverity" : "CRITICAL"
  40086. },
  40087. "exploitabilityScore" : 3.9,
  40088. "impactScore" : 5.9
  40089. },
  40090. "baseMetricV2" : {
  40091. "cvssV2" : {
  40092. "version" : "2.0",
  40093. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  40094. "accessVector" : "NETWORK",
  40095. "accessComplexity" : "LOW",
  40096. "authentication" : "NONE",
  40097. "confidentialityImpact" : "COMPLETE",
  40098. "integrityImpact" : "COMPLETE",
  40099. "availabilityImpact" : "COMPLETE",
  40100. "baseScore" : 10.0
  40101. },
  40102. "severity" : "HIGH",
  40103. "exploitabilityScore" : 10.0,
  40104. "impactScore" : 10.0,
  40105. "acInsufInfo" : false,
  40106. "obtainAllPrivilege" : false,
  40107. "obtainUserPrivilege" : false,
  40108. "obtainOtherPrivilege" : false,
  40109. "userInteractionRequired" : false
  40110. }
  40111. },
  40112. "publishedDate" : "2021-04-28T01:15Z",
  40113. "lastModifiedDate" : "2021-05-07T17:43Z"
  40114. }, {
  40115. "cve" : {
  40116. "data_type" : "CVE",
  40117. "data_format" : "MITRE",
  40118. "data_version" : "4.0",
  40119. "CVE_data_meta" : {
  40120. "ID" : "CVE-2021-29476",
  40121. "ASSIGNER" : "security-advisories@github.com"
  40122. },
  40123. "problemtype" : {
  40124. "problemtype_data" : [ {
  40125. "description" : [ {
  40126. "lang" : "en",
  40127. "value" : "CWE-502"
  40128. } ]
  40129. } ]
  40130. },
  40131. "references" : {
  40132. "reference_data" : [ {
  40133. "url" : "https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54",
  40134. "name" : "https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54",
  40135. "refsource" : "CONFIRM",
  40136. "tags" : [ "Third Party Advisory" ]
  40137. }, {
  40138. "url" : "https://github.com/rmccue/Requests/pull/421",
  40139. "name" : "https://github.com/rmccue/Requests/pull/421",
  40140. "refsource" : "MISC",
  40141. "tags" : [ "Patch", "Third Party Advisory" ]
  40142. } ]
  40143. },
  40144. "description" : {
  40145. "description_data" : [ {
  40146. "lang" : "en",
  40147. "value" : "Requests is a HTTP library written in PHP. Requests mishandles deserialization in FilteredIterator. The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0."
  40148. } ]
  40149. }
  40150. },
  40151. "configurations" : {
  40152. "CVE_data_version" : "4.0",
  40153. "nodes" : [ {
  40154. "operator" : "OR",
  40155. "children" : [ ],
  40156. "cpe_match" : [ {
  40157. "vulnerable" : true,
  40158. "cpe23Uri" : "cpe:2.3:a:wordpress:requests:1.6.0:*:*:*:*:*:*:*",
  40159. "cpe_name" : [ ]
  40160. }, {
  40161. "vulnerable" : true,
  40162. "cpe23Uri" : "cpe:2.3:a:wordpress:requests:1.6.1:*:*:*:*:*:*:*",
  40163. "cpe_name" : [ ]
  40164. }, {
  40165. "vulnerable" : true,
  40166. "cpe23Uri" : "cpe:2.3:a:wordpress:requests:1.7.0:*:*:*:*:*:*:*",
  40167. "cpe_name" : [ ]
  40168. } ]
  40169. } ]
  40170. },
  40171. "impact" : {
  40172. "baseMetricV3" : {
  40173. "cvssV3" : {
  40174. "version" : "3.1",
  40175. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  40176. "attackVector" : "NETWORK",
  40177. "attackComplexity" : "LOW",
  40178. "privilegesRequired" : "NONE",
  40179. "userInteraction" : "NONE",
  40180. "scope" : "UNCHANGED",
  40181. "confidentialityImpact" : "HIGH",
  40182. "integrityImpact" : "HIGH",
  40183. "availabilityImpact" : "HIGH",
  40184. "baseScore" : 9.8,
  40185. "baseSeverity" : "CRITICAL"
  40186. },
  40187. "exploitabilityScore" : 3.9,
  40188. "impactScore" : 5.9
  40189. },
  40190. "baseMetricV2" : {
  40191. "cvssV2" : {
  40192. "version" : "2.0",
  40193. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  40194. "accessVector" : "NETWORK",
  40195. "accessComplexity" : "LOW",
  40196. "authentication" : "NONE",
  40197. "confidentialityImpact" : "PARTIAL",
  40198. "integrityImpact" : "PARTIAL",
  40199. "availabilityImpact" : "PARTIAL",
  40200. "baseScore" : 7.5
  40201. },
  40202. "severity" : "HIGH",
  40203. "exploitabilityScore" : 10.0,
  40204. "impactScore" : 6.4,
  40205. "acInsufInfo" : false,
  40206. "obtainAllPrivilege" : false,
  40207. "obtainUserPrivilege" : false,
  40208. "obtainOtherPrivilege" : false,
  40209. "userInteractionRequired" : false
  40210. }
  40211. },
  40212. "publishedDate" : "2021-04-27T21:15Z",
  40213. "lastModifiedDate" : "2021-05-07T03:06Z"
  40214. }, {
  40215. "cve" : {
  40216. "data_type" : "CVE",
  40217. "data_format" : "MITRE",
  40218. "data_version" : "4.0",
  40219. "CVE_data_meta" : {
  40220. "ID" : "CVE-2021-29472",
  40221. "ASSIGNER" : "security-advisories@github.com"
  40222. },
  40223. "problemtype" : {
  40224. "problemtype_data" : [ {
  40225. "description" : [ {
  40226. "lang" : "en",
  40227. "value" : "CWE-94"
  40228. }, {
  40229. "lang" : "en",
  40230. "value" : "CWE-88"
  40231. } ]
  40232. } ]
  40233. },
  40234. "references" : {
  40235. "reference_data" : [ {
  40236. "url" : "https://getcomposer.org/",
  40237. "name" : "https://getcomposer.org/",
  40238. "refsource" : "MISC",
  40239. "tags" : [ "Vendor Advisory" ]
  40240. }, {
  40241. "url" : "https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx",
  40242. "name" : "https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx",
  40243. "refsource" : "CONFIRM",
  40244. "tags" : [ "Third Party Advisory" ]
  40245. }, {
  40246. "url" : "https://www.debian.org/security/2021/dsa-4907",
  40247. "name" : "DSA-4907",
  40248. "refsource" : "DEBIAN",
  40249. "tags" : [ "Third Party Advisory" ]
  40250. } ]
  40251. },
  40252. "description" : {
  40253. "description_data" : [ {
  40254. "lang" : "en",
  40255. "value" : "Composer is a dependency manager for PHP. URLs for Mercurial repositories in the root composer.json and package source download URLs are not sanitized correctly. Specifically crafted URL values allow code to be executed in the HgDriver if hg/Mercurial is installed on the system. The impact to Composer users directly is limited as the composer.json file is typically under their own control and source download URLs can only be supplied by third party Composer repositories they explicitly trust to download and execute source code from, e.g. Composer plugins. The main impact is to services passing user input to Composer, including Packagist.org and Private Packagist. This allowed users to trigger remote code execution. The vulnerability has been patched on Packagist.org and Private Packagist within 12h of receiving the initial vulnerability report and based on a review of logs, to the best of our knowledge, was not abused by anyone. Other services/tools using VcsRepository/VcsDriver or derivatives may also be vulnerable and should upgrade their composer/composer dependency immediately. Versions 1.10.22 and 2.0.13 include patches for this issue."
  40256. } ]
  40257. }
  40258. },
  40259. "configurations" : {
  40260. "CVE_data_version" : "4.0",
  40261. "nodes" : [ {
  40262. "operator" : "OR",
  40263. "children" : [ ],
  40264. "cpe_match" : [ {
  40265. "vulnerable" : true,
  40266. "cpe23Uri" : "cpe:2.3:a:getcomposer:composer:*:*:*:*:*:*:*:*",
  40267. "versionEndExcluding" : "1.10.22",
  40268. "cpe_name" : [ ]
  40269. }, {
  40270. "vulnerable" : true,
  40271. "cpe23Uri" : "cpe:2.3:a:getcomposer:composer:*:*:*:*:*:*:*:*",
  40272. "versionStartIncluding" : "2.0",
  40273. "versionEndExcluding" : "2.0.13",
  40274. "cpe_name" : [ ]
  40275. } ]
  40276. }, {
  40277. "operator" : "OR",
  40278. "children" : [ ],
  40279. "cpe_match" : [ {
  40280. "vulnerable" : true,
  40281. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  40282. "cpe_name" : [ ]
  40283. } ]
  40284. } ]
  40285. },
  40286. "impact" : {
  40287. "baseMetricV3" : {
  40288. "cvssV3" : {
  40289. "version" : "3.1",
  40290. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  40291. "attackVector" : "NETWORK",
  40292. "attackComplexity" : "LOW",
  40293. "privilegesRequired" : "LOW",
  40294. "userInteraction" : "NONE",
  40295. "scope" : "UNCHANGED",
  40296. "confidentialityImpact" : "HIGH",
  40297. "integrityImpact" : "HIGH",
  40298. "availabilityImpact" : "HIGH",
  40299. "baseScore" : 8.8,
  40300. "baseSeverity" : "HIGH"
  40301. },
  40302. "exploitabilityScore" : 2.8,
  40303. "impactScore" : 5.9
  40304. },
  40305. "baseMetricV2" : {
  40306. "cvssV2" : {
  40307. "version" : "2.0",
  40308. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  40309. "accessVector" : "NETWORK",
  40310. "accessComplexity" : "LOW",
  40311. "authentication" : "SINGLE",
  40312. "confidentialityImpact" : "PARTIAL",
  40313. "integrityImpact" : "PARTIAL",
  40314. "availabilityImpact" : "PARTIAL",
  40315. "baseScore" : 6.5
  40316. },
  40317. "severity" : "MEDIUM",
  40318. "exploitabilityScore" : 8.0,
  40319. "impactScore" : 6.4,
  40320. "acInsufInfo" : false,
  40321. "obtainAllPrivilege" : false,
  40322. "obtainUserPrivilege" : false,
  40323. "obtainOtherPrivilege" : false,
  40324. "userInteractionRequired" : false
  40325. }
  40326. },
  40327. "publishedDate" : "2021-04-27T21:15Z",
  40328. "lastModifiedDate" : "2021-05-07T22:19Z"
  40329. }, {
  40330. "cve" : {
  40331. "data_type" : "CVE",
  40332. "data_format" : "MITRE",
  40333. "data_version" : "4.0",
  40334. "CVE_data_meta" : {
  40335. "ID" : "CVE-2021-29442",
  40336. "ASSIGNER" : "security-advisories@github.com"
  40337. },
  40338. "problemtype" : {
  40339. "problemtype_data" : [ {
  40340. "description" : [ {
  40341. "lang" : "en",
  40342. "value" : "CWE-306"
  40343. } ]
  40344. } ]
  40345. },
  40346. "references" : {
  40347. "reference_data" : [ {
  40348. "url" : "https://github.com/alibaba/nacos/issues/4463",
  40349. "name" : "https://github.com/alibaba/nacos/issues/4463",
  40350. "refsource" : "MISC",
  40351. "tags" : [ "Exploit", "Third Party Advisory" ]
  40352. }, {
  40353. "url" : "https://github.com/alibaba/nacos/pull/4517",
  40354. "name" : "https://github.com/alibaba/nacos/pull/4517",
  40355. "refsource" : "MISC",
  40356. "tags" : [ "Patch", "Third Party Advisory" ]
  40357. }, {
  40358. "url" : "https://github.com/advisories/GHSA-36hp-jr8h-556f",
  40359. "name" : "https://github.com/advisories/GHSA-36hp-jr8h-556f",
  40360. "refsource" : "CONFIRM",
  40361. "tags" : [ "Exploit", "Third Party Advisory" ]
  40362. } ]
  40363. },
  40364. "description" : {
  40365. "description_data" : [ {
  40366. "lang" : "en",
  40367. "value" : "Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, the ConfigOpsController lets the user perform management operations like querying the database or even wiping it out. While the /data/remove endpoint is properly protected with the @Secured annotation, the /derby endpoint is not protected and can be openly accessed by unauthenticated users. These endpoints are only valid when using embedded storage (derby DB) so this issue should not affect those installations using external storage (e.g. mysql)"
  40368. } ]
  40369. }
  40370. },
  40371. "configurations" : {
  40372. "CVE_data_version" : "4.0",
  40373. "nodes" : [ {
  40374. "operator" : "OR",
  40375. "children" : [ ],
  40376. "cpe_match" : [ {
  40377. "vulnerable" : true,
  40378. "cpe23Uri" : "cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*",
  40379. "versionEndExcluding" : "1.4.1",
  40380. "cpe_name" : [ ]
  40381. } ]
  40382. } ]
  40383. },
  40384. "impact" : {
  40385. "baseMetricV3" : {
  40386. "cvssV3" : {
  40387. "version" : "3.1",
  40388. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  40389. "attackVector" : "NETWORK",
  40390. "attackComplexity" : "LOW",
  40391. "privilegesRequired" : "NONE",
  40392. "userInteraction" : "NONE",
  40393. "scope" : "UNCHANGED",
  40394. "confidentialityImpact" : "HIGH",
  40395. "integrityImpact" : "NONE",
  40396. "availabilityImpact" : "NONE",
  40397. "baseScore" : 7.5,
  40398. "baseSeverity" : "HIGH"
  40399. },
  40400. "exploitabilityScore" : 3.9,
  40401. "impactScore" : 3.6
  40402. },
  40403. "baseMetricV2" : {
  40404. "cvssV2" : {
  40405. "version" : "2.0",
  40406. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  40407. "accessVector" : "NETWORK",
  40408. "accessComplexity" : "LOW",
  40409. "authentication" : "NONE",
  40410. "confidentialityImpact" : "PARTIAL",
  40411. "integrityImpact" : "NONE",
  40412. "availabilityImpact" : "NONE",
  40413. "baseScore" : 5.0
  40414. },
  40415. "severity" : "MEDIUM",
  40416. "exploitabilityScore" : 10.0,
  40417. "impactScore" : 2.9,
  40418. "acInsufInfo" : false,
  40419. "obtainAllPrivilege" : false,
  40420. "obtainUserPrivilege" : false,
  40421. "obtainOtherPrivilege" : false,
  40422. "userInteractionRequired" : false
  40423. }
  40424. },
  40425. "publishedDate" : "2021-04-27T21:15Z",
  40426. "lastModifiedDate" : "2021-05-07T15:37Z"
  40427. }, {
  40428. "cve" : {
  40429. "data_type" : "CVE",
  40430. "data_format" : "MITRE",
  40431. "data_version" : "4.0",
  40432. "CVE_data_meta" : {
  40433. "ID" : "CVE-2021-29441",
  40434. "ASSIGNER" : "security-advisories@github.com"
  40435. },
  40436. "problemtype" : {
  40437. "problemtype_data" : [ {
  40438. "description" : [ {
  40439. "lang" : "en",
  40440. "value" : "CWE-290"
  40441. } ]
  40442. } ]
  40443. },
  40444. "references" : {
  40445. "reference_data" : [ {
  40446. "url" : "https://github.com/alibaba/nacos/issues/4701",
  40447. "name" : "https://github.com/alibaba/nacos/issues/4701",
  40448. "refsource" : "MISC",
  40449. "tags" : [ "Exploit", "Third Party Advisory" ]
  40450. }, {
  40451. "url" : "https://github.com/advisories/GHSA-36hp-jr8h-556f",
  40452. "name" : "https://github.com/advisories/GHSA-36hp-jr8h-556f",
  40453. "refsource" : "CONFIRM",
  40454. "tags" : [ "Exploit", "Third Party Advisory" ]
  40455. }, {
  40456. "url" : "https://github.com/alibaba/nacos/pull/4703",
  40457. "name" : "https://github.com/alibaba/nacos/pull/4703",
  40458. "refsource" : "MISC",
  40459. "tags" : [ "Patch", "Third Party Advisory" ]
  40460. } ]
  40461. },
  40462. "description" : {
  40463. "description_data" : [ {
  40464. "lang" : "en",
  40465. "value" : "Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server."
  40466. } ]
  40467. }
  40468. },
  40469. "configurations" : {
  40470. "CVE_data_version" : "4.0",
  40471. "nodes" : [ {
  40472. "operator" : "OR",
  40473. "children" : [ ],
  40474. "cpe_match" : [ {
  40475. "vulnerable" : true,
  40476. "cpe23Uri" : "cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*",
  40477. "versionEndExcluding" : "1.4.1",
  40478. "cpe_name" : [ ]
  40479. } ]
  40480. } ]
  40481. },
  40482. "impact" : {
  40483. "baseMetricV3" : {
  40484. "cvssV3" : {
  40485. "version" : "3.1",
  40486. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  40487. "attackVector" : "NETWORK",
  40488. "attackComplexity" : "LOW",
  40489. "privilegesRequired" : "NONE",
  40490. "userInteraction" : "NONE",
  40491. "scope" : "UNCHANGED",
  40492. "confidentialityImpact" : "HIGH",
  40493. "integrityImpact" : "HIGH",
  40494. "availabilityImpact" : "HIGH",
  40495. "baseScore" : 9.8,
  40496. "baseSeverity" : "CRITICAL"
  40497. },
  40498. "exploitabilityScore" : 3.9,
  40499. "impactScore" : 5.9
  40500. },
  40501. "baseMetricV2" : {
  40502. "cvssV2" : {
  40503. "version" : "2.0",
  40504. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  40505. "accessVector" : "NETWORK",
  40506. "accessComplexity" : "LOW",
  40507. "authentication" : "NONE",
  40508. "confidentialityImpact" : "PARTIAL",
  40509. "integrityImpact" : "PARTIAL",
  40510. "availabilityImpact" : "PARTIAL",
  40511. "baseScore" : 7.5
  40512. },
  40513. "severity" : "HIGH",
  40514. "exploitabilityScore" : 10.0,
  40515. "impactScore" : 6.4,
  40516. "acInsufInfo" : false,
  40517. "obtainAllPrivilege" : false,
  40518. "obtainUserPrivilege" : false,
  40519. "obtainOtherPrivilege" : false,
  40520. "userInteractionRequired" : false
  40521. }
  40522. },
  40523. "publishedDate" : "2021-04-27T21:15Z",
  40524. "lastModifiedDate" : "2021-05-07T23:09Z"
  40525. }, {
  40526. "cve" : {
  40527. "data_type" : "CVE",
  40528. "data_format" : "MITRE",
  40529. "data_version" : "4.0",
  40530. "CVE_data_meta" : {
  40531. "ID" : "CVE-2021-30128",
  40532. "ASSIGNER" : "security@apache.org"
  40533. },
  40534. "problemtype" : {
  40535. "problemtype_data" : [ {
  40536. "description" : [ {
  40537. "lang" : "en",
  40538. "value" : "CWE-502"
  40539. } ]
  40540. } ]
  40541. },
  40542. "references" : {
  40543. "reference_data" : [ {
  40544. "url" : "https://lists.apache.org/thread.html/rb3f5cd65f3ddce9b9eb4d6ea6e2919933f0f89b15953769d11003743%40%3Cdev.ofbiz.apache.org%3E",
  40545. "name" : "https://lists.apache.org/thread.html/rb3f5cd65f3ddce9b9eb4d6ea6e2919933f0f89b15953769d11003743%40%3Cdev.ofbiz.apache.org%3E",
  40546. "refsource" : "MISC",
  40547. "tags" : [ "Mailing List", "Mitigation", "Vendor Advisory" ]
  40548. }, {
  40549. "url" : "https://lists.apache.org/thread.html/rb3f5cd65f3ddce9b9eb4d6ea6e2919933f0f89b15953769d11003743@%3Cdev.ofbiz.apache.org%3E",
  40550. "name" : "[ofbiz-dev] 20210427 [CVE-2021-30128] Unsafe deserialization in OFBiz",
  40551. "refsource" : "MLIST",
  40552. "tags" : [ "Mailing List", "Mitigation", "Vendor Advisory" ]
  40553. }, {
  40554. "url" : "https://lists.apache.org/thread.html/rbe512e5ccd6b11169c6379daa1234bc805f3d53c5a38224e956295ce@%3Cnotifications.ofbiz.apache.org%3E",
  40555. "name" : "[ofbiz-notifications] 20210427 [jira] [Updated] (OFBIZ-12212) Comment out the SOAP and HTTP engines - Fix [CVE-2021-30128]",
  40556. "refsource" : "MLIST",
  40557. "tags" : [ "Mailing List", "Vendor Advisory" ]
  40558. }, {
  40559. "url" : "https://lists.apache.org/thread.html/rb82f41de3c44bb644632531f79649046ca76afeab25a2bdb9991ab84@%3Cnotifications.ofbiz.apache.org%3E",
  40560. "name" : "[ofbiz-notifications] 20210427 [jira] [Updated] (OFBIZ-12221) Fixed ObjectInputStream denyList [CVE-2021-30128]",
  40561. "refsource" : "MLIST",
  40562. "tags" : [ "Mailing List", "Vendor Advisory" ]
  40563. }, {
  40564. "url" : "https://lists.apache.org/thread.html/rb3f5cd65f3ddce9b9eb4d6ea6e2919933f0f89b15953769d11003743@%3Cuser.ofbiz.apache.org%3E",
  40565. "name" : "[ofbiz-user] 20210427 [CVE-2021-30128] Unsafe deserialization in OFBiz",
  40566. "refsource" : "MLIST",
  40567. "tags" : [ "Mailing List", "Mitigation", "Vendor Advisory" ]
  40568. }, {
  40569. "url" : "http://www.openwall.com/lists/oss-security/2021/04/27/5",
  40570. "name" : "[oss-security] 20210427 [CVE-2021-30128] Unsafe deserialization in OFBiz",
  40571. "refsource" : "MLIST",
  40572. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  40573. }, {
  40574. "url" : "https://lists.apache.org/thread.html/r108a964764b8bd21ebd32ccd4f51c183ee80a251c105b849154a8e9d@%3Ccommits.ofbiz.apache.org%3E",
  40575. "name" : "[ofbiz-commits] 20210427 [ofbiz-site] branch master updated: Updates security page for CVE-2021-29200 and 30128 fixed in 17.12.07",
  40576. "refsource" : "MLIST",
  40577. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  40578. }, {
  40579. "url" : "https://lists.apache.org/thread.html/rb3f5cd65f3ddce9b9eb4d6ea6e2919933f0f89b15953769d11003743@%3Cannounce.apache.org%3E",
  40580. "name" : "[announce] 20210427 [CVE-2021-30128] Unsafe deserialization in OFBiz",
  40581. "refsource" : "MLIST",
  40582. "tags" : [ "Mailing List", "Mitigation", "Vendor Advisory" ]
  40583. } ]
  40584. },
  40585. "description" : {
  40586. "description_data" : [ {
  40587. "lang" : "en",
  40588. "value" : "Apache OFBiz has unsafe deserialization prior to 17.12.07 version"
  40589. } ]
  40590. }
  40591. },
  40592. "configurations" : {
  40593. "CVE_data_version" : "4.0",
  40594. "nodes" : [ {
  40595. "operator" : "OR",
  40596. "children" : [ ],
  40597. "cpe_match" : [ {
  40598. "vulnerable" : true,
  40599. "cpe23Uri" : "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*",
  40600. "versionEndExcluding" : "17.12.07",
  40601. "cpe_name" : [ ]
  40602. } ]
  40603. } ]
  40604. },
  40605. "impact" : {
  40606. "baseMetricV3" : {
  40607. "cvssV3" : {
  40608. "version" : "3.1",
  40609. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  40610. "attackVector" : "NETWORK",
  40611. "attackComplexity" : "LOW",
  40612. "privilegesRequired" : "NONE",
  40613. "userInteraction" : "NONE",
  40614. "scope" : "UNCHANGED",
  40615. "confidentialityImpact" : "HIGH",
  40616. "integrityImpact" : "HIGH",
  40617. "availabilityImpact" : "HIGH",
  40618. "baseScore" : 9.8,
  40619. "baseSeverity" : "CRITICAL"
  40620. },
  40621. "exploitabilityScore" : 3.9,
  40622. "impactScore" : 5.9
  40623. },
  40624. "baseMetricV2" : {
  40625. "cvssV2" : {
  40626. "version" : "2.0",
  40627. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  40628. "accessVector" : "NETWORK",
  40629. "accessComplexity" : "LOW",
  40630. "authentication" : "NONE",
  40631. "confidentialityImpact" : "COMPLETE",
  40632. "integrityImpact" : "COMPLETE",
  40633. "availabilityImpact" : "COMPLETE",
  40634. "baseScore" : 10.0
  40635. },
  40636. "severity" : "HIGH",
  40637. "exploitabilityScore" : 10.0,
  40638. "impactScore" : 10.0,
  40639. "acInsufInfo" : false,
  40640. "obtainAllPrivilege" : false,
  40641. "obtainUserPrivilege" : false,
  40642. "obtainOtherPrivilege" : false,
  40643. "userInteractionRequired" : false
  40644. }
  40645. },
  40646. "publishedDate" : "2021-04-27T20:15Z",
  40647. "lastModifiedDate" : "2021-05-07T15:00Z"
  40648. }, {
  40649. "cve" : {
  40650. "data_type" : "CVE",
  40651. "data_format" : "MITRE",
  40652. "data_version" : "4.0",
  40653. "CVE_data_meta" : {
  40654. "ID" : "CVE-2021-29460",
  40655. "ASSIGNER" : "security-advisories@github.com"
  40656. },
  40657. "problemtype" : {
  40658. "problemtype_data" : [ {
  40659. "description" : [ {
  40660. "lang" : "en",
  40661. "value" : "CWE-79"
  40662. } ]
  40663. } ]
  40664. },
  40665. "references" : {
  40666. "reference_data" : [ {
  40667. "url" : "https://github.com/getkirby/kirby/security/advisories/GHSA-qgp4-5qx6-548g",
  40668. "name" : "https://github.com/getkirby/kirby/security/advisories/GHSA-qgp4-5qx6-548g",
  40669. "refsource" : "CONFIRM",
  40670. "tags" : [ "Exploit", "Third Party Advisory" ]
  40671. }, {
  40672. "url" : "https://github.com/getkirby/kirby/releases/tag/3.5.4",
  40673. "name" : "https://github.com/getkirby/kirby/releases/tag/3.5.4",
  40674. "refsource" : "MISC",
  40675. "tags" : [ "Release Notes", "Third Party Advisory" ]
  40676. }, {
  40677. "url" : "http://packetstormsecurity.com/files/162359/Kirby-CMS-3.5.3.1-Cross-Site-Scripting.html",
  40678. "name" : "http://packetstormsecurity.com/files/162359/Kirby-CMS-3.5.3.1-Cross-Site-Scripting.html",
  40679. "refsource" : "MISC",
  40680. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  40681. } ]
  40682. },
  40683. "description" : {
  40684. "description_data" : [ {
  40685. "lang" : "en",
  40686. "value" : "Kirby is an open source CMS. An editor with write access to the Kirby Panel can upload an SVG file that contains harmful content like `<script>` tags. The direct link to that file can be sent to other users or visitors of the site. If the victim opens that link in a browser where they are logged in to Kirby, the script will run and can for example trigger requests to Kirby's API with the permissions of the victim. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. Visitors without Panel access can only use this attack vector if your site allows SVG file uploads in frontend forms and you don't already sanitize uploaded SVG files. The problem has been patched in Kirby 3.5.4. Please update to this or a later version to fix the vulnerability. Frontend upload forms need to be patched separately depending on how they store the uploaded file(s). If you use `File::create()`, you are protected by updating to 3.5.4+. As a work around you can disable the upload of SVG files in your file blueprints."
  40687. } ]
  40688. }
  40689. },
  40690. "configurations" : {
  40691. "CVE_data_version" : "4.0",
  40692. "nodes" : [ {
  40693. "operator" : "OR",
  40694. "children" : [ ],
  40695. "cpe_match" : [ {
  40696. "vulnerable" : true,
  40697. "cpe23Uri" : "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
  40698. "versionEndExcluding" : "3.5.4",
  40699. "cpe_name" : [ ]
  40700. } ]
  40701. } ]
  40702. },
  40703. "impact" : {
  40704. "baseMetricV3" : {
  40705. "cvssV3" : {
  40706. "version" : "3.1",
  40707. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  40708. "attackVector" : "NETWORK",
  40709. "attackComplexity" : "LOW",
  40710. "privilegesRequired" : "LOW",
  40711. "userInteraction" : "REQUIRED",
  40712. "scope" : "CHANGED",
  40713. "confidentialityImpact" : "LOW",
  40714. "integrityImpact" : "LOW",
  40715. "availabilityImpact" : "NONE",
  40716. "baseScore" : 5.4,
  40717. "baseSeverity" : "MEDIUM"
  40718. },
  40719. "exploitabilityScore" : 2.3,
  40720. "impactScore" : 2.7
  40721. },
  40722. "baseMetricV2" : {
  40723. "cvssV2" : {
  40724. "version" : "2.0",
  40725. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  40726. "accessVector" : "NETWORK",
  40727. "accessComplexity" : "MEDIUM",
  40728. "authentication" : "SINGLE",
  40729. "confidentialityImpact" : "NONE",
  40730. "integrityImpact" : "PARTIAL",
  40731. "availabilityImpact" : "NONE",
  40732. "baseScore" : 3.5
  40733. },
  40734. "severity" : "LOW",
  40735. "exploitabilityScore" : 6.8,
  40736. "impactScore" : 2.9,
  40737. "acInsufInfo" : false,
  40738. "obtainAllPrivilege" : false,
  40739. "obtainUserPrivilege" : false,
  40740. "obtainOtherPrivilege" : false,
  40741. "userInteractionRequired" : true
  40742. }
  40743. },
  40744. "publishedDate" : "2021-04-27T20:15Z",
  40745. "lastModifiedDate" : "2021-05-07T22:46Z"
  40746. }, {
  40747. "cve" : {
  40748. "data_type" : "CVE",
  40749. "data_format" : "MITRE",
  40750. "data_version" : "4.0",
  40751. "CVE_data_meta" : {
  40752. "ID" : "CVE-2021-29200",
  40753. "ASSIGNER" : "security@apache.org"
  40754. },
  40755. "problemtype" : {
  40756. "problemtype_data" : [ {
  40757. "description" : [ {
  40758. "lang" : "en",
  40759. "value" : "CWE-502"
  40760. } ]
  40761. } ]
  40762. },
  40763. "references" : {
  40764. "reference_data" : [ {
  40765. "url" : "https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cdev.ofbiz.apache.org%3E",
  40766. "name" : "https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cdev.ofbiz.apache.org%3E",
  40767. "refsource" : "MISC",
  40768. "tags" : [ "Mailing List", "Vendor Advisory" ]
  40769. }, {
  40770. "url" : "https://lists.apache.org/thread.html/r708351f1a8af7adb887cc3d8a92bed8fcbff4a9e495e69a9ee546fda@%3Cnotifications.ofbiz.apache.org%3E",
  40771. "name" : "[ofbiz-notifications] 20210427 [jira] [Updated] (OFBIZ-12216) Fixed UtilObject class [CVE-2021-29200]",
  40772. "refsource" : "MLIST",
  40773. "tags" : [ "Mailing List", "Vendor Advisory" ]
  40774. }, {
  40775. "url" : "https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097@%3Cuser.ofbiz.apache.org%3E",
  40776. "name" : "[ofbiz-user] 20210427 [CVE-2021-29200] RCE vulnerability in latest Apache OFBiz due to Java serialisation using RMI",
  40777. "refsource" : "MLIST",
  40778. "tags" : [ "Mailing List", "Vendor Advisory" ]
  40779. }, {
  40780. "url" : "http://www.openwall.com/lists/oss-security/2021/04/27/4",
  40781. "name" : "[oss-security] 20210427 [CVE-2021-29200] RCE vulnerability in latest Apache OFBiz due to Java serialisation using RMI",
  40782. "refsource" : "MLIST",
  40783. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  40784. }, {
  40785. "url" : "https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097@%3Cdev.ofbiz.apache.org%3E",
  40786. "name" : "[ofbiz-dev] 20210427 [CVE-2021-29200] RCE vulnerability in latest Apache OFBiz due to Java serialisation using RMI",
  40787. "refsource" : "MLIST",
  40788. "tags" : [ "Mailing List", "Vendor Advisory" ]
  40789. }, {
  40790. "url" : "https://lists.apache.org/thread.html/r108a964764b8bd21ebd32ccd4f51c183ee80a251c105b849154a8e9d@%3Ccommits.ofbiz.apache.org%3E",
  40791. "name" : "[ofbiz-commits] 20210427 [ofbiz-site] branch master updated: Updates security page for CVE-2021-29200 and 30128 fixed in 17.12.07",
  40792. "refsource" : "MLIST",
  40793. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  40794. }, {
  40795. "url" : "https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097@%3Cannounce.apache.org%3E",
  40796. "name" : "[announce] 20210427 [CVE-2021-29200] RCE vulnerability in latest Apache OFBiz due to Java serialisation using RMI",
  40797. "refsource" : "MLIST",
  40798. "tags" : [ "Mailing List", "Vendor Advisory" ]
  40799. } ]
  40800. },
  40801. "description" : {
  40802. "description_data" : [ {
  40803. "lang" : "en",
  40804. "value" : "Apache OFBiz has unsafe deserialization prior to 17.12.07 version An unauthenticated user can perform an RCE attack"
  40805. } ]
  40806. }
  40807. },
  40808. "configurations" : {
  40809. "CVE_data_version" : "4.0",
  40810. "nodes" : [ {
  40811. "operator" : "OR",
  40812. "children" : [ ],
  40813. "cpe_match" : [ {
  40814. "vulnerable" : true,
  40815. "cpe23Uri" : "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*",
  40816. "versionEndExcluding" : "17.12.07",
  40817. "cpe_name" : [ ]
  40818. } ]
  40819. } ]
  40820. },
  40821. "impact" : {
  40822. "baseMetricV3" : {
  40823. "cvssV3" : {
  40824. "version" : "3.1",
  40825. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  40826. "attackVector" : "NETWORK",
  40827. "attackComplexity" : "LOW",
  40828. "privilegesRequired" : "NONE",
  40829. "userInteraction" : "NONE",
  40830. "scope" : "UNCHANGED",
  40831. "confidentialityImpact" : "HIGH",
  40832. "integrityImpact" : "HIGH",
  40833. "availabilityImpact" : "HIGH",
  40834. "baseScore" : 9.8,
  40835. "baseSeverity" : "CRITICAL"
  40836. },
  40837. "exploitabilityScore" : 3.9,
  40838. "impactScore" : 5.9
  40839. },
  40840. "baseMetricV2" : {
  40841. "cvssV2" : {
  40842. "version" : "2.0",
  40843. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  40844. "accessVector" : "NETWORK",
  40845. "accessComplexity" : "LOW",
  40846. "authentication" : "NONE",
  40847. "confidentialityImpact" : "PARTIAL",
  40848. "integrityImpact" : "PARTIAL",
  40849. "availabilityImpact" : "PARTIAL",
  40850. "baseScore" : 7.5
  40851. },
  40852. "severity" : "HIGH",
  40853. "exploitabilityScore" : 10.0,
  40854. "impactScore" : 6.4,
  40855. "acInsufInfo" : false,
  40856. "obtainAllPrivilege" : false,
  40857. "obtainUserPrivilege" : false,
  40858. "obtainOtherPrivilege" : false,
  40859. "userInteractionRequired" : false
  40860. }
  40861. },
  40862. "publishedDate" : "2021-04-27T20:15Z",
  40863. "lastModifiedDate" : "2021-05-06T21:16Z"
  40864. }, {
  40865. "cve" : {
  40866. "data_type" : "CVE",
  40867. "data_format" : "MITRE",
  40868. "data_version" : "4.0",
  40869. "CVE_data_meta" : {
  40870. "ID" : "CVE-2021-21429",
  40871. "ASSIGNER" : "security-advisories@github.com"
  40872. },
  40873. "problemtype" : {
  40874. "problemtype_data" : [ {
  40875. "description" : [ {
  40876. "lang" : "en",
  40877. "value" : "CWE-552"
  40878. } ]
  40879. } ]
  40880. },
  40881. "references" : {
  40882. "reference_data" : [ {
  40883. "url" : "https://github.com/OpenAPITools/openapi-generator/pull/8795",
  40884. "name" : "https://github.com/OpenAPITools/openapi-generator/pull/8795",
  40885. "refsource" : "MISC",
  40886. "tags" : [ "Patch", "Third Party Advisory" ]
  40887. }, {
  40888. "url" : "https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-867q-77cc-98mv",
  40889. "name" : "https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-867q-77cc-98mv",
  40890. "refsource" : "CONFIRM",
  40891. "tags" : [ "Patch", "Third Party Advisory" ]
  40892. } ]
  40893. },
  40894. "description" : {
  40895. "description_data" : [ {
  40896. "lang" : "en",
  40897. "value" : "OpenAPI Generator allows generation of API client libraries, server stubs, documentation and configuration automatically given an OpenAPI Spec. Using `File.createTempFile` in JDK will result in creating and using insecure temporary files that can leave application and system data vulnerable to attacks. OpenAPI Generator maven plug-in creates insecure temporary files during the process. The issue has been patched with `Files.createTempFile` and released in the v5.1.0 stable version."
  40898. } ]
  40899. }
  40900. },
  40901. "configurations" : {
  40902. "CVE_data_version" : "4.0",
  40903. "nodes" : [ {
  40904. "operator" : "OR",
  40905. "children" : [ ],
  40906. "cpe_match" : [ {
  40907. "vulnerable" : true,
  40908. "cpe23Uri" : "cpe:2.3:a:openapi-generator:openapi_generator:*:*:*:*:*:*:*:*",
  40909. "versionEndExcluding" : "5.1.0",
  40910. "cpe_name" : [ ]
  40911. } ]
  40912. } ]
  40913. },
  40914. "impact" : {
  40915. "baseMetricV3" : {
  40916. "cvssV3" : {
  40917. "version" : "3.1",
  40918. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
  40919. "attackVector" : "LOCAL",
  40920. "attackComplexity" : "LOW",
  40921. "privilegesRequired" : "LOW",
  40922. "userInteraction" : "NONE",
  40923. "scope" : "UNCHANGED",
  40924. "confidentialityImpact" : "LOW",
  40925. "integrityImpact" : "NONE",
  40926. "availabilityImpact" : "NONE",
  40927. "baseScore" : 3.3,
  40928. "baseSeverity" : "LOW"
  40929. },
  40930. "exploitabilityScore" : 1.8,
  40931. "impactScore" : 1.4
  40932. },
  40933. "baseMetricV2" : {
  40934. "cvssV2" : {
  40935. "version" : "2.0",
  40936. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  40937. "accessVector" : "LOCAL",
  40938. "accessComplexity" : "LOW",
  40939. "authentication" : "NONE",
  40940. "confidentialityImpact" : "PARTIAL",
  40941. "integrityImpact" : "NONE",
  40942. "availabilityImpact" : "NONE",
  40943. "baseScore" : 2.1
  40944. },
  40945. "severity" : "LOW",
  40946. "exploitabilityScore" : 3.9,
  40947. "impactScore" : 2.9,
  40948. "acInsufInfo" : false,
  40949. "obtainAllPrivilege" : false,
  40950. "obtainUserPrivilege" : false,
  40951. "obtainOtherPrivilege" : false,
  40952. "userInteractionRequired" : false
  40953. }
  40954. },
  40955. "publishedDate" : "2021-04-27T20:15Z",
  40956. "lastModifiedDate" : "2021-05-07T20:17Z"
  40957. }, {
  40958. "cve" : {
  40959. "data_type" : "CVE",
  40960. "data_format" : "MITRE",
  40961. "data_version" : "4.0",
  40962. "CVE_data_meta" : {
  40963. "ID" : "CVE-2021-21365",
  40964. "ASSIGNER" : "security-advisories@github.com"
  40965. },
  40966. "problemtype" : {
  40967. "problemtype_data" : [ {
  40968. "description" : [ {
  40969. "lang" : "en",
  40970. "value" : "CWE-79"
  40971. } ]
  40972. } ]
  40973. },
  40974. "references" : {
  40975. "reference_data" : [ {
  40976. "url" : "https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b",
  40977. "name" : "https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b",
  40978. "refsource" : "MISC",
  40979. "tags" : [ "Patch", "Third Party Advisory" ]
  40980. }, {
  40981. "url" : "https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx",
  40982. "name" : "https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx",
  40983. "refsource" : "CONFIRM",
  40984. "tags" : [ "Exploit", "Third Party Advisory" ]
  40985. }, {
  40986. "url" : "https://typo3.org/security/advisory/typo3-ext-sa-2021-007",
  40987. "name" : "https://typo3.org/security/advisory/typo3-ext-sa-2021-007",
  40988. "refsource" : "MISC",
  40989. "tags" : [ "Exploit", "Patch", "Vendor Advisory" ]
  40990. } ]
  40991. },
  40992. "description" : {
  40993. "description_data" : [ {
  40994. "lang" : "en",
  40995. "value" : "Bootstrap Package is a theme for TYPO3. It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix. Update to version 7.1.2, 8.0.8, 9.1.4, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/."
  40996. } ]
  40997. }
  40998. },
  40999. "configurations" : {
  41000. "CVE_data_version" : "4.0",
  41001. "nodes" : [ {
  41002. "operator" : "OR",
  41003. "children" : [ ],
  41004. "cpe_match" : [ {
  41005. "vulnerable" : true,
  41006. "cpe23Uri" : "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
  41007. "versionEndExcluding" : "7.1.2",
  41008. "cpe_name" : [ ]
  41009. }, {
  41010. "vulnerable" : true,
  41011. "cpe23Uri" : "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
  41012. "versionStartIncluding" : "8.0.0",
  41013. "versionEndExcluding" : "8.0.8",
  41014. "cpe_name" : [ ]
  41015. }, {
  41016. "vulnerable" : true,
  41017. "cpe23Uri" : "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
  41018. "versionStartIncluding" : "9.0.0",
  41019. "versionEndExcluding" : "9.0.4",
  41020. "cpe_name" : [ ]
  41021. }, {
  41022. "vulnerable" : true,
  41023. "cpe23Uri" : "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
  41024. "versionStartIncluding" : "9.1.0",
  41025. "versionEndExcluding" : "9.1.3",
  41026. "cpe_name" : [ ]
  41027. }, {
  41028. "vulnerable" : true,
  41029. "cpe23Uri" : "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
  41030. "versionStartIncluding" : "10.0.0",
  41031. "versionEndExcluding" : "10.0.10",
  41032. "cpe_name" : [ ]
  41033. }, {
  41034. "vulnerable" : true,
  41035. "cpe23Uri" : "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
  41036. "versionStartIncluding" : "11.0.0",
  41037. "versionEndExcluding" : "11.0.3",
  41038. "cpe_name" : [ ]
  41039. } ]
  41040. } ]
  41041. },
  41042. "impact" : {
  41043. "baseMetricV3" : {
  41044. "cvssV3" : {
  41045. "version" : "3.1",
  41046. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  41047. "attackVector" : "NETWORK",
  41048. "attackComplexity" : "LOW",
  41049. "privilegesRequired" : "LOW",
  41050. "userInteraction" : "REQUIRED",
  41051. "scope" : "CHANGED",
  41052. "confidentialityImpact" : "LOW",
  41053. "integrityImpact" : "LOW",
  41054. "availabilityImpact" : "NONE",
  41055. "baseScore" : 5.4,
  41056. "baseSeverity" : "MEDIUM"
  41057. },
  41058. "exploitabilityScore" : 2.3,
  41059. "impactScore" : 2.7
  41060. },
  41061. "baseMetricV2" : {
  41062. "cvssV2" : {
  41063. "version" : "2.0",
  41064. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  41065. "accessVector" : "NETWORK",
  41066. "accessComplexity" : "MEDIUM",
  41067. "authentication" : "SINGLE",
  41068. "confidentialityImpact" : "NONE",
  41069. "integrityImpact" : "PARTIAL",
  41070. "availabilityImpact" : "NONE",
  41071. "baseScore" : 3.5
  41072. },
  41073. "severity" : "LOW",
  41074. "exploitabilityScore" : 6.8,
  41075. "impactScore" : 2.9,
  41076. "acInsufInfo" : false,
  41077. "obtainAllPrivilege" : false,
  41078. "obtainUserPrivilege" : false,
  41079. "obtainOtherPrivilege" : false,
  41080. "userInteractionRequired" : true
  41081. }
  41082. },
  41083. "publishedDate" : "2021-04-27T20:15Z",
  41084. "lastModifiedDate" : "2021-05-07T01:47Z"
  41085. }, {
  41086. "cve" : {
  41087. "data_type" : "CVE",
  41088. "data_format" : "MITRE",
  41089. "data_version" : "4.0",
  41090. "CVE_data_meta" : {
  41091. "ID" : "CVE-2021-30638",
  41092. "ASSIGNER" : "security@apache.org"
  41093. },
  41094. "problemtype" : {
  41095. "problemtype_data" : [ {
  41096. "description" : [ {
  41097. "lang" : "en",
  41098. "value" : "CWE-200"
  41099. } ]
  41100. } ]
  41101. },
  41102. "references" : {
  41103. "reference_data" : [ {
  41104. "url" : "https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb%40%3Cusers.tapestry.apache.org%3E",
  41105. "name" : "https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb%40%3Cusers.tapestry.apache.org%3E",
  41106. "refsource" : "MISC",
  41107. "tags" : [ "Mailing List", "Vendor Advisory" ]
  41108. }, {
  41109. "url" : "http://www.openwall.com/lists/oss-security/2021/04/27/3",
  41110. "name" : "[oss-security] 20210427 CVE-2021-30638: An Information Disclosure due to insufficient input validation exists in Apache Tapestry 5.4.0 and later",
  41111. "refsource" : "MLIST",
  41112. "tags" : [ "Mailing List", "Third Party Advisory" ]
  41113. }, {
  41114. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-491/",
  41115. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-491/",
  41116. "refsource" : "MISC",
  41117. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  41118. } ]
  41119. },
  41120. "description" : {
  41121. "description_data" : [ {
  41122. "lang" : "en",
  41123. "value" : "Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Apache Tapestry 5.7.0 version and Apache Tapestry 5.7.1."
  41124. } ]
  41125. }
  41126. },
  41127. "configurations" : {
  41128. "CVE_data_version" : "4.0",
  41129. "nodes" : [ {
  41130. "operator" : "OR",
  41131. "children" : [ ],
  41132. "cpe_match" : [ {
  41133. "vulnerable" : true,
  41134. "cpe23Uri" : "cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*",
  41135. "versionStartIncluding" : "5.4.0",
  41136. "versionEndExcluding" : "5.6.4",
  41137. "cpe_name" : [ ]
  41138. }, {
  41139. "vulnerable" : true,
  41140. "cpe23Uri" : "cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*",
  41141. "versionStartIncluding" : "5.7.0",
  41142. "versionEndExcluding" : "5.7.2",
  41143. "cpe_name" : [ ]
  41144. } ]
  41145. } ]
  41146. },
  41147. "impact" : {
  41148. "baseMetricV3" : {
  41149. "cvssV3" : {
  41150. "version" : "3.1",
  41151. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  41152. "attackVector" : "NETWORK",
  41153. "attackComplexity" : "LOW",
  41154. "privilegesRequired" : "NONE",
  41155. "userInteraction" : "NONE",
  41156. "scope" : "UNCHANGED",
  41157. "confidentialityImpact" : "HIGH",
  41158. "integrityImpact" : "NONE",
  41159. "availabilityImpact" : "NONE",
  41160. "baseScore" : 7.5,
  41161. "baseSeverity" : "HIGH"
  41162. },
  41163. "exploitabilityScore" : 3.9,
  41164. "impactScore" : 3.6
  41165. },
  41166. "baseMetricV2" : {
  41167. "cvssV2" : {
  41168. "version" : "2.0",
  41169. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  41170. "accessVector" : "NETWORK",
  41171. "accessComplexity" : "LOW",
  41172. "authentication" : "NONE",
  41173. "confidentialityImpact" : "PARTIAL",
  41174. "integrityImpact" : "NONE",
  41175. "availabilityImpact" : "NONE",
  41176. "baseScore" : 5.0
  41177. },
  41178. "severity" : "MEDIUM",
  41179. "exploitabilityScore" : 10.0,
  41180. "impactScore" : 2.9,
  41181. "acInsufInfo" : false,
  41182. "obtainAllPrivilege" : false,
  41183. "obtainUserPrivilege" : false,
  41184. "obtainOtherPrivilege" : false,
  41185. "userInteractionRequired" : false
  41186. }
  41187. },
  41188. "publishedDate" : "2021-04-27T19:15Z",
  41189. "lastModifiedDate" : "2021-05-06T21:39Z"
  41190. }, {
  41191. "cve" : {
  41192. "data_type" : "CVE",
  41193. "data_format" : "MITRE",
  41194. "data_version" : "4.0",
  41195. "CVE_data_meta" : {
  41196. "ID" : "CVE-2020-22001",
  41197. "ASSIGNER" : "cve@mitre.org"
  41198. },
  41199. "problemtype" : {
  41200. "problemtype_data" : [ {
  41201. "description" : [ {
  41202. "lang" : "en",
  41203. "value" : "CWE-287"
  41204. } ]
  41205. } ]
  41206. },
  41207. "references" : {
  41208. "reference_data" : [ {
  41209. "url" : "https://www.exploit-db.com/exploits/47807",
  41210. "name" : "Exploit Database",
  41211. "refsource" : "EXPLOIT-DB",
  41212. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  41213. }, {
  41214. "url" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5557.php",
  41215. "name" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5557.php",
  41216. "refsource" : "MISC",
  41217. "tags" : [ "Exploit", "Third Party Advisory" ]
  41218. } ]
  41219. },
  41220. "description" : {
  41221. "description_data" : [ {
  41222. "lang" : "en",
  41223. "value" : "HomeAutomation 3.3.2 suffers from an authentication bypass vulnerability when spoofing client IP address using the X-Forwarded-For header with the local (loopback) IP address value allowing remote control of the smart home solution."
  41224. } ]
  41225. }
  41226. },
  41227. "configurations" : {
  41228. "CVE_data_version" : "4.0",
  41229. "nodes" : [ {
  41230. "operator" : "OR",
  41231. "children" : [ ],
  41232. "cpe_match" : [ {
  41233. "vulnerable" : true,
  41234. "cpe23Uri" : "cpe:2.3:a:homeautomation_project:homeautomation:3.3.2:*:*:*:*:*:*:*",
  41235. "cpe_name" : [ ]
  41236. } ]
  41237. } ]
  41238. },
  41239. "impact" : {
  41240. "baseMetricV3" : {
  41241. "cvssV3" : {
  41242. "version" : "3.1",
  41243. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  41244. "attackVector" : "NETWORK",
  41245. "attackComplexity" : "LOW",
  41246. "privilegesRequired" : "NONE",
  41247. "userInteraction" : "NONE",
  41248. "scope" : "UNCHANGED",
  41249. "confidentialityImpact" : "HIGH",
  41250. "integrityImpact" : "HIGH",
  41251. "availabilityImpact" : "HIGH",
  41252. "baseScore" : 9.8,
  41253. "baseSeverity" : "CRITICAL"
  41254. },
  41255. "exploitabilityScore" : 3.9,
  41256. "impactScore" : 5.9
  41257. },
  41258. "baseMetricV2" : {
  41259. "cvssV2" : {
  41260. "version" : "2.0",
  41261. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  41262. "accessVector" : "NETWORK",
  41263. "accessComplexity" : "LOW",
  41264. "authentication" : "NONE",
  41265. "confidentialityImpact" : "PARTIAL",
  41266. "integrityImpact" : "PARTIAL",
  41267. "availabilityImpact" : "PARTIAL",
  41268. "baseScore" : 7.5
  41269. },
  41270. "severity" : "HIGH",
  41271. "exploitabilityScore" : 10.0,
  41272. "impactScore" : 6.4,
  41273. "acInsufInfo" : false,
  41274. "obtainAllPrivilege" : false,
  41275. "obtainUserPrivilege" : false,
  41276. "obtainOtherPrivilege" : false,
  41277. "userInteractionRequired" : false
  41278. }
  41279. },
  41280. "publishedDate" : "2021-04-27T18:15Z",
  41281. "lastModifiedDate" : "2021-05-06T14:25Z"
  41282. }, {
  41283. "cve" : {
  41284. "data_type" : "CVE",
  41285. "data_format" : "MITRE",
  41286. "data_version" : "4.0",
  41287. "CVE_data_meta" : {
  41288. "ID" : "CVE-2020-22000",
  41289. "ASSIGNER" : "cve@mitre.org"
  41290. },
  41291. "problemtype" : {
  41292. "problemtype_data" : [ {
  41293. "description" : [ {
  41294. "lang" : "en",
  41295. "value" : "CWE-352"
  41296. }, {
  41297. "lang" : "en",
  41298. "value" : "CWE-78"
  41299. } ]
  41300. } ]
  41301. },
  41302. "references" : {
  41303. "reference_data" : [ {
  41304. "url" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5560.php",
  41305. "name" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5560.php",
  41306. "refsource" : "MISC",
  41307. "tags" : [ "Exploit", "Third Party Advisory" ]
  41308. }, {
  41309. "url" : "https://www.exploit-db.com/exploits/47809",
  41310. "name" : "Exploit Database",
  41311. "refsource" : "EXPLOIT-DB",
  41312. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  41313. } ]
  41314. },
  41315. "description" : {
  41316. "description_data" : [ {
  41317. "lang" : "en",
  41318. "value" : "HomeAutomation 3.3.2 suffers from an authenticated OS command execution vulnerability using custom command v0.1 plugin. This can be exploited with a CSRF vulnerability to execute arbitrary shell commands as the web user via the 'set_command_on' and 'set_command_off' POST parameters in '/system/systemplugins/customcommand/customcommand.plugin.php' by using an unsanitized PHP exec() function."
  41319. } ]
  41320. }
  41321. },
  41322. "configurations" : {
  41323. "CVE_data_version" : "4.0",
  41324. "nodes" : [ {
  41325. "operator" : "OR",
  41326. "children" : [ ],
  41327. "cpe_match" : [ {
  41328. "vulnerable" : true,
  41329. "cpe23Uri" : "cpe:2.3:a:homeautomation_project:homeautomation:3.3.2:*:*:*:*:*:*:*",
  41330. "cpe_name" : [ ]
  41331. } ]
  41332. } ]
  41333. },
  41334. "impact" : {
  41335. "baseMetricV3" : {
  41336. "cvssV3" : {
  41337. "version" : "3.1",
  41338. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
  41339. "attackVector" : "NETWORK",
  41340. "attackComplexity" : "LOW",
  41341. "privilegesRequired" : "LOW",
  41342. "userInteraction" : "REQUIRED",
  41343. "scope" : "UNCHANGED",
  41344. "confidentialityImpact" : "HIGH",
  41345. "integrityImpact" : "HIGH",
  41346. "availabilityImpact" : "HIGH",
  41347. "baseScore" : 8.0,
  41348. "baseSeverity" : "HIGH"
  41349. },
  41350. "exploitabilityScore" : 2.1,
  41351. "impactScore" : 5.9
  41352. },
  41353. "baseMetricV2" : {
  41354. "cvssV2" : {
  41355. "version" : "2.0",
  41356. "vectorString" : "AV:N/AC:M/Au:S/C:C/I:C/A:C",
  41357. "accessVector" : "NETWORK",
  41358. "accessComplexity" : "MEDIUM",
  41359. "authentication" : "SINGLE",
  41360. "confidentialityImpact" : "COMPLETE",
  41361. "integrityImpact" : "COMPLETE",
  41362. "availabilityImpact" : "COMPLETE",
  41363. "baseScore" : 8.5
  41364. },
  41365. "severity" : "HIGH",
  41366. "exploitabilityScore" : 6.8,
  41367. "impactScore" : 10.0,
  41368. "acInsufInfo" : false,
  41369. "obtainAllPrivilege" : false,
  41370. "obtainUserPrivilege" : false,
  41371. "obtainOtherPrivilege" : false,
  41372. "userInteractionRequired" : true
  41373. }
  41374. },
  41375. "publishedDate" : "2021-04-27T18:15Z",
  41376. "lastModifiedDate" : "2021-05-06T14:05Z"
  41377. }, {
  41378. "cve" : {
  41379. "data_type" : "CVE",
  41380. "data_format" : "MITRE",
  41381. "data_version" : "4.0",
  41382. "CVE_data_meta" : {
  41383. "ID" : "CVE-2020-21998",
  41384. "ASSIGNER" : "cve@mitre.org"
  41385. },
  41386. "problemtype" : {
  41387. "problemtype_data" : [ {
  41388. "description" : [ {
  41389. "lang" : "en",
  41390. "value" : "CWE-601"
  41391. } ]
  41392. } ]
  41393. },
  41394. "references" : {
  41395. "reference_data" : [ {
  41396. "url" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php",
  41397. "name" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php",
  41398. "refsource" : "MISC",
  41399. "tags" : [ "Exploit", "Third Party Advisory" ]
  41400. }, {
  41401. "url" : "https://cxsecurity.com/issue/WLB-2019120132",
  41402. "name" : "https://cxsecurity.com/issue/WLB-2019120132",
  41403. "refsource" : "MISC",
  41404. "tags" : [ "Exploit", "Third Party Advisory" ]
  41405. } ]
  41406. },
  41407. "description" : {
  41408. "description_data" : [ {
  41409. "lang" : "en",
  41410. "value" : "In HomeAutomation 3.3.2 input passed via the 'redirect' GET parameter in 'api.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain."
  41411. } ]
  41412. }
  41413. },
  41414. "configurations" : {
  41415. "CVE_data_version" : "4.0",
  41416. "nodes" : [ {
  41417. "operator" : "OR",
  41418. "children" : [ ],
  41419. "cpe_match" : [ {
  41420. "vulnerable" : true,
  41421. "cpe23Uri" : "cpe:2.3:a:homeautomation_project:homeautomation:3.3.2:*:*:*:*:*:*:*",
  41422. "cpe_name" : [ ]
  41423. } ]
  41424. } ]
  41425. },
  41426. "impact" : {
  41427. "baseMetricV3" : {
  41428. "cvssV3" : {
  41429. "version" : "3.1",
  41430. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  41431. "attackVector" : "NETWORK",
  41432. "attackComplexity" : "LOW",
  41433. "privilegesRequired" : "NONE",
  41434. "userInteraction" : "REQUIRED",
  41435. "scope" : "CHANGED",
  41436. "confidentialityImpact" : "LOW",
  41437. "integrityImpact" : "LOW",
  41438. "availabilityImpact" : "NONE",
  41439. "baseScore" : 6.1,
  41440. "baseSeverity" : "MEDIUM"
  41441. },
  41442. "exploitabilityScore" : 2.8,
  41443. "impactScore" : 2.7
  41444. },
  41445. "baseMetricV2" : {
  41446. "cvssV2" : {
  41447. "version" : "2.0",
  41448. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:N",
  41449. "accessVector" : "NETWORK",
  41450. "accessComplexity" : "MEDIUM",
  41451. "authentication" : "NONE",
  41452. "confidentialityImpact" : "PARTIAL",
  41453. "integrityImpact" : "PARTIAL",
  41454. "availabilityImpact" : "NONE",
  41455. "baseScore" : 5.8
  41456. },
  41457. "severity" : "MEDIUM",
  41458. "exploitabilityScore" : 8.6,
  41459. "impactScore" : 4.9,
  41460. "acInsufInfo" : false,
  41461. "obtainAllPrivilege" : false,
  41462. "obtainUserPrivilege" : false,
  41463. "obtainOtherPrivilege" : false,
  41464. "userInteractionRequired" : true
  41465. }
  41466. },
  41467. "publishedDate" : "2021-04-27T18:15Z",
  41468. "lastModifiedDate" : "2021-05-06T14:19Z"
  41469. }, {
  41470. "cve" : {
  41471. "data_type" : "CVE",
  41472. "data_format" : "MITRE",
  41473. "data_version" : "4.0",
  41474. "CVE_data_meta" : {
  41475. "ID" : "CVE-2020-21989",
  41476. "ASSIGNER" : "cve@mitre.org"
  41477. },
  41478. "problemtype" : {
  41479. "problemtype_data" : [ {
  41480. "description" : [ {
  41481. "lang" : "en",
  41482. "value" : "CWE-352"
  41483. } ]
  41484. } ]
  41485. },
  41486. "references" : {
  41487. "reference_data" : [ {
  41488. "url" : "https://www.exploit-db.com/exploits/47808",
  41489. "name" : "Exploit Database",
  41490. "refsource" : "EXPLOIT-DB",
  41491. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  41492. }, {
  41493. "url" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5558.php",
  41494. "name" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5558.php",
  41495. "refsource" : "MISC",
  41496. "tags" : [ "Exploit", "Third Party Advisory" ]
  41497. } ]
  41498. },
  41499. "description" : {
  41500. "description_data" : [ {
  41501. "lang" : "en",
  41502. "value" : "HomeAutomation 3.3.2 is affected by Cross Site Request Forgery (CSRF). The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site."
  41503. } ]
  41504. }
  41505. },
  41506. "configurations" : {
  41507. "CVE_data_version" : "4.0",
  41508. "nodes" : [ {
  41509. "operator" : "OR",
  41510. "children" : [ ],
  41511. "cpe_match" : [ {
  41512. "vulnerable" : true,
  41513. "cpe23Uri" : "cpe:2.3:a:homeautomation_project:homeautomation:3.3.2:*:*:*:*:*:*:*",
  41514. "cpe_name" : [ ]
  41515. } ]
  41516. } ]
  41517. },
  41518. "impact" : {
  41519. "baseMetricV3" : {
  41520. "cvssV3" : {
  41521. "version" : "3.1",
  41522. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  41523. "attackVector" : "NETWORK",
  41524. "attackComplexity" : "LOW",
  41525. "privilegesRequired" : "NONE",
  41526. "userInteraction" : "REQUIRED",
  41527. "scope" : "UNCHANGED",
  41528. "confidentialityImpact" : "HIGH",
  41529. "integrityImpact" : "HIGH",
  41530. "availabilityImpact" : "HIGH",
  41531. "baseScore" : 8.8,
  41532. "baseSeverity" : "HIGH"
  41533. },
  41534. "exploitabilityScore" : 2.8,
  41535. "impactScore" : 5.9
  41536. },
  41537. "baseMetricV2" : {
  41538. "cvssV2" : {
  41539. "version" : "2.0",
  41540. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  41541. "accessVector" : "NETWORK",
  41542. "accessComplexity" : "MEDIUM",
  41543. "authentication" : "NONE",
  41544. "confidentialityImpact" : "PARTIAL",
  41545. "integrityImpact" : "PARTIAL",
  41546. "availabilityImpact" : "PARTIAL",
  41547. "baseScore" : 6.8
  41548. },
  41549. "severity" : "MEDIUM",
  41550. "exploitabilityScore" : 8.6,
  41551. "impactScore" : 6.4,
  41552. "acInsufInfo" : false,
  41553. "obtainAllPrivilege" : false,
  41554. "obtainUserPrivilege" : false,
  41555. "obtainOtherPrivilege" : false,
  41556. "userInteractionRequired" : true
  41557. }
  41558. },
  41559. "publishedDate" : "2021-04-27T18:15Z",
  41560. "lastModifiedDate" : "2021-05-06T14:05Z"
  41561. }, {
  41562. "cve" : {
  41563. "data_type" : "CVE",
  41564. "data_format" : "MITRE",
  41565. "data_version" : "4.0",
  41566. "CVE_data_meta" : {
  41567. "ID" : "CVE-2021-29667",
  41568. "ASSIGNER" : "psirt@us.ibm.com"
  41569. },
  41570. "problemtype" : {
  41571. "problemtype_data" : [ {
  41572. "description" : [ {
  41573. "lang" : "en",
  41574. "value" : "CWE-1236"
  41575. } ]
  41576. } ]
  41577. },
  41578. "references" : {
  41579. "reference_data" : [ {
  41580. "url" : "https://www.ibm.com/support/pages/node/6447107",
  41581. "name" : "https://www.ibm.com/support/pages/node/6447107",
  41582. "refsource" : "CONFIRM",
  41583. "tags" : [ "Patch", "Vendor Advisory" ]
  41584. }, {
  41585. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/199403",
  41586. "name" : "ibm-spectrum-cve202129667-csv-injection (199403)",
  41587. "refsource" : "XF",
  41588. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  41589. } ]
  41590. },
  41591. "description" : {
  41592. "description_data" : [ {
  41593. "lang" : "en",
  41594. "value" : "IBM Spectrum Scale 5.0.0 through 5.0.5.6 and 5.1.0 through 5.1.0.2 is potentially vulnerable to CSV Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 199403."
  41595. } ]
  41596. }
  41597. },
  41598. "configurations" : {
  41599. "CVE_data_version" : "4.0",
  41600. "nodes" : [ {
  41601. "operator" : "AND",
  41602. "children" : [ {
  41603. "operator" : "OR",
  41604. "children" : [ ],
  41605. "cpe_match" : [ {
  41606. "vulnerable" : true,
  41607. "cpe23Uri" : "cpe:2.3:a:ibm:spectrum_scale:*:*:*:*:*:*:*:*",
  41608. "versionStartIncluding" : "5.0.0:",
  41609. "versionEndIncluding" : "5.0.5.6:",
  41610. "cpe_name" : [ ]
  41611. }, {
  41612. "vulnerable" : true,
  41613. "cpe23Uri" : "cpe:2.3:a:ibm:spectrum_scale:*:*:*:*:*:*:*:*",
  41614. "versionStartIncluding" : "5.1.0:",
  41615. "versionEndIncluding" : "5.1.0.2:",
  41616. "cpe_name" : [ ]
  41617. } ]
  41618. }, {
  41619. "operator" : "OR",
  41620. "children" : [ ],
  41621. "cpe_match" : [ {
  41622. "vulnerable" : false,
  41623. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
  41624. "cpe_name" : [ ]
  41625. } ]
  41626. } ],
  41627. "cpe_match" : [ ]
  41628. } ]
  41629. },
  41630. "impact" : {
  41631. "baseMetricV3" : {
  41632. "cvssV3" : {
  41633. "version" : "3.1",
  41634. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  41635. "attackVector" : "LOCAL",
  41636. "attackComplexity" : "LOW",
  41637. "privilegesRequired" : "NONE",
  41638. "userInteraction" : "REQUIRED",
  41639. "scope" : "UNCHANGED",
  41640. "confidentialityImpact" : "HIGH",
  41641. "integrityImpact" : "HIGH",
  41642. "availabilityImpact" : "HIGH",
  41643. "baseScore" : 7.8,
  41644. "baseSeverity" : "HIGH"
  41645. },
  41646. "exploitabilityScore" : 1.8,
  41647. "impactScore" : 5.9
  41648. },
  41649. "baseMetricV2" : {
  41650. "cvssV2" : {
  41651. "version" : "2.0",
  41652. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  41653. "accessVector" : "NETWORK",
  41654. "accessComplexity" : "MEDIUM",
  41655. "authentication" : "NONE",
  41656. "confidentialityImpact" : "PARTIAL",
  41657. "integrityImpact" : "PARTIAL",
  41658. "availabilityImpact" : "PARTIAL",
  41659. "baseScore" : 6.8
  41660. },
  41661. "severity" : "MEDIUM",
  41662. "exploitabilityScore" : 8.6,
  41663. "impactScore" : 6.4,
  41664. "acInsufInfo" : false,
  41665. "obtainAllPrivilege" : false,
  41666. "obtainUserPrivilege" : false,
  41667. "obtainOtherPrivilege" : false,
  41668. "userInteractionRequired" : true
  41669. }
  41670. },
  41671. "publishedDate" : "2021-04-27T17:15Z",
  41672. "lastModifiedDate" : "2021-05-05T20:34Z"
  41673. }, {
  41674. "cve" : {
  41675. "data_type" : "CVE",
  41676. "data_format" : "MITRE",
  41677. "data_version" : "4.0",
  41678. "CVE_data_meta" : {
  41679. "ID" : "CVE-2021-29666",
  41680. "ASSIGNER" : "psirt@us.ibm.com"
  41681. },
  41682. "problemtype" : {
  41683. "problemtype_data" : [ {
  41684. "description" : [ {
  41685. "lang" : "en",
  41686. "value" : "CWE-79"
  41687. } ]
  41688. } ]
  41689. },
  41690. "references" : {
  41691. "reference_data" : [ {
  41692. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/199400",
  41693. "name" : "ibm-spectrum-cve202129666-xss (199400)",
  41694. "refsource" : "XF",
  41695. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  41696. }, {
  41697. "url" : "https://www.ibm.com/support/pages/node/6447107",
  41698. "name" : "https://www.ibm.com/support/pages/node/6447107",
  41699. "refsource" : "CONFIRM",
  41700. "tags" : [ "Patch", "Vendor Advisory" ]
  41701. } ]
  41702. },
  41703. "description" : {
  41704. "description_data" : [ {
  41705. "lang" : "en",
  41706. "value" : "IBM Spectrum Scale 5.0.0 through 5.0.5.6 and 5.1.0 through 5.1.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199400."
  41707. } ]
  41708. }
  41709. },
  41710. "configurations" : {
  41711. "CVE_data_version" : "4.0",
  41712. "nodes" : [ {
  41713. "operator" : "AND",
  41714. "children" : [ {
  41715. "operator" : "OR",
  41716. "children" : [ ],
  41717. "cpe_match" : [ {
  41718. "vulnerable" : true,
  41719. "cpe23Uri" : "cpe:2.3:a:ibm:spectrum_scale:*:*:*:*:*:*:*:*",
  41720. "versionStartIncluding" : "5.0.0:",
  41721. "versionEndIncluding" : "5.0.5.6:",
  41722. "cpe_name" : [ ]
  41723. }, {
  41724. "vulnerable" : true,
  41725. "cpe23Uri" : "cpe:2.3:a:ibm:spectrum_scale:*:*:*:*:*:*:*:*",
  41726. "versionStartIncluding" : "5.1.0:",
  41727. "versionEndIncluding" : "5.1.0.2:",
  41728. "cpe_name" : [ ]
  41729. } ]
  41730. }, {
  41731. "operator" : "OR",
  41732. "children" : [ ],
  41733. "cpe_match" : [ {
  41734. "vulnerable" : false,
  41735. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
  41736. "cpe_name" : [ ]
  41737. } ]
  41738. } ],
  41739. "cpe_match" : [ ]
  41740. } ]
  41741. },
  41742. "impact" : {
  41743. "baseMetricV3" : {
  41744. "cvssV3" : {
  41745. "version" : "3.1",
  41746. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  41747. "attackVector" : "NETWORK",
  41748. "attackComplexity" : "LOW",
  41749. "privilegesRequired" : "LOW",
  41750. "userInteraction" : "REQUIRED",
  41751. "scope" : "CHANGED",
  41752. "confidentialityImpact" : "LOW",
  41753. "integrityImpact" : "LOW",
  41754. "availabilityImpact" : "NONE",
  41755. "baseScore" : 5.4,
  41756. "baseSeverity" : "MEDIUM"
  41757. },
  41758. "exploitabilityScore" : 2.3,
  41759. "impactScore" : 2.7
  41760. },
  41761. "baseMetricV2" : {
  41762. "cvssV2" : {
  41763. "version" : "2.0",
  41764. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  41765. "accessVector" : "NETWORK",
  41766. "accessComplexity" : "MEDIUM",
  41767. "authentication" : "SINGLE",
  41768. "confidentialityImpact" : "NONE",
  41769. "integrityImpact" : "PARTIAL",
  41770. "availabilityImpact" : "NONE",
  41771. "baseScore" : 3.5
  41772. },
  41773. "severity" : "LOW",
  41774. "exploitabilityScore" : 6.8,
  41775. "impactScore" : 2.9,
  41776. "acInsufInfo" : false,
  41777. "obtainAllPrivilege" : false,
  41778. "obtainUserPrivilege" : false,
  41779. "obtainOtherPrivilege" : false,
  41780. "userInteractionRequired" : true
  41781. }
  41782. },
  41783. "publishedDate" : "2021-04-27T17:15Z",
  41784. "lastModifiedDate" : "2021-05-07T21:13Z"
  41785. }, {
  41786. "cve" : {
  41787. "data_type" : "CVE",
  41788. "data_format" : "MITRE",
  41789. "data_version" : "4.0",
  41790. "CVE_data_meta" : {
  41791. "ID" : "CVE-2021-20550",
  41792. "ASSIGNER" : "psirt@us.ibm.com"
  41793. },
  41794. "problemtype" : {
  41795. "problemtype_data" : [ {
  41796. "description" : [ {
  41797. "lang" : "en",
  41798. "value" : "CWE-79"
  41799. } ]
  41800. } ]
  41801. },
  41802. "references" : {
  41803. "reference_data" : [ {
  41804. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/199168",
  41805. "name" : "ibm-cn-cve202120550-xss (199168)",
  41806. "refsource" : "XF",
  41807. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  41808. }, {
  41809. "url" : "https://www.ibm.com/support/pages/node/6447143",
  41810. "name" : "https://www.ibm.com/support/pages/node/6447143",
  41811. "refsource" : "CONFIRM",
  41812. "tags" : [ "Vendor Advisory" ]
  41813. } ]
  41814. },
  41815. "description" : {
  41816. "description_data" : [ {
  41817. "lang" : "en",
  41818. "value" : "IBM Content Navigator 3.0.CD is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199168."
  41819. } ]
  41820. }
  41821. },
  41822. "configurations" : {
  41823. "CVE_data_version" : "4.0",
  41824. "nodes" : [ {
  41825. "operator" : "AND",
  41826. "children" : [ {
  41827. "operator" : "OR",
  41828. "children" : [ ],
  41829. "cpe_match" : [ {
  41830. "vulnerable" : true,
  41831. "cpe23Uri" : "cpe:2.3:a:ibm:content_navigator:3.0.0:*:*:*:continuous_delivery:*:*:*",
  41832. "cpe_name" : [ ]
  41833. } ]
  41834. }, {
  41835. "operator" : "OR",
  41836. "children" : [ ],
  41837. "cpe_match" : [ {
  41838. "vulnerable" : false,
  41839. "cpe23Uri" : "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
  41840. "cpe_name" : [ ]
  41841. }, {
  41842. "vulnerable" : false,
  41843. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
  41844. "cpe_name" : [ ]
  41845. }, {
  41846. "vulnerable" : false,
  41847. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  41848. "cpe_name" : [ ]
  41849. } ]
  41850. } ],
  41851. "cpe_match" : [ ]
  41852. } ]
  41853. },
  41854. "impact" : {
  41855. "baseMetricV3" : {
  41856. "cvssV3" : {
  41857. "version" : "3.1",
  41858. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  41859. "attackVector" : "NETWORK",
  41860. "attackComplexity" : "LOW",
  41861. "privilegesRequired" : "LOW",
  41862. "userInteraction" : "REQUIRED",
  41863. "scope" : "CHANGED",
  41864. "confidentialityImpact" : "LOW",
  41865. "integrityImpact" : "LOW",
  41866. "availabilityImpact" : "NONE",
  41867. "baseScore" : 5.4,
  41868. "baseSeverity" : "MEDIUM"
  41869. },
  41870. "exploitabilityScore" : 2.3,
  41871. "impactScore" : 2.7
  41872. },
  41873. "baseMetricV2" : {
  41874. "cvssV2" : {
  41875. "version" : "2.0",
  41876. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  41877. "accessVector" : "NETWORK",
  41878. "accessComplexity" : "MEDIUM",
  41879. "authentication" : "SINGLE",
  41880. "confidentialityImpact" : "NONE",
  41881. "integrityImpact" : "PARTIAL",
  41882. "availabilityImpact" : "NONE",
  41883. "baseScore" : 3.5
  41884. },
  41885. "severity" : "LOW",
  41886. "exploitabilityScore" : 6.8,
  41887. "impactScore" : 2.9,
  41888. "acInsufInfo" : false,
  41889. "obtainAllPrivilege" : false,
  41890. "obtainUserPrivilege" : false,
  41891. "obtainOtherPrivilege" : false,
  41892. "userInteractionRequired" : true
  41893. }
  41894. },
  41895. "publishedDate" : "2021-04-27T17:15Z",
  41896. "lastModifiedDate" : "2021-05-03T18:41Z"
  41897. }, {
  41898. "cve" : {
  41899. "data_type" : "CVE",
  41900. "data_format" : "MITRE",
  41901. "data_version" : "4.0",
  41902. "CVE_data_meta" : {
  41903. "ID" : "CVE-2021-20549",
  41904. "ASSIGNER" : "psirt@us.ibm.com"
  41905. },
  41906. "problemtype" : {
  41907. "problemtype_data" : [ {
  41908. "description" : [ {
  41909. "lang" : "en",
  41910. "value" : "CWE-79"
  41911. } ]
  41912. } ]
  41913. },
  41914. "references" : {
  41915. "reference_data" : [ {
  41916. "url" : "https://www.ibm.com/support/pages/node/6447143",
  41917. "name" : "https://www.ibm.com/support/pages/node/6447143",
  41918. "refsource" : "CONFIRM",
  41919. "tags" : [ "Vendor Advisory" ]
  41920. }, {
  41921. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/199167",
  41922. "name" : "ibm-cn-cve202120549-xss (199167)",
  41923. "refsource" : "XF",
  41924. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  41925. } ]
  41926. },
  41927. "description" : {
  41928. "description_data" : [ {
  41929. "lang" : "en",
  41930. "value" : "IBM Content Navigator 3.0.CD is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199167."
  41931. } ]
  41932. }
  41933. },
  41934. "configurations" : {
  41935. "CVE_data_version" : "4.0",
  41936. "nodes" : [ {
  41937. "operator" : "AND",
  41938. "children" : [ {
  41939. "operator" : "OR",
  41940. "children" : [ ],
  41941. "cpe_match" : [ {
  41942. "vulnerable" : true,
  41943. "cpe23Uri" : "cpe:2.3:a:ibm:content_navigator:3.0.0:*:*:*:continuous_delivery:*:*:*",
  41944. "cpe_name" : [ ]
  41945. } ]
  41946. }, {
  41947. "operator" : "OR",
  41948. "children" : [ ],
  41949. "cpe_match" : [ {
  41950. "vulnerable" : false,
  41951. "cpe23Uri" : "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
  41952. "cpe_name" : [ ]
  41953. }, {
  41954. "vulnerable" : false,
  41955. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
  41956. "cpe_name" : [ ]
  41957. }, {
  41958. "vulnerable" : false,
  41959. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  41960. "cpe_name" : [ ]
  41961. } ]
  41962. } ],
  41963. "cpe_match" : [ ]
  41964. } ]
  41965. },
  41966. "impact" : {
  41967. "baseMetricV3" : {
  41968. "cvssV3" : {
  41969. "version" : "3.1",
  41970. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  41971. "attackVector" : "NETWORK",
  41972. "attackComplexity" : "LOW",
  41973. "privilegesRequired" : "LOW",
  41974. "userInteraction" : "REQUIRED",
  41975. "scope" : "CHANGED",
  41976. "confidentialityImpact" : "LOW",
  41977. "integrityImpact" : "LOW",
  41978. "availabilityImpact" : "NONE",
  41979. "baseScore" : 5.4,
  41980. "baseSeverity" : "MEDIUM"
  41981. },
  41982. "exploitabilityScore" : 2.3,
  41983. "impactScore" : 2.7
  41984. },
  41985. "baseMetricV2" : {
  41986. "cvssV2" : {
  41987. "version" : "2.0",
  41988. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  41989. "accessVector" : "NETWORK",
  41990. "accessComplexity" : "MEDIUM",
  41991. "authentication" : "SINGLE",
  41992. "confidentialityImpact" : "NONE",
  41993. "integrityImpact" : "PARTIAL",
  41994. "availabilityImpact" : "NONE",
  41995. "baseScore" : 3.5
  41996. },
  41997. "severity" : "LOW",
  41998. "exploitabilityScore" : 6.8,
  41999. "impactScore" : 2.9,
  42000. "acInsufInfo" : false,
  42001. "obtainAllPrivilege" : false,
  42002. "obtainUserPrivilege" : false,
  42003. "obtainOtherPrivilege" : false,
  42004. "userInteractionRequired" : true
  42005. }
  42006. },
  42007. "publishedDate" : "2021-04-27T17:15Z",
  42008. "lastModifiedDate" : "2021-05-03T18:41Z"
  42009. }, {
  42010. "cve" : {
  42011. "data_type" : "CVE",
  42012. "data_format" : "MITRE",
  42013. "data_version" : "4.0",
  42014. "CVE_data_meta" : {
  42015. "ID" : "CVE-2021-20448",
  42016. "ASSIGNER" : "psirt@us.ibm.com"
  42017. },
  42018. "problemtype" : {
  42019. "problemtype_data" : [ {
  42020. "description" : [ {
  42021. "lang" : "en",
  42022. "value" : "CWE-79"
  42023. } ]
  42024. } ]
  42025. },
  42026. "references" : {
  42027. "reference_data" : [ {
  42028. "url" : "https://www.ibm.com/support/pages/node/6447139",
  42029. "name" : "https://www.ibm.com/support/pages/node/6447139",
  42030. "refsource" : "CONFIRM",
  42031. "tags" : [ "Patch", "Vendor Advisory" ]
  42032. }, {
  42033. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/196624",
  42034. "name" : "ibm-cn-cve202120448-xss (196624)",
  42035. "refsource" : "XF",
  42036. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  42037. } ]
  42038. },
  42039. "description" : {
  42040. "description_data" : [ {
  42041. "lang" : "en",
  42042. "value" : "IBM Content Navigator 3.0.CD is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 196624."
  42043. } ]
  42044. }
  42045. },
  42046. "configurations" : {
  42047. "CVE_data_version" : "4.0",
  42048. "nodes" : [ {
  42049. "operator" : "AND",
  42050. "children" : [ {
  42051. "operator" : "OR",
  42052. "children" : [ ],
  42053. "cpe_match" : [ {
  42054. "vulnerable" : true,
  42055. "cpe23Uri" : "cpe:2.3:a:ibm:content_navigator:3.0.0:*:*:*:continuous_delivery:*:*:*",
  42056. "cpe_name" : [ ]
  42057. } ]
  42058. }, {
  42059. "operator" : "OR",
  42060. "children" : [ ],
  42061. "cpe_match" : [ {
  42062. "vulnerable" : false,
  42063. "cpe23Uri" : "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
  42064. "cpe_name" : [ ]
  42065. }, {
  42066. "vulnerable" : false,
  42067. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
  42068. "cpe_name" : [ ]
  42069. }, {
  42070. "vulnerable" : false,
  42071. "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
  42072. "cpe_name" : [ ]
  42073. } ]
  42074. } ],
  42075. "cpe_match" : [ ]
  42076. } ]
  42077. },
  42078. "impact" : {
  42079. "baseMetricV3" : {
  42080. "cvssV3" : {
  42081. "version" : "3.1",
  42082. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  42083. "attackVector" : "NETWORK",
  42084. "attackComplexity" : "LOW",
  42085. "privilegesRequired" : "LOW",
  42086. "userInteraction" : "REQUIRED",
  42087. "scope" : "CHANGED",
  42088. "confidentialityImpact" : "LOW",
  42089. "integrityImpact" : "LOW",
  42090. "availabilityImpact" : "NONE",
  42091. "baseScore" : 5.4,
  42092. "baseSeverity" : "MEDIUM"
  42093. },
  42094. "exploitabilityScore" : 2.3,
  42095. "impactScore" : 2.7
  42096. },
  42097. "baseMetricV2" : {
  42098. "cvssV2" : {
  42099. "version" : "2.0",
  42100. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  42101. "accessVector" : "NETWORK",
  42102. "accessComplexity" : "MEDIUM",
  42103. "authentication" : "SINGLE",
  42104. "confidentialityImpact" : "NONE",
  42105. "integrityImpact" : "PARTIAL",
  42106. "availabilityImpact" : "NONE",
  42107. "baseScore" : 3.5
  42108. },
  42109. "severity" : "LOW",
  42110. "exploitabilityScore" : 6.8,
  42111. "impactScore" : 2.9,
  42112. "acInsufInfo" : false,
  42113. "obtainAllPrivilege" : false,
  42114. "obtainUserPrivilege" : false,
  42115. "obtainOtherPrivilege" : false,
  42116. "userInteractionRequired" : true
  42117. }
  42118. },
  42119. "publishedDate" : "2021-04-27T17:15Z",
  42120. "lastModifiedDate" : "2021-05-03T18:40Z"
  42121. }, {
  42122. "cve" : {
  42123. "data_type" : "CVE",
  42124. "data_format" : "MITRE",
  42125. "data_version" : "4.0",
  42126. "CVE_data_meta" : {
  42127. "ID" : "CVE-2020-4981",
  42128. "ASSIGNER" : "psirt@us.ibm.com"
  42129. },
  42130. "problemtype" : {
  42131. "problemtype_data" : [ {
  42132. "description" : [ {
  42133. "lang" : "en",
  42134. "value" : "CWE-269"
  42135. } ]
  42136. } ]
  42137. },
  42138. "references" : {
  42139. "reference_data" : [ {
  42140. "url" : "https://www.ibm.com/support/pages/node/6447077",
  42141. "name" : "https://www.ibm.com/support/pages/node/6447077",
  42142. "refsource" : "CONFIRM",
  42143. "tags" : [ "Patch", "Vendor Advisory" ]
  42144. }, {
  42145. "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/192541",
  42146. "name" : "ibm-spectrum-cve20204981-file-write (192541)",
  42147. "refsource" : "XF",
  42148. "tags" : [ "VDB Entry", "Vendor Advisory" ]
  42149. } ]
  42150. },
  42151. "description" : {
  42152. "description_data" : [ {
  42153. "lang" : "en",
  42154. "value" : "IBM Spectrum Scale 5.0.4.1 through 5.1.0.3 could allow a local privileged user to overwrite files due to improper input validation. IBM X-Force ID: 192541."
  42155. } ]
  42156. }
  42157. },
  42158. "configurations" : {
  42159. "CVE_data_version" : "4.0",
  42160. "nodes" : [ {
  42161. "operator" : "OR",
  42162. "children" : [ ],
  42163. "cpe_match" : [ {
  42164. "vulnerable" : true,
  42165. "cpe23Uri" : "cpe:2.3:a:ibm:spectrum_scale:*:*:*:*:*:*:*:*",
  42166. "versionStartIncluding" : "5.0.4.1",
  42167. "versionEndIncluding" : "5.1.0.3",
  42168. "cpe_name" : [ ]
  42169. } ]
  42170. } ]
  42171. },
  42172. "impact" : {
  42173. "baseMetricV3" : {
  42174. "cvssV3" : {
  42175. "version" : "3.1",
  42176. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
  42177. "attackVector" : "LOCAL",
  42178. "attackComplexity" : "LOW",
  42179. "privilegesRequired" : "HIGH",
  42180. "userInteraction" : "NONE",
  42181. "scope" : "UNCHANGED",
  42182. "confidentialityImpact" : "NONE",
  42183. "integrityImpact" : "HIGH",
  42184. "availabilityImpact" : "HIGH",
  42185. "baseScore" : 6.0,
  42186. "baseSeverity" : "MEDIUM"
  42187. },
  42188. "exploitabilityScore" : 0.8,
  42189. "impactScore" : 5.2
  42190. },
  42191. "baseMetricV2" : {
  42192. "cvssV2" : {
  42193. "version" : "2.0",
  42194. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:P/A:P",
  42195. "accessVector" : "LOCAL",
  42196. "accessComplexity" : "LOW",
  42197. "authentication" : "NONE",
  42198. "confidentialityImpact" : "NONE",
  42199. "integrityImpact" : "PARTIAL",
  42200. "availabilityImpact" : "PARTIAL",
  42201. "baseScore" : 3.6
  42202. },
  42203. "severity" : "LOW",
  42204. "exploitabilityScore" : 3.9,
  42205. "impactScore" : 4.9,
  42206. "acInsufInfo" : false,
  42207. "obtainAllPrivilege" : false,
  42208. "obtainUserPrivilege" : false,
  42209. "obtainOtherPrivilege" : false,
  42210. "userInteractionRequired" : false
  42211. }
  42212. },
  42213. "publishedDate" : "2021-04-27T17:15Z",
  42214. "lastModifiedDate" : "2021-05-03T23:02Z"
  42215. }, {
  42216. "cve" : {
  42217. "data_type" : "CVE",
  42218. "data_format" : "MITRE",
  42219. "data_version" : "4.0",
  42220. "CVE_data_meta" : {
  42221. "ID" : "CVE-2021-3464",
  42222. "ASSIGNER" : "psirt@lenovo.com"
  42223. },
  42224. "problemtype" : {
  42225. "problemtype_data" : [ {
  42226. "description" : [ {
  42227. "lang" : "en",
  42228. "value" : "CWE-427"
  42229. } ]
  42230. } ]
  42231. },
  42232. "references" : {
  42233. "reference_data" : [ {
  42234. "url" : "https://iknow.lenovo.com.cn/detail/dc_196156.html",
  42235. "name" : "https://iknow.lenovo.com.cn/detail/dc_196156.html",
  42236. "refsource" : "MISC",
  42237. "tags" : [ "Vendor Advisory" ]
  42238. } ]
  42239. },
  42240. "description" : {
  42241. "description_data" : [ {
  42242. "lang" : "en",
  42243. "value" : "A DLL search path vulnerability was reported in Lenovo PCManager, prior to version 3.0.400.3252, that could allow privilege escalation."
  42244. } ]
  42245. }
  42246. },
  42247. "configurations" : {
  42248. "CVE_data_version" : "4.0",
  42249. "nodes" : [ {
  42250. "operator" : "OR",
  42251. "children" : [ ],
  42252. "cpe_match" : [ {
  42253. "vulnerable" : true,
  42254. "cpe23Uri" : "cpe:2.3:a:lenovo:pcmanager:*:*:*:*:*:*:*:*",
  42255. "versionEndExcluding" : "3.0.400.3252",
  42256. "cpe_name" : [ ]
  42257. } ]
  42258. } ]
  42259. },
  42260. "impact" : {
  42261. "baseMetricV3" : {
  42262. "cvssV3" : {
  42263. "version" : "3.1",
  42264. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  42265. "attackVector" : "LOCAL",
  42266. "attackComplexity" : "LOW",
  42267. "privilegesRequired" : "LOW",
  42268. "userInteraction" : "NONE",
  42269. "scope" : "UNCHANGED",
  42270. "confidentialityImpact" : "HIGH",
  42271. "integrityImpact" : "HIGH",
  42272. "availabilityImpact" : "HIGH",
  42273. "baseScore" : 7.8,
  42274. "baseSeverity" : "HIGH"
  42275. },
  42276. "exploitabilityScore" : 1.8,
  42277. "impactScore" : 5.9
  42278. },
  42279. "baseMetricV2" : {
  42280. "cvssV2" : {
  42281. "version" : "2.0",
  42282. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  42283. "accessVector" : "LOCAL",
  42284. "accessComplexity" : "LOW",
  42285. "authentication" : "NONE",
  42286. "confidentialityImpact" : "COMPLETE",
  42287. "integrityImpact" : "COMPLETE",
  42288. "availabilityImpact" : "COMPLETE",
  42289. "baseScore" : 7.2
  42290. },
  42291. "severity" : "HIGH",
  42292. "exploitabilityScore" : 3.9,
  42293. "impactScore" : 10.0,
  42294. "acInsufInfo" : false,
  42295. "obtainAllPrivilege" : false,
  42296. "obtainUserPrivilege" : false,
  42297. "obtainOtherPrivilege" : false,
  42298. "userInteractionRequired" : false
  42299. }
  42300. },
  42301. "publishedDate" : "2021-04-27T16:15Z",
  42302. "lastModifiedDate" : "2021-05-06T12:47Z"
  42303. }, {
  42304. "cve" : {
  42305. "data_type" : "CVE",
  42306. "data_format" : "MITRE",
  42307. "data_version" : "4.0",
  42308. "CVE_data_meta" : {
  42309. "ID" : "CVE-2021-3451",
  42310. "ASSIGNER" : "psirt@lenovo.com"
  42311. },
  42312. "problemtype" : {
  42313. "problemtype_data" : [ {
  42314. "description" : [ {
  42315. "lang" : "en",
  42316. "value" : "CWE-276"
  42317. } ]
  42318. } ]
  42319. },
  42320. "references" : {
  42321. "reference_data" : [ {
  42322. "url" : "https://iknow.lenovo.com.cn/detail/dc_196156.html",
  42323. "name" : "https://iknow.lenovo.com.cn/detail/dc_196156.html",
  42324. "refsource" : "MISC",
  42325. "tags" : [ "Vendor Advisory" ]
  42326. } ]
  42327. },
  42328. "description" : {
  42329. "description_data" : [ {
  42330. "lang" : "en",
  42331. "value" : "A denial of service vulnerability was reported in Lenovo PCManager, prior to version 3.0.400.3252, that could allow configuration files to be written to non-standard locations."
  42332. } ]
  42333. }
  42334. },
  42335. "configurations" : {
  42336. "CVE_data_version" : "4.0",
  42337. "nodes" : [ {
  42338. "operator" : "OR",
  42339. "children" : [ ],
  42340. "cpe_match" : [ {
  42341. "vulnerable" : true,
  42342. "cpe23Uri" : "cpe:2.3:a:lenovo:pcmanager:*:*:*:*:*:*:*:*",
  42343. "versionEndExcluding" : "3.0.400.3252",
  42344. "cpe_name" : [ ]
  42345. } ]
  42346. } ]
  42347. },
  42348. "impact" : {
  42349. "baseMetricV3" : {
  42350. "cvssV3" : {
  42351. "version" : "3.1",
  42352. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  42353. "attackVector" : "LOCAL",
  42354. "attackComplexity" : "LOW",
  42355. "privilegesRequired" : "LOW",
  42356. "userInteraction" : "NONE",
  42357. "scope" : "UNCHANGED",
  42358. "confidentialityImpact" : "NONE",
  42359. "integrityImpact" : "NONE",
  42360. "availabilityImpact" : "HIGH",
  42361. "baseScore" : 5.5,
  42362. "baseSeverity" : "MEDIUM"
  42363. },
  42364. "exploitabilityScore" : 1.8,
  42365. "impactScore" : 3.6
  42366. },
  42367. "baseMetricV2" : {
  42368. "cvssV2" : {
  42369. "version" : "2.0",
  42370. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:P",
  42371. "accessVector" : "LOCAL",
  42372. "accessComplexity" : "LOW",
  42373. "authentication" : "NONE",
  42374. "confidentialityImpact" : "NONE",
  42375. "integrityImpact" : "NONE",
  42376. "availabilityImpact" : "PARTIAL",
  42377. "baseScore" : 2.1
  42378. },
  42379. "severity" : "LOW",
  42380. "exploitabilityScore" : 3.9,
  42381. "impactScore" : 2.9,
  42382. "acInsufInfo" : false,
  42383. "obtainAllPrivilege" : false,
  42384. "obtainUserPrivilege" : false,
  42385. "obtainOtherPrivilege" : false,
  42386. "userInteractionRequired" : false
  42387. }
  42388. },
  42389. "publishedDate" : "2021-04-27T16:15Z",
  42390. "lastModifiedDate" : "2021-05-06T12:47Z"
  42391. }, {
  42392. "cve" : {
  42393. "data_type" : "CVE",
  42394. "data_format" : "MITRE",
  42395. "data_version" : "4.0",
  42396. "CVE_data_meta" : {
  42397. "ID" : "CVE-2021-30642",
  42398. "ASSIGNER" : "secure@symantec.com"
  42399. },
  42400. "problemtype" : {
  42401. "problemtype_data" : [ {
  42402. "description" : [ {
  42403. "lang" : "en",
  42404. "value" : "CWE-78"
  42405. } ]
  42406. } ]
  42407. },
  42408. "references" : {
  42409. "reference_data" : [ {
  42410. "url" : "https://support.broadcom.com/security-advisory/content/security-advisories/0/SYMSA17969",
  42411. "name" : "https://support.broadcom.com/security-advisory/content/security-advisories/0/SYMSA17969",
  42412. "refsource" : "MISC",
  42413. "tags" : [ "Third Party Advisory" ]
  42414. } ]
  42415. },
  42416. "description" : {
  42417. "description_data" : [ {
  42418. "lang" : "en",
  42419. "value" : "An input validation flaw in the Symantec Security Analytics web UI 7.2 prior 7.2.7, 8.1, prior to 8.1.3-NSR3, 8.2, prior to 8.2.1-NSR2 or 8.2.2 allows a remote, unauthenticated attacker to execute arbitrary OS commands on the target with elevated privileges."
  42420. } ]
  42421. }
  42422. },
  42423. "configurations" : {
  42424. "CVE_data_version" : "4.0",
  42425. "nodes" : [ {
  42426. "operator" : "OR",
  42427. "children" : [ ],
  42428. "cpe_match" : [ {
  42429. "vulnerable" : true,
  42430. "cpe23Uri" : "cpe:2.3:a:symantec:security_analytics:*:*:*:*:*:*:*:*",
  42431. "versionStartIncluding" : "7.2",
  42432. "versionEndExcluding" : "7.2.7",
  42433. "cpe_name" : [ ]
  42434. }, {
  42435. "vulnerable" : true,
  42436. "cpe23Uri" : "cpe:2.3:a:symantec:security_analytics:*:*:*:*:*:*:*:*",
  42437. "versionStartIncluding" : "8.1",
  42438. "versionEndExcluding" : "8.1.3-nsr3",
  42439. "cpe_name" : [ ]
  42440. }, {
  42441. "vulnerable" : true,
  42442. "cpe23Uri" : "cpe:2.3:a:symantec:security_analytics:*:*:*:*:*:*:*:*",
  42443. "versionStartIncluding" : "8.2",
  42444. "versionEndExcluding" : "8.2.2",
  42445. "cpe_name" : [ ]
  42446. } ]
  42447. } ]
  42448. },
  42449. "impact" : {
  42450. "baseMetricV3" : {
  42451. "cvssV3" : {
  42452. "version" : "3.1",
  42453. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  42454. "attackVector" : "NETWORK",
  42455. "attackComplexity" : "LOW",
  42456. "privilegesRequired" : "NONE",
  42457. "userInteraction" : "NONE",
  42458. "scope" : "UNCHANGED",
  42459. "confidentialityImpact" : "HIGH",
  42460. "integrityImpact" : "HIGH",
  42461. "availabilityImpact" : "HIGH",
  42462. "baseScore" : 9.8,
  42463. "baseSeverity" : "CRITICAL"
  42464. },
  42465. "exploitabilityScore" : 3.9,
  42466. "impactScore" : 5.9
  42467. },
  42468. "baseMetricV2" : {
  42469. "cvssV2" : {
  42470. "version" : "2.0",
  42471. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  42472. "accessVector" : "NETWORK",
  42473. "accessComplexity" : "LOW",
  42474. "authentication" : "NONE",
  42475. "confidentialityImpact" : "COMPLETE",
  42476. "integrityImpact" : "COMPLETE",
  42477. "availabilityImpact" : "COMPLETE",
  42478. "baseScore" : 10.0
  42479. },
  42480. "severity" : "HIGH",
  42481. "exploitabilityScore" : 10.0,
  42482. "impactScore" : 10.0,
  42483. "acInsufInfo" : false,
  42484. "obtainAllPrivilege" : false,
  42485. "obtainUserPrivilege" : false,
  42486. "obtainOtherPrivilege" : false,
  42487. "userInteractionRequired" : false
  42488. }
  42489. },
  42490. "publishedDate" : "2021-04-27T15:15Z",
  42491. "lastModifiedDate" : "2021-05-07T16:21Z"
  42492. }, {
  42493. "cve" : {
  42494. "data_type" : "CVE",
  42495. "data_format" : "MITRE",
  42496. "data_version" : "4.0",
  42497. "CVE_data_meta" : {
  42498. "ID" : "CVE-2021-28269",
  42499. "ASSIGNER" : "cve@mitre.org"
  42500. },
  42501. "problemtype" : {
  42502. "problemtype_data" : [ {
  42503. "description" : [ {
  42504. "lang" : "en",
  42505. "value" : "CWE-269"
  42506. } ]
  42507. } ]
  42508. },
  42509. "references" : {
  42510. "reference_data" : [ {
  42511. "url" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5634.php",
  42512. "name" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5634.php",
  42513. "refsource" : "MISC",
  42514. "tags" : [ "Exploit", "Third Party Advisory" ]
  42515. }, {
  42516. "url" : "https://www.zeroscience.mk/en/vulnerabilities",
  42517. "name" : "https://www.zeroscience.mk/en/vulnerabilities",
  42518. "refsource" : "MISC",
  42519. "tags" : [ "Exploit", "Third Party Advisory" ]
  42520. }, {
  42521. "url" : "https://www.exploit-db.com/exploits/49679",
  42522. "name" : "Exploit Database",
  42523. "refsource" : "EXPLOIT-DB",
  42524. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  42525. } ]
  42526. },
  42527. "description" : {
  42528. "description_data" : [ {
  42529. "lang" : "en",
  42530. "value" : "Soyal Technology 701Client 9.0.1 is vulnerable to Insecure permissions via client.exe binary with Authenticated Users group with Full permissions."
  42531. } ]
  42532. }
  42533. },
  42534. "configurations" : {
  42535. "CVE_data_version" : "4.0",
  42536. "nodes" : [ {
  42537. "operator" : "OR",
  42538. "children" : [ ],
  42539. "cpe_match" : [ {
  42540. "vulnerable" : true,
  42541. "cpe23Uri" : "cpe:2.3:a:soyal:701client:9.0.1:*:*:*:*:*:*:*",
  42542. "cpe_name" : [ ]
  42543. } ]
  42544. } ]
  42545. },
  42546. "impact" : {
  42547. "baseMetricV3" : {
  42548. "cvssV3" : {
  42549. "version" : "3.1",
  42550. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  42551. "attackVector" : "NETWORK",
  42552. "attackComplexity" : "LOW",
  42553. "privilegesRequired" : "LOW",
  42554. "userInteraction" : "NONE",
  42555. "scope" : "UNCHANGED",
  42556. "confidentialityImpact" : "HIGH",
  42557. "integrityImpact" : "HIGH",
  42558. "availabilityImpact" : "HIGH",
  42559. "baseScore" : 8.8,
  42560. "baseSeverity" : "HIGH"
  42561. },
  42562. "exploitabilityScore" : 2.8,
  42563. "impactScore" : 5.9
  42564. },
  42565. "baseMetricV2" : {
  42566. "cvssV2" : {
  42567. "version" : "2.0",
  42568. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  42569. "accessVector" : "NETWORK",
  42570. "accessComplexity" : "LOW",
  42571. "authentication" : "SINGLE",
  42572. "confidentialityImpact" : "PARTIAL",
  42573. "integrityImpact" : "PARTIAL",
  42574. "availabilityImpact" : "PARTIAL",
  42575. "baseScore" : 6.5
  42576. },
  42577. "severity" : "MEDIUM",
  42578. "exploitabilityScore" : 8.0,
  42579. "impactScore" : 6.4,
  42580. "acInsufInfo" : false,
  42581. "obtainAllPrivilege" : false,
  42582. "obtainUserPrivilege" : false,
  42583. "obtainOtherPrivilege" : false,
  42584. "userInteractionRequired" : false
  42585. }
  42586. },
  42587. "publishedDate" : "2021-04-27T15:15Z",
  42588. "lastModifiedDate" : "2021-05-07T16:20Z"
  42589. }, {
  42590. "cve" : {
  42591. "data_type" : "CVE",
  42592. "data_format" : "MITRE",
  42593. "data_version" : "4.0",
  42594. "CVE_data_meta" : {
  42595. "ID" : "CVE-2021-28271",
  42596. "ASSIGNER" : "cve@mitre.org"
  42597. },
  42598. "problemtype" : {
  42599. "problemtype_data" : [ {
  42600. "description" : [ {
  42601. "lang" : "en",
  42602. "value" : "CWE-276"
  42603. } ]
  42604. } ]
  42605. },
  42606. "references" : {
  42607. "reference_data" : [ {
  42608. "url" : "https://www.exploit-db.com/exploits/49678",
  42609. "name" : "Exploit Database",
  42610. "refsource" : "EXPLOIT-DB",
  42611. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  42612. }, {
  42613. "url" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5633.php",
  42614. "name" : "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5633.php",
  42615. "refsource" : "MISC",
  42616. "tags" : [ "Exploit", "Third Party Advisory" ]
  42617. }, {
  42618. "url" : "https://www.zeroscience.mk/en/vulnerabilities",
  42619. "name" : "https://www.zeroscience.mk/en/vulnerabilities",
  42620. "refsource" : "MISC",
  42621. "tags" : [ "Exploit", "Third Party Advisory" ]
  42622. } ]
  42623. },
  42624. "description" : {
  42625. "description_data" : [ {
  42626. "lang" : "en",
  42627. "value" : "Soyal Technologies SOYAL 701Server 9.0.1 suffers from an elevation of privileges vulnerability which can be used by an authenticated user to change the executable file with a binary choice. The vulnerability is due to improper permissions with the 'F' flag (Full) for 'Everyone'and 'Authenticated Users' group."
  42628. } ]
  42629. }
  42630. },
  42631. "configurations" : {
  42632. "CVE_data_version" : "4.0",
  42633. "nodes" : [ {
  42634. "operator" : "OR",
  42635. "children" : [ ],
  42636. "cpe_match" : [ {
  42637. "vulnerable" : true,
  42638. "cpe23Uri" : "cpe:2.3:a:soyal:701client:9.0.1:*:*:*:*:*:*:*",
  42639. "cpe_name" : [ ]
  42640. } ]
  42641. } ]
  42642. },
  42643. "impact" : {
  42644. "baseMetricV3" : {
  42645. "cvssV3" : {
  42646. "version" : "3.1",
  42647. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  42648. "attackVector" : "NETWORK",
  42649. "attackComplexity" : "LOW",
  42650. "privilegesRequired" : "LOW",
  42651. "userInteraction" : "NONE",
  42652. "scope" : "UNCHANGED",
  42653. "confidentialityImpact" : "HIGH",
  42654. "integrityImpact" : "HIGH",
  42655. "availabilityImpact" : "HIGH",
  42656. "baseScore" : 8.8,
  42657. "baseSeverity" : "HIGH"
  42658. },
  42659. "exploitabilityScore" : 2.8,
  42660. "impactScore" : 5.9
  42661. },
  42662. "baseMetricV2" : {
  42663. "cvssV2" : {
  42664. "version" : "2.0",
  42665. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  42666. "accessVector" : "NETWORK",
  42667. "accessComplexity" : "LOW",
  42668. "authentication" : "SINGLE",
  42669. "confidentialityImpact" : "PARTIAL",
  42670. "integrityImpact" : "PARTIAL",
  42671. "availabilityImpact" : "PARTIAL",
  42672. "baseScore" : 6.5
  42673. },
  42674. "severity" : "MEDIUM",
  42675. "exploitabilityScore" : 8.0,
  42676. "impactScore" : 6.4,
  42677. "acInsufInfo" : false,
  42678. "obtainAllPrivilege" : false,
  42679. "obtainUserPrivilege" : false,
  42680. "obtainOtherPrivilege" : false,
  42681. "userInteractionRequired" : false
  42682. }
  42683. },
  42684. "publishedDate" : "2021-04-27T13:15Z",
  42685. "lastModifiedDate" : "2021-05-07T16:18Z"
  42686. }, {
  42687. "cve" : {
  42688. "data_type" : "CVE",
  42689. "data_format" : "MITRE",
  42690. "data_version" : "4.0",
  42691. "CVE_data_meta" : {
  42692. "ID" : "CVE-2021-22660",
  42693. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  42694. },
  42695. "problemtype" : {
  42696. "problemtype_data" : [ {
  42697. "description" : [ {
  42698. "lang" : "en",
  42699. "value" : "CWE-125"
  42700. } ]
  42701. } ]
  42702. },
  42703. "references" : {
  42704. "reference_data" : [ {
  42705. "url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-110-05",
  42706. "name" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-110-05",
  42707. "refsource" : "MISC",
  42708. "tags" : [ "Third Party Advisory", "US Government Resource" ]
  42709. }, {
  42710. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-445/",
  42711. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-445/",
  42712. "refsource" : "MISC",
  42713. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  42714. }, {
  42715. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-446/",
  42716. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-446/",
  42717. "refsource" : "MISC",
  42718. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  42719. }, {
  42720. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-509/",
  42721. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-509/",
  42722. "refsource" : "MISC",
  42723. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  42724. } ]
  42725. },
  42726. "description" : {
  42727. "description_data" : [ {
  42728. "lang" : "en",
  42729. "value" : "CNCSoft-B Versions 1.0.0.3 and prior is vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code."
  42730. } ]
  42731. }
  42732. },
  42733. "configurations" : {
  42734. "CVE_data_version" : "4.0",
  42735. "nodes" : [ {
  42736. "operator" : "OR",
  42737. "children" : [ ],
  42738. "cpe_match" : [ {
  42739. "vulnerable" : true,
  42740. "cpe23Uri" : "cpe:2.3:a:criticalmanufacturing:cncsoft-b:*:*:*:*:*:*:*:*",
  42741. "versionEndIncluding" : "1.0.0.3",
  42742. "cpe_name" : [ ]
  42743. } ]
  42744. } ]
  42745. },
  42746. "impact" : {
  42747. "baseMetricV3" : {
  42748. "cvssV3" : {
  42749. "version" : "3.1",
  42750. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  42751. "attackVector" : "LOCAL",
  42752. "attackComplexity" : "LOW",
  42753. "privilegesRequired" : "NONE",
  42754. "userInteraction" : "REQUIRED",
  42755. "scope" : "UNCHANGED",
  42756. "confidentialityImpact" : "HIGH",
  42757. "integrityImpact" : "HIGH",
  42758. "availabilityImpact" : "HIGH",
  42759. "baseScore" : 7.8,
  42760. "baseSeverity" : "HIGH"
  42761. },
  42762. "exploitabilityScore" : 1.8,
  42763. "impactScore" : 5.9
  42764. },
  42765. "baseMetricV2" : {
  42766. "cvssV2" : {
  42767. "version" : "2.0",
  42768. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  42769. "accessVector" : "NETWORK",
  42770. "accessComplexity" : "MEDIUM",
  42771. "authentication" : "NONE",
  42772. "confidentialityImpact" : "PARTIAL",
  42773. "integrityImpact" : "PARTIAL",
  42774. "availabilityImpact" : "PARTIAL",
  42775. "baseScore" : 6.8
  42776. },
  42777. "severity" : "MEDIUM",
  42778. "exploitabilityScore" : 8.6,
  42779. "impactScore" : 6.4,
  42780. "acInsufInfo" : false,
  42781. "obtainAllPrivilege" : false,
  42782. "obtainUserPrivilege" : false,
  42783. "obtainOtherPrivilege" : false,
  42784. "userInteractionRequired" : true
  42785. }
  42786. },
  42787. "publishedDate" : "2021-04-27T13:15Z",
  42788. "lastModifiedDate" : "2021-05-07T16:13Z"
  42789. }, {
  42790. "cve" : {
  42791. "data_type" : "CVE",
  42792. "data_format" : "MITRE",
  42793. "data_version" : "4.0",
  42794. "CVE_data_meta" : {
  42795. "ID" : "CVE-2021-27480",
  42796. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  42797. },
  42798. "problemtype" : {
  42799. "problemtype_data" : [ {
  42800. "description" : [ {
  42801. "lang" : "en",
  42802. "value" : "CWE-121"
  42803. } ]
  42804. } ]
  42805. },
  42806. "references" : {
  42807. "reference_data" : [ {
  42808. "url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-110-03",
  42809. "name" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-110-03",
  42810. "refsource" : "MISC",
  42811. "tags" : [ "Third Party Advisory", "US Government Resource" ]
  42812. } ]
  42813. },
  42814. "description" : {
  42815. "description_data" : [ {
  42816. "lang" : "en",
  42817. "value" : "Delta Industrial Automation COMMGR Versions 1.12 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute remote code."
  42818. } ]
  42819. }
  42820. },
  42821. "configurations" : {
  42822. "CVE_data_version" : "4.0",
  42823. "nodes" : [ {
  42824. "operator" : "OR",
  42825. "children" : [ ],
  42826. "cpe_match" : [ {
  42827. "vulnerable" : true,
  42828. "cpe23Uri" : "cpe:2.3:a:deltaww:industrial_automation_commgr:*:*:*:*:*:*:*:*",
  42829. "versionEndIncluding" : "1.12:",
  42830. "cpe_name" : [ ]
  42831. } ]
  42832. } ]
  42833. },
  42834. "impact" : {
  42835. "baseMetricV3" : {
  42836. "cvssV3" : {
  42837. "version" : "3.1",
  42838. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  42839. "attackVector" : "NETWORK",
  42840. "attackComplexity" : "LOW",
  42841. "privilegesRequired" : "NONE",
  42842. "userInteraction" : "NONE",
  42843. "scope" : "UNCHANGED",
  42844. "confidentialityImpact" : "HIGH",
  42845. "integrityImpact" : "HIGH",
  42846. "availabilityImpact" : "HIGH",
  42847. "baseScore" : 9.8,
  42848. "baseSeverity" : "CRITICAL"
  42849. },
  42850. "exploitabilityScore" : 3.9,
  42851. "impactScore" : 5.9
  42852. },
  42853. "baseMetricV2" : {
  42854. "cvssV2" : {
  42855. "version" : "2.0",
  42856. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  42857. "accessVector" : "NETWORK",
  42858. "accessComplexity" : "LOW",
  42859. "authentication" : "NONE",
  42860. "confidentialityImpact" : "PARTIAL",
  42861. "integrityImpact" : "PARTIAL",
  42862. "availabilityImpact" : "PARTIAL",
  42863. "baseScore" : 7.5
  42864. },
  42865. "severity" : "HIGH",
  42866. "exploitabilityScore" : 10.0,
  42867. "impactScore" : 6.4,
  42868. "acInsufInfo" : false,
  42869. "obtainAllPrivilege" : false,
  42870. "obtainUserPrivilege" : false,
  42871. "obtainOtherPrivilege" : false,
  42872. "userInteractionRequired" : false
  42873. }
  42874. },
  42875. "publishedDate" : "2021-04-27T12:15Z",
  42876. "lastModifiedDate" : "2021-05-07T16:11Z"
  42877. }, {
  42878. "cve" : {
  42879. "data_type" : "CVE",
  42880. "data_format" : "MITRE",
  42881. "data_version" : "4.0",
  42882. "CVE_data_meta" : {
  42883. "ID" : "CVE-2020-35542",
  42884. "ASSIGNER" : "cve@mitre.org"
  42885. },
  42886. "problemtype" : {
  42887. "problemtype_data" : [ {
  42888. "description" : [ {
  42889. "lang" : "en",
  42890. "value" : "CWE-79"
  42891. } ]
  42892. } ]
  42893. },
  42894. "references" : {
  42895. "reference_data" : [ {
  42896. "url" : "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=61",
  42897. "name" : "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=61",
  42898. "refsource" : "MISC",
  42899. "tags" : [ "Vendor Advisory" ]
  42900. } ]
  42901. },
  42902. "description" : {
  42903. "description_data" : [ {
  42904. "lang" : "en",
  42905. "value" : "Unisys Data Exchange Management Studio through 5.0.34 doesn't sanitize the input to a HTML document field. This could be used for an XSS attack."
  42906. } ]
  42907. }
  42908. },
  42909. "configurations" : {
  42910. "CVE_data_version" : "4.0",
  42911. "nodes" : [ {
  42912. "operator" : "OR",
  42913. "children" : [ ],
  42914. "cpe_match" : [ {
  42915. "vulnerable" : true,
  42916. "cpe23Uri" : "cpe:2.3:a:unisys:data_exchange_management_studio:*:*:*:*:*:*:*:*",
  42917. "versionEndIncluding" : "5.0.34",
  42918. "cpe_name" : [ ]
  42919. } ]
  42920. } ]
  42921. },
  42922. "impact" : {
  42923. "baseMetricV3" : {
  42924. "cvssV3" : {
  42925. "version" : "3.1",
  42926. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  42927. "attackVector" : "NETWORK",
  42928. "attackComplexity" : "LOW",
  42929. "privilegesRequired" : "LOW",
  42930. "userInteraction" : "REQUIRED",
  42931. "scope" : "CHANGED",
  42932. "confidentialityImpact" : "LOW",
  42933. "integrityImpact" : "LOW",
  42934. "availabilityImpact" : "NONE",
  42935. "baseScore" : 5.4,
  42936. "baseSeverity" : "MEDIUM"
  42937. },
  42938. "exploitabilityScore" : 2.3,
  42939. "impactScore" : 2.7
  42940. },
  42941. "baseMetricV2" : {
  42942. "cvssV2" : {
  42943. "version" : "2.0",
  42944. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  42945. "accessVector" : "NETWORK",
  42946. "accessComplexity" : "MEDIUM",
  42947. "authentication" : "SINGLE",
  42948. "confidentialityImpact" : "NONE",
  42949. "integrityImpact" : "PARTIAL",
  42950. "availabilityImpact" : "NONE",
  42951. "baseScore" : 3.5
  42952. },
  42953. "severity" : "LOW",
  42954. "exploitabilityScore" : 6.8,
  42955. "impactScore" : 2.9,
  42956. "acInsufInfo" : false,
  42957. "obtainAllPrivilege" : false,
  42958. "obtainUserPrivilege" : false,
  42959. "obtainOtherPrivilege" : false,
  42960. "userInteractionRequired" : true
  42961. }
  42962. },
  42963. "publishedDate" : "2021-04-27T11:15Z",
  42964. "lastModifiedDate" : "2021-05-06T16:46Z"
  42965. }, {
  42966. "cve" : {
  42967. "data_type" : "CVE",
  42968. "data_format" : "MITRE",
  42969. "data_version" : "4.0",
  42970. "CVE_data_meta" : {
  42971. "ID" : "CVE-2021-28125",
  42972. "ASSIGNER" : "security@apache.org"
  42973. },
  42974. "problemtype" : {
  42975. "problemtype_data" : [ {
  42976. "description" : [ {
  42977. "lang" : "en",
  42978. "value" : "CWE-601"
  42979. } ]
  42980. } ]
  42981. },
  42982. "references" : {
  42983. "reference_data" : [ {
  42984. "url" : "https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434%40%3Cdev.superset.apache.org%3E",
  42985. "name" : "https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434%40%3Cdev.superset.apache.org%3E",
  42986. "refsource" : "MISC",
  42987. "tags" : [ "Mailing List", "Third Party Advisory" ]
  42988. }, {
  42989. "url" : "https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434@%3Cdev.superset.apache.org%3E",
  42990. "name" : "[superset-dev] 20210427 CVE-2021-28125: Apache Superset Open Redirect",
  42991. "refsource" : "MLIST",
  42992. "tags" : [ "Mailing List", "Third Party Advisory" ]
  42993. }, {
  42994. "url" : "http://www.openwall.com/lists/oss-security/2021/04/27/2",
  42995. "name" : "[oss-security] 20210427 CVE-2021-28125: Apache Superset Open Redirect",
  42996. "refsource" : "MLIST",
  42997. "tags" : [ "Mailing List", "Third Party Advisory" ]
  42998. } ]
  42999. },
  43000. "description" : {
  43001. "description_data" : [ {
  43002. "lang" : "en",
  43003. "value" : "Apache Superset up to and including 1.0.1 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link."
  43004. } ]
  43005. }
  43006. },
  43007. "configurations" : {
  43008. "CVE_data_version" : "4.0",
  43009. "nodes" : [ {
  43010. "operator" : "OR",
  43011. "children" : [ ],
  43012. "cpe_match" : [ {
  43013. "vulnerable" : true,
  43014. "cpe23Uri" : "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
  43015. "versionEndIncluding" : "1.0.1",
  43016. "cpe_name" : [ ]
  43017. } ]
  43018. } ]
  43019. },
  43020. "impact" : {
  43021. "baseMetricV3" : {
  43022. "cvssV3" : {
  43023. "version" : "3.1",
  43024. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  43025. "attackVector" : "NETWORK",
  43026. "attackComplexity" : "LOW",
  43027. "privilegesRequired" : "NONE",
  43028. "userInteraction" : "REQUIRED",
  43029. "scope" : "CHANGED",
  43030. "confidentialityImpact" : "LOW",
  43031. "integrityImpact" : "LOW",
  43032. "availabilityImpact" : "NONE",
  43033. "baseScore" : 6.1,
  43034. "baseSeverity" : "MEDIUM"
  43035. },
  43036. "exploitabilityScore" : 2.8,
  43037. "impactScore" : 2.7
  43038. },
  43039. "baseMetricV2" : {
  43040. "cvssV2" : {
  43041. "version" : "2.0",
  43042. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:N",
  43043. "accessVector" : "NETWORK",
  43044. "accessComplexity" : "MEDIUM",
  43045. "authentication" : "NONE",
  43046. "confidentialityImpact" : "PARTIAL",
  43047. "integrityImpact" : "PARTIAL",
  43048. "availabilityImpact" : "NONE",
  43049. "baseScore" : 5.8
  43050. },
  43051. "severity" : "MEDIUM",
  43052. "exploitabilityScore" : 8.6,
  43053. "impactScore" : 4.9,
  43054. "acInsufInfo" : false,
  43055. "obtainAllPrivilege" : false,
  43056. "obtainUserPrivilege" : false,
  43057. "obtainOtherPrivilege" : false,
  43058. "userInteractionRequired" : true
  43059. }
  43060. },
  43061. "publishedDate" : "2021-04-27T10:15Z",
  43062. "lastModifiedDate" : "2021-05-07T17:57Z"
  43063. }, {
  43064. "cve" : {
  43065. "data_type" : "CVE",
  43066. "data_format" : "MITRE",
  43067. "data_version" : "4.0",
  43068. "CVE_data_meta" : {
  43069. "ID" : "CVE-2020-17517",
  43070. "ASSIGNER" : "security@apache.org"
  43071. },
  43072. "problemtype" : {
  43073. "problemtype_data" : [ {
  43074. "description" : [ {
  43075. "lang" : "en",
  43076. "value" : "CWE-862"
  43077. } ]
  43078. } ]
  43079. },
  43080. "references" : {
  43081. "reference_data" : [ {
  43082. "url" : "https://lists.apache.org/thread.html/rdd59a176b32c63f7fc0865428bf9bbc69297fa17f6130c80c25869aa%40%3Cdev.ozone.apache.org%3E",
  43083. "name" : "https://lists.apache.org/thread.html/rdd59a176b32c63f7fc0865428bf9bbc69297fa17f6130c80c25869aa%40%3Cdev.ozone.apache.org%3E",
  43084. "refsource" : "MISC",
  43085. "tags" : [ "Mailing List", "Vendor Advisory" ]
  43086. } ]
  43087. },
  43088. "description" : {
  43089. "description_data" : [ {
  43090. "lang" : "en",
  43091. "value" : "The S3 buckets and keys in a secure Apache Ozone Cluster must be inaccessible to anonymous access by default. The current security vulnerability allows access to keys and buckets through a curl command or an unauthenticated HTTP request. This enables unauthorized access to buckets and keys thereby exposing data to anonymous clients or users. This affected Apache Ozone prior to the 1.1.0 release."
  43092. } ]
  43093. }
  43094. },
  43095. "configurations" : {
  43096. "CVE_data_version" : "4.0",
  43097. "nodes" : [ {
  43098. "operator" : "OR",
  43099. "children" : [ ],
  43100. "cpe_match" : [ {
  43101. "vulnerable" : true,
  43102. "cpe23Uri" : "cpe:2.3:a:apache:ozone:*:*:*:*:*:*:*:*",
  43103. "versionEndExcluding" : "1.1.0",
  43104. "cpe_name" : [ ]
  43105. } ]
  43106. } ]
  43107. },
  43108. "impact" : {
  43109. "baseMetricV3" : {
  43110. "cvssV3" : {
  43111. "version" : "3.1",
  43112. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  43113. "attackVector" : "NETWORK",
  43114. "attackComplexity" : "LOW",
  43115. "privilegesRequired" : "NONE",
  43116. "userInteraction" : "NONE",
  43117. "scope" : "UNCHANGED",
  43118. "confidentialityImpact" : "HIGH",
  43119. "integrityImpact" : "NONE",
  43120. "availabilityImpact" : "NONE",
  43121. "baseScore" : 7.5,
  43122. "baseSeverity" : "HIGH"
  43123. },
  43124. "exploitabilityScore" : 3.9,
  43125. "impactScore" : 3.6
  43126. },
  43127. "baseMetricV2" : {
  43128. "cvssV2" : {
  43129. "version" : "2.0",
  43130. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  43131. "accessVector" : "NETWORK",
  43132. "accessComplexity" : "LOW",
  43133. "authentication" : "NONE",
  43134. "confidentialityImpact" : "PARTIAL",
  43135. "integrityImpact" : "NONE",
  43136. "availabilityImpact" : "NONE",
  43137. "baseScore" : 5.0
  43138. },
  43139. "severity" : "MEDIUM",
  43140. "exploitabilityScore" : 10.0,
  43141. "impactScore" : 2.9,
  43142. "acInsufInfo" : false,
  43143. "obtainAllPrivilege" : false,
  43144. "obtainUserPrivilege" : false,
  43145. "obtainOtherPrivilege" : false,
  43146. "userInteractionRequired" : false
  43147. }
  43148. },
  43149. "publishedDate" : "2021-04-27T09:15Z",
  43150. "lastModifiedDate" : "2021-05-07T17:53Z"
  43151. }, {
  43152. "cve" : {
  43153. "data_type" : "CVE",
  43154. "data_format" : "MITRE",
  43155. "data_version" : "4.0",
  43156. "CVE_data_meta" : {
  43157. "ID" : "CVE-2021-20715",
  43158. "ASSIGNER" : "vultures@jpcert.or.jp"
  43159. },
  43160. "problemtype" : {
  43161. "problemtype_data" : [ {
  43162. "description" : [ {
  43163. "lang" : "en",
  43164. "value" : "CWE-863"
  43165. } ]
  43166. } ]
  43167. },
  43168. "references" : {
  43169. "reference_data" : [ {
  43170. "url" : "https://jvn.jp/en/jp/JVN97434260/index.html",
  43171. "name" : "https://jvn.jp/en/jp/JVN97434260/index.html",
  43172. "refsource" : "MISC",
  43173. "tags" : [ "Third Party Advisory" ]
  43174. } ]
  43175. },
  43176. "description" : {
  43177. "description_data" : [ {
  43178. "lang" : "en",
  43179. "value" : "Improper access control vulnerability in Hot Pepper Gourmet App for Android ver.4.111.0 and earlier, and for iOS ver.4.111.0 and earlier allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App."
  43180. } ]
  43181. }
  43182. },
  43183. "configurations" : {
  43184. "CVE_data_version" : "4.0",
  43185. "nodes" : [ {
  43186. "operator" : "OR",
  43187. "children" : [ ],
  43188. "cpe_match" : [ {
  43189. "vulnerable" : true,
  43190. "cpe23Uri" : "cpe:2.3:a:recruit-holdings:hot_pepper_gourmet:*:*:*:*:*:android:*:*",
  43191. "versionEndIncluding" : "4.111.0",
  43192. "cpe_name" : [ ]
  43193. }, {
  43194. "vulnerable" : true,
  43195. "cpe23Uri" : "cpe:2.3:a:recruit-holdings:hot_pepper_gourmet:*:*:*:*:*:iphone_os:*:*",
  43196. "versionEndIncluding" : "4.111.0",
  43197. "cpe_name" : [ ]
  43198. } ]
  43199. } ]
  43200. },
  43201. "impact" : {
  43202. "baseMetricV3" : {
  43203. "cvssV3" : {
  43204. "version" : "3.1",
  43205. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
  43206. "attackVector" : "NETWORK",
  43207. "attackComplexity" : "LOW",
  43208. "privilegesRequired" : "NONE",
  43209. "userInteraction" : "REQUIRED",
  43210. "scope" : "UNCHANGED",
  43211. "confidentialityImpact" : "NONE",
  43212. "integrityImpact" : "LOW",
  43213. "availabilityImpact" : "NONE",
  43214. "baseScore" : 4.3,
  43215. "baseSeverity" : "MEDIUM"
  43216. },
  43217. "exploitabilityScore" : 2.8,
  43218. "impactScore" : 1.4
  43219. },
  43220. "baseMetricV2" : {
  43221. "cvssV2" : {
  43222. "version" : "2.0",
  43223. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  43224. "accessVector" : "NETWORK",
  43225. "accessComplexity" : "MEDIUM",
  43226. "authentication" : "NONE",
  43227. "confidentialityImpact" : "NONE",
  43228. "integrityImpact" : "PARTIAL",
  43229. "availabilityImpact" : "NONE",
  43230. "baseScore" : 4.3
  43231. },
  43232. "severity" : "MEDIUM",
  43233. "exploitabilityScore" : 8.6,
  43234. "impactScore" : 2.9,
  43235. "acInsufInfo" : false,
  43236. "obtainAllPrivilege" : false,
  43237. "obtainUserPrivilege" : false,
  43238. "obtainOtherPrivilege" : false,
  43239. "userInteractionRequired" : true
  43240. }
  43241. },
  43242. "publishedDate" : "2021-04-27T06:15Z",
  43243. "lastModifiedDate" : "2021-05-07T13:48Z"
  43244. }, {
  43245. "cve" : {
  43246. "data_type" : "CVE",
  43247. "data_format" : "MITRE",
  43248. "data_version" : "4.0",
  43249. "CVE_data_meta" : {
  43250. "ID" : "CVE-2021-20714",
  43251. "ASSIGNER" : "vultures@jpcert.or.jp"
  43252. },
  43253. "problemtype" : {
  43254. "problemtype_data" : [ {
  43255. "description" : [ {
  43256. "lang" : "en",
  43257. "value" : "CWE-22"
  43258. } ]
  43259. } ]
  43260. },
  43261. "references" : {
  43262. "reference_data" : [ {
  43263. "url" : "https://www.wpfastestcache.com/",
  43264. "name" : "https://www.wpfastestcache.com/",
  43265. "refsource" : "MISC",
  43266. "tags" : [ "Product" ]
  43267. }, {
  43268. "url" : "https://wordpress.org/plugins/wp-fastest-cache/",
  43269. "name" : "https://wordpress.org/plugins/wp-fastest-cache/",
  43270. "refsource" : "MISC",
  43271. "tags" : [ "Product" ]
  43272. }, {
  43273. "url" : "https://jvn.jp/en/jp/JVN35240327/index.html",
  43274. "name" : "https://jvn.jp/en/jp/JVN35240327/index.html",
  43275. "refsource" : "MISC",
  43276. "tags" : [ "Third Party Advisory" ]
  43277. } ]
  43278. },
  43279. "description" : {
  43280. "description_data" : [ {
  43281. "lang" : "en",
  43282. "value" : "Directory traversal vulnerability in WP Fastest Cache versions prior to 0.9.1.7 allows a remote attacker with administrator privileges to delete arbitrary files on the server via unspecified vectors."
  43283. } ]
  43284. }
  43285. },
  43286. "configurations" : {
  43287. "CVE_data_version" : "4.0",
  43288. "nodes" : [ {
  43289. "operator" : "OR",
  43290. "children" : [ ],
  43291. "cpe_match" : [ {
  43292. "vulnerable" : true,
  43293. "cpe23Uri" : "cpe:2.3:a:wpfastestcache:wp_fastest_cache:*:*:*:*:*:wordpress:*:*",
  43294. "versionEndExcluding" : "0.9.1.7",
  43295. "cpe_name" : [ ]
  43296. } ]
  43297. } ]
  43298. },
  43299. "impact" : {
  43300. "baseMetricV3" : {
  43301. "cvssV3" : {
  43302. "version" : "3.1",
  43303. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
  43304. "attackVector" : "NETWORK",
  43305. "attackComplexity" : "LOW",
  43306. "privilegesRequired" : "HIGH",
  43307. "userInteraction" : "NONE",
  43308. "scope" : "UNCHANGED",
  43309. "confidentialityImpact" : "NONE",
  43310. "integrityImpact" : "HIGH",
  43311. "availabilityImpact" : "HIGH",
  43312. "baseScore" : 6.5,
  43313. "baseSeverity" : "MEDIUM"
  43314. },
  43315. "exploitabilityScore" : 1.2,
  43316. "impactScore" : 5.2
  43317. },
  43318. "baseMetricV2" : {
  43319. "cvssV2" : {
  43320. "version" : "2.0",
  43321. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:P",
  43322. "accessVector" : "NETWORK",
  43323. "accessComplexity" : "LOW",
  43324. "authentication" : "SINGLE",
  43325. "confidentialityImpact" : "NONE",
  43326. "integrityImpact" : "PARTIAL",
  43327. "availabilityImpact" : "PARTIAL",
  43328. "baseScore" : 5.5
  43329. },
  43330. "severity" : "MEDIUM",
  43331. "exploitabilityScore" : 8.0,
  43332. "impactScore" : 4.9,
  43333. "acInsufInfo" : false,
  43334. "obtainAllPrivilege" : false,
  43335. "obtainUserPrivilege" : false,
  43336. "obtainOtherPrivilege" : false,
  43337. "userInteractionRequired" : false
  43338. }
  43339. },
  43340. "publishedDate" : "2021-04-27T06:15Z",
  43341. "lastModifiedDate" : "2021-05-06T16:55Z"
  43342. }, {
  43343. "cve" : {
  43344. "data_type" : "CVE",
  43345. "data_format" : "MITRE",
  43346. "data_version" : "4.0",
  43347. "CVE_data_meta" : {
  43348. "ID" : "CVE-2019-25042",
  43349. "ASSIGNER" : "cve@mitre.org"
  43350. },
  43351. "problemtype" : {
  43352. "problemtype_data" : [ {
  43353. "description" : [ {
  43354. "lang" : "en",
  43355. "value" : "CWE-787"
  43356. } ]
  43357. } ]
  43358. },
  43359. "references" : {
  43360. "reference_data" : [ {
  43361. "url" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43362. "name" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43363. "refsource" : "MISC",
  43364. "tags" : [ "Not Applicable", "Third Party Advisory" ]
  43365. }, {
  43366. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html",
  43367. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update",
  43368. "refsource" : "MLIST",
  43369. "tags" : [ ]
  43370. }, {
  43371. "url" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43372. "name" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43373. "refsource" : "CONFIRM",
  43374. "tags" : [ ]
  43375. } ]
  43376. },
  43377. "description" : {
  43378. "description_data" : [ {
  43379. "lang" : "en",
  43380. "value" : "Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy."
  43381. } ]
  43382. }
  43383. },
  43384. "configurations" : {
  43385. "CVE_data_version" : "4.0",
  43386. "nodes" : [ {
  43387. "operator" : "OR",
  43388. "children" : [ ],
  43389. "cpe_match" : [ {
  43390. "vulnerable" : true,
  43391. "cpe23Uri" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
  43392. "versionEndExcluding" : "1.9.5",
  43393. "cpe_name" : [ ]
  43394. } ]
  43395. } ]
  43396. },
  43397. "impact" : {
  43398. "baseMetricV3" : {
  43399. "cvssV3" : {
  43400. "version" : "3.1",
  43401. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  43402. "attackVector" : "NETWORK",
  43403. "attackComplexity" : "LOW",
  43404. "privilegesRequired" : "NONE",
  43405. "userInteraction" : "NONE",
  43406. "scope" : "UNCHANGED",
  43407. "confidentialityImpact" : "HIGH",
  43408. "integrityImpact" : "HIGH",
  43409. "availabilityImpact" : "HIGH",
  43410. "baseScore" : 9.8,
  43411. "baseSeverity" : "CRITICAL"
  43412. },
  43413. "exploitabilityScore" : 3.9,
  43414. "impactScore" : 5.9
  43415. },
  43416. "baseMetricV2" : {
  43417. "cvssV2" : {
  43418. "version" : "2.0",
  43419. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  43420. "accessVector" : "NETWORK",
  43421. "accessComplexity" : "LOW",
  43422. "authentication" : "NONE",
  43423. "confidentialityImpact" : "PARTIAL",
  43424. "integrityImpact" : "PARTIAL",
  43425. "availabilityImpact" : "PARTIAL",
  43426. "baseScore" : 7.5
  43427. },
  43428. "severity" : "HIGH",
  43429. "exploitabilityScore" : 10.0,
  43430. "impactScore" : 6.4,
  43431. "acInsufInfo" : false,
  43432. "obtainAllPrivilege" : false,
  43433. "obtainUserPrivilege" : false,
  43434. "obtainOtherPrivilege" : false,
  43435. "userInteractionRequired" : false
  43436. }
  43437. },
  43438. "publishedDate" : "2021-04-27T06:15Z",
  43439. "lastModifiedDate" : "2021-05-07T05:15Z"
  43440. }, {
  43441. "cve" : {
  43442. "data_type" : "CVE",
  43443. "data_format" : "MITRE",
  43444. "data_version" : "4.0",
  43445. "CVE_data_meta" : {
  43446. "ID" : "CVE-2019-25041",
  43447. "ASSIGNER" : "cve@mitre.org"
  43448. },
  43449. "problemtype" : {
  43450. "problemtype_data" : [ {
  43451. "description" : [ {
  43452. "lang" : "en",
  43453. "value" : "CWE-617"
  43454. } ]
  43455. } ]
  43456. },
  43457. "references" : {
  43458. "reference_data" : [ {
  43459. "url" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43460. "name" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43461. "refsource" : "MISC",
  43462. "tags" : [ "Patch", "Third Party Advisory" ]
  43463. }, {
  43464. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html",
  43465. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update",
  43466. "refsource" : "MLIST",
  43467. "tags" : [ ]
  43468. }, {
  43469. "url" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43470. "name" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43471. "refsource" : "CONFIRM",
  43472. "tags" : [ ]
  43473. } ]
  43474. },
  43475. "description" : {
  43476. "description_data" : [ {
  43477. "lang" : "en",
  43478. "value" : "Unbound before 1.9.5 allows an assertion failure via a compressed name in dname_pkt_copy."
  43479. } ]
  43480. }
  43481. },
  43482. "configurations" : {
  43483. "CVE_data_version" : "4.0",
  43484. "nodes" : [ {
  43485. "operator" : "OR",
  43486. "children" : [ ],
  43487. "cpe_match" : [ {
  43488. "vulnerable" : true,
  43489. "cpe23Uri" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
  43490. "versionEndExcluding" : "1.9.5",
  43491. "cpe_name" : [ ]
  43492. } ]
  43493. } ]
  43494. },
  43495. "impact" : {
  43496. "baseMetricV3" : {
  43497. "cvssV3" : {
  43498. "version" : "3.1",
  43499. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  43500. "attackVector" : "NETWORK",
  43501. "attackComplexity" : "LOW",
  43502. "privilegesRequired" : "NONE",
  43503. "userInteraction" : "NONE",
  43504. "scope" : "UNCHANGED",
  43505. "confidentialityImpact" : "NONE",
  43506. "integrityImpact" : "NONE",
  43507. "availabilityImpact" : "HIGH",
  43508. "baseScore" : 7.5,
  43509. "baseSeverity" : "HIGH"
  43510. },
  43511. "exploitabilityScore" : 3.9,
  43512. "impactScore" : 3.6
  43513. },
  43514. "baseMetricV2" : {
  43515. "cvssV2" : {
  43516. "version" : "2.0",
  43517. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  43518. "accessVector" : "NETWORK",
  43519. "accessComplexity" : "LOW",
  43520. "authentication" : "NONE",
  43521. "confidentialityImpact" : "NONE",
  43522. "integrityImpact" : "NONE",
  43523. "availabilityImpact" : "PARTIAL",
  43524. "baseScore" : 5.0
  43525. },
  43526. "severity" : "MEDIUM",
  43527. "exploitabilityScore" : 10.0,
  43528. "impactScore" : 2.9,
  43529. "acInsufInfo" : false,
  43530. "obtainAllPrivilege" : false,
  43531. "obtainUserPrivilege" : false,
  43532. "obtainOtherPrivilege" : false,
  43533. "userInteractionRequired" : false
  43534. }
  43535. },
  43536. "publishedDate" : "2021-04-27T06:15Z",
  43537. "lastModifiedDate" : "2021-05-07T05:15Z"
  43538. }, {
  43539. "cve" : {
  43540. "data_type" : "CVE",
  43541. "data_format" : "MITRE",
  43542. "data_version" : "4.0",
  43543. "CVE_data_meta" : {
  43544. "ID" : "CVE-2019-25040",
  43545. "ASSIGNER" : "cve@mitre.org"
  43546. },
  43547. "problemtype" : {
  43548. "problemtype_data" : [ {
  43549. "description" : [ {
  43550. "lang" : "en",
  43551. "value" : "CWE-835"
  43552. } ]
  43553. } ]
  43554. },
  43555. "references" : {
  43556. "reference_data" : [ {
  43557. "url" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43558. "name" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43559. "refsource" : "MISC",
  43560. "tags" : [ "Patch", "Third Party Advisory" ]
  43561. }, {
  43562. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html",
  43563. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update",
  43564. "refsource" : "MLIST",
  43565. "tags" : [ ]
  43566. }, {
  43567. "url" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43568. "name" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43569. "refsource" : "CONFIRM",
  43570. "tags" : [ ]
  43571. } ]
  43572. },
  43573. "description" : {
  43574. "description_data" : [ {
  43575. "lang" : "en",
  43576. "value" : "Unbound before 1.9.5 allows an infinite loop via a compressed name in dname_pkt_copy."
  43577. } ]
  43578. }
  43579. },
  43580. "configurations" : {
  43581. "CVE_data_version" : "4.0",
  43582. "nodes" : [ {
  43583. "operator" : "OR",
  43584. "children" : [ ],
  43585. "cpe_match" : [ {
  43586. "vulnerable" : true,
  43587. "cpe23Uri" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
  43588. "versionEndExcluding" : "1.9.5",
  43589. "cpe_name" : [ ]
  43590. } ]
  43591. } ]
  43592. },
  43593. "impact" : {
  43594. "baseMetricV3" : {
  43595. "cvssV3" : {
  43596. "version" : "3.1",
  43597. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  43598. "attackVector" : "NETWORK",
  43599. "attackComplexity" : "LOW",
  43600. "privilegesRequired" : "NONE",
  43601. "userInteraction" : "NONE",
  43602. "scope" : "UNCHANGED",
  43603. "confidentialityImpact" : "NONE",
  43604. "integrityImpact" : "NONE",
  43605. "availabilityImpact" : "HIGH",
  43606. "baseScore" : 7.5,
  43607. "baseSeverity" : "HIGH"
  43608. },
  43609. "exploitabilityScore" : 3.9,
  43610. "impactScore" : 3.6
  43611. },
  43612. "baseMetricV2" : {
  43613. "cvssV2" : {
  43614. "version" : "2.0",
  43615. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  43616. "accessVector" : "NETWORK",
  43617. "accessComplexity" : "LOW",
  43618. "authentication" : "NONE",
  43619. "confidentialityImpact" : "NONE",
  43620. "integrityImpact" : "NONE",
  43621. "availabilityImpact" : "PARTIAL",
  43622. "baseScore" : 5.0
  43623. },
  43624. "severity" : "MEDIUM",
  43625. "exploitabilityScore" : 10.0,
  43626. "impactScore" : 2.9,
  43627. "acInsufInfo" : false,
  43628. "obtainAllPrivilege" : false,
  43629. "obtainUserPrivilege" : false,
  43630. "obtainOtherPrivilege" : false,
  43631. "userInteractionRequired" : false
  43632. }
  43633. },
  43634. "publishedDate" : "2021-04-27T06:15Z",
  43635. "lastModifiedDate" : "2021-05-07T05:15Z"
  43636. }, {
  43637. "cve" : {
  43638. "data_type" : "CVE",
  43639. "data_format" : "MITRE",
  43640. "data_version" : "4.0",
  43641. "CVE_data_meta" : {
  43642. "ID" : "CVE-2019-25039",
  43643. "ASSIGNER" : "cve@mitre.org"
  43644. },
  43645. "problemtype" : {
  43646. "problemtype_data" : [ {
  43647. "description" : [ {
  43648. "lang" : "en",
  43649. "value" : "CWE-190"
  43650. } ]
  43651. } ]
  43652. },
  43653. "references" : {
  43654. "reference_data" : [ {
  43655. "url" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43656. "name" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43657. "refsource" : "MISC",
  43658. "tags" : [ "Patch", "Third Party Advisory" ]
  43659. }, {
  43660. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html",
  43661. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update",
  43662. "refsource" : "MLIST",
  43663. "tags" : [ ]
  43664. }, {
  43665. "url" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43666. "name" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43667. "refsource" : "CONFIRM",
  43668. "tags" : [ ]
  43669. } ]
  43670. },
  43671. "description" : {
  43672. "description_data" : [ {
  43673. "lang" : "en",
  43674. "value" : "Unbound before 1.9.5 allows an integer overflow in a size calculation in respip/respip.c."
  43675. } ]
  43676. }
  43677. },
  43678. "configurations" : {
  43679. "CVE_data_version" : "4.0",
  43680. "nodes" : [ {
  43681. "operator" : "OR",
  43682. "children" : [ ],
  43683. "cpe_match" : [ {
  43684. "vulnerable" : true,
  43685. "cpe23Uri" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
  43686. "versionEndExcluding" : "1.9.5",
  43687. "cpe_name" : [ ]
  43688. } ]
  43689. } ]
  43690. },
  43691. "impact" : {
  43692. "baseMetricV3" : {
  43693. "cvssV3" : {
  43694. "version" : "3.1",
  43695. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  43696. "attackVector" : "NETWORK",
  43697. "attackComplexity" : "LOW",
  43698. "privilegesRequired" : "NONE",
  43699. "userInteraction" : "NONE",
  43700. "scope" : "UNCHANGED",
  43701. "confidentialityImpact" : "HIGH",
  43702. "integrityImpact" : "HIGH",
  43703. "availabilityImpact" : "HIGH",
  43704. "baseScore" : 9.8,
  43705. "baseSeverity" : "CRITICAL"
  43706. },
  43707. "exploitabilityScore" : 3.9,
  43708. "impactScore" : 5.9
  43709. },
  43710. "baseMetricV2" : {
  43711. "cvssV2" : {
  43712. "version" : "2.0",
  43713. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  43714. "accessVector" : "NETWORK",
  43715. "accessComplexity" : "LOW",
  43716. "authentication" : "NONE",
  43717. "confidentialityImpact" : "PARTIAL",
  43718. "integrityImpact" : "PARTIAL",
  43719. "availabilityImpact" : "PARTIAL",
  43720. "baseScore" : 7.5
  43721. },
  43722. "severity" : "HIGH",
  43723. "exploitabilityScore" : 10.0,
  43724. "impactScore" : 6.4,
  43725. "acInsufInfo" : false,
  43726. "obtainAllPrivilege" : false,
  43727. "obtainUserPrivilege" : false,
  43728. "obtainOtherPrivilege" : false,
  43729. "userInteractionRequired" : false
  43730. }
  43731. },
  43732. "publishedDate" : "2021-04-27T06:15Z",
  43733. "lastModifiedDate" : "2021-05-07T05:15Z"
  43734. }, {
  43735. "cve" : {
  43736. "data_type" : "CVE",
  43737. "data_format" : "MITRE",
  43738. "data_version" : "4.0",
  43739. "CVE_data_meta" : {
  43740. "ID" : "CVE-2019-25038",
  43741. "ASSIGNER" : "cve@mitre.org"
  43742. },
  43743. "problemtype" : {
  43744. "problemtype_data" : [ {
  43745. "description" : [ {
  43746. "lang" : "en",
  43747. "value" : "CWE-190"
  43748. } ]
  43749. } ]
  43750. },
  43751. "references" : {
  43752. "reference_data" : [ {
  43753. "url" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43754. "name" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43755. "refsource" : "MISC",
  43756. "tags" : [ "Patch", "Third Party Advisory" ]
  43757. }, {
  43758. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html",
  43759. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update",
  43760. "refsource" : "MLIST",
  43761. "tags" : [ ]
  43762. }, {
  43763. "url" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43764. "name" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43765. "refsource" : "CONFIRM",
  43766. "tags" : [ ]
  43767. } ]
  43768. },
  43769. "description" : {
  43770. "description_data" : [ {
  43771. "lang" : "en",
  43772. "value" : "Unbound before 1.9.5 allows an integer overflow in a size calculation in dnscrypt/dnscrypt.c."
  43773. } ]
  43774. }
  43775. },
  43776. "configurations" : {
  43777. "CVE_data_version" : "4.0",
  43778. "nodes" : [ {
  43779. "operator" : "OR",
  43780. "children" : [ ],
  43781. "cpe_match" : [ {
  43782. "vulnerable" : true,
  43783. "cpe23Uri" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
  43784. "versionEndExcluding" : "1.9.5",
  43785. "cpe_name" : [ ]
  43786. } ]
  43787. } ]
  43788. },
  43789. "impact" : {
  43790. "baseMetricV3" : {
  43791. "cvssV3" : {
  43792. "version" : "3.1",
  43793. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  43794. "attackVector" : "NETWORK",
  43795. "attackComplexity" : "LOW",
  43796. "privilegesRequired" : "NONE",
  43797. "userInteraction" : "NONE",
  43798. "scope" : "UNCHANGED",
  43799. "confidentialityImpact" : "HIGH",
  43800. "integrityImpact" : "HIGH",
  43801. "availabilityImpact" : "HIGH",
  43802. "baseScore" : 9.8,
  43803. "baseSeverity" : "CRITICAL"
  43804. },
  43805. "exploitabilityScore" : 3.9,
  43806. "impactScore" : 5.9
  43807. },
  43808. "baseMetricV2" : {
  43809. "cvssV2" : {
  43810. "version" : "2.0",
  43811. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  43812. "accessVector" : "NETWORK",
  43813. "accessComplexity" : "LOW",
  43814. "authentication" : "NONE",
  43815. "confidentialityImpact" : "PARTIAL",
  43816. "integrityImpact" : "PARTIAL",
  43817. "availabilityImpact" : "PARTIAL",
  43818. "baseScore" : 7.5
  43819. },
  43820. "severity" : "HIGH",
  43821. "exploitabilityScore" : 10.0,
  43822. "impactScore" : 6.4,
  43823. "acInsufInfo" : false,
  43824. "obtainAllPrivilege" : false,
  43825. "obtainUserPrivilege" : false,
  43826. "obtainOtherPrivilege" : false,
  43827. "userInteractionRequired" : false
  43828. }
  43829. },
  43830. "publishedDate" : "2021-04-27T06:15Z",
  43831. "lastModifiedDate" : "2021-05-07T05:15Z"
  43832. }, {
  43833. "cve" : {
  43834. "data_type" : "CVE",
  43835. "data_format" : "MITRE",
  43836. "data_version" : "4.0",
  43837. "CVE_data_meta" : {
  43838. "ID" : "CVE-2019-25037",
  43839. "ASSIGNER" : "cve@mitre.org"
  43840. },
  43841. "problemtype" : {
  43842. "problemtype_data" : [ {
  43843. "description" : [ {
  43844. "lang" : "en",
  43845. "value" : "CWE-617"
  43846. } ]
  43847. } ]
  43848. },
  43849. "references" : {
  43850. "reference_data" : [ {
  43851. "url" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43852. "name" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43853. "refsource" : "MISC",
  43854. "tags" : [ "Patch", "Third Party Advisory" ]
  43855. }, {
  43856. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html",
  43857. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update",
  43858. "refsource" : "MLIST",
  43859. "tags" : [ ]
  43860. }, {
  43861. "url" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43862. "name" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43863. "refsource" : "CONFIRM",
  43864. "tags" : [ ]
  43865. } ]
  43866. },
  43867. "description" : {
  43868. "description_data" : [ {
  43869. "lang" : "en",
  43870. "value" : "Unbound before 1.9.5 allows an assertion failure and denial of service in dname_pkt_copy via an invalid packet."
  43871. } ]
  43872. }
  43873. },
  43874. "configurations" : {
  43875. "CVE_data_version" : "4.0",
  43876. "nodes" : [ {
  43877. "operator" : "OR",
  43878. "children" : [ ],
  43879. "cpe_match" : [ {
  43880. "vulnerable" : true,
  43881. "cpe23Uri" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
  43882. "versionEndExcluding" : "1.9.5",
  43883. "cpe_name" : [ ]
  43884. } ]
  43885. } ]
  43886. },
  43887. "impact" : {
  43888. "baseMetricV3" : {
  43889. "cvssV3" : {
  43890. "version" : "3.1",
  43891. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  43892. "attackVector" : "NETWORK",
  43893. "attackComplexity" : "LOW",
  43894. "privilegesRequired" : "NONE",
  43895. "userInteraction" : "NONE",
  43896. "scope" : "UNCHANGED",
  43897. "confidentialityImpact" : "NONE",
  43898. "integrityImpact" : "NONE",
  43899. "availabilityImpact" : "HIGH",
  43900. "baseScore" : 7.5,
  43901. "baseSeverity" : "HIGH"
  43902. },
  43903. "exploitabilityScore" : 3.9,
  43904. "impactScore" : 3.6
  43905. },
  43906. "baseMetricV2" : {
  43907. "cvssV2" : {
  43908. "version" : "2.0",
  43909. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  43910. "accessVector" : "NETWORK",
  43911. "accessComplexity" : "LOW",
  43912. "authentication" : "NONE",
  43913. "confidentialityImpact" : "NONE",
  43914. "integrityImpact" : "NONE",
  43915. "availabilityImpact" : "PARTIAL",
  43916. "baseScore" : 5.0
  43917. },
  43918. "severity" : "MEDIUM",
  43919. "exploitabilityScore" : 10.0,
  43920. "impactScore" : 2.9,
  43921. "acInsufInfo" : false,
  43922. "obtainAllPrivilege" : false,
  43923. "obtainUserPrivilege" : false,
  43924. "obtainOtherPrivilege" : false,
  43925. "userInteractionRequired" : false
  43926. }
  43927. },
  43928. "publishedDate" : "2021-04-27T06:15Z",
  43929. "lastModifiedDate" : "2021-05-07T05:15Z"
  43930. }, {
  43931. "cve" : {
  43932. "data_type" : "CVE",
  43933. "data_format" : "MITRE",
  43934. "data_version" : "4.0",
  43935. "CVE_data_meta" : {
  43936. "ID" : "CVE-2019-25036",
  43937. "ASSIGNER" : "cve@mitre.org"
  43938. },
  43939. "problemtype" : {
  43940. "problemtype_data" : [ {
  43941. "description" : [ {
  43942. "lang" : "en",
  43943. "value" : "CWE-617"
  43944. } ]
  43945. } ]
  43946. },
  43947. "references" : {
  43948. "reference_data" : [ {
  43949. "url" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43950. "name" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  43951. "refsource" : "MISC",
  43952. "tags" : [ "Patch", "Third Party Advisory" ]
  43953. }, {
  43954. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html",
  43955. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update",
  43956. "refsource" : "MLIST",
  43957. "tags" : [ ]
  43958. }, {
  43959. "url" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43960. "name" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  43961. "refsource" : "CONFIRM",
  43962. "tags" : [ ]
  43963. } ]
  43964. },
  43965. "description" : {
  43966. "description_data" : [ {
  43967. "lang" : "en",
  43968. "value" : "Unbound before 1.9.5 allows an assertion failure and denial of service in synth_cname."
  43969. } ]
  43970. }
  43971. },
  43972. "configurations" : {
  43973. "CVE_data_version" : "4.0",
  43974. "nodes" : [ {
  43975. "operator" : "OR",
  43976. "children" : [ ],
  43977. "cpe_match" : [ {
  43978. "vulnerable" : true,
  43979. "cpe23Uri" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
  43980. "versionEndExcluding" : "1.9.5",
  43981. "cpe_name" : [ ]
  43982. } ]
  43983. } ]
  43984. },
  43985. "impact" : {
  43986. "baseMetricV3" : {
  43987. "cvssV3" : {
  43988. "version" : "3.1",
  43989. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  43990. "attackVector" : "NETWORK",
  43991. "attackComplexity" : "LOW",
  43992. "privilegesRequired" : "NONE",
  43993. "userInteraction" : "NONE",
  43994. "scope" : "UNCHANGED",
  43995. "confidentialityImpact" : "NONE",
  43996. "integrityImpact" : "NONE",
  43997. "availabilityImpact" : "HIGH",
  43998. "baseScore" : 7.5,
  43999. "baseSeverity" : "HIGH"
  44000. },
  44001. "exploitabilityScore" : 3.9,
  44002. "impactScore" : 3.6
  44003. },
  44004. "baseMetricV2" : {
  44005. "cvssV2" : {
  44006. "version" : "2.0",
  44007. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  44008. "accessVector" : "NETWORK",
  44009. "accessComplexity" : "LOW",
  44010. "authentication" : "NONE",
  44011. "confidentialityImpact" : "NONE",
  44012. "integrityImpact" : "NONE",
  44013. "availabilityImpact" : "PARTIAL",
  44014. "baseScore" : 5.0
  44015. },
  44016. "severity" : "MEDIUM",
  44017. "exploitabilityScore" : 10.0,
  44018. "impactScore" : 2.9,
  44019. "acInsufInfo" : false,
  44020. "obtainAllPrivilege" : false,
  44021. "obtainUserPrivilege" : false,
  44022. "obtainOtherPrivilege" : false,
  44023. "userInteractionRequired" : false
  44024. }
  44025. },
  44026. "publishedDate" : "2021-04-27T06:15Z",
  44027. "lastModifiedDate" : "2021-05-07T05:15Z"
  44028. }, {
  44029. "cve" : {
  44030. "data_type" : "CVE",
  44031. "data_format" : "MITRE",
  44032. "data_version" : "4.0",
  44033. "CVE_data_meta" : {
  44034. "ID" : "CVE-2019-25035",
  44035. "ASSIGNER" : "cve@mitre.org"
  44036. },
  44037. "problemtype" : {
  44038. "problemtype_data" : [ {
  44039. "description" : [ {
  44040. "lang" : "en",
  44041. "value" : "CWE-787"
  44042. } ]
  44043. } ]
  44044. },
  44045. "references" : {
  44046. "reference_data" : [ {
  44047. "url" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  44048. "name" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  44049. "refsource" : "MISC",
  44050. "tags" : [ "Not Applicable", "Third Party Advisory" ]
  44051. }, {
  44052. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html",
  44053. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update",
  44054. "refsource" : "MLIST",
  44055. "tags" : [ ]
  44056. }, {
  44057. "url" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  44058. "name" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  44059. "refsource" : "CONFIRM",
  44060. "tags" : [ ]
  44061. } ]
  44062. },
  44063. "description" : {
  44064. "description_data" : [ {
  44065. "lang" : "en",
  44066. "value" : "Unbound before 1.9.5 allows an out-of-bounds write in sldns_bget_token_par."
  44067. } ]
  44068. }
  44069. },
  44070. "configurations" : {
  44071. "CVE_data_version" : "4.0",
  44072. "nodes" : [ {
  44073. "operator" : "OR",
  44074. "children" : [ ],
  44075. "cpe_match" : [ {
  44076. "vulnerable" : true,
  44077. "cpe23Uri" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
  44078. "versionEndExcluding" : "1.9.5",
  44079. "cpe_name" : [ ]
  44080. } ]
  44081. } ]
  44082. },
  44083. "impact" : {
  44084. "baseMetricV3" : {
  44085. "cvssV3" : {
  44086. "version" : "3.1",
  44087. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  44088. "attackVector" : "NETWORK",
  44089. "attackComplexity" : "LOW",
  44090. "privilegesRequired" : "NONE",
  44091. "userInteraction" : "NONE",
  44092. "scope" : "UNCHANGED",
  44093. "confidentialityImpact" : "HIGH",
  44094. "integrityImpact" : "HIGH",
  44095. "availabilityImpact" : "HIGH",
  44096. "baseScore" : 9.8,
  44097. "baseSeverity" : "CRITICAL"
  44098. },
  44099. "exploitabilityScore" : 3.9,
  44100. "impactScore" : 5.9
  44101. },
  44102. "baseMetricV2" : {
  44103. "cvssV2" : {
  44104. "version" : "2.0",
  44105. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  44106. "accessVector" : "NETWORK",
  44107. "accessComplexity" : "LOW",
  44108. "authentication" : "NONE",
  44109. "confidentialityImpact" : "PARTIAL",
  44110. "integrityImpact" : "PARTIAL",
  44111. "availabilityImpact" : "PARTIAL",
  44112. "baseScore" : 7.5
  44113. },
  44114. "severity" : "HIGH",
  44115. "exploitabilityScore" : 10.0,
  44116. "impactScore" : 6.4,
  44117. "acInsufInfo" : false,
  44118. "obtainAllPrivilege" : false,
  44119. "obtainUserPrivilege" : false,
  44120. "obtainOtherPrivilege" : false,
  44121. "userInteractionRequired" : false
  44122. }
  44123. },
  44124. "publishedDate" : "2021-04-27T06:15Z",
  44125. "lastModifiedDate" : "2021-05-07T05:15Z"
  44126. }, {
  44127. "cve" : {
  44128. "data_type" : "CVE",
  44129. "data_format" : "MITRE",
  44130. "data_version" : "4.0",
  44131. "CVE_data_meta" : {
  44132. "ID" : "CVE-2019-25034",
  44133. "ASSIGNER" : "cve@mitre.org"
  44134. },
  44135. "problemtype" : {
  44136. "problemtype_data" : [ {
  44137. "description" : [ {
  44138. "lang" : "en",
  44139. "value" : "CWE-190"
  44140. } ]
  44141. } ]
  44142. },
  44143. "references" : {
  44144. "reference_data" : [ {
  44145. "url" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  44146. "name" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  44147. "refsource" : "MISC",
  44148. "tags" : [ "Patch", "Third Party Advisory" ]
  44149. }, {
  44150. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html",
  44151. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update",
  44152. "refsource" : "MLIST",
  44153. "tags" : [ ]
  44154. }, {
  44155. "url" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  44156. "name" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  44157. "refsource" : "CONFIRM",
  44158. "tags" : [ ]
  44159. } ]
  44160. },
  44161. "description" : {
  44162. "description_data" : [ {
  44163. "lang" : "en",
  44164. "value" : "Unbound before 1.9.5 allows an integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write."
  44165. } ]
  44166. }
  44167. },
  44168. "configurations" : {
  44169. "CVE_data_version" : "4.0",
  44170. "nodes" : [ {
  44171. "operator" : "OR",
  44172. "children" : [ ],
  44173. "cpe_match" : [ {
  44174. "vulnerable" : true,
  44175. "cpe23Uri" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
  44176. "versionEndExcluding" : "1.9.5",
  44177. "cpe_name" : [ ]
  44178. } ]
  44179. } ]
  44180. },
  44181. "impact" : {
  44182. "baseMetricV3" : {
  44183. "cvssV3" : {
  44184. "version" : "3.1",
  44185. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  44186. "attackVector" : "NETWORK",
  44187. "attackComplexity" : "LOW",
  44188. "privilegesRequired" : "NONE",
  44189. "userInteraction" : "NONE",
  44190. "scope" : "UNCHANGED",
  44191. "confidentialityImpact" : "HIGH",
  44192. "integrityImpact" : "HIGH",
  44193. "availabilityImpact" : "HIGH",
  44194. "baseScore" : 9.8,
  44195. "baseSeverity" : "CRITICAL"
  44196. },
  44197. "exploitabilityScore" : 3.9,
  44198. "impactScore" : 5.9
  44199. },
  44200. "baseMetricV2" : {
  44201. "cvssV2" : {
  44202. "version" : "2.0",
  44203. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  44204. "accessVector" : "NETWORK",
  44205. "accessComplexity" : "LOW",
  44206. "authentication" : "NONE",
  44207. "confidentialityImpact" : "PARTIAL",
  44208. "integrityImpact" : "PARTIAL",
  44209. "availabilityImpact" : "PARTIAL",
  44210. "baseScore" : 7.5
  44211. },
  44212. "severity" : "HIGH",
  44213. "exploitabilityScore" : 10.0,
  44214. "impactScore" : 6.4,
  44215. "acInsufInfo" : false,
  44216. "obtainAllPrivilege" : false,
  44217. "obtainUserPrivilege" : false,
  44218. "obtainOtherPrivilege" : false,
  44219. "userInteractionRequired" : false
  44220. }
  44221. },
  44222. "publishedDate" : "2021-04-27T06:15Z",
  44223. "lastModifiedDate" : "2021-05-07T05:15Z"
  44224. }, {
  44225. "cve" : {
  44226. "data_type" : "CVE",
  44227. "data_format" : "MITRE",
  44228. "data_version" : "4.0",
  44229. "CVE_data_meta" : {
  44230. "ID" : "CVE-2019-25033",
  44231. "ASSIGNER" : "cve@mitre.org"
  44232. },
  44233. "problemtype" : {
  44234. "problemtype_data" : [ {
  44235. "description" : [ {
  44236. "lang" : "en",
  44237. "value" : "CWE-190"
  44238. } ]
  44239. } ]
  44240. },
  44241. "references" : {
  44242. "reference_data" : [ {
  44243. "url" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  44244. "name" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  44245. "refsource" : "MISC",
  44246. "tags" : [ "Not Applicable", "Third Party Advisory" ]
  44247. }, {
  44248. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html",
  44249. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update",
  44250. "refsource" : "MLIST",
  44251. "tags" : [ ]
  44252. }, {
  44253. "url" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  44254. "name" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  44255. "refsource" : "CONFIRM",
  44256. "tags" : [ ]
  44257. } ]
  44258. },
  44259. "description" : {
  44260. "description_data" : [ {
  44261. "lang" : "en",
  44262. "value" : "Unbound before 1.9.5 allows an integer overflow in the regional allocator via the ALIGN_UP macro."
  44263. } ]
  44264. }
  44265. },
  44266. "configurations" : {
  44267. "CVE_data_version" : "4.0",
  44268. "nodes" : [ {
  44269. "operator" : "OR",
  44270. "children" : [ ],
  44271. "cpe_match" : [ {
  44272. "vulnerable" : true,
  44273. "cpe23Uri" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
  44274. "versionEndExcluding" : "1.9.5",
  44275. "cpe_name" : [ ]
  44276. } ]
  44277. } ]
  44278. },
  44279. "impact" : {
  44280. "baseMetricV3" : {
  44281. "cvssV3" : {
  44282. "version" : "3.1",
  44283. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  44284. "attackVector" : "NETWORK",
  44285. "attackComplexity" : "LOW",
  44286. "privilegesRequired" : "NONE",
  44287. "userInteraction" : "NONE",
  44288. "scope" : "UNCHANGED",
  44289. "confidentialityImpact" : "HIGH",
  44290. "integrityImpact" : "HIGH",
  44291. "availabilityImpact" : "HIGH",
  44292. "baseScore" : 9.8,
  44293. "baseSeverity" : "CRITICAL"
  44294. },
  44295. "exploitabilityScore" : 3.9,
  44296. "impactScore" : 5.9
  44297. },
  44298. "baseMetricV2" : {
  44299. "cvssV2" : {
  44300. "version" : "2.0",
  44301. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  44302. "accessVector" : "NETWORK",
  44303. "accessComplexity" : "LOW",
  44304. "authentication" : "NONE",
  44305. "confidentialityImpact" : "PARTIAL",
  44306. "integrityImpact" : "PARTIAL",
  44307. "availabilityImpact" : "PARTIAL",
  44308. "baseScore" : 7.5
  44309. },
  44310. "severity" : "HIGH",
  44311. "exploitabilityScore" : 10.0,
  44312. "impactScore" : 6.4,
  44313. "acInsufInfo" : false,
  44314. "obtainAllPrivilege" : false,
  44315. "obtainUserPrivilege" : false,
  44316. "obtainOtherPrivilege" : false,
  44317. "userInteractionRequired" : false
  44318. }
  44319. },
  44320. "publishedDate" : "2021-04-27T06:15Z",
  44321. "lastModifiedDate" : "2021-05-07T05:15Z"
  44322. }, {
  44323. "cve" : {
  44324. "data_type" : "CVE",
  44325. "data_format" : "MITRE",
  44326. "data_version" : "4.0",
  44327. "CVE_data_meta" : {
  44328. "ID" : "CVE-2019-25032",
  44329. "ASSIGNER" : "cve@mitre.org"
  44330. },
  44331. "problemtype" : {
  44332. "problemtype_data" : [ {
  44333. "description" : [ {
  44334. "lang" : "en",
  44335. "value" : "CWE-190"
  44336. } ]
  44337. } ]
  44338. },
  44339. "references" : {
  44340. "reference_data" : [ {
  44341. "url" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  44342. "name" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  44343. "refsource" : "MISC",
  44344. "tags" : [ "Not Applicable", "Third Party Advisory" ]
  44345. }, {
  44346. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html",
  44347. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update",
  44348. "refsource" : "MLIST",
  44349. "tags" : [ ]
  44350. }, {
  44351. "url" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  44352. "name" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  44353. "refsource" : "CONFIRM",
  44354. "tags" : [ ]
  44355. } ]
  44356. },
  44357. "description" : {
  44358. "description_data" : [ {
  44359. "lang" : "en",
  44360. "value" : "Unbound before 1.9.5 allows an integer overflow in the regional allocator via regional_alloc."
  44361. } ]
  44362. }
  44363. },
  44364. "configurations" : {
  44365. "CVE_data_version" : "4.0",
  44366. "nodes" : [ {
  44367. "operator" : "OR",
  44368. "children" : [ ],
  44369. "cpe_match" : [ {
  44370. "vulnerable" : true,
  44371. "cpe23Uri" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
  44372. "versionEndExcluding" : "1.9.5",
  44373. "cpe_name" : [ ]
  44374. } ]
  44375. } ]
  44376. },
  44377. "impact" : {
  44378. "baseMetricV3" : {
  44379. "cvssV3" : {
  44380. "version" : "3.1",
  44381. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  44382. "attackVector" : "NETWORK",
  44383. "attackComplexity" : "LOW",
  44384. "privilegesRequired" : "NONE",
  44385. "userInteraction" : "NONE",
  44386. "scope" : "UNCHANGED",
  44387. "confidentialityImpact" : "HIGH",
  44388. "integrityImpact" : "HIGH",
  44389. "availabilityImpact" : "HIGH",
  44390. "baseScore" : 9.8,
  44391. "baseSeverity" : "CRITICAL"
  44392. },
  44393. "exploitabilityScore" : 3.9,
  44394. "impactScore" : 5.9
  44395. },
  44396. "baseMetricV2" : {
  44397. "cvssV2" : {
  44398. "version" : "2.0",
  44399. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  44400. "accessVector" : "NETWORK",
  44401. "accessComplexity" : "LOW",
  44402. "authentication" : "NONE",
  44403. "confidentialityImpact" : "PARTIAL",
  44404. "integrityImpact" : "PARTIAL",
  44405. "availabilityImpact" : "PARTIAL",
  44406. "baseScore" : 7.5
  44407. },
  44408. "severity" : "HIGH",
  44409. "exploitabilityScore" : 10.0,
  44410. "impactScore" : 6.4,
  44411. "acInsufInfo" : false,
  44412. "obtainAllPrivilege" : false,
  44413. "obtainUserPrivilege" : false,
  44414. "obtainOtherPrivilege" : false,
  44415. "userInteractionRequired" : false
  44416. }
  44417. },
  44418. "publishedDate" : "2021-04-27T06:15Z",
  44419. "lastModifiedDate" : "2021-05-07T05:15Z"
  44420. }, {
  44421. "cve" : {
  44422. "data_type" : "CVE",
  44423. "data_format" : "MITRE",
  44424. "data_version" : "4.0",
  44425. "CVE_data_meta" : {
  44426. "ID" : "CVE-2019-25031",
  44427. "ASSIGNER" : "cve@mitre.org"
  44428. },
  44429. "problemtype" : {
  44430. "problemtype_data" : [ {
  44431. "description" : [ {
  44432. "lang" : "en",
  44433. "value" : "CWE-74"
  44434. } ]
  44435. } ]
  44436. },
  44437. "references" : {
  44438. "reference_data" : [ {
  44439. "url" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  44440. "name" : "https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/",
  44441. "refsource" : "MISC",
  44442. "tags" : [ "Not Applicable", "Third Party Advisory" ]
  44443. }, {
  44444. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html",
  44445. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update",
  44446. "refsource" : "MLIST",
  44447. "tags" : [ ]
  44448. }, {
  44449. "url" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  44450. "name" : "https://security.netapp.com/advisory/ntap-20210507-0007/",
  44451. "refsource" : "CONFIRM",
  44452. "tags" : [ ]
  44453. } ]
  44454. },
  44455. "description" : {
  44456. "description_data" : [ {
  44457. "lang" : "en",
  44458. "value" : "Unbound before 1.9.5 allows configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack against a cleartext HTTP session."
  44459. } ]
  44460. }
  44461. },
  44462. "configurations" : {
  44463. "CVE_data_version" : "4.0",
  44464. "nodes" : [ {
  44465. "operator" : "OR",
  44466. "children" : [ ],
  44467. "cpe_match" : [ {
  44468. "vulnerable" : true,
  44469. "cpe23Uri" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
  44470. "versionEndExcluding" : "1.9.5",
  44471. "cpe_name" : [ ]
  44472. } ]
  44473. } ]
  44474. },
  44475. "impact" : {
  44476. "baseMetricV3" : {
  44477. "cvssV3" : {
  44478. "version" : "3.1",
  44479. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
  44480. "attackVector" : "NETWORK",
  44481. "attackComplexity" : "HIGH",
  44482. "privilegesRequired" : "NONE",
  44483. "userInteraction" : "NONE",
  44484. "scope" : "UNCHANGED",
  44485. "confidentialityImpact" : "NONE",
  44486. "integrityImpact" : "HIGH",
  44487. "availabilityImpact" : "NONE",
  44488. "baseScore" : 5.9,
  44489. "baseSeverity" : "MEDIUM"
  44490. },
  44491. "exploitabilityScore" : 2.2,
  44492. "impactScore" : 3.6
  44493. },
  44494. "baseMetricV2" : {
  44495. "cvssV2" : {
  44496. "version" : "2.0",
  44497. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  44498. "accessVector" : "NETWORK",
  44499. "accessComplexity" : "MEDIUM",
  44500. "authentication" : "NONE",
  44501. "confidentialityImpact" : "NONE",
  44502. "integrityImpact" : "PARTIAL",
  44503. "availabilityImpact" : "NONE",
  44504. "baseScore" : 4.3
  44505. },
  44506. "severity" : "MEDIUM",
  44507. "exploitabilityScore" : 8.6,
  44508. "impactScore" : 2.9,
  44509. "acInsufInfo" : false,
  44510. "obtainAllPrivilege" : false,
  44511. "obtainUserPrivilege" : false,
  44512. "obtainOtherPrivilege" : false,
  44513. "userInteractionRequired" : false
  44514. }
  44515. },
  44516. "publishedDate" : "2021-04-27T06:15Z",
  44517. "lastModifiedDate" : "2021-05-07T05:15Z"
  44518. }, {
  44519. "cve" : {
  44520. "data_type" : "CVE",
  44521. "data_format" : "MITRE",
  44522. "data_version" : "4.0",
  44523. "CVE_data_meta" : {
  44524. "ID" : "CVE-2021-31826",
  44525. "ASSIGNER" : "cve@mitre.org"
  44526. },
  44527. "problemtype" : {
  44528. "problemtype_data" : [ {
  44529. "description" : [ {
  44530. "lang" : "en",
  44531. "value" : "CWE-476"
  44532. } ]
  44533. } ]
  44534. },
  44535. "references" : {
  44536. "reference_data" : [ {
  44537. "url" : "https://issues.shibboleth.net/jira/browse/SSPCPP-927",
  44538. "name" : "https://issues.shibboleth.net/jira/browse/SSPCPP-927",
  44539. "refsource" : "MISC",
  44540. "tags" : [ "Exploit", "Patch", "Vendor Advisory" ]
  44541. }, {
  44542. "url" : "https://bugs.debian.org/987608",
  44543. "name" : "https://bugs.debian.org/987608",
  44544. "refsource" : "MISC",
  44545. "tags" : [ "Mailing List", "Third Party Advisory" ]
  44546. }, {
  44547. "url" : "https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=5a47c3b9378f4c49392dd4d15189b70956f9f2ec",
  44548. "name" : "https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=5a47c3b9378f4c49392dd4d15189b70956f9f2ec",
  44549. "refsource" : "MISC",
  44550. "tags" : [ "Mailing List", "Vendor Advisory" ]
  44551. }, {
  44552. "url" : "https://shibboleth.net/community/advisories/secadv_20210426.txt",
  44553. "name" : "https://shibboleth.net/community/advisories/secadv_20210426.txt",
  44554. "refsource" : "MISC",
  44555. "tags" : [ "Vendor Advisory" ]
  44556. }, {
  44557. "url" : "https://www.debian.org/security/2021/dsa-4905",
  44558. "name" : "DSA-4905",
  44559. "refsource" : "DEBIAN",
  44560. "tags" : [ "Third Party Advisory" ]
  44561. } ]
  44562. },
  44563. "description" : {
  44564. "description_data" : [ {
  44565. "lang" : "en",
  44566. "value" : "Shibboleth Service Provider 3.x before 3.2.2 is prone to a NULL pointer dereference flaw involving the session recovery feature. The flaw is exploitable (for a daemon crash) on systems not using this feature if a crafted cookie is supplied."
  44567. } ]
  44568. }
  44569. },
  44570. "configurations" : {
  44571. "CVE_data_version" : "4.0",
  44572. "nodes" : [ {
  44573. "operator" : "OR",
  44574. "children" : [ ],
  44575. "cpe_match" : [ {
  44576. "vulnerable" : true,
  44577. "cpe23Uri" : "cpe:2.3:a:shibboleth:service_provider:*:*:*:*:*:*:*:*",
  44578. "versionStartIncluding" : "3.0.0",
  44579. "versionEndExcluding" : "3.2.2",
  44580. "cpe_name" : [ ]
  44581. } ]
  44582. } ]
  44583. },
  44584. "impact" : {
  44585. "baseMetricV3" : {
  44586. "cvssV3" : {
  44587. "version" : "3.1",
  44588. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  44589. "attackVector" : "NETWORK",
  44590. "attackComplexity" : "LOW",
  44591. "privilegesRequired" : "NONE",
  44592. "userInteraction" : "NONE",
  44593. "scope" : "UNCHANGED",
  44594. "confidentialityImpact" : "NONE",
  44595. "integrityImpact" : "NONE",
  44596. "availabilityImpact" : "HIGH",
  44597. "baseScore" : 7.5,
  44598. "baseSeverity" : "HIGH"
  44599. },
  44600. "exploitabilityScore" : 3.9,
  44601. "impactScore" : 3.6
  44602. },
  44603. "baseMetricV2" : {
  44604. "cvssV2" : {
  44605. "version" : "2.0",
  44606. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  44607. "accessVector" : "NETWORK",
  44608. "accessComplexity" : "LOW",
  44609. "authentication" : "NONE",
  44610. "confidentialityImpact" : "NONE",
  44611. "integrityImpact" : "NONE",
  44612. "availabilityImpact" : "PARTIAL",
  44613. "baseScore" : 5.0
  44614. },
  44615. "severity" : "MEDIUM",
  44616. "exploitabilityScore" : 10.0,
  44617. "impactScore" : 2.9,
  44618. "acInsufInfo" : false,
  44619. "obtainAllPrivilege" : false,
  44620. "obtainUserPrivilege" : false,
  44621. "obtainOtherPrivilege" : false,
  44622. "userInteractionRequired" : false
  44623. }
  44624. },
  44625. "publishedDate" : "2021-04-27T04:15Z",
  44626. "lastModifiedDate" : "2021-05-07T17:49Z"
  44627. }, {
  44628. "cve" : {
  44629. "data_type" : "CVE",
  44630. "data_format" : "MITRE",
  44631. "data_version" : "4.0",
  44632. "CVE_data_meta" : {
  44633. "ID" : "CVE-2021-31671",
  44634. "ASSIGNER" : "cve@mitre.org"
  44635. },
  44636. "problemtype" : {
  44637. "problemtype_data" : [ {
  44638. "description" : [ {
  44639. "lang" : "en",
  44640. "value" : "CWE-319"
  44641. } ]
  44642. } ]
  44643. },
  44644. "references" : {
  44645. "reference_data" : [ {
  44646. "url" : "https://github.com/ankane/pgsync/issues/121",
  44647. "name" : "https://github.com/ankane/pgsync/issues/121",
  44648. "refsource" : "MISC",
  44649. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  44650. } ]
  44651. },
  44652. "description" : {
  44653. "description_data" : [ {
  44654. "lang" : "en",
  44655. "value" : "pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the --schema-first and --schema-only options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used."
  44656. } ]
  44657. }
  44658. },
  44659. "configurations" : {
  44660. "CVE_data_version" : "4.0",
  44661. "nodes" : [ {
  44662. "operator" : "OR",
  44663. "children" : [ ],
  44664. "cpe_match" : [ {
  44665. "vulnerable" : true,
  44666. "cpe23Uri" : "cpe:2.3:a:pgsync_project:pgsync:*:*:*:*:*:*:*:*",
  44667. "versionEndExcluding" : "0.6.7",
  44668. "cpe_name" : [ ]
  44669. } ]
  44670. } ]
  44671. },
  44672. "impact" : {
  44673. "baseMetricV3" : {
  44674. "cvssV3" : {
  44675. "version" : "3.1",
  44676. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  44677. "attackVector" : "NETWORK",
  44678. "attackComplexity" : "LOW",
  44679. "privilegesRequired" : "NONE",
  44680. "userInteraction" : "NONE",
  44681. "scope" : "UNCHANGED",
  44682. "confidentialityImpact" : "HIGH",
  44683. "integrityImpact" : "NONE",
  44684. "availabilityImpact" : "NONE",
  44685. "baseScore" : 7.5,
  44686. "baseSeverity" : "HIGH"
  44687. },
  44688. "exploitabilityScore" : 3.9,
  44689. "impactScore" : 3.6
  44690. },
  44691. "baseMetricV2" : {
  44692. "cvssV2" : {
  44693. "version" : "2.0",
  44694. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  44695. "accessVector" : "NETWORK",
  44696. "accessComplexity" : "LOW",
  44697. "authentication" : "NONE",
  44698. "confidentialityImpact" : "PARTIAL",
  44699. "integrityImpact" : "NONE",
  44700. "availabilityImpact" : "NONE",
  44701. "baseScore" : 5.0
  44702. },
  44703. "severity" : "MEDIUM",
  44704. "exploitabilityScore" : 10.0,
  44705. "impactScore" : 2.9,
  44706. "acInsufInfo" : false,
  44707. "obtainAllPrivilege" : false,
  44708. "obtainUserPrivilege" : false,
  44709. "obtainOtherPrivilege" : false,
  44710. "userInteractionRequired" : false
  44711. }
  44712. },
  44713. "publishedDate" : "2021-04-27T03:15Z",
  44714. "lastModifiedDate" : "2021-05-04T00:16Z"
  44715. }, {
  44716. "cve" : {
  44717. "data_type" : "CVE",
  44718. "data_format" : "MITRE",
  44719. "data_version" : "4.0",
  44720. "CVE_data_meta" : {
  44721. "ID" : "CVE-2021-30635",
  44722. "ASSIGNER" : "cve@mitre.org"
  44723. },
  44724. "problemtype" : {
  44725. "problemtype_data" : [ {
  44726. "description" : [ {
  44727. "lang" : "en",
  44728. "value" : "CWE-22"
  44729. } ]
  44730. } ]
  44731. },
  44732. "references" : {
  44733. "reference_data" : [ {
  44734. "url" : "https://support.sonatype.com/hc/en-us/articles/1500006879561",
  44735. "name" : "https://support.sonatype.com/hc/en-us/articles/1500006879561",
  44736. "refsource" : "MISC",
  44737. "tags" : [ "Patch", "Vendor Advisory" ]
  44738. } ]
  44739. },
  44740. "description" : {
  44741. "description_data" : [ {
  44742. "lang" : "en",
  44743. "value" : "Sonatype Nexus Repository Manager 3.x before 3.30.1 allows a remote attacker to get a list of files and directories that exist in a UI-related folder via directory traversal (no customer-specific data is exposed)."
  44744. } ]
  44745. }
  44746. },
  44747. "configurations" : {
  44748. "CVE_data_version" : "4.0",
  44749. "nodes" : [ {
  44750. "operator" : "OR",
  44751. "children" : [ ],
  44752. "cpe_match" : [ {
  44753. "vulnerable" : true,
  44754. "cpe23Uri" : "cpe:2.3:a:sonatype:nexus_repository_manager:*:*:*:*:*:*:*:*",
  44755. "versionStartIncluding" : "3.0",
  44756. "versionEndExcluding" : "3.30.1",
  44757. "cpe_name" : [ ]
  44758. } ]
  44759. } ]
  44760. },
  44761. "impact" : {
  44762. "baseMetricV3" : {
  44763. "cvssV3" : {
  44764. "version" : "3.1",
  44765. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  44766. "attackVector" : "NETWORK",
  44767. "attackComplexity" : "LOW",
  44768. "privilegesRequired" : "NONE",
  44769. "userInteraction" : "NONE",
  44770. "scope" : "UNCHANGED",
  44771. "confidentialityImpact" : "LOW",
  44772. "integrityImpact" : "NONE",
  44773. "availabilityImpact" : "NONE",
  44774. "baseScore" : 5.3,
  44775. "baseSeverity" : "MEDIUM"
  44776. },
  44777. "exploitabilityScore" : 3.9,
  44778. "impactScore" : 1.4
  44779. },
  44780. "baseMetricV2" : {
  44781. "cvssV2" : {
  44782. "version" : "2.0",
  44783. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  44784. "accessVector" : "NETWORK",
  44785. "accessComplexity" : "LOW",
  44786. "authentication" : "NONE",
  44787. "confidentialityImpact" : "PARTIAL",
  44788. "integrityImpact" : "NONE",
  44789. "availabilityImpact" : "NONE",
  44790. "baseScore" : 5.0
  44791. },
  44792. "severity" : "MEDIUM",
  44793. "exploitabilityScore" : 10.0,
  44794. "impactScore" : 2.9,
  44795. "acInsufInfo" : false,
  44796. "obtainAllPrivilege" : false,
  44797. "obtainUserPrivilege" : false,
  44798. "obtainOtherPrivilege" : false,
  44799. "userInteractionRequired" : false
  44800. }
  44801. },
  44802. "publishedDate" : "2021-04-27T03:15Z",
  44803. "lastModifiedDate" : "2021-05-04T00:17Z"
  44804. }, {
  44805. "cve" : {
  44806. "data_type" : "CVE",
  44807. "data_format" : "MITRE",
  44808. "data_version" : "4.0",
  44809. "CVE_data_meta" : {
  44810. "ID" : "CVE-2021-30165",
  44811. "ASSIGNER" : "cve@cert.org.tw"
  44812. },
  44813. "problemtype" : {
  44814. "problemtype_data" : [ {
  44815. "description" : [ {
  44816. "lang" : "en",
  44817. "value" : "CWE-798"
  44818. } ]
  44819. } ]
  44820. },
  44821. "references" : {
  44822. "reference_data" : [ {
  44823. "url" : "https://www.twcert.org.tw/tw/cp-132-4670-359c8-1.html",
  44824. "name" : "N/A",
  44825. "refsource" : "CONFIRM",
  44826. "tags" : [ "Third Party Advisory" ]
  44827. } ]
  44828. },
  44829. "description" : {
  44830. "description_data" : [ {
  44831. "lang" : "en",
  44832. "value" : "The default administrator account & password of the EDIMAX wireless network camera is hard-coded. Remote attackers can disassemble firmware to obtain the privileged permission and further control the devices."
  44833. } ]
  44834. }
  44835. },
  44836. "configurations" : {
  44837. "CVE_data_version" : "4.0",
  44838. "nodes" : [ {
  44839. "operator" : "AND",
  44840. "children" : [ {
  44841. "operator" : "OR",
  44842. "children" : [ ],
  44843. "cpe_match" : [ {
  44844. "vulnerable" : true,
  44845. "cpe23Uri" : "cpe:2.3:o:edimax:ic-3140w_firmware:3.11:*:*:*:*:*:*:*",
  44846. "cpe_name" : [ ]
  44847. } ]
  44848. }, {
  44849. "operator" : "OR",
  44850. "children" : [ ],
  44851. "cpe_match" : [ {
  44852. "vulnerable" : false,
  44853. "cpe23Uri" : "cpe:2.3:h:edimax:ic-3140w:-:*:*:*:*:*:*:*",
  44854. "cpe_name" : [ ]
  44855. } ]
  44856. } ],
  44857. "cpe_match" : [ ]
  44858. } ]
  44859. },
  44860. "impact" : {
  44861. "baseMetricV3" : {
  44862. "cvssV3" : {
  44863. "version" : "3.1",
  44864. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
  44865. "attackVector" : "NETWORK",
  44866. "attackComplexity" : "HIGH",
  44867. "privilegesRequired" : "NONE",
  44868. "userInteraction" : "NONE",
  44869. "scope" : "UNCHANGED",
  44870. "confidentialityImpact" : "HIGH",
  44871. "integrityImpact" : "HIGH",
  44872. "availabilityImpact" : "HIGH",
  44873. "baseScore" : 8.1,
  44874. "baseSeverity" : "HIGH"
  44875. },
  44876. "exploitabilityScore" : 2.2,
  44877. "impactScore" : 5.9
  44878. },
  44879. "baseMetricV2" : {
  44880. "cvssV2" : {
  44881. "version" : "2.0",
  44882. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  44883. "accessVector" : "NETWORK",
  44884. "accessComplexity" : "LOW",
  44885. "authentication" : "NONE",
  44886. "confidentialityImpact" : "PARTIAL",
  44887. "integrityImpact" : "NONE",
  44888. "availabilityImpact" : "NONE",
  44889. "baseScore" : 5.0
  44890. },
  44891. "severity" : "MEDIUM",
  44892. "exploitabilityScore" : 10.0,
  44893. "impactScore" : 2.9,
  44894. "acInsufInfo" : false,
  44895. "obtainAllPrivilege" : false,
  44896. "obtainUserPrivilege" : false,
  44897. "obtainOtherPrivilege" : false,
  44898. "userInteractionRequired" : false
  44899. }
  44900. },
  44901. "publishedDate" : "2021-04-27T03:15Z",
  44902. "lastModifiedDate" : "2021-05-07T17:46Z"
  44903. }, {
  44904. "cve" : {
  44905. "data_type" : "CVE",
  44906. "data_format" : "MITRE",
  44907. "data_version" : "4.0",
  44908. "CVE_data_meta" : {
  44909. "ID" : "CVE-2021-29474",
  44910. "ASSIGNER" : "security-advisories@github.com"
  44911. },
  44912. "problemtype" : {
  44913. "problemtype_data" : [ {
  44914. "description" : [ {
  44915. "lang" : "en",
  44916. "value" : "CWE-22"
  44917. }, {
  44918. "lang" : "en",
  44919. "value" : "CWE-20"
  44920. } ]
  44921. } ]
  44922. },
  44923. "references" : {
  44924. "reference_data" : [ {
  44925. "url" : "https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-p528-555r-pf87",
  44926. "name" : "https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-p528-555r-pf87",
  44927. "refsource" : "CONFIRM",
  44928. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  44929. } ]
  44930. },
  44931. "description" : {
  44932. "description_data" : [ {
  44933. "lang" : "en",
  44934. "value" : "HedgeDoc (formerly known as CodiMD) is an open-source collaborative markdown editor. An attacker can read arbitrary `.md` files from the server's filesystem due to an improper input validation, which results in the ability to perform a relative path traversal. To verify if you are affected, you can try to open the following URL: `http://localhost:3000/..%2F..%2FREADME#` (replace `http://localhost:3000` with your instance's base-URL e.g. `https://demo.hedgedoc.org/..%2F..%2FREADME#`). If you see a README page being rendered, you run an affected version. The attack works due the fact that the internal router passes the url-encoded alias to the `noteController.showNote`-function. This function passes the input directly to findNote() utility function, that will pass it on the the parseNoteId()-function, that tries to make sense out of the noteId/alias and check if a note already exists and if so, if a corresponding file on disk was updated. If no note exists the note creation-function is called, which pass this unvalidated alias, with a `.md` appended, into a path.join()-function which is read from the filesystem in the follow up routine and provides the pre-filled content of the new note. This allows an attacker to not only read arbitrary `.md` files from the filesystem, but also observes changes to them. The usefulness of this attack can be considered limited, since mainly markdown files are use the file-ending `.md` and all markdown files contained in the hedgedoc project, like the README, are public anyway. If other protections such as a chroot or container or proper file permissions are in place, this attack's usefulness is rather limited. On a reverse-proxy level one can force a URL-decode, which will prevent this attack because the router will not accept such a path."
  44935. } ]
  44936. }
  44937. },
  44938. "configurations" : {
  44939. "CVE_data_version" : "4.0",
  44940. "nodes" : [ {
  44941. "operator" : "OR",
  44942. "children" : [ ],
  44943. "cpe_match" : [ {
  44944. "vulnerable" : true,
  44945. "cpe23Uri" : "cpe:2.3:a:hedgedoc:hedgedoc:*:*:*:*:*:*:*:*",
  44946. "versionEndExcluding" : "1.8.0",
  44947. "cpe_name" : [ ]
  44948. } ]
  44949. } ]
  44950. },
  44951. "impact" : {
  44952. "baseMetricV3" : {
  44953. "cvssV3" : {
  44954. "version" : "3.1",
  44955. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
  44956. "attackVector" : "NETWORK",
  44957. "attackComplexity" : "LOW",
  44958. "privilegesRequired" : "NONE",
  44959. "userInteraction" : "NONE",
  44960. "scope" : "CHANGED",
  44961. "confidentialityImpact" : "LOW",
  44962. "integrityImpact" : "NONE",
  44963. "availabilityImpact" : "NONE",
  44964. "baseScore" : 5.8,
  44965. "baseSeverity" : "MEDIUM"
  44966. },
  44967. "exploitabilityScore" : 3.9,
  44968. "impactScore" : 1.4
  44969. },
  44970. "baseMetricV2" : {
  44971. "cvssV2" : {
  44972. "version" : "2.0",
  44973. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  44974. "accessVector" : "NETWORK",
  44975. "accessComplexity" : "LOW",
  44976. "authentication" : "NONE",
  44977. "confidentialityImpact" : "PARTIAL",
  44978. "integrityImpact" : "NONE",
  44979. "availabilityImpact" : "NONE",
  44980. "baseScore" : 5.0
  44981. },
  44982. "severity" : "MEDIUM",
  44983. "exploitabilityScore" : 10.0,
  44984. "impactScore" : 2.9,
  44985. "acInsufInfo" : false,
  44986. "obtainAllPrivilege" : false,
  44987. "obtainUserPrivilege" : false,
  44988. "obtainOtherPrivilege" : false,
  44989. "userInteractionRequired" : false
  44990. }
  44991. },
  44992. "publishedDate" : "2021-04-26T22:15Z",
  44993. "lastModifiedDate" : "2021-05-07T18:36Z"
  44994. }, {
  44995. "cve" : {
  44996. "data_type" : "CVE",
  44997. "data_format" : "MITRE",
  44998. "data_version" : "4.0",
  44999. "CVE_data_meta" : {
  45000. "ID" : "CVE-2021-31784",
  45001. "ASSIGNER" : "cve@mitre.org"
  45002. },
  45003. "problemtype" : {
  45004. "problemtype_data" : [ {
  45005. "description" : [ {
  45006. "lang" : "en",
  45007. "value" : "CWE-787"
  45008. } ]
  45009. } ]
  45010. },
  45011. "references" : {
  45012. "reference_data" : [ {
  45013. "url" : "https://www.opendesign.com/security-advisories",
  45014. "name" : "https://www.opendesign.com/security-advisories",
  45015. "refsource" : "MISC",
  45016. "tags" : [ "Vendor Advisory" ]
  45017. } ]
  45018. },
  45019. "description" : {
  45020. "description_data" : [ {
  45021. "lang" : "en",
  45022. "value" : "An out-of-bounds write vulnerability exists in the file-reading procedure in Open Design Alliance Drawings SDK before 2021.6 on all supported by ODA platforms in static configuration. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart) or possible code execution."
  45023. } ]
  45024. }
  45025. },
  45026. "configurations" : {
  45027. "CVE_data_version" : "4.0",
  45028. "nodes" : [ {
  45029. "operator" : "OR",
  45030. "children" : [ ],
  45031. "cpe_match" : [ {
  45032. "vulnerable" : true,
  45033. "cpe23Uri" : "cpe:2.3:a:opendesign:drawings_sdk:*:*:*:*:*:*:*:*",
  45034. "versionEndExcluding" : "2021.6",
  45035. "cpe_name" : [ ]
  45036. } ]
  45037. } ]
  45038. },
  45039. "impact" : {
  45040. "baseMetricV3" : {
  45041. "cvssV3" : {
  45042. "version" : "3.1",
  45043. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  45044. "attackVector" : "NETWORK",
  45045. "attackComplexity" : "LOW",
  45046. "privilegesRequired" : "NONE",
  45047. "userInteraction" : "NONE",
  45048. "scope" : "UNCHANGED",
  45049. "confidentialityImpact" : "HIGH",
  45050. "integrityImpact" : "HIGH",
  45051. "availabilityImpact" : "HIGH",
  45052. "baseScore" : 9.8,
  45053. "baseSeverity" : "CRITICAL"
  45054. },
  45055. "exploitabilityScore" : 3.9,
  45056. "impactScore" : 5.9
  45057. },
  45058. "baseMetricV2" : {
  45059. "cvssV2" : {
  45060. "version" : "2.0",
  45061. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  45062. "accessVector" : "NETWORK",
  45063. "accessComplexity" : "LOW",
  45064. "authentication" : "NONE",
  45065. "confidentialityImpact" : "PARTIAL",
  45066. "integrityImpact" : "PARTIAL",
  45067. "availabilityImpact" : "PARTIAL",
  45068. "baseScore" : 7.5
  45069. },
  45070. "severity" : "HIGH",
  45071. "exploitabilityScore" : 10.0,
  45072. "impactScore" : 6.4,
  45073. "acInsufInfo" : false,
  45074. "obtainAllPrivilege" : false,
  45075. "obtainUserPrivilege" : false,
  45076. "obtainOtherPrivilege" : false,
  45077. "userInteractionRequired" : false
  45078. }
  45079. },
  45080. "publishedDate" : "2021-04-26T19:15Z",
  45081. "lastModifiedDate" : "2021-05-04T00:30Z"
  45082. }, {
  45083. "cve" : {
  45084. "data_type" : "CVE",
  45085. "data_format" : "MITRE",
  45086. "data_version" : "4.0",
  45087. "CVE_data_meta" : {
  45088. "ID" : "CVE-2021-31783",
  45089. "ASSIGNER" : "cve@mitre.org"
  45090. },
  45091. "problemtype" : {
  45092. "problemtype_data" : [ {
  45093. "description" : [ {
  45094. "lang" : "en",
  45095. "value" : "CWE-345"
  45096. } ]
  45097. } ]
  45098. },
  45099. "references" : {
  45100. "reference_data" : [ {
  45101. "url" : "https://piwigo.org/ext/index.php?cid=null",
  45102. "name" : "https://piwigo.org/ext/index.php?cid=null",
  45103. "refsource" : "MISC",
  45104. "tags" : [ "Release Notes", "Third Party Advisory" ]
  45105. }, {
  45106. "url" : "https://github.com/Piwigo/LocalFilesEditor/issues/2",
  45107. "name" : "https://github.com/Piwigo/LocalFilesEditor/issues/2",
  45108. "refsource" : "MISC",
  45109. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  45110. }, {
  45111. "url" : "https://github.com/Piwigo/LocalFilesEditor/commit/dda691d3e45bfd166ac175c70bd8b91cb4917b6b",
  45112. "name" : "https://github.com/Piwigo/LocalFilesEditor/commit/dda691d3e45bfd166ac175c70bd8b91cb4917b6b",
  45113. "refsource" : "MISC",
  45114. "tags" : [ "Patch", "Third Party Advisory" ]
  45115. } ]
  45116. },
  45117. "description" : {
  45118. "description_data" : [ {
  45119. "lang" : "en",
  45120. "value" : "show_default.php in the LocalFilesEditor extension before 11.4.0.1 for Piwigo allows Local File Inclusion because the file parameter is not validated with a proper regular-expression check."
  45121. } ]
  45122. }
  45123. },
  45124. "configurations" : {
  45125. "CVE_data_version" : "4.0",
  45126. "nodes" : [ {
  45127. "operator" : "OR",
  45128. "children" : [ ],
  45129. "cpe_match" : [ {
  45130. "vulnerable" : true,
  45131. "cpe23Uri" : "cpe:2.3:a:piwigo:localfiles_editor:*:*:*:*:*:piwigo:*:*",
  45132. "versionEndExcluding" : "11.4.0.1",
  45133. "cpe_name" : [ ]
  45134. } ]
  45135. } ]
  45136. },
  45137. "impact" : {
  45138. "baseMetricV3" : {
  45139. "cvssV3" : {
  45140. "version" : "3.1",
  45141. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  45142. "attackVector" : "NETWORK",
  45143. "attackComplexity" : "LOW",
  45144. "privilegesRequired" : "NONE",
  45145. "userInteraction" : "NONE",
  45146. "scope" : "UNCHANGED",
  45147. "confidentialityImpact" : "HIGH",
  45148. "integrityImpact" : "NONE",
  45149. "availabilityImpact" : "NONE",
  45150. "baseScore" : 7.5,
  45151. "baseSeverity" : "HIGH"
  45152. },
  45153. "exploitabilityScore" : 3.9,
  45154. "impactScore" : 3.6
  45155. },
  45156. "baseMetricV2" : {
  45157. "cvssV2" : {
  45158. "version" : "2.0",
  45159. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  45160. "accessVector" : "NETWORK",
  45161. "accessComplexity" : "LOW",
  45162. "authentication" : "NONE",
  45163. "confidentialityImpact" : "PARTIAL",
  45164. "integrityImpact" : "NONE",
  45165. "availabilityImpact" : "NONE",
  45166. "baseScore" : 5.0
  45167. },
  45168. "severity" : "MEDIUM",
  45169. "exploitabilityScore" : 10.0,
  45170. "impactScore" : 2.9,
  45171. "acInsufInfo" : false,
  45172. "obtainAllPrivilege" : false,
  45173. "obtainUserPrivilege" : false,
  45174. "obtainOtherPrivilege" : false,
  45175. "userInteractionRequired" : false
  45176. }
  45177. },
  45178. "publishedDate" : "2021-04-26T19:15Z",
  45179. "lastModifiedDate" : "2021-05-04T00:32Z"
  45180. }, {
  45181. "cve" : {
  45182. "data_type" : "CVE",
  45183. "data_format" : "MITRE",
  45184. "data_version" : "4.0",
  45185. "CVE_data_meta" : {
  45186. "ID" : "CVE-2021-31646",
  45187. "ASSIGNER" : "cve@mitre.org"
  45188. },
  45189. "problemtype" : {
  45190. "problemtype_data" : [ {
  45191. "description" : [ {
  45192. "lang" : "en",
  45193. "value" : "CWE-307"
  45194. } ]
  45195. } ]
  45196. },
  45197. "references" : {
  45198. "reference_data" : [ {
  45199. "url" : "https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.10&type=patch",
  45200. "name" : "https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.10&type=patch",
  45201. "refsource" : "MISC",
  45202. "tags" : [ "Patch", "Vendor Advisory" ]
  45203. }, {
  45204. "url" : "https://dojo.maltem.ca/public/advisories/CVE-2021-31646.html",
  45205. "name" : "https://dojo.maltem.ca/public/advisories/CVE-2021-31646.html",
  45206. "refsource" : "MISC",
  45207. "tags" : [ "Broken Link", "Third Party Advisory" ]
  45208. }, {
  45209. "url" : "https://gestsup.fr/index.php?page=download",
  45210. "name" : "https://gestsup.fr/index.php?page=download",
  45211. "refsource" : "MISC",
  45212. "tags" : [ "Patch", "Vendor Advisory" ]
  45213. } ]
  45214. },
  45215. "description" : {
  45216. "description_data" : [ {
  45217. "lang" : "en",
  45218. "value" : "Gestsup before 3.2.10 allows account takeover through the password recovery functionality (remote). The affected component is the file forgot_pwd.php - it uses a weak algorithm for the generation of password recovery tokens (the PHP uniqueid function), allowing a brute force attack."
  45219. } ]
  45220. }
  45221. },
  45222. "configurations" : {
  45223. "CVE_data_version" : "4.0",
  45224. "nodes" : [ {
  45225. "operator" : "OR",
  45226. "children" : [ ],
  45227. "cpe_match" : [ {
  45228. "vulnerable" : true,
  45229. "cpe23Uri" : "cpe:2.3:a:gestsup:gestsup:*:*:*:*:*:*:*:*",
  45230. "versionEndExcluding" : "3.2.10",
  45231. "cpe_name" : [ ]
  45232. } ]
  45233. } ]
  45234. },
  45235. "impact" : {
  45236. "baseMetricV3" : {
  45237. "cvssV3" : {
  45238. "version" : "3.1",
  45239. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  45240. "attackVector" : "NETWORK",
  45241. "attackComplexity" : "LOW",
  45242. "privilegesRequired" : "NONE",
  45243. "userInteraction" : "NONE",
  45244. "scope" : "UNCHANGED",
  45245. "confidentialityImpact" : "HIGH",
  45246. "integrityImpact" : "HIGH",
  45247. "availabilityImpact" : "HIGH",
  45248. "baseScore" : 9.8,
  45249. "baseSeverity" : "CRITICAL"
  45250. },
  45251. "exploitabilityScore" : 3.9,
  45252. "impactScore" : 5.9
  45253. },
  45254. "baseMetricV2" : {
  45255. "cvssV2" : {
  45256. "version" : "2.0",
  45257. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  45258. "accessVector" : "NETWORK",
  45259. "accessComplexity" : "LOW",
  45260. "authentication" : "NONE",
  45261. "confidentialityImpact" : "PARTIAL",
  45262. "integrityImpact" : "PARTIAL",
  45263. "availabilityImpact" : "PARTIAL",
  45264. "baseScore" : 7.5
  45265. },
  45266. "severity" : "HIGH",
  45267. "exploitabilityScore" : 10.0,
  45268. "impactScore" : 6.4,
  45269. "acInsufInfo" : false,
  45270. "obtainAllPrivilege" : false,
  45271. "obtainUserPrivilege" : false,
  45272. "obtainOtherPrivilege" : false,
  45273. "userInteractionRequired" : false
  45274. }
  45275. },
  45276. "publishedDate" : "2021-04-26T19:15Z",
  45277. "lastModifiedDate" : "2021-05-04T00:32Z"
  45278. }, {
  45279. "cve" : {
  45280. "data_type" : "CVE",
  45281. "data_format" : "MITRE",
  45282. "data_version" : "4.0",
  45283. "CVE_data_meta" : {
  45284. "ID" : "CVE-2021-29473",
  45285. "ASSIGNER" : "security-advisories@github.com"
  45286. },
  45287. "problemtype" : {
  45288. "problemtype_data" : [ {
  45289. "description" : [ {
  45290. "lang" : "en",
  45291. "value" : "CWE-125"
  45292. } ]
  45293. } ]
  45294. },
  45295. "references" : {
  45296. "reference_data" : [ {
  45297. "url" : "https://github.com/Exiv2/exiv2/security/policy",
  45298. "name" : "https://github.com/Exiv2/exiv2/security/policy",
  45299. "refsource" : "MISC",
  45300. "tags" : [ "Release Notes", "Third Party Advisory" ]
  45301. }, {
  45302. "url" : "https://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2",
  45303. "name" : "https://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2",
  45304. "refsource" : "CONFIRM",
  45305. "tags" : [ "Patch", "Third Party Advisory" ]
  45306. }, {
  45307. "url" : "https://github.com/github/advisory-review/pull/1587",
  45308. "name" : "https://github.com/github/advisory-review/pull/1587",
  45309. "refsource" : "MISC",
  45310. "tags" : [ "Broken Link", "Third Party Advisory" ]
  45311. }, {
  45312. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/",
  45313. "name" : "FEDORA-2021-10d7331a31",
  45314. "refsource" : "FEDORA",
  45315. "tags" : [ "Third Party Advisory" ]
  45316. }, {
  45317. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWZLDECIXXW3CCZ3RS4A3NG5X5VE4WZM/",
  45318. "name" : "FEDORA-2021-2d860da728",
  45319. "refsource" : "FEDORA",
  45320. "tags" : [ ]
  45321. }, {
  45322. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LBKWLTXM7IKZ4PVGKLUQVAVFAYGGF7QR/",
  45323. "name" : "FEDORA-2021-96a5dabcfa",
  45324. "refsource" : "FEDORA",
  45325. "tags" : [ ]
  45326. } ]
  45327. },
  45328. "description" : {
  45329. "description_data" : [ {
  45330. "lang" : "en",
  45331. "value" : "Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. Please see our security policy for information about Exiv2 security."
  45332. } ]
  45333. }
  45334. },
  45335. "configurations" : {
  45336. "CVE_data_version" : "4.0",
  45337. "nodes" : [ {
  45338. "operator" : "OR",
  45339. "children" : [ ],
  45340. "cpe_match" : [ {
  45341. "vulnerable" : true,
  45342. "cpe23Uri" : "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
  45343. "versionEndExcluding" : "0.27.4",
  45344. "cpe_name" : [ ]
  45345. } ]
  45346. } ]
  45347. },
  45348. "impact" : {
  45349. "baseMetricV3" : {
  45350. "cvssV3" : {
  45351. "version" : "3.1",
  45352. "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
  45353. "attackVector" : "LOCAL",
  45354. "attackComplexity" : "HIGH",
  45355. "privilegesRequired" : "NONE",
  45356. "userInteraction" : "REQUIRED",
  45357. "scope" : "UNCHANGED",
  45358. "confidentialityImpact" : "NONE",
  45359. "integrityImpact" : "NONE",
  45360. "availabilityImpact" : "LOW",
  45361. "baseScore" : 2.5,
  45362. "baseSeverity" : "LOW"
  45363. },
  45364. "exploitabilityScore" : 1.0,
  45365. "impactScore" : 1.4
  45366. },
  45367. "baseMetricV2" : {
  45368. "cvssV2" : {
  45369. "version" : "2.0",
  45370. "vectorString" : "AV:N/AC:H/Au:N/C:N/I:N/A:P",
  45371. "accessVector" : "NETWORK",
  45372. "accessComplexity" : "HIGH",
  45373. "authentication" : "NONE",
  45374. "confidentialityImpact" : "NONE",
  45375. "integrityImpact" : "NONE",
  45376. "availabilityImpact" : "PARTIAL",
  45377. "baseScore" : 2.6
  45378. },
  45379. "severity" : "LOW",
  45380. "exploitabilityScore" : 4.9,
  45381. "impactScore" : 2.9,
  45382. "acInsufInfo" : false,
  45383. "obtainAllPrivilege" : false,
  45384. "obtainUserPrivilege" : false,
  45385. "obtainOtherPrivilege" : false,
  45386. "userInteractionRequired" : true
  45387. }
  45388. },
  45389. "publishedDate" : "2021-04-26T19:15Z",
  45390. "lastModifiedDate" : "2021-05-10T03:15Z"
  45391. }, {
  45392. "cve" : {
  45393. "data_type" : "CVE",
  45394. "data_format" : "MITRE",
  45395. "data_version" : "4.0",
  45396. "CVE_data_meta" : {
  45397. "ID" : "CVE-2021-22669",
  45398. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  45399. },
  45400. "problemtype" : {
  45401. "problemtype_data" : [ {
  45402. "description" : [ {
  45403. "lang" : "en",
  45404. "value" : "CWE-732"
  45405. } ]
  45406. } ]
  45407. },
  45408. "references" : {
  45409. "reference_data" : [ {
  45410. "url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-02",
  45411. "name" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-02",
  45412. "refsource" : "MISC",
  45413. "tags" : [ "Third Party Advisory", "US Government Resource" ]
  45414. } ]
  45415. },
  45416. "description" : {
  45417. "description_data" : [ {
  45418. "lang" : "en",
  45419. "value" : "Incorrect permissions are set to default on the ‘Project Management’ page of WebAccess/SCADA portal of WebAccess/SCADA Versions 9.0.1 and prior, which may allow a low-privileged user to update an administrator’s password and login as an administrator to escalate privileges on the system."
  45420. } ]
  45421. }
  45422. },
  45423. "configurations" : {
  45424. "CVE_data_version" : "4.0",
  45425. "nodes" : [ {
  45426. "operator" : "OR",
  45427. "children" : [ ],
  45428. "cpe_match" : [ {
  45429. "vulnerable" : true,
  45430. "cpe23Uri" : "cpe:2.3:a:advantech:webaccess\\/scada:*:*:*:*:*:*:*:*",
  45431. "versionEndIncluding" : "9.0.1",
  45432. "cpe_name" : [ ]
  45433. } ]
  45434. } ]
  45435. },
  45436. "impact" : {
  45437. "baseMetricV3" : {
  45438. "cvssV3" : {
  45439. "version" : "3.1",
  45440. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  45441. "attackVector" : "NETWORK",
  45442. "attackComplexity" : "LOW",
  45443. "privilegesRequired" : "LOW",
  45444. "userInteraction" : "NONE",
  45445. "scope" : "UNCHANGED",
  45446. "confidentialityImpact" : "HIGH",
  45447. "integrityImpact" : "HIGH",
  45448. "availabilityImpact" : "HIGH",
  45449. "baseScore" : 8.8,
  45450. "baseSeverity" : "HIGH"
  45451. },
  45452. "exploitabilityScore" : 2.8,
  45453. "impactScore" : 5.9
  45454. },
  45455. "baseMetricV2" : {
  45456. "cvssV2" : {
  45457. "version" : "2.0",
  45458. "vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C",
  45459. "accessVector" : "NETWORK",
  45460. "accessComplexity" : "LOW",
  45461. "authentication" : "SINGLE",
  45462. "confidentialityImpact" : "COMPLETE",
  45463. "integrityImpact" : "COMPLETE",
  45464. "availabilityImpact" : "COMPLETE",
  45465. "baseScore" : 9.0
  45466. },
  45467. "severity" : "HIGH",
  45468. "exploitabilityScore" : 8.0,
  45469. "impactScore" : 10.0,
  45470. "acInsufInfo" : false,
  45471. "obtainAllPrivilege" : false,
  45472. "obtainUserPrivilege" : false,
  45473. "obtainOtherPrivilege" : false,
  45474. "userInteractionRequired" : false
  45475. }
  45476. },
  45477. "publishedDate" : "2021-04-26T19:15Z",
  45478. "lastModifiedDate" : "2021-05-07T18:29Z"
  45479. }, {
  45480. "cve" : {
  45481. "data_type" : "CVE",
  45482. "data_format" : "MITRE",
  45483. "data_version" : "4.0",
  45484. "CVE_data_meta" : {
  45485. "ID" : "CVE-2020-36325",
  45486. "ASSIGNER" : "cve@mitre.org"
  45487. },
  45488. "problemtype" : {
  45489. "problemtype_data" : [ {
  45490. "description" : [ {
  45491. "lang" : "en",
  45492. "value" : "CWE-125"
  45493. } ]
  45494. } ]
  45495. },
  45496. "references" : {
  45497. "reference_data" : [ {
  45498. "url" : "https://github.com/akheron/jansson/issues/548",
  45499. "name" : "https://github.com/akheron/jansson/issues/548",
  45500. "refsource" : "MISC",
  45501. "tags" : [ "Exploit", "Third Party Advisory" ]
  45502. } ]
  45503. },
  45504. "description" : {
  45505. "description_data" : [ {
  45506. "lang" : "en",
  45507. "value" : "** DISPUTED ** An issue was discovered in Jansson through 2.13.1. Due to a parsing error in json_loads, there's an out-of-bounds read-access bug. NOTE: the vendor reports that this only occurs when a programmer fails to follow the API specification."
  45508. } ]
  45509. }
  45510. },
  45511. "configurations" : {
  45512. "CVE_data_version" : "4.0",
  45513. "nodes" : [ {
  45514. "operator" : "OR",
  45515. "children" : [ ],
  45516. "cpe_match" : [ {
  45517. "vulnerable" : true,
  45518. "cpe23Uri" : "cpe:2.3:a:jansson_project:jansson:*:*:*:*:*:*:*:*",
  45519. "versionEndIncluding" : "2.13.1",
  45520. "cpe_name" : [ ]
  45521. } ]
  45522. } ]
  45523. },
  45524. "impact" : {
  45525. "baseMetricV3" : {
  45526. "cvssV3" : {
  45527. "version" : "3.1",
  45528. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  45529. "attackVector" : "NETWORK",
  45530. "attackComplexity" : "LOW",
  45531. "privilegesRequired" : "NONE",
  45532. "userInteraction" : "NONE",
  45533. "scope" : "UNCHANGED",
  45534. "confidentialityImpact" : "NONE",
  45535. "integrityImpact" : "NONE",
  45536. "availabilityImpact" : "HIGH",
  45537. "baseScore" : 7.5,
  45538. "baseSeverity" : "HIGH"
  45539. },
  45540. "exploitabilityScore" : 3.9,
  45541. "impactScore" : 3.6
  45542. },
  45543. "baseMetricV2" : {
  45544. "cvssV2" : {
  45545. "version" : "2.0",
  45546. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  45547. "accessVector" : "NETWORK",
  45548. "accessComplexity" : "LOW",
  45549. "authentication" : "NONE",
  45550. "confidentialityImpact" : "NONE",
  45551. "integrityImpact" : "NONE",
  45552. "availabilityImpact" : "PARTIAL",
  45553. "baseScore" : 5.0
  45554. },
  45555. "severity" : "MEDIUM",
  45556. "exploitabilityScore" : 10.0,
  45557. "impactScore" : 2.9,
  45558. "acInsufInfo" : false,
  45559. "obtainAllPrivilege" : false,
  45560. "obtainUserPrivilege" : false,
  45561. "obtainOtherPrivilege" : false,
  45562. "userInteractionRequired" : false
  45563. }
  45564. },
  45565. "publishedDate" : "2021-04-26T18:15Z",
  45566. "lastModifiedDate" : "2021-05-04T14:51Z"
  45567. }, {
  45568. "cve" : {
  45569. "data_type" : "CVE",
  45570. "data_format" : "MITRE",
  45571. "data_version" : "4.0",
  45572. "CVE_data_meta" : {
  45573. "ID" : "CVE-2021-21220",
  45574. "ASSIGNER" : "chrome-cve-admin@google.com"
  45575. },
  45576. "problemtype" : {
  45577. "problemtype_data" : [ {
  45578. "description" : [ {
  45579. "lang" : "en",
  45580. "value" : "CWE-119"
  45581. }, {
  45582. "lang" : "en",
  45583. "value" : "CWE-20"
  45584. } ]
  45585. } ]
  45586. },
  45587. "references" : {
  45588. "reference_data" : [ {
  45589. "url" : "https://crbug.com/1196683",
  45590. "name" : "https://crbug.com/1196683",
  45591. "refsource" : "MISC",
  45592. "tags" : [ "Third Party Advisory" ]
  45593. }, {
  45594. "url" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html",
  45595. "name" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html",
  45596. "refsource" : "MISC",
  45597. "tags" : [ "Release Notes", "Third Party Advisory" ]
  45598. }, {
  45599. "url" : "https://security.gentoo.org/glsa/202104-08",
  45600. "name" : "GLSA-202104-08",
  45601. "refsource" : "GENTOO",
  45602. "tags" : [ ]
  45603. }, {
  45604. "url" : "http://packetstormsecurity.com/files/162437/Google-Chrome-XOR-Typer-Out-Of-Bounds-Access-Remote-Code-Execution.html",
  45605. "name" : "http://packetstormsecurity.com/files/162437/Google-Chrome-XOR-Typer-Out-Of-Bounds-Access-Remote-Code-Execution.html",
  45606. "refsource" : "MISC",
  45607. "tags" : [ ]
  45608. } ]
  45609. },
  45610. "description" : {
  45611. "description_data" : [ {
  45612. "lang" : "en",
  45613. "value" : "Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
  45614. } ]
  45615. }
  45616. },
  45617. "configurations" : {
  45618. "CVE_data_version" : "4.0",
  45619. "nodes" : [ {
  45620. "operator" : "OR",
  45621. "children" : [ ],
  45622. "cpe_match" : [ {
  45623. "vulnerable" : true,
  45624. "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
  45625. "versionEndExcluding" : "89.0.4389.128",
  45626. "cpe_name" : [ ]
  45627. } ]
  45628. } ]
  45629. },
  45630. "impact" : {
  45631. "baseMetricV3" : {
  45632. "cvssV3" : {
  45633. "version" : "3.1",
  45634. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  45635. "attackVector" : "NETWORK",
  45636. "attackComplexity" : "LOW",
  45637. "privilegesRequired" : "NONE",
  45638. "userInteraction" : "REQUIRED",
  45639. "scope" : "UNCHANGED",
  45640. "confidentialityImpact" : "HIGH",
  45641. "integrityImpact" : "HIGH",
  45642. "availabilityImpact" : "HIGH",
  45643. "baseScore" : 8.8,
  45644. "baseSeverity" : "HIGH"
  45645. },
  45646. "exploitabilityScore" : 2.8,
  45647. "impactScore" : 5.9
  45648. },
  45649. "baseMetricV2" : {
  45650. "cvssV2" : {
  45651. "version" : "2.0",
  45652. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  45653. "accessVector" : "NETWORK",
  45654. "accessComplexity" : "MEDIUM",
  45655. "authentication" : "NONE",
  45656. "confidentialityImpact" : "PARTIAL",
  45657. "integrityImpact" : "PARTIAL",
  45658. "availabilityImpact" : "PARTIAL",
  45659. "baseScore" : 6.8
  45660. },
  45661. "severity" : "MEDIUM",
  45662. "exploitabilityScore" : 8.6,
  45663. "impactScore" : 6.4,
  45664. "acInsufInfo" : false,
  45665. "obtainAllPrivilege" : false,
  45666. "obtainUserPrivilege" : false,
  45667. "obtainOtherPrivilege" : false,
  45668. "userInteractionRequired" : true
  45669. }
  45670. },
  45671. "publishedDate" : "2021-04-26T17:15Z",
  45672. "lastModifiedDate" : "2021-05-03T23:15Z"
  45673. }, {
  45674. "cve" : {
  45675. "data_type" : "CVE",
  45676. "data_format" : "MITRE",
  45677. "data_version" : "4.0",
  45678. "CVE_data_meta" : {
  45679. "ID" : "CVE-2021-21204",
  45680. "ASSIGNER" : "chrome-cve-admin@google.com"
  45681. },
  45682. "problemtype" : {
  45683. "problemtype_data" : [ {
  45684. "description" : [ {
  45685. "lang" : "en",
  45686. "value" : "CWE-416"
  45687. } ]
  45688. } ]
  45689. },
  45690. "references" : {
  45691. "reference_data" : [ {
  45692. "url" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
  45693. "name" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
  45694. "refsource" : "MISC",
  45695. "tags" : [ "Release Notes", "Vendor Advisory" ]
  45696. }, {
  45697. "url" : "https://crbug.com/1189926",
  45698. "name" : "https://crbug.com/1189926",
  45699. "refsource" : "MISC",
  45700. "tags" : [ "Permissions Required", "Vendor Advisory" ]
  45701. }, {
  45702. "url" : "https://www.debian.org/security/2021/dsa-4906",
  45703. "name" : "DSA-4906",
  45704. "refsource" : "DEBIAN",
  45705. "tags" : [ "Third Party Advisory" ]
  45706. }, {
  45707. "url" : "https://security.gentoo.org/glsa/202104-08",
  45708. "name" : "GLSA-202104-08",
  45709. "refsource" : "GENTOO",
  45710. "tags" : [ "Third Party Advisory" ]
  45711. } ]
  45712. },
  45713. "description" : {
  45714. "description_data" : [ {
  45715. "lang" : "en",
  45716. "value" : "Use after free in Blink in Google Chrome on OS X prior to 90.0.4430.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
  45717. } ]
  45718. }
  45719. },
  45720. "configurations" : {
  45721. "CVE_data_version" : "4.0",
  45722. "nodes" : [ {
  45723. "operator" : "AND",
  45724. "children" : [ {
  45725. "operator" : "OR",
  45726. "children" : [ ],
  45727. "cpe_match" : [ {
  45728. "vulnerable" : true,
  45729. "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
  45730. "versionEndExcluding" : "90.0.4430.72",
  45731. "cpe_name" : [ ]
  45732. } ]
  45733. }, {
  45734. "operator" : "OR",
  45735. "children" : [ ],
  45736. "cpe_match" : [ {
  45737. "vulnerable" : false,
  45738. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
  45739. "cpe_name" : [ ]
  45740. } ]
  45741. } ],
  45742. "cpe_match" : [ ]
  45743. }, {
  45744. "operator" : "OR",
  45745. "children" : [ ],
  45746. "cpe_match" : [ {
  45747. "vulnerable" : true,
  45748. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  45749. "cpe_name" : [ ]
  45750. } ]
  45751. } ]
  45752. },
  45753. "impact" : {
  45754. "baseMetricV3" : {
  45755. "cvssV3" : {
  45756. "version" : "3.1",
  45757. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  45758. "attackVector" : "NETWORK",
  45759. "attackComplexity" : "LOW",
  45760. "privilegesRequired" : "NONE",
  45761. "userInteraction" : "REQUIRED",
  45762. "scope" : "UNCHANGED",
  45763. "confidentialityImpact" : "HIGH",
  45764. "integrityImpact" : "HIGH",
  45765. "availabilityImpact" : "HIGH",
  45766. "baseScore" : 8.8,
  45767. "baseSeverity" : "HIGH"
  45768. },
  45769. "exploitabilityScore" : 2.8,
  45770. "impactScore" : 5.9
  45771. },
  45772. "baseMetricV2" : {
  45773. "cvssV2" : {
  45774. "version" : "2.0",
  45775. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  45776. "accessVector" : "NETWORK",
  45777. "accessComplexity" : "MEDIUM",
  45778. "authentication" : "NONE",
  45779. "confidentialityImpact" : "PARTIAL",
  45780. "integrityImpact" : "PARTIAL",
  45781. "availabilityImpact" : "PARTIAL",
  45782. "baseScore" : 6.8
  45783. },
  45784. "severity" : "MEDIUM",
  45785. "exploitabilityScore" : 8.6,
  45786. "impactScore" : 6.4,
  45787. "acInsufInfo" : false,
  45788. "obtainAllPrivilege" : false,
  45789. "obtainUserPrivilege" : false,
  45790. "obtainOtherPrivilege" : false,
  45791. "userInteractionRequired" : true
  45792. }
  45793. },
  45794. "publishedDate" : "2021-04-26T17:15Z",
  45795. "lastModifiedDate" : "2021-05-03T18:17Z"
  45796. }, {
  45797. "cve" : {
  45798. "data_type" : "CVE",
  45799. "data_format" : "MITRE",
  45800. "data_version" : "4.0",
  45801. "CVE_data_meta" : {
  45802. "ID" : "CVE-2021-21203",
  45803. "ASSIGNER" : "chrome-cve-admin@google.com"
  45804. },
  45805. "problemtype" : {
  45806. "problemtype_data" : [ {
  45807. "description" : [ {
  45808. "lang" : "en",
  45809. "value" : "CWE-416"
  45810. } ]
  45811. } ]
  45812. },
  45813. "references" : {
  45814. "reference_data" : [ {
  45815. "url" : "https://crbug.com/1192054",
  45816. "name" : "https://crbug.com/1192054",
  45817. "refsource" : "MISC",
  45818. "tags" : [ "Permissions Required", "Vendor Advisory" ]
  45819. }, {
  45820. "url" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
  45821. "name" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
  45822. "refsource" : "MISC",
  45823. "tags" : [ "Release Notes", "Vendor Advisory" ]
  45824. }, {
  45825. "url" : "https://www.debian.org/security/2021/dsa-4906",
  45826. "name" : "DSA-4906",
  45827. "refsource" : "DEBIAN",
  45828. "tags" : [ "Third Party Advisory" ]
  45829. }, {
  45830. "url" : "https://security.gentoo.org/glsa/202104-08",
  45831. "name" : "GLSA-202104-08",
  45832. "refsource" : "GENTOO",
  45833. "tags" : [ "Third Party Advisory" ]
  45834. } ]
  45835. },
  45836. "description" : {
  45837. "description_data" : [ {
  45838. "lang" : "en",
  45839. "value" : "Use after free in Blink in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
  45840. } ]
  45841. }
  45842. },
  45843. "configurations" : {
  45844. "CVE_data_version" : "4.0",
  45845. "nodes" : [ {
  45846. "operator" : "OR",
  45847. "children" : [ ],
  45848. "cpe_match" : [ {
  45849. "vulnerable" : true,
  45850. "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
  45851. "versionEndExcluding" : "90.0.4430.72",
  45852. "cpe_name" : [ ]
  45853. } ]
  45854. }, {
  45855. "operator" : "OR",
  45856. "children" : [ ],
  45857. "cpe_match" : [ {
  45858. "vulnerable" : true,
  45859. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  45860. "cpe_name" : [ ]
  45861. } ]
  45862. } ]
  45863. },
  45864. "impact" : {
  45865. "baseMetricV3" : {
  45866. "cvssV3" : {
  45867. "version" : "3.1",
  45868. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  45869. "attackVector" : "NETWORK",
  45870. "attackComplexity" : "LOW",
  45871. "privilegesRequired" : "NONE",
  45872. "userInteraction" : "REQUIRED",
  45873. "scope" : "UNCHANGED",
  45874. "confidentialityImpact" : "HIGH",
  45875. "integrityImpact" : "HIGH",
  45876. "availabilityImpact" : "HIGH",
  45877. "baseScore" : 8.8,
  45878. "baseSeverity" : "HIGH"
  45879. },
  45880. "exploitabilityScore" : 2.8,
  45881. "impactScore" : 5.9
  45882. },
  45883. "baseMetricV2" : {
  45884. "cvssV2" : {
  45885. "version" : "2.0",
  45886. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  45887. "accessVector" : "NETWORK",
  45888. "accessComplexity" : "MEDIUM",
  45889. "authentication" : "NONE",
  45890. "confidentialityImpact" : "PARTIAL",
  45891. "integrityImpact" : "PARTIAL",
  45892. "availabilityImpact" : "PARTIAL",
  45893. "baseScore" : 6.8
  45894. },
  45895. "severity" : "MEDIUM",
  45896. "exploitabilityScore" : 8.6,
  45897. "impactScore" : 6.4,
  45898. "acInsufInfo" : false,
  45899. "obtainAllPrivilege" : false,
  45900. "obtainUserPrivilege" : false,
  45901. "obtainOtherPrivilege" : false,
  45902. "userInteractionRequired" : true
  45903. }
  45904. },
  45905. "publishedDate" : "2021-04-26T17:15Z",
  45906. "lastModifiedDate" : "2021-05-03T19:48Z"
  45907. }, {
  45908. "cve" : {
  45909. "data_type" : "CVE",
  45910. "data_format" : "MITRE",
  45911. "data_version" : "4.0",
  45912. "CVE_data_meta" : {
  45913. "ID" : "CVE-2021-21202",
  45914. "ASSIGNER" : "chrome-cve-admin@google.com"
  45915. },
  45916. "problemtype" : {
  45917. "problemtype_data" : [ {
  45918. "description" : [ {
  45919. "lang" : "en",
  45920. "value" : "CWE-416"
  45921. } ]
  45922. } ]
  45923. },
  45924. "references" : {
  45925. "reference_data" : [ {
  45926. "url" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
  45927. "name" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
  45928. "refsource" : "MISC",
  45929. "tags" : [ "Release Notes", "Vendor Advisory" ]
  45930. }, {
  45931. "url" : "https://crbug.com/1188889",
  45932. "name" : "https://crbug.com/1188889",
  45933. "refsource" : "MISC",
  45934. "tags" : [ "Permissions Required", "Vendor Advisory" ]
  45935. }, {
  45936. "url" : "https://www.debian.org/security/2021/dsa-4906",
  45937. "name" : "DSA-4906",
  45938. "refsource" : "DEBIAN",
  45939. "tags" : [ "Third Party Advisory" ]
  45940. }, {
  45941. "url" : "https://security.gentoo.org/glsa/202104-08",
  45942. "name" : "GLSA-202104-08",
  45943. "refsource" : "GENTOO",
  45944. "tags" : [ "Third Party Advisory" ]
  45945. } ]
  45946. },
  45947. "description" : {
  45948. "description_data" : [ {
  45949. "lang" : "en",
  45950. "value" : "Use after free in extensions in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension."
  45951. } ]
  45952. }
  45953. },
  45954. "configurations" : {
  45955. "CVE_data_version" : "4.0",
  45956. "nodes" : [ {
  45957. "operator" : "OR",
  45958. "children" : [ ],
  45959. "cpe_match" : [ {
  45960. "vulnerable" : true,
  45961. "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
  45962. "versionEndExcluding" : "90.0.4430.72",
  45963. "cpe_name" : [ ]
  45964. } ]
  45965. }, {
  45966. "operator" : "OR",
  45967. "children" : [ ],
  45968. "cpe_match" : [ {
  45969. "vulnerable" : true,
  45970. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  45971. "cpe_name" : [ ]
  45972. } ]
  45973. } ]
  45974. },
  45975. "impact" : {
  45976. "baseMetricV3" : {
  45977. "cvssV3" : {
  45978. "version" : "3.1",
  45979. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
  45980. "attackVector" : "LOCAL",
  45981. "attackComplexity" : "LOW",
  45982. "privilegesRequired" : "NONE",
  45983. "userInteraction" : "REQUIRED",
  45984. "scope" : "CHANGED",
  45985. "confidentialityImpact" : "HIGH",
  45986. "integrityImpact" : "HIGH",
  45987. "availabilityImpact" : "HIGH",
  45988. "baseScore" : 8.6,
  45989. "baseSeverity" : "HIGH"
  45990. },
  45991. "exploitabilityScore" : 1.8,
  45992. "impactScore" : 6.0
  45993. },
  45994. "baseMetricV2" : {
  45995. "cvssV2" : {
  45996. "version" : "2.0",
  45997. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  45998. "accessVector" : "NETWORK",
  45999. "accessComplexity" : "MEDIUM",
  46000. "authentication" : "NONE",
  46001. "confidentialityImpact" : "PARTIAL",
  46002. "integrityImpact" : "PARTIAL",
  46003. "availabilityImpact" : "PARTIAL",
  46004. "baseScore" : 6.8
  46005. },
  46006. "severity" : "MEDIUM",
  46007. "exploitabilityScore" : 8.6,
  46008. "impactScore" : 6.4,
  46009. "acInsufInfo" : false,
  46010. "obtainAllPrivilege" : false,
  46011. "obtainUserPrivilege" : false,
  46012. "obtainOtherPrivilege" : false,
  46013. "userInteractionRequired" : true
  46014. }
  46015. },
  46016. "publishedDate" : "2021-04-26T17:15Z",
  46017. "lastModifiedDate" : "2021-05-03T19:46Z"
  46018. }, {
  46019. "cve" : {
  46020. "data_type" : "CVE",
  46021. "data_format" : "MITRE",
  46022. "data_version" : "4.0",
  46023. "CVE_data_meta" : {
  46024. "ID" : "CVE-2021-21201",
  46025. "ASSIGNER" : "chrome-cve-admin@google.com"
  46026. },
  46027. "problemtype" : {
  46028. "problemtype_data" : [ {
  46029. "description" : [ {
  46030. "lang" : "en",
  46031. "value" : "CWE-416"
  46032. } ]
  46033. } ]
  46034. },
  46035. "references" : {
  46036. "reference_data" : [ {
  46037. "url" : "https://crbug.com/1025683",
  46038. "name" : "https://crbug.com/1025683",
  46039. "refsource" : "MISC",
  46040. "tags" : [ "Permissions Required", "Vendor Advisory" ]
  46041. }, {
  46042. "url" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
  46043. "name" : "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html",
  46044. "refsource" : "MISC",
  46045. "tags" : [ "Release Notes", "Vendor Advisory" ]
  46046. }, {
  46047. "url" : "https://www.debian.org/security/2021/dsa-4906",
  46048. "name" : "DSA-4906",
  46049. "refsource" : "DEBIAN",
  46050. "tags" : [ "Third Party Advisory" ]
  46051. }, {
  46052. "url" : "https://security.gentoo.org/glsa/202104-08",
  46053. "name" : "GLSA-202104-08",
  46054. "refsource" : "GENTOO",
  46055. "tags" : [ "Third Party Advisory" ]
  46056. } ]
  46057. },
  46058. "description" : {
  46059. "description_data" : [ {
  46060. "lang" : "en",
  46061. "value" : "Use after free in permissions in Google Chrome prior to 90.0.4430.72 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page."
  46062. } ]
  46063. }
  46064. },
  46065. "configurations" : {
  46066. "CVE_data_version" : "4.0",
  46067. "nodes" : [ {
  46068. "operator" : "OR",
  46069. "children" : [ ],
  46070. "cpe_match" : [ {
  46071. "vulnerable" : true,
  46072. "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
  46073. "versionEndExcluding" : "90.0.4430.72",
  46074. "cpe_name" : [ ]
  46075. } ]
  46076. }, {
  46077. "operator" : "OR",
  46078. "children" : [ ],
  46079. "cpe_match" : [ {
  46080. "vulnerable" : true,
  46081. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  46082. "cpe_name" : [ ]
  46083. } ]
  46084. } ]
  46085. },
  46086. "impact" : {
  46087. "baseMetricV3" : {
  46088. "cvssV3" : {
  46089. "version" : "3.1",
  46090. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
  46091. "attackVector" : "NETWORK",
  46092. "attackComplexity" : "LOW",
  46093. "privilegesRequired" : "NONE",
  46094. "userInteraction" : "REQUIRED",
  46095. "scope" : "CHANGED",
  46096. "confidentialityImpact" : "HIGH",
  46097. "integrityImpact" : "HIGH",
  46098. "availabilityImpact" : "HIGH",
  46099. "baseScore" : 9.6,
  46100. "baseSeverity" : "CRITICAL"
  46101. },
  46102. "exploitabilityScore" : 2.8,
  46103. "impactScore" : 6.0
  46104. },
  46105. "baseMetricV2" : {
  46106. "cvssV2" : {
  46107. "version" : "2.0",
  46108. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  46109. "accessVector" : "NETWORK",
  46110. "accessComplexity" : "MEDIUM",
  46111. "authentication" : "NONE",
  46112. "confidentialityImpact" : "PARTIAL",
  46113. "integrityImpact" : "PARTIAL",
  46114. "availabilityImpact" : "PARTIAL",
  46115. "baseScore" : 6.8
  46116. },
  46117. "severity" : "MEDIUM",
  46118. "exploitabilityScore" : 8.6,
  46119. "impactScore" : 6.4,
  46120. "acInsufInfo" : false,
  46121. "obtainAllPrivilege" : false,
  46122. "obtainUserPrivilege" : false,
  46123. "obtainOtherPrivilege" : false,
  46124. "userInteractionRequired" : true
  46125. }
  46126. },
  46127. "publishedDate" : "2021-04-26T17:15Z",
  46128. "lastModifiedDate" : "2021-05-03T19:43Z"
  46129. }, {
  46130. "cve" : {
  46131. "data_type" : "CVE",
  46132. "data_format" : "MITRE",
  46133. "data_version" : "4.0",
  46134. "CVE_data_meta" : {
  46135. "ID" : "CVE-2021-27851",
  46136. "ASSIGNER" : "cert@cert.org"
  46137. },
  46138. "problemtype" : {
  46139. "problemtype_data" : [ {
  46140. "description" : [ {
  46141. "lang" : "en",
  46142. "value" : "CWE-269"
  46143. } ]
  46144. } ]
  46145. },
  46146. "references" : {
  46147. "reference_data" : [ {
  46148. "url" : "https://guix.gnu.org/en/blog/2021/risk-of-local-privilege-escalation-via-guix-daemon/",
  46149. "name" : "https://guix.gnu.org/en/blog/2021/risk-of-local-privilege-escalation-via-guix-daemon/",
  46150. "refsource" : "MISC",
  46151. "tags" : [ "Patch", "Vendor Advisory" ]
  46152. }, {
  46153. "url" : "https://bugs.gnu.org/47229",
  46154. "name" : "https://bugs.gnu.org/47229",
  46155. "refsource" : "MISC",
  46156. "tags" : [ "Issue Tracking", "Mailing List", "Patch", "Vendor Advisory" ]
  46157. } ]
  46158. },
  46159. "description" : {
  46160. "description_data" : [ {
  46161. "lang" : "en",
  46162. "value" : "A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’. It affects multi-user setups in which ’guix-daemon’ runs locally. The attack consists in having an unprivileged user spawn a build process, for instance with `guix build`, that makes its build directory world-writable. The user then creates a hardlink to a root-owned file such as /etc/shadow in that build directory. If the user passed the --keep-failed option and the build eventually fails, the daemon changes ownership of the whole build tree, including the hardlink, to the user. At that point, the user has write access to the target file. Versions after and including v0.11.0-3298-g2608e40988, and versions prior to v1.2.0-75109-g94f0312546 are vulnerable."
  46163. } ]
  46164. }
  46165. },
  46166. "configurations" : {
  46167. "CVE_data_version" : "4.0",
  46168. "nodes" : [ {
  46169. "operator" : "OR",
  46170. "children" : [ ],
  46171. "cpe_match" : [ {
  46172. "vulnerable" : true,
  46173. "cpe23Uri" : "cpe:2.3:a:gnu:guix:*:*:*:*:*:*:*:*",
  46174. "versionStartIncluding" : "0.11.0",
  46175. "versionEndExcluding" : "1.2.0",
  46176. "cpe_name" : [ ]
  46177. } ]
  46178. } ]
  46179. },
  46180. "impact" : {
  46181. "baseMetricV3" : {
  46182. "cvssV3" : {
  46183. "version" : "3.1",
  46184. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
  46185. "attackVector" : "LOCAL",
  46186. "attackComplexity" : "LOW",
  46187. "privilegesRequired" : "LOW",
  46188. "userInteraction" : "NONE",
  46189. "scope" : "UNCHANGED",
  46190. "confidentialityImpact" : "NONE",
  46191. "integrityImpact" : "HIGH",
  46192. "availabilityImpact" : "NONE",
  46193. "baseScore" : 5.5,
  46194. "baseSeverity" : "MEDIUM"
  46195. },
  46196. "exploitabilityScore" : 1.8,
  46197. "impactScore" : 3.6
  46198. },
  46199. "baseMetricV2" : {
  46200. "cvssV2" : {
  46201. "version" : "2.0",
  46202. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:P/A:N",
  46203. "accessVector" : "LOCAL",
  46204. "accessComplexity" : "LOW",
  46205. "authentication" : "NONE",
  46206. "confidentialityImpact" : "NONE",
  46207. "integrityImpact" : "PARTIAL",
  46208. "availabilityImpact" : "NONE",
  46209. "baseScore" : 2.1
  46210. },
  46211. "severity" : "LOW",
  46212. "exploitabilityScore" : 3.9,
  46213. "impactScore" : 2.9,
  46214. "acInsufInfo" : false,
  46215. "obtainAllPrivilege" : false,
  46216. "obtainUserPrivilege" : false,
  46217. "obtainOtherPrivilege" : false,
  46218. "userInteractionRequired" : false
  46219. }
  46220. },
  46221. "publishedDate" : "2021-04-26T16:15Z",
  46222. "lastModifiedDate" : "2021-05-07T18:28Z"
  46223. }, {
  46224. "cve" : {
  46225. "data_type" : "CVE",
  46226. "data_format" : "MITRE",
  46227. "data_version" : "4.0",
  46228. "CVE_data_meta" : {
  46229. "ID" : "CVE-2021-23382",
  46230. "ASSIGNER" : "report@snyk.io"
  46231. },
  46232. "problemtype" : {
  46233. "problemtype_data" : [ {
  46234. "description" : [ {
  46235. "lang" : "en",
  46236. "value" : "NVD-CWE-Other"
  46237. } ]
  46238. } ]
  46239. },
  46240. "references" : {
  46241. "reference_data" : [ {
  46242. "url" : "https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956",
  46243. "name" : "https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956",
  46244. "refsource" : "MISC",
  46245. "tags" : [ "Patch", "Third Party Advisory" ]
  46246. }, {
  46247. "url" : "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641",
  46248. "name" : "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641",
  46249. "refsource" : "MISC",
  46250. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  46251. }, {
  46252. "url" : "https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640",
  46253. "name" : "https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640",
  46254. "refsource" : "MISC",
  46255. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  46256. } ]
  46257. },
  46258. "description" : {
  46259. "description_data" : [ {
  46260. "lang" : "en",
  46261. "value" : "The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \\/\\*\\s* sourceMappingURL=(.*)."
  46262. } ]
  46263. }
  46264. },
  46265. "configurations" : {
  46266. "CVE_data_version" : "4.0",
  46267. "nodes" : [ {
  46268. "operator" : "OR",
  46269. "children" : [ ],
  46270. "cpe_match" : [ {
  46271. "vulnerable" : true,
  46272. "cpe23Uri" : "cpe:2.3:a:postcss:postcss:*:*:*:*:*:node.js:*:*",
  46273. "versionEndExcluding" : "8.2.13",
  46274. "cpe_name" : [ ]
  46275. } ]
  46276. } ]
  46277. },
  46278. "impact" : {
  46279. "baseMetricV3" : {
  46280. "cvssV3" : {
  46281. "version" : "3.1",
  46282. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
  46283. "attackVector" : "NETWORK",
  46284. "attackComplexity" : "LOW",
  46285. "privilegesRequired" : "NONE",
  46286. "userInteraction" : "NONE",
  46287. "scope" : "UNCHANGED",
  46288. "confidentialityImpact" : "NONE",
  46289. "integrityImpact" : "NONE",
  46290. "availabilityImpact" : "LOW",
  46291. "baseScore" : 5.3,
  46292. "baseSeverity" : "MEDIUM"
  46293. },
  46294. "exploitabilityScore" : 3.9,
  46295. "impactScore" : 1.4
  46296. },
  46297. "baseMetricV2" : {
  46298. "cvssV2" : {
  46299. "version" : "2.0",
  46300. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  46301. "accessVector" : "NETWORK",
  46302. "accessComplexity" : "LOW",
  46303. "authentication" : "NONE",
  46304. "confidentialityImpact" : "NONE",
  46305. "integrityImpact" : "NONE",
  46306. "availabilityImpact" : "PARTIAL",
  46307. "baseScore" : 5.0
  46308. },
  46309. "severity" : "MEDIUM",
  46310. "exploitabilityScore" : 10.0,
  46311. "impactScore" : 2.9,
  46312. "acInsufInfo" : false,
  46313. "obtainAllPrivilege" : false,
  46314. "obtainUserPrivilege" : false,
  46315. "obtainOtherPrivilege" : false,
  46316. "userInteractionRequired" : false
  46317. }
  46318. },
  46319. "publishedDate" : "2021-04-26T16:15Z",
  46320. "lastModifiedDate" : "2021-05-04T14:40Z"
  46321. }, {
  46322. "cve" : {
  46323. "data_type" : "CVE",
  46324. "data_format" : "MITRE",
  46325. "data_version" : "4.0",
  46326. "CVE_data_meta" : {
  46327. "ID" : "CVE-2021-3494",
  46328. "ASSIGNER" : "secalert@redhat.com"
  46329. },
  46330. "problemtype" : {
  46331. "problemtype_data" : [ {
  46332. "description" : [ {
  46333. "lang" : "en",
  46334. "value" : "CWE-319"
  46335. } ]
  46336. } ]
  46337. },
  46338. "references" : {
  46339. "reference_data" : [ {
  46340. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1948005",
  46341. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1948005",
  46342. "refsource" : "MISC",
  46343. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  46344. } ]
  46345. },
  46346. "description" : {
  46347. "description_data" : [ {
  46348. "lang" : "en",
  46349. "value" : "A smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flaw which can cause a Man-in-the-Middle attack. The FreeIPA module of Foreman smart proxy does not check the SSL certificate, thus, an unauthenticated attacker can perform actions in FreeIPA if certain conditions are met. The highest threat from this flaw is to system confidentiality. This flaw affects Foreman versions before 2.5.0."
  46350. } ]
  46351. }
  46352. },
  46353. "configurations" : {
  46354. "CVE_data_version" : "4.0",
  46355. "nodes" : [ {
  46356. "operator" : "OR",
  46357. "children" : [ ],
  46358. "cpe_match" : [ {
  46359. "vulnerable" : true,
  46360. "cpe23Uri" : "cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*",
  46361. "versionEndExcluding" : "2.5.0",
  46362. "cpe_name" : [ ]
  46363. } ]
  46364. } ]
  46365. },
  46366. "impact" : {
  46367. "baseMetricV3" : {
  46368. "cvssV3" : {
  46369. "version" : "3.1",
  46370. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
  46371. "attackVector" : "NETWORK",
  46372. "attackComplexity" : "HIGH",
  46373. "privilegesRequired" : "NONE",
  46374. "userInteraction" : "NONE",
  46375. "scope" : "UNCHANGED",
  46376. "confidentialityImpact" : "HIGH",
  46377. "integrityImpact" : "NONE",
  46378. "availabilityImpact" : "NONE",
  46379. "baseScore" : 5.9,
  46380. "baseSeverity" : "MEDIUM"
  46381. },
  46382. "exploitabilityScore" : 2.2,
  46383. "impactScore" : 3.6
  46384. },
  46385. "baseMetricV2" : {
  46386. "cvssV2" : {
  46387. "version" : "2.0",
  46388. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:N/A:N",
  46389. "accessVector" : "NETWORK",
  46390. "accessComplexity" : "MEDIUM",
  46391. "authentication" : "NONE",
  46392. "confidentialityImpact" : "PARTIAL",
  46393. "integrityImpact" : "NONE",
  46394. "availabilityImpact" : "NONE",
  46395. "baseScore" : 4.3
  46396. },
  46397. "severity" : "MEDIUM",
  46398. "exploitabilityScore" : 8.6,
  46399. "impactScore" : 2.9,
  46400. "acInsufInfo" : false,
  46401. "obtainAllPrivilege" : false,
  46402. "obtainUserPrivilege" : false,
  46403. "obtainOtherPrivilege" : false,
  46404. "userInteractionRequired" : false
  46405. }
  46406. },
  46407. "publishedDate" : "2021-04-26T15:15Z",
  46408. "lastModifiedDate" : "2021-05-04T14:14Z"
  46409. }, {
  46410. "cve" : {
  46411. "data_type" : "CVE",
  46412. "data_format" : "MITRE",
  46413. "data_version" : "4.0",
  46414. "CVE_data_meta" : {
  46415. "ID" : "CVE-2021-28399",
  46416. "ASSIGNER" : "cve@mitre.org"
  46417. },
  46418. "problemtype" : {
  46419. "problemtype_data" : [ {
  46420. "description" : [ {
  46421. "lang" : "en",
  46422. "value" : "NVD-CWE-noinfo"
  46423. } ]
  46424. } ]
  46425. },
  46426. "references" : {
  46427. "reference_data" : [ {
  46428. "url" : "https://github.com/C1inton/CVE-Record/blob/master/CVE%20Record/%5BCVE-2021-28399%5DOrangeHRM%204.7.md",
  46429. "name" : "https://github.com/C1inton/CVE-Record/blob/master/CVE%20Record/%5BCVE-2021-28399%5DOrangeHRM%204.7.md",
  46430. "refsource" : "MISC",
  46431. "tags" : [ "Broken Link", "Third Party Advisory" ]
  46432. }, {
  46433. "url" : "https://www.orangehrm.com/",
  46434. "name" : "https://www.orangehrm.com/",
  46435. "refsource" : "MISC",
  46436. "tags" : [ "Vendor Advisory" ]
  46437. } ]
  46438. },
  46439. "description" : {
  46440. "description_data" : [ {
  46441. "lang" : "en",
  46442. "value" : "OrangeHRM 4.7 allows an unauthenticated user to enumerate the valid username and email address via the forgot password function."
  46443. } ]
  46444. }
  46445. },
  46446. "configurations" : {
  46447. "CVE_data_version" : "4.0",
  46448. "nodes" : [ {
  46449. "operator" : "OR",
  46450. "children" : [ ],
  46451. "cpe_match" : [ {
  46452. "vulnerable" : true,
  46453. "cpe23Uri" : "cpe:2.3:a:orangehrm:orangehrm:4.7:*:*:*:*:*:*:*",
  46454. "cpe_name" : [ ]
  46455. } ]
  46456. } ]
  46457. },
  46458. "impact" : {
  46459. "baseMetricV3" : {
  46460. "cvssV3" : {
  46461. "version" : "3.1",
  46462. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  46463. "attackVector" : "NETWORK",
  46464. "attackComplexity" : "LOW",
  46465. "privilegesRequired" : "NONE",
  46466. "userInteraction" : "NONE",
  46467. "scope" : "UNCHANGED",
  46468. "confidentialityImpact" : "LOW",
  46469. "integrityImpact" : "NONE",
  46470. "availabilityImpact" : "NONE",
  46471. "baseScore" : 5.3,
  46472. "baseSeverity" : "MEDIUM"
  46473. },
  46474. "exploitabilityScore" : 3.9,
  46475. "impactScore" : 1.4
  46476. },
  46477. "baseMetricV2" : {
  46478. "cvssV2" : {
  46479. "version" : "2.0",
  46480. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  46481. "accessVector" : "NETWORK",
  46482. "accessComplexity" : "LOW",
  46483. "authentication" : "NONE",
  46484. "confidentialityImpact" : "PARTIAL",
  46485. "integrityImpact" : "NONE",
  46486. "availabilityImpact" : "NONE",
  46487. "baseScore" : 5.0
  46488. },
  46489. "severity" : "MEDIUM",
  46490. "exploitabilityScore" : 10.0,
  46491. "impactScore" : 2.9,
  46492. "acInsufInfo" : false,
  46493. "obtainAllPrivilege" : false,
  46494. "obtainUserPrivilege" : false,
  46495. "obtainOtherPrivilege" : false,
  46496. "userInteractionRequired" : false
  46497. }
  46498. },
  46499. "publishedDate" : "2021-04-26T14:15Z",
  46500. "lastModifiedDate" : "2021-05-05T21:20Z"
  46501. }, {
  46502. "cve" : {
  46503. "data_type" : "CVE",
  46504. "data_format" : "MITRE",
  46505. "data_version" : "4.0",
  46506. "CVE_data_meta" : {
  46507. "ID" : "CVE-2021-25839",
  46508. "ASSIGNER" : "cve@mitre.org"
  46509. },
  46510. "problemtype" : {
  46511. "problemtype_data" : [ {
  46512. "description" : [ {
  46513. "lang" : "en",
  46514. "value" : "CWE-521"
  46515. } ]
  46516. } ]
  46517. },
  46518. "references" : {
  46519. "reference_data" : [ {
  46520. "url" : "https://github.com/C1inton/CVE-Record/blob/master/CVE%20Record/%5BCVE-2021-25839%5DMintHCM%203.0.8.md",
  46521. "name" : "https://github.com/C1inton/CVE-Record/blob/master/CVE%20Record/%5BCVE-2021-25839%5DMintHCM%203.0.8.md",
  46522. "refsource" : "MISC",
  46523. "tags" : [ "Exploit", "Third Party Advisory" ]
  46524. }, {
  46525. "url" : "https://minthcm.org/",
  46526. "name" : "https://minthcm.org/",
  46527. "refsource" : "MISC",
  46528. "tags" : [ "Product" ]
  46529. } ]
  46530. },
  46531. "description" : {
  46532. "description_data" : [ {
  46533. "lang" : "en",
  46534. "value" : "A weak password requirement vulnerability exists in the Create New User function of MintHCM RELEASE 3.0.8, which could lead an attacker to easier password brute-forcing."
  46535. } ]
  46536. }
  46537. },
  46538. "configurations" : {
  46539. "CVE_data_version" : "4.0",
  46540. "nodes" : [ {
  46541. "operator" : "OR",
  46542. "children" : [ ],
  46543. "cpe_match" : [ {
  46544. "vulnerable" : true,
  46545. "cpe23Uri" : "cpe:2.3:a:minthcm:minthcm:3.0.8:*:*:*:*:*:*:*",
  46546. "cpe_name" : [ ]
  46547. } ]
  46548. } ]
  46549. },
  46550. "impact" : {
  46551. "baseMetricV3" : {
  46552. "cvssV3" : {
  46553. "version" : "3.1",
  46554. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  46555. "attackVector" : "NETWORK",
  46556. "attackComplexity" : "LOW",
  46557. "privilegesRequired" : "NONE",
  46558. "userInteraction" : "NONE",
  46559. "scope" : "UNCHANGED",
  46560. "confidentialityImpact" : "HIGH",
  46561. "integrityImpact" : "HIGH",
  46562. "availabilityImpact" : "HIGH",
  46563. "baseScore" : 9.8,
  46564. "baseSeverity" : "CRITICAL"
  46565. },
  46566. "exploitabilityScore" : 3.9,
  46567. "impactScore" : 5.9
  46568. },
  46569. "baseMetricV2" : {
  46570. "cvssV2" : {
  46571. "version" : "2.0",
  46572. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  46573. "accessVector" : "NETWORK",
  46574. "accessComplexity" : "LOW",
  46575. "authentication" : "NONE",
  46576. "confidentialityImpact" : "PARTIAL",
  46577. "integrityImpact" : "NONE",
  46578. "availabilityImpact" : "NONE",
  46579. "baseScore" : 5.0
  46580. },
  46581. "severity" : "MEDIUM",
  46582. "exploitabilityScore" : 10.0,
  46583. "impactScore" : 2.9,
  46584. "acInsufInfo" : false,
  46585. "obtainAllPrivilege" : false,
  46586. "obtainUserPrivilege" : false,
  46587. "obtainOtherPrivilege" : false,
  46588. "userInteractionRequired" : false
  46589. }
  46590. },
  46591. "publishedDate" : "2021-04-26T14:15Z",
  46592. "lastModifiedDate" : "2021-05-06T21:17Z"
  46593. }, {
  46594. "cve" : {
  46595. "data_type" : "CVE",
  46596. "data_format" : "MITRE",
  46597. "data_version" : "4.0",
  46598. "CVE_data_meta" : {
  46599. "ID" : "CVE-2021-31802",
  46600. "ASSIGNER" : "cve@mitre.org"
  46601. },
  46602. "problemtype" : {
  46603. "problemtype_data" : [ {
  46604. "description" : [ {
  46605. "lang" : "en",
  46606. "value" : "CWE-787"
  46607. } ]
  46608. } ]
  46609. },
  46610. "references" : {
  46611. "reference_data" : [ {
  46612. "url" : "https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-httpd-preauth-rce/",
  46613. "name" : "https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-httpd-preauth-rce/",
  46614. "refsource" : "MISC",
  46615. "tags" : [ "Exploit", "Third Party Advisory" ]
  46616. }, {
  46617. "url" : "https://www.netgear.com/about/security/",
  46618. "name" : "https://www.netgear.com/about/security/",
  46619. "refsource" : "MISC",
  46620. "tags" : [ "Vendor Advisory" ]
  46621. } ]
  46622. },
  46623. "description" : {
  46624. "description_data" : [ {
  46625. "lang" : "en",
  46626. "value" : "NETGEAR R7000 1.0.11.116 devices have a heap-based Buffer Overflow that is exploitable from the local network without authentication. The vulnerability exists within the handling of an HTTP request. An attacker can leverage this to execute code as root. The problem is that a user-provided length value is trusted during a backup.cgi file upload. The attacker must add a \\n before the Content-Length header."
  46627. } ]
  46628. }
  46629. },
  46630. "configurations" : {
  46631. "CVE_data_version" : "4.0",
  46632. "nodes" : [ {
  46633. "operator" : "AND",
  46634. "children" : [ {
  46635. "operator" : "OR",
  46636. "children" : [ ],
  46637. "cpe_match" : [ {
  46638. "vulnerable" : true,
  46639. "cpe23Uri" : "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
  46640. "versionEndIncluding" : "1.0.11.116",
  46641. "cpe_name" : [ ]
  46642. } ]
  46643. }, {
  46644. "operator" : "OR",
  46645. "children" : [ ],
  46646. "cpe_match" : [ {
  46647. "vulnerable" : false,
  46648. "cpe23Uri" : "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
  46649. "cpe_name" : [ ]
  46650. } ]
  46651. } ],
  46652. "cpe_match" : [ ]
  46653. } ]
  46654. },
  46655. "impact" : {
  46656. "baseMetricV3" : {
  46657. "cvssV3" : {
  46658. "version" : "3.1",
  46659. "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  46660. "attackVector" : "ADJACENT_NETWORK",
  46661. "attackComplexity" : "LOW",
  46662. "privilegesRequired" : "NONE",
  46663. "userInteraction" : "NONE",
  46664. "scope" : "UNCHANGED",
  46665. "confidentialityImpact" : "HIGH",
  46666. "integrityImpact" : "HIGH",
  46667. "availabilityImpact" : "HIGH",
  46668. "baseScore" : 8.8,
  46669. "baseSeverity" : "HIGH"
  46670. },
  46671. "exploitabilityScore" : 2.8,
  46672. "impactScore" : 5.9
  46673. },
  46674. "baseMetricV2" : {
  46675. "cvssV2" : {
  46676. "version" : "2.0",
  46677. "vectorString" : "AV:A/AC:L/Au:N/C:C/I:C/A:C",
  46678. "accessVector" : "ADJACENT_NETWORK",
  46679. "accessComplexity" : "LOW",
  46680. "authentication" : "NONE",
  46681. "confidentialityImpact" : "COMPLETE",
  46682. "integrityImpact" : "COMPLETE",
  46683. "availabilityImpact" : "COMPLETE",
  46684. "baseScore" : 8.3
  46685. },
  46686. "severity" : "HIGH",
  46687. "exploitabilityScore" : 6.5,
  46688. "impactScore" : 10.0,
  46689. "acInsufInfo" : false,
  46690. "obtainAllPrivilege" : false,
  46691. "obtainUserPrivilege" : false,
  46692. "obtainOtherPrivilege" : false,
  46693. "userInteractionRequired" : false
  46694. }
  46695. },
  46696. "publishedDate" : "2021-04-26T13:15Z",
  46697. "lastModifiedDate" : "2021-05-06T20:38Z"
  46698. }, {
  46699. "cve" : {
  46700. "data_type" : "CVE",
  46701. "data_format" : "MITRE",
  46702. "data_version" : "4.0",
  46703. "CVE_data_meta" : {
  46704. "ID" : "CVE-2021-26797",
  46705. "ASSIGNER" : "cve@mitre.org"
  46706. },
  46707. "problemtype" : {
  46708. "problemtype_data" : [ {
  46709. "description" : [ {
  46710. "lang" : "en",
  46711. "value" : "CWE-521"
  46712. } ]
  46713. } ]
  46714. },
  46715. "references" : {
  46716. "reference_data" : [ {
  46717. "url" : "https://le0nc.blogspot.com/2021/04/cve-2021-26797-access-control.html",
  46718. "name" : "https://le0nc.blogspot.com/2021/04/cve-2021-26797-access-control.html",
  46719. "refsource" : "MISC",
  46720. "tags" : [ "Exploit", "Third Party Advisory" ]
  46721. } ]
  46722. },
  46723. "description" : {
  46724. "description_data" : [ {
  46725. "lang" : "en",
  46726. "value" : "An access control vulnerability in Hame SD1 Wi-Fi firmware <=V.20140224154640 allows an attacker to get system administrator through an open Telnet service."
  46727. } ]
  46728. }
  46729. },
  46730. "configurations" : {
  46731. "CVE_data_version" : "4.0",
  46732. "nodes" : [ {
  46733. "operator" : "AND",
  46734. "children" : [ {
  46735. "operator" : "OR",
  46736. "children" : [ ],
  46737. "cpe_match" : [ {
  46738. "vulnerable" : true,
  46739. "cpe23Uri" : "cpe:2.3:o:hametech:hame_sd1_wi-fi_firmware:*:*:*:*:*:*:*:*",
  46740. "versionEndIncluding" : "20140224154640",
  46741. "cpe_name" : [ ]
  46742. } ]
  46743. }, {
  46744. "operator" : "OR",
  46745. "children" : [ ],
  46746. "cpe_match" : [ {
  46747. "vulnerable" : false,
  46748. "cpe23Uri" : "cpe:2.3:h:hametech:hame_sd1_wi-fi:-:*:*:*:*:*:*:*",
  46749. "cpe_name" : [ ]
  46750. } ]
  46751. } ],
  46752. "cpe_match" : [ ]
  46753. } ]
  46754. },
  46755. "impact" : {
  46756. "baseMetricV3" : {
  46757. "cvssV3" : {
  46758. "version" : "3.1",
  46759. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  46760. "attackVector" : "NETWORK",
  46761. "attackComplexity" : "LOW",
  46762. "privilegesRequired" : "NONE",
  46763. "userInteraction" : "NONE",
  46764. "scope" : "UNCHANGED",
  46765. "confidentialityImpact" : "HIGH",
  46766. "integrityImpact" : "HIGH",
  46767. "availabilityImpact" : "HIGH",
  46768. "baseScore" : 9.8,
  46769. "baseSeverity" : "CRITICAL"
  46770. },
  46771. "exploitabilityScore" : 3.9,
  46772. "impactScore" : 5.9
  46773. },
  46774. "baseMetricV2" : {
  46775. "cvssV2" : {
  46776. "version" : "2.0",
  46777. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  46778. "accessVector" : "NETWORK",
  46779. "accessComplexity" : "LOW",
  46780. "authentication" : "NONE",
  46781. "confidentialityImpact" : "PARTIAL",
  46782. "integrityImpact" : "PARTIAL",
  46783. "availabilityImpact" : "PARTIAL",
  46784. "baseScore" : 7.5
  46785. },
  46786. "severity" : "HIGH",
  46787. "exploitabilityScore" : 10.0,
  46788. "impactScore" : 6.4,
  46789. "acInsufInfo" : false,
  46790. "obtainAllPrivilege" : false,
  46791. "obtainUserPrivilege" : false,
  46792. "obtainOtherPrivilege" : false,
  46793. "userInteractionRequired" : false
  46794. }
  46795. },
  46796. "publishedDate" : "2021-04-26T12:15Z",
  46797. "lastModifiedDate" : "2021-05-06T13:43Z"
  46798. }, {
  46799. "cve" : {
  46800. "data_type" : "CVE",
  46801. "data_format" : "MITRE",
  46802. "data_version" : "4.0",
  46803. "CVE_data_meta" : {
  46804. "ID" : "CVE-2021-25927",
  46805. "ASSIGNER" : "vulnerabilitylab@whitesourcesoftware.com"
  46806. },
  46807. "problemtype" : {
  46808. "problemtype_data" : [ {
  46809. "description" : [ {
  46810. "lang" : "en",
  46811. "value" : "NVD-CWE-Other"
  46812. } ]
  46813. } ]
  46814. },
  46815. "references" : {
  46816. "reference_data" : [ {
  46817. "url" : "https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3",
  46818. "name" : "https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3",
  46819. "refsource" : "MISC",
  46820. "tags" : [ "Patch", "Third Party Advisory" ]
  46821. }, {
  46822. "url" : "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927",
  46823. "name" : "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927",
  46824. "refsource" : "MISC",
  46825. "tags" : [ "Exploit", "Third Party Advisory" ]
  46826. } ]
  46827. },
  46828. "description" : {
  46829. "description_data" : [ {
  46830. "lang" : "en",
  46831. "value" : "Prototype pollution vulnerability in 'safe-flat' versions 2.0.0 through 2.0.1 allows an attacker to cause a denial of service and may lead to remote code execution."
  46832. } ]
  46833. }
  46834. },
  46835. "configurations" : {
  46836. "CVE_data_version" : "4.0",
  46837. "nodes" : [ {
  46838. "operator" : "OR",
  46839. "children" : [ ],
  46840. "cpe_match" : [ {
  46841. "vulnerable" : true,
  46842. "cpe23Uri" : "cpe:2.3:a:safe-flat_project:safe-flat:*:*:*:*:*:*:*:*",
  46843. "versionStartIncluding" : "2.0.0",
  46844. "versionEndExcluding" : "2.0.2",
  46845. "cpe_name" : [ ]
  46846. } ]
  46847. } ]
  46848. },
  46849. "impact" : {
  46850. "baseMetricV3" : {
  46851. "cvssV3" : {
  46852. "version" : "3.1",
  46853. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  46854. "attackVector" : "NETWORK",
  46855. "attackComplexity" : "LOW",
  46856. "privilegesRequired" : "NONE",
  46857. "userInteraction" : "NONE",
  46858. "scope" : "UNCHANGED",
  46859. "confidentialityImpact" : "HIGH",
  46860. "integrityImpact" : "HIGH",
  46861. "availabilityImpact" : "HIGH",
  46862. "baseScore" : 9.8,
  46863. "baseSeverity" : "CRITICAL"
  46864. },
  46865. "exploitabilityScore" : 3.9,
  46866. "impactScore" : 5.9
  46867. },
  46868. "baseMetricV2" : {
  46869. "cvssV2" : {
  46870. "version" : "2.0",
  46871. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  46872. "accessVector" : "NETWORK",
  46873. "accessComplexity" : "LOW",
  46874. "authentication" : "NONE",
  46875. "confidentialityImpact" : "PARTIAL",
  46876. "integrityImpact" : "PARTIAL",
  46877. "availabilityImpact" : "PARTIAL",
  46878. "baseScore" : 7.5
  46879. },
  46880. "severity" : "HIGH",
  46881. "exploitabilityScore" : 10.0,
  46882. "impactScore" : 6.4,
  46883. "acInsufInfo" : false,
  46884. "obtainAllPrivilege" : false,
  46885. "obtainUserPrivilege" : false,
  46886. "obtainOtherPrivilege" : false,
  46887. "userInteractionRequired" : false
  46888. }
  46889. },
  46890. "publishedDate" : "2021-04-26T11:15Z",
  46891. "lastModifiedDate" : "2021-05-06T13:32Z"
  46892. }, {
  46893. "cve" : {
  46894. "data_type" : "CVE",
  46895. "data_format" : "MITRE",
  46896. "data_version" : "4.0",
  46897. "CVE_data_meta" : {
  46898. "ID" : "CVE-2021-31803",
  46899. "ASSIGNER" : "cve@mitre.org"
  46900. },
  46901. "problemtype" : {
  46902. "problemtype_data" : [ {
  46903. "description" : [ {
  46904. "lang" : "en",
  46905. "value" : "CWE-79"
  46906. } ]
  46907. } ]
  46908. },
  46909. "references" : {
  46910. "reference_data" : [ {
  46911. "url" : "https://docs.cpanel.net/changelogs/94-change-log/",
  46912. "name" : "https://docs.cpanel.net/changelogs/94-change-log/",
  46913. "refsource" : "MISC",
  46914. "tags" : [ "Release Notes", "Vendor Advisory" ]
  46915. } ]
  46916. },
  46917. "description" : {
  46918. "description_data" : [ {
  46919. "lang" : "en",
  46920. "value" : "cPanel before 94.0.3 allows self-XSS via EasyApache 4 Save Profile (SEC-581)."
  46921. } ]
  46922. }
  46923. },
  46924. "configurations" : {
  46925. "CVE_data_version" : "4.0",
  46926. "nodes" : [ {
  46927. "operator" : "OR",
  46928. "children" : [ ],
  46929. "cpe_match" : [ {
  46930. "vulnerable" : true,
  46931. "cpe23Uri" : "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
  46932. "versionEndExcluding" : "94.0.3",
  46933. "cpe_name" : [ ]
  46934. } ]
  46935. } ]
  46936. },
  46937. "impact" : {
  46938. "baseMetricV3" : {
  46939. "cvssV3" : {
  46940. "version" : "3.1",
  46941. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  46942. "attackVector" : "NETWORK",
  46943. "attackComplexity" : "LOW",
  46944. "privilegesRequired" : "NONE",
  46945. "userInteraction" : "REQUIRED",
  46946. "scope" : "CHANGED",
  46947. "confidentialityImpact" : "LOW",
  46948. "integrityImpact" : "LOW",
  46949. "availabilityImpact" : "NONE",
  46950. "baseScore" : 6.1,
  46951. "baseSeverity" : "MEDIUM"
  46952. },
  46953. "exploitabilityScore" : 2.8,
  46954. "impactScore" : 2.7
  46955. },
  46956. "baseMetricV2" : {
  46957. "cvssV2" : {
  46958. "version" : "2.0",
  46959. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  46960. "accessVector" : "NETWORK",
  46961. "accessComplexity" : "MEDIUM",
  46962. "authentication" : "NONE",
  46963. "confidentialityImpact" : "NONE",
  46964. "integrityImpact" : "PARTIAL",
  46965. "availabilityImpact" : "NONE",
  46966. "baseScore" : 4.3
  46967. },
  46968. "severity" : "MEDIUM",
  46969. "exploitabilityScore" : 8.6,
  46970. "impactScore" : 2.9,
  46971. "acInsufInfo" : false,
  46972. "obtainAllPrivilege" : false,
  46973. "obtainUserPrivilege" : false,
  46974. "obtainOtherPrivilege" : false,
  46975. "userInteractionRequired" : true
  46976. }
  46977. },
  46978. "publishedDate" : "2021-04-26T08:15Z",
  46979. "lastModifiedDate" : "2021-05-06T20:40Z"
  46980. }, {
  46981. "cve" : {
  46982. "data_type" : "CVE",
  46983. "data_format" : "MITRE",
  46984. "data_version" : "4.0",
  46985. "CVE_data_meta" : {
  46986. "ID" : "CVE-2021-20712",
  46987. "ASSIGNER" : "vultures@jpcert.or.jp"
  46988. },
  46989. "problemtype" : {
  46990. "problemtype_data" : [ {
  46991. "description" : [ {
  46992. "lang" : "en",
  46993. "value" : "CWE-863"
  46994. } ]
  46995. } ]
  46996. },
  46997. "references" : {
  46998. "reference_data" : [ {
  46999. "url" : "https://jvn.jp/en/jp/JVN29739718/index.html",
  47000. "name" : "https://jvn.jp/en/jp/JVN29739718/index.html",
  47001. "refsource" : "MISC",
  47002. "tags" : [ "Third Party Advisory" ]
  47003. }, {
  47004. "url" : "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
  47005. "name" : "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
  47006. "refsource" : "MISC",
  47007. "tags" : [ "Mitigation", "Vendor Advisory" ]
  47008. } ]
  47009. },
  47010. "description" : {
  47011. "description_data" : [ {
  47012. "lang" : "en",
  47013. "value" : "Improper access control vulnerability in NEC Aterm WG2600HS firmware Ver1.5.1 and earlier, and Aterm WX3000HP firmware Ver1.1.2 and earlier allows a device connected to the LAN side to be accessed from the WAN side due to the defect in the IPv6 firewall function."
  47014. } ]
  47015. }
  47016. },
  47017. "configurations" : {
  47018. "CVE_data_version" : "4.0",
  47019. "nodes" : [ {
  47020. "operator" : "AND",
  47021. "children" : [ {
  47022. "operator" : "OR",
  47023. "children" : [ ],
  47024. "cpe_match" : [ {
  47025. "vulnerable" : true,
  47026. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*",
  47027. "versionEndIncluding" : "1.5.1",
  47028. "cpe_name" : [ ]
  47029. } ]
  47030. }, {
  47031. "operator" : "OR",
  47032. "children" : [ ],
  47033. "cpe_match" : [ {
  47034. "vulnerable" : false,
  47035. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*",
  47036. "cpe_name" : [ ]
  47037. } ]
  47038. } ],
  47039. "cpe_match" : [ ]
  47040. }, {
  47041. "operator" : "AND",
  47042. "children" : [ {
  47043. "operator" : "OR",
  47044. "children" : [ ],
  47045. "cpe_match" : [ {
  47046. "vulnerable" : true,
  47047. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wx3000hp_firmware:*:*:*:*:*:*:*:*",
  47048. "versionEndIncluding" : "1.1.2",
  47049. "cpe_name" : [ ]
  47050. } ]
  47051. }, {
  47052. "operator" : "OR",
  47053. "children" : [ ],
  47054. "cpe_match" : [ {
  47055. "vulnerable" : false,
  47056. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wx3000hp:-:*:*:*:*:*:*:*",
  47057. "cpe_name" : [ ]
  47058. } ]
  47059. } ],
  47060. "cpe_match" : [ ]
  47061. } ]
  47062. },
  47063. "impact" : {
  47064. "baseMetricV3" : {
  47065. "cvssV3" : {
  47066. "version" : "3.1",
  47067. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  47068. "attackVector" : "NETWORK",
  47069. "attackComplexity" : "LOW",
  47070. "privilegesRequired" : "NONE",
  47071. "userInteraction" : "NONE",
  47072. "scope" : "UNCHANGED",
  47073. "confidentialityImpact" : "LOW",
  47074. "integrityImpact" : "NONE",
  47075. "availabilityImpact" : "NONE",
  47076. "baseScore" : 5.3,
  47077. "baseSeverity" : "MEDIUM"
  47078. },
  47079. "exploitabilityScore" : 3.9,
  47080. "impactScore" : 1.4
  47081. },
  47082. "baseMetricV2" : {
  47083. "cvssV2" : {
  47084. "version" : "2.0",
  47085. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  47086. "accessVector" : "NETWORK",
  47087. "accessComplexity" : "LOW",
  47088. "authentication" : "NONE",
  47089. "confidentialityImpact" : "PARTIAL",
  47090. "integrityImpact" : "NONE",
  47091. "availabilityImpact" : "NONE",
  47092. "baseScore" : 5.0
  47093. },
  47094. "severity" : "MEDIUM",
  47095. "exploitabilityScore" : 10.0,
  47096. "impactScore" : 2.9,
  47097. "acInsufInfo" : false,
  47098. "obtainAllPrivilege" : false,
  47099. "obtainUserPrivilege" : false,
  47100. "obtainOtherPrivilege" : false,
  47101. "userInteractionRequired" : false
  47102. }
  47103. },
  47104. "publishedDate" : "2021-04-26T01:15Z",
  47105. "lastModifiedDate" : "2021-05-05T21:19Z"
  47106. }, {
  47107. "cve" : {
  47108. "data_type" : "CVE",
  47109. "data_format" : "MITRE",
  47110. "data_version" : "4.0",
  47111. "CVE_data_meta" : {
  47112. "ID" : "CVE-2021-20709",
  47113. "ASSIGNER" : "vultures@jpcert.or.jp"
  47114. },
  47115. "problemtype" : {
  47116. "problemtype_data" : [ {
  47117. "description" : [ {
  47118. "lang" : "en",
  47119. "value" : "CWE-354"
  47120. } ]
  47121. } ]
  47122. },
  47123. "references" : {
  47124. "reference_data" : [ {
  47125. "url" : "https://jvn.jp/en/jp/JVN29739718/index.html",
  47126. "name" : "https://jvn.jp/en/jp/JVN29739718/index.html",
  47127. "refsource" : "MISC",
  47128. "tags" : [ "Third Party Advisory" ]
  47129. }, {
  47130. "url" : "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
  47131. "name" : "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
  47132. "refsource" : "MISC",
  47133. "tags" : [ "Mitigation", "Vendor Advisory" ]
  47134. } ]
  47135. },
  47136. "description" : {
  47137. "description_data" : [ {
  47138. "lang" : "en",
  47139. "value" : "Improper validation of integrity check value vulnerability in NEC Aterm WF1200CR firmware Ver1.3.2 and earlier, Aterm WG1200CR firmware Ver1.3.3 and earlier, and Aterm WG2600HS firmware Ver1.5.1 and earlier allows an attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to a specific URL."
  47140. } ]
  47141. }
  47142. },
  47143. "configurations" : {
  47144. "CVE_data_version" : "4.0",
  47145. "nodes" : [ {
  47146. "operator" : "AND",
  47147. "children" : [ {
  47148. "operator" : "OR",
  47149. "children" : [ ],
  47150. "cpe_match" : [ {
  47151. "vulnerable" : true,
  47152. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wf1200cr_firmware:*:*:*:*:*:*:*:*",
  47153. "versionEndIncluding" : "1.3.2",
  47154. "cpe_name" : [ ]
  47155. } ]
  47156. }, {
  47157. "operator" : "OR",
  47158. "children" : [ ],
  47159. "cpe_match" : [ {
  47160. "vulnerable" : false,
  47161. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wf1200cr:-:*:*:*:*:*:*:*",
  47162. "cpe_name" : [ ]
  47163. } ]
  47164. } ],
  47165. "cpe_match" : [ ]
  47166. }, {
  47167. "operator" : "AND",
  47168. "children" : [ {
  47169. "operator" : "OR",
  47170. "children" : [ ],
  47171. "cpe_match" : [ {
  47172. "vulnerable" : true,
  47173. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*",
  47174. "versionEndIncluding" : "1.3.3",
  47175. "cpe_name" : [ ]
  47176. } ]
  47177. }, {
  47178. "operator" : "OR",
  47179. "children" : [ ],
  47180. "cpe_match" : [ {
  47181. "vulnerable" : false,
  47182. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*",
  47183. "cpe_name" : [ ]
  47184. } ]
  47185. } ],
  47186. "cpe_match" : [ ]
  47187. }, {
  47188. "operator" : "AND",
  47189. "children" : [ {
  47190. "operator" : "OR",
  47191. "children" : [ ],
  47192. "cpe_match" : [ {
  47193. "vulnerable" : true,
  47194. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*",
  47195. "versionEndIncluding" : "1.5.1",
  47196. "cpe_name" : [ ]
  47197. } ]
  47198. }, {
  47199. "operator" : "OR",
  47200. "children" : [ ],
  47201. "cpe_match" : [ {
  47202. "vulnerable" : false,
  47203. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*",
  47204. "cpe_name" : [ ]
  47205. } ]
  47206. } ],
  47207. "cpe_match" : [ ]
  47208. } ]
  47209. },
  47210. "impact" : {
  47211. "baseMetricV3" : {
  47212. "cvssV3" : {
  47213. "version" : "3.1",
  47214. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  47215. "attackVector" : "NETWORK",
  47216. "attackComplexity" : "LOW",
  47217. "privilegesRequired" : "HIGH",
  47218. "userInteraction" : "NONE",
  47219. "scope" : "UNCHANGED",
  47220. "confidentialityImpact" : "HIGH",
  47221. "integrityImpact" : "HIGH",
  47222. "availabilityImpact" : "HIGH",
  47223. "baseScore" : 7.2,
  47224. "baseSeverity" : "HIGH"
  47225. },
  47226. "exploitabilityScore" : 1.2,
  47227. "impactScore" : 5.9
  47228. },
  47229. "baseMetricV2" : {
  47230. "cvssV2" : {
  47231. "version" : "2.0",
  47232. "vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C",
  47233. "accessVector" : "NETWORK",
  47234. "accessComplexity" : "LOW",
  47235. "authentication" : "SINGLE",
  47236. "confidentialityImpact" : "COMPLETE",
  47237. "integrityImpact" : "COMPLETE",
  47238. "availabilityImpact" : "COMPLETE",
  47239. "baseScore" : 9.0
  47240. },
  47241. "severity" : "HIGH",
  47242. "exploitabilityScore" : 8.0,
  47243. "impactScore" : 10.0,
  47244. "acInsufInfo" : false,
  47245. "obtainAllPrivilege" : false,
  47246. "obtainUserPrivilege" : false,
  47247. "obtainOtherPrivilege" : false,
  47248. "userInteractionRequired" : false
  47249. }
  47250. },
  47251. "publishedDate" : "2021-04-26T01:15Z",
  47252. "lastModifiedDate" : "2021-05-05T20:02Z"
  47253. }, {
  47254. "cve" : {
  47255. "data_type" : "CVE",
  47256. "data_format" : "MITRE",
  47257. "data_version" : "4.0",
  47258. "CVE_data_meta" : {
  47259. "ID" : "CVE-2021-20708",
  47260. "ASSIGNER" : "vultures@jpcert.or.jp"
  47261. },
  47262. "problemtype" : {
  47263. "problemtype_data" : [ {
  47264. "description" : [ {
  47265. "lang" : "en",
  47266. "value" : "CWE-78"
  47267. } ]
  47268. } ]
  47269. },
  47270. "references" : {
  47271. "reference_data" : [ {
  47272. "url" : "https://jvn.jp/en/jp/JVN29739718/index.html",
  47273. "name" : "https://jvn.jp/en/jp/JVN29739718/index.html",
  47274. "refsource" : "MISC",
  47275. "tags" : [ "Third Party Advisory" ]
  47276. }, {
  47277. "url" : "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
  47278. "name" : "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
  47279. "refsource" : "MISC",
  47280. "tags" : [ "Mitigation", "Vendor Advisory" ]
  47281. } ]
  47282. },
  47283. "description" : {
  47284. "description_data" : [ {
  47285. "lang" : "en",
  47286. "value" : "NEC Aterm devices (Aterm WF1200CR firmware Ver1.3.2 and earlier, Aterm WG1200CR firmware Ver1.3.3 and earlier, and Aterm WG2600HS firmware Ver1.5.1 and earlier) allow authenticated attackers to execute arbitrary OS commands by sending a specially crafted request to a specific URL."
  47287. } ]
  47288. }
  47289. },
  47290. "configurations" : {
  47291. "CVE_data_version" : "4.0",
  47292. "nodes" : [ {
  47293. "operator" : "AND",
  47294. "children" : [ {
  47295. "operator" : "OR",
  47296. "children" : [ ],
  47297. "cpe_match" : [ {
  47298. "vulnerable" : true,
  47299. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wf1200cr_firmware:*:*:*:*:*:*:*:*",
  47300. "versionEndIncluding" : "1.3.2",
  47301. "cpe_name" : [ ]
  47302. } ]
  47303. }, {
  47304. "operator" : "OR",
  47305. "children" : [ ],
  47306. "cpe_match" : [ {
  47307. "vulnerable" : false,
  47308. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wf1200cr:-:*:*:*:*:*:*:*",
  47309. "cpe_name" : [ ]
  47310. } ]
  47311. } ],
  47312. "cpe_match" : [ ]
  47313. }, {
  47314. "operator" : "AND",
  47315. "children" : [ {
  47316. "operator" : "OR",
  47317. "children" : [ ],
  47318. "cpe_match" : [ {
  47319. "vulnerable" : true,
  47320. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*",
  47321. "versionEndIncluding" : "1.3.3",
  47322. "cpe_name" : [ ]
  47323. } ]
  47324. }, {
  47325. "operator" : "OR",
  47326. "children" : [ ],
  47327. "cpe_match" : [ {
  47328. "vulnerable" : false,
  47329. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*",
  47330. "cpe_name" : [ ]
  47331. } ]
  47332. } ],
  47333. "cpe_match" : [ ]
  47334. }, {
  47335. "operator" : "AND",
  47336. "children" : [ {
  47337. "operator" : "OR",
  47338. "children" : [ ],
  47339. "cpe_match" : [ {
  47340. "vulnerable" : true,
  47341. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*",
  47342. "versionEndIncluding" : "1.5.1",
  47343. "cpe_name" : [ ]
  47344. } ]
  47345. }, {
  47346. "operator" : "OR",
  47347. "children" : [ ],
  47348. "cpe_match" : [ {
  47349. "vulnerable" : false,
  47350. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*",
  47351. "cpe_name" : [ ]
  47352. } ]
  47353. } ],
  47354. "cpe_match" : [ ]
  47355. } ]
  47356. },
  47357. "impact" : {
  47358. "baseMetricV3" : {
  47359. "cvssV3" : {
  47360. "version" : "3.1",
  47361. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  47362. "attackVector" : "NETWORK",
  47363. "attackComplexity" : "LOW",
  47364. "privilegesRequired" : "HIGH",
  47365. "userInteraction" : "NONE",
  47366. "scope" : "UNCHANGED",
  47367. "confidentialityImpact" : "HIGH",
  47368. "integrityImpact" : "HIGH",
  47369. "availabilityImpact" : "HIGH",
  47370. "baseScore" : 7.2,
  47371. "baseSeverity" : "HIGH"
  47372. },
  47373. "exploitabilityScore" : 1.2,
  47374. "impactScore" : 5.9
  47375. },
  47376. "baseMetricV2" : {
  47377. "cvssV2" : {
  47378. "version" : "2.0",
  47379. "vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C",
  47380. "accessVector" : "NETWORK",
  47381. "accessComplexity" : "LOW",
  47382. "authentication" : "SINGLE",
  47383. "confidentialityImpact" : "COMPLETE",
  47384. "integrityImpact" : "COMPLETE",
  47385. "availabilityImpact" : "COMPLETE",
  47386. "baseScore" : 9.0
  47387. },
  47388. "severity" : "HIGH",
  47389. "exploitabilityScore" : 8.0,
  47390. "impactScore" : 10.0,
  47391. "acInsufInfo" : false,
  47392. "obtainAllPrivilege" : false,
  47393. "obtainUserPrivilege" : false,
  47394. "obtainOtherPrivilege" : false,
  47395. "userInteractionRequired" : false
  47396. }
  47397. },
  47398. "publishedDate" : "2021-04-26T01:15Z",
  47399. "lastModifiedDate" : "2021-05-05T19:57Z"
  47400. }, {
  47401. "cve" : {
  47402. "data_type" : "CVE",
  47403. "data_format" : "MITRE",
  47404. "data_version" : "4.0",
  47405. "CVE_data_meta" : {
  47406. "ID" : "CVE-2021-20697",
  47407. "ASSIGNER" : "vultures@jpcert.or.jp"
  47408. },
  47409. "problemtype" : {
  47410. "problemtype_data" : [ {
  47411. "description" : [ {
  47412. "lang" : "en",
  47413. "value" : "CWE-306"
  47414. } ]
  47415. } ]
  47416. },
  47417. "references" : {
  47418. "reference_data" : [ {
  47419. "url" : "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
  47420. "name" : "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
  47421. "refsource" : "MISC",
  47422. "tags" : [ "Vendor Advisory" ]
  47423. }, {
  47424. "url" : "https://jvn.jp/en/vu/JVNVU92898656/index.html",
  47425. "name" : "https://jvn.jp/en/vu/JVNVU92898656/index.html",
  47426. "refsource" : "MISC",
  47427. "tags" : [ "Third Party Advisory" ]
  47428. } ]
  47429. },
  47430. "description" : {
  47431. "description_data" : [ {
  47432. "lang" : "en",
  47433. "value" : "Missing authentication for critical function in DAP-1880AC firmware version 1.21 and earlier allows a remote attacker to login to the device as an authenticated user without the access privilege via unspecified vectors."
  47434. } ]
  47435. }
  47436. },
  47437. "configurations" : {
  47438. "CVE_data_version" : "4.0",
  47439. "nodes" : [ {
  47440. "operator" : "AND",
  47441. "children" : [ {
  47442. "operator" : "OR",
  47443. "children" : [ ],
  47444. "cpe_match" : [ {
  47445. "vulnerable" : true,
  47446. "cpe23Uri" : "cpe:2.3:o:dlink:dap-1880ac_firmware:*:*:*:*:*:*:*:*",
  47447. "versionEndIncluding" : "1.21",
  47448. "cpe_name" : [ ]
  47449. } ]
  47450. }, {
  47451. "operator" : "OR",
  47452. "children" : [ ],
  47453. "cpe_match" : [ {
  47454. "vulnerable" : false,
  47455. "cpe23Uri" : "cpe:2.3:h:dlink:dap-1880ac:-:*:*:*:*:*:*:*",
  47456. "cpe_name" : [ ]
  47457. } ]
  47458. } ],
  47459. "cpe_match" : [ ]
  47460. } ]
  47461. },
  47462. "impact" : {
  47463. "baseMetricV3" : {
  47464. "cvssV3" : {
  47465. "version" : "3.1",
  47466. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  47467. "attackVector" : "NETWORK",
  47468. "attackComplexity" : "LOW",
  47469. "privilegesRequired" : "NONE",
  47470. "userInteraction" : "NONE",
  47471. "scope" : "UNCHANGED",
  47472. "confidentialityImpact" : "HIGH",
  47473. "integrityImpact" : "HIGH",
  47474. "availabilityImpact" : "HIGH",
  47475. "baseScore" : 9.8,
  47476. "baseSeverity" : "CRITICAL"
  47477. },
  47478. "exploitabilityScore" : 3.9,
  47479. "impactScore" : 5.9
  47480. },
  47481. "baseMetricV2" : {
  47482. "cvssV2" : {
  47483. "version" : "2.0",
  47484. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  47485. "accessVector" : "NETWORK",
  47486. "accessComplexity" : "LOW",
  47487. "authentication" : "NONE",
  47488. "confidentialityImpact" : "PARTIAL",
  47489. "integrityImpact" : "PARTIAL",
  47490. "availabilityImpact" : "PARTIAL",
  47491. "baseScore" : 7.5
  47492. },
  47493. "severity" : "HIGH",
  47494. "exploitabilityScore" : 10.0,
  47495. "impactScore" : 6.4,
  47496. "acInsufInfo" : false,
  47497. "obtainAllPrivilege" : false,
  47498. "obtainUserPrivilege" : false,
  47499. "obtainOtherPrivilege" : false,
  47500. "userInteractionRequired" : false
  47501. }
  47502. },
  47503. "publishedDate" : "2021-04-26T01:15Z",
  47504. "lastModifiedDate" : "2021-05-03T19:31Z"
  47505. }, {
  47506. "cve" : {
  47507. "data_type" : "CVE",
  47508. "data_format" : "MITRE",
  47509. "data_version" : "4.0",
  47510. "CVE_data_meta" : {
  47511. "ID" : "CVE-2021-20696",
  47512. "ASSIGNER" : "vultures@jpcert.or.jp"
  47513. },
  47514. "problemtype" : {
  47515. "problemtype_data" : [ {
  47516. "description" : [ {
  47517. "lang" : "en",
  47518. "value" : "CWE-78"
  47519. } ]
  47520. } ]
  47521. },
  47522. "references" : {
  47523. "reference_data" : [ {
  47524. "url" : "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
  47525. "name" : "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
  47526. "refsource" : "MISC",
  47527. "tags" : [ "Vendor Advisory" ]
  47528. }, {
  47529. "url" : "https://jvn.jp/en/vu/JVNVU92898656/index.html",
  47530. "name" : "https://jvn.jp/en/vu/JVNVU92898656/index.html",
  47531. "refsource" : "MISC",
  47532. "tags" : [ "Third Party Advisory" ]
  47533. } ]
  47534. },
  47535. "description" : {
  47536. "description_data" : [ {
  47537. "lang" : "en",
  47538. "value" : "DAP-1880AC firmware version 1.21 and earlier allows a remote authenticated attacker to execute arbitrary OS commands by sending a specially crafted request to a specific CGI program."
  47539. } ]
  47540. }
  47541. },
  47542. "configurations" : {
  47543. "CVE_data_version" : "4.0",
  47544. "nodes" : [ {
  47545. "operator" : "AND",
  47546. "children" : [ {
  47547. "operator" : "OR",
  47548. "children" : [ ],
  47549. "cpe_match" : [ {
  47550. "vulnerable" : true,
  47551. "cpe23Uri" : "cpe:2.3:o:dlink:dap-1880ac_firmware:*:*:*:*:*:*:*:*",
  47552. "versionEndIncluding" : "1.21",
  47553. "cpe_name" : [ ]
  47554. } ]
  47555. }, {
  47556. "operator" : "OR",
  47557. "children" : [ ],
  47558. "cpe_match" : [ {
  47559. "vulnerable" : false,
  47560. "cpe23Uri" : "cpe:2.3:h:dlink:dap-1880ac:-:*:*:*:*:*:*:*",
  47561. "cpe_name" : [ ]
  47562. } ]
  47563. } ],
  47564. "cpe_match" : [ ]
  47565. } ]
  47566. },
  47567. "impact" : {
  47568. "baseMetricV3" : {
  47569. "cvssV3" : {
  47570. "version" : "3.1",
  47571. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  47572. "attackVector" : "NETWORK",
  47573. "attackComplexity" : "LOW",
  47574. "privilegesRequired" : "LOW",
  47575. "userInteraction" : "NONE",
  47576. "scope" : "UNCHANGED",
  47577. "confidentialityImpact" : "HIGH",
  47578. "integrityImpact" : "HIGH",
  47579. "availabilityImpact" : "HIGH",
  47580. "baseScore" : 8.8,
  47581. "baseSeverity" : "HIGH"
  47582. },
  47583. "exploitabilityScore" : 2.8,
  47584. "impactScore" : 5.9
  47585. },
  47586. "baseMetricV2" : {
  47587. "cvssV2" : {
  47588. "version" : "2.0",
  47589. "vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C",
  47590. "accessVector" : "NETWORK",
  47591. "accessComplexity" : "LOW",
  47592. "authentication" : "SINGLE",
  47593. "confidentialityImpact" : "COMPLETE",
  47594. "integrityImpact" : "COMPLETE",
  47595. "availabilityImpact" : "COMPLETE",
  47596. "baseScore" : 9.0
  47597. },
  47598. "severity" : "HIGH",
  47599. "exploitabilityScore" : 8.0,
  47600. "impactScore" : 10.0,
  47601. "acInsufInfo" : false,
  47602. "obtainAllPrivilege" : false,
  47603. "obtainUserPrivilege" : false,
  47604. "obtainOtherPrivilege" : false,
  47605. "userInteractionRequired" : false
  47606. }
  47607. },
  47608. "publishedDate" : "2021-04-26T01:15Z",
  47609. "lastModifiedDate" : "2021-05-03T19:33Z"
  47610. }, {
  47611. "cve" : {
  47612. "data_type" : "CVE",
  47613. "data_format" : "MITRE",
  47614. "data_version" : "4.0",
  47615. "CVE_data_meta" : {
  47616. "ID" : "CVE-2021-20695",
  47617. "ASSIGNER" : "vultures@jpcert.or.jp"
  47618. },
  47619. "problemtype" : {
  47620. "problemtype_data" : [ {
  47621. "description" : [ {
  47622. "lang" : "en",
  47623. "value" : "CWE-269"
  47624. } ]
  47625. } ]
  47626. },
  47627. "references" : {
  47628. "reference_data" : [ {
  47629. "url" : "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
  47630. "name" : "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
  47631. "refsource" : "MISC",
  47632. "tags" : [ "Vendor Advisory" ]
  47633. }, {
  47634. "url" : "https://jvn.jp/en/vu/JVNVU92898656/index.html",
  47635. "name" : "https://jvn.jp/en/vu/JVNVU92898656/index.html",
  47636. "refsource" : "MISC",
  47637. "tags" : [ "Third Party Advisory" ]
  47638. } ]
  47639. },
  47640. "description" : {
  47641. "description_data" : [ {
  47642. "lang" : "en",
  47643. "value" : "Improper following of a certificate's chain of trust vulnerability in DAP-1880AC firmware version 1.21 and earlier allows a remote authenticated attacker to gain root privileges via unspecified vectors."
  47644. } ]
  47645. }
  47646. },
  47647. "configurations" : {
  47648. "CVE_data_version" : "4.0",
  47649. "nodes" : [ {
  47650. "operator" : "AND",
  47651. "children" : [ {
  47652. "operator" : "OR",
  47653. "children" : [ ],
  47654. "cpe_match" : [ {
  47655. "vulnerable" : true,
  47656. "cpe23Uri" : "cpe:2.3:o:dlink:dap-1880ac_firmware:*:*:*:*:*:*:*:*",
  47657. "versionEndIncluding" : "1.21",
  47658. "cpe_name" : [ ]
  47659. } ]
  47660. }, {
  47661. "operator" : "OR",
  47662. "children" : [ ],
  47663. "cpe_match" : [ {
  47664. "vulnerable" : false,
  47665. "cpe23Uri" : "cpe:2.3:h:dlink:dap-1880ac:-:*:*:*:*:*:*:*",
  47666. "cpe_name" : [ ]
  47667. } ]
  47668. } ],
  47669. "cpe_match" : [ ]
  47670. } ]
  47671. },
  47672. "impact" : {
  47673. "baseMetricV3" : {
  47674. "cvssV3" : {
  47675. "version" : "3.1",
  47676. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  47677. "attackVector" : "NETWORK",
  47678. "attackComplexity" : "LOW",
  47679. "privilegesRequired" : "LOW",
  47680. "userInteraction" : "NONE",
  47681. "scope" : "UNCHANGED",
  47682. "confidentialityImpact" : "HIGH",
  47683. "integrityImpact" : "HIGH",
  47684. "availabilityImpact" : "HIGH",
  47685. "baseScore" : 8.8,
  47686. "baseSeverity" : "HIGH"
  47687. },
  47688. "exploitabilityScore" : 2.8,
  47689. "impactScore" : 5.9
  47690. },
  47691. "baseMetricV2" : {
  47692. "cvssV2" : {
  47693. "version" : "2.0",
  47694. "vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C",
  47695. "accessVector" : "NETWORK",
  47696. "accessComplexity" : "LOW",
  47697. "authentication" : "SINGLE",
  47698. "confidentialityImpact" : "COMPLETE",
  47699. "integrityImpact" : "COMPLETE",
  47700. "availabilityImpact" : "COMPLETE",
  47701. "baseScore" : 9.0
  47702. },
  47703. "severity" : "HIGH",
  47704. "exploitabilityScore" : 8.0,
  47705. "impactScore" : 10.0,
  47706. "acInsufInfo" : false,
  47707. "obtainAllPrivilege" : false,
  47708. "obtainUserPrivilege" : false,
  47709. "obtainOtherPrivilege" : false,
  47710. "userInteractionRequired" : false
  47711. }
  47712. },
  47713. "publishedDate" : "2021-04-26T01:15Z",
  47714. "lastModifiedDate" : "2021-05-03T19:34Z"
  47715. }, {
  47716. "cve" : {
  47717. "data_type" : "CVE",
  47718. "data_format" : "MITRE",
  47719. "data_version" : "4.0",
  47720. "CVE_data_meta" : {
  47721. "ID" : "CVE-2021-20694",
  47722. "ASSIGNER" : "vultures@jpcert.or.jp"
  47723. },
  47724. "problemtype" : {
  47725. "problemtype_data" : [ {
  47726. "description" : [ {
  47727. "lang" : "en",
  47728. "value" : "CWE-863"
  47729. } ]
  47730. } ]
  47731. },
  47732. "references" : {
  47733. "reference_data" : [ {
  47734. "url" : "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
  47735. "name" : "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
  47736. "refsource" : "MISC",
  47737. "tags" : [ "Vendor Advisory" ]
  47738. }, {
  47739. "url" : "https://jvn.jp/en/vu/JVNVU92898656/index.html",
  47740. "name" : "https://jvn.jp/en/vu/JVNVU92898656/index.html",
  47741. "refsource" : "MISC",
  47742. "tags" : [ "Third Party Advisory" ]
  47743. } ]
  47744. },
  47745. "description" : {
  47746. "description_data" : [ {
  47747. "lang" : "en",
  47748. "value" : "Improper access control vulnerability in DAP-1880AC firmware version 1.21 and earlier allows a remote authenticated attacker to bypass access restriction and to start a telnet service via unspecified vectors."
  47749. } ]
  47750. }
  47751. },
  47752. "configurations" : {
  47753. "CVE_data_version" : "4.0",
  47754. "nodes" : [ {
  47755. "operator" : "AND",
  47756. "children" : [ {
  47757. "operator" : "OR",
  47758. "children" : [ ],
  47759. "cpe_match" : [ {
  47760. "vulnerable" : true,
  47761. "cpe23Uri" : "cpe:2.3:o:dlink:dap-1880ac_firmware:*:*:*:*:*:*:*:*",
  47762. "versionEndIncluding" : "1.21",
  47763. "cpe_name" : [ ]
  47764. } ]
  47765. }, {
  47766. "operator" : "OR",
  47767. "children" : [ ],
  47768. "cpe_match" : [ {
  47769. "vulnerable" : false,
  47770. "cpe23Uri" : "cpe:2.3:h:dlink:dap-1880ac:-:*:*:*:*:*:*:*",
  47771. "cpe_name" : [ ]
  47772. } ]
  47773. } ],
  47774. "cpe_match" : [ ]
  47775. } ]
  47776. },
  47777. "impact" : {
  47778. "baseMetricV3" : {
  47779. "cvssV3" : {
  47780. "version" : "3.1",
  47781. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  47782. "attackVector" : "NETWORK",
  47783. "attackComplexity" : "LOW",
  47784. "privilegesRequired" : "LOW",
  47785. "userInteraction" : "NONE",
  47786. "scope" : "UNCHANGED",
  47787. "confidentialityImpact" : "HIGH",
  47788. "integrityImpact" : "HIGH",
  47789. "availabilityImpact" : "HIGH",
  47790. "baseScore" : 8.8,
  47791. "baseSeverity" : "HIGH"
  47792. },
  47793. "exploitabilityScore" : 2.8,
  47794. "impactScore" : 5.9
  47795. },
  47796. "baseMetricV2" : {
  47797. "cvssV2" : {
  47798. "version" : "2.0",
  47799. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  47800. "accessVector" : "NETWORK",
  47801. "accessComplexity" : "LOW",
  47802. "authentication" : "SINGLE",
  47803. "confidentialityImpact" : "PARTIAL",
  47804. "integrityImpact" : "PARTIAL",
  47805. "availabilityImpact" : "PARTIAL",
  47806. "baseScore" : 6.5
  47807. },
  47808. "severity" : "MEDIUM",
  47809. "exploitabilityScore" : 8.0,
  47810. "impactScore" : 6.4,
  47811. "acInsufInfo" : false,
  47812. "obtainAllPrivilege" : false,
  47813. "obtainUserPrivilege" : false,
  47814. "obtainOtherPrivilege" : false,
  47815. "userInteractionRequired" : false
  47816. }
  47817. },
  47818. "publishedDate" : "2021-04-26T01:15Z",
  47819. "lastModifiedDate" : "2021-05-03T19:33Z"
  47820. }, {
  47821. "cve" : {
  47822. "data_type" : "CVE",
  47823. "data_format" : "MITRE",
  47824. "data_version" : "4.0",
  47825. "CVE_data_meta" : {
  47826. "ID" : "CVE-2021-20693",
  47827. "ASSIGNER" : "vultures@jpcert.or.jp"
  47828. },
  47829. "problemtype" : {
  47830. "problemtype_data" : [ {
  47831. "description" : [ {
  47832. "lang" : "en",
  47833. "value" : "CWE-863"
  47834. } ]
  47835. } ]
  47836. },
  47837. "references" : {
  47838. "reference_data" : [ {
  47839. "url" : "https://jvn.jp/en/jp/JVN54025691/index.html",
  47840. "name" : "https://jvn.jp/en/jp/JVN54025691/index.html",
  47841. "refsource" : "MISC",
  47842. "tags" : [ "Third Party Advisory" ]
  47843. } ]
  47844. },
  47845. "description" : {
  47846. "description_data" : [ {
  47847. "lang" : "en",
  47848. "value" : "Improper access control vulnerability in Gurunavi App for Android ver.10.0.10 and earlier and for iOS ver.11.1.2 and earlier allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App."
  47849. } ]
  47850. }
  47851. },
  47852. "configurations" : {
  47853. "CVE_data_version" : "4.0",
  47854. "nodes" : [ {
  47855. "operator" : "OR",
  47856. "children" : [ ],
  47857. "cpe_match" : [ {
  47858. "vulnerable" : true,
  47859. "cpe23Uri" : "cpe:2.3:a:gurunavi:gurunavi:*:*:*:*:*:android:*:*",
  47860. "versionEndIncluding" : "10.0.10",
  47861. "cpe_name" : [ ]
  47862. }, {
  47863. "vulnerable" : true,
  47864. "cpe23Uri" : "cpe:2.3:a:gurunavi:gurunavi:*:*:*:*:*:iphone_os:*:*",
  47865. "versionEndIncluding" : "11.1.2",
  47866. "cpe_name" : [ ]
  47867. } ]
  47868. } ]
  47869. },
  47870. "impact" : {
  47871. "baseMetricV3" : {
  47872. "cvssV3" : {
  47873. "version" : "3.1",
  47874. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
  47875. "attackVector" : "NETWORK",
  47876. "attackComplexity" : "LOW",
  47877. "privilegesRequired" : "NONE",
  47878. "userInteraction" : "NONE",
  47879. "scope" : "UNCHANGED",
  47880. "confidentialityImpact" : "NONE",
  47881. "integrityImpact" : "HIGH",
  47882. "availabilityImpact" : "NONE",
  47883. "baseScore" : 7.5,
  47884. "baseSeverity" : "HIGH"
  47885. },
  47886. "exploitabilityScore" : 3.9,
  47887. "impactScore" : 3.6
  47888. },
  47889. "baseMetricV2" : {
  47890. "cvssV2" : {
  47891. "version" : "2.0",
  47892. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  47893. "accessVector" : "NETWORK",
  47894. "accessComplexity" : "LOW",
  47895. "authentication" : "NONE",
  47896. "confidentialityImpact" : "NONE",
  47897. "integrityImpact" : "PARTIAL",
  47898. "availabilityImpact" : "NONE",
  47899. "baseScore" : 5.0
  47900. },
  47901. "severity" : "MEDIUM",
  47902. "exploitabilityScore" : 10.0,
  47903. "impactScore" : 2.9,
  47904. "acInsufInfo" : false,
  47905. "obtainAllPrivilege" : false,
  47906. "obtainUserPrivilege" : false,
  47907. "obtainOtherPrivilege" : false,
  47908. "userInteractionRequired" : false
  47909. }
  47910. },
  47911. "publishedDate" : "2021-04-26T01:15Z",
  47912. "lastModifiedDate" : "2021-05-05T19:08Z"
  47913. }, {
  47914. "cve" : {
  47915. "data_type" : "CVE",
  47916. "data_format" : "MITRE",
  47917. "data_version" : "4.0",
  47918. "CVE_data_meta" : {
  47919. "ID" : "CVE-2021-20680",
  47920. "ASSIGNER" : "vultures@jpcert.or.jp"
  47921. },
  47922. "problemtype" : {
  47923. "problemtype_data" : [ {
  47924. "description" : [ {
  47925. "lang" : "en",
  47926. "value" : "CWE-79"
  47927. } ]
  47928. } ]
  47929. },
  47930. "references" : {
  47931. "reference_data" : [ {
  47932. "url" : "https://jpn.nec.com/security-info/secinfo/nv21-008.html",
  47933. "name" : "https://jpn.nec.com/security-info/secinfo/nv21-008.html",
  47934. "refsource" : "MISC",
  47935. "tags" : [ "Vendor Advisory" ]
  47936. }, {
  47937. "url" : "https://jvn.jp/en/jp/JVN67456944/index.html",
  47938. "name" : "https://jvn.jp/en/jp/JVN67456944/index.html",
  47939. "refsource" : "MISC",
  47940. "tags" : [ "Third Party Advisory" ]
  47941. } ]
  47942. },
  47943. "description" : {
  47944. "description_data" : [ {
  47945. "lang" : "en",
  47946. "value" : "Cross-site scripting vulnerability in NEC Aterm devices (Aterm WG1900HP2 firmware Ver.1.3.1 and earlier, Aterm WG1900HP firmware Ver.2.5.1 and earlier, Aterm WG1800HP4 firmware Ver.1.3.1 and earlier, Aterm WG1800HP3 firmware Ver.1.5.1 and earlier, Aterm WG1200HS2 firmware Ver.2.5.0 and earlier, Aterm WG1200HP3 firmware Ver.1.3.1 and earlier, Aterm WG1200HP2 firmware Ver.2.5.0 and earlier, Aterm W1200EX firmware Ver.1.3.1 and earlier, Aterm W1200EX-MS firmware Ver.1.3.1 and earlier, Aterm WG1200HS firmware all versions Aterm WG1200HP firmware all versions Aterm WF800HP firmware all versions Aterm WF300HP2 firmware all versions Aterm WR8165N firmware all versions Aterm W500P firmware all versions, and Aterm W300P firmware all versions) allows remote attackers to inject arbitrary script or HTML via unspecified vectors."
  47947. } ]
  47948. }
  47949. },
  47950. "configurations" : {
  47951. "CVE_data_version" : "4.0",
  47952. "nodes" : [ {
  47953. "operator" : "AND",
  47954. "children" : [ {
  47955. "operator" : "OR",
  47956. "children" : [ ],
  47957. "cpe_match" : [ {
  47958. "vulnerable" : true,
  47959. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg1900hp2_firmware:*:*:*:*:*:*:*:*",
  47960. "versionEndIncluding" : "1.3.1",
  47961. "cpe_name" : [ ]
  47962. } ]
  47963. }, {
  47964. "operator" : "OR",
  47965. "children" : [ ],
  47966. "cpe_match" : [ {
  47967. "vulnerable" : false,
  47968. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg1900hp2:-:*:*:*:*:*:*:*",
  47969. "cpe_name" : [ ]
  47970. } ]
  47971. } ],
  47972. "cpe_match" : [ ]
  47973. }, {
  47974. "operator" : "AND",
  47975. "children" : [ {
  47976. "operator" : "OR",
  47977. "children" : [ ],
  47978. "cpe_match" : [ {
  47979. "vulnerable" : true,
  47980. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg1900hp_firmware:*:*:*:*:*:*:*:*",
  47981. "versionEndIncluding" : "2.5.1",
  47982. "cpe_name" : [ ]
  47983. } ]
  47984. }, {
  47985. "operator" : "OR",
  47986. "children" : [ ],
  47987. "cpe_match" : [ {
  47988. "vulnerable" : false,
  47989. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg1900hp:-:*:*:*:*:*:*:*",
  47990. "cpe_name" : [ ]
  47991. } ]
  47992. } ],
  47993. "cpe_match" : [ ]
  47994. }, {
  47995. "operator" : "AND",
  47996. "children" : [ {
  47997. "operator" : "OR",
  47998. "children" : [ ],
  47999. "cpe_match" : [ {
  48000. "vulnerable" : true,
  48001. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg1800hp4_firmware:*:*:*:*:*:*:*:*",
  48002. "versionEndIncluding" : "1.3.1",
  48003. "cpe_name" : [ ]
  48004. } ]
  48005. }, {
  48006. "operator" : "OR",
  48007. "children" : [ ],
  48008. "cpe_match" : [ {
  48009. "vulnerable" : false,
  48010. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg1800hp4:-:*:*:*:*:*:*:*",
  48011. "cpe_name" : [ ]
  48012. } ]
  48013. } ],
  48014. "cpe_match" : [ ]
  48015. }, {
  48016. "operator" : "AND",
  48017. "children" : [ {
  48018. "operator" : "OR",
  48019. "children" : [ ],
  48020. "cpe_match" : [ {
  48021. "vulnerable" : true,
  48022. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg1800hp3_firmware:*:*:*:*:*:*:*:*",
  48023. "versionEndIncluding" : "1.5.1",
  48024. "cpe_name" : [ ]
  48025. } ]
  48026. }, {
  48027. "operator" : "OR",
  48028. "children" : [ ],
  48029. "cpe_match" : [ {
  48030. "vulnerable" : false,
  48031. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg1800hp3:-:*:*:*:*:*:*:*",
  48032. "cpe_name" : [ ]
  48033. } ]
  48034. } ],
  48035. "cpe_match" : [ ]
  48036. }, {
  48037. "operator" : "AND",
  48038. "children" : [ {
  48039. "operator" : "OR",
  48040. "children" : [ ],
  48041. "cpe_match" : [ {
  48042. "vulnerable" : true,
  48043. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg1200hs3_firmware:*:*:*:*:*:*:*:*",
  48044. "versionEndIncluding" : "1.1.2",
  48045. "cpe_name" : [ ]
  48046. } ]
  48047. }, {
  48048. "operator" : "OR",
  48049. "children" : [ ],
  48050. "cpe_match" : [ {
  48051. "vulnerable" : false,
  48052. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg1200hs3:-:*:*:*:*:*:*:*",
  48053. "cpe_name" : [ ]
  48054. } ]
  48055. } ],
  48056. "cpe_match" : [ ]
  48057. }, {
  48058. "operator" : "AND",
  48059. "children" : [ {
  48060. "operator" : "OR",
  48061. "children" : [ ],
  48062. "cpe_match" : [ {
  48063. "vulnerable" : true,
  48064. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg1200hs2_firmware:*:*:*:*:*:*:*:*",
  48065. "versionEndIncluding" : "2.5.0",
  48066. "cpe_name" : [ ]
  48067. } ]
  48068. }, {
  48069. "operator" : "OR",
  48070. "children" : [ ],
  48071. "cpe_match" : [ {
  48072. "vulnerable" : false,
  48073. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg1200hs2:-:*:*:*:*:*:*:*",
  48074. "cpe_name" : [ ]
  48075. } ]
  48076. } ],
  48077. "cpe_match" : [ ]
  48078. }, {
  48079. "operator" : "AND",
  48080. "children" : [ {
  48081. "operator" : "OR",
  48082. "children" : [ ],
  48083. "cpe_match" : [ {
  48084. "vulnerable" : true,
  48085. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg1200hp3_firmware:*:*:*:*:*:*:*:*",
  48086. "versionEndIncluding" : "1.3.1",
  48087. "cpe_name" : [ ]
  48088. } ]
  48089. }, {
  48090. "operator" : "OR",
  48091. "children" : [ ],
  48092. "cpe_match" : [ {
  48093. "vulnerable" : false,
  48094. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg1200hp3:-:*:*:*:*:*:*:*",
  48095. "cpe_name" : [ ]
  48096. } ]
  48097. } ],
  48098. "cpe_match" : [ ]
  48099. }, {
  48100. "operator" : "AND",
  48101. "children" : [ {
  48102. "operator" : "OR",
  48103. "children" : [ ],
  48104. "cpe_match" : [ {
  48105. "vulnerable" : true,
  48106. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg1200hp2_firmware:*:*:*:*:*:*:*:*",
  48107. "versionEndIncluding" : "2.5.0",
  48108. "cpe_name" : [ ]
  48109. } ]
  48110. }, {
  48111. "operator" : "OR",
  48112. "children" : [ ],
  48113. "cpe_match" : [ {
  48114. "vulnerable" : false,
  48115. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg1200hp2:-:*:*:*:*:*:*:*",
  48116. "cpe_name" : [ ]
  48117. } ]
  48118. } ],
  48119. "cpe_match" : [ ]
  48120. }, {
  48121. "operator" : "AND",
  48122. "children" : [ {
  48123. "operator" : "OR",
  48124. "children" : [ ],
  48125. "cpe_match" : [ {
  48126. "vulnerable" : true,
  48127. "cpe23Uri" : "cpe:2.3:o:nec:aterm_w1200ex_firmware:*:*:*:*:*:*:*:*",
  48128. "versionEndIncluding" : "1.3.1",
  48129. "cpe_name" : [ ]
  48130. } ]
  48131. }, {
  48132. "operator" : "OR",
  48133. "children" : [ ],
  48134. "cpe_match" : [ {
  48135. "vulnerable" : false,
  48136. "cpe23Uri" : "cpe:2.3:h:nec:aterm_w1200ex:-:*:*:*:*:*:*:*",
  48137. "cpe_name" : [ ]
  48138. } ]
  48139. } ],
  48140. "cpe_match" : [ ]
  48141. }, {
  48142. "operator" : "AND",
  48143. "children" : [ {
  48144. "operator" : "OR",
  48145. "children" : [ ],
  48146. "cpe_match" : [ {
  48147. "vulnerable" : true,
  48148. "cpe23Uri" : "cpe:2.3:o:nec:aterm_w1200ex-ms_firmware:*:*:*:*:*:*:*:*",
  48149. "versionEndIncluding" : "1.3.1",
  48150. "cpe_name" : [ ]
  48151. } ]
  48152. }, {
  48153. "operator" : "OR",
  48154. "children" : [ ],
  48155. "cpe_match" : [ {
  48156. "vulnerable" : false,
  48157. "cpe23Uri" : "cpe:2.3:h:nec:aterm_w1200ex-ms:-:*:*:*:*:*:*:*",
  48158. "cpe_name" : [ ]
  48159. } ]
  48160. } ],
  48161. "cpe_match" : [ ]
  48162. }, {
  48163. "operator" : "AND",
  48164. "children" : [ {
  48165. "operator" : "OR",
  48166. "children" : [ ],
  48167. "cpe_match" : [ {
  48168. "vulnerable" : true,
  48169. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg1200hs_firmware:*:*:*:*:*:*:*:*",
  48170. "cpe_name" : [ ]
  48171. } ]
  48172. }, {
  48173. "operator" : "OR",
  48174. "children" : [ ],
  48175. "cpe_match" : [ {
  48176. "vulnerable" : false,
  48177. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg1200hs:-:*:*:*:*:*:*:*",
  48178. "cpe_name" : [ ]
  48179. } ]
  48180. } ],
  48181. "cpe_match" : [ ]
  48182. }, {
  48183. "operator" : "AND",
  48184. "children" : [ {
  48185. "operator" : "OR",
  48186. "children" : [ ],
  48187. "cpe_match" : [ {
  48188. "vulnerable" : true,
  48189. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wg1200hp_firmware:*:*:*:*:*:*:*:*",
  48190. "cpe_name" : [ ]
  48191. } ]
  48192. }, {
  48193. "operator" : "OR",
  48194. "children" : [ ],
  48195. "cpe_match" : [ {
  48196. "vulnerable" : false,
  48197. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wg1200hp:-:*:*:*:*:*:*:*",
  48198. "cpe_name" : [ ]
  48199. } ]
  48200. } ],
  48201. "cpe_match" : [ ]
  48202. }, {
  48203. "operator" : "AND",
  48204. "children" : [ {
  48205. "operator" : "OR",
  48206. "children" : [ ],
  48207. "cpe_match" : [ {
  48208. "vulnerable" : true,
  48209. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wf800hp_firmware:*:*:*:*:*:*:*:*",
  48210. "cpe_name" : [ ]
  48211. } ]
  48212. }, {
  48213. "operator" : "OR",
  48214. "children" : [ ],
  48215. "cpe_match" : [ {
  48216. "vulnerable" : false,
  48217. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wf800hp:-:*:*:*:*:*:*:*",
  48218. "cpe_name" : [ ]
  48219. } ]
  48220. } ],
  48221. "cpe_match" : [ ]
  48222. }, {
  48223. "operator" : "AND",
  48224. "children" : [ {
  48225. "operator" : "OR",
  48226. "children" : [ ],
  48227. "cpe_match" : [ {
  48228. "vulnerable" : true,
  48229. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wf300hp2_firmware:*:*:*:*:*:*:*:*",
  48230. "cpe_name" : [ ]
  48231. } ]
  48232. }, {
  48233. "operator" : "OR",
  48234. "children" : [ ],
  48235. "cpe_match" : [ {
  48236. "vulnerable" : false,
  48237. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wf300hp2:-:*:*:*:*:*:*:*",
  48238. "cpe_name" : [ ]
  48239. } ]
  48240. } ],
  48241. "cpe_match" : [ ]
  48242. }, {
  48243. "operator" : "AND",
  48244. "children" : [ {
  48245. "operator" : "OR",
  48246. "children" : [ ],
  48247. "cpe_match" : [ {
  48248. "vulnerable" : true,
  48249. "cpe23Uri" : "cpe:2.3:o:nec:aterm_wr8165n_firmware:*:*:*:*:*:*:*:*",
  48250. "cpe_name" : [ ]
  48251. } ]
  48252. }, {
  48253. "operator" : "OR",
  48254. "children" : [ ],
  48255. "cpe_match" : [ {
  48256. "vulnerable" : false,
  48257. "cpe23Uri" : "cpe:2.3:h:nec:aterm_wr8165n:-:*:*:*:*:*:*:*",
  48258. "cpe_name" : [ ]
  48259. } ]
  48260. } ],
  48261. "cpe_match" : [ ]
  48262. }, {
  48263. "operator" : "AND",
  48264. "children" : [ {
  48265. "operator" : "OR",
  48266. "children" : [ ],
  48267. "cpe_match" : [ {
  48268. "vulnerable" : true,
  48269. "cpe23Uri" : "cpe:2.3:o:nec:aterm_w500p_firmware:*:*:*:*:*:*:*:*",
  48270. "cpe_name" : [ ]
  48271. } ]
  48272. }, {
  48273. "operator" : "OR",
  48274. "children" : [ ],
  48275. "cpe_match" : [ {
  48276. "vulnerable" : false,
  48277. "cpe23Uri" : "cpe:2.3:h:nec:aterm_w500p:-:*:*:*:*:*:*:*",
  48278. "cpe_name" : [ ]
  48279. } ]
  48280. } ],
  48281. "cpe_match" : [ ]
  48282. }, {
  48283. "operator" : "AND",
  48284. "children" : [ {
  48285. "operator" : "OR",
  48286. "children" : [ ],
  48287. "cpe_match" : [ {
  48288. "vulnerable" : true,
  48289. "cpe23Uri" : "cpe:2.3:o:nec:aterm_w300p_firmware:*:*:*:*:*:*:*:*",
  48290. "cpe_name" : [ ]
  48291. } ]
  48292. }, {
  48293. "operator" : "OR",
  48294. "children" : [ ],
  48295. "cpe_match" : [ {
  48296. "vulnerable" : false,
  48297. "cpe23Uri" : "cpe:2.3:h:nec:aterm_w300p:-:*:*:*:*:*:*:*",
  48298. "cpe_name" : [ ]
  48299. } ]
  48300. } ],
  48301. "cpe_match" : [ ]
  48302. } ]
  48303. },
  48304. "impact" : {
  48305. "baseMetricV3" : {
  48306. "cvssV3" : {
  48307. "version" : "3.1",
  48308. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  48309. "attackVector" : "NETWORK",
  48310. "attackComplexity" : "LOW",
  48311. "privilegesRequired" : "NONE",
  48312. "userInteraction" : "REQUIRED",
  48313. "scope" : "CHANGED",
  48314. "confidentialityImpact" : "LOW",
  48315. "integrityImpact" : "LOW",
  48316. "availabilityImpact" : "NONE",
  48317. "baseScore" : 6.1,
  48318. "baseSeverity" : "MEDIUM"
  48319. },
  48320. "exploitabilityScore" : 2.8,
  48321. "impactScore" : 2.7
  48322. },
  48323. "baseMetricV2" : {
  48324. "cvssV2" : {
  48325. "version" : "2.0",
  48326. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  48327. "accessVector" : "NETWORK",
  48328. "accessComplexity" : "MEDIUM",
  48329. "authentication" : "NONE",
  48330. "confidentialityImpact" : "NONE",
  48331. "integrityImpact" : "PARTIAL",
  48332. "availabilityImpact" : "NONE",
  48333. "baseScore" : 4.3
  48334. },
  48335. "severity" : "MEDIUM",
  48336. "exploitabilityScore" : 8.6,
  48337. "impactScore" : 2.9,
  48338. "acInsufInfo" : false,
  48339. "obtainAllPrivilege" : false,
  48340. "obtainUserPrivilege" : false,
  48341. "obtainOtherPrivilege" : false,
  48342. "userInteractionRequired" : true
  48343. }
  48344. },
  48345. "publishedDate" : "2021-04-26T01:15Z",
  48346. "lastModifiedDate" : "2021-05-05T21:16Z"
  48347. }, {
  48348. "cve" : {
  48349. "data_type" : "CVE",
  48350. "data_format" : "MITRE",
  48351. "data_version" : "4.0",
  48352. "CVE_data_meta" : {
  48353. "ID" : "CVE-2021-31726",
  48354. "ASSIGNER" : "cve@mitre.org"
  48355. },
  48356. "problemtype" : {
  48357. "problemtype_data" : [ {
  48358. "description" : [ {
  48359. "lang" : "en",
  48360. "value" : "CWE-77"
  48361. } ]
  48362. } ]
  48363. },
  48364. "references" : {
  48365. "reference_data" : [ {
  48366. "url" : "https://pastebin.com/yv4ajFjD",
  48367. "name" : "https://pastebin.com/yv4ajFjD",
  48368. "refsource" : "MISC",
  48369. "tags" : [ "Third Party Advisory" ]
  48370. }, {
  48371. "url" : "https://www.akuvox.com/ProductsDisp.aspx?pid=21",
  48372. "name" : "https://www.akuvox.com/ProductsDisp.aspx?pid=21",
  48373. "refsource" : "MISC",
  48374. "tags" : [ "Vendor Advisory" ]
  48375. } ]
  48376. },
  48377. "description" : {
  48378. "description_data" : [ {
  48379. "lang" : "en",
  48380. "value" : "Akuvox C315 115.116.2613 allows remote command Injection via the cfgd_server service. The attack vector is sending a payload to port 189 (default root 0.0.0.0)."
  48381. } ]
  48382. }
  48383. },
  48384. "configurations" : {
  48385. "CVE_data_version" : "4.0",
  48386. "nodes" : [ {
  48387. "operator" : "AND",
  48388. "children" : [ {
  48389. "operator" : "OR",
  48390. "children" : [ ],
  48391. "cpe_match" : [ {
  48392. "vulnerable" : true,
  48393. "cpe23Uri" : "cpe:2.3:o:akuvox:c315_firmware:115.116.2613:*:*:*:*:*:*:*",
  48394. "cpe_name" : [ ]
  48395. } ]
  48396. }, {
  48397. "operator" : "OR",
  48398. "children" : [ ],
  48399. "cpe_match" : [ {
  48400. "vulnerable" : false,
  48401. "cpe23Uri" : "cpe:2.3:h:akuvox:c315:-:*:*:*:*:*:*:*",
  48402. "cpe_name" : [ ]
  48403. } ]
  48404. } ],
  48405. "cpe_match" : [ ]
  48406. } ]
  48407. },
  48408. "impact" : {
  48409. "baseMetricV3" : {
  48410. "cvssV3" : {
  48411. "version" : "3.1",
  48412. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  48413. "attackVector" : "NETWORK",
  48414. "attackComplexity" : "LOW",
  48415. "privilegesRequired" : "NONE",
  48416. "userInteraction" : "NONE",
  48417. "scope" : "UNCHANGED",
  48418. "confidentialityImpact" : "HIGH",
  48419. "integrityImpact" : "HIGH",
  48420. "availabilityImpact" : "HIGH",
  48421. "baseScore" : 9.8,
  48422. "baseSeverity" : "CRITICAL"
  48423. },
  48424. "exploitabilityScore" : 3.9,
  48425. "impactScore" : 5.9
  48426. },
  48427. "baseMetricV2" : {
  48428. "cvssV2" : {
  48429. "version" : "2.0",
  48430. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  48431. "accessVector" : "NETWORK",
  48432. "accessComplexity" : "LOW",
  48433. "authentication" : "NONE",
  48434. "confidentialityImpact" : "PARTIAL",
  48435. "integrityImpact" : "PARTIAL",
  48436. "availabilityImpact" : "PARTIAL",
  48437. "baseScore" : 7.5
  48438. },
  48439. "severity" : "HIGH",
  48440. "exploitabilityScore" : 10.0,
  48441. "impactScore" : 6.4,
  48442. "acInsufInfo" : false,
  48443. "obtainAllPrivilege" : false,
  48444. "obtainUserPrivilege" : false,
  48445. "obtainOtherPrivilege" : false,
  48446. "userInteractionRequired" : false
  48447. }
  48448. },
  48449. "publishedDate" : "2021-04-25T19:15Z",
  48450. "lastModifiedDate" : "2021-05-06T20:33Z"
  48451. }, {
  48452. "cve" : {
  48453. "data_type" : "CVE",
  48454. "data_format" : "MITRE",
  48455. "data_version" : "4.0",
  48456. "CVE_data_meta" : {
  48457. "ID" : "CVE-2021-31718",
  48458. "ASSIGNER" : "cve@mitre.org"
  48459. },
  48460. "problemtype" : {
  48461. "problemtype_data" : [ {
  48462. "description" : [ {
  48463. "lang" : "en",
  48464. "value" : "CWE-346"
  48465. } ]
  48466. } ]
  48467. },
  48468. "references" : {
  48469. "reference_data" : [ {
  48470. "url" : "https://framagit.org/medoc92/npupnp",
  48471. "name" : "https://framagit.org/medoc92/npupnp",
  48472. "refsource" : "MISC",
  48473. "tags" : [ "Third Party Advisory" ]
  48474. }, {
  48475. "url" : "http://www.openwall.com/lists/oss-security/2021/04/25/2",
  48476. "name" : "http://www.openwall.com/lists/oss-security/2021/04/25/2",
  48477. "refsource" : "MISC",
  48478. "tags" : [ "Mailing List", "Third Party Advisory" ]
  48479. }, {
  48480. "url" : "https://www.lesbonscomptes.com/upmpdcli/npupnp-doc/libnpupnp.html",
  48481. "name" : "https://www.lesbonscomptes.com/upmpdcli/npupnp-doc/libnpupnp.html",
  48482. "refsource" : "MISC",
  48483. "tags" : [ "Third Party Advisory" ]
  48484. } ]
  48485. },
  48486. "description" : {
  48487. "description_data" : [ {
  48488. "lang" : "en",
  48489. "value" : "The server in npupnp before 4.1.4 is affected by DNS rebinding in the embedded web server (including UPnP SOAP and GENA endpoints), leading to remote code execution."
  48490. } ]
  48491. }
  48492. },
  48493. "configurations" : {
  48494. "CVE_data_version" : "4.0",
  48495. "nodes" : [ {
  48496. "operator" : "OR",
  48497. "children" : [ ],
  48498. "cpe_match" : [ {
  48499. "vulnerable" : true,
  48500. "cpe23Uri" : "cpe:2.3:a:npupnp_project:npupnp:*:*:*:*:*:*:*:*",
  48501. "versionEndExcluding" : "4.1.4",
  48502. "cpe_name" : [ ]
  48503. } ]
  48504. } ]
  48505. },
  48506. "impact" : {
  48507. "baseMetricV3" : {
  48508. "cvssV3" : {
  48509. "version" : "3.1",
  48510. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  48511. "attackVector" : "NETWORK",
  48512. "attackComplexity" : "LOW",
  48513. "privilegesRequired" : "NONE",
  48514. "userInteraction" : "REQUIRED",
  48515. "scope" : "UNCHANGED",
  48516. "confidentialityImpact" : "HIGH",
  48517. "integrityImpact" : "HIGH",
  48518. "availabilityImpact" : "HIGH",
  48519. "baseScore" : 8.8,
  48520. "baseSeverity" : "HIGH"
  48521. },
  48522. "exploitabilityScore" : 2.8,
  48523. "impactScore" : 5.9
  48524. },
  48525. "baseMetricV2" : {
  48526. "cvssV2" : {
  48527. "version" : "2.0",
  48528. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  48529. "accessVector" : "NETWORK",
  48530. "accessComplexity" : "MEDIUM",
  48531. "authentication" : "NONE",
  48532. "confidentialityImpact" : "PARTIAL",
  48533. "integrityImpact" : "PARTIAL",
  48534. "availabilityImpact" : "PARTIAL",
  48535. "baseScore" : 6.8
  48536. },
  48537. "severity" : "MEDIUM",
  48538. "exploitabilityScore" : 8.6,
  48539. "impactScore" : 6.4,
  48540. "acInsufInfo" : false,
  48541. "obtainAllPrivilege" : false,
  48542. "obtainUserPrivilege" : false,
  48543. "obtainOtherPrivilege" : false,
  48544. "userInteractionRequired" : true
  48545. }
  48546. },
  48547. "publishedDate" : "2021-04-25T19:15Z",
  48548. "lastModifiedDate" : "2021-05-05T20:11Z"
  48549. }, {
  48550. "cve" : {
  48551. "data_type" : "CVE",
  48552. "data_format" : "MITRE",
  48553. "data_version" : "4.0",
  48554. "CVE_data_meta" : {
  48555. "ID" : "CVE-2021-30502",
  48556. "ASSIGNER" : "cve@mitre.org"
  48557. },
  48558. "problemtype" : {
  48559. "problemtype_data" : [ {
  48560. "description" : [ {
  48561. "lang" : "en",
  48562. "value" : "NVD-CWE-noinfo"
  48563. } ]
  48564. } ]
  48565. },
  48566. "references" : {
  48567. "reference_data" : [ {
  48568. "url" : "https://vuln.ryotak.me/advisories/38",
  48569. "name" : "https://vuln.ryotak.me/advisories/38",
  48570. "refsource" : "MISC",
  48571. "tags" : [ "Third Party Advisory" ]
  48572. }, {
  48573. "url" : "https://github.com/dramforever/vscode-ghc-simple/releases",
  48574. "name" : "https://github.com/dramforever/vscode-ghc-simple/releases",
  48575. "refsource" : "MISC",
  48576. "tags" : [ "Release Notes", "Third Party Advisory" ]
  48577. }, {
  48578. "url" : "https://github.com/dramforever/vscode-ghc-simple/commit/bc7f6f0b857dade46ea51496d8bd1a4edef39b46",
  48579. "name" : "https://github.com/dramforever/vscode-ghc-simple/commit/bc7f6f0b857dade46ea51496d8bd1a4edef39b46",
  48580. "refsource" : "CONFIRM",
  48581. "tags" : [ "Patch", "Third Party Advisory" ]
  48582. }, {
  48583. "url" : "https://github.com/dramforever/vscode-ghc-simple/blob/master/CHANGELOG.md#v023",
  48584. "name" : "https://github.com/dramforever/vscode-ghc-simple/blob/master/CHANGELOG.md#v023",
  48585. "refsource" : "CONFIRM",
  48586. "tags" : [ "Release Notes", "Third Party Advisory" ]
  48587. } ]
  48588. },
  48589. "description" : {
  48590. "description_data" : [ {
  48591. "lang" : "en",
  48592. "value" : "The unofficial vscode-ghc-simple (aka Simple Glasgow Haskell Compiler) extension before 0.2.3 for Visual Studio Code allows remote code execution via a crafted workspace configuration with replCommand."
  48593. } ]
  48594. }
  48595. },
  48596. "configurations" : {
  48597. "CVE_data_version" : "4.0",
  48598. "nodes" : [ {
  48599. "operator" : "OR",
  48600. "children" : [ ],
  48601. "cpe_match" : [ {
  48602. "vulnerable" : true,
  48603. "cpe23Uri" : "cpe:2.3:a:simple_glasgow_haskell_compiler_project:simple_glasgow_haskell_compiler:*:*:*:*:*:visual_studio_code:*:*",
  48604. "versionEndExcluding" : "0.2.3",
  48605. "cpe_name" : [ ]
  48606. } ]
  48607. } ]
  48608. },
  48609. "impact" : {
  48610. "baseMetricV3" : {
  48611. "cvssV3" : {
  48612. "version" : "3.1",
  48613. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  48614. "attackVector" : "NETWORK",
  48615. "attackComplexity" : "LOW",
  48616. "privilegesRequired" : "NONE",
  48617. "userInteraction" : "NONE",
  48618. "scope" : "UNCHANGED",
  48619. "confidentialityImpact" : "HIGH",
  48620. "integrityImpact" : "HIGH",
  48621. "availabilityImpact" : "HIGH",
  48622. "baseScore" : 9.8,
  48623. "baseSeverity" : "CRITICAL"
  48624. },
  48625. "exploitabilityScore" : 3.9,
  48626. "impactScore" : 5.9
  48627. },
  48628. "baseMetricV2" : {
  48629. "cvssV2" : {
  48630. "version" : "2.0",
  48631. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  48632. "accessVector" : "NETWORK",
  48633. "accessComplexity" : "LOW",
  48634. "authentication" : "NONE",
  48635. "confidentialityImpact" : "PARTIAL",
  48636. "integrityImpact" : "PARTIAL",
  48637. "availabilityImpact" : "PARTIAL",
  48638. "baseScore" : 7.5
  48639. },
  48640. "severity" : "HIGH",
  48641. "exploitabilityScore" : 10.0,
  48642. "impactScore" : 6.4,
  48643. "acInsufInfo" : false,
  48644. "obtainAllPrivilege" : false,
  48645. "obtainUserPrivilege" : false,
  48646. "obtainOtherPrivilege" : false,
  48647. "userInteractionRequired" : false
  48648. }
  48649. },
  48650. "publishedDate" : "2021-04-25T03:15Z",
  48651. "lastModifiedDate" : "2021-05-07T16:24Z"
  48652. }, {
  48653. "cve" : {
  48654. "data_type" : "CVE",
  48655. "data_format" : "MITRE",
  48656. "data_version" : "4.0",
  48657. "CVE_data_meta" : {
  48658. "ID" : "CVE-2021-31795",
  48659. "ASSIGNER" : "cve@mitre.org"
  48660. },
  48661. "problemtype" : {
  48662. "problemtype_data" : [ {
  48663. "description" : [ {
  48664. "lang" : "en",
  48665. "value" : "CWE-787"
  48666. } ]
  48667. } ]
  48668. },
  48669. "references" : {
  48670. "reference_data" : [ {
  48671. "url" : "https://mcyoloswagham.github.io/linux/",
  48672. "name" : "https://mcyoloswagham.github.io/linux/",
  48673. "refsource" : "MISC",
  48674. "tags" : [ "Exploit", "Third Party Advisory" ]
  48675. } ]
  48676. },
  48677. "description" : {
  48678. "description_data" : [ {
  48679. "lang" : "en",
  48680. "value" : "The PowerVR GPU kernel driver in pvrsrvkm.ko through 2021-04-24 for the Linux kernel, as used on Alcatel 1S phones, allows attackers to overwrite heap memory via PhysmemNewRamBackedPMR."
  48681. } ]
  48682. }
  48683. },
  48684. "configurations" : {
  48685. "CVE_data_version" : "4.0",
  48686. "nodes" : [ {
  48687. "operator" : "OR",
  48688. "children" : [ ],
  48689. "cpe_match" : [ {
  48690. "vulnerable" : true,
  48691. "cpe23Uri" : "cpe:2.3:a:pvrsrvkm.ko_project:pvrsrvkm.ko:*:*:*:*:*:*:*:*",
  48692. "versionEndIncluding" : "2021-04-24",
  48693. "cpe_name" : [ ]
  48694. } ]
  48695. } ]
  48696. },
  48697. "impact" : {
  48698. "baseMetricV3" : {
  48699. "cvssV3" : {
  48700. "version" : "3.1",
  48701. "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
  48702. "attackVector" : "LOCAL",
  48703. "attackComplexity" : "HIGH",
  48704. "privilegesRequired" : "LOW",
  48705. "userInteraction" : "NONE",
  48706. "scope" : "UNCHANGED",
  48707. "confidentialityImpact" : "HIGH",
  48708. "integrityImpact" : "HIGH",
  48709. "availabilityImpact" : "HIGH",
  48710. "baseScore" : 7.0,
  48711. "baseSeverity" : "HIGH"
  48712. },
  48713. "exploitabilityScore" : 1.0,
  48714. "impactScore" : 5.9
  48715. },
  48716. "baseMetricV2" : {
  48717. "cvssV2" : {
  48718. "version" : "2.0",
  48719. "vectorString" : "AV:L/AC:M/Au:N/C:C/I:C/A:C",
  48720. "accessVector" : "LOCAL",
  48721. "accessComplexity" : "MEDIUM",
  48722. "authentication" : "NONE",
  48723. "confidentialityImpact" : "COMPLETE",
  48724. "integrityImpact" : "COMPLETE",
  48725. "availabilityImpact" : "COMPLETE",
  48726. "baseScore" : 6.9
  48727. },
  48728. "severity" : "MEDIUM",
  48729. "exploitabilityScore" : 3.4,
  48730. "impactScore" : 10.0,
  48731. "acInsufInfo" : false,
  48732. "obtainAllPrivilege" : false,
  48733. "obtainUserPrivilege" : false,
  48734. "obtainOtherPrivilege" : false,
  48735. "userInteractionRequired" : false
  48736. }
  48737. },
  48738. "publishedDate" : "2021-04-24T18:15Z",
  48739. "lastModifiedDate" : "2021-05-06T18:45Z"
  48740. }, {
  48741. "cve" : {
  48742. "data_type" : "CVE",
  48743. "data_format" : "MITRE",
  48744. "data_version" : "4.0",
  48745. "CVE_data_meta" : {
  48746. "ID" : "CVE-2021-31791",
  48747. "ASSIGNER" : "cve@mitre.org"
  48748. },
  48749. "problemtype" : {
  48750. "problemtype_data" : [ {
  48751. "description" : [ {
  48752. "lang" : "en",
  48753. "value" : "CWE-312"
  48754. } ]
  48755. } ]
  48756. },
  48757. "references" : {
  48758. "reference_data" : [ {
  48759. "url" : "https://www.sentrysoftware.com/library/releaseNotes/index.html?hardwaresentrykmforpatrol10_0_01releasenotes.htm",
  48760. "name" : "https://www.sentrysoftware.com/library/releaseNotes/index.html?hardwaresentrykmforpatrol10_0_01releasenotes.htm",
  48761. "refsource" : "MISC",
  48762. "tags" : [ "Release Notes", "Vendor Advisory" ]
  48763. } ]
  48764. },
  48765. "description" : {
  48766. "description_data" : [ {
  48767. "lang" : "en",
  48768. "value" : "In Hardware Sentry KM before 10.0.01 for BMC PATROL, a cleartext password may be discovered after a failure or timeout of a command."
  48769. } ]
  48770. }
  48771. },
  48772. "configurations" : {
  48773. "CVE_data_version" : "4.0",
  48774. "nodes" : [ {
  48775. "operator" : "OR",
  48776. "children" : [ ],
  48777. "cpe_match" : [ {
  48778. "vulnerable" : true,
  48779. "cpe23Uri" : "cpe:2.3:a:sentrysoftware:hardware_sentry_km_for_bmc_patrol:*:*:*:*:*:*:*:*",
  48780. "versionEndExcluding" : "10.0.01:",
  48781. "cpe_name" : [ ]
  48782. } ]
  48783. } ]
  48784. },
  48785. "impact" : {
  48786. "baseMetricV3" : {
  48787. "cvssV3" : {
  48788. "version" : "3.1",
  48789. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  48790. "attackVector" : "NETWORK",
  48791. "attackComplexity" : "LOW",
  48792. "privilegesRequired" : "NONE",
  48793. "userInteraction" : "NONE",
  48794. "scope" : "UNCHANGED",
  48795. "confidentialityImpact" : "HIGH",
  48796. "integrityImpact" : "NONE",
  48797. "availabilityImpact" : "NONE",
  48798. "baseScore" : 7.5,
  48799. "baseSeverity" : "HIGH"
  48800. },
  48801. "exploitabilityScore" : 3.9,
  48802. "impactScore" : 3.6
  48803. },
  48804. "baseMetricV2" : {
  48805. "cvssV2" : {
  48806. "version" : "2.0",
  48807. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  48808. "accessVector" : "NETWORK",
  48809. "accessComplexity" : "LOW",
  48810. "authentication" : "NONE",
  48811. "confidentialityImpact" : "PARTIAL",
  48812. "integrityImpact" : "NONE",
  48813. "availabilityImpact" : "NONE",
  48814. "baseScore" : 5.0
  48815. },
  48816. "severity" : "MEDIUM",
  48817. "exploitabilityScore" : 10.0,
  48818. "impactScore" : 2.9,
  48819. "acInsufInfo" : false,
  48820. "obtainAllPrivilege" : false,
  48821. "obtainUserPrivilege" : false,
  48822. "obtainOtherPrivilege" : false,
  48823. "userInteractionRequired" : false
  48824. }
  48825. },
  48826. "publishedDate" : "2021-04-23T22:15Z",
  48827. "lastModifiedDate" : "2021-05-07T14:02Z"
  48828. }, {
  48829. "cve" : {
  48830. "data_type" : "CVE",
  48831. "data_format" : "MITRE",
  48832. "data_version" : "4.0",
  48833. "CVE_data_meta" : {
  48834. "ID" : "CVE-2021-29158",
  48835. "ASSIGNER" : "cve@mitre.org"
  48836. },
  48837. "problemtype" : {
  48838. "problemtype_data" : [ {
  48839. "description" : [ {
  48840. "lang" : "en",
  48841. "value" : "CWE-863"
  48842. } ]
  48843. } ]
  48844. },
  48845. "references" : {
  48846. "reference_data" : [ {
  48847. "url" : "https://support.sonatype.com/hc/en-us/categories/201980768-Welcome-to-the-Sonatype-Support-Knowledge-Base",
  48848. "name" : "https://support.sonatype.com/hc/en-us/categories/201980768-Welcome-to-the-Sonatype-Support-Knowledge-Base",
  48849. "refsource" : "MISC",
  48850. "tags" : [ "Vendor Advisory" ]
  48851. }, {
  48852. "url" : "https://support.sonatype.com/hc/en-us/articles/1500006126462",
  48853. "name" : "https://support.sonatype.com/hc/en-us/articles/1500006126462",
  48854. "refsource" : "CONFIRM",
  48855. "tags" : [ "Patch", "Vendor Advisory" ]
  48856. } ]
  48857. },
  48858. "description" : {
  48859. "description_data" : [ {
  48860. "lang" : "en",
  48861. "value" : "Sonatype Nexus Repository Manager 3 Pro up to and including 3.30.0 has Incorrect Access Control."
  48862. } ]
  48863. }
  48864. },
  48865. "configurations" : {
  48866. "CVE_data_version" : "4.0",
  48867. "nodes" : [ {
  48868. "operator" : "OR",
  48869. "children" : [ ],
  48870. "cpe_match" : [ {
  48871. "vulnerable" : true,
  48872. "cpe23Uri" : "cpe:2.3:a:sonatype:nexus_repository_manager_3:*:*:*:*:pro:*:*:*",
  48873. "versionEndIncluding" : "3.30.0",
  48874. "cpe_name" : [ ]
  48875. } ]
  48876. } ]
  48877. },
  48878. "impact" : {
  48879. "baseMetricV3" : {
  48880. "cvssV3" : {
  48881. "version" : "3.1",
  48882. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
  48883. "attackVector" : "NETWORK",
  48884. "attackComplexity" : "LOW",
  48885. "privilegesRequired" : "HIGH",
  48886. "userInteraction" : "NONE",
  48887. "scope" : "UNCHANGED",
  48888. "confidentialityImpact" : "HIGH",
  48889. "integrityImpact" : "NONE",
  48890. "availabilityImpact" : "NONE",
  48891. "baseScore" : 4.9,
  48892. "baseSeverity" : "MEDIUM"
  48893. },
  48894. "exploitabilityScore" : 1.2,
  48895. "impactScore" : 3.6
  48896. },
  48897. "baseMetricV2" : {
  48898. "cvssV2" : {
  48899. "version" : "2.0",
  48900. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
  48901. "accessVector" : "NETWORK",
  48902. "accessComplexity" : "LOW",
  48903. "authentication" : "SINGLE",
  48904. "confidentialityImpact" : "PARTIAL",
  48905. "integrityImpact" : "NONE",
  48906. "availabilityImpact" : "NONE",
  48907. "baseScore" : 4.0
  48908. },
  48909. "severity" : "MEDIUM",
  48910. "exploitabilityScore" : 8.0,
  48911. "impactScore" : 2.9,
  48912. "acInsufInfo" : false,
  48913. "obtainAllPrivilege" : false,
  48914. "obtainUserPrivilege" : false,
  48915. "obtainOtherPrivilege" : false,
  48916. "userInteractionRequired" : false
  48917. }
  48918. },
  48919. "publishedDate" : "2021-04-23T21:15Z",
  48920. "lastModifiedDate" : "2021-05-05T20:09Z"
  48921. }, {
  48922. "cve" : {
  48923. "data_type" : "CVE",
  48924. "data_format" : "MITRE",
  48925. "data_version" : "4.0",
  48926. "CVE_data_meta" : {
  48927. "ID" : "CVE-2021-25899",
  48928. "ASSIGNER" : "cve@mitre.org"
  48929. },
  48930. "problemtype" : {
  48931. "problemtype_data" : [ {
  48932. "description" : [ {
  48933. "lang" : "en",
  48934. "value" : "CWE-89"
  48935. } ]
  48936. } ]
  48937. },
  48938. "references" : {
  48939. "reference_data" : [ {
  48940. "url" : "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/",
  48941. "name" : "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/",
  48942. "refsource" : "MISC",
  48943. "tags" : [ "Exploit", "Third Party Advisory" ]
  48944. }, {
  48945. "url" : "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765",
  48946. "name" : "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765",
  48947. "refsource" : "MISC",
  48948. "tags" : [ "Exploit", "Third Party Advisory" ]
  48949. } ]
  48950. },
  48951. "description" : {
  48952. "description_data" : [ {
  48953. "lang" : "en",
  48954. "value" : "An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. An unauthenticated attacker can send a crafted HTTP request to perform a blind time-based SQL Injection. The vulnerable parameter is param1."
  48955. } ]
  48956. }
  48957. },
  48958. "configurations" : {
  48959. "CVE_data_version" : "4.0",
  48960. "nodes" : [ {
  48961. "operator" : "OR",
  48962. "children" : [ ],
  48963. "cpe_match" : [ {
  48964. "vulnerable" : true,
  48965. "cpe23Uri" : "cpe:2.3:a:void:aural_rec_monitor:9.0.0.1:*:*:*:*:*:*:*",
  48966. "cpe_name" : [ ]
  48967. } ]
  48968. } ]
  48969. },
  48970. "impact" : {
  48971. "baseMetricV3" : {
  48972. "cvssV3" : {
  48973. "version" : "3.1",
  48974. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  48975. "attackVector" : "NETWORK",
  48976. "attackComplexity" : "LOW",
  48977. "privilegesRequired" : "NONE",
  48978. "userInteraction" : "NONE",
  48979. "scope" : "UNCHANGED",
  48980. "confidentialityImpact" : "HIGH",
  48981. "integrityImpact" : "NONE",
  48982. "availabilityImpact" : "NONE",
  48983. "baseScore" : 7.5,
  48984. "baseSeverity" : "HIGH"
  48985. },
  48986. "exploitabilityScore" : 3.9,
  48987. "impactScore" : 3.6
  48988. },
  48989. "baseMetricV2" : {
  48990. "cvssV2" : {
  48991. "version" : "2.0",
  48992. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  48993. "accessVector" : "NETWORK",
  48994. "accessComplexity" : "LOW",
  48995. "authentication" : "NONE",
  48996. "confidentialityImpact" : "PARTIAL",
  48997. "integrityImpact" : "NONE",
  48998. "availabilityImpact" : "NONE",
  48999. "baseScore" : 5.0
  49000. },
  49001. "severity" : "MEDIUM",
  49002. "exploitabilityScore" : 10.0,
  49003. "impactScore" : 2.9,
  49004. "acInsufInfo" : false,
  49005. "obtainAllPrivilege" : false,
  49006. "obtainUserPrivilege" : false,
  49007. "obtainOtherPrivilege" : false,
  49008. "userInteractionRequired" : false
  49009. }
  49010. },
  49011. "publishedDate" : "2021-04-23T21:15Z",
  49012. "lastModifiedDate" : "2021-05-06T16:43Z"
  49013. }, {
  49014. "cve" : {
  49015. "data_type" : "CVE",
  49016. "data_format" : "MITRE",
  49017. "data_version" : "4.0",
  49018. "CVE_data_meta" : {
  49019. "ID" : "CVE-2021-25898",
  49020. "ASSIGNER" : "cve@mitre.org"
  49021. },
  49022. "problemtype" : {
  49023. "problemtype_data" : [ {
  49024. "description" : [ {
  49025. "lang" : "en",
  49026. "value" : "CWE-798"
  49027. }, {
  49028. "lang" : "en",
  49029. "value" : "CWE-312"
  49030. } ]
  49031. } ]
  49032. },
  49033. "references" : {
  49034. "reference_data" : [ {
  49035. "url" : "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/",
  49036. "name" : "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/",
  49037. "refsource" : "MISC",
  49038. "tags" : [ "Exploit", "Third Party Advisory" ]
  49039. }, {
  49040. "url" : "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765",
  49041. "name" : "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765",
  49042. "refsource" : "MISC",
  49043. "tags" : [ "Exploit", "Third Party Advisory" ]
  49044. } ]
  49045. },
  49046. "description" : {
  49047. "description_data" : [ {
  49048. "lang" : "en",
  49049. "value" : "An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. Passwords are stored in unencrypted source-code text files. This was noted when accessing the svc-login.php file. The value is used to authenticate a high-privileged user upon authenticating with the server."
  49050. } ]
  49051. }
  49052. },
  49053. "configurations" : {
  49054. "CVE_data_version" : "4.0",
  49055. "nodes" : [ {
  49056. "operator" : "OR",
  49057. "children" : [ ],
  49058. "cpe_match" : [ {
  49059. "vulnerable" : true,
  49060. "cpe23Uri" : "cpe:2.3:a:void:aural_rec_monitor:9.0.0.1:*:*:*:*:*:*:*",
  49061. "cpe_name" : [ ]
  49062. } ]
  49063. } ]
  49064. },
  49065. "impact" : {
  49066. "baseMetricV3" : {
  49067. "cvssV3" : {
  49068. "version" : "3.1",
  49069. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  49070. "attackVector" : "NETWORK",
  49071. "attackComplexity" : "LOW",
  49072. "privilegesRequired" : "NONE",
  49073. "userInteraction" : "NONE",
  49074. "scope" : "UNCHANGED",
  49075. "confidentialityImpact" : "HIGH",
  49076. "integrityImpact" : "NONE",
  49077. "availabilityImpact" : "NONE",
  49078. "baseScore" : 7.5,
  49079. "baseSeverity" : "HIGH"
  49080. },
  49081. "exploitabilityScore" : 3.9,
  49082. "impactScore" : 3.6
  49083. },
  49084. "baseMetricV2" : {
  49085. "cvssV2" : {
  49086. "version" : "2.0",
  49087. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  49088. "accessVector" : "NETWORK",
  49089. "accessComplexity" : "LOW",
  49090. "authentication" : "NONE",
  49091. "confidentialityImpact" : "PARTIAL",
  49092. "integrityImpact" : "NONE",
  49093. "availabilityImpact" : "NONE",
  49094. "baseScore" : 5.0
  49095. },
  49096. "severity" : "MEDIUM",
  49097. "exploitabilityScore" : 10.0,
  49098. "impactScore" : 2.9,
  49099. "acInsufInfo" : false,
  49100. "obtainAllPrivilege" : false,
  49101. "obtainUserPrivilege" : false,
  49102. "obtainOtherPrivilege" : false,
  49103. "userInteractionRequired" : false
  49104. }
  49105. },
  49106. "publishedDate" : "2021-04-23T21:15Z",
  49107. "lastModifiedDate" : "2021-05-06T16:21Z"
  49108. }, {
  49109. "cve" : {
  49110. "data_type" : "CVE",
  49111. "data_format" : "MITRE",
  49112. "data_version" : "4.0",
  49113. "CVE_data_meta" : {
  49114. "ID" : "CVE-2021-31780",
  49115. "ASSIGNER" : "cve@mitre.org"
  49116. },
  49117. "problemtype" : {
  49118. "problemtype_data" : [ {
  49119. "description" : [ {
  49120. "lang" : "en",
  49121. "value" : "CWE-212"
  49122. } ]
  49123. } ]
  49124. },
  49125. "references" : {
  49126. "reference_data" : [ {
  49127. "url" : "https://github.com/MISP/MISP/commit/a0f08501d2850025892e703f40fb1570c7995478",
  49128. "name" : "https://github.com/MISP/MISP/commit/a0f08501d2850025892e703f40fb1570c7995478",
  49129. "refsource" : "MISC",
  49130. "tags" : [ "Patch", "Third Party Advisory" ]
  49131. } ]
  49132. },
  49133. "description" : {
  49134. "description_data" : [ {
  49135. "lang" : "en",
  49136. "value" : "In app/Model/MispObject.php in MISP 2.4.141, an incorrect sharing group association could lead to information disclosure on an event edit. When an object has a sharing group associated with an event edit, the sharing group object is ignored and instead the passed local ID is reused."
  49137. } ]
  49138. }
  49139. },
  49140. "configurations" : {
  49141. "CVE_data_version" : "4.0",
  49142. "nodes" : [ {
  49143. "operator" : "OR",
  49144. "children" : [ ],
  49145. "cpe_match" : [ {
  49146. "vulnerable" : true,
  49147. "cpe23Uri" : "cpe:2.3:a:misp:misp:2.4.141:*:*:*:*:*:*:*",
  49148. "cpe_name" : [ ]
  49149. } ]
  49150. } ]
  49151. },
  49152. "impact" : {
  49153. "baseMetricV3" : {
  49154. "cvssV3" : {
  49155. "version" : "3.1",
  49156. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  49157. "attackVector" : "NETWORK",
  49158. "attackComplexity" : "LOW",
  49159. "privilegesRequired" : "NONE",
  49160. "userInteraction" : "NONE",
  49161. "scope" : "UNCHANGED",
  49162. "confidentialityImpact" : "HIGH",
  49163. "integrityImpact" : "NONE",
  49164. "availabilityImpact" : "NONE",
  49165. "baseScore" : 7.5,
  49166. "baseSeverity" : "HIGH"
  49167. },
  49168. "exploitabilityScore" : 3.9,
  49169. "impactScore" : 3.6
  49170. },
  49171. "baseMetricV2" : {
  49172. "cvssV2" : {
  49173. "version" : "2.0",
  49174. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  49175. "accessVector" : "NETWORK",
  49176. "accessComplexity" : "LOW",
  49177. "authentication" : "NONE",
  49178. "confidentialityImpact" : "PARTIAL",
  49179. "integrityImpact" : "NONE",
  49180. "availabilityImpact" : "NONE",
  49181. "baseScore" : 5.0
  49182. },
  49183. "severity" : "MEDIUM",
  49184. "exploitabilityScore" : 10.0,
  49185. "impactScore" : 2.9,
  49186. "acInsufInfo" : false,
  49187. "obtainAllPrivilege" : false,
  49188. "obtainUserPrivilege" : false,
  49189. "obtainOtherPrivilege" : false,
  49190. "userInteractionRequired" : false
  49191. }
  49192. },
  49193. "publishedDate" : "2021-04-23T20:15Z",
  49194. "lastModifiedDate" : "2021-05-05T20:06Z"
  49195. }, {
  49196. "cve" : {
  49197. "data_type" : "CVE",
  49198. "data_format" : "MITRE",
  49199. "data_version" : "4.0",
  49200. "CVE_data_meta" : {
  49201. "ID" : "CVE-2021-29470",
  49202. "ASSIGNER" : "security-advisories@github.com"
  49203. },
  49204. "problemtype" : {
  49205. "problemtype_data" : [ {
  49206. "description" : [ {
  49207. "lang" : "en",
  49208. "value" : "CWE-125"
  49209. } ]
  49210. } ]
  49211. },
  49212. "references" : {
  49213. "reference_data" : [ {
  49214. "url" : "https://github.com/Exiv2/exiv2/security/advisories/GHSA-8949-hhfh-j7rj",
  49215. "name" : "https://github.com/Exiv2/exiv2/security/advisories/GHSA-8949-hhfh-j7rj",
  49216. "refsource" : "CONFIRM",
  49217. "tags" : [ "Patch", "Third Party Advisory" ]
  49218. }, {
  49219. "url" : "https://github.com/Exiv2/exiv2/pull/1581",
  49220. "name" : "https://github.com/Exiv2/exiv2/pull/1581",
  49221. "refsource" : "MISC",
  49222. "tags" : [ "Patch", "Third Party Advisory" ]
  49223. }, {
  49224. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/",
  49225. "name" : "FEDORA-2021-10d7331a31",
  49226. "refsource" : "FEDORA",
  49227. "tags" : [ "Mailing List", "Third Party Advisory" ]
  49228. }, {
  49229. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWZLDECIXXW3CCZ3RS4A3NG5X5VE4WZM/",
  49230. "name" : "FEDORA-2021-2d860da728",
  49231. "refsource" : "FEDORA",
  49232. "tags" : [ ]
  49233. }, {
  49234. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LBKWLTXM7IKZ4PVGKLUQVAVFAYGGF7QR/",
  49235. "name" : "FEDORA-2021-96a5dabcfa",
  49236. "refsource" : "FEDORA",
  49237. "tags" : [ ]
  49238. } ]
  49239. },
  49240. "description" : {
  49241. "description_data" : [ {
  49242. "lang" : "en",
  49243. "value" : "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4."
  49244. } ]
  49245. }
  49246. },
  49247. "configurations" : {
  49248. "CVE_data_version" : "4.0",
  49249. "nodes" : [ {
  49250. "operator" : "OR",
  49251. "children" : [ ],
  49252. "cpe_match" : [ {
  49253. "vulnerable" : true,
  49254. "cpe23Uri" : "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
  49255. "versionEndIncluding" : "0.27.3",
  49256. "cpe_name" : [ ]
  49257. } ]
  49258. }, {
  49259. "operator" : "OR",
  49260. "children" : [ ],
  49261. "cpe_match" : [ {
  49262. "vulnerable" : true,
  49263. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  49264. "cpe_name" : [ ]
  49265. } ]
  49266. } ]
  49267. },
  49268. "impact" : {
  49269. "baseMetricV3" : {
  49270. "cvssV3" : {
  49271. "version" : "3.1",
  49272. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  49273. "attackVector" : "NETWORK",
  49274. "attackComplexity" : "LOW",
  49275. "privilegesRequired" : "NONE",
  49276. "userInteraction" : "REQUIRED",
  49277. "scope" : "UNCHANGED",
  49278. "confidentialityImpact" : "NONE",
  49279. "integrityImpact" : "NONE",
  49280. "availabilityImpact" : "HIGH",
  49281. "baseScore" : 6.5,
  49282. "baseSeverity" : "MEDIUM"
  49283. },
  49284. "exploitabilityScore" : 2.8,
  49285. "impactScore" : 3.6
  49286. },
  49287. "baseMetricV2" : {
  49288. "cvssV2" : {
  49289. "version" : "2.0",
  49290. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  49291. "accessVector" : "NETWORK",
  49292. "accessComplexity" : "MEDIUM",
  49293. "authentication" : "NONE",
  49294. "confidentialityImpact" : "NONE",
  49295. "integrityImpact" : "NONE",
  49296. "availabilityImpact" : "PARTIAL",
  49297. "baseScore" : 4.3
  49298. },
  49299. "severity" : "MEDIUM",
  49300. "exploitabilityScore" : 8.6,
  49301. "impactScore" : 2.9,
  49302. "acInsufInfo" : false,
  49303. "obtainAllPrivilege" : false,
  49304. "obtainUserPrivilege" : false,
  49305. "obtainOtherPrivilege" : false,
  49306. "userInteractionRequired" : true
  49307. }
  49308. },
  49309. "publishedDate" : "2021-04-23T19:15Z",
  49310. "lastModifiedDate" : "2021-05-10T03:15Z"
  49311. }, {
  49312. "cve" : {
  49313. "data_type" : "CVE",
  49314. "data_format" : "MITRE",
  49315. "data_version" : "4.0",
  49316. "CVE_data_meta" : {
  49317. "ID" : "CVE-2021-20089",
  49318. "ASSIGNER" : "vulnreport@tenable.com"
  49319. },
  49320. "problemtype" : {
  49321. "problemtype_data" : [ {
  49322. "description" : [ {
  49323. "lang" : "en",
  49324. "value" : "NVD-CWE-Other"
  49325. } ]
  49326. } ]
  49327. },
  49328. "references" : {
  49329. "reference_data" : [ {
  49330. "url" : "https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/purl.md",
  49331. "name" : "https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/purl.md",
  49332. "refsource" : "MISC",
  49333. "tags" : [ "Exploit", "Third Party Advisory" ]
  49334. } ]
  49335. },
  49336. "description" : {
  49337. "description_data" : [ {
  49338. "lang" : "en",
  49339. "value" : "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in purl 2.3.2 allows a malicious user to inject properties into Object.prototype."
  49340. } ]
  49341. }
  49342. },
  49343. "configurations" : {
  49344. "CVE_data_version" : "4.0",
  49345. "nodes" : [ {
  49346. "operator" : "OR",
  49347. "children" : [ ],
  49348. "cpe_match" : [ {
  49349. "vulnerable" : true,
  49350. "cpe23Uri" : "cpe:2.3:a:purl_project:purl:2.3.2:*:*:*:*:*:*:*",
  49351. "cpe_name" : [ ]
  49352. } ]
  49353. } ]
  49354. },
  49355. "impact" : {
  49356. "baseMetricV3" : {
  49357. "cvssV3" : {
  49358. "version" : "3.1",
  49359. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  49360. "attackVector" : "NETWORK",
  49361. "attackComplexity" : "LOW",
  49362. "privilegesRequired" : "LOW",
  49363. "userInteraction" : "NONE",
  49364. "scope" : "UNCHANGED",
  49365. "confidentialityImpact" : "HIGH",
  49366. "integrityImpact" : "HIGH",
  49367. "availabilityImpact" : "HIGH",
  49368. "baseScore" : 8.8,
  49369. "baseSeverity" : "HIGH"
  49370. },
  49371. "exploitabilityScore" : 2.8,
  49372. "impactScore" : 5.9
  49373. },
  49374. "baseMetricV2" : {
  49375. "cvssV2" : {
  49376. "version" : "2.0",
  49377. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  49378. "accessVector" : "NETWORK",
  49379. "accessComplexity" : "LOW",
  49380. "authentication" : "SINGLE",
  49381. "confidentialityImpact" : "PARTIAL",
  49382. "integrityImpact" : "PARTIAL",
  49383. "availabilityImpact" : "PARTIAL",
  49384. "baseScore" : 6.5
  49385. },
  49386. "severity" : "MEDIUM",
  49387. "exploitabilityScore" : 8.0,
  49388. "impactScore" : 6.4,
  49389. "acInsufInfo" : false,
  49390. "obtainAllPrivilege" : false,
  49391. "obtainUserPrivilege" : false,
  49392. "obtainOtherPrivilege" : false,
  49393. "userInteractionRequired" : false
  49394. }
  49395. },
  49396. "publishedDate" : "2021-04-23T19:15Z",
  49397. "lastModifiedDate" : "2021-05-04T13:29Z"
  49398. }, {
  49399. "cve" : {
  49400. "data_type" : "CVE",
  49401. "data_format" : "MITRE",
  49402. "data_version" : "4.0",
  49403. "CVE_data_meta" : {
  49404. "ID" : "CVE-2021-20086",
  49405. "ASSIGNER" : "vulnreport@tenable.com"
  49406. },
  49407. "problemtype" : {
  49408. "problemtype_data" : [ {
  49409. "description" : [ {
  49410. "lang" : "en",
  49411. "value" : "NVD-CWE-Other"
  49412. } ]
  49413. } ]
  49414. },
  49415. "references" : {
  49416. "reference_data" : [ {
  49417. "url" : "https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-bbq.md",
  49418. "name" : "https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-bbq.md",
  49419. "refsource" : "MISC",
  49420. "tags" : [ "Exploit", "Third Party Advisory" ]
  49421. } ]
  49422. },
  49423. "description" : {
  49424. "description_data" : [ {
  49425. "lang" : "en",
  49426. "value" : "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-bbq 1.2.1 allows a malicious user to inject properties into Object.prototype."
  49427. } ]
  49428. }
  49429. },
  49430. "configurations" : {
  49431. "CVE_data_version" : "4.0",
  49432. "nodes" : [ {
  49433. "operator" : "OR",
  49434. "children" : [ ],
  49435. "cpe_match" : [ {
  49436. "vulnerable" : true,
  49437. "cpe23Uri" : "cpe:2.3:a:jquery-bbq_project:jquery-bbq:1.2.1:*:*:*:*:*:*:*",
  49438. "cpe_name" : [ ]
  49439. } ]
  49440. } ]
  49441. },
  49442. "impact" : {
  49443. "baseMetricV3" : {
  49444. "cvssV3" : {
  49445. "version" : "3.1",
  49446. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  49447. "attackVector" : "NETWORK",
  49448. "attackComplexity" : "LOW",
  49449. "privilegesRequired" : "LOW",
  49450. "userInteraction" : "NONE",
  49451. "scope" : "UNCHANGED",
  49452. "confidentialityImpact" : "HIGH",
  49453. "integrityImpact" : "HIGH",
  49454. "availabilityImpact" : "HIGH",
  49455. "baseScore" : 8.8,
  49456. "baseSeverity" : "HIGH"
  49457. },
  49458. "exploitabilityScore" : 2.8,
  49459. "impactScore" : 5.9
  49460. },
  49461. "baseMetricV2" : {
  49462. "cvssV2" : {
  49463. "version" : "2.0",
  49464. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  49465. "accessVector" : "NETWORK",
  49466. "accessComplexity" : "LOW",
  49467. "authentication" : "SINGLE",
  49468. "confidentialityImpact" : "PARTIAL",
  49469. "integrityImpact" : "PARTIAL",
  49470. "availabilityImpact" : "PARTIAL",
  49471. "baseScore" : 6.5
  49472. },
  49473. "severity" : "MEDIUM",
  49474. "exploitabilityScore" : 8.0,
  49475. "impactScore" : 6.4,
  49476. "acInsufInfo" : false,
  49477. "obtainAllPrivilege" : false,
  49478. "obtainUserPrivilege" : false,
  49479. "obtainOtherPrivilege" : false,
  49480. "userInteractionRequired" : false
  49481. }
  49482. },
  49483. "publishedDate" : "2021-04-23T19:15Z",
  49484. "lastModifiedDate" : "2021-05-04T13:29Z"
  49485. }, {
  49486. "cve" : {
  49487. "data_type" : "CVE",
  49488. "data_format" : "MITRE",
  49489. "data_version" : "4.0",
  49490. "CVE_data_meta" : {
  49491. "ID" : "CVE-2021-29469",
  49492. "ASSIGNER" : "security-advisories@github.com"
  49493. },
  49494. "problemtype" : {
  49495. "problemtype_data" : [ {
  49496. "description" : [ {
  49497. "lang" : "en",
  49498. "value" : "NVD-CWE-noinfo"
  49499. } ]
  49500. } ]
  49501. },
  49502. "references" : {
  49503. "reference_data" : [ {
  49504. "url" : "https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1",
  49505. "name" : "https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1",
  49506. "refsource" : "MISC",
  49507. "tags" : [ "Third Party Advisory" ]
  49508. }, {
  49509. "url" : "https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e",
  49510. "name" : "https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e",
  49511. "refsource" : "MISC",
  49512. "tags" : [ "Patch", "Third Party Advisory" ]
  49513. }, {
  49514. "url" : "https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3",
  49515. "name" : "https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3",
  49516. "refsource" : "CONFIRM",
  49517. "tags" : [ "Patch", "Third Party Advisory" ]
  49518. } ]
  49519. },
  49520. "description" : {
  49521. "description_data" : [ {
  49522. "lang" : "en",
  49523. "value" : "Node-redis is a Node.js Redis client. Before version 3.1.1, when a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service. The issue is patched in version 3.1.1."
  49524. } ]
  49525. }
  49526. },
  49527. "configurations" : {
  49528. "CVE_data_version" : "4.0",
  49529. "nodes" : [ {
  49530. "operator" : "OR",
  49531. "children" : [ ],
  49532. "cpe_match" : [ {
  49533. "vulnerable" : true,
  49534. "cpe23Uri" : "cpe:2.3:a:redis.js:redis:*:*:*:*:*:node.js:*:*",
  49535. "versionEndExcluding" : "3.1.1",
  49536. "cpe_name" : [ ]
  49537. } ]
  49538. } ]
  49539. },
  49540. "impact" : {
  49541. "baseMetricV3" : {
  49542. "cvssV3" : {
  49543. "version" : "3.1",
  49544. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  49545. "attackVector" : "NETWORK",
  49546. "attackComplexity" : "LOW",
  49547. "privilegesRequired" : "NONE",
  49548. "userInteraction" : "NONE",
  49549. "scope" : "UNCHANGED",
  49550. "confidentialityImpact" : "NONE",
  49551. "integrityImpact" : "NONE",
  49552. "availabilityImpact" : "HIGH",
  49553. "baseScore" : 7.5,
  49554. "baseSeverity" : "HIGH"
  49555. },
  49556. "exploitabilityScore" : 3.9,
  49557. "impactScore" : 3.6
  49558. },
  49559. "baseMetricV2" : {
  49560. "cvssV2" : {
  49561. "version" : "2.0",
  49562. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  49563. "accessVector" : "NETWORK",
  49564. "accessComplexity" : "LOW",
  49565. "authentication" : "NONE",
  49566. "confidentialityImpact" : "NONE",
  49567. "integrityImpact" : "NONE",
  49568. "availabilityImpact" : "PARTIAL",
  49569. "baseScore" : 5.0
  49570. },
  49571. "severity" : "MEDIUM",
  49572. "exploitabilityScore" : 10.0,
  49573. "impactScore" : 2.9,
  49574. "acInsufInfo" : false,
  49575. "obtainAllPrivilege" : false,
  49576. "obtainUserPrivilege" : false,
  49577. "obtainOtherPrivilege" : false,
  49578. "userInteractionRequired" : false
  49579. }
  49580. },
  49581. "publishedDate" : "2021-04-23T18:15Z",
  49582. "lastModifiedDate" : "2021-05-03T19:36Z"
  49583. }, {
  49584. "cve" : {
  49585. "data_type" : "CVE",
  49586. "data_format" : "MITRE",
  49587. "data_version" : "4.0",
  49588. "CVE_data_meta" : {
  49589. "ID" : "CVE-2021-22204",
  49590. "ASSIGNER" : "cve@gitlab.com"
  49591. },
  49592. "problemtype" : {
  49593. "problemtype_data" : [ {
  49594. "description" : [ {
  49595. "lang" : "en",
  49596. "value" : "CWE-74"
  49597. } ]
  49598. } ]
  49599. },
  49600. "references" : {
  49601. "reference_data" : [ {
  49602. "url" : "https://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800",
  49603. "name" : "https://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800",
  49604. "refsource" : "MISC",
  49605. "tags" : [ "Patch", "Third Party Advisory" ]
  49606. }, {
  49607. "url" : "https://hackerone.com/reports/1154542",
  49608. "name" : "https://hackerone.com/reports/1154542",
  49609. "refsource" : "MISC",
  49610. "tags" : [ "Permissions Required", "Third Party Advisory" ]
  49611. }, {
  49612. "url" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22204.json",
  49613. "name" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22204.json",
  49614. "refsource" : "CONFIRM",
  49615. "tags" : [ "Third Party Advisory" ]
  49616. }, {
  49617. "url" : "https://www.debian.org/security/2021/dsa-4910",
  49618. "name" : "DSA-4910",
  49619. "refsource" : "DEBIAN",
  49620. "tags" : [ "Third Party Advisory" ]
  49621. }, {
  49622. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDKDLJLBTBBR66OOPXSXCG2PQRM5KCZL/",
  49623. "name" : "FEDORA-2021-e3d8833d36",
  49624. "refsource" : "FEDORA",
  49625. "tags" : [ ]
  49626. }, {
  49627. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4RF6PJCJ6NQOVJJJF6HN6BORUQVIXY6/",
  49628. "name" : "FEDORA-2021-de850ed71e",
  49629. "refsource" : "FEDORA",
  49630. "tags" : [ ]
  49631. }, {
  49632. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F6UOBPU3LSHAPRRJNISNVXZ5DSUIALLV/",
  49633. "name" : "FEDORA-2021-88d24aa32b",
  49634. "refsource" : "FEDORA",
  49635. "tags" : [ ]
  49636. }, {
  49637. "url" : "http://www.openwall.com/lists/oss-security/2021/05/09/1",
  49638. "name" : "[oss-security] 20210509 [CVE-2021-22204] ExifTool - Arbitrary code execution in the DjVu module when parsing a malicious image",
  49639. "refsource" : "MLIST",
  49640. "tags" : [ ]
  49641. } ]
  49642. },
  49643. "description" : {
  49644. "description_data" : [ {
  49645. "lang" : "en",
  49646. "value" : "Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image"
  49647. } ]
  49648. }
  49649. },
  49650. "configurations" : {
  49651. "CVE_data_version" : "4.0",
  49652. "nodes" : [ {
  49653. "operator" : "OR",
  49654. "children" : [ ],
  49655. "cpe_match" : [ {
  49656. "vulnerable" : true,
  49657. "cpe23Uri" : "cpe:2.3:a:exiftool_project:exiftool:*:*:*:*:*:*:*:*",
  49658. "versionStartIncluding" : "7.44",
  49659. "versionEndExcluding" : "12.24",
  49660. "cpe_name" : [ ]
  49661. } ]
  49662. }, {
  49663. "operator" : "OR",
  49664. "children" : [ ],
  49665. "cpe_match" : [ {
  49666. "vulnerable" : true,
  49667. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  49668. "cpe_name" : [ ]
  49669. } ]
  49670. } ]
  49671. },
  49672. "impact" : {
  49673. "baseMetricV3" : {
  49674. "cvssV3" : {
  49675. "version" : "3.1",
  49676. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  49677. "attackVector" : "LOCAL",
  49678. "attackComplexity" : "LOW",
  49679. "privilegesRequired" : "LOW",
  49680. "userInteraction" : "NONE",
  49681. "scope" : "UNCHANGED",
  49682. "confidentialityImpact" : "HIGH",
  49683. "integrityImpact" : "HIGH",
  49684. "availabilityImpact" : "HIGH",
  49685. "baseScore" : 7.8,
  49686. "baseSeverity" : "HIGH"
  49687. },
  49688. "exploitabilityScore" : 1.8,
  49689. "impactScore" : 5.9
  49690. },
  49691. "baseMetricV2" : {
  49692. "cvssV2" : {
  49693. "version" : "2.0",
  49694. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  49695. "accessVector" : "NETWORK",
  49696. "accessComplexity" : "MEDIUM",
  49697. "authentication" : "NONE",
  49698. "confidentialityImpact" : "PARTIAL",
  49699. "integrityImpact" : "PARTIAL",
  49700. "availabilityImpact" : "PARTIAL",
  49701. "baseScore" : 6.8
  49702. },
  49703. "severity" : "MEDIUM",
  49704. "exploitabilityScore" : 8.6,
  49705. "impactScore" : 6.4,
  49706. "acInsufInfo" : false,
  49707. "obtainAllPrivilege" : false,
  49708. "obtainUserPrivilege" : false,
  49709. "obtainOtherPrivilege" : false,
  49710. "userInteractionRequired" : true
  49711. }
  49712. },
  49713. "publishedDate" : "2021-04-23T18:15Z",
  49714. "lastModifiedDate" : "2021-05-09T12:15Z"
  49715. }, {
  49716. "cve" : {
  49717. "data_type" : "CVE",
  49718. "data_format" : "MITRE",
  49719. "data_version" : "4.0",
  49720. "CVE_data_meta" : {
  49721. "ID" : "CVE-2021-31539",
  49722. "ASSIGNER" : "cve@mitre.org"
  49723. },
  49724. "problemtype" : {
  49725. "problemtype_data" : [ {
  49726. "description" : [ {
  49727. "lang" : "en",
  49728. "value" : "CWE-312"
  49729. } ]
  49730. } ]
  49731. },
  49732. "references" : {
  49733. "reference_data" : [ {
  49734. "url" : "https://www.gruppotim.it/redteam",
  49735. "name" : "https://www.gruppotim.it/redteam",
  49736. "refsource" : "MISC",
  49737. "tags" : [ "Exploit", "Third Party Advisory" ]
  49738. }, {
  49739. "url" : "https://www.wowza.com/products/streaming-engine",
  49740. "name" : "https://www.wowza.com/products/streaming-engine",
  49741. "refsource" : "MISC",
  49742. "tags" : [ "Product", "Vendor Advisory" ]
  49743. }, {
  49744. "url" : "https://www.wowza.com/docs/wowza-streaming-engine-4-8-8-01-release-notes#breaking",
  49745. "name" : "https://www.wowza.com/docs/wowza-streaming-engine-4-8-8-01-release-notes#breaking",
  49746. "refsource" : "MISC",
  49747. "tags" : [ ]
  49748. } ]
  49749. },
  49750. "description" : {
  49751. "description_data" : [ {
  49752. "lang" : "en",
  49753. "value" : "Wowza Streaming Engine before 4.8.8.01 (in a default installation) has cleartext passwords stored in the conf/admin.password file. A regular local user is able to read usernames and passwords."
  49754. } ]
  49755. }
  49756. },
  49757. "configurations" : {
  49758. "CVE_data_version" : "4.0",
  49759. "nodes" : [ {
  49760. "operator" : "OR",
  49761. "children" : [ ],
  49762. "cpe_match" : [ {
  49763. "vulnerable" : true,
  49764. "cpe23Uri" : "cpe:2.3:a:wowza:streaming_engine:*:*:*:*:*:*:*:*",
  49765. "versionEndIncluding" : "4.8.5",
  49766. "cpe_name" : [ ]
  49767. } ]
  49768. } ]
  49769. },
  49770. "impact" : {
  49771. "baseMetricV3" : {
  49772. "cvssV3" : {
  49773. "version" : "3.1",
  49774. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  49775. "attackVector" : "LOCAL",
  49776. "attackComplexity" : "LOW",
  49777. "privilegesRequired" : "LOW",
  49778. "userInteraction" : "NONE",
  49779. "scope" : "UNCHANGED",
  49780. "confidentialityImpact" : "HIGH",
  49781. "integrityImpact" : "NONE",
  49782. "availabilityImpact" : "NONE",
  49783. "baseScore" : 5.5,
  49784. "baseSeverity" : "MEDIUM"
  49785. },
  49786. "exploitabilityScore" : 1.8,
  49787. "impactScore" : 3.6
  49788. },
  49789. "baseMetricV2" : {
  49790. "cvssV2" : {
  49791. "version" : "2.0",
  49792. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  49793. "accessVector" : "LOCAL",
  49794. "accessComplexity" : "LOW",
  49795. "authentication" : "NONE",
  49796. "confidentialityImpact" : "PARTIAL",
  49797. "integrityImpact" : "NONE",
  49798. "availabilityImpact" : "NONE",
  49799. "baseScore" : 2.1
  49800. },
  49801. "severity" : "LOW",
  49802. "exploitabilityScore" : 3.9,
  49803. "impactScore" : 2.9,
  49804. "acInsufInfo" : false,
  49805. "obtainAllPrivilege" : false,
  49806. "obtainUserPrivilege" : false,
  49807. "obtainOtherPrivilege" : false,
  49808. "userInteractionRequired" : false
  49809. }
  49810. },
  49811. "publishedDate" : "2021-04-23T17:15Z",
  49812. "lastModifiedDate" : "2021-05-05T11:15Z"
  49813. }, {
  49814. "cve" : {
  49815. "data_type" : "CVE",
  49816. "data_format" : "MITRE",
  49817. "data_version" : "4.0",
  49818. "CVE_data_meta" : {
  49819. "ID" : "CVE-2021-31410",
  49820. "ASSIGNER" : "security@vaadin.com"
  49821. },
  49822. "problemtype" : {
  49823. "problemtype_data" : [ {
  49824. "description" : [ {
  49825. "lang" : "en",
  49826. "value" : "CWE-668"
  49827. } ]
  49828. } ]
  49829. },
  49830. "references" : {
  49831. "reference_data" : [ {
  49832. "url" : "https://vaadin.com/security/cve-2021-31410",
  49833. "name" : "https://vaadin.com/security/cve-2021-31410",
  49834. "refsource" : "MISC",
  49835. "tags" : [ "Vendor Advisory" ]
  49836. } ]
  49837. },
  49838. "description" : {
  49839. "description_data" : [ {
  49840. "lang" : "en",
  49841. "value" : "Overly relaxed configuration of frontend resources server in Vaadin Designer versions 4.3.0 through 4.6.3 allows remote attackers to access project sources via crafted HTTP request."
  49842. } ]
  49843. }
  49844. },
  49845. "configurations" : {
  49846. "CVE_data_version" : "4.0",
  49847. "nodes" : [ {
  49848. "operator" : "OR",
  49849. "children" : [ ],
  49850. "cpe_match" : [ {
  49851. "vulnerable" : true,
  49852. "cpe23Uri" : "cpe:2.3:a:vaadin:designer:*:*:*:*:*:*:*:*",
  49853. "versionStartIncluding" : "4.3.0",
  49854. "versionEndExcluding" : "4.6.4",
  49855. "cpe_name" : [ ]
  49856. } ]
  49857. } ]
  49858. },
  49859. "impact" : {
  49860. "baseMetricV3" : {
  49861. "cvssV3" : {
  49862. "version" : "3.1",
  49863. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  49864. "attackVector" : "NETWORK",
  49865. "attackComplexity" : "LOW",
  49866. "privilegesRequired" : "NONE",
  49867. "userInteraction" : "NONE",
  49868. "scope" : "UNCHANGED",
  49869. "confidentialityImpact" : "HIGH",
  49870. "integrityImpact" : "NONE",
  49871. "availabilityImpact" : "NONE",
  49872. "baseScore" : 7.5,
  49873. "baseSeverity" : "HIGH"
  49874. },
  49875. "exploitabilityScore" : 3.9,
  49876. "impactScore" : 3.6
  49877. },
  49878. "baseMetricV2" : {
  49879. "cvssV2" : {
  49880. "version" : "2.0",
  49881. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  49882. "accessVector" : "NETWORK",
  49883. "accessComplexity" : "LOW",
  49884. "authentication" : "NONE",
  49885. "confidentialityImpact" : "PARTIAL",
  49886. "integrityImpact" : "NONE",
  49887. "availabilityImpact" : "NONE",
  49888. "baseScore" : 5.0
  49889. },
  49890. "severity" : "MEDIUM",
  49891. "exploitabilityScore" : 10.0,
  49892. "impactScore" : 2.9,
  49893. "acInsufInfo" : false,
  49894. "obtainAllPrivilege" : false,
  49895. "obtainUserPrivilege" : false,
  49896. "obtainOtherPrivilege" : false,
  49897. "userInteractionRequired" : false
  49898. }
  49899. },
  49900. "publishedDate" : "2021-04-23T17:15Z",
  49901. "lastModifiedDate" : "2021-05-04T15:25Z"
  49902. }, {
  49903. "cve" : {
  49904. "data_type" : "CVE",
  49905. "data_format" : "MITRE",
  49906. "data_version" : "4.0",
  49907. "CVE_data_meta" : {
  49908. "ID" : "CVE-2021-31408",
  49909. "ASSIGNER" : "security@vaadin.com"
  49910. },
  49911. "problemtype" : {
  49912. "problemtype_data" : [ {
  49913. "description" : [ {
  49914. "lang" : "en",
  49915. "value" : "CWE-613"
  49916. } ]
  49917. } ]
  49918. },
  49919. "references" : {
  49920. "reference_data" : [ {
  49921. "url" : "https://github.com/vaadin/flow/pull/10577",
  49922. "name" : "https://github.com/vaadin/flow/pull/10577",
  49923. "refsource" : "MISC",
  49924. "tags" : [ "Patch", "Third Party Advisory" ]
  49925. }, {
  49926. "url" : "https://vaadin.com/security/cve-2021-31408",
  49927. "name" : "https://vaadin.com/security/cve-2021-31408",
  49928. "refsource" : "MISC",
  49929. "tags" : [ "Vendor Advisory" ]
  49930. } ]
  49931. },
  49932. "description" : {
  49933. "description_data" : [ {
  49934. "lang" : "en",
  49935. "value" : "Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out."
  49936. } ]
  49937. }
  49938. },
  49939. "configurations" : {
  49940. "CVE_data_version" : "4.0",
  49941. "nodes" : [ {
  49942. "operator" : "OR",
  49943. "children" : [ ],
  49944. "cpe_match" : [ {
  49945. "vulnerable" : true,
  49946. "cpe23Uri" : "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
  49947. "versionStartIncluding" : "5.0.0",
  49948. "versionEndExcluding" : "6.0.0",
  49949. "cpe_name" : [ ]
  49950. }, {
  49951. "vulnerable" : true,
  49952. "cpe23Uri" : "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
  49953. "versionStartIncluding" : "6.0.0",
  49954. "versionEndExcluding" : "6.0.5",
  49955. "cpe_name" : [ ]
  49956. }, {
  49957. "vulnerable" : true,
  49958. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:18.0.0:-:*:*:*:*:*:*",
  49959. "cpe_name" : [ ]
  49960. }, {
  49961. "vulnerable" : true,
  49962. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  49963. "versionStartIncluding" : "19.0.0",
  49964. "versionEndExcluding" : "19.0.4",
  49965. "cpe_name" : [ ]
  49966. } ]
  49967. } ]
  49968. },
  49969. "impact" : {
  49970. "baseMetricV3" : {
  49971. "cvssV3" : {
  49972. "version" : "3.1",
  49973. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
  49974. "attackVector" : "LOCAL",
  49975. "attackComplexity" : "LOW",
  49976. "privilegesRequired" : "NONE",
  49977. "userInteraction" : "REQUIRED",
  49978. "scope" : "UNCHANGED",
  49979. "confidentialityImpact" : "HIGH",
  49980. "integrityImpact" : "HIGH",
  49981. "availabilityImpact" : "NONE",
  49982. "baseScore" : 7.1,
  49983. "baseSeverity" : "HIGH"
  49984. },
  49985. "exploitabilityScore" : 1.8,
  49986. "impactScore" : 5.2
  49987. },
  49988. "baseMetricV2" : {
  49989. "cvssV2" : {
  49990. "version" : "2.0",
  49991. "vectorString" : "AV:L/AC:M/Au:N/C:P/I:P/A:N",
  49992. "accessVector" : "LOCAL",
  49993. "accessComplexity" : "MEDIUM",
  49994. "authentication" : "NONE",
  49995. "confidentialityImpact" : "PARTIAL",
  49996. "integrityImpact" : "PARTIAL",
  49997. "availabilityImpact" : "NONE",
  49998. "baseScore" : 3.3
  49999. },
  50000. "severity" : "LOW",
  50001. "exploitabilityScore" : 3.4,
  50002. "impactScore" : 4.9,
  50003. "acInsufInfo" : false,
  50004. "obtainAllPrivilege" : false,
  50005. "obtainUserPrivilege" : false,
  50006. "obtainOtherPrivilege" : false,
  50007. "userInteractionRequired" : true
  50008. }
  50009. },
  50010. "publishedDate" : "2021-04-23T17:15Z",
  50011. "lastModifiedDate" : "2021-05-04T16:19Z"
  50012. }, {
  50013. "cve" : {
  50014. "data_type" : "CVE",
  50015. "data_format" : "MITRE",
  50016. "data_version" : "4.0",
  50017. "CVE_data_meta" : {
  50018. "ID" : "CVE-2021-31407",
  50019. "ASSIGNER" : "security@vaadin.com"
  50020. },
  50021. "problemtype" : {
  50022. "problemtype_data" : [ {
  50023. "description" : [ {
  50024. "lang" : "en",
  50025. "value" : "CWE-668"
  50026. } ]
  50027. } ]
  50028. },
  50029. "references" : {
  50030. "reference_data" : [ {
  50031. "url" : "https://github.com/vaadin/flow/pull/10269",
  50032. "name" : "N/A",
  50033. "refsource" : "CONFIRM",
  50034. "tags" : [ "Patch", "Third Party Advisory" ]
  50035. }, {
  50036. "url" : "https://vaadin.com/security/cve-2021-31407",
  50037. "name" : "N/A",
  50038. "refsource" : "CONFIRM",
  50039. "tags" : [ "Vendor Advisory" ]
  50040. }, {
  50041. "url" : "https://github.com/vaadin/flow/pull/10229",
  50042. "name" : "N/A",
  50043. "refsource" : "CONFIRM",
  50044. "tags" : [ "Patch", "Third Party Advisory" ]
  50045. }, {
  50046. "url" : "https://github.com/vaadin/osgi/issues/50",
  50047. "name" : "N/A",
  50048. "refsource" : "CONFIRM",
  50049. "tags" : [ "Patch", "Third Party Advisory" ]
  50050. } ]
  50051. },
  50052. "description" : {
  50053. "description_data" : [ {
  50054. "lang" : "en",
  50055. "value" : "Vulnerability in OSGi integration in com.vaadin:flow-server versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request."
  50056. } ]
  50057. }
  50058. },
  50059. "configurations" : {
  50060. "CVE_data_version" : "4.0",
  50061. "nodes" : [ {
  50062. "operator" : "OR",
  50063. "children" : [ ],
  50064. "cpe_match" : [ {
  50065. "vulnerable" : true,
  50066. "cpe23Uri" : "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
  50067. "versionStartIncluding" : "1.2.0",
  50068. "versionEndExcluding" : "2.4.8",
  50069. "cpe_name" : [ ]
  50070. }, {
  50071. "vulnerable" : true,
  50072. "cpe23Uri" : "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
  50073. "versionStartIncluding" : "6.0.0",
  50074. "versionEndExcluding" : "6.0.2",
  50075. "cpe_name" : [ ]
  50076. }, {
  50077. "vulnerable" : true,
  50078. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  50079. "versionStartIncluding" : "12.0.0",
  50080. "versionEndExcluding" : "14.4.10",
  50081. "cpe_name" : [ ]
  50082. }, {
  50083. "vulnerable" : true,
  50084. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:19.0.0:-:*:*:*:*:*:*",
  50085. "cpe_name" : [ ]
  50086. } ]
  50087. } ]
  50088. },
  50089. "impact" : {
  50090. "baseMetricV3" : {
  50091. "cvssV3" : {
  50092. "version" : "3.1",
  50093. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  50094. "attackVector" : "NETWORK",
  50095. "attackComplexity" : "LOW",
  50096. "privilegesRequired" : "NONE",
  50097. "userInteraction" : "NONE",
  50098. "scope" : "UNCHANGED",
  50099. "confidentialityImpact" : "HIGH",
  50100. "integrityImpact" : "NONE",
  50101. "availabilityImpact" : "NONE",
  50102. "baseScore" : 7.5,
  50103. "baseSeverity" : "HIGH"
  50104. },
  50105. "exploitabilityScore" : 3.9,
  50106. "impactScore" : 3.6
  50107. },
  50108. "baseMetricV2" : {
  50109. "cvssV2" : {
  50110. "version" : "2.0",
  50111. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  50112. "accessVector" : "NETWORK",
  50113. "accessComplexity" : "LOW",
  50114. "authentication" : "NONE",
  50115. "confidentialityImpact" : "PARTIAL",
  50116. "integrityImpact" : "NONE",
  50117. "availabilityImpact" : "NONE",
  50118. "baseScore" : 5.0
  50119. },
  50120. "severity" : "MEDIUM",
  50121. "exploitabilityScore" : 10.0,
  50122. "impactScore" : 2.9,
  50123. "acInsufInfo" : false,
  50124. "obtainAllPrivilege" : false,
  50125. "obtainUserPrivilege" : false,
  50126. "obtainOtherPrivilege" : false,
  50127. "userInteractionRequired" : false
  50128. }
  50129. },
  50130. "publishedDate" : "2021-04-23T16:15Z",
  50131. "lastModifiedDate" : "2021-05-05T17:12Z"
  50132. }, {
  50133. "cve" : {
  50134. "data_type" : "CVE",
  50135. "data_format" : "MITRE",
  50136. "data_version" : "4.0",
  50137. "CVE_data_meta" : {
  50138. "ID" : "CVE-2021-31405",
  50139. "ASSIGNER" : "security@vaadin.com"
  50140. },
  50141. "problemtype" : {
  50142. "problemtype_data" : [ {
  50143. "description" : [ {
  50144. "lang" : "en",
  50145. "value" : "CWE-400"
  50146. } ]
  50147. } ]
  50148. },
  50149. "references" : {
  50150. "reference_data" : [ {
  50151. "url" : "https://vaadin.com/security/cve-2021-31405",
  50152. "name" : "N/A",
  50153. "refsource" : "CONFIRM",
  50154. "tags" : [ "Vendor Advisory" ]
  50155. }, {
  50156. "url" : "https://github.com/vaadin/flow-components/pull/442",
  50157. "name" : "N/A",
  50158. "refsource" : "CONFIRM",
  50159. "tags" : [ "Patch", "Third Party Advisory" ]
  50160. } ]
  50161. },
  50162. "description" : {
  50163. "description_data" : [ {
  50164. "lang" : "en",
  50165. "value" : "Unsafe validation RegEx in EmailField component in com.vaadin:vaadin-text-field-flow versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses."
  50166. } ]
  50167. }
  50168. },
  50169. "configurations" : {
  50170. "CVE_data_version" : "4.0",
  50171. "nodes" : [ {
  50172. "operator" : "OR",
  50173. "children" : [ ],
  50174. "cpe_match" : [ {
  50175. "vulnerable" : true,
  50176. "cpe23Uri" : "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
  50177. "versionStartIncluding" : "2.0.4",
  50178. "versionEndExcluding" : "2.3.3",
  50179. "cpe_name" : [ ]
  50180. }, {
  50181. "vulnerable" : true,
  50182. "cpe23Uri" : "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
  50183. "versionStartIncluding" : "3.0.0",
  50184. "versionEndExcluding" : "4.0.3",
  50185. "cpe_name" : [ ]
  50186. }, {
  50187. "vulnerable" : true,
  50188. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  50189. "versionStartIncluding" : "14.0.6",
  50190. "versionEndExcluding" : "14.4.4",
  50191. "cpe_name" : [ ]
  50192. }, {
  50193. "vulnerable" : true,
  50194. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  50195. "versionStartIncluding" : "15.0.0",
  50196. "versionEndExcluding" : "17.0.11",
  50197. "cpe_name" : [ ]
  50198. } ]
  50199. } ]
  50200. },
  50201. "impact" : {
  50202. "baseMetricV3" : {
  50203. "cvssV3" : {
  50204. "version" : "3.1",
  50205. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  50206. "attackVector" : "NETWORK",
  50207. "attackComplexity" : "LOW",
  50208. "privilegesRequired" : "NONE",
  50209. "userInteraction" : "NONE",
  50210. "scope" : "UNCHANGED",
  50211. "confidentialityImpact" : "NONE",
  50212. "integrityImpact" : "NONE",
  50213. "availabilityImpact" : "HIGH",
  50214. "baseScore" : 7.5,
  50215. "baseSeverity" : "HIGH"
  50216. },
  50217. "exploitabilityScore" : 3.9,
  50218. "impactScore" : 3.6
  50219. },
  50220. "baseMetricV2" : {
  50221. "cvssV2" : {
  50222. "version" : "2.0",
  50223. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  50224. "accessVector" : "NETWORK",
  50225. "accessComplexity" : "LOW",
  50226. "authentication" : "NONE",
  50227. "confidentialityImpact" : "NONE",
  50228. "integrityImpact" : "NONE",
  50229. "availabilityImpact" : "PARTIAL",
  50230. "baseScore" : 5.0
  50231. },
  50232. "severity" : "MEDIUM",
  50233. "exploitabilityScore" : 10.0,
  50234. "impactScore" : 2.9,
  50235. "acInsufInfo" : false,
  50236. "obtainAllPrivilege" : false,
  50237. "obtainUserPrivilege" : false,
  50238. "obtainOtherPrivilege" : false,
  50239. "userInteractionRequired" : false
  50240. }
  50241. },
  50242. "publishedDate" : "2021-04-23T16:15Z",
  50243. "lastModifiedDate" : "2021-05-05T17:43Z"
  50244. }, {
  50245. "cve" : {
  50246. "data_type" : "CVE",
  50247. "data_format" : "MITRE",
  50248. "data_version" : "4.0",
  50249. "CVE_data_meta" : {
  50250. "ID" : "CVE-2021-26909",
  50251. "ASSIGNER" : "cve@rapid7.com"
  50252. },
  50253. "problemtype" : {
  50254. "problemtype_data" : [ {
  50255. "description" : [ {
  50256. "lang" : "en",
  50257. "value" : "CWE-269"
  50258. } ]
  50259. } ]
  50260. },
  50261. "references" : {
  50262. "reference_data" : [ {
  50263. "url" : "https://community.automox.com/t/cve-2021-26908-and-cve-201-26909-automox-agent-information-disclosure-vulnerabilities-fixed/1955",
  50264. "name" : "https://community.automox.com/t/cve-2021-26908-and-cve-201-26909-automox-agent-information-disclosure-vulnerabilities-fixed/1955",
  50265. "refsource" : "CONFIRM",
  50266. "tags" : [ "Vendor Advisory" ]
  50267. }, {
  50268. "url" : "https://www.rapid7.com/blog/post/2021/04/13/cve-2021-26908-and-cve-2021-26909-automox-agent-information-disclosure-fixed/",
  50269. "name" : "https://www.rapid7.com/blog/post/2021/04/13/cve-2021-26908-and-cve-2021-26909-automox-agent-information-disclosure-fixed/",
  50270. "refsource" : "MISC",
  50271. "tags" : [ "Third Party Advisory" ]
  50272. } ]
  50273. },
  50274. "description" : {
  50275. "description_data" : [ {
  50276. "lang" : "en",
  50277. "value" : "Automox Agent prior to version 31 uses an insufficiently protected S3 bucket endpoint for storing sensitive files, which could be brute-forced by an attacker to subvert an organization's security program. The issue has since been fixed in version 31 of the Automox Agent."
  50278. } ]
  50279. }
  50280. },
  50281. "configurations" : {
  50282. "CVE_data_version" : "4.0",
  50283. "nodes" : [ {
  50284. "operator" : "OR",
  50285. "children" : [ ],
  50286. "cpe_match" : [ {
  50287. "vulnerable" : true,
  50288. "cpe23Uri" : "cpe:2.3:a:automox:automox:*:*:*:*:*:*:*:*",
  50289. "versionEndExcluding" : "31",
  50290. "cpe_name" : [ ]
  50291. } ]
  50292. } ]
  50293. },
  50294. "impact" : {
  50295. "baseMetricV3" : {
  50296. "cvssV3" : {
  50297. "version" : "3.1",
  50298. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  50299. "attackVector" : "NETWORK",
  50300. "attackComplexity" : "LOW",
  50301. "privilegesRequired" : "NONE",
  50302. "userInteraction" : "NONE",
  50303. "scope" : "UNCHANGED",
  50304. "confidentialityImpact" : "LOW",
  50305. "integrityImpact" : "NONE",
  50306. "availabilityImpact" : "NONE",
  50307. "baseScore" : 5.3,
  50308. "baseSeverity" : "MEDIUM"
  50309. },
  50310. "exploitabilityScore" : 3.9,
  50311. "impactScore" : 1.4
  50312. },
  50313. "baseMetricV2" : {
  50314. "cvssV2" : {
  50315. "version" : "2.0",
  50316. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  50317. "accessVector" : "NETWORK",
  50318. "accessComplexity" : "LOW",
  50319. "authentication" : "NONE",
  50320. "confidentialityImpact" : "PARTIAL",
  50321. "integrityImpact" : "NONE",
  50322. "availabilityImpact" : "NONE",
  50323. "baseScore" : 5.0
  50324. },
  50325. "severity" : "MEDIUM",
  50326. "exploitabilityScore" : 10.0,
  50327. "impactScore" : 2.9,
  50328. "acInsufInfo" : false,
  50329. "obtainAllPrivilege" : false,
  50330. "obtainUserPrivilege" : false,
  50331. "obtainOtherPrivilege" : false,
  50332. "userInteractionRequired" : false
  50333. }
  50334. },
  50335. "publishedDate" : "2021-04-23T16:15Z",
  50336. "lastModifiedDate" : "2021-05-05T19:30Z"
  50337. }, {
  50338. "cve" : {
  50339. "data_type" : "CVE",
  50340. "data_format" : "MITRE",
  50341. "data_version" : "4.0",
  50342. "CVE_data_meta" : {
  50343. "ID" : "CVE-2021-26908",
  50344. "ASSIGNER" : "cve@rapid7.com"
  50345. },
  50346. "problemtype" : {
  50347. "problemtype_data" : [ {
  50348. "description" : [ {
  50349. "lang" : "en",
  50350. "value" : "CWE-532"
  50351. } ]
  50352. } ]
  50353. },
  50354. "references" : {
  50355. "reference_data" : [ {
  50356. "url" : "https://community.automox.com/t/cve-2021-26908-and-cve-201-26909-automox-agent-information-disclosure-vulnerabilities-fixed/1955",
  50357. "name" : "https://community.automox.com/t/cve-2021-26908-and-cve-201-26909-automox-agent-information-disclosure-vulnerabilities-fixed/1955",
  50358. "refsource" : "CONFIRM",
  50359. "tags" : [ "Vendor Advisory" ]
  50360. }, {
  50361. "url" : "https://www.rapid7.com/blog/post/2021/04/13/cve-2021-26908-and-cve-2021-26909-automox-agent-information-disclosure-fixed/",
  50362. "name" : "https://www.rapid7.com/blog/post/2021/04/13/cve-2021-26908-and-cve-2021-26909-automox-agent-information-disclosure-fixed/",
  50363. "refsource" : "MISC",
  50364. "tags" : [ "Third Party Advisory" ]
  50365. } ]
  50366. },
  50367. "description" : {
  50368. "description_data" : [ {
  50369. "lang" : "en",
  50370. "value" : "Automox Agent prior to version 31 logs potentially sensitive information in local log files, which could be used by a locally-authenticated attacker to subvert an organization's security program. The issue has since been fixed in version 31 of the Automox Agent."
  50371. } ]
  50372. }
  50373. },
  50374. "configurations" : {
  50375. "CVE_data_version" : "4.0",
  50376. "nodes" : [ {
  50377. "operator" : "OR",
  50378. "children" : [ ],
  50379. "cpe_match" : [ {
  50380. "vulnerable" : true,
  50381. "cpe23Uri" : "cpe:2.3:a:automox:automox:*:*:*:*:*:*:*:*",
  50382. "versionEndExcluding" : "31",
  50383. "cpe_name" : [ ]
  50384. } ]
  50385. } ]
  50386. },
  50387. "impact" : {
  50388. "baseMetricV3" : {
  50389. "cvssV3" : {
  50390. "version" : "3.1",
  50391. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
  50392. "attackVector" : "LOCAL",
  50393. "attackComplexity" : "LOW",
  50394. "privilegesRequired" : "LOW",
  50395. "userInteraction" : "NONE",
  50396. "scope" : "UNCHANGED",
  50397. "confidentialityImpact" : "LOW",
  50398. "integrityImpact" : "NONE",
  50399. "availabilityImpact" : "NONE",
  50400. "baseScore" : 3.3,
  50401. "baseSeverity" : "LOW"
  50402. },
  50403. "exploitabilityScore" : 1.8,
  50404. "impactScore" : 1.4
  50405. },
  50406. "baseMetricV2" : {
  50407. "cvssV2" : {
  50408. "version" : "2.0",
  50409. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  50410. "accessVector" : "LOCAL",
  50411. "accessComplexity" : "LOW",
  50412. "authentication" : "NONE",
  50413. "confidentialityImpact" : "PARTIAL",
  50414. "integrityImpact" : "NONE",
  50415. "availabilityImpact" : "NONE",
  50416. "baseScore" : 2.1
  50417. },
  50418. "severity" : "LOW",
  50419. "exploitabilityScore" : 3.9,
  50420. "impactScore" : 2.9,
  50421. "acInsufInfo" : false,
  50422. "obtainAllPrivilege" : false,
  50423. "obtainUserPrivilege" : false,
  50424. "obtainOtherPrivilege" : false,
  50425. "userInteractionRequired" : false
  50426. }
  50427. },
  50428. "publishedDate" : "2021-04-23T16:15Z",
  50429. "lastModifiedDate" : "2021-05-05T19:16Z"
  50430. }, {
  50431. "cve" : {
  50432. "data_type" : "CVE",
  50433. "data_format" : "MITRE",
  50434. "data_version" : "4.0",
  50435. "CVE_data_meta" : {
  50436. "ID" : "CVE-2020-36321",
  50437. "ASSIGNER" : "security@vaadin.com"
  50438. },
  50439. "problemtype" : {
  50440. "problemtype_data" : [ {
  50441. "description" : [ {
  50442. "lang" : "en",
  50443. "value" : "CWE-22"
  50444. } ]
  50445. } ]
  50446. },
  50447. "references" : {
  50448. "reference_data" : [ {
  50449. "url" : "https://vaadin.com/security/cve-2020-36321",
  50450. "name" : "N/A",
  50451. "refsource" : "CONFIRM",
  50452. "tags" : [ "Vendor Advisory" ]
  50453. }, {
  50454. "url" : "https://github.com/vaadin/flow/pull/9392",
  50455. "name" : "N/A",
  50456. "refsource" : "CONFIRM",
  50457. "tags" : [ "Patch", "Third Party Advisory" ]
  50458. } ]
  50459. },
  50460. "description" : {
  50461. "description_data" : [ {
  50462. "lang" : "en",
  50463. "value" : "Improper URL validation in development mode handler in com.vaadin:flow-server versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder."
  50464. } ]
  50465. }
  50466. },
  50467. "configurations" : {
  50468. "CVE_data_version" : "4.0",
  50469. "nodes" : [ {
  50470. "operator" : "OR",
  50471. "children" : [ ],
  50472. "cpe_match" : [ {
  50473. "vulnerable" : true,
  50474. "cpe23Uri" : "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
  50475. "versionStartIncluding" : "2.0.0",
  50476. "versionEndExcluding" : "2.4.2",
  50477. "cpe_name" : [ ]
  50478. }, {
  50479. "vulnerable" : true,
  50480. "cpe23Uri" : "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
  50481. "versionStartIncluding" : "3.0.0",
  50482. "versionEndExcluding" : "5.0.0",
  50483. "cpe_name" : [ ]
  50484. }, {
  50485. "vulnerable" : true,
  50486. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  50487. "versionStartIncluding" : "14.0.0",
  50488. "versionEndExcluding" : "14.4.3",
  50489. "cpe_name" : [ ]
  50490. }, {
  50491. "vulnerable" : true,
  50492. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  50493. "versionStartIncluding" : "15.0.0",
  50494. "versionEndExcluding" : "18.0.0",
  50495. "cpe_name" : [ ]
  50496. } ]
  50497. } ]
  50498. },
  50499. "impact" : {
  50500. "baseMetricV3" : {
  50501. "cvssV3" : {
  50502. "version" : "3.1",
  50503. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  50504. "attackVector" : "NETWORK",
  50505. "attackComplexity" : "LOW",
  50506. "privilegesRequired" : "NONE",
  50507. "userInteraction" : "NONE",
  50508. "scope" : "UNCHANGED",
  50509. "confidentialityImpact" : "HIGH",
  50510. "integrityImpact" : "NONE",
  50511. "availabilityImpact" : "NONE",
  50512. "baseScore" : 7.5,
  50513. "baseSeverity" : "HIGH"
  50514. },
  50515. "exploitabilityScore" : 3.9,
  50516. "impactScore" : 3.6
  50517. },
  50518. "baseMetricV2" : {
  50519. "cvssV2" : {
  50520. "version" : "2.0",
  50521. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  50522. "accessVector" : "NETWORK",
  50523. "accessComplexity" : "LOW",
  50524. "authentication" : "NONE",
  50525. "confidentialityImpact" : "PARTIAL",
  50526. "integrityImpact" : "NONE",
  50527. "availabilityImpact" : "NONE",
  50528. "baseScore" : 5.0
  50529. },
  50530. "severity" : "MEDIUM",
  50531. "exploitabilityScore" : 10.0,
  50532. "impactScore" : 2.9,
  50533. "acInsufInfo" : false,
  50534. "obtainAllPrivilege" : false,
  50535. "obtainUserPrivilege" : false,
  50536. "obtainOtherPrivilege" : false,
  50537. "userInteractionRequired" : false
  50538. }
  50539. },
  50540. "publishedDate" : "2021-04-23T16:15Z",
  50541. "lastModifiedDate" : "2021-05-05T17:26Z"
  50542. }, {
  50543. "cve" : {
  50544. "data_type" : "CVE",
  50545. "data_format" : "MITRE",
  50546. "data_version" : "4.0",
  50547. "CVE_data_meta" : {
  50548. "ID" : "CVE-2020-36320",
  50549. "ASSIGNER" : "security@vaadin.com"
  50550. },
  50551. "problemtype" : {
  50552. "problemtype_data" : [ {
  50553. "description" : [ {
  50554. "lang" : "en",
  50555. "value" : "CWE-400"
  50556. } ]
  50557. } ]
  50558. },
  50559. "references" : {
  50560. "reference_data" : [ {
  50561. "url" : "https://vaadin.com/security/cve-2020-36320",
  50562. "name" : "N/A",
  50563. "refsource" : "CONFIRM",
  50564. "tags" : [ "Vendor Advisory" ]
  50565. }, {
  50566. "url" : "https://github.com/vaadin/framework/issues/7757",
  50567. "name" : "N/A",
  50568. "refsource" : "CONFIRM",
  50569. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  50570. }, {
  50571. "url" : "https://github.com/vaadin/framework/pull/12104",
  50572. "name" : "N/A",
  50573. "refsource" : "CONFIRM",
  50574. "tags" : [ "Patch", "Third Party Advisory" ]
  50575. } ]
  50576. },
  50577. "description" : {
  50578. "description_data" : [ {
  50579. "lang" : "en",
  50580. "value" : "Unsafe validation RegEx in EmailValidator class in com.vaadin:vaadin-server versions 7.0.0 through 7.7.21 (Vaadin 7.0.0 through 7.7.21) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses."
  50581. } ]
  50582. }
  50583. },
  50584. "configurations" : {
  50585. "CVE_data_version" : "4.0",
  50586. "nodes" : [ {
  50587. "operator" : "OR",
  50588. "children" : [ ],
  50589. "cpe_match" : [ {
  50590. "vulnerable" : true,
  50591. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  50592. "versionStartIncluding" : "7.0.0",
  50593. "versionEndExcluding" : "7.7.22",
  50594. "cpe_name" : [ ]
  50595. } ]
  50596. } ]
  50597. },
  50598. "impact" : {
  50599. "baseMetricV3" : {
  50600. "cvssV3" : {
  50601. "version" : "3.1",
  50602. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  50603. "attackVector" : "NETWORK",
  50604. "attackComplexity" : "LOW",
  50605. "privilegesRequired" : "NONE",
  50606. "userInteraction" : "NONE",
  50607. "scope" : "UNCHANGED",
  50608. "confidentialityImpact" : "NONE",
  50609. "integrityImpact" : "NONE",
  50610. "availabilityImpact" : "HIGH",
  50611. "baseScore" : 7.5,
  50612. "baseSeverity" : "HIGH"
  50613. },
  50614. "exploitabilityScore" : 3.9,
  50615. "impactScore" : 3.6
  50616. },
  50617. "baseMetricV2" : {
  50618. "cvssV2" : {
  50619. "version" : "2.0",
  50620. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  50621. "accessVector" : "NETWORK",
  50622. "accessComplexity" : "LOW",
  50623. "authentication" : "NONE",
  50624. "confidentialityImpact" : "NONE",
  50625. "integrityImpact" : "NONE",
  50626. "availabilityImpact" : "PARTIAL",
  50627. "baseScore" : 5.0
  50628. },
  50629. "severity" : "MEDIUM",
  50630. "exploitabilityScore" : 10.0,
  50631. "impactScore" : 2.9,
  50632. "acInsufInfo" : false,
  50633. "obtainAllPrivilege" : false,
  50634. "obtainUserPrivilege" : false,
  50635. "obtainOtherPrivilege" : false,
  50636. "userInteractionRequired" : false
  50637. }
  50638. },
  50639. "publishedDate" : "2021-04-23T16:15Z",
  50640. "lastModifiedDate" : "2021-05-05T18:02Z"
  50641. }, {
  50642. "cve" : {
  50643. "data_type" : "CVE",
  50644. "data_format" : "MITRE",
  50645. "data_version" : "4.0",
  50646. "CVE_data_meta" : {
  50647. "ID" : "CVE-2020-36319",
  50648. "ASSIGNER" : "security@vaadin.com"
  50649. },
  50650. "problemtype" : {
  50651. "problemtype_data" : [ {
  50652. "description" : [ {
  50653. "lang" : "en",
  50654. "value" : "CWE-200"
  50655. } ]
  50656. } ]
  50657. },
  50658. "references" : {
  50659. "reference_data" : [ {
  50660. "url" : "https://github.com/vaadin/flow/pull/8051",
  50661. "name" : "N/A",
  50662. "refsource" : "CONFIRM",
  50663. "tags" : [ "Patch", "Third Party Advisory" ]
  50664. }, {
  50665. "url" : "https://github.com/vaadin/flow/pull/8016",
  50666. "name" : "N/A",
  50667. "refsource" : "CONFIRM",
  50668. "tags" : [ "Patch", "Third Party Advisory" ]
  50669. }, {
  50670. "url" : "https://vaadin.com/security/cve-2020-36319",
  50671. "name" : "N/A",
  50672. "refsource" : "CONFIRM",
  50673. "tags" : [ "Vendor Advisory" ]
  50674. } ]
  50675. },
  50676. "description" : {
  50677. "description_data" : [ {
  50678. "lang" : "en",
  50679. "value" : "Insecure configuration of default ObjectMapper in com.vaadin:flow-server versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. @RestController"
  50680. } ]
  50681. }
  50682. },
  50683. "configurations" : {
  50684. "CVE_data_version" : "4.0",
  50685. "nodes" : [ {
  50686. "operator" : "OR",
  50687. "children" : [ ],
  50688. "cpe_match" : [ {
  50689. "vulnerable" : true,
  50690. "cpe23Uri" : "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
  50691. "versionStartIncluding" : "3.0.0",
  50692. "versionEndExcluding" : "3.0.6",
  50693. "cpe_name" : [ ]
  50694. }, {
  50695. "vulnerable" : true,
  50696. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  50697. "versionStartIncluding" : "15.0.0",
  50698. "versionEndExcluding" : "15.0.5",
  50699. "cpe_name" : [ ]
  50700. } ]
  50701. } ]
  50702. },
  50703. "impact" : {
  50704. "baseMetricV3" : {
  50705. "cvssV3" : {
  50706. "version" : "3.1",
  50707. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  50708. "attackVector" : "NETWORK",
  50709. "attackComplexity" : "LOW",
  50710. "privilegesRequired" : "LOW",
  50711. "userInteraction" : "NONE",
  50712. "scope" : "UNCHANGED",
  50713. "confidentialityImpact" : "HIGH",
  50714. "integrityImpact" : "NONE",
  50715. "availabilityImpact" : "NONE",
  50716. "baseScore" : 6.5,
  50717. "baseSeverity" : "MEDIUM"
  50718. },
  50719. "exploitabilityScore" : 2.8,
  50720. "impactScore" : 3.6
  50721. },
  50722. "baseMetricV2" : {
  50723. "cvssV2" : {
  50724. "version" : "2.0",
  50725. "vectorString" : "AV:N/AC:M/Au:S/C:P/I:N/A:N",
  50726. "accessVector" : "NETWORK",
  50727. "accessComplexity" : "MEDIUM",
  50728. "authentication" : "SINGLE",
  50729. "confidentialityImpact" : "PARTIAL",
  50730. "integrityImpact" : "NONE",
  50731. "availabilityImpact" : "NONE",
  50732. "baseScore" : 3.5
  50733. },
  50734. "severity" : "LOW",
  50735. "exploitabilityScore" : 6.8,
  50736. "impactScore" : 2.9,
  50737. "acInsufInfo" : false,
  50738. "obtainAllPrivilege" : false,
  50739. "obtainUserPrivilege" : false,
  50740. "obtainOtherPrivilege" : false,
  50741. "userInteractionRequired" : false
  50742. }
  50743. },
  50744. "publishedDate" : "2021-04-23T16:15Z",
  50745. "lastModifiedDate" : "2021-05-05T17:55Z"
  50746. }, {
  50747. "cve" : {
  50748. "data_type" : "CVE",
  50749. "data_format" : "MITRE",
  50750. "data_version" : "4.0",
  50751. "CVE_data_meta" : {
  50752. "ID" : "CVE-2019-25028",
  50753. "ASSIGNER" : "security@vaadin.com"
  50754. },
  50755. "problemtype" : {
  50756. "problemtype_data" : [ {
  50757. "description" : [ {
  50758. "lang" : "en",
  50759. "value" : "CWE-79"
  50760. } ]
  50761. } ]
  50762. },
  50763. "references" : {
  50764. "reference_data" : [ {
  50765. "url" : "https://vaadin.com/security/cve-2019-25028",
  50766. "name" : "N/A",
  50767. "refsource" : "CONFIRM",
  50768. "tags" : [ "Vendor Advisory" ]
  50769. }, {
  50770. "url" : "https://github.com/vaadin/framework/pull/11645",
  50771. "name" : "N/A",
  50772. "refsource" : "CONFIRM",
  50773. "tags" : [ "Patch", "Third Party Advisory" ]
  50774. }, {
  50775. "url" : "https://github.com/vaadin/framework/pull/11644",
  50776. "name" : "N/A",
  50777. "refsource" : "CONFIRM",
  50778. "tags" : [ "Patch", "Third Party Advisory" ]
  50779. } ]
  50780. },
  50781. "description" : {
  50782. "description_data" : [ {
  50783. "lang" : "en",
  50784. "value" : "Missing variable sanitization in Grid component in com.vaadin:vaadin-server versions 7.4.0 through 7.7.19 (Vaadin 7.4.0 through 7.7.19), and 8.0.0 through 8.8.4 (Vaadin 8.0.0 through 8.8.4) allows attacker to inject malicious JavaScript via unspecified vector"
  50785. } ]
  50786. }
  50787. },
  50788. "configurations" : {
  50789. "CVE_data_version" : "4.0",
  50790. "nodes" : [ {
  50791. "operator" : "OR",
  50792. "children" : [ ],
  50793. "cpe_match" : [ {
  50794. "vulnerable" : true,
  50795. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  50796. "versionStartIncluding" : "7.4.0",
  50797. "versionEndExcluding" : "7.7.20",
  50798. "cpe_name" : [ ]
  50799. }, {
  50800. "vulnerable" : true,
  50801. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  50802. "versionStartIncluding" : "8.0.0",
  50803. "versionEndExcluding" : "8.8.5",
  50804. "cpe_name" : [ ]
  50805. } ]
  50806. } ]
  50807. },
  50808. "impact" : {
  50809. "baseMetricV3" : {
  50810. "cvssV3" : {
  50811. "version" : "3.1",
  50812. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  50813. "attackVector" : "NETWORK",
  50814. "attackComplexity" : "LOW",
  50815. "privilegesRequired" : "NONE",
  50816. "userInteraction" : "REQUIRED",
  50817. "scope" : "CHANGED",
  50818. "confidentialityImpact" : "LOW",
  50819. "integrityImpact" : "LOW",
  50820. "availabilityImpact" : "NONE",
  50821. "baseScore" : 6.1,
  50822. "baseSeverity" : "MEDIUM"
  50823. },
  50824. "exploitabilityScore" : 2.8,
  50825. "impactScore" : 2.7
  50826. },
  50827. "baseMetricV2" : {
  50828. "cvssV2" : {
  50829. "version" : "2.0",
  50830. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  50831. "accessVector" : "NETWORK",
  50832. "accessComplexity" : "MEDIUM",
  50833. "authentication" : "NONE",
  50834. "confidentialityImpact" : "NONE",
  50835. "integrityImpact" : "PARTIAL",
  50836. "availabilityImpact" : "NONE",
  50837. "baseScore" : 4.3
  50838. },
  50839. "severity" : "MEDIUM",
  50840. "exploitabilityScore" : 8.6,
  50841. "impactScore" : 2.9,
  50842. "acInsufInfo" : false,
  50843. "obtainAllPrivilege" : false,
  50844. "obtainUserPrivilege" : false,
  50845. "obtainOtherPrivilege" : false,
  50846. "userInteractionRequired" : true
  50847. }
  50848. },
  50849. "publishedDate" : "2021-04-23T16:15Z",
  50850. "lastModifiedDate" : "2021-05-05T18:09Z"
  50851. }, {
  50852. "cve" : {
  50853. "data_type" : "CVE",
  50854. "data_format" : "MITRE",
  50855. "data_version" : "4.0",
  50856. "CVE_data_meta" : {
  50857. "ID" : "CVE-2019-25027",
  50858. "ASSIGNER" : "security@vaadin.com"
  50859. },
  50860. "problemtype" : {
  50861. "problemtype_data" : [ {
  50862. "description" : [ {
  50863. "lang" : "en",
  50864. "value" : "CWE-79"
  50865. } ]
  50866. } ]
  50867. },
  50868. "references" : {
  50869. "reference_data" : [ {
  50870. "url" : "https://vaadin.com/security/cve-2019-25027",
  50871. "name" : "N/A",
  50872. "refsource" : "CONFIRM",
  50873. "tags" : [ "Vendor Advisory" ]
  50874. }, {
  50875. "url" : "https://github.com/vaadin/flow/pull/5498",
  50876. "name" : "N/A",
  50877. "refsource" : "CONFIRM",
  50878. "tags" : [ "Patch", "Third Party Advisory" ]
  50879. } ]
  50880. },
  50881. "description" : {
  50882. "description_data" : [ {
  50883. "lang" : "en",
  50884. "value" : "Missing output sanitization in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL"
  50885. } ]
  50886. }
  50887. },
  50888. "configurations" : {
  50889. "CVE_data_version" : "4.0",
  50890. "nodes" : [ {
  50891. "operator" : "OR",
  50892. "children" : [ ],
  50893. "cpe_match" : [ {
  50894. "vulnerable" : true,
  50895. "cpe23Uri" : "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
  50896. "versionStartIncluding" : "1.0.0",
  50897. "versionEndExcluding" : "1.0.11",
  50898. "cpe_name" : [ ]
  50899. }, {
  50900. "vulnerable" : true,
  50901. "cpe23Uri" : "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
  50902. "versionStartIncluding" : "1.1.0",
  50903. "versionEndExcluding" : "1.4.3",
  50904. "cpe_name" : [ ]
  50905. }, {
  50906. "vulnerable" : true,
  50907. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  50908. "versionStartIncluding" : "10.0.0",
  50909. "versionEndExcluding" : "10.0.14",
  50910. "cpe_name" : [ ]
  50911. }, {
  50912. "vulnerable" : true,
  50913. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  50914. "versionStartIncluding" : "11.0.0",
  50915. "versionEndExcluding" : "13.0.6",
  50916. "cpe_name" : [ ]
  50917. } ]
  50918. } ]
  50919. },
  50920. "impact" : {
  50921. "baseMetricV3" : {
  50922. "cvssV3" : {
  50923. "version" : "3.1",
  50924. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  50925. "attackVector" : "NETWORK",
  50926. "attackComplexity" : "LOW",
  50927. "privilegesRequired" : "NONE",
  50928. "userInteraction" : "REQUIRED",
  50929. "scope" : "CHANGED",
  50930. "confidentialityImpact" : "LOW",
  50931. "integrityImpact" : "LOW",
  50932. "availabilityImpact" : "NONE",
  50933. "baseScore" : 6.1,
  50934. "baseSeverity" : "MEDIUM"
  50935. },
  50936. "exploitabilityScore" : 2.8,
  50937. "impactScore" : 2.7
  50938. },
  50939. "baseMetricV2" : {
  50940. "cvssV2" : {
  50941. "version" : "2.0",
  50942. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  50943. "accessVector" : "NETWORK",
  50944. "accessComplexity" : "MEDIUM",
  50945. "authentication" : "NONE",
  50946. "confidentialityImpact" : "NONE",
  50947. "integrityImpact" : "PARTIAL",
  50948. "availabilityImpact" : "NONE",
  50949. "baseScore" : 4.3
  50950. },
  50951. "severity" : "MEDIUM",
  50952. "exploitabilityScore" : 8.6,
  50953. "impactScore" : 2.9,
  50954. "acInsufInfo" : false,
  50955. "obtainAllPrivilege" : false,
  50956. "obtainUserPrivilege" : false,
  50957. "obtainOtherPrivilege" : false,
  50958. "userInteractionRequired" : true
  50959. }
  50960. },
  50961. "publishedDate" : "2021-04-23T16:15Z",
  50962. "lastModifiedDate" : "2021-05-05T18:27Z"
  50963. }, {
  50964. "cve" : {
  50965. "data_type" : "CVE",
  50966. "data_format" : "MITRE",
  50967. "data_version" : "4.0",
  50968. "CVE_data_meta" : {
  50969. "ID" : "CVE-2018-25007",
  50970. "ASSIGNER" : "security@vaadin.com"
  50971. },
  50972. "problemtype" : {
  50973. "problemtype_data" : [ {
  50974. "description" : [ {
  50975. "lang" : "en",
  50976. "value" : "CWE-754"
  50977. } ]
  50978. } ]
  50979. },
  50980. "references" : {
  50981. "reference_data" : [ {
  50982. "url" : "https://vaadin.com/security/cve-2018-25007",
  50983. "name" : "N/A",
  50984. "refsource" : "CONFIRM",
  50985. "tags" : [ "Vendor Advisory" ]
  50986. }, {
  50987. "url" : "https://github.com/vaadin/flow/pull/4774",
  50988. "name" : "N/A",
  50989. "refsource" : "CONFIRM",
  50990. "tags" : [ "Patch", "Third Party Advisory" ]
  50991. } ]
  50992. },
  50993. "description" : {
  50994. "description_data" : [ {
  50995. "lang" : "en",
  50996. "value" : "Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message."
  50997. } ]
  50998. }
  50999. },
  51000. "configurations" : {
  51001. "CVE_data_version" : "4.0",
  51002. "nodes" : [ {
  51003. "operator" : "OR",
  51004. "children" : [ ],
  51005. "cpe_match" : [ {
  51006. "vulnerable" : true,
  51007. "cpe23Uri" : "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*",
  51008. "versionStartIncluding" : "1.0.0",
  51009. "versionEndExcluding" : "1.0.6",
  51010. "cpe_name" : [ ]
  51011. }, {
  51012. "vulnerable" : true,
  51013. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  51014. "versionStartIncluding" : "10.0.0",
  51015. "versionEndExcluding" : "10.0.8",
  51016. "cpe_name" : [ ]
  51017. }, {
  51018. "vulnerable" : true,
  51019. "cpe23Uri" : "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*",
  51020. "versionStartIncluding" : "11.0.0",
  51021. "versionEndExcluding" : "11.0.3",
  51022. "cpe_name" : [ ]
  51023. } ]
  51024. } ]
  51025. },
  51026. "impact" : {
  51027. "baseMetricV3" : {
  51028. "cvssV3" : {
  51029. "version" : "3.1",
  51030. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
  51031. "attackVector" : "NETWORK",
  51032. "attackComplexity" : "LOW",
  51033. "privilegesRequired" : "LOW",
  51034. "userInteraction" : "NONE",
  51035. "scope" : "UNCHANGED",
  51036. "confidentialityImpact" : "NONE",
  51037. "integrityImpact" : "LOW",
  51038. "availabilityImpact" : "NONE",
  51039. "baseScore" : 4.3,
  51040. "baseSeverity" : "MEDIUM"
  51041. },
  51042. "exploitabilityScore" : 2.8,
  51043. "impactScore" : 1.4
  51044. },
  51045. "baseMetricV2" : {
  51046. "cvssV2" : {
  51047. "version" : "2.0",
  51048. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:N",
  51049. "accessVector" : "NETWORK",
  51050. "accessComplexity" : "LOW",
  51051. "authentication" : "SINGLE",
  51052. "confidentialityImpact" : "NONE",
  51053. "integrityImpact" : "PARTIAL",
  51054. "availabilityImpact" : "NONE",
  51055. "baseScore" : 4.0
  51056. },
  51057. "severity" : "MEDIUM",
  51058. "exploitabilityScore" : 8.0,
  51059. "impactScore" : 2.9,
  51060. "acInsufInfo" : false,
  51061. "obtainAllPrivilege" : false,
  51062. "obtainUserPrivilege" : false,
  51063. "obtainOtherPrivilege" : false,
  51064. "userInteractionRequired" : false
  51065. }
  51066. },
  51067. "publishedDate" : "2021-04-23T16:15Z",
  51068. "lastModifiedDate" : "2021-05-05T18:26Z"
  51069. }, {
  51070. "cve" : {
  51071. "data_type" : "CVE",
  51072. "data_format" : "MITRE",
  51073. "data_version" : "4.0",
  51074. "CVE_data_meta" : {
  51075. "ID" : "CVE-2021-26291",
  51076. "ASSIGNER" : "security@apache.org"
  51077. },
  51078. "problemtype" : {
  51079. "problemtype_data" : [ {
  51080. "description" : [ {
  51081. "lang" : "en",
  51082. "value" : "CWE-346"
  51083. } ]
  51084. } ]
  51085. },
  51086. "references" : {
  51087. "reference_data" : [ {
  51088. "url" : "https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00%40%3Cusers.maven.apache.org%3E",
  51089. "name" : "https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00%40%3Cusers.maven.apache.org%3E",
  51090. "refsource" : "MISC",
  51091. "tags" : [ "Mailing List", "Vendor Advisory" ]
  51092. }, {
  51093. "url" : "https://lists.apache.org/thread.html/r06db4057b74e0598a412734f693a34a8836ac6f06d16d139e5e1027c@%3Cdev.maven.apache.org%3E",
  51094. "name" : "[maven-dev] 20210423 CVE-2021-26291: Apache Maven: block repositories using http by default",
  51095. "refsource" : "MLIST",
  51096. "tags" : [ "Mailing List", "Vendor Advisory" ]
  51097. }, {
  51098. "url" : "https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00@%3Cusers.maven.apache.org%3E",
  51099. "name" : "[maven-users] 20210423 CVE-2021-26291: Apache Maven: block repositories using http by default",
  51100. "refsource" : "MLIST",
  51101. "tags" : [ "Mailing List", "Vendor Advisory" ]
  51102. }, {
  51103. "url" : "http://www.openwall.com/lists/oss-security/2021/04/23/5",
  51104. "name" : "[oss-security] 20210423 CVE-2021-26291: Apache Maven: block repositories using http by default",
  51105. "refsource" : "MLIST",
  51106. "tags" : [ "Mailing List", "Third Party Advisory" ]
  51107. }, {
  51108. "url" : "https://lists.apache.org/thread.html/r0556ce5db7231025785477739ee416b169d8aff5ee9bac7854d64736@%3Cannounce.apache.org%3E",
  51109. "name" : "[announce] 20210423 CVE-2021-26291: Apache Maven: block repositories using http by default",
  51110. "refsource" : "MLIST",
  51111. "tags" : [ "Mailing List", "Vendor Advisory" ]
  51112. }, {
  51113. "url" : "https://lists.apache.org/thread.html/ra88a0eba7f84658cefcecc0143fd8bbad52c229ee5dfcbfdde7b6457@%3Cdev.jena.apache.org%3E",
  51114. "name" : "[jena-dev] 20210428 FYI: Maven CVE-2021-26291",
  51115. "refsource" : "MLIST",
  51116. "tags" : [ "Mailing List", "Vendor Advisory" ]
  51117. }, {
  51118. "url" : "https://lists.apache.org/thread.html/r3f0450dcab7e63b5f233ccfbc6fca5f1867a75c8aa2493ea82732381@%3Cdev.jena.apache.org%3E",
  51119. "name" : "[jena-dev] 20210429 Re: FYI: Maven CVE-2021-26291",
  51120. "refsource" : "MLIST",
  51121. "tags" : [ "Mailing List", "Vendor Advisory" ]
  51122. }, {
  51123. "url" : "https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594@%3Cdev.myfaces.apache.org%3E",
  51124. "name" : "[myfaces-dev] 20210506 [GitHub] [myfaces-tobago] lofwyr14 opened a new pull request #817: build: CVE fix",
  51125. "refsource" : "MLIST",
  51126. "tags" : [ ]
  51127. } ]
  51128. },
  51129. "description" : {
  51130. "description_data" : [ {
  51131. "lang" : "en",
  51132. "value" : "Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html"
  51133. } ]
  51134. }
  51135. },
  51136. "configurations" : {
  51137. "CVE_data_version" : "4.0",
  51138. "nodes" : [ {
  51139. "operator" : "OR",
  51140. "children" : [ ],
  51141. "cpe_match" : [ {
  51142. "vulnerable" : true,
  51143. "cpe23Uri" : "cpe:2.3:a:apache:maven:*:*:*:*:*:*:*:*",
  51144. "versionEndExcluding" : "3.8.1",
  51145. "cpe_name" : [ ]
  51146. } ]
  51147. } ]
  51148. },
  51149. "impact" : {
  51150. "baseMetricV3" : {
  51151. "cvssV3" : {
  51152. "version" : "3.1",
  51153. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
  51154. "attackVector" : "NETWORK",
  51155. "attackComplexity" : "LOW",
  51156. "privilegesRequired" : "NONE",
  51157. "userInteraction" : "NONE",
  51158. "scope" : "UNCHANGED",
  51159. "confidentialityImpact" : "HIGH",
  51160. "integrityImpact" : "HIGH",
  51161. "availabilityImpact" : "NONE",
  51162. "baseScore" : 9.1,
  51163. "baseSeverity" : "CRITICAL"
  51164. },
  51165. "exploitabilityScore" : 3.9,
  51166. "impactScore" : 5.2
  51167. },
  51168. "baseMetricV2" : {
  51169. "cvssV2" : {
  51170. "version" : "2.0",
  51171. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:N",
  51172. "accessVector" : "NETWORK",
  51173. "accessComplexity" : "LOW",
  51174. "authentication" : "NONE",
  51175. "confidentialityImpact" : "PARTIAL",
  51176. "integrityImpact" : "PARTIAL",
  51177. "availabilityImpact" : "NONE",
  51178. "baseScore" : 6.4
  51179. },
  51180. "severity" : "MEDIUM",
  51181. "exploitabilityScore" : 10.0,
  51182. "impactScore" : 4.9,
  51183. "acInsufInfo" : false,
  51184. "obtainAllPrivilege" : false,
  51185. "obtainUserPrivilege" : false,
  51186. "obtainOtherPrivilege" : false,
  51187. "userInteractionRequired" : false
  51188. }
  51189. },
  51190. "publishedDate" : "2021-04-23T15:15Z",
  51191. "lastModifiedDate" : "2021-05-06T14:15Z"
  51192. }, {
  51193. "cve" : {
  51194. "data_type" : "CVE",
  51195. "data_format" : "MITRE",
  51196. "data_version" : "4.0",
  51197. "CVE_data_meta" : {
  51198. "ID" : "CVE-2021-25382",
  51199. "ASSIGNER" : "mobile.security@samsung.com"
  51200. },
  51201. "problemtype" : {
  51202. "problemtype_data" : [ {
  51203. "description" : [ {
  51204. "lang" : "en",
  51205. "value" : "CWE-863"
  51206. } ]
  51207. } ]
  51208. },
  51209. "references" : {
  51210. "reference_data" : [ {
  51211. "url" : "https://security.samsungmobile.com/securityUpdate.smsb?year=2020&month=10",
  51212. "name" : "https://security.samsungmobile.com/securityUpdate.smsb?year=2020&month=10",
  51213. "refsource" : "CONFIRM",
  51214. "tags" : [ "Vendor Advisory" ]
  51215. } ]
  51216. },
  51217. "description" : {
  51218. "description_data" : [ {
  51219. "lang" : "en",
  51220. "value" : "An improper authorization of using debugging command in Secure Folder prior to SMR Oct-2020 Release 1 allows unauthorized access to contents in Secure Folder via debugging command."
  51221. } ]
  51222. }
  51223. },
  51224. "configurations" : {
  51225. "CVE_data_version" : "4.0",
  51226. "nodes" : [ {
  51227. "operator" : "OR",
  51228. "children" : [ ],
  51229. "cpe_match" : [ {
  51230. "vulnerable" : true,
  51231. "cpe23Uri" : "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
  51232. "cpe_name" : [ ]
  51233. }, {
  51234. "vulnerable" : true,
  51235. "cpe23Uri" : "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
  51236. "cpe_name" : [ ]
  51237. }, {
  51238. "vulnerable" : true,
  51239. "cpe23Uri" : "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
  51240. "cpe_name" : [ ]
  51241. }, {
  51242. "vulnerable" : true,
  51243. "cpe23Uri" : "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
  51244. "cpe_name" : [ ]
  51245. }, {
  51246. "vulnerable" : true,
  51247. "cpe23Uri" : "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
  51248. "cpe_name" : [ ]
  51249. } ]
  51250. } ]
  51251. },
  51252. "impact" : {
  51253. "baseMetricV3" : {
  51254. "cvssV3" : {
  51255. "version" : "3.1",
  51256. "vectorString" : "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
  51257. "attackVector" : "PHYSICAL",
  51258. "attackComplexity" : "LOW",
  51259. "privilegesRequired" : "HIGH",
  51260. "userInteraction" : "NONE",
  51261. "scope" : "UNCHANGED",
  51262. "confidentialityImpact" : "HIGH",
  51263. "integrityImpact" : "HIGH",
  51264. "availabilityImpact" : "NONE",
  51265. "baseScore" : 5.5,
  51266. "baseSeverity" : "MEDIUM"
  51267. },
  51268. "exploitabilityScore" : 0.3,
  51269. "impactScore" : 5.2
  51270. },
  51271. "baseMetricV2" : {
  51272. "cvssV2" : {
  51273. "version" : "2.0",
  51274. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:N",
  51275. "accessVector" : "LOCAL",
  51276. "accessComplexity" : "LOW",
  51277. "authentication" : "NONE",
  51278. "confidentialityImpact" : "PARTIAL",
  51279. "integrityImpact" : "PARTIAL",
  51280. "availabilityImpact" : "NONE",
  51281. "baseScore" : 3.6
  51282. },
  51283. "severity" : "LOW",
  51284. "exploitabilityScore" : 3.9,
  51285. "impactScore" : 4.9,
  51286. "acInsufInfo" : false,
  51287. "obtainAllPrivilege" : false,
  51288. "obtainUserPrivilege" : false,
  51289. "obtainOtherPrivilege" : false,
  51290. "userInteractionRequired" : false
  51291. }
  51292. },
  51293. "publishedDate" : "2021-04-23T15:15Z",
  51294. "lastModifiedDate" : "2021-05-03T14:51Z"
  51295. }, {
  51296. "cve" : {
  51297. "data_type" : "CVE",
  51298. "data_format" : "MITRE",
  51299. "data_version" : "4.0",
  51300. "CVE_data_meta" : {
  51301. "ID" : "CVE-2021-31607",
  51302. "ASSIGNER" : "cve@mitre.org"
  51303. },
  51304. "problemtype" : {
  51305. "problemtype_data" : [ {
  51306. "description" : [ {
  51307. "lang" : "en",
  51308. "value" : "CWE-77"
  51309. } ]
  51310. } ]
  51311. },
  51312. "references" : {
  51313. "reference_data" : [ {
  51314. "url" : "https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/",
  51315. "name" : "https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/",
  51316. "refsource" : "MISC",
  51317. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  51318. }, {
  51319. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LDKMAJXYFHM4USVX3H5V2GCCBGASWUSM/",
  51320. "name" : "FEDORA-2021-5aaebdae8e",
  51321. "refsource" : "FEDORA",
  51322. "tags" : [ "Mailing List", "Third Party Advisory" ]
  51323. } ]
  51324. },
  51325. "description" : {
  51326. "description_data" : [ {
  51327. "lang" : "en",
  51328. "value" : "In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely)."
  51329. } ]
  51330. }
  51331. },
  51332. "configurations" : {
  51333. "CVE_data_version" : "4.0",
  51334. "nodes" : [ {
  51335. "operator" : "OR",
  51336. "children" : [ ],
  51337. "cpe_match" : [ {
  51338. "vulnerable" : true,
  51339. "cpe23Uri" : "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
  51340. "versionStartIncluding" : "2016.9",
  51341. "versionEndIncluding" : "3002.6",
  51342. "cpe_name" : [ ]
  51343. } ]
  51344. } ]
  51345. },
  51346. "impact" : {
  51347. "baseMetricV3" : {
  51348. "cvssV3" : {
  51349. "version" : "3.1",
  51350. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  51351. "attackVector" : "LOCAL",
  51352. "attackComplexity" : "LOW",
  51353. "privilegesRequired" : "LOW",
  51354. "userInteraction" : "NONE",
  51355. "scope" : "UNCHANGED",
  51356. "confidentialityImpact" : "HIGH",
  51357. "integrityImpact" : "HIGH",
  51358. "availabilityImpact" : "HIGH",
  51359. "baseScore" : 7.8,
  51360. "baseSeverity" : "HIGH"
  51361. },
  51362. "exploitabilityScore" : 1.8,
  51363. "impactScore" : 5.9
  51364. },
  51365. "baseMetricV2" : {
  51366. "cvssV2" : {
  51367. "version" : "2.0",
  51368. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  51369. "accessVector" : "LOCAL",
  51370. "accessComplexity" : "LOW",
  51371. "authentication" : "NONE",
  51372. "confidentialityImpact" : "PARTIAL",
  51373. "integrityImpact" : "PARTIAL",
  51374. "availabilityImpact" : "PARTIAL",
  51375. "baseScore" : 4.6
  51376. },
  51377. "severity" : "MEDIUM",
  51378. "exploitabilityScore" : 3.9,
  51379. "impactScore" : 6.4,
  51380. "acInsufInfo" : false,
  51381. "obtainAllPrivilege" : false,
  51382. "obtainUserPrivilege" : false,
  51383. "obtainOtherPrivilege" : false,
  51384. "userInteractionRequired" : false
  51385. }
  51386. },
  51387. "publishedDate" : "2021-04-23T06:15Z",
  51388. "lastModifiedDate" : "2021-05-04T20:24Z"
  51389. }, {
  51390. "cve" : {
  51391. "data_type" : "CVE",
  51392. "data_format" : "MITRE",
  51393. "data_version" : "4.0",
  51394. "CVE_data_meta" : {
  51395. "ID" : "CVE-2021-2250",
  51396. "ASSIGNER" : "secalert_us@oracle.com"
  51397. },
  51398. "problemtype" : {
  51399. "problemtype_data" : [ {
  51400. "description" : [ {
  51401. "lang" : "en",
  51402. "value" : "NVD-CWE-noinfo"
  51403. } ]
  51404. } ]
  51405. },
  51406. "references" : {
  51407. "reference_data" : [ {
  51408. "url" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51409. "name" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51410. "refsource" : "MISC",
  51411. "tags" : [ "Patch", "Vendor Advisory" ]
  51412. }, {
  51413. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-484/",
  51414. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-484/",
  51415. "refsource" : "MISC",
  51416. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  51417. } ]
  51418. },
  51419. "description" : {
  51420. "description_data" : [ {
  51421. "lang" : "en",
  51422. "value" : "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)."
  51423. } ]
  51424. }
  51425. },
  51426. "configurations" : {
  51427. "CVE_data_version" : "4.0",
  51428. "nodes" : [ {
  51429. "operator" : "OR",
  51430. "children" : [ ],
  51431. "cpe_match" : [ {
  51432. "vulnerable" : true,
  51433. "cpe23Uri" : "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
  51434. "versionEndExcluding" : "6.1.20",
  51435. "cpe_name" : [ ]
  51436. } ]
  51437. } ]
  51438. },
  51439. "impact" : {
  51440. "baseMetricV3" : {
  51441. "cvssV3" : {
  51442. "version" : "3.1",
  51443. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
  51444. "attackVector" : "LOCAL",
  51445. "attackComplexity" : "LOW",
  51446. "privilegesRequired" : "HIGH",
  51447. "userInteraction" : "NONE",
  51448. "scope" : "CHANGED",
  51449. "confidentialityImpact" : "HIGH",
  51450. "integrityImpact" : "HIGH",
  51451. "availabilityImpact" : "HIGH",
  51452. "baseScore" : 8.2,
  51453. "baseSeverity" : "HIGH"
  51454. },
  51455. "exploitabilityScore" : 1.5,
  51456. "impactScore" : 6.0
  51457. },
  51458. "baseMetricV2" : {
  51459. "cvssV2" : {
  51460. "version" : "2.0",
  51461. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  51462. "accessVector" : "LOCAL",
  51463. "accessComplexity" : "LOW",
  51464. "authentication" : "NONE",
  51465. "confidentialityImpact" : "PARTIAL",
  51466. "integrityImpact" : "PARTIAL",
  51467. "availabilityImpact" : "PARTIAL",
  51468. "baseScore" : 4.6
  51469. },
  51470. "severity" : "MEDIUM",
  51471. "exploitabilityScore" : 3.9,
  51472. "impactScore" : 6.4,
  51473. "acInsufInfo" : false,
  51474. "obtainAllPrivilege" : false,
  51475. "obtainUserPrivilege" : false,
  51476. "obtainOtherPrivilege" : false,
  51477. "userInteractionRequired" : false
  51478. }
  51479. },
  51480. "publishedDate" : "2021-04-22T22:15Z",
  51481. "lastModifiedDate" : "2021-05-04T14:03Z"
  51482. }, {
  51483. "cve" : {
  51484. "data_type" : "CVE",
  51485. "data_format" : "MITRE",
  51486. "data_version" : "4.0",
  51487. "CVE_data_meta" : {
  51488. "ID" : "CVE-2021-2202",
  51489. "ASSIGNER" : "secalert_us@oracle.com"
  51490. },
  51491. "problemtype" : {
  51492. "problemtype_data" : [ {
  51493. "description" : [ {
  51494. "lang" : "en",
  51495. "value" : "NVD-CWE-noinfo"
  51496. } ]
  51497. } ]
  51498. },
  51499. "references" : {
  51500. "reference_data" : [ {
  51501. "url" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51502. "name" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51503. "refsource" : "MISC",
  51504. "tags" : [ "Vendor Advisory" ]
  51505. } ]
  51506. },
  51507. "description" : {
  51508. "description_data" : [ {
  51509. "lang" : "en",
  51510. "value" : "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
  51511. } ]
  51512. }
  51513. },
  51514. "configurations" : {
  51515. "CVE_data_version" : "4.0",
  51516. "nodes" : [ {
  51517. "operator" : "OR",
  51518. "children" : [ ],
  51519. "cpe_match" : [ {
  51520. "vulnerable" : true,
  51521. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  51522. "versionStartIncluding" : "5.7.0",
  51523. "versionEndIncluding" : "5.7.32",
  51524. "cpe_name" : [ ]
  51525. }, {
  51526. "vulnerable" : true,
  51527. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  51528. "versionStartIncluding" : "8.0.0",
  51529. "versionEndIncluding" : "8.0.22",
  51530. "cpe_name" : [ ]
  51531. } ]
  51532. } ]
  51533. },
  51534. "impact" : {
  51535. "baseMetricV3" : {
  51536. "cvssV3" : {
  51537. "version" : "3.1",
  51538. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  51539. "attackVector" : "NETWORK",
  51540. "attackComplexity" : "LOW",
  51541. "privilegesRequired" : "LOW",
  51542. "userInteraction" : "NONE",
  51543. "scope" : "UNCHANGED",
  51544. "confidentialityImpact" : "NONE",
  51545. "integrityImpact" : "NONE",
  51546. "availabilityImpact" : "HIGH",
  51547. "baseScore" : 6.5,
  51548. "baseSeverity" : "MEDIUM"
  51549. },
  51550. "exploitabilityScore" : 2.8,
  51551. "impactScore" : 3.6
  51552. },
  51553. "baseMetricV2" : {
  51554. "cvssV2" : {
  51555. "version" : "2.0",
  51556. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P",
  51557. "accessVector" : "NETWORK",
  51558. "accessComplexity" : "LOW",
  51559. "authentication" : "SINGLE",
  51560. "confidentialityImpact" : "NONE",
  51561. "integrityImpact" : "NONE",
  51562. "availabilityImpact" : "PARTIAL",
  51563. "baseScore" : 4.0
  51564. },
  51565. "severity" : "MEDIUM",
  51566. "exploitabilityScore" : 8.0,
  51567. "impactScore" : 2.9,
  51568. "acInsufInfo" : false,
  51569. "obtainAllPrivilege" : false,
  51570. "obtainUserPrivilege" : false,
  51571. "obtainOtherPrivilege" : false,
  51572. "userInteractionRequired" : false
  51573. }
  51574. },
  51575. "publishedDate" : "2021-04-22T22:15Z",
  51576. "lastModifiedDate" : "2021-05-04T14:04Z"
  51577. }, {
  51578. "cve" : {
  51579. "data_type" : "CVE",
  51580. "data_format" : "MITRE",
  51581. "data_version" : "4.0",
  51582. "CVE_data_meta" : {
  51583. "ID" : "CVE-2021-2194",
  51584. "ASSIGNER" : "secalert_us@oracle.com"
  51585. },
  51586. "problemtype" : {
  51587. "problemtype_data" : [ {
  51588. "description" : [ {
  51589. "lang" : "en",
  51590. "value" : "NVD-CWE-noinfo"
  51591. } ]
  51592. } ]
  51593. },
  51594. "references" : {
  51595. "reference_data" : [ {
  51596. "url" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51597. "name" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51598. "refsource" : "MISC",
  51599. "tags" : [ "Vendor Advisory" ]
  51600. } ]
  51601. },
  51602. "description" : {
  51603. "description_data" : [ {
  51604. "lang" : "en",
  51605. "value" : "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
  51606. } ]
  51607. }
  51608. },
  51609. "configurations" : {
  51610. "CVE_data_version" : "4.0",
  51611. "nodes" : [ {
  51612. "operator" : "OR",
  51613. "children" : [ ],
  51614. "cpe_match" : [ {
  51615. "vulnerable" : true,
  51616. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  51617. "versionStartIncluding" : "5.7.0",
  51618. "versionEndIncluding" : "5.7.33",
  51619. "cpe_name" : [ ]
  51620. }, {
  51621. "vulnerable" : true,
  51622. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  51623. "versionStartIncluding" : "8.0.0",
  51624. "versionEndIncluding" : "8.0.23",
  51625. "cpe_name" : [ ]
  51626. } ]
  51627. } ]
  51628. },
  51629. "impact" : {
  51630. "baseMetricV3" : {
  51631. "cvssV3" : {
  51632. "version" : "3.1",
  51633. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
  51634. "attackVector" : "NETWORK",
  51635. "attackComplexity" : "LOW",
  51636. "privilegesRequired" : "HIGH",
  51637. "userInteraction" : "NONE",
  51638. "scope" : "UNCHANGED",
  51639. "confidentialityImpact" : "NONE",
  51640. "integrityImpact" : "NONE",
  51641. "availabilityImpact" : "HIGH",
  51642. "baseScore" : 4.9,
  51643. "baseSeverity" : "MEDIUM"
  51644. },
  51645. "exploitabilityScore" : 1.2,
  51646. "impactScore" : 3.6
  51647. },
  51648. "baseMetricV2" : {
  51649. "cvssV2" : {
  51650. "version" : "2.0",
  51651. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P",
  51652. "accessVector" : "NETWORK",
  51653. "accessComplexity" : "LOW",
  51654. "authentication" : "SINGLE",
  51655. "confidentialityImpact" : "NONE",
  51656. "integrityImpact" : "NONE",
  51657. "availabilityImpact" : "PARTIAL",
  51658. "baseScore" : 4.0
  51659. },
  51660. "severity" : "MEDIUM",
  51661. "exploitabilityScore" : 8.0,
  51662. "impactScore" : 2.9,
  51663. "acInsufInfo" : false,
  51664. "obtainAllPrivilege" : false,
  51665. "obtainUserPrivilege" : false,
  51666. "obtainOtherPrivilege" : false,
  51667. "userInteractionRequired" : false
  51668. }
  51669. },
  51670. "publishedDate" : "2021-04-22T22:15Z",
  51671. "lastModifiedDate" : "2021-05-04T14:03Z"
  51672. }, {
  51673. "cve" : {
  51674. "data_type" : "CVE",
  51675. "data_format" : "MITRE",
  51676. "data_version" : "4.0",
  51677. "CVE_data_meta" : {
  51678. "ID" : "CVE-2021-2180",
  51679. "ASSIGNER" : "secalert_us@oracle.com"
  51680. },
  51681. "problemtype" : {
  51682. "problemtype_data" : [ {
  51683. "description" : [ {
  51684. "lang" : "en",
  51685. "value" : "NVD-CWE-noinfo"
  51686. } ]
  51687. } ]
  51688. },
  51689. "references" : {
  51690. "reference_data" : [ {
  51691. "url" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51692. "name" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51693. "refsource" : "MISC",
  51694. "tags" : [ "Vendor Advisory" ]
  51695. } ]
  51696. },
  51697. "description" : {
  51698. "description_data" : [ {
  51699. "lang" : "en",
  51700. "value" : "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
  51701. } ]
  51702. }
  51703. },
  51704. "configurations" : {
  51705. "CVE_data_version" : "4.0",
  51706. "nodes" : [ {
  51707. "operator" : "OR",
  51708. "children" : [ ],
  51709. "cpe_match" : [ {
  51710. "vulnerable" : true,
  51711. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  51712. "versionStartIncluding" : "5.7.0",
  51713. "versionEndIncluding" : "5.7.33",
  51714. "cpe_name" : [ ]
  51715. }, {
  51716. "vulnerable" : true,
  51717. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  51718. "versionStartIncluding" : "8.0.0",
  51719. "versionEndIncluding" : "8.0.23",
  51720. "cpe_name" : [ ]
  51721. } ]
  51722. } ]
  51723. },
  51724. "impact" : {
  51725. "baseMetricV3" : {
  51726. "cvssV3" : {
  51727. "version" : "3.1",
  51728. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
  51729. "attackVector" : "NETWORK",
  51730. "attackComplexity" : "LOW",
  51731. "privilegesRequired" : "HIGH",
  51732. "userInteraction" : "NONE",
  51733. "scope" : "UNCHANGED",
  51734. "confidentialityImpact" : "NONE",
  51735. "integrityImpact" : "NONE",
  51736. "availabilityImpact" : "HIGH",
  51737. "baseScore" : 4.9,
  51738. "baseSeverity" : "MEDIUM"
  51739. },
  51740. "exploitabilityScore" : 1.2,
  51741. "impactScore" : 3.6
  51742. },
  51743. "baseMetricV2" : {
  51744. "cvssV2" : {
  51745. "version" : "2.0",
  51746. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P",
  51747. "accessVector" : "NETWORK",
  51748. "accessComplexity" : "LOW",
  51749. "authentication" : "SINGLE",
  51750. "confidentialityImpact" : "NONE",
  51751. "integrityImpact" : "NONE",
  51752. "availabilityImpact" : "PARTIAL",
  51753. "baseScore" : 4.0
  51754. },
  51755. "severity" : "MEDIUM",
  51756. "exploitabilityScore" : 8.0,
  51757. "impactScore" : 2.9,
  51758. "acInsufInfo" : false,
  51759. "obtainAllPrivilege" : false,
  51760. "obtainUserPrivilege" : false,
  51761. "obtainOtherPrivilege" : false,
  51762. "userInteractionRequired" : false
  51763. }
  51764. },
  51765. "publishedDate" : "2021-04-22T22:15Z",
  51766. "lastModifiedDate" : "2021-05-04T14:03Z"
  51767. }, {
  51768. "cve" : {
  51769. "data_type" : "CVE",
  51770. "data_format" : "MITRE",
  51771. "data_version" : "4.0",
  51772. "CVE_data_meta" : {
  51773. "ID" : "CVE-2021-2179",
  51774. "ASSIGNER" : "secalert_us@oracle.com"
  51775. },
  51776. "problemtype" : {
  51777. "problemtype_data" : [ {
  51778. "description" : [ {
  51779. "lang" : "en",
  51780. "value" : "NVD-CWE-noinfo"
  51781. } ]
  51782. } ]
  51783. },
  51784. "references" : {
  51785. "reference_data" : [ {
  51786. "url" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51787. "name" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51788. "refsource" : "MISC",
  51789. "tags" : [ "Vendor Advisory" ]
  51790. } ]
  51791. },
  51792. "description" : {
  51793. "description_data" : [ {
  51794. "lang" : "en",
  51795. "value" : "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
  51796. } ]
  51797. }
  51798. },
  51799. "configurations" : {
  51800. "CVE_data_version" : "4.0",
  51801. "nodes" : [ {
  51802. "operator" : "OR",
  51803. "children" : [ ],
  51804. "cpe_match" : [ {
  51805. "vulnerable" : true,
  51806. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  51807. "versionStartIncluding" : "5.7.0",
  51808. "versionEndIncluding" : "5.7.33",
  51809. "cpe_name" : [ ]
  51810. }, {
  51811. "vulnerable" : true,
  51812. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  51813. "versionStartIncluding" : "8.0.0",
  51814. "versionEndIncluding" : "8.0.23",
  51815. "cpe_name" : [ ]
  51816. } ]
  51817. } ]
  51818. },
  51819. "impact" : {
  51820. "baseMetricV3" : {
  51821. "cvssV3" : {
  51822. "version" : "3.1",
  51823. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
  51824. "attackVector" : "NETWORK",
  51825. "attackComplexity" : "LOW",
  51826. "privilegesRequired" : "HIGH",
  51827. "userInteraction" : "NONE",
  51828. "scope" : "UNCHANGED",
  51829. "confidentialityImpact" : "NONE",
  51830. "integrityImpact" : "NONE",
  51831. "availabilityImpact" : "HIGH",
  51832. "baseScore" : 4.9,
  51833. "baseSeverity" : "MEDIUM"
  51834. },
  51835. "exploitabilityScore" : 1.2,
  51836. "impactScore" : 3.6
  51837. },
  51838. "baseMetricV2" : {
  51839. "cvssV2" : {
  51840. "version" : "2.0",
  51841. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P",
  51842. "accessVector" : "NETWORK",
  51843. "accessComplexity" : "LOW",
  51844. "authentication" : "SINGLE",
  51845. "confidentialityImpact" : "NONE",
  51846. "integrityImpact" : "NONE",
  51847. "availabilityImpact" : "PARTIAL",
  51848. "baseScore" : 4.0
  51849. },
  51850. "severity" : "MEDIUM",
  51851. "exploitabilityScore" : 8.0,
  51852. "impactScore" : 2.9,
  51853. "acInsufInfo" : false,
  51854. "obtainAllPrivilege" : false,
  51855. "obtainUserPrivilege" : false,
  51856. "obtainOtherPrivilege" : false,
  51857. "userInteractionRequired" : false
  51858. }
  51859. },
  51860. "publishedDate" : "2021-04-22T22:15Z",
  51861. "lastModifiedDate" : "2021-05-04T14:04Z"
  51862. }, {
  51863. "cve" : {
  51864. "data_type" : "CVE",
  51865. "data_format" : "MITRE",
  51866. "data_version" : "4.0",
  51867. "CVE_data_meta" : {
  51868. "ID" : "CVE-2021-2178",
  51869. "ASSIGNER" : "secalert_us@oracle.com"
  51870. },
  51871. "problemtype" : {
  51872. "problemtype_data" : [ {
  51873. "description" : [ {
  51874. "lang" : "en",
  51875. "value" : "NVD-CWE-noinfo"
  51876. } ]
  51877. } ]
  51878. },
  51879. "references" : {
  51880. "reference_data" : [ {
  51881. "url" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51882. "name" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51883. "refsource" : "MISC",
  51884. "tags" : [ "Vendor Advisory" ]
  51885. } ]
  51886. },
  51887. "description" : {
  51888. "description_data" : [ {
  51889. "lang" : "en",
  51890. "value" : "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
  51891. } ]
  51892. }
  51893. },
  51894. "configurations" : {
  51895. "CVE_data_version" : "4.0",
  51896. "nodes" : [ {
  51897. "operator" : "OR",
  51898. "children" : [ ],
  51899. "cpe_match" : [ {
  51900. "vulnerable" : true,
  51901. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  51902. "versionStartIncluding" : "5.7.0",
  51903. "versionEndIncluding" : "5.7.32",
  51904. "cpe_name" : [ ]
  51905. }, {
  51906. "vulnerable" : true,
  51907. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  51908. "versionStartIncluding" : "8.0.0",
  51909. "versionEndIncluding" : "8.0.22",
  51910. "cpe_name" : [ ]
  51911. } ]
  51912. } ]
  51913. },
  51914. "impact" : {
  51915. "baseMetricV3" : {
  51916. "cvssV3" : {
  51917. "version" : "3.1",
  51918. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  51919. "attackVector" : "NETWORK",
  51920. "attackComplexity" : "LOW",
  51921. "privilegesRequired" : "LOW",
  51922. "userInteraction" : "NONE",
  51923. "scope" : "UNCHANGED",
  51924. "confidentialityImpact" : "NONE",
  51925. "integrityImpact" : "NONE",
  51926. "availabilityImpact" : "HIGH",
  51927. "baseScore" : 6.5,
  51928. "baseSeverity" : "MEDIUM"
  51929. },
  51930. "exploitabilityScore" : 2.8,
  51931. "impactScore" : 3.6
  51932. },
  51933. "baseMetricV2" : {
  51934. "cvssV2" : {
  51935. "version" : "2.0",
  51936. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P",
  51937. "accessVector" : "NETWORK",
  51938. "accessComplexity" : "LOW",
  51939. "authentication" : "SINGLE",
  51940. "confidentialityImpact" : "NONE",
  51941. "integrityImpact" : "NONE",
  51942. "availabilityImpact" : "PARTIAL",
  51943. "baseScore" : 4.0
  51944. },
  51945. "severity" : "MEDIUM",
  51946. "exploitabilityScore" : 8.0,
  51947. "impactScore" : 2.9,
  51948. "acInsufInfo" : false,
  51949. "obtainAllPrivilege" : false,
  51950. "obtainUserPrivilege" : false,
  51951. "obtainOtherPrivilege" : false,
  51952. "userInteractionRequired" : false
  51953. }
  51954. },
  51955. "publishedDate" : "2021-04-22T22:15Z",
  51956. "lastModifiedDate" : "2021-05-04T14:04Z"
  51957. }, {
  51958. "cve" : {
  51959. "data_type" : "CVE",
  51960. "data_format" : "MITRE",
  51961. "data_version" : "4.0",
  51962. "CVE_data_meta" : {
  51963. "ID" : "CVE-2021-2174",
  51964. "ASSIGNER" : "secalert_us@oracle.com"
  51965. },
  51966. "problemtype" : {
  51967. "problemtype_data" : [ {
  51968. "description" : [ {
  51969. "lang" : "en",
  51970. "value" : "NVD-CWE-noinfo"
  51971. } ]
  51972. } ]
  51973. },
  51974. "references" : {
  51975. "reference_data" : [ {
  51976. "url" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51977. "name" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  51978. "refsource" : "MISC",
  51979. "tags" : [ "Vendor Advisory" ]
  51980. } ]
  51981. },
  51982. "description" : {
  51983. "description_data" : [ {
  51984. "lang" : "en",
  51985. "value" : "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)."
  51986. } ]
  51987. }
  51988. },
  51989. "configurations" : {
  51990. "CVE_data_version" : "4.0",
  51991. "nodes" : [ {
  51992. "operator" : "OR",
  51993. "children" : [ ],
  51994. "cpe_match" : [ {
  51995. "vulnerable" : true,
  51996. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  51997. "versionStartIncluding" : "5.7.0",
  51998. "versionEndIncluding" : "5.7.33",
  51999. "cpe_name" : [ ]
  52000. }, {
  52001. "vulnerable" : true,
  52002. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  52003. "versionStartIncluding" : "8.0.0",
  52004. "versionEndIncluding" : "8.0.23",
  52005. "cpe_name" : [ ]
  52006. } ]
  52007. } ]
  52008. },
  52009. "impact" : {
  52010. "baseMetricV3" : {
  52011. "cvssV3" : {
  52012. "version" : "3.1",
  52013. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
  52014. "attackVector" : "NETWORK",
  52015. "attackComplexity" : "HIGH",
  52016. "privilegesRequired" : "HIGH",
  52017. "userInteraction" : "NONE",
  52018. "scope" : "UNCHANGED",
  52019. "confidentialityImpact" : "NONE",
  52020. "integrityImpact" : "NONE",
  52021. "availabilityImpact" : "HIGH",
  52022. "baseScore" : 4.4,
  52023. "baseSeverity" : "MEDIUM"
  52024. },
  52025. "exploitabilityScore" : 0.7,
  52026. "impactScore" : 3.6
  52027. },
  52028. "baseMetricV2" : {
  52029. "cvssV2" : {
  52030. "version" : "2.0",
  52031. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:N/A:P",
  52032. "accessVector" : "NETWORK",
  52033. "accessComplexity" : "MEDIUM",
  52034. "authentication" : "SINGLE",
  52035. "confidentialityImpact" : "NONE",
  52036. "integrityImpact" : "NONE",
  52037. "availabilityImpact" : "PARTIAL",
  52038. "baseScore" : 3.5
  52039. },
  52040. "severity" : "LOW",
  52041. "exploitabilityScore" : 6.8,
  52042. "impactScore" : 2.9,
  52043. "acInsufInfo" : false,
  52044. "obtainAllPrivilege" : false,
  52045. "obtainUserPrivilege" : false,
  52046. "obtainOtherPrivilege" : false,
  52047. "userInteractionRequired" : false
  52048. }
  52049. },
  52050. "publishedDate" : "2021-04-22T22:15Z",
  52051. "lastModifiedDate" : "2021-05-04T14:02Z"
  52052. }, {
  52053. "cve" : {
  52054. "data_type" : "CVE",
  52055. "data_format" : "MITRE",
  52056. "data_version" : "4.0",
  52057. "CVE_data_meta" : {
  52058. "ID" : "CVE-2021-2163",
  52059. "ASSIGNER" : "secalert_us@oracle.com"
  52060. },
  52061. "problemtype" : {
  52062. "problemtype_data" : [ {
  52063. "description" : [ {
  52064. "lang" : "en",
  52065. "value" : "NVD-CWE-noinfo"
  52066. } ]
  52067. } ]
  52068. },
  52069. "references" : {
  52070. "reference_data" : [ {
  52071. "url" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  52072. "name" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  52073. "refsource" : "MISC",
  52074. "tags" : [ "Patch", "Vendor Advisory" ]
  52075. }, {
  52076. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html",
  52077. "name" : "[debian-lts-announce] 20210423 [SECURITY] [DLA 2634-1] openjdk-8 security update",
  52078. "refsource" : "MLIST",
  52079. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52080. }, {
  52081. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/",
  52082. "name" : "FEDORA-2021-6eb9bbbf0c",
  52083. "refsource" : "FEDORA",
  52084. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52085. }, {
  52086. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/",
  52087. "name" : "FEDORA-2021-65aa196c14",
  52088. "refsource" : "FEDORA",
  52089. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52090. }, {
  52091. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/",
  52092. "name" : "FEDORA-2021-25b47f16af",
  52093. "refsource" : "FEDORA",
  52094. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52095. }, {
  52096. "url" : "https://www.debian.org/security/2021/dsa-4899",
  52097. "name" : "DSA-4899",
  52098. "refsource" : "DEBIAN",
  52099. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52100. }, {
  52101. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/",
  52102. "name" : "FEDORA-2021-8b80ef64f1",
  52103. "refsource" : "FEDORA",
  52104. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52105. }, {
  52106. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/",
  52107. "name" : "FEDORA-2021-f71b592e07",
  52108. "refsource" : "FEDORA",
  52109. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52110. }, {
  52111. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/",
  52112. "name" : "FEDORA-2021-b88e86b753",
  52113. "refsource" : "FEDORA",
  52114. "tags" : [ "Third Party Advisory" ]
  52115. } ]
  52116. },
  52117. "description" : {
  52118. "description_data" : [ {
  52119. "lang" : "en",
  52120. "value" : "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N)."
  52121. } ]
  52122. }
  52123. },
  52124. "configurations" : {
  52125. "CVE_data_version" : "4.0",
  52126. "nodes" : [ {
  52127. "operator" : "OR",
  52128. "children" : [ ],
  52129. "cpe_match" : [ {
  52130. "vulnerable" : true,
  52131. "cpe23Uri" : "cpe:2.3:a:oracle:jdk:1.7.0:update_291:*:*:*:*:*:*",
  52132. "cpe_name" : [ ]
  52133. }, {
  52134. "vulnerable" : true,
  52135. "cpe23Uri" : "cpe:2.3:a:oracle:jdk:1.8.0:update_281:*:*:*:*:*:*",
  52136. "cpe_name" : [ ]
  52137. }, {
  52138. "vulnerable" : true,
  52139. "cpe23Uri" : "cpe:2.3:a:oracle:jdk:11.0.10:*:*:*:*:*:*:*",
  52140. "cpe_name" : [ ]
  52141. }, {
  52142. "vulnerable" : true,
  52143. "cpe23Uri" : "cpe:2.3:a:oracle:jdk:16.0.0:*:*:*:*:*:*:*",
  52144. "cpe_name" : [ ]
  52145. }, {
  52146. "vulnerable" : true,
  52147. "cpe23Uri" : "cpe:2.3:a:oracle:jre:1.8.0:update_281:*:*:*:*:*:*",
  52148. "cpe_name" : [ ]
  52149. } ]
  52150. }, {
  52151. "operator" : "OR",
  52152. "children" : [ ],
  52153. "cpe_match" : [ {
  52154. "vulnerable" : true,
  52155. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  52156. "cpe_name" : [ ]
  52157. }, {
  52158. "vulnerable" : true,
  52159. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  52160. "cpe_name" : [ ]
  52161. } ]
  52162. }, {
  52163. "operator" : "OR",
  52164. "children" : [ ],
  52165. "cpe_match" : [ {
  52166. "vulnerable" : true,
  52167. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  52168. "cpe_name" : [ ]
  52169. }, {
  52170. "vulnerable" : true,
  52171. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  52172. "cpe_name" : [ ]
  52173. }, {
  52174. "vulnerable" : true,
  52175. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  52176. "cpe_name" : [ ]
  52177. } ]
  52178. }, {
  52179. "operator" : "OR",
  52180. "children" : [ ],
  52181. "cpe_match" : [ {
  52182. "vulnerable" : true,
  52183. "cpe23Uri" : "cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*",
  52184. "cpe_name" : [ ]
  52185. }, {
  52186. "vulnerable" : true,
  52187. "cpe23Uri" : "cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*",
  52188. "cpe_name" : [ ]
  52189. }, {
  52190. "vulnerable" : true,
  52191. "cpe23Uri" : "cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*",
  52192. "cpe_name" : [ ]
  52193. } ]
  52194. } ]
  52195. },
  52196. "impact" : {
  52197. "baseMetricV3" : {
  52198. "cvssV3" : {
  52199. "version" : "3.1",
  52200. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
  52201. "attackVector" : "NETWORK",
  52202. "attackComplexity" : "HIGH",
  52203. "privilegesRequired" : "NONE",
  52204. "userInteraction" : "REQUIRED",
  52205. "scope" : "UNCHANGED",
  52206. "confidentialityImpact" : "NONE",
  52207. "integrityImpact" : "HIGH",
  52208. "availabilityImpact" : "NONE",
  52209. "baseScore" : 5.3,
  52210. "baseSeverity" : "MEDIUM"
  52211. },
  52212. "exploitabilityScore" : 1.6,
  52213. "impactScore" : 3.6
  52214. },
  52215. "baseMetricV2" : {
  52216. "cvssV2" : {
  52217. "version" : "2.0",
  52218. "vectorString" : "AV:N/AC:H/Au:N/C:N/I:P/A:N",
  52219. "accessVector" : "NETWORK",
  52220. "accessComplexity" : "HIGH",
  52221. "authentication" : "NONE",
  52222. "confidentialityImpact" : "NONE",
  52223. "integrityImpact" : "PARTIAL",
  52224. "availabilityImpact" : "NONE",
  52225. "baseScore" : 2.6
  52226. },
  52227. "severity" : "LOW",
  52228. "exploitabilityScore" : 4.9,
  52229. "impactScore" : 2.9,
  52230. "acInsufInfo" : false,
  52231. "obtainAllPrivilege" : false,
  52232. "obtainUserPrivilege" : false,
  52233. "obtainOtherPrivilege" : false,
  52234. "userInteractionRequired" : true
  52235. }
  52236. },
  52237. "publishedDate" : "2021-04-22T22:15Z",
  52238. "lastModifiedDate" : "2021-05-04T09:00Z"
  52239. }, {
  52240. "cve" : {
  52241. "data_type" : "CVE",
  52242. "data_format" : "MITRE",
  52243. "data_version" : "4.0",
  52244. "CVE_data_meta" : {
  52245. "ID" : "CVE-2021-2161",
  52246. "ASSIGNER" : "secalert_us@oracle.com"
  52247. },
  52248. "problemtype" : {
  52249. "problemtype_data" : [ {
  52250. "description" : [ {
  52251. "lang" : "en",
  52252. "value" : "NVD-CWE-noinfo"
  52253. } ]
  52254. } ]
  52255. },
  52256. "references" : {
  52257. "reference_data" : [ {
  52258. "url" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  52259. "name" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  52260. "refsource" : "MISC",
  52261. "tags" : [ "Patch", "Vendor Advisory" ]
  52262. }, {
  52263. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html",
  52264. "name" : "[debian-lts-announce] 20210423 [SECURITY] [DLA 2634-1] openjdk-8 security update",
  52265. "refsource" : "MLIST",
  52266. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52267. }, {
  52268. "url" : "https://www.debian.org/security/2021/dsa-4899",
  52269. "name" : "DSA-4899",
  52270. "refsource" : "DEBIAN",
  52271. "tags" : [ "Third Party Advisory" ]
  52272. }, {
  52273. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/",
  52274. "name" : "FEDORA-2021-6eb9bbbf0c",
  52275. "refsource" : "FEDORA",
  52276. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52277. }, {
  52278. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/",
  52279. "name" : "FEDORA-2021-65aa196c14",
  52280. "refsource" : "FEDORA",
  52281. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52282. }, {
  52283. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/",
  52284. "name" : "FEDORA-2021-25b47f16af",
  52285. "refsource" : "FEDORA",
  52286. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52287. }, {
  52288. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/",
  52289. "name" : "FEDORA-2021-8b80ef64f1",
  52290. "refsource" : "FEDORA",
  52291. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52292. }, {
  52293. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/",
  52294. "name" : "FEDORA-2021-f71b592e07",
  52295. "refsource" : "FEDORA",
  52296. "tags" : [ "Mailing List", "Third Party Advisory" ]
  52297. }, {
  52298. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/",
  52299. "name" : "FEDORA-2021-b88e86b753",
  52300. "refsource" : "FEDORA",
  52301. "tags" : [ "Third Party Advisory" ]
  52302. } ]
  52303. },
  52304. "description" : {
  52305. "description_data" : [ {
  52306. "lang" : "en",
  52307. "value" : "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)."
  52308. } ]
  52309. }
  52310. },
  52311. "configurations" : {
  52312. "CVE_data_version" : "4.0",
  52313. "nodes" : [ {
  52314. "operator" : "OR",
  52315. "children" : [ ],
  52316. "cpe_match" : [ {
  52317. "vulnerable" : true,
  52318. "cpe23Uri" : "cpe:2.3:a:oracle:jdk:1.7.0:update_291:*:*:*:*:*:*",
  52319. "cpe_name" : [ ]
  52320. }, {
  52321. "vulnerable" : true,
  52322. "cpe23Uri" : "cpe:2.3:a:oracle:jdk:1.8.0:update_281:*:*:*:*:*:*",
  52323. "cpe_name" : [ ]
  52324. }, {
  52325. "vulnerable" : true,
  52326. "cpe23Uri" : "cpe:2.3:a:oracle:jdk:11.0.10:*:*:*:*:*:*:*",
  52327. "cpe_name" : [ ]
  52328. }, {
  52329. "vulnerable" : true,
  52330. "cpe23Uri" : "cpe:2.3:a:oracle:jdk:16.0.0:*:*:*:*:*:*:*",
  52331. "cpe_name" : [ ]
  52332. }, {
  52333. "vulnerable" : true,
  52334. "cpe23Uri" : "cpe:2.3:a:oracle:jre:1.8.0:update_281:*:*:*:*:*:*",
  52335. "cpe_name" : [ ]
  52336. } ]
  52337. }, {
  52338. "operator" : "OR",
  52339. "children" : [ ],
  52340. "cpe_match" : [ {
  52341. "vulnerable" : true,
  52342. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  52343. "cpe_name" : [ ]
  52344. }, {
  52345. "vulnerable" : true,
  52346. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  52347. "cpe_name" : [ ]
  52348. } ]
  52349. }, {
  52350. "operator" : "OR",
  52351. "children" : [ ],
  52352. "cpe_match" : [ {
  52353. "vulnerable" : true,
  52354. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  52355. "cpe_name" : [ ]
  52356. }, {
  52357. "vulnerable" : true,
  52358. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  52359. "cpe_name" : [ ]
  52360. }, {
  52361. "vulnerable" : true,
  52362. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  52363. "cpe_name" : [ ]
  52364. } ]
  52365. }, {
  52366. "operator" : "OR",
  52367. "children" : [ ],
  52368. "cpe_match" : [ {
  52369. "vulnerable" : true,
  52370. "cpe23Uri" : "cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*",
  52371. "cpe_name" : [ ]
  52372. }, {
  52373. "vulnerable" : true,
  52374. "cpe23Uri" : "cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*",
  52375. "cpe_name" : [ ]
  52376. }, {
  52377. "vulnerable" : true,
  52378. "cpe23Uri" : "cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*",
  52379. "cpe_name" : [ ]
  52380. } ]
  52381. } ]
  52382. },
  52383. "impact" : {
  52384. "baseMetricV3" : {
  52385. "cvssV3" : {
  52386. "version" : "3.1",
  52387. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
  52388. "attackVector" : "NETWORK",
  52389. "attackComplexity" : "HIGH",
  52390. "privilegesRequired" : "NONE",
  52391. "userInteraction" : "NONE",
  52392. "scope" : "UNCHANGED",
  52393. "confidentialityImpact" : "NONE",
  52394. "integrityImpact" : "HIGH",
  52395. "availabilityImpact" : "NONE",
  52396. "baseScore" : 5.9,
  52397. "baseSeverity" : "MEDIUM"
  52398. },
  52399. "exploitabilityScore" : 2.2,
  52400. "impactScore" : 3.6
  52401. },
  52402. "baseMetricV2" : {
  52403. "cvssV2" : {
  52404. "version" : "2.0",
  52405. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  52406. "accessVector" : "NETWORK",
  52407. "accessComplexity" : "MEDIUM",
  52408. "authentication" : "NONE",
  52409. "confidentialityImpact" : "NONE",
  52410. "integrityImpact" : "PARTIAL",
  52411. "availabilityImpact" : "NONE",
  52412. "baseScore" : 4.3
  52413. },
  52414. "severity" : "MEDIUM",
  52415. "exploitabilityScore" : 8.6,
  52416. "impactScore" : 2.9,
  52417. "acInsufInfo" : false,
  52418. "obtainAllPrivilege" : false,
  52419. "obtainUserPrivilege" : false,
  52420. "obtainOtherPrivilege" : false,
  52421. "userInteractionRequired" : false
  52422. }
  52423. },
  52424. "publishedDate" : "2021-04-22T22:15Z",
  52425. "lastModifiedDate" : "2021-05-04T09:03Z"
  52426. }, {
  52427. "cve" : {
  52428. "data_type" : "CVE",
  52429. "data_format" : "MITRE",
  52430. "data_version" : "4.0",
  52431. "CVE_data_meta" : {
  52432. "ID" : "CVE-2021-2053",
  52433. "ASSIGNER" : "secalert_us@oracle.com"
  52434. },
  52435. "problemtype" : {
  52436. "problemtype_data" : [ {
  52437. "description" : [ {
  52438. "lang" : "en",
  52439. "value" : "NVD-CWE-noinfo"
  52440. } ]
  52441. } ]
  52442. },
  52443. "references" : {
  52444. "reference_data" : [ {
  52445. "url" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  52446. "name" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  52447. "refsource" : "MISC",
  52448. "tags" : [ "Patch", "Vendor Advisory" ]
  52449. }, {
  52450. "url" : "https://blog.stmcyber.com/vulns/cve-2021-2053/",
  52451. "name" : "https://blog.stmcyber.com/vulns/cve-2021-2053/",
  52452. "refsource" : "MISC",
  52453. "tags" : [ ]
  52454. } ]
  52455. },
  52456. "description" : {
  52457. "description_data" : [ {
  52458. "lang" : "en",
  52459. "value" : "Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: UI Framework). The supported version that is affected is 13.4.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Enterprise Manager Base Platform, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data as well as unauthorized read access to a subset of Enterprise Manager Base Platform accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
  52460. } ]
  52461. }
  52462. },
  52463. "configurations" : {
  52464. "CVE_data_version" : "4.0",
  52465. "nodes" : [ {
  52466. "operator" : "OR",
  52467. "children" : [ ],
  52468. "cpe_match" : [ {
  52469. "vulnerable" : true,
  52470. "cpe23Uri" : "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
  52471. "cpe_name" : [ ]
  52472. } ]
  52473. } ]
  52474. },
  52475. "impact" : {
  52476. "baseMetricV3" : {
  52477. "cvssV3" : {
  52478. "version" : "3.1",
  52479. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  52480. "attackVector" : "NETWORK",
  52481. "attackComplexity" : "LOW",
  52482. "privilegesRequired" : "NONE",
  52483. "userInteraction" : "REQUIRED",
  52484. "scope" : "CHANGED",
  52485. "confidentialityImpact" : "LOW",
  52486. "integrityImpact" : "LOW",
  52487. "availabilityImpact" : "NONE",
  52488. "baseScore" : 6.1,
  52489. "baseSeverity" : "MEDIUM"
  52490. },
  52491. "exploitabilityScore" : 2.8,
  52492. "impactScore" : 2.7
  52493. },
  52494. "baseMetricV2" : {
  52495. "cvssV2" : {
  52496. "version" : "2.0",
  52497. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:N",
  52498. "accessVector" : "NETWORK",
  52499. "accessComplexity" : "MEDIUM",
  52500. "authentication" : "NONE",
  52501. "confidentialityImpact" : "PARTIAL",
  52502. "integrityImpact" : "PARTIAL",
  52503. "availabilityImpact" : "NONE",
  52504. "baseScore" : 5.8
  52505. },
  52506. "severity" : "MEDIUM",
  52507. "exploitabilityScore" : 8.6,
  52508. "impactScore" : 4.9,
  52509. "acInsufInfo" : false,
  52510. "obtainAllPrivilege" : false,
  52511. "obtainUserPrivilege" : false,
  52512. "obtainOtherPrivilege" : false,
  52513. "userInteractionRequired" : true
  52514. }
  52515. },
  52516. "publishedDate" : "2021-04-22T22:15Z",
  52517. "lastModifiedDate" : "2021-05-03T12:15Z"
  52518. }, {
  52519. "cve" : {
  52520. "data_type" : "CVE",
  52521. "data_format" : "MITRE",
  52522. "data_version" : "4.0",
  52523. "CVE_data_meta" : {
  52524. "ID" : "CVE-2021-0273",
  52525. "ASSIGNER" : "sirt@juniper.net"
  52526. },
  52527. "problemtype" : {
  52528. "problemtype_data" : [ {
  52529. "description" : [ {
  52530. "lang" : "en",
  52531. "value" : "CWE-670"
  52532. }, {
  52533. "lang" : "en",
  52534. "value" : "CWE-835"
  52535. } ]
  52536. } ]
  52537. },
  52538. "references" : {
  52539. "reference_data" : [ {
  52540. "url" : "https://kb.juniper.net/JSA11164",
  52541. "name" : "https://kb.juniper.net/JSA11164",
  52542. "refsource" : "MISC",
  52543. "tags" : [ "Vendor Advisory" ]
  52544. } ]
  52545. },
  52546. "description" : {
  52547. "description_data" : [ {
  52548. "lang" : "en",
  52549. "value" : "An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an attacker to exploit an interdependency in the PFE UCODE microcode of the Trio chipset with various line cards to cause packets destined to the devices interfaces to cause a Denial of Service (DoS) condition by looping the packet with an unreachable exit condition ('Infinite Loop'). To break this loop once it begins one side of the affected LT interfaces will need to be disabled. Once disabled, the condition will clear and the disabled LT interface can be reenabled. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. This issue only affects LT-LT interfaces. Any other interfaces are not affected by this issue. This issue affects the following cards: MPCE Type 3 3D MPC4E 3D 32XGE MPC4E 3D 2CGE+8XGE EX9200 32x10G SFP EX9200-2C-8XS FPC Type 5-3D FPC Type 5-LSR EX9200 4x40G QSFP An Indicator of Compromise (IoC) can be seen by examining the traffic of the LT-LT interfaces for excessive traffic using the following command: monitor interface traffic Before loop impact: Interface: lt-2/0/0, Enabled, Link is Up Encapsulation: Logical-tunnel, Speed: 100000mbps Traffic statistics: Current delta Input bytes: 3759900268942 (1456 bps) [0] <---------- LT interface utilization is low Output bytes: 3759900344309 (1456 bps) [0] <---------- LT interface utilization is low After loop impact: Interface: lt-2/0/0, Enabled, Link is Up Encapsulation: Logical-tunnel, Speed: 100000mbps Traffic statistics: Current delta Input bytes: 3765160313129 (2158268368 bps) [5260044187] <---------- LT interface utilization is very high Output bytes: 3765160399522 (2158266440 bps) [5260055213] <---------- LT interface utilization is very high This issue affects: Juniper Networks Junos OS on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960. Versions 15.1F6, 16.1R1, and later versions prior to 16.1R7-S8; 17.1 versions prior to 17.1R2-S12; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S10, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3; 18.3 versions prior to 18.3R1-S7, 18.3R3-S2; 18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3-S2; 19.1 versions prior to 19.1R1-S5, 19.1R2-S1, 19.1R3; 19.2 versions prior to 19.2R1-S4, 19.2R2; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S1, 19.4R2. This issue does not affect the MX10001. This issue does not affect Juniper Networks Junos OS versions prior to 15.1F6, 16.1R1. Juniper Networks Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 19.4 versions prior to 19.4R2-EVO. This issue does not affect the MX10001."
  52550. } ]
  52551. }
  52552. },
  52553. "configurations" : {
  52554. "CVE_data_version" : "4.0",
  52555. "nodes" : [ {
  52556. "operator" : "AND",
  52557. "children" : [ {
  52558. "operator" : "OR",
  52559. "children" : [ ],
  52560. "cpe_match" : [ {
  52561. "vulnerable" : true,
  52562. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
  52563. "cpe_name" : [ ]
  52564. }, {
  52565. "vulnerable" : true,
  52566. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*",
  52567. "cpe_name" : [ ]
  52568. }, {
  52569. "vulnerable" : true,
  52570. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
  52571. "cpe_name" : [ ]
  52572. }, {
  52573. "vulnerable" : true,
  52574. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
  52575. "cpe_name" : [ ]
  52576. }, {
  52577. "vulnerable" : true,
  52578. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*",
  52579. "cpe_name" : [ ]
  52580. }, {
  52581. "vulnerable" : true,
  52582. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*",
  52583. "cpe_name" : [ ]
  52584. }, {
  52585. "vulnerable" : true,
  52586. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*",
  52587. "cpe_name" : [ ]
  52588. }, {
  52589. "vulnerable" : true,
  52590. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*",
  52591. "cpe_name" : [ ]
  52592. }, {
  52593. "vulnerable" : true,
  52594. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*",
  52595. "cpe_name" : [ ]
  52596. }, {
  52597. "vulnerable" : true,
  52598. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*",
  52599. "cpe_name" : [ ]
  52600. }, {
  52601. "vulnerable" : true,
  52602. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*",
  52603. "cpe_name" : [ ]
  52604. }, {
  52605. "vulnerable" : true,
  52606. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*",
  52607. "cpe_name" : [ ]
  52608. }, {
  52609. "vulnerable" : true,
  52610. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
  52611. "cpe_name" : [ ]
  52612. }, {
  52613. "vulnerable" : true,
  52614. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*",
  52615. "cpe_name" : [ ]
  52616. }, {
  52617. "vulnerable" : true,
  52618. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
  52619. "cpe_name" : [ ]
  52620. }, {
  52621. "vulnerable" : true,
  52622. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
  52623. "cpe_name" : [ ]
  52624. }, {
  52625. "vulnerable" : true,
  52626. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
  52627. "cpe_name" : [ ]
  52628. }, {
  52629. "vulnerable" : true,
  52630. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
  52631. "cpe_name" : [ ]
  52632. }, {
  52633. "vulnerable" : true,
  52634. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*",
  52635. "cpe_name" : [ ]
  52636. }, {
  52637. "vulnerable" : true,
  52638. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*",
  52639. "cpe_name" : [ ]
  52640. }, {
  52641. "vulnerable" : true,
  52642. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*",
  52643. "cpe_name" : [ ]
  52644. }, {
  52645. "vulnerable" : true,
  52646. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
  52647. "cpe_name" : [ ]
  52648. }, {
  52649. "vulnerable" : true,
  52650. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*",
  52651. "cpe_name" : [ ]
  52652. }, {
  52653. "vulnerable" : true,
  52654. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*",
  52655. "cpe_name" : [ ]
  52656. }, {
  52657. "vulnerable" : true,
  52658. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*",
  52659. "cpe_name" : [ ]
  52660. }, {
  52661. "vulnerable" : true,
  52662. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*",
  52663. "cpe_name" : [ ]
  52664. }, {
  52665. "vulnerable" : true,
  52666. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
  52667. "cpe_name" : [ ]
  52668. }, {
  52669. "vulnerable" : true,
  52670. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*",
  52671. "cpe_name" : [ ]
  52672. }, {
  52673. "vulnerable" : true,
  52674. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*",
  52675. "cpe_name" : [ ]
  52676. }, {
  52677. "vulnerable" : true,
  52678. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*",
  52679. "cpe_name" : [ ]
  52680. }, {
  52681. "vulnerable" : true,
  52682. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*",
  52683. "cpe_name" : [ ]
  52684. }, {
  52685. "vulnerable" : true,
  52686. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*",
  52687. "cpe_name" : [ ]
  52688. }, {
  52689. "vulnerable" : true,
  52690. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
  52691. "cpe_name" : [ ]
  52692. }, {
  52693. "vulnerable" : true,
  52694. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*",
  52695. "cpe_name" : [ ]
  52696. }, {
  52697. "vulnerable" : true,
  52698. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*",
  52699. "cpe_name" : [ ]
  52700. }, {
  52701. "vulnerable" : true,
  52702. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*",
  52703. "cpe_name" : [ ]
  52704. }, {
  52705. "vulnerable" : true,
  52706. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s4:*:*:*:*:*:*",
  52707. "cpe_name" : [ ]
  52708. }, {
  52709. "vulnerable" : true,
  52710. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s5:*:*:*:*:*:*",
  52711. "cpe_name" : [ ]
  52712. }, {
  52713. "vulnerable" : true,
  52714. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s6:*:*:*:*:*:*",
  52715. "cpe_name" : [ ]
  52716. }, {
  52717. "vulnerable" : true,
  52718. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s7:*:*:*:*:*:*",
  52719. "cpe_name" : [ ]
  52720. }, {
  52721. "vulnerable" : true,
  52722. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s8:*:*:*:*:*:*",
  52723. "cpe_name" : [ ]
  52724. }, {
  52725. "vulnerable" : true,
  52726. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.2:*:*:*:*:*:*:*",
  52727. "cpe_name" : [ ]
  52728. }, {
  52729. "vulnerable" : true,
  52730. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
  52731. "cpe_name" : [ ]
  52732. }, {
  52733. "vulnerable" : true,
  52734. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
  52735. "cpe_name" : [ ]
  52736. }, {
  52737. "vulnerable" : true,
  52738. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
  52739. "cpe_name" : [ ]
  52740. }, {
  52741. "vulnerable" : true,
  52742. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:*",
  52743. "cpe_name" : [ ]
  52744. }, {
  52745. "vulnerable" : true,
  52746. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r3-s11:*:*:*:*:*:*",
  52747. "cpe_name" : [ ]
  52748. }, {
  52749. "vulnerable" : true,
  52750. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:*",
  52751. "cpe_name" : [ ]
  52752. }, {
  52753. "vulnerable" : true,
  52754. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
  52755. "cpe_name" : [ ]
  52756. }, {
  52757. "vulnerable" : true,
  52758. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s12:*:*:*:*:*:*",
  52759. "cpe_name" : [ ]
  52760. }, {
  52761. "vulnerable" : true,
  52762. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:*",
  52763. "cpe_name" : [ ]
  52764. }, {
  52765. "vulnerable" : true,
  52766. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:*",
  52767. "cpe_name" : [ ]
  52768. }, {
  52769. "vulnerable" : true,
  52770. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:*",
  52771. "cpe_name" : [ ]
  52772. }, {
  52773. "vulnerable" : true,
  52774. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:*",
  52775. "cpe_name" : [ ]
  52776. }, {
  52777. "vulnerable" : true,
  52778. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:*",
  52779. "cpe_name" : [ ]
  52780. }, {
  52781. "vulnerable" : true,
  52782. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*",
  52783. "cpe_name" : [ ]
  52784. }, {
  52785. "vulnerable" : true,
  52786. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*",
  52787. "cpe_name" : [ ]
  52788. }, {
  52789. "vulnerable" : true,
  52790. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*",
  52791. "cpe_name" : [ ]
  52792. }, {
  52793. "vulnerable" : true,
  52794. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*",
  52795. "cpe_name" : [ ]
  52796. }, {
  52797. "vulnerable" : true,
  52798. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*",
  52799. "cpe_name" : [ ]
  52800. }, {
  52801. "vulnerable" : true,
  52802. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*",
  52803. "cpe_name" : [ ]
  52804. }, {
  52805. "vulnerable" : true,
  52806. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:*",
  52807. "cpe_name" : [ ]
  52808. }, {
  52809. "vulnerable" : true,
  52810. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6-s6:*:*:*:*:*:*",
  52811. "cpe_name" : [ ]
  52812. }, {
  52813. "vulnerable" : true,
  52814. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*",
  52815. "cpe_name" : [ ]
  52816. }, {
  52817. "vulnerable" : true,
  52818. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s2:*:*:*:*:*:*",
  52819. "cpe_name" : [ ]
  52820. }, {
  52821. "vulnerable" : true,
  52822. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s3:*:*:*:*:*:*",
  52823. "cpe_name" : [ ]
  52824. }, {
  52825. "vulnerable" : true,
  52826. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s4:*:*:*:*:*:*",
  52827. "cpe_name" : [ ]
  52828. }, {
  52829. "vulnerable" : true,
  52830. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s5:*:*:*:*:*:*",
  52831. "cpe_name" : [ ]
  52832. }, {
  52833. "vulnerable" : true,
  52834. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s6:*:*:*:*:*:*",
  52835. "cpe_name" : [ ]
  52836. }, {
  52837. "vulnerable" : true,
  52838. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s7:*:*:*:*:*:*",
  52839. "cpe_name" : [ ]
  52840. }, {
  52841. "vulnerable" : true,
  52842. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:-:*:*:*:*:*:*",
  52843. "cpe_name" : [ ]
  52844. }, {
  52845. "vulnerable" : true,
  52846. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
  52847. "cpe_name" : [ ]
  52848. }, {
  52849. "vulnerable" : true,
  52850. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:*",
  52851. "cpe_name" : [ ]
  52852. }, {
  52853. "vulnerable" : true,
  52854. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2:*:*:*:*:*:*",
  52855. "cpe_name" : [ ]
  52856. }, {
  52857. "vulnerable" : true,
  52858. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s1:*:*:*:*:*:*",
  52859. "cpe_name" : [ ]
  52860. }, {
  52861. "vulnerable" : true,
  52862. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s10:*:*:*:*:*:*",
  52863. "cpe_name" : [ ]
  52864. }, {
  52865. "vulnerable" : true,
  52866. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s11:*:*:*:*:*:*",
  52867. "cpe_name" : [ ]
  52868. }, {
  52869. "vulnerable" : true,
  52870. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s2:*:*:*:*:*:*",
  52871. "cpe_name" : [ ]
  52872. }, {
  52873. "vulnerable" : true,
  52874. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s3:*:*:*:*:*:*",
  52875. "cpe_name" : [ ]
  52876. }, {
  52877. "vulnerable" : true,
  52878. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s4:*:*:*:*:*:*",
  52879. "cpe_name" : [ ]
  52880. }, {
  52881. "vulnerable" : true,
  52882. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s5:*:*:*:*:*:*",
  52883. "cpe_name" : [ ]
  52884. }, {
  52885. "vulnerable" : true,
  52886. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s6:*:*:*:*:*:*",
  52887. "cpe_name" : [ ]
  52888. }, {
  52889. "vulnerable" : true,
  52890. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*",
  52891. "cpe_name" : [ ]
  52892. }, {
  52893. "vulnerable" : true,
  52894. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:*",
  52895. "cpe_name" : [ ]
  52896. }, {
  52897. "vulnerable" : true,
  52898. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s9:*:*:*:*:*:*",
  52899. "cpe_name" : [ ]
  52900. }, {
  52901. "vulnerable" : true,
  52902. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:-:*:*:*:*:*:*",
  52903. "cpe_name" : [ ]
  52904. }, {
  52905. "vulnerable" : true,
  52906. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*",
  52907. "cpe_name" : [ ]
  52908. }, {
  52909. "vulnerable" : true,
  52910. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s1:*:*:*:*:*:*",
  52911. "cpe_name" : [ ]
  52912. }, {
  52913. "vulnerable" : true,
  52914. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s2:*:*:*:*:*:*",
  52915. "cpe_name" : [ ]
  52916. }, {
  52917. "vulnerable" : true,
  52918. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s3:*:*:*:*:*:*",
  52919. "cpe_name" : [ ]
  52920. }, {
  52921. "vulnerable" : true,
  52922. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s4:*:*:*:*:*:*",
  52923. "cpe_name" : [ ]
  52924. }, {
  52925. "vulnerable" : true,
  52926. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s5:*:*:*:*:*:*",
  52927. "cpe_name" : [ ]
  52928. }, {
  52929. "vulnerable" : true,
  52930. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s6:*:*:*:*:*:*",
  52931. "cpe_name" : [ ]
  52932. }, {
  52933. "vulnerable" : true,
  52934. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s7:*:*:*:*:*:*",
  52935. "cpe_name" : [ ]
  52936. }, {
  52937. "vulnerable" : true,
  52938. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s8:*:*:*:*:*:*",
  52939. "cpe_name" : [ ]
  52940. }, {
  52941. "vulnerable" : true,
  52942. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*",
  52943. "cpe_name" : [ ]
  52944. }, {
  52945. "vulnerable" : true,
  52946. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r2-s11:*:*:*:*:*:*",
  52947. "cpe_name" : [ ]
  52948. }, {
  52949. "vulnerable" : true,
  52950. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:*",
  52951. "cpe_name" : [ ]
  52952. }, {
  52953. "vulnerable" : true,
  52954. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r2-s6:*:*:*:*:*:*",
  52955. "cpe_name" : [ ]
  52956. }, {
  52957. "vulnerable" : true,
  52958. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r2-s7:*:*:*:*:*:*",
  52959. "cpe_name" : [ ]
  52960. }, {
  52961. "vulnerable" : true,
  52962. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r3:*:*:*:*:*:*",
  52963. "cpe_name" : [ ]
  52964. }, {
  52965. "vulnerable" : true,
  52966. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r3-s1:*:*:*:*:*:*",
  52967. "cpe_name" : [ ]
  52968. }, {
  52969. "vulnerable" : true,
  52970. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r3-s2:*:*:*:*:*:*",
  52971. "cpe_name" : [ ]
  52972. }, {
  52973. "vulnerable" : true,
  52974. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r3-s3:*:*:*:*:*:*",
  52975. "cpe_name" : [ ]
  52976. }, {
  52977. "vulnerable" : true,
  52978. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
  52979. "cpe_name" : [ ]
  52980. }, {
  52981. "vulnerable" : true,
  52982. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
  52983. "cpe_name" : [ ]
  52984. }, {
  52985. "vulnerable" : true,
  52986. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
  52987. "cpe_name" : [ ]
  52988. }, {
  52989. "vulnerable" : true,
  52990. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
  52991. "cpe_name" : [ ]
  52992. }, {
  52993. "vulnerable" : true,
  52994. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
  52995. "cpe_name" : [ ]
  52996. }, {
  52997. "vulnerable" : true,
  52998. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
  52999. "cpe_name" : [ ]
  53000. }, {
  53001. "vulnerable" : true,
  53002. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
  53003. "cpe_name" : [ ]
  53004. }, {
  53005. "vulnerable" : true,
  53006. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
  53007. "cpe_name" : [ ]
  53008. }, {
  53009. "vulnerable" : true,
  53010. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
  53011. "cpe_name" : [ ]
  53012. }, {
  53013. "vulnerable" : true,
  53014. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
  53015. "cpe_name" : [ ]
  53016. }, {
  53017. "vulnerable" : true,
  53018. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
  53019. "cpe_name" : [ ]
  53020. }, {
  53021. "vulnerable" : true,
  53022. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
  53023. "cpe_name" : [ ]
  53024. }, {
  53025. "vulnerable" : true,
  53026. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
  53027. "cpe_name" : [ ]
  53028. }, {
  53029. "vulnerable" : true,
  53030. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*",
  53031. "cpe_name" : [ ]
  53032. }, {
  53033. "vulnerable" : true,
  53034. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
  53035. "cpe_name" : [ ]
  53036. }, {
  53037. "vulnerable" : true,
  53038. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
  53039. "cpe_name" : [ ]
  53040. }, {
  53041. "vulnerable" : true,
  53042. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
  53043. "cpe_name" : [ ]
  53044. }, {
  53045. "vulnerable" : true,
  53046. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
  53047. "cpe_name" : [ ]
  53048. }, {
  53049. "vulnerable" : true,
  53050. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
  53051. "cpe_name" : [ ]
  53052. }, {
  53053. "vulnerable" : true,
  53054. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
  53055. "cpe_name" : [ ]
  53056. }, {
  53057. "vulnerable" : true,
  53058. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
  53059. "cpe_name" : [ ]
  53060. }, {
  53061. "vulnerable" : true,
  53062. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
  53063. "cpe_name" : [ ]
  53064. }, {
  53065. "vulnerable" : true,
  53066. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
  53067. "cpe_name" : [ ]
  53068. }, {
  53069. "vulnerable" : true,
  53070. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
  53071. "cpe_name" : [ ]
  53072. }, {
  53073. "vulnerable" : true,
  53074. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
  53075. "cpe_name" : [ ]
  53076. }, {
  53077. "vulnerable" : true,
  53078. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
  53079. "cpe_name" : [ ]
  53080. }, {
  53081. "vulnerable" : true,
  53082. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
  53083. "cpe_name" : [ ]
  53084. }, {
  53085. "vulnerable" : true,
  53086. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
  53087. "cpe_name" : [ ]
  53088. }, {
  53089. "vulnerable" : true,
  53090. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
  53091. "cpe_name" : [ ]
  53092. }, {
  53093. "vulnerable" : true,
  53094. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
  53095. "cpe_name" : [ ]
  53096. }, {
  53097. "vulnerable" : true,
  53098. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
  53099. "cpe_name" : [ ]
  53100. }, {
  53101. "vulnerable" : true,
  53102. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
  53103. "cpe_name" : [ ]
  53104. }, {
  53105. "vulnerable" : true,
  53106. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
  53107. "cpe_name" : [ ]
  53108. }, {
  53109. "vulnerable" : true,
  53110. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
  53111. "cpe_name" : [ ]
  53112. }, {
  53113. "vulnerable" : true,
  53114. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
  53115. "cpe_name" : [ ]
  53116. }, {
  53117. "vulnerable" : true,
  53118. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
  53119. "cpe_name" : [ ]
  53120. }, {
  53121. "vulnerable" : true,
  53122. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
  53123. "cpe_name" : [ ]
  53124. }, {
  53125. "vulnerable" : true,
  53126. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
  53127. "cpe_name" : [ ]
  53128. }, {
  53129. "vulnerable" : true,
  53130. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
  53131. "cpe_name" : [ ]
  53132. }, {
  53133. "vulnerable" : true,
  53134. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
  53135. "cpe_name" : [ ]
  53136. }, {
  53137. "vulnerable" : true,
  53138. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
  53139. "cpe_name" : [ ]
  53140. }, {
  53141. "vulnerable" : true,
  53142. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
  53143. "cpe_name" : [ ]
  53144. }, {
  53145. "vulnerable" : true,
  53146. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
  53147. "cpe_name" : [ ]
  53148. }, {
  53149. "vulnerable" : true,
  53150. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
  53151. "cpe_name" : [ ]
  53152. }, {
  53153. "vulnerable" : true,
  53154. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
  53155. "cpe_name" : [ ]
  53156. }, {
  53157. "vulnerable" : true,
  53158. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
  53159. "cpe_name" : [ ]
  53160. }, {
  53161. "vulnerable" : true,
  53162. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
  53163. "cpe_name" : [ ]
  53164. }, {
  53165. "vulnerable" : true,
  53166. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
  53167. "cpe_name" : [ ]
  53168. }, {
  53169. "vulnerable" : true,
  53170. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
  53171. "cpe_name" : [ ]
  53172. }, {
  53173. "vulnerable" : true,
  53174. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
  53175. "cpe_name" : [ ]
  53176. }, {
  53177. "vulnerable" : true,
  53178. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
  53179. "cpe_name" : [ ]
  53180. }, {
  53181. "vulnerable" : true,
  53182. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
  53183. "cpe_name" : [ ]
  53184. }, {
  53185. "vulnerable" : true,
  53186. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
  53187. "cpe_name" : [ ]
  53188. }, {
  53189. "vulnerable" : true,
  53190. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
  53191. "cpe_name" : [ ]
  53192. }, {
  53193. "vulnerable" : true,
  53194. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
  53195. "cpe_name" : [ ]
  53196. }, {
  53197. "vulnerable" : true,
  53198. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
  53199. "cpe_name" : [ ]
  53200. }, {
  53201. "vulnerable" : true,
  53202. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
  53203. "cpe_name" : [ ]
  53204. }, {
  53205. "vulnerable" : true,
  53206. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
  53207. "cpe_name" : [ ]
  53208. }, {
  53209. "vulnerable" : true,
  53210. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
  53211. "cpe_name" : [ ]
  53212. }, {
  53213. "vulnerable" : true,
  53214. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
  53215. "cpe_name" : [ ]
  53216. }, {
  53217. "vulnerable" : true,
  53218. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
  53219. "cpe_name" : [ ]
  53220. }, {
  53221. "vulnerable" : true,
  53222. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
  53223. "cpe_name" : [ ]
  53224. }, {
  53225. "vulnerable" : true,
  53226. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
  53227. "cpe_name" : [ ]
  53228. }, {
  53229. "vulnerable" : true,
  53230. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
  53231. "cpe_name" : [ ]
  53232. }, {
  53233. "vulnerable" : true,
  53234. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
  53235. "cpe_name" : [ ]
  53236. }, {
  53237. "vulnerable" : true,
  53238. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
  53239. "cpe_name" : [ ]
  53240. }, {
  53241. "vulnerable" : true,
  53242. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
  53243. "cpe_name" : [ ]
  53244. }, {
  53245. "vulnerable" : true,
  53246. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
  53247. "cpe_name" : [ ]
  53248. }, {
  53249. "vulnerable" : true,
  53250. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
  53251. "cpe_name" : [ ]
  53252. }, {
  53253. "vulnerable" : true,
  53254. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
  53255. "cpe_name" : [ ]
  53256. }, {
  53257. "vulnerable" : true,
  53258. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
  53259. "cpe_name" : [ ]
  53260. }, {
  53261. "vulnerable" : true,
  53262. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
  53263. "cpe_name" : [ ]
  53264. }, {
  53265. "vulnerable" : true,
  53266. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
  53267. "cpe_name" : [ ]
  53268. }, {
  53269. "vulnerable" : true,
  53270. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
  53271. "cpe_name" : [ ]
  53272. }, {
  53273. "vulnerable" : true,
  53274. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
  53275. "cpe_name" : [ ]
  53276. }, {
  53277. "vulnerable" : true,
  53278. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
  53279. "cpe_name" : [ ]
  53280. }, {
  53281. "vulnerable" : true,
  53282. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
  53283. "cpe_name" : [ ]
  53284. }, {
  53285. "vulnerable" : true,
  53286. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
  53287. "cpe_name" : [ ]
  53288. }, {
  53289. "vulnerable" : true,
  53290. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
  53291. "cpe_name" : [ ]
  53292. }, {
  53293. "vulnerable" : true,
  53294. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
  53295. "cpe_name" : [ ]
  53296. }, {
  53297. "vulnerable" : true,
  53298. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
  53299. "cpe_name" : [ ]
  53300. }, {
  53301. "vulnerable" : true,
  53302. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
  53303. "cpe_name" : [ ]
  53304. }, {
  53305. "vulnerable" : true,
  53306. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
  53307. "cpe_name" : [ ]
  53308. }, {
  53309. "vulnerable" : true,
  53310. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
  53311. "cpe_name" : [ ]
  53312. }, {
  53313. "vulnerable" : true,
  53314. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
  53315. "cpe_name" : [ ]
  53316. }, {
  53317. "vulnerable" : true,
  53318. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
  53319. "cpe_name" : [ ]
  53320. }, {
  53321. "vulnerable" : true,
  53322. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
  53323. "cpe_name" : [ ]
  53324. }, {
  53325. "vulnerable" : true,
  53326. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
  53327. "cpe_name" : [ ]
  53328. }, {
  53329. "vulnerable" : true,
  53330. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
  53331. "cpe_name" : [ ]
  53332. }, {
  53333. "vulnerable" : true,
  53334. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
  53335. "cpe_name" : [ ]
  53336. }, {
  53337. "vulnerable" : true,
  53338. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
  53339. "cpe_name" : [ ]
  53340. }, {
  53341. "vulnerable" : true,
  53342. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
  53343. "cpe_name" : [ ]
  53344. }, {
  53345. "vulnerable" : true,
  53346. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
  53347. "cpe_name" : [ ]
  53348. }, {
  53349. "vulnerable" : true,
  53350. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
  53351. "cpe_name" : [ ]
  53352. }, {
  53353. "vulnerable" : true,
  53354. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
  53355. "cpe_name" : [ ]
  53356. }, {
  53357. "vulnerable" : true,
  53358. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
  53359. "cpe_name" : [ ]
  53360. }, {
  53361. "vulnerable" : true,
  53362. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
  53363. "cpe_name" : [ ]
  53364. }, {
  53365. "vulnerable" : true,
  53366. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
  53367. "cpe_name" : [ ]
  53368. }, {
  53369. "vulnerable" : true,
  53370. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
  53371. "cpe_name" : [ ]
  53372. }, {
  53373. "vulnerable" : true,
  53374. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
  53375. "cpe_name" : [ ]
  53376. }, {
  53377. "vulnerable" : true,
  53378. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
  53379. "cpe_name" : [ ]
  53380. }, {
  53381. "vulnerable" : true,
  53382. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
  53383. "cpe_name" : [ ]
  53384. }, {
  53385. "vulnerable" : true,
  53386. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
  53387. "cpe_name" : [ ]
  53388. }, {
  53389. "vulnerable" : true,
  53390. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
  53391. "cpe_name" : [ ]
  53392. }, {
  53393. "vulnerable" : true,
  53394. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
  53395. "cpe_name" : [ ]
  53396. }, {
  53397. "vulnerable" : true,
  53398. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
  53399. "cpe_name" : [ ]
  53400. }, {
  53401. "vulnerable" : true,
  53402. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
  53403. "cpe_name" : [ ]
  53404. }, {
  53405. "vulnerable" : true,
  53406. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
  53407. "cpe_name" : [ ]
  53408. }, {
  53409. "vulnerable" : true,
  53410. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
  53411. "cpe_name" : [ ]
  53412. }, {
  53413. "vulnerable" : true,
  53414. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
  53415. "cpe_name" : [ ]
  53416. }, {
  53417. "vulnerable" : true,
  53418. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
  53419. "cpe_name" : [ ]
  53420. }, {
  53421. "vulnerable" : true,
  53422. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
  53423. "cpe_name" : [ ]
  53424. }, {
  53425. "vulnerable" : true,
  53426. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
  53427. "cpe_name" : [ ]
  53428. }, {
  53429. "vulnerable" : true,
  53430. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
  53431. "cpe_name" : [ ]
  53432. }, {
  53433. "vulnerable" : true,
  53434. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
  53435. "cpe_name" : [ ]
  53436. }, {
  53437. "vulnerable" : true,
  53438. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
  53439. "cpe_name" : [ ]
  53440. }, {
  53441. "vulnerable" : true,
  53442. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
  53443. "cpe_name" : [ ]
  53444. }, {
  53445. "vulnerable" : true,
  53446. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
  53447. "cpe_name" : [ ]
  53448. }, {
  53449. "vulnerable" : true,
  53450. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
  53451. "cpe_name" : [ ]
  53452. }, {
  53453. "vulnerable" : true,
  53454. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
  53455. "cpe_name" : [ ]
  53456. }, {
  53457. "vulnerable" : true,
  53458. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:19.4:r1:*:*:*:*:*:*",
  53459. "cpe_name" : [ ]
  53460. }, {
  53461. "vulnerable" : true,
  53462. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:19.4:r1-s1:*:*:*:*:*:*",
  53463. "cpe_name" : [ ]
  53464. } ]
  53465. }, {
  53466. "operator" : "OR",
  53467. "children" : [ ],
  53468. "cpe_match" : [ {
  53469. "vulnerable" : false,
  53470. "cpe23Uri" : "cpe:2.3:h:juniper:acx5800:-:*:*:*:*:*:*:*",
  53471. "cpe_name" : [ ]
  53472. }, {
  53473. "vulnerable" : false,
  53474. "cpe23Uri" : "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
  53475. "cpe_name" : [ ]
  53476. }, {
  53477. "vulnerable" : false,
  53478. "cpe23Uri" : "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
  53479. "cpe_name" : [ ]
  53480. }, {
  53481. "vulnerable" : false,
  53482. "cpe23Uri" : "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
  53483. "cpe_name" : [ ]
  53484. }, {
  53485. "vulnerable" : false,
  53486. "cpe23Uri" : "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
  53487. "cpe_name" : [ ]
  53488. }, {
  53489. "vulnerable" : false,
  53490. "cpe23Uri" : "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
  53491. "cpe_name" : [ ]
  53492. }, {
  53493. "vulnerable" : false,
  53494. "cpe23Uri" : "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
  53495. "cpe_name" : [ ]
  53496. } ]
  53497. } ],
  53498. "cpe_match" : [ ]
  53499. } ]
  53500. },
  53501. "impact" : {
  53502. "baseMetricV3" : {
  53503. "cvssV3" : {
  53504. "version" : "3.1",
  53505. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
  53506. "attackVector" : "NETWORK",
  53507. "attackComplexity" : "LOW",
  53508. "privilegesRequired" : "NONE",
  53509. "userInteraction" : "NONE",
  53510. "scope" : "UNCHANGED",
  53511. "confidentialityImpact" : "NONE",
  53512. "integrityImpact" : "NONE",
  53513. "availabilityImpact" : "LOW",
  53514. "baseScore" : 5.3,
  53515. "baseSeverity" : "MEDIUM"
  53516. },
  53517. "exploitabilityScore" : 3.9,
  53518. "impactScore" : 1.4
  53519. },
  53520. "baseMetricV2" : {
  53521. "cvssV2" : {
  53522. "version" : "2.0",
  53523. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  53524. "accessVector" : "NETWORK",
  53525. "accessComplexity" : "LOW",
  53526. "authentication" : "NONE",
  53527. "confidentialityImpact" : "NONE",
  53528. "integrityImpact" : "NONE",
  53529. "availabilityImpact" : "PARTIAL",
  53530. "baseScore" : 5.0
  53531. },
  53532. "severity" : "MEDIUM",
  53533. "exploitabilityScore" : 10.0,
  53534. "impactScore" : 2.9,
  53535. "acInsufInfo" : false,
  53536. "obtainAllPrivilege" : false,
  53537. "obtainUserPrivilege" : false,
  53538. "obtainOtherPrivilege" : false,
  53539. "userInteractionRequired" : false
  53540. }
  53541. },
  53542. "publishedDate" : "2021-04-22T20:15Z",
  53543. "lastModifiedDate" : "2021-05-04T20:26Z"
  53544. }, {
  53545. "cve" : {
  53546. "data_type" : "CVE",
  53547. "data_format" : "MITRE",
  53548. "data_version" : "4.0",
  53549. "CVE_data_meta" : {
  53550. "ID" : "CVE-2021-0272",
  53551. "ASSIGNER" : "sirt@juniper.net"
  53552. },
  53553. "problemtype" : {
  53554. "problemtype_data" : [ {
  53555. "description" : [ {
  53556. "lang" : "en",
  53557. "value" : "CWE-401"
  53558. } ]
  53559. } ]
  53560. },
  53561. "references" : {
  53562. "reference_data" : [ {
  53563. "url" : "https://kb.juniper.net/JSA11163",
  53564. "name" : "https://kb.juniper.net/JSA11163",
  53565. "refsource" : "MISC",
  53566. "tags" : [ "Vendor Advisory" ]
  53567. }, {
  53568. "url" : "https://kb.juniper.net/KB32854",
  53569. "name" : "https://kb.juniper.net/KB32854",
  53570. "refsource" : "MISC",
  53571. "tags" : [ "Vendor Advisory" ]
  53572. } ]
  53573. },
  53574. "description" : {
  53575. "description_data" : [ {
  53576. "lang" : "en",
  53577. "value" : "A kernel memory leak in QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016 devices Flexible PIC Concentrators (FPCs) on Juniper Networks Junos OS allows an attacker to send genuine packets destined to the device to cause a Denial of Service (DoS) to the device. On QFX10002-32Q, QFX10002-60C, QFX10002-72Q devices the device will crash and restart. On QFX10008, QFX10016 devices, depending on the number of FPCs involved in an attack, one more more FPCs may crash and traffic through the device may be degraded in other ways, until the attack traffic stops. A reboot is required to restore service and clear the kernel memory. Continued receipt and processing of these genuine packets will create a sustained Denial of Service (DoS) condition. On QFX10008, QFX10016 devices, an indicator of compromise may be the existence of DCPFE core files. You can also monitor PFE memory utilization for incremental growth: user@qfx-RE:0% cprod -A fpc0 -c \"show heap 0\" | grep -i ke 0 3788a1b0 3221225048 2417120656 804104392 24 Kernel user@qfx-RE:0% cprod -A fpc0 -c \"show heap 0\" | grep -i ke 0 3788a1b0 3221225048 2332332200 888892848 27 Kernel This issue affects: Juniper Networks Junos OS on QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016: 16.1 versions 16.1R1 and above prior to 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R3-S2; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R3; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R2. This issue does not affect releases prior to Junos OS 16.1R1. This issue does not affect EX Series devices. This issue does not affect Junos OS Evolved."
  53578. } ]
  53579. }
  53580. },
  53581. "configurations" : {
  53582. "CVE_data_version" : "4.0",
  53583. "nodes" : [ {
  53584. "operator" : "AND",
  53585. "children" : [ {
  53586. "operator" : "OR",
  53587. "children" : [ ],
  53588. "cpe_match" : [ {
  53589. "vulnerable" : true,
  53590. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
  53591. "cpe_name" : [ ]
  53592. }, {
  53593. "vulnerable" : true,
  53594. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
  53595. "cpe_name" : [ ]
  53596. }, {
  53597. "vulnerable" : true,
  53598. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
  53599. "cpe_name" : [ ]
  53600. }, {
  53601. "vulnerable" : true,
  53602. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:*",
  53603. "cpe_name" : [ ]
  53604. }, {
  53605. "vulnerable" : true,
  53606. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r3-s11:*:*:*:*:*:*",
  53607. "cpe_name" : [ ]
  53608. }, {
  53609. "vulnerable" : true,
  53610. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:*",
  53611. "cpe_name" : [ ]
  53612. }, {
  53613. "vulnerable" : true,
  53614. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
  53615. "cpe_name" : [ ]
  53616. }, {
  53617. "vulnerable" : true,
  53618. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s12:*:*:*:*:*:*",
  53619. "cpe_name" : [ ]
  53620. }, {
  53621. "vulnerable" : true,
  53622. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:*",
  53623. "cpe_name" : [ ]
  53624. }, {
  53625. "vulnerable" : true,
  53626. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:*",
  53627. "cpe_name" : [ ]
  53628. }, {
  53629. "vulnerable" : true,
  53630. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:*",
  53631. "cpe_name" : [ ]
  53632. }, {
  53633. "vulnerable" : true,
  53634. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:*",
  53635. "cpe_name" : [ ]
  53636. }, {
  53637. "vulnerable" : true,
  53638. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:*",
  53639. "cpe_name" : [ ]
  53640. }, {
  53641. "vulnerable" : true,
  53642. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*",
  53643. "cpe_name" : [ ]
  53644. }, {
  53645. "vulnerable" : true,
  53646. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*",
  53647. "cpe_name" : [ ]
  53648. }, {
  53649. "vulnerable" : true,
  53650. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*",
  53651. "cpe_name" : [ ]
  53652. }, {
  53653. "vulnerable" : true,
  53654. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*",
  53655. "cpe_name" : [ ]
  53656. }, {
  53657. "vulnerable" : true,
  53658. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*",
  53659. "cpe_name" : [ ]
  53660. }, {
  53661. "vulnerable" : true,
  53662. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*",
  53663. "cpe_name" : [ ]
  53664. }, {
  53665. "vulnerable" : true,
  53666. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:*",
  53667. "cpe_name" : [ ]
  53668. }, {
  53669. "vulnerable" : true,
  53670. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6-s6:*:*:*:*:*:*",
  53671. "cpe_name" : [ ]
  53672. }, {
  53673. "vulnerable" : true,
  53674. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*",
  53675. "cpe_name" : [ ]
  53676. }, {
  53677. "vulnerable" : true,
  53678. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s2:*:*:*:*:*:*",
  53679. "cpe_name" : [ ]
  53680. }, {
  53681. "vulnerable" : true,
  53682. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s3:*:*:*:*:*:*",
  53683. "cpe_name" : [ ]
  53684. }, {
  53685. "vulnerable" : true,
  53686. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s4:*:*:*:*:*:*",
  53687. "cpe_name" : [ ]
  53688. }, {
  53689. "vulnerable" : true,
  53690. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s5:*:*:*:*:*:*",
  53691. "cpe_name" : [ ]
  53692. }, {
  53693. "vulnerable" : true,
  53694. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s6:*:*:*:*:*:*",
  53695. "cpe_name" : [ ]
  53696. }, {
  53697. "vulnerable" : true,
  53698. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s7:*:*:*:*:*:*",
  53699. "cpe_name" : [ ]
  53700. }, {
  53701. "vulnerable" : true,
  53702. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s8:*:*:*:*:*:*",
  53703. "cpe_name" : [ ]
  53704. }, {
  53705. "vulnerable" : true,
  53706. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:-:*:*:*:*:*:*",
  53707. "cpe_name" : [ ]
  53708. }, {
  53709. "vulnerable" : true,
  53710. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
  53711. "cpe_name" : [ ]
  53712. }, {
  53713. "vulnerable" : true,
  53714. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:r1-s6:*:*:*:*:*:*",
  53715. "cpe_name" : [ ]
  53716. }, {
  53717. "vulnerable" : true,
  53718. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*",
  53719. "cpe_name" : [ ]
  53720. }, {
  53721. "vulnerable" : true,
  53722. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:r2-s1:*:*:*:*:*:*",
  53723. "cpe_name" : [ ]
  53724. }, {
  53725. "vulnerable" : true,
  53726. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:r2-s10:*:*:*:*:*:*",
  53727. "cpe_name" : [ ]
  53728. }, {
  53729. "vulnerable" : true,
  53730. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:r2-s2:*:*:*:*:*:*",
  53731. "cpe_name" : [ ]
  53732. }, {
  53733. "vulnerable" : true,
  53734. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:*",
  53735. "cpe_name" : [ ]
  53736. }, {
  53737. "vulnerable" : true,
  53738. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:r2-s6:*:*:*:*:*:*",
  53739. "cpe_name" : [ ]
  53740. }, {
  53741. "vulnerable" : true,
  53742. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:r2-s7:*:*:*:*:*:*",
  53743. "cpe_name" : [ ]
  53744. }, {
  53745. "vulnerable" : true,
  53746. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:r2-s8:*:*:*:*:*:*",
  53747. "cpe_name" : [ ]
  53748. }, {
  53749. "vulnerable" : true,
  53750. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:r2-s9:*:*:*:*:*:*",
  53751. "cpe_name" : [ ]
  53752. }, {
  53753. "vulnerable" : true,
  53754. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.2:r3:*:*:*:*:*:*",
  53755. "cpe_name" : [ ]
  53756. }, {
  53757. "vulnerable" : true,
  53758. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:-:*:*:*:*:*:*",
  53759. "cpe_name" : [ ]
  53760. }, {
  53761. "vulnerable" : true,
  53762. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
  53763. "cpe_name" : [ ]
  53764. }, {
  53765. "vulnerable" : true,
  53766. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:*",
  53767. "cpe_name" : [ ]
  53768. }, {
  53769. "vulnerable" : true,
  53770. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2:*:*:*:*:*:*",
  53771. "cpe_name" : [ ]
  53772. }, {
  53773. "vulnerable" : true,
  53774. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s1:*:*:*:*:*:*",
  53775. "cpe_name" : [ ]
  53776. }, {
  53777. "vulnerable" : true,
  53778. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s10:*:*:*:*:*:*",
  53779. "cpe_name" : [ ]
  53780. }, {
  53781. "vulnerable" : true,
  53782. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s11:*:*:*:*:*:*",
  53783. "cpe_name" : [ ]
  53784. }, {
  53785. "vulnerable" : true,
  53786. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s2:*:*:*:*:*:*",
  53787. "cpe_name" : [ ]
  53788. }, {
  53789. "vulnerable" : true,
  53790. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s3:*:*:*:*:*:*",
  53791. "cpe_name" : [ ]
  53792. }, {
  53793. "vulnerable" : true,
  53794. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s4:*:*:*:*:*:*",
  53795. "cpe_name" : [ ]
  53796. }, {
  53797. "vulnerable" : true,
  53798. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s5:*:*:*:*:*:*",
  53799. "cpe_name" : [ ]
  53800. }, {
  53801. "vulnerable" : true,
  53802. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s6:*:*:*:*:*:*",
  53803. "cpe_name" : [ ]
  53804. }, {
  53805. "vulnerable" : true,
  53806. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*",
  53807. "cpe_name" : [ ]
  53808. }, {
  53809. "vulnerable" : true,
  53810. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:*",
  53811. "cpe_name" : [ ]
  53812. }, {
  53813. "vulnerable" : true,
  53814. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r2-s9:*:*:*:*:*:*",
  53815. "cpe_name" : [ ]
  53816. }, {
  53817. "vulnerable" : true,
  53818. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r3:*:*:*:*:*:*",
  53819. "cpe_name" : [ ]
  53820. }, {
  53821. "vulnerable" : true,
  53822. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r3-s1:*:*:*:*:*:*",
  53823. "cpe_name" : [ ]
  53824. }, {
  53825. "vulnerable" : true,
  53826. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.1:r3-s2:*:*:*:*:*:*",
  53827. "cpe_name" : [ ]
  53828. }, {
  53829. "vulnerable" : true,
  53830. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:-:*:*:*:*:*:*",
  53831. "cpe_name" : [ ]
  53832. }, {
  53833. "vulnerable" : true,
  53834. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*",
  53835. "cpe_name" : [ ]
  53836. }, {
  53837. "vulnerable" : true,
  53838. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s1:*:*:*:*:*:*",
  53839. "cpe_name" : [ ]
  53840. }, {
  53841. "vulnerable" : true,
  53842. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s2:*:*:*:*:*:*",
  53843. "cpe_name" : [ ]
  53844. }, {
  53845. "vulnerable" : true,
  53846. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s3:*:*:*:*:*:*",
  53847. "cpe_name" : [ ]
  53848. }, {
  53849. "vulnerable" : true,
  53850. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s4:*:*:*:*:*:*",
  53851. "cpe_name" : [ ]
  53852. }, {
  53853. "vulnerable" : true,
  53854. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s5:*:*:*:*:*:*",
  53855. "cpe_name" : [ ]
  53856. }, {
  53857. "vulnerable" : true,
  53858. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s6:*:*:*:*:*:*",
  53859. "cpe_name" : [ ]
  53860. }, {
  53861. "vulnerable" : true,
  53862. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s7:*:*:*:*:*:*",
  53863. "cpe_name" : [ ]
  53864. }, {
  53865. "vulnerable" : true,
  53866. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r1-s8:*:*:*:*:*:*",
  53867. "cpe_name" : [ ]
  53868. }, {
  53869. "vulnerable" : true,
  53870. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*",
  53871. "cpe_name" : [ ]
  53872. }, {
  53873. "vulnerable" : true,
  53874. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r2-s11:*:*:*:*:*:*",
  53875. "cpe_name" : [ ]
  53876. }, {
  53877. "vulnerable" : true,
  53878. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:*",
  53879. "cpe_name" : [ ]
  53880. }, {
  53881. "vulnerable" : true,
  53882. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r2-s6:*:*:*:*:*:*",
  53883. "cpe_name" : [ ]
  53884. }, {
  53885. "vulnerable" : true,
  53886. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r2-s7:*:*:*:*:*:*",
  53887. "cpe_name" : [ ]
  53888. }, {
  53889. "vulnerable" : true,
  53890. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r3:*:*:*:*:*:*",
  53891. "cpe_name" : [ ]
  53892. }, {
  53893. "vulnerable" : true,
  53894. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r3-s1:*:*:*:*:*:*",
  53895. "cpe_name" : [ ]
  53896. }, {
  53897. "vulnerable" : true,
  53898. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r3-s2:*:*:*:*:*:*",
  53899. "cpe_name" : [ ]
  53900. }, {
  53901. "vulnerable" : true,
  53902. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r3-s3:*:*:*:*:*:*",
  53903. "cpe_name" : [ ]
  53904. }, {
  53905. "vulnerable" : true,
  53906. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.2:r3-s4:*:*:*:*:*:*",
  53907. "cpe_name" : [ ]
  53908. }, {
  53909. "vulnerable" : true,
  53910. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
  53911. "cpe_name" : [ ]
  53912. }, {
  53913. "vulnerable" : true,
  53914. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
  53915. "cpe_name" : [ ]
  53916. }, {
  53917. "vulnerable" : true,
  53918. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
  53919. "cpe_name" : [ ]
  53920. }, {
  53921. "vulnerable" : true,
  53922. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
  53923. "cpe_name" : [ ]
  53924. }, {
  53925. "vulnerable" : true,
  53926. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
  53927. "cpe_name" : [ ]
  53928. }, {
  53929. "vulnerable" : true,
  53930. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
  53931. "cpe_name" : [ ]
  53932. }, {
  53933. "vulnerable" : true,
  53934. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
  53935. "cpe_name" : [ ]
  53936. }, {
  53937. "vulnerable" : true,
  53938. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
  53939. "cpe_name" : [ ]
  53940. }, {
  53941. "vulnerable" : true,
  53942. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
  53943. "cpe_name" : [ ]
  53944. }, {
  53945. "vulnerable" : true,
  53946. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
  53947. "cpe_name" : [ ]
  53948. }, {
  53949. "vulnerable" : true,
  53950. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
  53951. "cpe_name" : [ ]
  53952. }, {
  53953. "vulnerable" : true,
  53954. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
  53955. "cpe_name" : [ ]
  53956. }, {
  53957. "vulnerable" : true,
  53958. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
  53959. "cpe_name" : [ ]
  53960. }, {
  53961. "vulnerable" : true,
  53962. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*",
  53963. "cpe_name" : [ ]
  53964. }, {
  53965. "vulnerable" : true,
  53966. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
  53967. "cpe_name" : [ ]
  53968. }, {
  53969. "vulnerable" : true,
  53970. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
  53971. "cpe_name" : [ ]
  53972. }, {
  53973. "vulnerable" : true,
  53974. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
  53975. "cpe_name" : [ ]
  53976. }, {
  53977. "vulnerable" : true,
  53978. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
  53979. "cpe_name" : [ ]
  53980. }, {
  53981. "vulnerable" : true,
  53982. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
  53983. "cpe_name" : [ ]
  53984. }, {
  53985. "vulnerable" : true,
  53986. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
  53987. "cpe_name" : [ ]
  53988. }, {
  53989. "vulnerable" : true,
  53990. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
  53991. "cpe_name" : [ ]
  53992. }, {
  53993. "vulnerable" : true,
  53994. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
  53995. "cpe_name" : [ ]
  53996. }, {
  53997. "vulnerable" : true,
  53998. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
  53999. "cpe_name" : [ ]
  54000. }, {
  54001. "vulnerable" : true,
  54002. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
  54003. "cpe_name" : [ ]
  54004. }, {
  54005. "vulnerable" : true,
  54006. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
  54007. "cpe_name" : [ ]
  54008. }, {
  54009. "vulnerable" : true,
  54010. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
  54011. "cpe_name" : [ ]
  54012. }, {
  54013. "vulnerable" : true,
  54014. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
  54015. "cpe_name" : [ ]
  54016. }, {
  54017. "vulnerable" : true,
  54018. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
  54019. "cpe_name" : [ ]
  54020. }, {
  54021. "vulnerable" : true,
  54022. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
  54023. "cpe_name" : [ ]
  54024. }, {
  54025. "vulnerable" : true,
  54026. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
  54027. "cpe_name" : [ ]
  54028. }, {
  54029. "vulnerable" : true,
  54030. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
  54031. "cpe_name" : [ ]
  54032. }, {
  54033. "vulnerable" : true,
  54034. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
  54035. "cpe_name" : [ ]
  54036. }, {
  54037. "vulnerable" : true,
  54038. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
  54039. "cpe_name" : [ ]
  54040. }, {
  54041. "vulnerable" : true,
  54042. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
  54043. "cpe_name" : [ ]
  54044. }, {
  54045. "vulnerable" : true,
  54046. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
  54047. "cpe_name" : [ ]
  54048. }, {
  54049. "vulnerable" : true,
  54050. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
  54051. "cpe_name" : [ ]
  54052. }, {
  54053. "vulnerable" : true,
  54054. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
  54055. "cpe_name" : [ ]
  54056. }, {
  54057. "vulnerable" : true,
  54058. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
  54059. "cpe_name" : [ ]
  54060. }, {
  54061. "vulnerable" : true,
  54062. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
  54063. "cpe_name" : [ ]
  54064. }, {
  54065. "vulnerable" : true,
  54066. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
  54067. "cpe_name" : [ ]
  54068. }, {
  54069. "vulnerable" : true,
  54070. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
  54071. "cpe_name" : [ ]
  54072. }, {
  54073. "vulnerable" : true,
  54074. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
  54075. "cpe_name" : [ ]
  54076. }, {
  54077. "vulnerable" : true,
  54078. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
  54079. "cpe_name" : [ ]
  54080. }, {
  54081. "vulnerable" : true,
  54082. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
  54083. "cpe_name" : [ ]
  54084. }, {
  54085. "vulnerable" : true,
  54086. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
  54087. "cpe_name" : [ ]
  54088. }, {
  54089. "vulnerable" : true,
  54090. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
  54091. "cpe_name" : [ ]
  54092. }, {
  54093. "vulnerable" : true,
  54094. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
  54095. "cpe_name" : [ ]
  54096. }, {
  54097. "vulnerable" : true,
  54098. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
  54099. "cpe_name" : [ ]
  54100. }, {
  54101. "vulnerable" : true,
  54102. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
  54103. "cpe_name" : [ ]
  54104. }, {
  54105. "vulnerable" : true,
  54106. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
  54107. "cpe_name" : [ ]
  54108. }, {
  54109. "vulnerable" : true,
  54110. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
  54111. "cpe_name" : [ ]
  54112. }, {
  54113. "vulnerable" : true,
  54114. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
  54115. "cpe_name" : [ ]
  54116. }, {
  54117. "vulnerable" : true,
  54118. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s10:*:*:*:*:*:*",
  54119. "cpe_name" : [ ]
  54120. }, {
  54121. "vulnerable" : true,
  54122. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
  54123. "cpe_name" : [ ]
  54124. }, {
  54125. "vulnerable" : true,
  54126. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
  54127. "cpe_name" : [ ]
  54128. }, {
  54129. "vulnerable" : true,
  54130. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
  54131. "cpe_name" : [ ]
  54132. }, {
  54133. "vulnerable" : true,
  54134. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
  54135. "cpe_name" : [ ]
  54136. }, {
  54137. "vulnerable" : true,
  54138. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
  54139. "cpe_name" : [ ]
  54140. }, {
  54141. "vulnerable" : true,
  54142. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
  54143. "cpe_name" : [ ]
  54144. }, {
  54145. "vulnerable" : true,
  54146. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
  54147. "cpe_name" : [ ]
  54148. }, {
  54149. "vulnerable" : true,
  54150. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
  54151. "cpe_name" : [ ]
  54152. }, {
  54153. "vulnerable" : true,
  54154. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
  54155. "cpe_name" : [ ]
  54156. }, {
  54157. "vulnerable" : true,
  54158. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
  54159. "cpe_name" : [ ]
  54160. }, {
  54161. "vulnerable" : true,
  54162. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
  54163. "cpe_name" : [ ]
  54164. }, {
  54165. "vulnerable" : true,
  54166. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
  54167. "cpe_name" : [ ]
  54168. }, {
  54169. "vulnerable" : true,
  54170. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
  54171. "cpe_name" : [ ]
  54172. }, {
  54173. "vulnerable" : true,
  54174. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
  54175. "cpe_name" : [ ]
  54176. }, {
  54177. "vulnerable" : true,
  54178. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
  54179. "cpe_name" : [ ]
  54180. }, {
  54181. "vulnerable" : true,
  54182. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
  54183. "cpe_name" : [ ]
  54184. }, {
  54185. "vulnerable" : true,
  54186. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
  54187. "cpe_name" : [ ]
  54188. }, {
  54189. "vulnerable" : true,
  54190. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
  54191. "cpe_name" : [ ]
  54192. }, {
  54193. "vulnerable" : true,
  54194. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
  54195. "cpe_name" : [ ]
  54196. }, {
  54197. "vulnerable" : true,
  54198. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
  54199. "cpe_name" : [ ]
  54200. }, {
  54201. "vulnerable" : true,
  54202. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
  54203. "cpe_name" : [ ]
  54204. }, {
  54205. "vulnerable" : true,
  54206. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
  54207. "cpe_name" : [ ]
  54208. }, {
  54209. "vulnerable" : true,
  54210. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
  54211. "cpe_name" : [ ]
  54212. }, {
  54213. "vulnerable" : true,
  54214. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
  54215. "cpe_name" : [ ]
  54216. }, {
  54217. "vulnerable" : true,
  54218. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
  54219. "cpe_name" : [ ]
  54220. }, {
  54221. "vulnerable" : true,
  54222. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
  54223. "cpe_name" : [ ]
  54224. }, {
  54225. "vulnerable" : true,
  54226. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
  54227. "cpe_name" : [ ]
  54228. }, {
  54229. "vulnerable" : true,
  54230. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
  54231. "cpe_name" : [ ]
  54232. }, {
  54233. "vulnerable" : true,
  54234. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
  54235. "cpe_name" : [ ]
  54236. }, {
  54237. "vulnerable" : true,
  54238. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
  54239. "cpe_name" : [ ]
  54240. }, {
  54241. "vulnerable" : true,
  54242. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
  54243. "cpe_name" : [ ]
  54244. }, {
  54245. "vulnerable" : true,
  54246. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
  54247. "cpe_name" : [ ]
  54248. }, {
  54249. "vulnerable" : true,
  54250. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
  54251. "cpe_name" : [ ]
  54252. }, {
  54253. "vulnerable" : true,
  54254. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
  54255. "cpe_name" : [ ]
  54256. }, {
  54257. "vulnerable" : true,
  54258. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
  54259. "cpe_name" : [ ]
  54260. }, {
  54261. "vulnerable" : true,
  54262. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
  54263. "cpe_name" : [ ]
  54264. }, {
  54265. "vulnerable" : true,
  54266. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
  54267. "cpe_name" : [ ]
  54268. }, {
  54269. "vulnerable" : true,
  54270. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
  54271. "cpe_name" : [ ]
  54272. }, {
  54273. "vulnerable" : true,
  54274. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
  54275. "cpe_name" : [ ]
  54276. }, {
  54277. "vulnerable" : true,
  54278. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
  54279. "cpe_name" : [ ]
  54280. }, {
  54281. "vulnerable" : true,
  54282. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
  54283. "cpe_name" : [ ]
  54284. }, {
  54285. "vulnerable" : true,
  54286. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
  54287. "cpe_name" : [ ]
  54288. }, {
  54289. "vulnerable" : true,
  54290. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
  54291. "cpe_name" : [ ]
  54292. }, {
  54293. "vulnerable" : true,
  54294. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
  54295. "cpe_name" : [ ]
  54296. }, {
  54297. "vulnerable" : true,
  54298. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
  54299. "cpe_name" : [ ]
  54300. }, {
  54301. "vulnerable" : true,
  54302. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
  54303. "cpe_name" : [ ]
  54304. }, {
  54305. "vulnerable" : true,
  54306. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
  54307. "cpe_name" : [ ]
  54308. }, {
  54309. "vulnerable" : true,
  54310. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
  54311. "cpe_name" : [ ]
  54312. }, {
  54313. "vulnerable" : true,
  54314. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
  54315. "cpe_name" : [ ]
  54316. }, {
  54317. "vulnerable" : true,
  54318. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
  54319. "cpe_name" : [ ]
  54320. }, {
  54321. "vulnerable" : true,
  54322. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
  54323. "cpe_name" : [ ]
  54324. }, {
  54325. "vulnerable" : true,
  54326. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
  54327. "cpe_name" : [ ]
  54328. }, {
  54329. "vulnerable" : true,
  54330. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
  54331. "cpe_name" : [ ]
  54332. }, {
  54333. "vulnerable" : true,
  54334. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
  54335. "cpe_name" : [ ]
  54336. }, {
  54337. "vulnerable" : true,
  54338. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
  54339. "cpe_name" : [ ]
  54340. }, {
  54341. "vulnerable" : true,
  54342. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
  54343. "cpe_name" : [ ]
  54344. }, {
  54345. "vulnerable" : true,
  54346. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
  54347. "cpe_name" : [ ]
  54348. }, {
  54349. "vulnerable" : true,
  54350. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
  54351. "cpe_name" : [ ]
  54352. }, {
  54353. "vulnerable" : true,
  54354. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
  54355. "cpe_name" : [ ]
  54356. }, {
  54357. "vulnerable" : true,
  54358. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
  54359. "cpe_name" : [ ]
  54360. }, {
  54361. "vulnerable" : true,
  54362. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
  54363. "cpe_name" : [ ]
  54364. }, {
  54365. "vulnerable" : true,
  54366. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
  54367. "cpe_name" : [ ]
  54368. }, {
  54369. "vulnerable" : true,
  54370. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
  54371. "cpe_name" : [ ]
  54372. }, {
  54373. "vulnerable" : true,
  54374. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
  54375. "cpe_name" : [ ]
  54376. }, {
  54377. "vulnerable" : true,
  54378. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
  54379. "cpe_name" : [ ]
  54380. }, {
  54381. "vulnerable" : true,
  54382. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
  54383. "cpe_name" : [ ]
  54384. }, {
  54385. "vulnerable" : true,
  54386. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
  54387. "cpe_name" : [ ]
  54388. }, {
  54389. "vulnerable" : true,
  54390. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
  54391. "cpe_name" : [ ]
  54392. }, {
  54393. "vulnerable" : true,
  54394. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
  54395. "cpe_name" : [ ]
  54396. }, {
  54397. "vulnerable" : true,
  54398. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
  54399. "cpe_name" : [ ]
  54400. }, {
  54401. "vulnerable" : true,
  54402. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
  54403. "cpe_name" : [ ]
  54404. }, {
  54405. "vulnerable" : true,
  54406. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
  54407. "cpe_name" : [ ]
  54408. }, {
  54409. "vulnerable" : true,
  54410. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
  54411. "cpe_name" : [ ]
  54412. }, {
  54413. "vulnerable" : true,
  54414. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
  54415. "cpe_name" : [ ]
  54416. }, {
  54417. "vulnerable" : true,
  54418. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
  54419. "cpe_name" : [ ]
  54420. }, {
  54421. "vulnerable" : true,
  54422. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
  54423. "cpe_name" : [ ]
  54424. }, {
  54425. "vulnerable" : true,
  54426. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
  54427. "cpe_name" : [ ]
  54428. }, {
  54429. "vulnerable" : true,
  54430. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
  54431. "cpe_name" : [ ]
  54432. }, {
  54433. "vulnerable" : true,
  54434. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
  54435. "cpe_name" : [ ]
  54436. }, {
  54437. "vulnerable" : true,
  54438. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
  54439. "cpe_name" : [ ]
  54440. }, {
  54441. "vulnerable" : true,
  54442. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
  54443. "cpe_name" : [ ]
  54444. }, {
  54445. "vulnerable" : true,
  54446. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
  54447. "cpe_name" : [ ]
  54448. }, {
  54449. "vulnerable" : true,
  54450. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
  54451. "cpe_name" : [ ]
  54452. }, {
  54453. "vulnerable" : true,
  54454. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
  54455. "cpe_name" : [ ]
  54456. }, {
  54457. "vulnerable" : true,
  54458. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
  54459. "cpe_name" : [ ]
  54460. }, {
  54461. "vulnerable" : true,
  54462. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
  54463. "cpe_name" : [ ]
  54464. }, {
  54465. "vulnerable" : true,
  54466. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
  54467. "cpe_name" : [ ]
  54468. }, {
  54469. "vulnerable" : true,
  54470. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
  54471. "cpe_name" : [ ]
  54472. }, {
  54473. "vulnerable" : true,
  54474. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
  54475. "cpe_name" : [ ]
  54476. }, {
  54477. "vulnerable" : true,
  54478. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
  54479. "cpe_name" : [ ]
  54480. }, {
  54481. "vulnerable" : true,
  54482. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
  54483. "cpe_name" : [ ]
  54484. }, {
  54485. "vulnerable" : true,
  54486. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
  54487. "cpe_name" : [ ]
  54488. }, {
  54489. "vulnerable" : true,
  54490. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
  54491. "cpe_name" : [ ]
  54492. }, {
  54493. "vulnerable" : true,
  54494. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
  54495. "cpe_name" : [ ]
  54496. }, {
  54497. "vulnerable" : true,
  54498. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
  54499. "cpe_name" : [ ]
  54500. }, {
  54501. "vulnerable" : true,
  54502. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
  54503. "cpe_name" : [ ]
  54504. }, {
  54505. "vulnerable" : true,
  54506. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
  54507. "cpe_name" : [ ]
  54508. }, {
  54509. "vulnerable" : true,
  54510. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
  54511. "cpe_name" : [ ]
  54512. }, {
  54513. "vulnerable" : true,
  54514. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
  54515. "cpe_name" : [ ]
  54516. }, {
  54517. "vulnerable" : true,
  54518. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
  54519. "cpe_name" : [ ]
  54520. }, {
  54521. "vulnerable" : true,
  54522. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
  54523. "cpe_name" : [ ]
  54524. }, {
  54525. "vulnerable" : true,
  54526. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
  54527. "cpe_name" : [ ]
  54528. } ]
  54529. }, {
  54530. "operator" : "OR",
  54531. "children" : [ ],
  54532. "cpe_match" : [ {
  54533. "vulnerable" : false,
  54534. "cpe23Uri" : "cpe:2.3:h:juniper:qfx10002-32q:-:*:*:*:*:*:*:*",
  54535. "cpe_name" : [ ]
  54536. }, {
  54537. "vulnerable" : false,
  54538. "cpe23Uri" : "cpe:2.3:h:juniper:qfx10002-60c:-:*:*:*:*:*:*:*",
  54539. "cpe_name" : [ ]
  54540. }, {
  54541. "vulnerable" : false,
  54542. "cpe23Uri" : "cpe:2.3:h:juniper:qfx10002-72q:-:*:*:*:*:*:*:*",
  54543. "cpe_name" : [ ]
  54544. }, {
  54545. "vulnerable" : false,
  54546. "cpe23Uri" : "cpe:2.3:h:juniper:qfx10008:-:*:*:*:*:*:*:*",
  54547. "cpe_name" : [ ]
  54548. }, {
  54549. "vulnerable" : false,
  54550. "cpe23Uri" : "cpe:2.3:h:juniper:qfx10016:-:*:*:*:*:*:*:*",
  54551. "cpe_name" : [ ]
  54552. } ]
  54553. } ],
  54554. "cpe_match" : [ ]
  54555. } ]
  54556. },
  54557. "impact" : {
  54558. "baseMetricV3" : {
  54559. "cvssV3" : {
  54560. "version" : "3.1",
  54561. "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  54562. "attackVector" : "ADJACENT_NETWORK",
  54563. "attackComplexity" : "LOW",
  54564. "privilegesRequired" : "NONE",
  54565. "userInteraction" : "NONE",
  54566. "scope" : "UNCHANGED",
  54567. "confidentialityImpact" : "NONE",
  54568. "integrityImpact" : "NONE",
  54569. "availabilityImpact" : "HIGH",
  54570. "baseScore" : 6.5,
  54571. "baseSeverity" : "MEDIUM"
  54572. },
  54573. "exploitabilityScore" : 2.8,
  54574. "impactScore" : 3.6
  54575. },
  54576. "baseMetricV2" : {
  54577. "cvssV2" : {
  54578. "version" : "2.0",
  54579. "vectorString" : "AV:A/AC:L/Au:N/C:N/I:N/A:C",
  54580. "accessVector" : "ADJACENT_NETWORK",
  54581. "accessComplexity" : "LOW",
  54582. "authentication" : "NONE",
  54583. "confidentialityImpact" : "NONE",
  54584. "integrityImpact" : "NONE",
  54585. "availabilityImpact" : "COMPLETE",
  54586. "baseScore" : 6.1
  54587. },
  54588. "severity" : "MEDIUM",
  54589. "exploitabilityScore" : 6.5,
  54590. "impactScore" : 6.9,
  54591. "acInsufInfo" : false,
  54592. "obtainAllPrivilege" : false,
  54593. "obtainUserPrivilege" : false,
  54594. "obtainOtherPrivilege" : false,
  54595. "userInteractionRequired" : false
  54596. }
  54597. },
  54598. "publishedDate" : "2021-04-22T20:15Z",
  54599. "lastModifiedDate" : "2021-05-04T20:28Z"
  54600. }, {
  54601. "cve" : {
  54602. "data_type" : "CVE",
  54603. "data_format" : "MITRE",
  54604. "data_version" : "4.0",
  54605. "CVE_data_meta" : {
  54606. "ID" : "CVE-2021-0269",
  54607. "ASSIGNER" : "sirt@juniper.net"
  54608. },
  54609. "problemtype" : {
  54610. "problemtype_data" : [ {
  54611. "description" : [ {
  54612. "lang" : "en",
  54613. "value" : "NVD-CWE-Other"
  54614. } ]
  54615. } ]
  54616. },
  54617. "references" : {
  54618. "reference_data" : [ {
  54619. "url" : "https://kb.juniper.net/JSA11160",
  54620. "name" : "https://kb.juniper.net/JSA11160",
  54621. "refsource" : "MISC",
  54622. "tags" : [ "Vendor Advisory" ]
  54623. } ]
  54624. },
  54625. "description" : {
  54626. "description_data" : [ {
  54627. "lang" : "en",
  54628. "value" : "The improper handling of client-side parameters in J-Web of Juniper Networks Junos OS allows an attacker to perform a number of different malicious actions against a target device when a user is authenticated to J-Web. An attacker may be able to supersede existing parameters, including hardcoded parameters within the HTTP/S session, access and exploit variables, bypass web application firewall rules or input validation mechanisms, and otherwise alter and modify J-Web's normal behavior. An attacker may be able to transition victims to malicious web services, or exfiltrate sensitive information from otherwise secure web forms. This issue affects: Juniper Networks Junos OS: All versions prior to 17.4R3-S3; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2."
  54629. } ]
  54630. }
  54631. },
  54632. "configurations" : {
  54633. "CVE_data_version" : "4.0",
  54634. "nodes" : [ {
  54635. "operator" : "OR",
  54636. "children" : [ ],
  54637. "cpe_match" : [ {
  54638. "vulnerable" : true,
  54639. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
  54640. "cpe_name" : [ ]
  54641. }, {
  54642. "vulnerable" : true,
  54643. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
  54644. "cpe_name" : [ ]
  54645. }, {
  54646. "vulnerable" : true,
  54647. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
  54648. "cpe_name" : [ ]
  54649. }, {
  54650. "vulnerable" : true,
  54651. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
  54652. "cpe_name" : [ ]
  54653. }, {
  54654. "vulnerable" : true,
  54655. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
  54656. "cpe_name" : [ ]
  54657. }, {
  54658. "vulnerable" : true,
  54659. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
  54660. "cpe_name" : [ ]
  54661. }, {
  54662. "vulnerable" : true,
  54663. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
  54664. "cpe_name" : [ ]
  54665. }, {
  54666. "vulnerable" : true,
  54667. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
  54668. "cpe_name" : [ ]
  54669. }, {
  54670. "vulnerable" : true,
  54671. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
  54672. "cpe_name" : [ ]
  54673. }, {
  54674. "vulnerable" : true,
  54675. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
  54676. "cpe_name" : [ ]
  54677. }, {
  54678. "vulnerable" : true,
  54679. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
  54680. "cpe_name" : [ ]
  54681. }, {
  54682. "vulnerable" : true,
  54683. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
  54684. "cpe_name" : [ ]
  54685. }, {
  54686. "vulnerable" : true,
  54687. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
  54688. "cpe_name" : [ ]
  54689. }, {
  54690. "vulnerable" : true,
  54691. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
  54692. "cpe_name" : [ ]
  54693. }, {
  54694. "vulnerable" : true,
  54695. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
  54696. "cpe_name" : [ ]
  54697. }, {
  54698. "vulnerable" : true,
  54699. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
  54700. "cpe_name" : [ ]
  54701. }, {
  54702. "vulnerable" : true,
  54703. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
  54704. "cpe_name" : [ ]
  54705. }, {
  54706. "vulnerable" : true,
  54707. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
  54708. "cpe_name" : [ ]
  54709. }, {
  54710. "vulnerable" : true,
  54711. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
  54712. "cpe_name" : [ ]
  54713. }, {
  54714. "vulnerable" : true,
  54715. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
  54716. "cpe_name" : [ ]
  54717. }, {
  54718. "vulnerable" : true,
  54719. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
  54720. "cpe_name" : [ ]
  54721. }, {
  54722. "vulnerable" : true,
  54723. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
  54724. "cpe_name" : [ ]
  54725. }, {
  54726. "vulnerable" : true,
  54727. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
  54728. "cpe_name" : [ ]
  54729. }, {
  54730. "vulnerable" : true,
  54731. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
  54732. "cpe_name" : [ ]
  54733. }, {
  54734. "vulnerable" : true,
  54735. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
  54736. "cpe_name" : [ ]
  54737. }, {
  54738. "vulnerable" : true,
  54739. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
  54740. "cpe_name" : [ ]
  54741. }, {
  54742. "vulnerable" : true,
  54743. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
  54744. "cpe_name" : [ ]
  54745. }, {
  54746. "vulnerable" : true,
  54747. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
  54748. "cpe_name" : [ ]
  54749. }, {
  54750. "vulnerable" : true,
  54751. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
  54752. "cpe_name" : [ ]
  54753. }, {
  54754. "vulnerable" : true,
  54755. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
  54756. "cpe_name" : [ ]
  54757. }, {
  54758. "vulnerable" : true,
  54759. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
  54760. "cpe_name" : [ ]
  54761. }, {
  54762. "vulnerable" : true,
  54763. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
  54764. "cpe_name" : [ ]
  54765. }, {
  54766. "vulnerable" : true,
  54767. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s10:*:*:*:*:*:*",
  54768. "cpe_name" : [ ]
  54769. }, {
  54770. "vulnerable" : true,
  54771. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s11:*:*:*:*:*:*",
  54772. "cpe_name" : [ ]
  54773. }, {
  54774. "vulnerable" : true,
  54775. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
  54776. "cpe_name" : [ ]
  54777. }, {
  54778. "vulnerable" : true,
  54779. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
  54780. "cpe_name" : [ ]
  54781. }, {
  54782. "vulnerable" : true,
  54783. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
  54784. "cpe_name" : [ ]
  54785. }, {
  54786. "vulnerable" : true,
  54787. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
  54788. "cpe_name" : [ ]
  54789. }, {
  54790. "vulnerable" : true,
  54791. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
  54792. "cpe_name" : [ ]
  54793. }, {
  54794. "vulnerable" : true,
  54795. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
  54796. "cpe_name" : [ ]
  54797. }, {
  54798. "vulnerable" : true,
  54799. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
  54800. "cpe_name" : [ ]
  54801. }, {
  54802. "vulnerable" : true,
  54803. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
  54804. "cpe_name" : [ ]
  54805. }, {
  54806. "vulnerable" : true,
  54807. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
  54808. "cpe_name" : [ ]
  54809. }, {
  54810. "vulnerable" : true,
  54811. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
  54812. "cpe_name" : [ ]
  54813. }, {
  54814. "vulnerable" : true,
  54815. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
  54816. "cpe_name" : [ ]
  54817. }, {
  54818. "vulnerable" : true,
  54819. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
  54820. "cpe_name" : [ ]
  54821. }, {
  54822. "vulnerable" : true,
  54823. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
  54824. "cpe_name" : [ ]
  54825. }, {
  54826. "vulnerable" : true,
  54827. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
  54828. "cpe_name" : [ ]
  54829. }, {
  54830. "vulnerable" : true,
  54831. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
  54832. "cpe_name" : [ ]
  54833. }, {
  54834. "vulnerable" : true,
  54835. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
  54836. "cpe_name" : [ ]
  54837. }, {
  54838. "vulnerable" : true,
  54839. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
  54840. "cpe_name" : [ ]
  54841. }, {
  54842. "vulnerable" : true,
  54843. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
  54844. "cpe_name" : [ ]
  54845. }, {
  54846. "vulnerable" : true,
  54847. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
  54848. "cpe_name" : [ ]
  54849. }, {
  54850. "vulnerable" : true,
  54851. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
  54852. "cpe_name" : [ ]
  54853. }, {
  54854. "vulnerable" : true,
  54855. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
  54856. "cpe_name" : [ ]
  54857. }, {
  54858. "vulnerable" : true,
  54859. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
  54860. "cpe_name" : [ ]
  54861. }, {
  54862. "vulnerable" : true,
  54863. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
  54864. "cpe_name" : [ ]
  54865. }, {
  54866. "vulnerable" : true,
  54867. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
  54868. "cpe_name" : [ ]
  54869. }, {
  54870. "vulnerable" : true,
  54871. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
  54872. "cpe_name" : [ ]
  54873. }, {
  54874. "vulnerable" : true,
  54875. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
  54876. "cpe_name" : [ ]
  54877. }, {
  54878. "vulnerable" : true,
  54879. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
  54880. "cpe_name" : [ ]
  54881. }, {
  54882. "vulnerable" : true,
  54883. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
  54884. "cpe_name" : [ ]
  54885. }, {
  54886. "vulnerable" : true,
  54887. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
  54888. "cpe_name" : [ ]
  54889. }, {
  54890. "vulnerable" : true,
  54891. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
  54892. "cpe_name" : [ ]
  54893. }, {
  54894. "vulnerable" : true,
  54895. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
  54896. "cpe_name" : [ ]
  54897. }, {
  54898. "vulnerable" : true,
  54899. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
  54900. "cpe_name" : [ ]
  54901. }, {
  54902. "vulnerable" : true,
  54903. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
  54904. "cpe_name" : [ ]
  54905. }, {
  54906. "vulnerable" : true,
  54907. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
  54908. "cpe_name" : [ ]
  54909. }, {
  54910. "vulnerable" : true,
  54911. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
  54912. "cpe_name" : [ ]
  54913. }, {
  54914. "vulnerable" : true,
  54915. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
  54916. "cpe_name" : [ ]
  54917. }, {
  54918. "vulnerable" : true,
  54919. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
  54920. "cpe_name" : [ ]
  54921. }, {
  54922. "vulnerable" : true,
  54923. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
  54924. "cpe_name" : [ ]
  54925. }, {
  54926. "vulnerable" : true,
  54927. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
  54928. "cpe_name" : [ ]
  54929. }, {
  54930. "vulnerable" : true,
  54931. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
  54932. "cpe_name" : [ ]
  54933. }, {
  54934. "vulnerable" : true,
  54935. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
  54936. "cpe_name" : [ ]
  54937. }, {
  54938. "vulnerable" : true,
  54939. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
  54940. "cpe_name" : [ ]
  54941. }, {
  54942. "vulnerable" : true,
  54943. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
  54944. "cpe_name" : [ ]
  54945. }, {
  54946. "vulnerable" : true,
  54947. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
  54948. "cpe_name" : [ ]
  54949. }, {
  54950. "vulnerable" : true,
  54951. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
  54952. "cpe_name" : [ ]
  54953. }, {
  54954. "vulnerable" : true,
  54955. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
  54956. "cpe_name" : [ ]
  54957. }, {
  54958. "vulnerable" : true,
  54959. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
  54960. "cpe_name" : [ ]
  54961. }, {
  54962. "vulnerable" : true,
  54963. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
  54964. "cpe_name" : [ ]
  54965. }, {
  54966. "vulnerable" : true,
  54967. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
  54968. "cpe_name" : [ ]
  54969. }, {
  54970. "vulnerable" : true,
  54971. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
  54972. "cpe_name" : [ ]
  54973. }, {
  54974. "vulnerable" : true,
  54975. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
  54976. "cpe_name" : [ ]
  54977. }, {
  54978. "vulnerable" : true,
  54979. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
  54980. "cpe_name" : [ ]
  54981. }, {
  54982. "vulnerable" : true,
  54983. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
  54984. "cpe_name" : [ ]
  54985. }, {
  54986. "vulnerable" : true,
  54987. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
  54988. "cpe_name" : [ ]
  54989. }, {
  54990. "vulnerable" : true,
  54991. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
  54992. "cpe_name" : [ ]
  54993. }, {
  54994. "vulnerable" : true,
  54995. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
  54996. "cpe_name" : [ ]
  54997. }, {
  54998. "vulnerable" : true,
  54999. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
  55000. "cpe_name" : [ ]
  55001. }, {
  55002. "vulnerable" : true,
  55003. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
  55004. "cpe_name" : [ ]
  55005. }, {
  55006. "vulnerable" : true,
  55007. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
  55008. "cpe_name" : [ ]
  55009. }, {
  55010. "vulnerable" : true,
  55011. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
  55012. "cpe_name" : [ ]
  55013. }, {
  55014. "vulnerable" : true,
  55015. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
  55016. "cpe_name" : [ ]
  55017. }, {
  55018. "vulnerable" : true,
  55019. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
  55020. "cpe_name" : [ ]
  55021. }, {
  55022. "vulnerable" : true,
  55023. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
  55024. "cpe_name" : [ ]
  55025. }, {
  55026. "vulnerable" : true,
  55027. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
  55028. "cpe_name" : [ ]
  55029. }, {
  55030. "vulnerable" : true,
  55031. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
  55032. "cpe_name" : [ ]
  55033. }, {
  55034. "vulnerable" : true,
  55035. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
  55036. "cpe_name" : [ ]
  55037. }, {
  55038. "vulnerable" : true,
  55039. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
  55040. "cpe_name" : [ ]
  55041. }, {
  55042. "vulnerable" : true,
  55043. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
  55044. "cpe_name" : [ ]
  55045. }, {
  55046. "vulnerable" : true,
  55047. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
  55048. "cpe_name" : [ ]
  55049. }, {
  55050. "vulnerable" : true,
  55051. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
  55052. "cpe_name" : [ ]
  55053. }, {
  55054. "vulnerable" : true,
  55055. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
  55056. "cpe_name" : [ ]
  55057. }, {
  55058. "vulnerable" : true,
  55059. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
  55060. "cpe_name" : [ ]
  55061. }, {
  55062. "vulnerable" : true,
  55063. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
  55064. "cpe_name" : [ ]
  55065. }, {
  55066. "vulnerable" : true,
  55067. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
  55068. "cpe_name" : [ ]
  55069. }, {
  55070. "vulnerable" : true,
  55071. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
  55072. "cpe_name" : [ ]
  55073. }, {
  55074. "vulnerable" : true,
  55075. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
  55076. "cpe_name" : [ ]
  55077. }, {
  55078. "vulnerable" : true,
  55079. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
  55080. "cpe_name" : [ ]
  55081. }, {
  55082. "vulnerable" : true,
  55083. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
  55084. "cpe_name" : [ ]
  55085. }, {
  55086. "vulnerable" : true,
  55087. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
  55088. "cpe_name" : [ ]
  55089. }, {
  55090. "vulnerable" : true,
  55091. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
  55092. "cpe_name" : [ ]
  55093. }, {
  55094. "vulnerable" : true,
  55095. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
  55096. "cpe_name" : [ ]
  55097. }, {
  55098. "vulnerable" : true,
  55099. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
  55100. "cpe_name" : [ ]
  55101. }, {
  55102. "vulnerable" : true,
  55103. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
  55104. "cpe_name" : [ ]
  55105. }, {
  55106. "vulnerable" : true,
  55107. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
  55108. "cpe_name" : [ ]
  55109. }, {
  55110. "vulnerable" : true,
  55111. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
  55112. "cpe_name" : [ ]
  55113. }, {
  55114. "vulnerable" : true,
  55115. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
  55116. "cpe_name" : [ ]
  55117. }, {
  55118. "vulnerable" : true,
  55119. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
  55120. "cpe_name" : [ ]
  55121. }, {
  55122. "vulnerable" : true,
  55123. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
  55124. "cpe_name" : [ ]
  55125. }, {
  55126. "vulnerable" : true,
  55127. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
  55128. "cpe_name" : [ ]
  55129. }, {
  55130. "vulnerable" : true,
  55131. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
  55132. "cpe_name" : [ ]
  55133. }, {
  55134. "vulnerable" : true,
  55135. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
  55136. "cpe_name" : [ ]
  55137. }, {
  55138. "vulnerable" : true,
  55139. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
  55140. "cpe_name" : [ ]
  55141. }, {
  55142. "vulnerable" : true,
  55143. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
  55144. "cpe_name" : [ ]
  55145. }, {
  55146. "vulnerable" : true,
  55147. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
  55148. "cpe_name" : [ ]
  55149. }, {
  55150. "vulnerable" : true,
  55151. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
  55152. "cpe_name" : [ ]
  55153. }, {
  55154. "vulnerable" : true,
  55155. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
  55156. "cpe_name" : [ ]
  55157. }, {
  55158. "vulnerable" : true,
  55159. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
  55160. "cpe_name" : [ ]
  55161. }, {
  55162. "vulnerable" : true,
  55163. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
  55164. "cpe_name" : [ ]
  55165. }, {
  55166. "vulnerable" : true,
  55167. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
  55168. "cpe_name" : [ ]
  55169. }, {
  55170. "vulnerable" : true,
  55171. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
  55172. "cpe_name" : [ ]
  55173. }, {
  55174. "vulnerable" : true,
  55175. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
  55176. "cpe_name" : [ ]
  55177. }, {
  55178. "vulnerable" : true,
  55179. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
  55180. "cpe_name" : [ ]
  55181. }, {
  55182. "vulnerable" : true,
  55183. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
  55184. "cpe_name" : [ ]
  55185. }, {
  55186. "vulnerable" : true,
  55187. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
  55188. "cpe_name" : [ ]
  55189. }, {
  55190. "vulnerable" : true,
  55191. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
  55192. "cpe_name" : [ ]
  55193. }, {
  55194. "vulnerable" : true,
  55195. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
  55196. "cpe_name" : [ ]
  55197. }, {
  55198. "vulnerable" : true,
  55199. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
  55200. "cpe_name" : [ ]
  55201. }, {
  55202. "vulnerable" : true,
  55203. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
  55204. "cpe_name" : [ ]
  55205. }, {
  55206. "vulnerable" : true,
  55207. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
  55208. "cpe_name" : [ ]
  55209. }, {
  55210. "vulnerable" : true,
  55211. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
  55212. "cpe_name" : [ ]
  55213. }, {
  55214. "vulnerable" : true,
  55215. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
  55216. "cpe_name" : [ ]
  55217. }, {
  55218. "vulnerable" : true,
  55219. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
  55220. "cpe_name" : [ ]
  55221. }, {
  55222. "vulnerable" : true,
  55223. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
  55224. "cpe_name" : [ ]
  55225. }, {
  55226. "vulnerable" : true,
  55227. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
  55228. "cpe_name" : [ ]
  55229. } ]
  55230. } ]
  55231. },
  55232. "impact" : {
  55233. "baseMetricV3" : {
  55234. "cvssV3" : {
  55235. "version" : "3.1",
  55236. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  55237. "attackVector" : "NETWORK",
  55238. "attackComplexity" : "LOW",
  55239. "privilegesRequired" : "NONE",
  55240. "userInteraction" : "REQUIRED",
  55241. "scope" : "UNCHANGED",
  55242. "confidentialityImpact" : "HIGH",
  55243. "integrityImpact" : "HIGH",
  55244. "availabilityImpact" : "HIGH",
  55245. "baseScore" : 8.8,
  55246. "baseSeverity" : "HIGH"
  55247. },
  55248. "exploitabilityScore" : 2.8,
  55249. "impactScore" : 5.9
  55250. },
  55251. "baseMetricV2" : {
  55252. "cvssV2" : {
  55253. "version" : "2.0",
  55254. "vectorString" : "AV:N/AC:H/Au:N/C:P/I:P/A:P",
  55255. "accessVector" : "NETWORK",
  55256. "accessComplexity" : "HIGH",
  55257. "authentication" : "NONE",
  55258. "confidentialityImpact" : "PARTIAL",
  55259. "integrityImpact" : "PARTIAL",
  55260. "availabilityImpact" : "PARTIAL",
  55261. "baseScore" : 5.1
  55262. },
  55263. "severity" : "MEDIUM",
  55264. "exploitabilityScore" : 4.9,
  55265. "impactScore" : 6.4,
  55266. "acInsufInfo" : false,
  55267. "obtainAllPrivilege" : false,
  55268. "obtainUserPrivilege" : false,
  55269. "obtainOtherPrivilege" : false,
  55270. "userInteractionRequired" : true
  55271. }
  55272. },
  55273. "publishedDate" : "2021-04-22T20:15Z",
  55274. "lastModifiedDate" : "2021-05-04T20:37Z"
  55275. }, {
  55276. "cve" : {
  55277. "data_type" : "CVE",
  55278. "data_format" : "MITRE",
  55279. "data_version" : "4.0",
  55280. "CVE_data_meta" : {
  55281. "ID" : "CVE-2021-0265",
  55282. "ASSIGNER" : "sirt@juniper.net"
  55283. },
  55284. "problemtype" : {
  55285. "problemtype_data" : [ {
  55286. "description" : [ {
  55287. "lang" : "en",
  55288. "value" : "CWE-78"
  55289. } ]
  55290. } ]
  55291. },
  55292. "references" : {
  55293. "reference_data" : [ {
  55294. "url" : "https://kb.juniper.net/JSA11156",
  55295. "name" : "https://kb.juniper.net/JSA11156",
  55296. "refsource" : "MISC",
  55297. "tags" : [ "Vendor Advisory" ]
  55298. } ]
  55299. },
  55300. "description" : {
  55301. "description_data" : [ {
  55302. "lang" : "en",
  55303. "value" : "An unvalidated REST API in the AppFormix Agent of Juniper Networks AppFormix allows an unauthenticated remote attacker to execute commands as root on the host running the AppFormix Agent, when certain preconditions are performed by the attacker, thus granting the attacker full control over the environment. This issue affects: Juniper Networks AppFormix 3 versions prior to 3.1.22, 3.2.14, 3.3.0."
  55304. } ]
  55305. }
  55306. },
  55307. "configurations" : {
  55308. "CVE_data_version" : "4.0",
  55309. "nodes" : [ {
  55310. "operator" : "OR",
  55311. "children" : [ ],
  55312. "cpe_match" : [ {
  55313. "vulnerable" : true,
  55314. "cpe23Uri" : "cpe:2.3:a:juniper:appformix:*:*:*:*:*:*:*:*",
  55315. "versionStartIncluding" : "3.0.0",
  55316. "versionEndExcluding" : "3.1.22",
  55317. "cpe_name" : [ ]
  55318. }, {
  55319. "vulnerable" : true,
  55320. "cpe23Uri" : "cpe:2.3:a:juniper:appformix:*:*:*:*:*:*:*:*",
  55321. "versionStartIncluding" : "3.2.0",
  55322. "versionEndExcluding" : "3.2.14",
  55323. "cpe_name" : [ ]
  55324. } ]
  55325. } ]
  55326. },
  55327. "impact" : {
  55328. "baseMetricV3" : {
  55329. "cvssV3" : {
  55330. "version" : "3.1",
  55331. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
  55332. "attackVector" : "NETWORK",
  55333. "attackComplexity" : "HIGH",
  55334. "privilegesRequired" : "NONE",
  55335. "userInteraction" : "NONE",
  55336. "scope" : "UNCHANGED",
  55337. "confidentialityImpact" : "HIGH",
  55338. "integrityImpact" : "HIGH",
  55339. "availabilityImpact" : "HIGH",
  55340. "baseScore" : 8.1,
  55341. "baseSeverity" : "HIGH"
  55342. },
  55343. "exploitabilityScore" : 2.2,
  55344. "impactScore" : 5.9
  55345. },
  55346. "baseMetricV2" : {
  55347. "cvssV2" : {
  55348. "version" : "2.0",
  55349. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  55350. "accessVector" : "NETWORK",
  55351. "accessComplexity" : "LOW",
  55352. "authentication" : "NONE",
  55353. "confidentialityImpact" : "COMPLETE",
  55354. "integrityImpact" : "COMPLETE",
  55355. "availabilityImpact" : "COMPLETE",
  55356. "baseScore" : 10.0
  55357. },
  55358. "severity" : "HIGH",
  55359. "exploitabilityScore" : 10.0,
  55360. "impactScore" : 10.0,
  55361. "acInsufInfo" : false,
  55362. "obtainAllPrivilege" : false,
  55363. "obtainUserPrivilege" : false,
  55364. "obtainOtherPrivilege" : false,
  55365. "userInteractionRequired" : false
  55366. }
  55367. },
  55368. "publishedDate" : "2021-04-22T20:15Z",
  55369. "lastModifiedDate" : "2021-05-04T20:38Z"
  55370. }, {
  55371. "cve" : {
  55372. "data_type" : "CVE",
  55373. "data_format" : "MITRE",
  55374. "data_version" : "4.0",
  55375. "CVE_data_meta" : {
  55376. "ID" : "CVE-2021-0263",
  55377. "ASSIGNER" : "sirt@juniper.net"
  55378. },
  55379. "problemtype" : {
  55380. "problemtype_data" : [ {
  55381. "description" : [ {
  55382. "lang" : "en",
  55383. "value" : "NVD-CWE-noinfo"
  55384. } ]
  55385. } ]
  55386. },
  55387. "references" : {
  55388. "reference_data" : [ {
  55389. "url" : "https://kb.juniper.net/JSA11154",
  55390. "name" : "https://kb.juniper.net/JSA11154",
  55391. "refsource" : "MISC",
  55392. "tags" : [ "Vendor Advisory" ]
  55393. }, {
  55394. "url" : "https://www.juniper.net/documentation/en_US/junos/topics/example/flowmonitoring-active-sampling-instance-example.html",
  55395. "name" : "https://www.juniper.net/documentation/en_US/junos/topics/example/flowmonitoring-active-sampling-instance-example.html",
  55396. "refsource" : "MISC",
  55397. "tags" : [ "Vendor Advisory" ]
  55398. } ]
  55399. },
  55400. "description" : {
  55401. "description_data" : [ {
  55402. "lang" : "en",
  55403. "value" : "A Data Processing vulnerability in the Multi-Service process (multi-svcs) on the FPC of Juniper Networks Junos OS on the PTX Series routers may lead to the process becoming unresponsive, ultimately affecting traffic forwarding, allowing an attacker to cause a Denial of Service (DoS) condition . The Multi-Service Process running on the FPC is responsible for handling sampling-related operations when a J-Flow configuration is activated. This can occur during periods of heavy route churn, causing the Multi-Service Process to stop processing updates, without consuming any further updates from kernel. This back pressure towards the kernel affects further dynamic updates from other processes in the system, including RPD, causing a KRT-STUCK condition and traffic forwarding issues. An administrator can monitor the following command to check if there is the KRT queue is stuck: user@device > show krt state ... Number of async queue entries: 65007 <--- this value keep on increasing. The following logs/alarms will be observed when this condition exists: user@junos> show chassis alarms 2 alarms currently active Alarm time Class Description 2020-10-11 04:33:45 PDT Minor Potential slow peers are: MSP(FPC1-PIC0) MSP(FPC3-PIC0) MSP(FPC4-PIC0) Logs: Oct 11 04:33:44.672 2020 test /kernel: rts_peer_cp_recv_timeout : Bit set for msp8 as it is stuck Oct 11 04:35:56.000 2020 test-lab fpc4 user.err gldfpc-multi-svcs.elf: Error in parsing composite nexthop Oct 11 04:35:56.000 2020 test-lab fpc4 user.err gldfpc-multi-svcs.elf: composite nexthop parsing error Oct 11 04:43:05 2020 test /kernel: rt_pfe_veto: Possible slowest client is msp38. States processed - 65865741. States to be processed - 0 Oct 11 04:55:55 2020 test /kernel: rt_pfe_veto: Memory usage of M_RTNEXTHOP type = (0) Max size possible for M_RTNEXTHOP type = (8311787520) Current delayed unref = (60000), Current unique delayed unref = (10896), Max delayed unref on this platform = (40000) Current delayed weight unref = (71426) Max delayed weight unref on this platform= (400000) curproc = rpd Oct 11 04:56:00 2020 test /kernel: rt_pfe_veto: Too many delayed route/nexthop unrefs. Op 2 err 55, rtsm_id 5:-1, msg type 2 This issue only affects PTX Series devices. No other products or platforms are affected by this vulnerability. This issue affects Juniper Networks Junos OS on PTX Series: 18.2 versions prior to 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S8, 18.4R3-S7; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S4, 19.4R3-S1; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 18.2R1."
  55404. } ]
  55405. }
  55406. },
  55407. "configurations" : {
  55408. "CVE_data_version" : "4.0",
  55409. "nodes" : [ {
  55410. "operator" : "AND",
  55411. "children" : [ {
  55412. "operator" : "OR",
  55413. "children" : [ ],
  55414. "cpe_match" : [ {
  55415. "vulnerable" : true,
  55416. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
  55417. "cpe_name" : [ ]
  55418. }, {
  55419. "vulnerable" : true,
  55420. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
  55421. "cpe_name" : [ ]
  55422. }, {
  55423. "vulnerable" : true,
  55424. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
  55425. "cpe_name" : [ ]
  55426. }, {
  55427. "vulnerable" : true,
  55428. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
  55429. "cpe_name" : [ ]
  55430. }, {
  55431. "vulnerable" : true,
  55432. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
  55433. "cpe_name" : [ ]
  55434. }, {
  55435. "vulnerable" : true,
  55436. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
  55437. "cpe_name" : [ ]
  55438. }, {
  55439. "vulnerable" : true,
  55440. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
  55441. "cpe_name" : [ ]
  55442. }, {
  55443. "vulnerable" : true,
  55444. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
  55445. "cpe_name" : [ ]
  55446. }, {
  55447. "vulnerable" : true,
  55448. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
  55449. "cpe_name" : [ ]
  55450. }, {
  55451. "vulnerable" : true,
  55452. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
  55453. "cpe_name" : [ ]
  55454. }, {
  55455. "vulnerable" : true,
  55456. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
  55457. "cpe_name" : [ ]
  55458. }, {
  55459. "vulnerable" : true,
  55460. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
  55461. "cpe_name" : [ ]
  55462. }, {
  55463. "vulnerable" : true,
  55464. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
  55465. "cpe_name" : [ ]
  55466. }, {
  55467. "vulnerable" : true,
  55468. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
  55469. "cpe_name" : [ ]
  55470. }, {
  55471. "vulnerable" : true,
  55472. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
  55473. "cpe_name" : [ ]
  55474. }, {
  55475. "vulnerable" : true,
  55476. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
  55477. "cpe_name" : [ ]
  55478. }, {
  55479. "vulnerable" : true,
  55480. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
  55481. "cpe_name" : [ ]
  55482. }, {
  55483. "vulnerable" : true,
  55484. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
  55485. "cpe_name" : [ ]
  55486. }, {
  55487. "vulnerable" : true,
  55488. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
  55489. "cpe_name" : [ ]
  55490. }, {
  55491. "vulnerable" : true,
  55492. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
  55493. "cpe_name" : [ ]
  55494. }, {
  55495. "vulnerable" : true,
  55496. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
  55497. "cpe_name" : [ ]
  55498. }, {
  55499. "vulnerable" : true,
  55500. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s6:*:*:*:*:*:*",
  55501. "cpe_name" : [ ]
  55502. }, {
  55503. "vulnerable" : true,
  55504. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
  55505. "cpe_name" : [ ]
  55506. }, {
  55507. "vulnerable" : true,
  55508. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
  55509. "cpe_name" : [ ]
  55510. }, {
  55511. "vulnerable" : true,
  55512. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
  55513. "cpe_name" : [ ]
  55514. }, {
  55515. "vulnerable" : true,
  55516. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
  55517. "cpe_name" : [ ]
  55518. }, {
  55519. "vulnerable" : true,
  55520. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
  55521. "cpe_name" : [ ]
  55522. }, {
  55523. "vulnerable" : true,
  55524. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
  55525. "cpe_name" : [ ]
  55526. }, {
  55527. "vulnerable" : true,
  55528. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
  55529. "cpe_name" : [ ]
  55530. }, {
  55531. "vulnerable" : true,
  55532. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
  55533. "cpe_name" : [ ]
  55534. }, {
  55535. "vulnerable" : true,
  55536. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
  55537. "cpe_name" : [ ]
  55538. }, {
  55539. "vulnerable" : true,
  55540. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
  55541. "cpe_name" : [ ]
  55542. }, {
  55543. "vulnerable" : true,
  55544. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
  55545. "cpe_name" : [ ]
  55546. }, {
  55547. "vulnerable" : true,
  55548. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
  55549. "cpe_name" : [ ]
  55550. }, {
  55551. "vulnerable" : true,
  55552. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
  55553. "cpe_name" : [ ]
  55554. }, {
  55555. "vulnerable" : true,
  55556. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
  55557. "cpe_name" : [ ]
  55558. }, {
  55559. "vulnerable" : true,
  55560. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
  55561. "cpe_name" : [ ]
  55562. }, {
  55563. "vulnerable" : true,
  55564. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
  55565. "cpe_name" : [ ]
  55566. }, {
  55567. "vulnerable" : true,
  55568. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
  55569. "cpe_name" : [ ]
  55570. }, {
  55571. "vulnerable" : true,
  55572. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
  55573. "cpe_name" : [ ]
  55574. }, {
  55575. "vulnerable" : true,
  55576. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
  55577. "cpe_name" : [ ]
  55578. }, {
  55579. "vulnerable" : true,
  55580. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
  55581. "cpe_name" : [ ]
  55582. }, {
  55583. "vulnerable" : true,
  55584. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
  55585. "cpe_name" : [ ]
  55586. }, {
  55587. "vulnerable" : true,
  55588. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
  55589. "cpe_name" : [ ]
  55590. }, {
  55591. "vulnerable" : true,
  55592. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
  55593. "cpe_name" : [ ]
  55594. }, {
  55595. "vulnerable" : true,
  55596. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
  55597. "cpe_name" : [ ]
  55598. }, {
  55599. "vulnerable" : true,
  55600. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
  55601. "cpe_name" : [ ]
  55602. }, {
  55603. "vulnerable" : true,
  55604. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
  55605. "cpe_name" : [ ]
  55606. }, {
  55607. "vulnerable" : true,
  55608. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
  55609. "cpe_name" : [ ]
  55610. }, {
  55611. "vulnerable" : true,
  55612. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
  55613. "cpe_name" : [ ]
  55614. }, {
  55615. "vulnerable" : true,
  55616. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
  55617. "cpe_name" : [ ]
  55618. }, {
  55619. "vulnerable" : true,
  55620. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
  55621. "cpe_name" : [ ]
  55622. }, {
  55623. "vulnerable" : true,
  55624. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
  55625. "cpe_name" : [ ]
  55626. }, {
  55627. "vulnerable" : true,
  55628. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
  55629. "cpe_name" : [ ]
  55630. }, {
  55631. "vulnerable" : true,
  55632. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
  55633. "cpe_name" : [ ]
  55634. }, {
  55635. "vulnerable" : true,
  55636. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
  55637. "cpe_name" : [ ]
  55638. }, {
  55639. "vulnerable" : true,
  55640. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
  55641. "cpe_name" : [ ]
  55642. }, {
  55643. "vulnerable" : true,
  55644. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
  55645. "cpe_name" : [ ]
  55646. }, {
  55647. "vulnerable" : true,
  55648. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
  55649. "cpe_name" : [ ]
  55650. }, {
  55651. "vulnerable" : true,
  55652. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
  55653. "cpe_name" : [ ]
  55654. }, {
  55655. "vulnerable" : true,
  55656. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
  55657. "cpe_name" : [ ]
  55658. }, {
  55659. "vulnerable" : true,
  55660. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
  55661. "cpe_name" : [ ]
  55662. }, {
  55663. "vulnerable" : true,
  55664. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
  55665. "cpe_name" : [ ]
  55666. }, {
  55667. "vulnerable" : true,
  55668. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
  55669. "cpe_name" : [ ]
  55670. }, {
  55671. "vulnerable" : true,
  55672. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
  55673. "cpe_name" : [ ]
  55674. }, {
  55675. "vulnerable" : true,
  55676. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
  55677. "cpe_name" : [ ]
  55678. }, {
  55679. "vulnerable" : true,
  55680. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
  55681. "cpe_name" : [ ]
  55682. }, {
  55683. "vulnerable" : true,
  55684. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
  55685. "cpe_name" : [ ]
  55686. }, {
  55687. "vulnerable" : true,
  55688. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
  55689. "cpe_name" : [ ]
  55690. }, {
  55691. "vulnerable" : true,
  55692. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
  55693. "cpe_name" : [ ]
  55694. }, {
  55695. "vulnerable" : true,
  55696. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
  55697. "cpe_name" : [ ]
  55698. }, {
  55699. "vulnerable" : true,
  55700. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
  55701. "cpe_name" : [ ]
  55702. }, {
  55703. "vulnerable" : true,
  55704. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
  55705. "cpe_name" : [ ]
  55706. }, {
  55707. "vulnerable" : true,
  55708. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
  55709. "cpe_name" : [ ]
  55710. }, {
  55711. "vulnerable" : true,
  55712. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
  55713. "cpe_name" : [ ]
  55714. }, {
  55715. "vulnerable" : true,
  55716. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
  55717. "cpe_name" : [ ]
  55718. }, {
  55719. "vulnerable" : true,
  55720. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
  55721. "cpe_name" : [ ]
  55722. }, {
  55723. "vulnerable" : true,
  55724. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
  55725. "cpe_name" : [ ]
  55726. }, {
  55727. "vulnerable" : true,
  55728. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
  55729. "cpe_name" : [ ]
  55730. }, {
  55731. "vulnerable" : true,
  55732. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
  55733. "cpe_name" : [ ]
  55734. }, {
  55735. "vulnerable" : true,
  55736. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
  55737. "cpe_name" : [ ]
  55738. }, {
  55739. "vulnerable" : true,
  55740. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
  55741. "cpe_name" : [ ]
  55742. }, {
  55743. "vulnerable" : true,
  55744. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
  55745. "cpe_name" : [ ]
  55746. }, {
  55747. "vulnerable" : true,
  55748. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
  55749. "cpe_name" : [ ]
  55750. }, {
  55751. "vulnerable" : true,
  55752. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
  55753. "cpe_name" : [ ]
  55754. }, {
  55755. "vulnerable" : true,
  55756. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
  55757. "cpe_name" : [ ]
  55758. }, {
  55759. "vulnerable" : true,
  55760. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
  55761. "cpe_name" : [ ]
  55762. }, {
  55763. "vulnerable" : true,
  55764. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
  55765. "cpe_name" : [ ]
  55766. }, {
  55767. "vulnerable" : true,
  55768. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
  55769. "cpe_name" : [ ]
  55770. }, {
  55771. "vulnerable" : true,
  55772. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
  55773. "cpe_name" : [ ]
  55774. }, {
  55775. "vulnerable" : true,
  55776. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
  55777. "cpe_name" : [ ]
  55778. }, {
  55779. "vulnerable" : true,
  55780. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
  55781. "cpe_name" : [ ]
  55782. }, {
  55783. "vulnerable" : true,
  55784. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
  55785. "cpe_name" : [ ]
  55786. }, {
  55787. "vulnerable" : true,
  55788. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
  55789. "cpe_name" : [ ]
  55790. }, {
  55791. "vulnerable" : true,
  55792. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
  55793. "cpe_name" : [ ]
  55794. }, {
  55795. "vulnerable" : true,
  55796. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
  55797. "cpe_name" : [ ]
  55798. }, {
  55799. "vulnerable" : true,
  55800. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
  55801. "cpe_name" : [ ]
  55802. }, {
  55803. "vulnerable" : true,
  55804. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
  55805. "cpe_name" : [ ]
  55806. }, {
  55807. "vulnerable" : true,
  55808. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
  55809. "cpe_name" : [ ]
  55810. }, {
  55811. "vulnerable" : true,
  55812. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
  55813. "cpe_name" : [ ]
  55814. }, {
  55815. "vulnerable" : true,
  55816. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
  55817. "cpe_name" : [ ]
  55818. }, {
  55819. "vulnerable" : true,
  55820. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
  55821. "cpe_name" : [ ]
  55822. }, {
  55823. "vulnerable" : true,
  55824. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
  55825. "cpe_name" : [ ]
  55826. }, {
  55827. "vulnerable" : true,
  55828. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
  55829. "cpe_name" : [ ]
  55830. }, {
  55831. "vulnerable" : true,
  55832. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
  55833. "cpe_name" : [ ]
  55834. }, {
  55835. "vulnerable" : true,
  55836. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
  55837. "cpe_name" : [ ]
  55838. }, {
  55839. "vulnerable" : true,
  55840. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
  55841. "cpe_name" : [ ]
  55842. }, {
  55843. "vulnerable" : true,
  55844. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
  55845. "cpe_name" : [ ]
  55846. }, {
  55847. "vulnerable" : true,
  55848. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
  55849. "cpe_name" : [ ]
  55850. }, {
  55851. "vulnerable" : true,
  55852. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
  55853. "cpe_name" : [ ]
  55854. }, {
  55855. "vulnerable" : true,
  55856. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
  55857. "cpe_name" : [ ]
  55858. }, {
  55859. "vulnerable" : true,
  55860. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
  55861. "cpe_name" : [ ]
  55862. }, {
  55863. "vulnerable" : true,
  55864. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
  55865. "cpe_name" : [ ]
  55866. }, {
  55867. "vulnerable" : true,
  55868. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
  55869. "cpe_name" : [ ]
  55870. }, {
  55871. "vulnerable" : true,
  55872. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
  55873. "cpe_name" : [ ]
  55874. } ]
  55875. }, {
  55876. "operator" : "OR",
  55877. "children" : [ ],
  55878. "cpe_match" : [ {
  55879. "vulnerable" : false,
  55880. "cpe23Uri" : "cpe:2.3:h:juniper:ptx1000:-:*:*:*:*:*:*:*",
  55881. "cpe_name" : [ ]
  55882. }, {
  55883. "vulnerable" : false,
  55884. "cpe23Uri" : "cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:*",
  55885. "cpe_name" : [ ]
  55886. }, {
  55887. "vulnerable" : false,
  55888. "cpe23Uri" : "cpe:2.3:h:juniper:ptx10002:-:*:*:*:*:*:*:*",
  55889. "cpe_name" : [ ]
  55890. }, {
  55891. "vulnerable" : false,
  55892. "cpe23Uri" : "cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:*",
  55893. "cpe_name" : [ ]
  55894. }, {
  55895. "vulnerable" : false,
  55896. "cpe23Uri" : "cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:*",
  55897. "cpe_name" : [ ]
  55898. }, {
  55899. "vulnerable" : false,
  55900. "cpe23Uri" : "cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:*",
  55901. "cpe_name" : [ ]
  55902. }, {
  55903. "vulnerable" : false,
  55904. "cpe23Uri" : "cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:*",
  55905. "cpe_name" : [ ]
  55906. }, {
  55907. "vulnerable" : false,
  55908. "cpe23Uri" : "cpe:2.3:h:juniper:ptx3000:-:*:*:*:*:*:*:*",
  55909. "cpe_name" : [ ]
  55910. }, {
  55911. "vulnerable" : false,
  55912. "cpe23Uri" : "cpe:2.3:h:juniper:ptx5000:-:*:*:*:*:*:*:*",
  55913. "cpe_name" : [ ]
  55914. } ]
  55915. } ],
  55916. "cpe_match" : [ ]
  55917. } ]
  55918. },
  55919. "impact" : {
  55920. "baseMetricV3" : {
  55921. "cvssV3" : {
  55922. "version" : "3.1",
  55923. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
  55924. "attackVector" : "NETWORK",
  55925. "attackComplexity" : "HIGH",
  55926. "privilegesRequired" : "NONE",
  55927. "userInteraction" : "NONE",
  55928. "scope" : "UNCHANGED",
  55929. "confidentialityImpact" : "NONE",
  55930. "integrityImpact" : "NONE",
  55931. "availabilityImpact" : "HIGH",
  55932. "baseScore" : 5.9,
  55933. "baseSeverity" : "MEDIUM"
  55934. },
  55935. "exploitabilityScore" : 2.2,
  55936. "impactScore" : 3.6
  55937. },
  55938. "baseMetricV2" : {
  55939. "cvssV2" : {
  55940. "version" : "2.0",
  55941. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  55942. "accessVector" : "NETWORK",
  55943. "accessComplexity" : "MEDIUM",
  55944. "authentication" : "NONE",
  55945. "confidentialityImpact" : "NONE",
  55946. "integrityImpact" : "NONE",
  55947. "availabilityImpact" : "PARTIAL",
  55948. "baseScore" : 4.3
  55949. },
  55950. "severity" : "MEDIUM",
  55951. "exploitabilityScore" : 8.6,
  55952. "impactScore" : 2.9,
  55953. "acInsufInfo" : false,
  55954. "obtainAllPrivilege" : false,
  55955. "obtainUserPrivilege" : false,
  55956. "obtainOtherPrivilege" : false,
  55957. "userInteractionRequired" : false
  55958. }
  55959. },
  55960. "publishedDate" : "2021-04-22T20:15Z",
  55961. "lastModifiedDate" : "2021-05-04T20:44Z"
  55962. }, {
  55963. "cve" : {
  55964. "data_type" : "CVE",
  55965. "data_format" : "MITRE",
  55966. "data_version" : "4.0",
  55967. "CVE_data_meta" : {
  55968. "ID" : "CVE-2021-0262",
  55969. "ASSIGNER" : "sirt@juniper.net"
  55970. },
  55971. "problemtype" : {
  55972. "problemtype_data" : [ {
  55973. "description" : [ {
  55974. "lang" : "en",
  55975. "value" : "CWE-416"
  55976. } ]
  55977. } ]
  55978. },
  55979. "references" : {
  55980. "reference_data" : [ {
  55981. "url" : "https://kb.juniper.net/JSA11153",
  55982. "name" : "https://kb.juniper.net/JSA11153",
  55983. "refsource" : "MISC",
  55984. "tags" : [ "Vendor Advisory" ]
  55985. } ]
  55986. },
  55987. "description" : {
  55988. "description_data" : [ {
  55989. "lang" : "en",
  55990. "value" : "Through routine static code analysis of the Juniper Networks Junos OS software codebase, the Secure Development Life Cycle team identified a Use After Free vulnerability in PFE packet processing on the QFX10002-60C switching platform. Exploitation of this vulnerability may allow a logically adjacent attacker to trigger a Denial of Service (DoS). Continued exploitation of this vulnerability will sustain the Denial of Service (DoS) condition. This issue only affects QFX10002-60C devices. No other product or platform is vulnerable to this issue. This issue affects Juniper Networks Junos OS on QFX10002-60C: 19.1 version 19.1R3-S1 and later versions; 19.1 versions prior to 19.1R3-S3; 19.2 version 19.2R2 and later versions; 19.2 versions prior to 19.2R3-S1; 20.2 versions prior to 20.2R1-S2. This issue does not affect Juniper Networks Junos OS: versions prior to 19.1R3; 19.2 versions prior to 19.2R2; any version of 19.3; version 20.2R2 and later releases."
  55991. } ]
  55992. }
  55993. },
  55994. "configurations" : {
  55995. "CVE_data_version" : "4.0",
  55996. "nodes" : [ {
  55997. "operator" : "OR",
  55998. "children" : [ ],
  55999. "cpe_match" : [ {
  56000. "vulnerable" : true,
  56001. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
  56002. "cpe_name" : [ ]
  56003. }, {
  56004. "vulnerable" : true,
  56005. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
  56006. "cpe_name" : [ ]
  56007. }, {
  56008. "vulnerable" : true,
  56009. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
  56010. "cpe_name" : [ ]
  56011. }, {
  56012. "vulnerable" : true,
  56013. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
  56014. "cpe_name" : [ ]
  56015. }, {
  56016. "vulnerable" : true,
  56017. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
  56018. "cpe_name" : [ ]
  56019. }, {
  56020. "vulnerable" : true,
  56021. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
  56022. "cpe_name" : [ ]
  56023. }, {
  56024. "vulnerable" : true,
  56025. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
  56026. "cpe_name" : [ ]
  56027. } ]
  56028. } ]
  56029. },
  56030. "impact" : {
  56031. "baseMetricV3" : {
  56032. "cvssV3" : {
  56033. "version" : "3.1",
  56034. "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  56035. "attackVector" : "ADJACENT_NETWORK",
  56036. "attackComplexity" : "LOW",
  56037. "privilegesRequired" : "NONE",
  56038. "userInteraction" : "NONE",
  56039. "scope" : "UNCHANGED",
  56040. "confidentialityImpact" : "NONE",
  56041. "integrityImpact" : "NONE",
  56042. "availabilityImpact" : "HIGH",
  56043. "baseScore" : 6.5,
  56044. "baseSeverity" : "MEDIUM"
  56045. },
  56046. "exploitabilityScore" : 2.8,
  56047. "impactScore" : 3.6
  56048. },
  56049. "baseMetricV2" : {
  56050. "cvssV2" : {
  56051. "version" : "2.0",
  56052. "vectorString" : "AV:A/AC:L/Au:N/C:N/I:N/A:P",
  56053. "accessVector" : "ADJACENT_NETWORK",
  56054. "accessComplexity" : "LOW",
  56055. "authentication" : "NONE",
  56056. "confidentialityImpact" : "NONE",
  56057. "integrityImpact" : "NONE",
  56058. "availabilityImpact" : "PARTIAL",
  56059. "baseScore" : 3.3
  56060. },
  56061. "severity" : "LOW",
  56062. "exploitabilityScore" : 6.5,
  56063. "impactScore" : 2.9,
  56064. "acInsufInfo" : false,
  56065. "obtainAllPrivilege" : false,
  56066. "obtainUserPrivilege" : false,
  56067. "obtainOtherPrivilege" : false,
  56068. "userInteractionRequired" : false
  56069. }
  56070. },
  56071. "publishedDate" : "2021-04-22T20:15Z",
  56072. "lastModifiedDate" : "2021-05-04T21:21Z"
  56073. }, {
  56074. "cve" : {
  56075. "data_type" : "CVE",
  56076. "data_format" : "MITRE",
  56077. "data_version" : "4.0",
  56078. "CVE_data_meta" : {
  56079. "ID" : "CVE-2021-0261",
  56080. "ASSIGNER" : "sirt@juniper.net"
  56081. },
  56082. "problemtype" : {
  56083. "problemtype_data" : [ {
  56084. "description" : [ {
  56085. "lang" : "en",
  56086. "value" : "NVD-CWE-noinfo"
  56087. } ]
  56088. } ]
  56089. },
  56090. "references" : {
  56091. "reference_data" : [ {
  56092. "url" : "https://kb.juniper.net/JSA11152",
  56093. "name" : "https://kb.juniper.net/JSA11152",
  56094. "refsource" : "MISC",
  56095. "tags" : [ "Vendor Advisory" ]
  56096. } ]
  56097. },
  56098. "description" : {
  56099. "description_data" : [ {
  56100. "lang" : "en",
  56101. "value" : "A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated attacker to cause an extended Denial of Service (DoS) for these services by sending a high number of specific requests. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S17 on EX Series; 12.3X48 versions prior to 12.3X48-D105 on SRX Series; 15.1 versions prior to 15.1R7-S8; 15.1X49 versions prior to 15.1X49-D230 on SRX Series; 16.1 versions prior to 16.1R7-S8; 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2; 20.2 versions prior to 20.2R1-S1, 20.2R2."
  56102. } ]
  56103. }
  56104. },
  56105. "configurations" : {
  56106. "CVE_data_version" : "4.0",
  56107. "nodes" : [ {
  56108. "operator" : "AND",
  56109. "children" : [ {
  56110. "operator" : "OR",
  56111. "children" : [ ],
  56112. "cpe_match" : [ {
  56113. "vulnerable" : true,
  56114. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:-:*:*:*:*:*:*",
  56115. "cpe_name" : [ ]
  56116. }, {
  56117. "vulnerable" : true,
  56118. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*",
  56119. "cpe_name" : [ ]
  56120. }, {
  56121. "vulnerable" : true,
  56122. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*",
  56123. "cpe_name" : [ ]
  56124. }, {
  56125. "vulnerable" : true,
  56126. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r10-s1:*:*:*:*:*:*",
  56127. "cpe_name" : [ ]
  56128. }, {
  56129. "vulnerable" : true,
  56130. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r10-s2:*:*:*:*:*:*",
  56131. "cpe_name" : [ ]
  56132. }, {
  56133. "vulnerable" : true,
  56134. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*",
  56135. "cpe_name" : [ ]
  56136. }, {
  56137. "vulnerable" : true,
  56138. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*",
  56139. "cpe_name" : [ ]
  56140. }, {
  56141. "vulnerable" : true,
  56142. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12-s1:*:*:*:*:*:*",
  56143. "cpe_name" : [ ]
  56144. }, {
  56145. "vulnerable" : true,
  56146. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:*",
  56147. "cpe_name" : [ ]
  56148. }, {
  56149. "vulnerable" : true,
  56150. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12-s11:*:*:*:*:*:*",
  56151. "cpe_name" : [ ]
  56152. }, {
  56153. "vulnerable" : true,
  56154. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12-s12:*:*:*:*:*:*",
  56155. "cpe_name" : [ ]
  56156. }, {
  56157. "vulnerable" : true,
  56158. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12-s13:*:*:*:*:*:*",
  56159. "cpe_name" : [ ]
  56160. }, {
  56161. "vulnerable" : true,
  56162. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12-s14:*:*:*:*:*:*",
  56163. "cpe_name" : [ ]
  56164. }, {
  56165. "vulnerable" : true,
  56166. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12-s15:*:*:*:*:*:*",
  56167. "cpe_name" : [ ]
  56168. }, {
  56169. "vulnerable" : true,
  56170. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12-s16:*:*:*:*:*:*",
  56171. "cpe_name" : [ ]
  56172. }, {
  56173. "vulnerable" : true,
  56174. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12-s3:*:*:*:*:*:*",
  56175. "cpe_name" : [ ]
  56176. }, {
  56177. "vulnerable" : true,
  56178. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12-s4:*:*:*:*:*:*",
  56179. "cpe_name" : [ ]
  56180. }, {
  56181. "vulnerable" : true,
  56182. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12-s6:*:*:*:*:*:*",
  56183. "cpe_name" : [ ]
  56184. }, {
  56185. "vulnerable" : true,
  56186. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3:r12-s8:*:*:*:*:*:*",
  56187. "cpe_name" : [ ]
  56188. } ]
  56189. }, {
  56190. "operator" : "OR",
  56191. "children" : [ ],
  56192. "cpe_match" : [ {
  56193. "vulnerable" : false,
  56194. "cpe23Uri" : "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
  56195. "cpe_name" : [ ]
  56196. }, {
  56197. "vulnerable" : false,
  56198. "cpe23Uri" : "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
  56199. "cpe_name" : [ ]
  56200. }, {
  56201. "vulnerable" : false,
  56202. "cpe23Uri" : "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
  56203. "cpe_name" : [ ]
  56204. }, {
  56205. "vulnerable" : false,
  56206. "cpe23Uri" : "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
  56207. "cpe_name" : [ ]
  56208. }, {
  56209. "vulnerable" : false,
  56210. "cpe23Uri" : "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
  56211. "cpe_name" : [ ]
  56212. }, {
  56213. "vulnerable" : false,
  56214. "cpe23Uri" : "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
  56215. "cpe_name" : [ ]
  56216. }, {
  56217. "vulnerable" : false,
  56218. "cpe23Uri" : "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
  56219. "cpe_name" : [ ]
  56220. }, {
  56221. "vulnerable" : false,
  56222. "cpe23Uri" : "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
  56223. "cpe_name" : [ ]
  56224. }, {
  56225. "vulnerable" : false,
  56226. "cpe23Uri" : "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*",
  56227. "cpe_name" : [ ]
  56228. } ]
  56229. } ],
  56230. "cpe_match" : [ ]
  56231. }, {
  56232. "operator" : "AND",
  56233. "children" : [ {
  56234. "operator" : "OR",
  56235. "children" : [ ],
  56236. "cpe_match" : [ {
  56237. "vulnerable" : true,
  56238. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:-:*:*:*:*:*:*",
  56239. "cpe_name" : [ ]
  56240. }, {
  56241. "vulnerable" : true,
  56242. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*",
  56243. "cpe_name" : [ ]
  56244. }, {
  56245. "vulnerable" : true,
  56246. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d100:*:*:*:*:*:*",
  56247. "cpe_name" : [ ]
  56248. }, {
  56249. "vulnerable" : true,
  56250. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*",
  56251. "cpe_name" : [ ]
  56252. }, {
  56253. "vulnerable" : true,
  56254. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*",
  56255. "cpe_name" : [ ]
  56256. }, {
  56257. "vulnerable" : true,
  56258. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*",
  56259. "cpe_name" : [ ]
  56260. }, {
  56261. "vulnerable" : true,
  56262. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*",
  56263. "cpe_name" : [ ]
  56264. }, {
  56265. "vulnerable" : true,
  56266. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*",
  56267. "cpe_name" : [ ]
  56268. }, {
  56269. "vulnerable" : true,
  56270. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*",
  56271. "cpe_name" : [ ]
  56272. }, {
  56273. "vulnerable" : true,
  56274. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*",
  56275. "cpe_name" : [ ]
  56276. }, {
  56277. "vulnerable" : true,
  56278. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*",
  56279. "cpe_name" : [ ]
  56280. }, {
  56281. "vulnerable" : true,
  56282. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d51:*:*:*:*:*:*",
  56283. "cpe_name" : [ ]
  56284. }, {
  56285. "vulnerable" : true,
  56286. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d55:*:*:*:*:*:*",
  56287. "cpe_name" : [ ]
  56288. }, {
  56289. "vulnerable" : true,
  56290. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d60:*:*:*:*:*:*",
  56291. "cpe_name" : [ ]
  56292. }, {
  56293. "vulnerable" : true,
  56294. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d65:*:*:*:*:*:*",
  56295. "cpe_name" : [ ]
  56296. }, {
  56297. "vulnerable" : true,
  56298. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d66:*:*:*:*:*:*",
  56299. "cpe_name" : [ ]
  56300. }, {
  56301. "vulnerable" : true,
  56302. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d70:*:*:*:*:*:*",
  56303. "cpe_name" : [ ]
  56304. }, {
  56305. "vulnerable" : true,
  56306. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d75:*:*:*:*:*:*",
  56307. "cpe_name" : [ ]
  56308. }, {
  56309. "vulnerable" : true,
  56310. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d80:*:*:*:*:*:*",
  56311. "cpe_name" : [ ]
  56312. }, {
  56313. "vulnerable" : true,
  56314. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d85:*:*:*:*:*:*",
  56315. "cpe_name" : [ ]
  56316. }, {
  56317. "vulnerable" : true,
  56318. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d90:*:*:*:*:*:*",
  56319. "cpe_name" : [ ]
  56320. }, {
  56321. "vulnerable" : true,
  56322. "cpe23Uri" : "cpe:2.3:o:juniper:junos:12.3x48:d95:*:*:*:*:*:*",
  56323. "cpe_name" : [ ]
  56324. }, {
  56325. "vulnerable" : true,
  56326. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:-:*:*:*:*:*:*",
  56327. "cpe_name" : [ ]
  56328. }, {
  56329. "vulnerable" : true,
  56330. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
  56331. "cpe_name" : [ ]
  56332. }, {
  56333. "vulnerable" : true,
  56334. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*",
  56335. "cpe_name" : [ ]
  56336. }, {
  56337. "vulnerable" : true,
  56338. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*",
  56339. "cpe_name" : [ ]
  56340. }, {
  56341. "vulnerable" : true,
  56342. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*",
  56343. "cpe_name" : [ ]
  56344. }, {
  56345. "vulnerable" : true,
  56346. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d130:*:*:*:*:*:*",
  56347. "cpe_name" : [ ]
  56348. }, {
  56349. "vulnerable" : true,
  56350. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d131:*:*:*:*:*:*",
  56351. "cpe_name" : [ ]
  56352. }, {
  56353. "vulnerable" : true,
  56354. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*",
  56355. "cpe_name" : [ ]
  56356. }, {
  56357. "vulnerable" : true,
  56358. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d15:*:*:*:*:*:*",
  56359. "cpe_name" : [ ]
  56360. }, {
  56361. "vulnerable" : true,
  56362. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d150:*:*:*:*:*:*",
  56363. "cpe_name" : [ ]
  56364. }, {
  56365. "vulnerable" : true,
  56366. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d160:*:*:*:*:*:*",
  56367. "cpe_name" : [ ]
  56368. }, {
  56369. "vulnerable" : true,
  56370. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d170:*:*:*:*:*:*",
  56371. "cpe_name" : [ ]
  56372. }, {
  56373. "vulnerable" : true,
  56374. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d180:*:*:*:*:*:*",
  56375. "cpe_name" : [ ]
  56376. }, {
  56377. "vulnerable" : true,
  56378. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d190:*:*:*:*:*:*",
  56379. "cpe_name" : [ ]
  56380. }, {
  56381. "vulnerable" : true,
  56382. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
  56383. "cpe_name" : [ ]
  56384. }, {
  56385. "vulnerable" : true,
  56386. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d200:*:*:*:*:*:*",
  56387. "cpe_name" : [ ]
  56388. }, {
  56389. "vulnerable" : true,
  56390. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d210:*:*:*:*:*:*",
  56391. "cpe_name" : [ ]
  56392. }, {
  56393. "vulnerable" : true,
  56394. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d25:*:*:*:*:*:*",
  56395. "cpe_name" : [ ]
  56396. }, {
  56397. "vulnerable" : true,
  56398. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*",
  56399. "cpe_name" : [ ]
  56400. }, {
  56401. "vulnerable" : true,
  56402. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
  56403. "cpe_name" : [ ]
  56404. }, {
  56405. "vulnerable" : true,
  56406. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*",
  56407. "cpe_name" : [ ]
  56408. }, {
  56409. "vulnerable" : true,
  56410. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*",
  56411. "cpe_name" : [ ]
  56412. }, {
  56413. "vulnerable" : true,
  56414. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*",
  56415. "cpe_name" : [ ]
  56416. }, {
  56417. "vulnerable" : true,
  56418. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*",
  56419. "cpe_name" : [ ]
  56420. }, {
  56421. "vulnerable" : true,
  56422. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*",
  56423. "cpe_name" : [ ]
  56424. }, {
  56425. "vulnerable" : true,
  56426. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*",
  56427. "cpe_name" : [ ]
  56428. }, {
  56429. "vulnerable" : true,
  56430. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*",
  56431. "cpe_name" : [ ]
  56432. }, {
  56433. "vulnerable" : true,
  56434. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*",
  56435. "cpe_name" : [ ]
  56436. }, {
  56437. "vulnerable" : true,
  56438. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*",
  56439. "cpe_name" : [ ]
  56440. }, {
  56441. "vulnerable" : true,
  56442. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*",
  56443. "cpe_name" : [ ]
  56444. } ]
  56445. }, {
  56446. "operator" : "OR",
  56447. "children" : [ ],
  56448. "cpe_match" : [ {
  56449. "vulnerable" : false,
  56450. "cpe23Uri" : "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
  56451. "cpe_name" : [ ]
  56452. }, {
  56453. "vulnerable" : false,
  56454. "cpe23Uri" : "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
  56455. "cpe_name" : [ ]
  56456. }, {
  56457. "vulnerable" : false,
  56458. "cpe23Uri" : "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
  56459. "cpe_name" : [ ]
  56460. }, {
  56461. "vulnerable" : false,
  56462. "cpe23Uri" : "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
  56463. "cpe_name" : [ ]
  56464. }, {
  56465. "vulnerable" : false,
  56466. "cpe23Uri" : "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
  56467. "cpe_name" : [ ]
  56468. }, {
  56469. "vulnerable" : false,
  56470. "cpe23Uri" : "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
  56471. "cpe_name" : [ ]
  56472. }, {
  56473. "vulnerable" : false,
  56474. "cpe23Uri" : "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
  56475. "cpe_name" : [ ]
  56476. }, {
  56477. "vulnerable" : false,
  56478. "cpe23Uri" : "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
  56479. "cpe_name" : [ ]
  56480. }, {
  56481. "vulnerable" : false,
  56482. "cpe23Uri" : "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
  56483. "cpe_name" : [ ]
  56484. }, {
  56485. "vulnerable" : false,
  56486. "cpe23Uri" : "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
  56487. "cpe_name" : [ ]
  56488. }, {
  56489. "vulnerable" : false,
  56490. "cpe23Uri" : "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
  56491. "cpe_name" : [ ]
  56492. }, {
  56493. "vulnerable" : false,
  56494. "cpe23Uri" : "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
  56495. "cpe_name" : [ ]
  56496. }, {
  56497. "vulnerable" : false,
  56498. "cpe23Uri" : "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
  56499. "cpe_name" : [ ]
  56500. } ]
  56501. } ],
  56502. "cpe_match" : [ ]
  56503. }, {
  56504. "operator" : "OR",
  56505. "children" : [ ],
  56506. "cpe_match" : [ {
  56507. "vulnerable" : true,
  56508. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*",
  56509. "cpe_name" : [ ]
  56510. }, {
  56511. "vulnerable" : true,
  56512. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:*",
  56513. "cpe_name" : [ ]
  56514. }, {
  56515. "vulnerable" : true,
  56516. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*",
  56517. "cpe_name" : [ ]
  56518. }, {
  56519. "vulnerable" : true,
  56520. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*",
  56521. "cpe_name" : [ ]
  56522. }, {
  56523. "vulnerable" : true,
  56524. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
  56525. "cpe_name" : [ ]
  56526. }, {
  56527. "vulnerable" : true,
  56528. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
  56529. "cpe_name" : [ ]
  56530. }, {
  56531. "vulnerable" : true,
  56532. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
  56533. "cpe_name" : [ ]
  56534. }, {
  56535. "vulnerable" : true,
  56536. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
  56537. "cpe_name" : [ ]
  56538. }, {
  56539. "vulnerable" : true,
  56540. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
  56541. "cpe_name" : [ ]
  56542. }, {
  56543. "vulnerable" : true,
  56544. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
  56545. "cpe_name" : [ ]
  56546. }, {
  56547. "vulnerable" : true,
  56548. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
  56549. "cpe_name" : [ ]
  56550. }, {
  56551. "vulnerable" : true,
  56552. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
  56553. "cpe_name" : [ ]
  56554. }, {
  56555. "vulnerable" : true,
  56556. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:*",
  56557. "cpe_name" : [ ]
  56558. }, {
  56559. "vulnerable" : true,
  56560. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
  56561. "cpe_name" : [ ]
  56562. }, {
  56563. "vulnerable" : true,
  56564. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*",
  56565. "cpe_name" : [ ]
  56566. }, {
  56567. "vulnerable" : true,
  56568. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
  56569. "cpe_name" : [ ]
  56570. }, {
  56571. "vulnerable" : true,
  56572. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
  56573. "cpe_name" : [ ]
  56574. }, {
  56575. "vulnerable" : true,
  56576. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*",
  56577. "cpe_name" : [ ]
  56578. }, {
  56579. "vulnerable" : true,
  56580. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*",
  56581. "cpe_name" : [ ]
  56582. }, {
  56583. "vulnerable" : true,
  56584. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*",
  56585. "cpe_name" : [ ]
  56586. }, {
  56587. "vulnerable" : true,
  56588. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*",
  56589. "cpe_name" : [ ]
  56590. }, {
  56591. "vulnerable" : true,
  56592. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*",
  56593. "cpe_name" : [ ]
  56594. }, {
  56595. "vulnerable" : true,
  56596. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*",
  56597. "cpe_name" : [ ]
  56598. }, {
  56599. "vulnerable" : true,
  56600. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*",
  56601. "cpe_name" : [ ]
  56602. }, {
  56603. "vulnerable" : true,
  56604. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*",
  56605. "cpe_name" : [ ]
  56606. }, {
  56607. "vulnerable" : true,
  56608. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
  56609. "cpe_name" : [ ]
  56610. }, {
  56611. "vulnerable" : true,
  56612. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*",
  56613. "cpe_name" : [ ]
  56614. }, {
  56615. "vulnerable" : true,
  56616. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
  56617. "cpe_name" : [ ]
  56618. }, {
  56619. "vulnerable" : true,
  56620. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
  56621. "cpe_name" : [ ]
  56622. }, {
  56623. "vulnerable" : true,
  56624. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
  56625. "cpe_name" : [ ]
  56626. }, {
  56627. "vulnerable" : true,
  56628. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
  56629. "cpe_name" : [ ]
  56630. }, {
  56631. "vulnerable" : true,
  56632. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*",
  56633. "cpe_name" : [ ]
  56634. }, {
  56635. "vulnerable" : true,
  56636. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*",
  56637. "cpe_name" : [ ]
  56638. }, {
  56639. "vulnerable" : true,
  56640. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*",
  56641. "cpe_name" : [ ]
  56642. }, {
  56643. "vulnerable" : true,
  56644. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
  56645. "cpe_name" : [ ]
  56646. }, {
  56647. "vulnerable" : true,
  56648. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*",
  56649. "cpe_name" : [ ]
  56650. }, {
  56651. "vulnerable" : true,
  56652. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*",
  56653. "cpe_name" : [ ]
  56654. }, {
  56655. "vulnerable" : true,
  56656. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*",
  56657. "cpe_name" : [ ]
  56658. }, {
  56659. "vulnerable" : true,
  56660. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*",
  56661. "cpe_name" : [ ]
  56662. }, {
  56663. "vulnerable" : true,
  56664. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
  56665. "cpe_name" : [ ]
  56666. }, {
  56667. "vulnerable" : true,
  56668. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*",
  56669. "cpe_name" : [ ]
  56670. }, {
  56671. "vulnerable" : true,
  56672. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*",
  56673. "cpe_name" : [ ]
  56674. }, {
  56675. "vulnerable" : true,
  56676. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*",
  56677. "cpe_name" : [ ]
  56678. }, {
  56679. "vulnerable" : true,
  56680. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*",
  56681. "cpe_name" : [ ]
  56682. }, {
  56683. "vulnerable" : true,
  56684. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*",
  56685. "cpe_name" : [ ]
  56686. }, {
  56687. "vulnerable" : true,
  56688. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
  56689. "cpe_name" : [ ]
  56690. }, {
  56691. "vulnerable" : true,
  56692. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*",
  56693. "cpe_name" : [ ]
  56694. }, {
  56695. "vulnerable" : true,
  56696. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*",
  56697. "cpe_name" : [ ]
  56698. }, {
  56699. "vulnerable" : true,
  56700. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*",
  56701. "cpe_name" : [ ]
  56702. }, {
  56703. "vulnerable" : true,
  56704. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s4:*:*:*:*:*:*",
  56705. "cpe_name" : [ ]
  56706. }, {
  56707. "vulnerable" : true,
  56708. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s5:*:*:*:*:*:*",
  56709. "cpe_name" : [ ]
  56710. }, {
  56711. "vulnerable" : true,
  56712. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s6:*:*:*:*:*:*",
  56713. "cpe_name" : [ ]
  56714. }, {
  56715. "vulnerable" : true,
  56716. "cpe23Uri" : "cpe:2.3:o:juniper:junos:15.1:r7-s7:*:*:*:*:*:*",
  56717. "cpe_name" : [ ]
  56718. }, {
  56719. "vulnerable" : true,
  56720. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:-:*:*:*:*:*:*",
  56721. "cpe_name" : [ ]
  56722. }, {
  56723. "vulnerable" : true,
  56724. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r:*:*:*:*:*:*",
  56725. "cpe_name" : [ ]
  56726. }, {
  56727. "vulnerable" : true,
  56728. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
  56729. "cpe_name" : [ ]
  56730. }, {
  56731. "vulnerable" : true,
  56732. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
  56733. "cpe_name" : [ ]
  56734. }, {
  56735. "vulnerable" : true,
  56736. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
  56737. "cpe_name" : [ ]
  56738. }, {
  56739. "vulnerable" : true,
  56740. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:*",
  56741. "cpe_name" : [ ]
  56742. }, {
  56743. "vulnerable" : true,
  56744. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r3-s11:*:*:*:*:*:*",
  56745. "cpe_name" : [ ]
  56746. }, {
  56747. "vulnerable" : true,
  56748. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:*",
  56749. "cpe_name" : [ ]
  56750. }, {
  56751. "vulnerable" : true,
  56752. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
  56753. "cpe_name" : [ ]
  56754. }, {
  56755. "vulnerable" : true,
  56756. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s12:*:*:*:*:*:*",
  56757. "cpe_name" : [ ]
  56758. }, {
  56759. "vulnerable" : true,
  56760. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:*",
  56761. "cpe_name" : [ ]
  56762. }, {
  56763. "vulnerable" : true,
  56764. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:*",
  56765. "cpe_name" : [ ]
  56766. }, {
  56767. "vulnerable" : true,
  56768. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:*",
  56769. "cpe_name" : [ ]
  56770. }, {
  56771. "vulnerable" : true,
  56772. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:*",
  56773. "cpe_name" : [ ]
  56774. }, {
  56775. "vulnerable" : true,
  56776. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:*",
  56777. "cpe_name" : [ ]
  56778. }, {
  56779. "vulnerable" : true,
  56780. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*",
  56781. "cpe_name" : [ ]
  56782. }, {
  56783. "vulnerable" : true,
  56784. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*",
  56785. "cpe_name" : [ ]
  56786. }, {
  56787. "vulnerable" : true,
  56788. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*",
  56789. "cpe_name" : [ ]
  56790. }, {
  56791. "vulnerable" : true,
  56792. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*",
  56793. "cpe_name" : [ ]
  56794. }, {
  56795. "vulnerable" : true,
  56796. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*",
  56797. "cpe_name" : [ ]
  56798. }, {
  56799. "vulnerable" : true,
  56800. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*",
  56801. "cpe_name" : [ ]
  56802. }, {
  56803. "vulnerable" : true,
  56804. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:*",
  56805. "cpe_name" : [ ]
  56806. }, {
  56807. "vulnerable" : true,
  56808. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r6-s6:*:*:*:*:*:*",
  56809. "cpe_name" : [ ]
  56810. }, {
  56811. "vulnerable" : true,
  56812. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*",
  56813. "cpe_name" : [ ]
  56814. }, {
  56815. "vulnerable" : true,
  56816. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s2:*:*:*:*:*:*",
  56817. "cpe_name" : [ ]
  56818. }, {
  56819. "vulnerable" : true,
  56820. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s3:*:*:*:*:*:*",
  56821. "cpe_name" : [ ]
  56822. }, {
  56823. "vulnerable" : true,
  56824. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s4:*:*:*:*:*:*",
  56825. "cpe_name" : [ ]
  56826. }, {
  56827. "vulnerable" : true,
  56828. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s5:*:*:*:*:*:*",
  56829. "cpe_name" : [ ]
  56830. }, {
  56831. "vulnerable" : true,
  56832. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s6:*:*:*:*:*:*",
  56833. "cpe_name" : [ ]
  56834. }, {
  56835. "vulnerable" : true,
  56836. "cpe23Uri" : "cpe:2.3:o:juniper:junos:16.1:r7-s7:*:*:*:*:*:*",
  56837. "cpe_name" : [ ]
  56838. }, {
  56839. "vulnerable" : true,
  56840. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
  56841. "cpe_name" : [ ]
  56842. }, {
  56843. "vulnerable" : true,
  56844. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
  56845. "cpe_name" : [ ]
  56846. }, {
  56847. "vulnerable" : true,
  56848. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
  56849. "cpe_name" : [ ]
  56850. }, {
  56851. "vulnerable" : true,
  56852. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
  56853. "cpe_name" : [ ]
  56854. }, {
  56855. "vulnerable" : true,
  56856. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
  56857. "cpe_name" : [ ]
  56858. }, {
  56859. "vulnerable" : true,
  56860. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
  56861. "cpe_name" : [ ]
  56862. }, {
  56863. "vulnerable" : true,
  56864. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
  56865. "cpe_name" : [ ]
  56866. }, {
  56867. "vulnerable" : true,
  56868. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
  56869. "cpe_name" : [ ]
  56870. }, {
  56871. "vulnerable" : true,
  56872. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
  56873. "cpe_name" : [ ]
  56874. }, {
  56875. "vulnerable" : true,
  56876. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
  56877. "cpe_name" : [ ]
  56878. }, {
  56879. "vulnerable" : true,
  56880. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
  56881. "cpe_name" : [ ]
  56882. }, {
  56883. "vulnerable" : true,
  56884. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
  56885. "cpe_name" : [ ]
  56886. }, {
  56887. "vulnerable" : true,
  56888. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
  56889. "cpe_name" : [ ]
  56890. }, {
  56891. "vulnerable" : true,
  56892. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
  56893. "cpe_name" : [ ]
  56894. }, {
  56895. "vulnerable" : true,
  56896. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
  56897. "cpe_name" : [ ]
  56898. }, {
  56899. "vulnerable" : true,
  56900. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
  56901. "cpe_name" : [ ]
  56902. }, {
  56903. "vulnerable" : true,
  56904. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
  56905. "cpe_name" : [ ]
  56906. }, {
  56907. "vulnerable" : true,
  56908. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
  56909. "cpe_name" : [ ]
  56910. }, {
  56911. "vulnerable" : true,
  56912. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
  56913. "cpe_name" : [ ]
  56914. }, {
  56915. "vulnerable" : true,
  56916. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
  56917. "cpe_name" : [ ]
  56918. }, {
  56919. "vulnerable" : true,
  56920. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
  56921. "cpe_name" : [ ]
  56922. }, {
  56923. "vulnerable" : true,
  56924. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
  56925. "cpe_name" : [ ]
  56926. }, {
  56927. "vulnerable" : true,
  56928. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
  56929. "cpe_name" : [ ]
  56930. }, {
  56931. "vulnerable" : true,
  56932. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
  56933. "cpe_name" : [ ]
  56934. }, {
  56935. "vulnerable" : true,
  56936. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
  56937. "cpe_name" : [ ]
  56938. }, {
  56939. "vulnerable" : true,
  56940. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
  56941. "cpe_name" : [ ]
  56942. }, {
  56943. "vulnerable" : true,
  56944. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
  56945. "cpe_name" : [ ]
  56946. }, {
  56947. "vulnerable" : true,
  56948. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
  56949. "cpe_name" : [ ]
  56950. }, {
  56951. "vulnerable" : true,
  56952. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
  56953. "cpe_name" : [ ]
  56954. }, {
  56955. "vulnerable" : true,
  56956. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
  56957. "cpe_name" : [ ]
  56958. }, {
  56959. "vulnerable" : true,
  56960. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
  56961. "cpe_name" : [ ]
  56962. }, {
  56963. "vulnerable" : true,
  56964. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
  56965. "cpe_name" : [ ]
  56966. }, {
  56967. "vulnerable" : true,
  56968. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
  56969. "cpe_name" : [ ]
  56970. }, {
  56971. "vulnerable" : true,
  56972. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
  56973. "cpe_name" : [ ]
  56974. }, {
  56975. "vulnerable" : true,
  56976. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
  56977. "cpe_name" : [ ]
  56978. }, {
  56979. "vulnerable" : true,
  56980. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
  56981. "cpe_name" : [ ]
  56982. }, {
  56983. "vulnerable" : true,
  56984. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
  56985. "cpe_name" : [ ]
  56986. }, {
  56987. "vulnerable" : true,
  56988. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
  56989. "cpe_name" : [ ]
  56990. }, {
  56991. "vulnerable" : true,
  56992. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
  56993. "cpe_name" : [ ]
  56994. }, {
  56995. "vulnerable" : true,
  56996. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
  56997. "cpe_name" : [ ]
  56998. }, {
  56999. "vulnerable" : true,
  57000. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
  57001. "cpe_name" : [ ]
  57002. }, {
  57003. "vulnerable" : true,
  57004. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
  57005. "cpe_name" : [ ]
  57006. }, {
  57007. "vulnerable" : true,
  57008. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
  57009. "cpe_name" : [ ]
  57010. }, {
  57011. "vulnerable" : true,
  57012. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
  57013. "cpe_name" : [ ]
  57014. }, {
  57015. "vulnerable" : true,
  57016. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
  57017. "cpe_name" : [ ]
  57018. }, {
  57019. "vulnerable" : true,
  57020. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
  57021. "cpe_name" : [ ]
  57022. }, {
  57023. "vulnerable" : true,
  57024. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
  57025. "cpe_name" : [ ]
  57026. }, {
  57027. "vulnerable" : true,
  57028. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
  57029. "cpe_name" : [ ]
  57030. }, {
  57031. "vulnerable" : true,
  57032. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
  57033. "cpe_name" : [ ]
  57034. }, {
  57035. "vulnerable" : true,
  57036. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
  57037. "cpe_name" : [ ]
  57038. }, {
  57039. "vulnerable" : true,
  57040. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s10:*:*:*:*:*:*",
  57041. "cpe_name" : [ ]
  57042. }, {
  57043. "vulnerable" : true,
  57044. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
  57045. "cpe_name" : [ ]
  57046. }, {
  57047. "vulnerable" : true,
  57048. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
  57049. "cpe_name" : [ ]
  57050. }, {
  57051. "vulnerable" : true,
  57052. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
  57053. "cpe_name" : [ ]
  57054. }, {
  57055. "vulnerable" : true,
  57056. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
  57057. "cpe_name" : [ ]
  57058. }, {
  57059. "vulnerable" : true,
  57060. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
  57061. "cpe_name" : [ ]
  57062. }, {
  57063. "vulnerable" : true,
  57064. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
  57065. "cpe_name" : [ ]
  57066. }, {
  57067. "vulnerable" : true,
  57068. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
  57069. "cpe_name" : [ ]
  57070. }, {
  57071. "vulnerable" : true,
  57072. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
  57073. "cpe_name" : [ ]
  57074. }, {
  57075. "vulnerable" : true,
  57076. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
  57077. "cpe_name" : [ ]
  57078. }, {
  57079. "vulnerable" : true,
  57080. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
  57081. "cpe_name" : [ ]
  57082. }, {
  57083. "vulnerable" : true,
  57084. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
  57085. "cpe_name" : [ ]
  57086. }, {
  57087. "vulnerable" : true,
  57088. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
  57089. "cpe_name" : [ ]
  57090. }, {
  57091. "vulnerable" : true,
  57092. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
  57093. "cpe_name" : [ ]
  57094. }, {
  57095. "vulnerable" : true,
  57096. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
  57097. "cpe_name" : [ ]
  57098. }, {
  57099. "vulnerable" : true,
  57100. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
  57101. "cpe_name" : [ ]
  57102. }, {
  57103. "vulnerable" : true,
  57104. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
  57105. "cpe_name" : [ ]
  57106. }, {
  57107. "vulnerable" : true,
  57108. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
  57109. "cpe_name" : [ ]
  57110. }, {
  57111. "vulnerable" : true,
  57112. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
  57113. "cpe_name" : [ ]
  57114. }, {
  57115. "vulnerable" : true,
  57116. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
  57117. "cpe_name" : [ ]
  57118. }, {
  57119. "vulnerable" : true,
  57120. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
  57121. "cpe_name" : [ ]
  57122. }, {
  57123. "vulnerable" : true,
  57124. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
  57125. "cpe_name" : [ ]
  57126. }, {
  57127. "vulnerable" : true,
  57128. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
  57129. "cpe_name" : [ ]
  57130. }, {
  57131. "vulnerable" : true,
  57132. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
  57133. "cpe_name" : [ ]
  57134. }, {
  57135. "vulnerable" : true,
  57136. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
  57137. "cpe_name" : [ ]
  57138. }, {
  57139. "vulnerable" : true,
  57140. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
  57141. "cpe_name" : [ ]
  57142. }, {
  57143. "vulnerable" : true,
  57144. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
  57145. "cpe_name" : [ ]
  57146. }, {
  57147. "vulnerable" : true,
  57148. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
  57149. "cpe_name" : [ ]
  57150. }, {
  57151. "vulnerable" : true,
  57152. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
  57153. "cpe_name" : [ ]
  57154. }, {
  57155. "vulnerable" : true,
  57156. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
  57157. "cpe_name" : [ ]
  57158. }, {
  57159. "vulnerable" : true,
  57160. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
  57161. "cpe_name" : [ ]
  57162. }, {
  57163. "vulnerable" : true,
  57164. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
  57165. "cpe_name" : [ ]
  57166. }, {
  57167. "vulnerable" : true,
  57168. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
  57169. "cpe_name" : [ ]
  57170. }, {
  57171. "vulnerable" : true,
  57172. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
  57173. "cpe_name" : [ ]
  57174. }, {
  57175. "vulnerable" : true,
  57176. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
  57177. "cpe_name" : [ ]
  57178. }, {
  57179. "vulnerable" : true,
  57180. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
  57181. "cpe_name" : [ ]
  57182. }, {
  57183. "vulnerable" : true,
  57184. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
  57185. "cpe_name" : [ ]
  57186. }, {
  57187. "vulnerable" : true,
  57188. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
  57189. "cpe_name" : [ ]
  57190. }, {
  57191. "vulnerable" : true,
  57192. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
  57193. "cpe_name" : [ ]
  57194. }, {
  57195. "vulnerable" : true,
  57196. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
  57197. "cpe_name" : [ ]
  57198. }, {
  57199. "vulnerable" : true,
  57200. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
  57201. "cpe_name" : [ ]
  57202. }, {
  57203. "vulnerable" : true,
  57204. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
  57205. "cpe_name" : [ ]
  57206. }, {
  57207. "vulnerable" : true,
  57208. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
  57209. "cpe_name" : [ ]
  57210. }, {
  57211. "vulnerable" : true,
  57212. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
  57213. "cpe_name" : [ ]
  57214. }, {
  57215. "vulnerable" : true,
  57216. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
  57217. "cpe_name" : [ ]
  57218. }, {
  57219. "vulnerable" : true,
  57220. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
  57221. "cpe_name" : [ ]
  57222. }, {
  57223. "vulnerable" : true,
  57224. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
  57225. "cpe_name" : [ ]
  57226. }, {
  57227. "vulnerable" : true,
  57228. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
  57229. "cpe_name" : [ ]
  57230. }, {
  57231. "vulnerable" : true,
  57232. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
  57233. "cpe_name" : [ ]
  57234. }, {
  57235. "vulnerable" : true,
  57236. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
  57237. "cpe_name" : [ ]
  57238. }, {
  57239. "vulnerable" : true,
  57240. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
  57241. "cpe_name" : [ ]
  57242. }, {
  57243. "vulnerable" : true,
  57244. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
  57245. "cpe_name" : [ ]
  57246. }, {
  57247. "vulnerable" : true,
  57248. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
  57249. "cpe_name" : [ ]
  57250. }, {
  57251. "vulnerable" : true,
  57252. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
  57253. "cpe_name" : [ ]
  57254. }, {
  57255. "vulnerable" : true,
  57256. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
  57257. "cpe_name" : [ ]
  57258. }, {
  57259. "vulnerable" : true,
  57260. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
  57261. "cpe_name" : [ ]
  57262. }, {
  57263. "vulnerable" : true,
  57264. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
  57265. "cpe_name" : [ ]
  57266. }, {
  57267. "vulnerable" : true,
  57268. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
  57269. "cpe_name" : [ ]
  57270. }, {
  57271. "vulnerable" : true,
  57272. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
  57273. "cpe_name" : [ ]
  57274. }, {
  57275. "vulnerable" : true,
  57276. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
  57277. "cpe_name" : [ ]
  57278. }, {
  57279. "vulnerable" : true,
  57280. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
  57281. "cpe_name" : [ ]
  57282. }, {
  57283. "vulnerable" : true,
  57284. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
  57285. "cpe_name" : [ ]
  57286. }, {
  57287. "vulnerable" : true,
  57288. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
  57289. "cpe_name" : [ ]
  57290. }, {
  57291. "vulnerable" : true,
  57292. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
  57293. "cpe_name" : [ ]
  57294. }, {
  57295. "vulnerable" : true,
  57296. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
  57297. "cpe_name" : [ ]
  57298. }, {
  57299. "vulnerable" : true,
  57300. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
  57301. "cpe_name" : [ ]
  57302. }, {
  57303. "vulnerable" : true,
  57304. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
  57305. "cpe_name" : [ ]
  57306. }, {
  57307. "vulnerable" : true,
  57308. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
  57309. "cpe_name" : [ ]
  57310. }, {
  57311. "vulnerable" : true,
  57312. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
  57313. "cpe_name" : [ ]
  57314. }, {
  57315. "vulnerable" : true,
  57316. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
  57317. "cpe_name" : [ ]
  57318. }, {
  57319. "vulnerable" : true,
  57320. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
  57321. "cpe_name" : [ ]
  57322. }, {
  57323. "vulnerable" : true,
  57324. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
  57325. "cpe_name" : [ ]
  57326. }, {
  57327. "vulnerable" : true,
  57328. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
  57329. "cpe_name" : [ ]
  57330. }, {
  57331. "vulnerable" : true,
  57332. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
  57333. "cpe_name" : [ ]
  57334. }, {
  57335. "vulnerable" : true,
  57336. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
  57337. "cpe_name" : [ ]
  57338. }, {
  57339. "vulnerable" : true,
  57340. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
  57341. "cpe_name" : [ ]
  57342. }, {
  57343. "vulnerable" : true,
  57344. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
  57345. "cpe_name" : [ ]
  57346. }, {
  57347. "vulnerable" : true,
  57348. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
  57349. "cpe_name" : [ ]
  57350. }, {
  57351. "vulnerable" : true,
  57352. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
  57353. "cpe_name" : [ ]
  57354. }, {
  57355. "vulnerable" : true,
  57356. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
  57357. "cpe_name" : [ ]
  57358. }, {
  57359. "vulnerable" : true,
  57360. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
  57361. "cpe_name" : [ ]
  57362. }, {
  57363. "vulnerable" : true,
  57364. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
  57365. "cpe_name" : [ ]
  57366. }, {
  57367. "vulnerable" : true,
  57368. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
  57369. "cpe_name" : [ ]
  57370. }, {
  57371. "vulnerable" : true,
  57372. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
  57373. "cpe_name" : [ ]
  57374. }, {
  57375. "vulnerable" : true,
  57376. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
  57377. "cpe_name" : [ ]
  57378. }, {
  57379. "vulnerable" : true,
  57380. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
  57381. "cpe_name" : [ ]
  57382. }, {
  57383. "vulnerable" : true,
  57384. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
  57385. "cpe_name" : [ ]
  57386. }, {
  57387. "vulnerable" : true,
  57388. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
  57389. "cpe_name" : [ ]
  57390. }, {
  57391. "vulnerable" : true,
  57392. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
  57393. "cpe_name" : [ ]
  57394. }, {
  57395. "vulnerable" : true,
  57396. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
  57397. "cpe_name" : [ ]
  57398. }, {
  57399. "vulnerable" : true,
  57400. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
  57401. "cpe_name" : [ ]
  57402. }, {
  57403. "vulnerable" : true,
  57404. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
  57405. "cpe_name" : [ ]
  57406. }, {
  57407. "vulnerable" : true,
  57408. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
  57409. "cpe_name" : [ ]
  57410. }, {
  57411. "vulnerable" : true,
  57412. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
  57413. "cpe_name" : [ ]
  57414. }, {
  57415. "vulnerable" : true,
  57416. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
  57417. "cpe_name" : [ ]
  57418. }, {
  57419. "vulnerable" : true,
  57420. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
  57421. "cpe_name" : [ ]
  57422. }, {
  57423. "vulnerable" : true,
  57424. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
  57425. "cpe_name" : [ ]
  57426. }, {
  57427. "vulnerable" : true,
  57428. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
  57429. "cpe_name" : [ ]
  57430. } ]
  57431. } ]
  57432. },
  57433. "impact" : {
  57434. "baseMetricV3" : {
  57435. "cvssV3" : {
  57436. "version" : "3.1",
  57437. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  57438. "attackVector" : "NETWORK",
  57439. "attackComplexity" : "LOW",
  57440. "privilegesRequired" : "NONE",
  57441. "userInteraction" : "NONE",
  57442. "scope" : "UNCHANGED",
  57443. "confidentialityImpact" : "NONE",
  57444. "integrityImpact" : "NONE",
  57445. "availabilityImpact" : "HIGH",
  57446. "baseScore" : 7.5,
  57447. "baseSeverity" : "HIGH"
  57448. },
  57449. "exploitabilityScore" : 3.9,
  57450. "impactScore" : 3.6
  57451. },
  57452. "baseMetricV2" : {
  57453. "cvssV2" : {
  57454. "version" : "2.0",
  57455. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  57456. "accessVector" : "NETWORK",
  57457. "accessComplexity" : "LOW",
  57458. "authentication" : "NONE",
  57459. "confidentialityImpact" : "NONE",
  57460. "integrityImpact" : "NONE",
  57461. "availabilityImpact" : "PARTIAL",
  57462. "baseScore" : 5.0
  57463. },
  57464. "severity" : "MEDIUM",
  57465. "exploitabilityScore" : 10.0,
  57466. "impactScore" : 2.9,
  57467. "acInsufInfo" : false,
  57468. "obtainAllPrivilege" : false,
  57469. "obtainUserPrivilege" : false,
  57470. "obtainOtherPrivilege" : false,
  57471. "userInteractionRequired" : false
  57472. }
  57473. },
  57474. "publishedDate" : "2021-04-22T20:15Z",
  57475. "lastModifiedDate" : "2021-05-04T21:56Z"
  57476. }, {
  57477. "cve" : {
  57478. "data_type" : "CVE",
  57479. "data_format" : "MITRE",
  57480. "data_version" : "4.0",
  57481. "CVE_data_meta" : {
  57482. "ID" : "CVE-2021-0259",
  57483. "ASSIGNER" : "sirt@juniper.net"
  57484. },
  57485. "problemtype" : {
  57486. "problemtype_data" : [ {
  57487. "description" : [ {
  57488. "lang" : "en",
  57489. "value" : "CWE-755"
  57490. } ]
  57491. } ]
  57492. },
  57493. "references" : {
  57494. "reference_data" : [ {
  57495. "url" : "https://kb.juniper.net/JSA11150",
  57496. "name" : "https://kb.juniper.net/JSA11150",
  57497. "refsource" : "MISC",
  57498. "tags" : [ "Vendor Advisory" ]
  57499. } ]
  57500. },
  57501. "description" : {
  57502. "description_data" : [ {
  57503. "lang" : "en",
  57504. "value" : "Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-protection aggregate threshold. If an attacker on a client device on the overlay network sends a high volume of specific, legitimate traffic in the overlay network, due to an improperly detected DDoS violation, the leaf might not process certain L2 traffic, sent by spines in the underlay network. Continued receipt and processing of the high volume traffic will sustain the Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on QFX5K Series: 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R3-S5; 18.1 versions prior to 18.1R3-S13; 18.2 versions prior to 18.2R2-S8, 18.2R3-S8; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S2; 19.4 versions prior to 19.4R2-S4, 19.4R3-S1; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2; 20.3 versions prior to 20.3R1-S2, 20.3R2. Juniper Networks Junos OS Evolved on QFX5220: All versions prior to 20.3R2-EVO."
  57505. } ]
  57506. }
  57507. },
  57508. "configurations" : {
  57509. "CVE_data_version" : "4.0",
  57510. "nodes" : [ {
  57511. "operator" : "AND",
  57512. "children" : [ {
  57513. "operator" : "OR",
  57514. "children" : [ ],
  57515. "cpe_match" : [ {
  57516. "vulnerable" : true,
  57517. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
  57518. "cpe_name" : [ ]
  57519. }, {
  57520. "vulnerable" : true,
  57521. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
  57522. "cpe_name" : [ ]
  57523. }, {
  57524. "vulnerable" : true,
  57525. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
  57526. "cpe_name" : [ ]
  57527. }, {
  57528. "vulnerable" : true,
  57529. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
  57530. "cpe_name" : [ ]
  57531. }, {
  57532. "vulnerable" : true,
  57533. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
  57534. "cpe_name" : [ ]
  57535. }, {
  57536. "vulnerable" : true,
  57537. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
  57538. "cpe_name" : [ ]
  57539. }, {
  57540. "vulnerable" : true,
  57541. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
  57542. "cpe_name" : [ ]
  57543. }, {
  57544. "vulnerable" : true,
  57545. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
  57546. "cpe_name" : [ ]
  57547. }, {
  57548. "vulnerable" : true,
  57549. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
  57550. "cpe_name" : [ ]
  57551. }, {
  57552. "vulnerable" : true,
  57553. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
  57554. "cpe_name" : [ ]
  57555. }, {
  57556. "vulnerable" : true,
  57557. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
  57558. "cpe_name" : [ ]
  57559. }, {
  57560. "vulnerable" : true,
  57561. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
  57562. "cpe_name" : [ ]
  57563. }, {
  57564. "vulnerable" : true,
  57565. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
  57566. "cpe_name" : [ ]
  57567. }, {
  57568. "vulnerable" : true,
  57569. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*",
  57570. "cpe_name" : [ ]
  57571. }, {
  57572. "vulnerable" : true,
  57573. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
  57574. "cpe_name" : [ ]
  57575. }, {
  57576. "vulnerable" : true,
  57577. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
  57578. "cpe_name" : [ ]
  57579. }, {
  57580. "vulnerable" : true,
  57581. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
  57582. "cpe_name" : [ ]
  57583. }, {
  57584. "vulnerable" : true,
  57585. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
  57586. "cpe_name" : [ ]
  57587. }, {
  57588. "vulnerable" : true,
  57589. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
  57590. "cpe_name" : [ ]
  57591. }, {
  57592. "vulnerable" : true,
  57593. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
  57594. "cpe_name" : [ ]
  57595. }, {
  57596. "vulnerable" : true,
  57597. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
  57598. "cpe_name" : [ ]
  57599. }, {
  57600. "vulnerable" : true,
  57601. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
  57602. "cpe_name" : [ ]
  57603. }, {
  57604. "vulnerable" : true,
  57605. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
  57606. "cpe_name" : [ ]
  57607. }, {
  57608. "vulnerable" : true,
  57609. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
  57610. "cpe_name" : [ ]
  57611. }, {
  57612. "vulnerable" : true,
  57613. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
  57614. "cpe_name" : [ ]
  57615. }, {
  57616. "vulnerable" : true,
  57617. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
  57618. "cpe_name" : [ ]
  57619. }, {
  57620. "vulnerable" : true,
  57621. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
  57622. "cpe_name" : [ ]
  57623. }, {
  57624. "vulnerable" : true,
  57625. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
  57626. "cpe_name" : [ ]
  57627. }, {
  57628. "vulnerable" : true,
  57629. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
  57630. "cpe_name" : [ ]
  57631. }, {
  57632. "vulnerable" : true,
  57633. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
  57634. "cpe_name" : [ ]
  57635. }, {
  57636. "vulnerable" : true,
  57637. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
  57638. "cpe_name" : [ ]
  57639. }, {
  57640. "vulnerable" : true,
  57641. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
  57642. "cpe_name" : [ ]
  57643. }, {
  57644. "vulnerable" : true,
  57645. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
  57646. "cpe_name" : [ ]
  57647. }, {
  57648. "vulnerable" : true,
  57649. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
  57650. "cpe_name" : [ ]
  57651. }, {
  57652. "vulnerable" : true,
  57653. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
  57654. "cpe_name" : [ ]
  57655. }, {
  57656. "vulnerable" : true,
  57657. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
  57658. "cpe_name" : [ ]
  57659. }, {
  57660. "vulnerable" : true,
  57661. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
  57662. "cpe_name" : [ ]
  57663. }, {
  57664. "vulnerable" : true,
  57665. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
  57666. "cpe_name" : [ ]
  57667. }, {
  57668. "vulnerable" : true,
  57669. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
  57670. "cpe_name" : [ ]
  57671. }, {
  57672. "vulnerable" : true,
  57673. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
  57674. "cpe_name" : [ ]
  57675. }, {
  57676. "vulnerable" : true,
  57677. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
  57678. "cpe_name" : [ ]
  57679. }, {
  57680. "vulnerable" : true,
  57681. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
  57682. "cpe_name" : [ ]
  57683. }, {
  57684. "vulnerable" : true,
  57685. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
  57686. "cpe_name" : [ ]
  57687. }, {
  57688. "vulnerable" : true,
  57689. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
  57690. "cpe_name" : [ ]
  57691. }, {
  57692. "vulnerable" : true,
  57693. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
  57694. "cpe_name" : [ ]
  57695. }, {
  57696. "vulnerable" : true,
  57697. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
  57698. "cpe_name" : [ ]
  57699. }, {
  57700. "vulnerable" : true,
  57701. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3-s3:*:*:*:*:*:*",
  57702. "cpe_name" : [ ]
  57703. }, {
  57704. "vulnerable" : true,
  57705. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3-s4:*:*:*:*:*:*",
  57706. "cpe_name" : [ ]
  57707. }, {
  57708. "vulnerable" : true,
  57709. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
  57710. "cpe_name" : [ ]
  57711. }, {
  57712. "vulnerable" : true,
  57713. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
  57714. "cpe_name" : [ ]
  57715. }, {
  57716. "vulnerable" : true,
  57717. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
  57718. "cpe_name" : [ ]
  57719. }, {
  57720. "vulnerable" : true,
  57721. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
  57722. "cpe_name" : [ ]
  57723. }, {
  57724. "vulnerable" : true,
  57725. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
  57726. "cpe_name" : [ ]
  57727. }, {
  57728. "vulnerable" : true,
  57729. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
  57730. "cpe_name" : [ ]
  57731. }, {
  57732. "vulnerable" : true,
  57733. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
  57734. "cpe_name" : [ ]
  57735. }, {
  57736. "vulnerable" : true,
  57737. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
  57738. "cpe_name" : [ ]
  57739. }, {
  57740. "vulnerable" : true,
  57741. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s10:*:*:*:*:*:*",
  57742. "cpe_name" : [ ]
  57743. }, {
  57744. "vulnerable" : true,
  57745. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s11:*:*:*:*:*:*",
  57746. "cpe_name" : [ ]
  57747. }, {
  57748. "vulnerable" : true,
  57749. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s12:*:*:*:*:*:*",
  57750. "cpe_name" : [ ]
  57751. }, {
  57752. "vulnerable" : true,
  57753. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
  57754. "cpe_name" : [ ]
  57755. }, {
  57756. "vulnerable" : true,
  57757. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
  57758. "cpe_name" : [ ]
  57759. }, {
  57760. "vulnerable" : true,
  57761. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
  57762. "cpe_name" : [ ]
  57763. }, {
  57764. "vulnerable" : true,
  57765. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
  57766. "cpe_name" : [ ]
  57767. }, {
  57768. "vulnerable" : true,
  57769. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
  57770. "cpe_name" : [ ]
  57771. }, {
  57772. "vulnerable" : true,
  57773. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
  57774. "cpe_name" : [ ]
  57775. }, {
  57776. "vulnerable" : true,
  57777. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
  57778. "cpe_name" : [ ]
  57779. }, {
  57780. "vulnerable" : true,
  57781. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
  57782. "cpe_name" : [ ]
  57783. }, {
  57784. "vulnerable" : true,
  57785. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
  57786. "cpe_name" : [ ]
  57787. }, {
  57788. "vulnerable" : true,
  57789. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
  57790. "cpe_name" : [ ]
  57791. }, {
  57792. "vulnerable" : true,
  57793. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
  57794. "cpe_name" : [ ]
  57795. }, {
  57796. "vulnerable" : true,
  57797. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
  57798. "cpe_name" : [ ]
  57799. }, {
  57800. "vulnerable" : true,
  57801. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
  57802. "cpe_name" : [ ]
  57803. }, {
  57804. "vulnerable" : true,
  57805. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
  57806. "cpe_name" : [ ]
  57807. }, {
  57808. "vulnerable" : true,
  57809. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
  57810. "cpe_name" : [ ]
  57811. }, {
  57812. "vulnerable" : true,
  57813. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
  57814. "cpe_name" : [ ]
  57815. }, {
  57816. "vulnerable" : true,
  57817. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
  57818. "cpe_name" : [ ]
  57819. }, {
  57820. "vulnerable" : true,
  57821. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
  57822. "cpe_name" : [ ]
  57823. }, {
  57824. "vulnerable" : true,
  57825. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
  57826. "cpe_name" : [ ]
  57827. }, {
  57828. "vulnerable" : true,
  57829. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
  57830. "cpe_name" : [ ]
  57831. }, {
  57832. "vulnerable" : true,
  57833. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
  57834. "cpe_name" : [ ]
  57835. }, {
  57836. "vulnerable" : true,
  57837. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
  57838. "cpe_name" : [ ]
  57839. }, {
  57840. "vulnerable" : true,
  57841. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
  57842. "cpe_name" : [ ]
  57843. }, {
  57844. "vulnerable" : true,
  57845. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
  57846. "cpe_name" : [ ]
  57847. }, {
  57848. "vulnerable" : true,
  57849. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
  57850. "cpe_name" : [ ]
  57851. }, {
  57852. "vulnerable" : true,
  57853. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
  57854. "cpe_name" : [ ]
  57855. }, {
  57856. "vulnerable" : true,
  57857. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
  57858. "cpe_name" : [ ]
  57859. }, {
  57860. "vulnerable" : true,
  57861. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
  57862. "cpe_name" : [ ]
  57863. }, {
  57864. "vulnerable" : true,
  57865. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
  57866. "cpe_name" : [ ]
  57867. }, {
  57868. "vulnerable" : true,
  57869. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s6:*:*:*:*:*:*",
  57870. "cpe_name" : [ ]
  57871. }, {
  57872. "vulnerable" : true,
  57873. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s7:*:*:*:*:*:*",
  57874. "cpe_name" : [ ]
  57875. }, {
  57876. "vulnerable" : true,
  57877. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
  57878. "cpe_name" : [ ]
  57879. }, {
  57880. "vulnerable" : true,
  57881. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
  57882. "cpe_name" : [ ]
  57883. }, {
  57884. "vulnerable" : true,
  57885. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
  57886. "cpe_name" : [ ]
  57887. }, {
  57888. "vulnerable" : true,
  57889. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
  57890. "cpe_name" : [ ]
  57891. }, {
  57892. "vulnerable" : true,
  57893. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
  57894. "cpe_name" : [ ]
  57895. }, {
  57896. "vulnerable" : true,
  57897. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
  57898. "cpe_name" : [ ]
  57899. }, {
  57900. "vulnerable" : true,
  57901. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
  57902. "cpe_name" : [ ]
  57903. }, {
  57904. "vulnerable" : true,
  57905. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
  57906. "cpe_name" : [ ]
  57907. }, {
  57908. "vulnerable" : true,
  57909. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
  57910. "cpe_name" : [ ]
  57911. }, {
  57912. "vulnerable" : true,
  57913. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
  57914. "cpe_name" : [ ]
  57915. }, {
  57916. "vulnerable" : true,
  57917. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
  57918. "cpe_name" : [ ]
  57919. }, {
  57920. "vulnerable" : true,
  57921. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
  57922. "cpe_name" : [ ]
  57923. }, {
  57924. "vulnerable" : true,
  57925. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
  57926. "cpe_name" : [ ]
  57927. }, {
  57928. "vulnerable" : true,
  57929. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
  57930. "cpe_name" : [ ]
  57931. }, {
  57932. "vulnerable" : true,
  57933. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
  57934. "cpe_name" : [ ]
  57935. }, {
  57936. "vulnerable" : true,
  57937. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
  57938. "cpe_name" : [ ]
  57939. }, {
  57940. "vulnerable" : true,
  57941. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
  57942. "cpe_name" : [ ]
  57943. }, {
  57944. "vulnerable" : true,
  57945. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s4:*:*:*:*:*:*",
  57946. "cpe_name" : [ ]
  57947. }, {
  57948. "vulnerable" : true,
  57949. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
  57950. "cpe_name" : [ ]
  57951. }, {
  57952. "vulnerable" : true,
  57953. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
  57954. "cpe_name" : [ ]
  57955. }, {
  57956. "vulnerable" : true,
  57957. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
  57958. "cpe_name" : [ ]
  57959. }, {
  57960. "vulnerable" : true,
  57961. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
  57962. "cpe_name" : [ ]
  57963. }, {
  57964. "vulnerable" : true,
  57965. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
  57966. "cpe_name" : [ ]
  57967. }, {
  57968. "vulnerable" : true,
  57969. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
  57970. "cpe_name" : [ ]
  57971. }, {
  57972. "vulnerable" : true,
  57973. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
  57974. "cpe_name" : [ ]
  57975. }, {
  57976. "vulnerable" : true,
  57977. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
  57978. "cpe_name" : [ ]
  57979. }, {
  57980. "vulnerable" : true,
  57981. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
  57982. "cpe_name" : [ ]
  57983. }, {
  57984. "vulnerable" : true,
  57985. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
  57986. "cpe_name" : [ ]
  57987. }, {
  57988. "vulnerable" : true,
  57989. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
  57990. "cpe_name" : [ ]
  57991. }, {
  57992. "vulnerable" : true,
  57993. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
  57994. "cpe_name" : [ ]
  57995. }, {
  57996. "vulnerable" : true,
  57997. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
  57998. "cpe_name" : [ ]
  57999. }, {
  58000. "vulnerable" : true,
  58001. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
  58002. "cpe_name" : [ ]
  58003. }, {
  58004. "vulnerable" : true,
  58005. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
  58006. "cpe_name" : [ ]
  58007. }, {
  58008. "vulnerable" : true,
  58009. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
  58010. "cpe_name" : [ ]
  58011. }, {
  58012. "vulnerable" : true,
  58013. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
  58014. "cpe_name" : [ ]
  58015. }, {
  58016. "vulnerable" : true,
  58017. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
  58018. "cpe_name" : [ ]
  58019. }, {
  58020. "vulnerable" : true,
  58021. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
  58022. "cpe_name" : [ ]
  58023. }, {
  58024. "vulnerable" : true,
  58025. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
  58026. "cpe_name" : [ ]
  58027. }, {
  58028. "vulnerable" : true,
  58029. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
  58030. "cpe_name" : [ ]
  58031. }, {
  58032. "vulnerable" : true,
  58033. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
  58034. "cpe_name" : [ ]
  58035. }, {
  58036. "vulnerable" : true,
  58037. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
  58038. "cpe_name" : [ ]
  58039. }, {
  58040. "vulnerable" : true,
  58041. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
  58042. "cpe_name" : [ ]
  58043. }, {
  58044. "vulnerable" : true,
  58045. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
  58046. "cpe_name" : [ ]
  58047. }, {
  58048. "vulnerable" : true,
  58049. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
  58050. "cpe_name" : [ ]
  58051. }, {
  58052. "vulnerable" : true,
  58053. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
  58054. "cpe_name" : [ ]
  58055. }, {
  58056. "vulnerable" : true,
  58057. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
  58058. "cpe_name" : [ ]
  58059. }, {
  58060. "vulnerable" : true,
  58061. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
  58062. "cpe_name" : [ ]
  58063. }, {
  58064. "vulnerable" : true,
  58065. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
  58066. "cpe_name" : [ ]
  58067. }, {
  58068. "vulnerable" : true,
  58069. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
  58070. "cpe_name" : [ ]
  58071. }, {
  58072. "vulnerable" : true,
  58073. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
  58074. "cpe_name" : [ ]
  58075. }, {
  58076. "vulnerable" : true,
  58077. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
  58078. "cpe_name" : [ ]
  58079. }, {
  58080. "vulnerable" : true,
  58081. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
  58082. "cpe_name" : [ ]
  58083. }, {
  58084. "vulnerable" : true,
  58085. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
  58086. "cpe_name" : [ ]
  58087. }, {
  58088. "vulnerable" : true,
  58089. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
  58090. "cpe_name" : [ ]
  58091. }, {
  58092. "vulnerable" : true,
  58093. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
  58094. "cpe_name" : [ ]
  58095. }, {
  58096. "vulnerable" : true,
  58097. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
  58098. "cpe_name" : [ ]
  58099. }, {
  58100. "vulnerable" : true,
  58101. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
  58102. "cpe_name" : [ ]
  58103. }, {
  58104. "vulnerable" : true,
  58105. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
  58106. "cpe_name" : [ ]
  58107. }, {
  58108. "vulnerable" : true,
  58109. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
  58110. "cpe_name" : [ ]
  58111. }, {
  58112. "vulnerable" : true,
  58113. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
  58114. "cpe_name" : [ ]
  58115. }, {
  58116. "vulnerable" : true,
  58117. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
  58118. "cpe_name" : [ ]
  58119. }, {
  58120. "vulnerable" : true,
  58121. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
  58122. "cpe_name" : [ ]
  58123. }, {
  58124. "vulnerable" : true,
  58125. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
  58126. "cpe_name" : [ ]
  58127. }, {
  58128. "vulnerable" : true,
  58129. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
  58130. "cpe_name" : [ ]
  58131. }, {
  58132. "vulnerable" : true,
  58133. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
  58134. "cpe_name" : [ ]
  58135. }, {
  58136. "vulnerable" : true,
  58137. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
  58138. "cpe_name" : [ ]
  58139. }, {
  58140. "vulnerable" : true,
  58141. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
  58142. "cpe_name" : [ ]
  58143. }, {
  58144. "vulnerable" : true,
  58145. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
  58146. "cpe_name" : [ ]
  58147. }, {
  58148. "vulnerable" : true,
  58149. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
  58150. "cpe_name" : [ ]
  58151. }, {
  58152. "vulnerable" : true,
  58153. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
  58154. "cpe_name" : [ ]
  58155. }, {
  58156. "vulnerable" : true,
  58157. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
  58158. "cpe_name" : [ ]
  58159. }, {
  58160. "vulnerable" : true,
  58161. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
  58162. "cpe_name" : [ ]
  58163. }, {
  58164. "vulnerable" : true,
  58165. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
  58166. "cpe_name" : [ ]
  58167. }, {
  58168. "vulnerable" : true,
  58169. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
  58170. "cpe_name" : [ ]
  58171. }, {
  58172. "vulnerable" : true,
  58173. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
  58174. "cpe_name" : [ ]
  58175. }, {
  58176. "vulnerable" : true,
  58177. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
  58178. "cpe_name" : [ ]
  58179. }, {
  58180. "vulnerable" : true,
  58181. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
  58182. "cpe_name" : [ ]
  58183. }, {
  58184. "vulnerable" : true,
  58185. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
  58186. "cpe_name" : [ ]
  58187. }, {
  58188. "vulnerable" : true,
  58189. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
  58190. "cpe_name" : [ ]
  58191. }, {
  58192. "vulnerable" : true,
  58193. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
  58194. "cpe_name" : [ ]
  58195. }, {
  58196. "vulnerable" : true,
  58197. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
  58198. "cpe_name" : [ ]
  58199. }, {
  58200. "vulnerable" : true,
  58201. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
  58202. "cpe_name" : [ ]
  58203. }, {
  58204. "vulnerable" : true,
  58205. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
  58206. "cpe_name" : [ ]
  58207. }, {
  58208. "vulnerable" : true,
  58209. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
  58210. "cpe_name" : [ ]
  58211. }, {
  58212. "vulnerable" : true,
  58213. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
  58214. "cpe_name" : [ ]
  58215. }, {
  58216. "vulnerable" : true,
  58217. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
  58218. "cpe_name" : [ ]
  58219. }, {
  58220. "vulnerable" : true,
  58221. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
  58222. "cpe_name" : [ ]
  58223. }, {
  58224. "vulnerable" : true,
  58225. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
  58226. "cpe_name" : [ ]
  58227. }, {
  58228. "vulnerable" : true,
  58229. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
  58230. "cpe_name" : [ ]
  58231. }, {
  58232. "vulnerable" : true,
  58233. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
  58234. "cpe_name" : [ ]
  58235. }, {
  58236. "vulnerable" : true,
  58237. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
  58238. "cpe_name" : [ ]
  58239. }, {
  58240. "vulnerable" : true,
  58241. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
  58242. "cpe_name" : [ ]
  58243. }, {
  58244. "vulnerable" : true,
  58245. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
  58246. "cpe_name" : [ ]
  58247. }, {
  58248. "vulnerable" : true,
  58249. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
  58250. "cpe_name" : [ ]
  58251. } ]
  58252. }, {
  58253. "operator" : "OR",
  58254. "children" : [ ],
  58255. "cpe_match" : [ {
  58256. "vulnerable" : false,
  58257. "cpe23Uri" : "cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*",
  58258. "cpe_name" : [ ]
  58259. }, {
  58260. "vulnerable" : false,
  58261. "cpe23Uri" : "cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*",
  58262. "cpe_name" : [ ]
  58263. }, {
  58264. "vulnerable" : false,
  58265. "cpe23Uri" : "cpe:2.3:h:juniper:qfx5120:-:*:*:*:*:*:*:*",
  58266. "cpe_name" : [ ]
  58267. }, {
  58268. "vulnerable" : false,
  58269. "cpe23Uri" : "cpe:2.3:h:juniper:qfx5130:-:*:*:*:*:*:*:*",
  58270. "cpe_name" : [ ]
  58271. }, {
  58272. "vulnerable" : false,
  58273. "cpe23Uri" : "cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*",
  58274. "cpe_name" : [ ]
  58275. }, {
  58276. "vulnerable" : false,
  58277. "cpe23Uri" : "cpe:2.3:h:juniper:qfx5210:-:*:*:*:*:*:*:*",
  58278. "cpe_name" : [ ]
  58279. }, {
  58280. "vulnerable" : false,
  58281. "cpe23Uri" : "cpe:2.3:h:juniper:qfx5220:-:*:*:*:*:*:*:*",
  58282. "cpe_name" : [ ]
  58283. } ]
  58284. } ],
  58285. "cpe_match" : [ ]
  58286. }, {
  58287. "operator" : "AND",
  58288. "children" : [ {
  58289. "operator" : "OR",
  58290. "children" : [ ],
  58291. "cpe_match" : [ {
  58292. "vulnerable" : true,
  58293. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:18.3:r1:*:*:*:*:*:*",
  58294. "cpe_name" : [ ]
  58295. }, {
  58296. "vulnerable" : true,
  58297. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:19.1:r1:*:*:*:*:*:*",
  58298. "cpe_name" : [ ]
  58299. }, {
  58300. "vulnerable" : true,
  58301. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:19.1:r2:*:*:*:*:*:*",
  58302. "cpe_name" : [ ]
  58303. }, {
  58304. "vulnerable" : true,
  58305. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:19.2:r1:*:*:*:*:*:*",
  58306. "cpe_name" : [ ]
  58307. }, {
  58308. "vulnerable" : true,
  58309. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:19.2:r2:*:*:*:*:*:*",
  58310. "cpe_name" : [ ]
  58311. }, {
  58312. "vulnerable" : true,
  58313. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:19.3:r1:*:*:*:*:*:*",
  58314. "cpe_name" : [ ]
  58315. }, {
  58316. "vulnerable" : true,
  58317. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:19.3:r2:*:*:*:*:*:*",
  58318. "cpe_name" : [ ]
  58319. }, {
  58320. "vulnerable" : true,
  58321. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:*",
  58322. "cpe_name" : [ ]
  58323. }, {
  58324. "vulnerable" : true,
  58325. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:20.1:r2:*:*:*:*:*:*",
  58326. "cpe_name" : [ ]
  58327. }, {
  58328. "vulnerable" : true,
  58329. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:20.2:r1:*:*:*:*:*:*",
  58330. "cpe_name" : [ ]
  58331. }, {
  58332. "vulnerable" : true,
  58333. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:20.2:r2:*:*:*:*:*:*",
  58334. "cpe_name" : [ ]
  58335. }, {
  58336. "vulnerable" : true,
  58337. "cpe23Uri" : "cpe:2.3:o:juniper:junos_os_evolved:20.3:r1:*:*:*:*:*:*",
  58338. "cpe_name" : [ ]
  58339. } ]
  58340. }, {
  58341. "operator" : "OR",
  58342. "children" : [ ],
  58343. "cpe_match" : [ {
  58344. "vulnerable" : false,
  58345. "cpe23Uri" : "cpe:2.3:h:juniper:qfx5220:-:*:*:*:*:*:*:*",
  58346. "cpe_name" : [ ]
  58347. } ]
  58348. } ],
  58349. "cpe_match" : [ ]
  58350. } ]
  58351. },
  58352. "impact" : {
  58353. "baseMetricV3" : {
  58354. "cvssV3" : {
  58355. "version" : "3.1",
  58356. "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
  58357. "attackVector" : "ADJACENT_NETWORK",
  58358. "attackComplexity" : "LOW",
  58359. "privilegesRequired" : "NONE",
  58360. "userInteraction" : "NONE",
  58361. "scope" : "CHANGED",
  58362. "confidentialityImpact" : "NONE",
  58363. "integrityImpact" : "NONE",
  58364. "availabilityImpact" : "HIGH",
  58365. "baseScore" : 7.4,
  58366. "baseSeverity" : "HIGH"
  58367. },
  58368. "exploitabilityScore" : 2.8,
  58369. "impactScore" : 4.0
  58370. },
  58371. "baseMetricV2" : {
  58372. "cvssV2" : {
  58373. "version" : "2.0",
  58374. "vectorString" : "AV:A/AC:L/Au:N/C:N/I:N/A:P",
  58375. "accessVector" : "ADJACENT_NETWORK",
  58376. "accessComplexity" : "LOW",
  58377. "authentication" : "NONE",
  58378. "confidentialityImpact" : "NONE",
  58379. "integrityImpact" : "NONE",
  58380. "availabilityImpact" : "PARTIAL",
  58381. "baseScore" : 3.3
  58382. },
  58383. "severity" : "LOW",
  58384. "exploitabilityScore" : 6.5,
  58385. "impactScore" : 2.9,
  58386. "acInsufInfo" : false,
  58387. "obtainAllPrivilege" : false,
  58388. "obtainUserPrivilege" : false,
  58389. "obtainOtherPrivilege" : false,
  58390. "userInteractionRequired" : false
  58391. }
  58392. },
  58393. "publishedDate" : "2021-04-22T20:15Z",
  58394. "lastModifiedDate" : "2021-05-04T21:57Z"
  58395. }, {
  58396. "cve" : {
  58397. "data_type" : "CVE",
  58398. "data_format" : "MITRE",
  58399. "data_version" : "4.0",
  58400. "CVE_data_meta" : {
  58401. "ID" : "CVE-2021-0257",
  58402. "ASSIGNER" : "sirt@juniper.net"
  58403. },
  58404. "problemtype" : {
  58405. "problemtype_data" : [ {
  58406. "description" : [ {
  58407. "lang" : "en",
  58408. "value" : "CWE-400"
  58409. } ]
  58410. } ]
  58411. },
  58412. "references" : {
  58413. "reference_data" : [ {
  58414. "url" : "https://kb.juniper.net/JSA11148",
  58415. "name" : "https://kb.juniper.net/JSA11148",
  58416. "refsource" : "MISC",
  58417. "tags" : [ "Vendor Advisory" ]
  58418. } ]
  58419. },
  58420. "description" : {
  58421. "description_data" : [ {
  58422. "lang" : "en",
  58423. "value" : "On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPCs (Modular Port Concentrators) where Integrated Routing and Bridging (IRB) interfaces are configured and mapped to a VPLS instance or a Bridge-Domain, certain Layer 2 network events at Customer Edge (CE) devices may cause memory leaks in the MPC of Provider Edge (PE) devices which can cause an out of memory condition and MPC restart. When this issue occurs, there will be temporary traffic interruption until the MPC is restored. An administrator can use the following CLI command to monitor the status of memory usage level of the MPC: user@device> show system resource-monitor fpc FPC Resource Usage Summary Free Heap Mem Watermark : 20 % Free NH Mem Watermark : 20 % Free Filter Mem Watermark : 20 % * - Watermark reached Slot # % Heap Free RTT Average RTT 1 87 PFE # % ENCAP mem Free % NH mem Free % FW mem Free 0 NA 88 99 1 NA 89 99 When the issue is occurring, the value of “% NH mem Free” will go down until the MPC restarts. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines), including MX-MPC1-3D, MX-MPC1E-3D, MX-MPC2-3D, MX-MPC2E-3D, MPC-3D-16XGE, and CHAS-MXxx Series MPCs. No other products or platforms are affected by this issue. This issue affects Juniper Networks Junos OS on MX Series, EX9200 Series: 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R3-S3; 18.2 versions prior to 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S6; 19.2 versions prior to 19.2R3-S2; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S2, 19.4R3; 20.2 versions prior to 20.2R1-S3, 20.2R2; 20.3 versions prior to 20.3R1-S1,, 20.3R2. This issue does not affect Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R3-S2; 18.1; 18.2 versions prior to 18.2R3-S4; 18.3 versions prior to 18.3R3-S2; 18.4 versions prior to 18.4R3-S1; 19.1; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R2."
  58424. } ]
  58425. }
  58426. },
  58427. "configurations" : {
  58428. "CVE_data_version" : "4.0",
  58429. "nodes" : [ {
  58430. "operator" : "AND",
  58431. "children" : [ {
  58432. "operator" : "OR",
  58433. "children" : [ ],
  58434. "cpe_match" : [ {
  58435. "vulnerable" : true,
  58436. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
  58437. "cpe_name" : [ ]
  58438. }, {
  58439. "vulnerable" : true,
  58440. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
  58441. "cpe_name" : [ ]
  58442. }, {
  58443. "vulnerable" : true,
  58444. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
  58445. "cpe_name" : [ ]
  58446. }, {
  58447. "vulnerable" : true,
  58448. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
  58449. "cpe_name" : [ ]
  58450. }, {
  58451. "vulnerable" : true,
  58452. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
  58453. "cpe_name" : [ ]
  58454. }, {
  58455. "vulnerable" : true,
  58456. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
  58457. "cpe_name" : [ ]
  58458. }, {
  58459. "vulnerable" : true,
  58460. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
  58461. "cpe_name" : [ ]
  58462. }, {
  58463. "vulnerable" : true,
  58464. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
  58465. "cpe_name" : [ ]
  58466. }, {
  58467. "vulnerable" : true,
  58468. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
  58469. "cpe_name" : [ ]
  58470. }, {
  58471. "vulnerable" : true,
  58472. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
  58473. "cpe_name" : [ ]
  58474. }, {
  58475. "vulnerable" : true,
  58476. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
  58477. "cpe_name" : [ ]
  58478. }, {
  58479. "vulnerable" : true,
  58480. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
  58481. "cpe_name" : [ ]
  58482. }, {
  58483. "vulnerable" : true,
  58484. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
  58485. "cpe_name" : [ ]
  58486. }, {
  58487. "vulnerable" : true,
  58488. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
  58489. "cpe_name" : [ ]
  58490. }, {
  58491. "vulnerable" : true,
  58492. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
  58493. "cpe_name" : [ ]
  58494. }, {
  58495. "vulnerable" : true,
  58496. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
  58497. "cpe_name" : [ ]
  58498. }, {
  58499. "vulnerable" : true,
  58500. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
  58501. "cpe_name" : [ ]
  58502. }, {
  58503. "vulnerable" : true,
  58504. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
  58505. "cpe_name" : [ ]
  58506. }, {
  58507. "vulnerable" : true,
  58508. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
  58509. "cpe_name" : [ ]
  58510. }, {
  58511. "vulnerable" : true,
  58512. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
  58513. "cpe_name" : [ ]
  58514. }, {
  58515. "vulnerable" : true,
  58516. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
  58517. "cpe_name" : [ ]
  58518. }, {
  58519. "vulnerable" : true,
  58520. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
  58521. "cpe_name" : [ ]
  58522. }, {
  58523. "vulnerable" : true,
  58524. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
  58525. "cpe_name" : [ ]
  58526. }, {
  58527. "vulnerable" : true,
  58528. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
  58529. "cpe_name" : [ ]
  58530. }, {
  58531. "vulnerable" : true,
  58532. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
  58533. "cpe_name" : [ ]
  58534. }, {
  58535. "vulnerable" : true,
  58536. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
  58537. "cpe_name" : [ ]
  58538. }, {
  58539. "vulnerable" : true,
  58540. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
  58541. "cpe_name" : [ ]
  58542. }, {
  58543. "vulnerable" : true,
  58544. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
  58545. "cpe_name" : [ ]
  58546. }, {
  58547. "vulnerable" : true,
  58548. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
  58549. "cpe_name" : [ ]
  58550. }, {
  58551. "vulnerable" : true,
  58552. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
  58553. "cpe_name" : [ ]
  58554. }, {
  58555. "vulnerable" : true,
  58556. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
  58557. "cpe_name" : [ ]
  58558. }, {
  58559. "vulnerable" : true,
  58560. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
  58561. "cpe_name" : [ ]
  58562. }, {
  58563. "vulnerable" : true,
  58564. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
  58565. "cpe_name" : [ ]
  58566. }, {
  58567. "vulnerable" : true,
  58568. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
  58569. "cpe_name" : [ ]
  58570. }, {
  58571. "vulnerable" : true,
  58572. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
  58573. "cpe_name" : [ ]
  58574. }, {
  58575. "vulnerable" : true,
  58576. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
  58577. "cpe_name" : [ ]
  58578. }, {
  58579. "vulnerable" : true,
  58580. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
  58581. "cpe_name" : [ ]
  58582. }, {
  58583. "vulnerable" : true,
  58584. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
  58585. "cpe_name" : [ ]
  58586. }, {
  58587. "vulnerable" : true,
  58588. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
  58589. "cpe_name" : [ ]
  58590. }, {
  58591. "vulnerable" : true,
  58592. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
  58593. "cpe_name" : [ ]
  58594. }, {
  58595. "vulnerable" : true,
  58596. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
  58597. "cpe_name" : [ ]
  58598. }, {
  58599. "vulnerable" : true,
  58600. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
  58601. "cpe_name" : [ ]
  58602. }, {
  58603. "vulnerable" : true,
  58604. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
  58605. "cpe_name" : [ ]
  58606. }, {
  58607. "vulnerable" : true,
  58608. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
  58609. "cpe_name" : [ ]
  58610. }, {
  58611. "vulnerable" : true,
  58612. "cpe23Uri" : "cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
  58613. "cpe_name" : [ ]
  58614. }, {
  58615. "vulnerable" : true,
  58616. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
  58617. "cpe_name" : [ ]
  58618. }, {
  58619. "vulnerable" : true,
  58620. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
  58621. "cpe_name" : [ ]
  58622. }, {
  58623. "vulnerable" : true,
  58624. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
  58625. "cpe_name" : [ ]
  58626. }, {
  58627. "vulnerable" : true,
  58628. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
  58629. "cpe_name" : [ ]
  58630. }, {
  58631. "vulnerable" : true,
  58632. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
  58633. "cpe_name" : [ ]
  58634. }, {
  58635. "vulnerable" : true,
  58636. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
  58637. "cpe_name" : [ ]
  58638. }, {
  58639. "vulnerable" : true,
  58640. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
  58641. "cpe_name" : [ ]
  58642. }, {
  58643. "vulnerable" : true,
  58644. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
  58645. "cpe_name" : [ ]
  58646. }, {
  58647. "vulnerable" : true,
  58648. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
  58649. "cpe_name" : [ ]
  58650. }, {
  58651. "vulnerable" : true,
  58652. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
  58653. "cpe_name" : [ ]
  58654. }, {
  58655. "vulnerable" : true,
  58656. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
  58657. "cpe_name" : [ ]
  58658. }, {
  58659. "vulnerable" : true,
  58660. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
  58661. "cpe_name" : [ ]
  58662. }, {
  58663. "vulnerable" : true,
  58664. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
  58665. "cpe_name" : [ ]
  58666. }, {
  58667. "vulnerable" : true,
  58668. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
  58669. "cpe_name" : [ ]
  58670. }, {
  58671. "vulnerable" : true,
  58672. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
  58673. "cpe_name" : [ ]
  58674. }, {
  58675. "vulnerable" : true,
  58676. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
  58677. "cpe_name" : [ ]
  58678. }, {
  58679. "vulnerable" : true,
  58680. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
  58681. "cpe_name" : [ ]
  58682. }, {
  58683. "vulnerable" : true,
  58684. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
  58685. "cpe_name" : [ ]
  58686. }, {
  58687. "vulnerable" : true,
  58688. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
  58689. "cpe_name" : [ ]
  58690. }, {
  58691. "vulnerable" : true,
  58692. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
  58693. "cpe_name" : [ ]
  58694. }, {
  58695. "vulnerable" : true,
  58696. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
  58697. "cpe_name" : [ ]
  58698. }, {
  58699. "vulnerable" : true,
  58700. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
  58701. "cpe_name" : [ ]
  58702. }, {
  58703. "vulnerable" : true,
  58704. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
  58705. "cpe_name" : [ ]
  58706. }, {
  58707. "vulnerable" : true,
  58708. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
  58709. "cpe_name" : [ ]
  58710. }, {
  58711. "vulnerable" : true,
  58712. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
  58713. "cpe_name" : [ ]
  58714. }, {
  58715. "vulnerable" : true,
  58716. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
  58717. "cpe_name" : [ ]
  58718. }, {
  58719. "vulnerable" : true,
  58720. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
  58721. "cpe_name" : [ ]
  58722. }, {
  58723. "vulnerable" : true,
  58724. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
  58725. "cpe_name" : [ ]
  58726. }, {
  58727. "vulnerable" : true,
  58728. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
  58729. "cpe_name" : [ ]
  58730. }, {
  58731. "vulnerable" : true,
  58732. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
  58733. "cpe_name" : [ ]
  58734. }, {
  58735. "vulnerable" : true,
  58736. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
  58737. "cpe_name" : [ ]
  58738. }, {
  58739. "vulnerable" : true,
  58740. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
  58741. "cpe_name" : [ ]
  58742. }, {
  58743. "vulnerable" : true,
  58744. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
  58745. "cpe_name" : [ ]
  58746. }, {
  58747. "vulnerable" : true,
  58748. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
  58749. "cpe_name" : [ ]
  58750. }, {
  58751. "vulnerable" : true,
  58752. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
  58753. "cpe_name" : [ ]
  58754. }, {
  58755. "vulnerable" : true,
  58756. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
  58757. "cpe_name" : [ ]
  58758. }, {
  58759. "vulnerable" : true,
  58760. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
  58761. "cpe_name" : [ ]
  58762. }, {
  58763. "vulnerable" : true,
  58764. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
  58765. "cpe_name" : [ ]
  58766. }, {
  58767. "vulnerable" : true,
  58768. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
  58769. "cpe_name" : [ ]
  58770. }, {
  58771. "vulnerable" : true,
  58772. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
  58773. "cpe_name" : [ ]
  58774. }, {
  58775. "vulnerable" : true,
  58776. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
  58777. "cpe_name" : [ ]
  58778. }, {
  58779. "vulnerable" : true,
  58780. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
  58781. "cpe_name" : [ ]
  58782. }, {
  58783. "vulnerable" : true,
  58784. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
  58785. "cpe_name" : [ ]
  58786. }, {
  58787. "vulnerable" : true,
  58788. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
  58789. "cpe_name" : [ ]
  58790. }, {
  58791. "vulnerable" : true,
  58792. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
  58793. "cpe_name" : [ ]
  58794. }, {
  58795. "vulnerable" : true,
  58796. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
  58797. "cpe_name" : [ ]
  58798. }, {
  58799. "vulnerable" : true,
  58800. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
  58801. "cpe_name" : [ ]
  58802. }, {
  58803. "vulnerable" : true,
  58804. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
  58805. "cpe_name" : [ ]
  58806. }, {
  58807. "vulnerable" : true,
  58808. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
  58809. "cpe_name" : [ ]
  58810. }, {
  58811. "vulnerable" : true,
  58812. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
  58813. "cpe_name" : [ ]
  58814. }, {
  58815. "vulnerable" : true,
  58816. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
  58817. "cpe_name" : [ ]
  58818. }, {
  58819. "vulnerable" : true,
  58820. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
  58821. "cpe_name" : [ ]
  58822. }, {
  58823. "vulnerable" : true,
  58824. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
  58825. "cpe_name" : [ ]
  58826. }, {
  58827. "vulnerable" : true,
  58828. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
  58829. "cpe_name" : [ ]
  58830. }, {
  58831. "vulnerable" : true,
  58832. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
  58833. "cpe_name" : [ ]
  58834. }, {
  58835. "vulnerable" : true,
  58836. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
  58837. "cpe_name" : [ ]
  58838. }, {
  58839. "vulnerable" : true,
  58840. "cpe23Uri" : "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
  58841. "cpe_name" : [ ]
  58842. }, {
  58843. "vulnerable" : true,
  58844. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
  58845. "cpe_name" : [ ]
  58846. }, {
  58847. "vulnerable" : true,
  58848. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
  58849. "cpe_name" : [ ]
  58850. }, {
  58851. "vulnerable" : true,
  58852. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
  58853. "cpe_name" : [ ]
  58854. }, {
  58855. "vulnerable" : true,
  58856. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
  58857. "cpe_name" : [ ]
  58858. }, {
  58859. "vulnerable" : true,
  58860. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
  58861. "cpe_name" : [ ]
  58862. }, {
  58863. "vulnerable" : true,
  58864. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
  58865. "cpe_name" : [ ]
  58866. }, {
  58867. "vulnerable" : true,
  58868. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
  58869. "cpe_name" : [ ]
  58870. }, {
  58871. "vulnerable" : true,
  58872. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
  58873. "cpe_name" : [ ]
  58874. }, {
  58875. "vulnerable" : true,
  58876. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
  58877. "cpe_name" : [ ]
  58878. }, {
  58879. "vulnerable" : true,
  58880. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
  58881. "cpe_name" : [ ]
  58882. }, {
  58883. "vulnerable" : true,
  58884. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
  58885. "cpe_name" : [ ]
  58886. }, {
  58887. "vulnerable" : true,
  58888. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
  58889. "cpe_name" : [ ]
  58890. }, {
  58891. "vulnerable" : true,
  58892. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
  58893. "cpe_name" : [ ]
  58894. }, {
  58895. "vulnerable" : true,
  58896. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
  58897. "cpe_name" : [ ]
  58898. }, {
  58899. "vulnerable" : true,
  58900. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
  58901. "cpe_name" : [ ]
  58902. }, {
  58903. "vulnerable" : true,
  58904. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
  58905. "cpe_name" : [ ]
  58906. }, {
  58907. "vulnerable" : true,
  58908. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
  58909. "cpe_name" : [ ]
  58910. }, {
  58911. "vulnerable" : true,
  58912. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
  58913. "cpe_name" : [ ]
  58914. }, {
  58915. "vulnerable" : true,
  58916. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
  58917. "cpe_name" : [ ]
  58918. }, {
  58919. "vulnerable" : true,
  58920. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
  58921. "cpe_name" : [ ]
  58922. }, {
  58923. "vulnerable" : true,
  58924. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
  58925. "cpe_name" : [ ]
  58926. }, {
  58927. "vulnerable" : true,
  58928. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
  58929. "cpe_name" : [ ]
  58930. }, {
  58931. "vulnerable" : true,
  58932. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
  58933. "cpe_name" : [ ]
  58934. }, {
  58935. "vulnerable" : true,
  58936. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
  58937. "cpe_name" : [ ]
  58938. }, {
  58939. "vulnerable" : true,
  58940. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
  58941. "cpe_name" : [ ]
  58942. }, {
  58943. "vulnerable" : true,
  58944. "cpe23Uri" : "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
  58945. "cpe_name" : [ ]
  58946. }, {
  58947. "vulnerable" : true,
  58948. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
  58949. "cpe_name" : [ ]
  58950. }, {
  58951. "vulnerable" : true,
  58952. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
  58953. "cpe_name" : [ ]
  58954. }, {
  58955. "vulnerable" : true,
  58956. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
  58957. "cpe_name" : [ ]
  58958. }, {
  58959. "vulnerable" : true,
  58960. "cpe23Uri" : "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
  58961. "cpe_name" : [ ]
  58962. } ]
  58963. }, {
  58964. "operator" : "OR",
  58965. "children" : [ ],
  58966. "cpe_match" : [ {
  58967. "vulnerable" : false,
  58968. "cpe23Uri" : "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
  58969. "cpe_name" : [ ]
  58970. }, {
  58971. "vulnerable" : false,
  58972. "cpe23Uri" : "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
  58973. "cpe_name" : [ ]
  58974. }, {
  58975. "vulnerable" : false,
  58976. "cpe23Uri" : "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
  58977. "cpe_name" : [ ]
  58978. }, {
  58979. "vulnerable" : false,
  58980. "cpe23Uri" : "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
  58981. "cpe_name" : [ ]
  58982. }, {
  58983. "vulnerable" : false,
  58984. "cpe23Uri" : "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
  58985. "cpe_name" : [ ]
  58986. }, {
  58987. "vulnerable" : false,
  58988. "cpe23Uri" : "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
  58989. "cpe_name" : [ ]
  58990. }, {
  58991. "vulnerable" : false,
  58992. "cpe23Uri" : "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
  58993. "cpe_name" : [ ]
  58994. }, {
  58995. "vulnerable" : false,
  58996. "cpe23Uri" : "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
  58997. "cpe_name" : [ ]
  58998. }, {
  58999. "vulnerable" : false,
  59000. "cpe23Uri" : "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
  59001. "cpe_name" : [ ]
  59002. }, {
  59003. "vulnerable" : false,
  59004. "cpe23Uri" : "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
  59005. "cpe_name" : [ ]
  59006. }, {
  59007. "vulnerable" : false,
  59008. "cpe23Uri" : "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
  59009. "cpe_name" : [ ]
  59010. }, {
  59011. "vulnerable" : false,
  59012. "cpe23Uri" : "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
  59013. "cpe_name" : [ ]
  59014. }, {
  59015. "vulnerable" : false,
  59016. "cpe23Uri" : "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
  59017. "cpe_name" : [ ]
  59018. }, {
  59019. "vulnerable" : false,
  59020. "cpe23Uri" : "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
  59021. "cpe_name" : [ ]
  59022. }, {
  59023. "vulnerable" : false,
  59024. "cpe23Uri" : "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
  59025. "cpe_name" : [ ]
  59026. }, {
  59027. "vulnerable" : false,
  59028. "cpe23Uri" : "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
  59029. "cpe_name" : [ ]
  59030. }, {
  59031. "vulnerable" : false,
  59032. "cpe23Uri" : "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
  59033. "cpe_name" : [ ]
  59034. } ]
  59035. } ],
  59036. "cpe_match" : [ ]
  59037. } ]
  59038. },
  59039. "impact" : {
  59040. "baseMetricV3" : {
  59041. "cvssV3" : {
  59042. "version" : "3.1",
  59043. "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  59044. "attackVector" : "ADJACENT_NETWORK",
  59045. "attackComplexity" : "LOW",
  59046. "privilegesRequired" : "NONE",
  59047. "userInteraction" : "NONE",
  59048. "scope" : "UNCHANGED",
  59049. "confidentialityImpact" : "NONE",
  59050. "integrityImpact" : "NONE",
  59051. "availabilityImpact" : "HIGH",
  59052. "baseScore" : 6.5,
  59053. "baseSeverity" : "MEDIUM"
  59054. },
  59055. "exploitabilityScore" : 2.8,
  59056. "impactScore" : 3.6
  59057. },
  59058. "baseMetricV2" : {
  59059. "cvssV2" : {
  59060. "version" : "2.0",
  59061. "vectorString" : "AV:A/AC:L/Au:N/C:N/I:N/A:P",
  59062. "accessVector" : "ADJACENT_NETWORK",
  59063. "accessComplexity" : "LOW",
  59064. "authentication" : "NONE",
  59065. "confidentialityImpact" : "NONE",
  59066. "integrityImpact" : "NONE",
  59067. "availabilityImpact" : "PARTIAL",
  59068. "baseScore" : 3.3
  59069. },
  59070. "severity" : "LOW",
  59071. "exploitabilityScore" : 6.5,
  59072. "impactScore" : 2.9,
  59073. "acInsufInfo" : false,
  59074. "obtainAllPrivilege" : false,
  59075. "obtainUserPrivilege" : false,
  59076. "obtainOtherPrivilege" : false,
  59077. "userInteractionRequired" : false
  59078. }
  59079. },
  59080. "publishedDate" : "2021-04-22T20:15Z",
  59081. "lastModifiedDate" : "2021-05-04T22:00Z"
  59082. }, {
  59083. "cve" : {
  59084. "data_type" : "CVE",
  59085. "data_format" : "MITRE",
  59086. "data_version" : "4.0",
  59087. "CVE_data_meta" : {
  59088. "ID" : "CVE-2021-20590",
  59089. "ASSIGNER" : "vultures@jpcert.or.jp"
  59090. },
  59091. "problemtype" : {
  59092. "problemtype_data" : [ {
  59093. "description" : [ {
  59094. "lang" : "en",
  59095. "value" : "CWE-287"
  59096. } ]
  59097. } ]
  59098. },
  59099. "references" : {
  59100. "reference_data" : [ {
  59101. "url" : "https://jvn.jp/vu/JVNVU97615777/index.html",
  59102. "name" : "https://jvn.jp/vu/JVNVU97615777/index.html",
  59103. "refsource" : "CONFIRM",
  59104. "tags" : [ "Third Party Advisory" ]
  59105. }, {
  59106. "url" : "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-001_en.pdf",
  59107. "name" : "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-001_en.pdf",
  59108. "refsource" : "CONFIRM",
  59109. "tags" : [ "Vendor Advisory" ]
  59110. } ]
  59111. },
  59112. "description" : {
  59113. "description_data" : [ {
  59114. "lang" : "en",
  59115. "value" : "Improper authentication vulnerability in GOT2000 series GT27 model all versions, GOT2000 series GT25 model all versions, GOT2000 series GT21 model GT2107-WTBD all versions ,GOT2000 series GT21 model GT2107-WTSD all versions, GOT SIMPLE series GS21 model GS2110-WTBD-N all versions and GOT SIMPLE series GS21 model GS2107-WTBD-N all versions allows a remote unauthenticated attacker to gain unauthorized access via specially crafted packets when the \"VNC server\" function is used."
  59116. } ]
  59117. }
  59118. },
  59119. "configurations" : {
  59120. "CVE_data_version" : "4.0",
  59121. "nodes" : [ {
  59122. "operator" : "AND",
  59123. "children" : [ {
  59124. "operator" : "OR",
  59125. "children" : [ ],
  59126. "cpe_match" : [ {
  59127. "vulnerable" : true,
  59128. "cpe23Uri" : "cpe:2.3:o:mitsubishielectric:got2000_gt27_firmware:*:*:*:*:*:*:*:*",
  59129. "cpe_name" : [ ]
  59130. } ]
  59131. }, {
  59132. "operator" : "OR",
  59133. "children" : [ ],
  59134. "cpe_match" : [ {
  59135. "vulnerable" : false,
  59136. "cpe23Uri" : "cpe:2.3:h:mitsubishielectric:got2000_gt27:-:*:*:*:*:*:*:*",
  59137. "cpe_name" : [ ]
  59138. } ]
  59139. } ],
  59140. "cpe_match" : [ ]
  59141. }, {
  59142. "operator" : "AND",
  59143. "children" : [ {
  59144. "operator" : "OR",
  59145. "children" : [ ],
  59146. "cpe_match" : [ {
  59147. "vulnerable" : true,
  59148. "cpe23Uri" : "cpe:2.3:o:mitsubishielectric:got2000_gt25_firmware:*:*:*:*:*:*:*:*",
  59149. "cpe_name" : [ ]
  59150. } ]
  59151. }, {
  59152. "operator" : "OR",
  59153. "children" : [ ],
  59154. "cpe_match" : [ {
  59155. "vulnerable" : false,
  59156. "cpe23Uri" : "cpe:2.3:h:mitsubishielectric:got2000_gt25:-:*:*:*:*:*:*:*",
  59157. "cpe_name" : [ ]
  59158. } ]
  59159. } ],
  59160. "cpe_match" : [ ]
  59161. }, {
  59162. "operator" : "AND",
  59163. "children" : [ {
  59164. "operator" : "OR",
  59165. "children" : [ ],
  59166. "cpe_match" : [ {
  59167. "vulnerable" : true,
  59168. "cpe23Uri" : "cpe:2.3:o:mitsubishielectric:gt2107-wtbd_firmware:*:*:*:*:*:*:*:*",
  59169. "cpe_name" : [ ]
  59170. } ]
  59171. }, {
  59172. "operator" : "OR",
  59173. "children" : [ ],
  59174. "cpe_match" : [ {
  59175. "vulnerable" : false,
  59176. "cpe23Uri" : "cpe:2.3:h:mitsubishielectric:gt2107-wtbd:-:*:*:*:*:*:*:*",
  59177. "cpe_name" : [ ]
  59178. } ]
  59179. } ],
  59180. "cpe_match" : [ ]
  59181. }, {
  59182. "operator" : "AND",
  59183. "children" : [ {
  59184. "operator" : "OR",
  59185. "children" : [ ],
  59186. "cpe_match" : [ {
  59187. "vulnerable" : true,
  59188. "cpe23Uri" : "cpe:2.3:o:mitsubishielectric:gt2107-wtsd_firmware:*:*:*:*:*:*:*:*",
  59189. "cpe_name" : [ ]
  59190. } ]
  59191. }, {
  59192. "operator" : "OR",
  59193. "children" : [ ],
  59194. "cpe_match" : [ {
  59195. "vulnerable" : false,
  59196. "cpe23Uri" : "cpe:2.3:h:mitsubishielectric:gt2107-wtsd:-:*:*:*:*:*:*:*",
  59197. "cpe_name" : [ ]
  59198. } ]
  59199. } ],
  59200. "cpe_match" : [ ]
  59201. }, {
  59202. "operator" : "AND",
  59203. "children" : [ {
  59204. "operator" : "OR",
  59205. "children" : [ ],
  59206. "cpe_match" : [ {
  59207. "vulnerable" : true,
  59208. "cpe23Uri" : "cpe:2.3:o:mitsubishielectric:gs2110-wtbd-n_firmware:*:*:*:*:*:*:*:*",
  59209. "cpe_name" : [ ]
  59210. } ]
  59211. }, {
  59212. "operator" : "OR",
  59213. "children" : [ ],
  59214. "cpe_match" : [ {
  59215. "vulnerable" : false,
  59216. "cpe23Uri" : "cpe:2.3:h:mitsubishielectric:gs2110-wtbd-n:-:*:*:*:*:*:*:*",
  59217. "cpe_name" : [ ]
  59218. } ]
  59219. } ],
  59220. "cpe_match" : [ ]
  59221. }, {
  59222. "operator" : "AND",
  59223. "children" : [ {
  59224. "operator" : "OR",
  59225. "children" : [ ],
  59226. "cpe_match" : [ {
  59227. "vulnerable" : true,
  59228. "cpe23Uri" : "cpe:2.3:o:mitsubishielectric:gs2107-wtbd-n_firmware:*:*:*:*:*:*:*:*",
  59229. "cpe_name" : [ ]
  59230. } ]
  59231. }, {
  59232. "operator" : "OR",
  59233. "children" : [ ],
  59234. "cpe_match" : [ {
  59235. "vulnerable" : false,
  59236. "cpe23Uri" : "cpe:2.3:h:mitsubishielectric:gs2107-wtbd-n:-:*:*:*:*:*:*:*",
  59237. "cpe_name" : [ ]
  59238. } ]
  59239. } ],
  59240. "cpe_match" : [ ]
  59241. } ]
  59242. },
  59243. "impact" : {
  59244. "baseMetricV3" : {
  59245. "cvssV3" : {
  59246. "version" : "3.1",
  59247. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
  59248. "attackVector" : "NETWORK",
  59249. "attackComplexity" : "LOW",
  59250. "privilegesRequired" : "NONE",
  59251. "userInteraction" : "NONE",
  59252. "scope" : "UNCHANGED",
  59253. "confidentialityImpact" : "NONE",
  59254. "integrityImpact" : "HIGH",
  59255. "availabilityImpact" : "NONE",
  59256. "baseScore" : 7.5,
  59257. "baseSeverity" : "HIGH"
  59258. },
  59259. "exploitabilityScore" : 3.9,
  59260. "impactScore" : 3.6
  59261. },
  59262. "baseMetricV2" : {
  59263. "cvssV2" : {
  59264. "version" : "2.0",
  59265. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  59266. "accessVector" : "NETWORK",
  59267. "accessComplexity" : "LOW",
  59268. "authentication" : "NONE",
  59269. "confidentialityImpact" : "NONE",
  59270. "integrityImpact" : "PARTIAL",
  59271. "availabilityImpact" : "NONE",
  59272. "baseScore" : 5.0
  59273. },
  59274. "severity" : "MEDIUM",
  59275. "exploitabilityScore" : 10.0,
  59276. "impactScore" : 2.9,
  59277. "acInsufInfo" : false,
  59278. "obtainAllPrivilege" : false,
  59279. "obtainUserPrivilege" : false,
  59280. "obtainOtherPrivilege" : false,
  59281. "userInteractionRequired" : false
  59282. }
  59283. },
  59284. "publishedDate" : "2021-04-22T19:15Z",
  59285. "lastModifiedDate" : "2021-05-04T15:15Z"
  59286. }, {
  59287. "cve" : {
  59288. "data_type" : "CVE",
  59289. "data_format" : "MITRE",
  59290. "data_version" : "4.0",
  59291. "CVE_data_meta" : {
  59292. "ID" : "CVE-2021-31572",
  59293. "ASSIGNER" : "cve@mitre.org"
  59294. },
  59295. "problemtype" : {
  59296. "problemtype_data" : [ {
  59297. "description" : [ {
  59298. "lang" : "en",
  59299. "value" : "CWE-190"
  59300. } ]
  59301. } ]
  59302. },
  59303. "references" : {
  59304. "reference_data" : [ {
  59305. "url" : "https://github.com/FreeRTOS/FreeRTOS-Kernel/commit/d05b9c123f2bf9090bce386a244fc934ae44db5b",
  59306. "name" : "https://github.com/FreeRTOS/FreeRTOS-Kernel/commit/d05b9c123f2bf9090bce386a244fc934ae44db5b",
  59307. "refsource" : "MISC",
  59308. "tags" : [ "Patch", "Third Party Advisory" ]
  59309. } ]
  59310. },
  59311. "description" : {
  59312. "description_data" : [ {
  59313. "lang" : "en",
  59314. "value" : "The kernel in Amazon Web Services FreeRTOS before 10.4.3 has an integer overflow in stream_buffer.c for a stream buffer."
  59315. } ]
  59316. }
  59317. },
  59318. "configurations" : {
  59319. "CVE_data_version" : "4.0",
  59320. "nodes" : [ {
  59321. "operator" : "OR",
  59322. "children" : [ ],
  59323. "cpe_match" : [ {
  59324. "vulnerable" : true,
  59325. "cpe23Uri" : "cpe:2.3:o:amazon:freertos:*:*:*:*:*:*:*:*",
  59326. "versionEndExcluding" : "10.4.3",
  59327. "cpe_name" : [ ]
  59328. } ]
  59329. } ]
  59330. },
  59331. "impact" : {
  59332. "baseMetricV3" : {
  59333. "cvssV3" : {
  59334. "version" : "3.1",
  59335. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  59336. "attackVector" : "NETWORK",
  59337. "attackComplexity" : "LOW",
  59338. "privilegesRequired" : "NONE",
  59339. "userInteraction" : "NONE",
  59340. "scope" : "UNCHANGED",
  59341. "confidentialityImpact" : "HIGH",
  59342. "integrityImpact" : "HIGH",
  59343. "availabilityImpact" : "HIGH",
  59344. "baseScore" : 9.8,
  59345. "baseSeverity" : "CRITICAL"
  59346. },
  59347. "exploitabilityScore" : 3.9,
  59348. "impactScore" : 5.9
  59349. },
  59350. "baseMetricV2" : {
  59351. "cvssV2" : {
  59352. "version" : "2.0",
  59353. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  59354. "accessVector" : "NETWORK",
  59355. "accessComplexity" : "LOW",
  59356. "authentication" : "NONE",
  59357. "confidentialityImpact" : "PARTIAL",
  59358. "integrityImpact" : "PARTIAL",
  59359. "availabilityImpact" : "PARTIAL",
  59360. "baseScore" : 7.5
  59361. },
  59362. "severity" : "HIGH",
  59363. "exploitabilityScore" : 10.0,
  59364. "impactScore" : 6.4,
  59365. "acInsufInfo" : false,
  59366. "obtainAllPrivilege" : false,
  59367. "obtainUserPrivilege" : false,
  59368. "obtainOtherPrivilege" : false,
  59369. "userInteractionRequired" : false
  59370. }
  59371. },
  59372. "publishedDate" : "2021-04-22T18:15Z",
  59373. "lastModifiedDate" : "2021-05-03T22:15Z"
  59374. }, {
  59375. "cve" : {
  59376. "data_type" : "CVE",
  59377. "data_format" : "MITRE",
  59378. "data_version" : "4.0",
  59379. "CVE_data_meta" : {
  59380. "ID" : "CVE-2021-31571",
  59381. "ASSIGNER" : "cve@mitre.org"
  59382. },
  59383. "problemtype" : {
  59384. "problemtype_data" : [ {
  59385. "description" : [ {
  59386. "lang" : "en",
  59387. "value" : "CWE-190"
  59388. } ]
  59389. } ]
  59390. },
  59391. "references" : {
  59392. "reference_data" : [ {
  59393. "url" : "https://github.com/FreeRTOS/FreeRTOS-Kernel/commit/47338393f1f79558f6144213409f09f81d7c4837",
  59394. "name" : "https://github.com/FreeRTOS/FreeRTOS-Kernel/commit/47338393f1f79558f6144213409f09f81d7c4837",
  59395. "refsource" : "MISC",
  59396. "tags" : [ "Patch", "Third Party Advisory" ]
  59397. } ]
  59398. },
  59399. "description" : {
  59400. "description_data" : [ {
  59401. "lang" : "en",
  59402. "value" : "The kernel in Amazon Web Services FreeRTOS before 10.4.3 has an integer overflow in queue.c for queue creation."
  59403. } ]
  59404. }
  59405. },
  59406. "configurations" : {
  59407. "CVE_data_version" : "4.0",
  59408. "nodes" : [ {
  59409. "operator" : "OR",
  59410. "children" : [ ],
  59411. "cpe_match" : [ {
  59412. "vulnerable" : true,
  59413. "cpe23Uri" : "cpe:2.3:o:amazon:freertos:*:*:*:*:*:*:*:*",
  59414. "versionEndExcluding" : "10.4.3",
  59415. "cpe_name" : [ ]
  59416. } ]
  59417. } ]
  59418. },
  59419. "impact" : {
  59420. "baseMetricV3" : {
  59421. "cvssV3" : {
  59422. "version" : "3.1",
  59423. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  59424. "attackVector" : "NETWORK",
  59425. "attackComplexity" : "LOW",
  59426. "privilegesRequired" : "NONE",
  59427. "userInteraction" : "NONE",
  59428. "scope" : "UNCHANGED",
  59429. "confidentialityImpact" : "HIGH",
  59430. "integrityImpact" : "HIGH",
  59431. "availabilityImpact" : "HIGH",
  59432. "baseScore" : 9.8,
  59433. "baseSeverity" : "CRITICAL"
  59434. },
  59435. "exploitabilityScore" : 3.9,
  59436. "impactScore" : 5.9
  59437. },
  59438. "baseMetricV2" : {
  59439. "cvssV2" : {
  59440. "version" : "2.0",
  59441. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  59442. "accessVector" : "NETWORK",
  59443. "accessComplexity" : "LOW",
  59444. "authentication" : "NONE",
  59445. "confidentialityImpact" : "PARTIAL",
  59446. "integrityImpact" : "PARTIAL",
  59447. "availabilityImpact" : "PARTIAL",
  59448. "baseScore" : 7.5
  59449. },
  59450. "severity" : "HIGH",
  59451. "exploitabilityScore" : 10.0,
  59452. "impactScore" : 6.4,
  59453. "acInsufInfo" : false,
  59454. "obtainAllPrivilege" : false,
  59455. "obtainUserPrivilege" : false,
  59456. "obtainOtherPrivilege" : false,
  59457. "userInteractionRequired" : false
  59458. }
  59459. },
  59460. "publishedDate" : "2021-04-22T18:15Z",
  59461. "lastModifiedDate" : "2021-05-03T22:15Z"
  59462. }, {
  59463. "cve" : {
  59464. "data_type" : "CVE",
  59465. "data_format" : "MITRE",
  59466. "data_version" : "4.0",
  59467. "CVE_data_meta" : {
  59468. "ID" : "CVE-2021-28168",
  59469. "ASSIGNER" : "security@eclipse.org"
  59470. },
  59471. "problemtype" : {
  59472. "problemtype_data" : [ {
  59473. "description" : [ {
  59474. "lang" : "en",
  59475. "value" : "CWE-732"
  59476. } ]
  59477. } ]
  59478. },
  59479. "references" : {
  59480. "reference_data" : [ {
  59481. "url" : "https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv",
  59482. "name" : "https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv",
  59483. "refsource" : "CONFIRM",
  59484. "tags" : [ "Third Party Advisory" ]
  59485. }, {
  59486. "url" : "https://github.com/eclipse-ee4j/jersey/pull/4712",
  59487. "name" : "https://github.com/eclipse-ee4j/jersey/pull/4712",
  59488. "refsource" : "CONFIRM",
  59489. "tags" : [ "Patch", "Third Party Advisory" ]
  59490. }, {
  59491. "url" : "https://lists.apache.org/thread.html/rd54b42edccc1b993853a9c4943a9b16db763f5e2febf6e64b7d0fe3c@%3Cjira.kafka.apache.org%3E",
  59492. "name" : "[kafka-jira] 20210429 [GitHub] [kafka] xjin-Confluent opened a new pull request #10614: MINOR: Upgrade jersey to 2.34",
  59493. "refsource" : "MLIST",
  59494. "tags" : [ ]
  59495. }, {
  59496. "url" : "https://lists.apache.org/thread.html/rc6221670de35b819fe191e7d8f2d17bc000549bd554020cec644b71e@%3Cjira.kafka.apache.org%3E",
  59497. "name" : "[kafka-jira] 20210505 [jira] [Created] (KAFKA-12752) CVE-2021-28168 upgrade jersey to 2.34 or 3.02",
  59498. "refsource" : "MLIST",
  59499. "tags" : [ ]
  59500. }, {
  59501. "url" : "https://lists.apache.org/thread.html/ra3d7cd37fc794981a885332af2f8df0d873753380ea19935d6d847fc@%3Cdev.kafka.apache.org%3E",
  59502. "name" : "[kafka-dev] 20210505 [jira] [Created] (KAFKA-12752) CVE-2021-28168 upgrade jersey to 2.34 or 3.02",
  59503. "refsource" : "MLIST",
  59504. "tags" : [ ]
  59505. }, {
  59506. "url" : "https://lists.apache.org/thread.html/rc288874c330b3af9e29a1a114c5e0d24fff7a79eaa341f551535c8c0@%3Cjira.kafka.apache.org%3E",
  59507. "name" : "[kafka-jira] 20210505 [GitHub] [kafka] shayelkin opened a new pull request #10636: MINOR: Bump Jersey deps to 2.34 due to CVE-2021-28168",
  59508. "refsource" : "MLIST",
  59509. "tags" : [ ]
  59510. }, {
  59511. "url" : "https://lists.apache.org/thread.html/r42fef440487a04cf5e487a9707ef5119d2dd5b809919f25ef4296fc4@%3Cjira.kafka.apache.org%3E",
  59512. "name" : "[kafka-jira] 20210506 [jira] [Commented] (KAFKA-12752) CVE-2021-28168 upgrade jersey to 2.34 or 3.02",
  59513. "refsource" : "MLIST",
  59514. "tags" : [ ]
  59515. }, {
  59516. "url" : "https://lists.apache.org/thread.html/r4066176a7352e021d7a81af460044bde8d57f40e98f8e4a31923af3a@%3Cjira.kafka.apache.org%3E",
  59517. "name" : "[kafka-jira] 20210506 [jira] [Assigned] (KAFKA-12752) CVE-2021-28168 upgrade jersey to 2.34 or 3.02",
  59518. "refsource" : "MLIST",
  59519. "tags" : [ ]
  59520. }, {
  59521. "url" : "https://lists.apache.org/thread.html/rafc3c4cee534f478cbf8acf91e48373e291a21151f030e8132662a7b@%3Cjira.kafka.apache.org%3E",
  59522. "name" : "[kafka-jira] 20210506 [GitHub] [kafka] dongjinleekr opened a new pull request #10641: KAFKA-12752: CVE-2021-28168 upgrade jersey to 2.34 or 3.02",
  59523. "refsource" : "MLIST",
  59524. "tags" : [ ]
  59525. }, {
  59526. "url" : "https://lists.apache.org/thread.html/r6dadc8fe82071aba841d673ffadf34728bff4357796b1990a66e3af1@%3Ccommits.kafka.apache.org%3E",
  59527. "name" : "[kafka-commits] 20210506 [kafka] branch 2.7 updated: KAFKA-12752: Bump Jersey deps to 2.34 due to CVE-2021-28168 (#10636)",
  59528. "refsource" : "MLIST",
  59529. "tags" : [ ]
  59530. }, {
  59531. "url" : "https://lists.apache.org/thread.html/r454f38e85db149869c5a92c993c402260a4f8599bf283f6cfaada972@%3Cjira.kafka.apache.org%3E",
  59532. "name" : "[kafka-jira] 20210506 [GitHub] [kafka] omkreddy commented on pull request #10641: KAFKA-12752: CVE-2021-28168 upgrade jersey to 2.34 or 3.02",
  59533. "refsource" : "MLIST",
  59534. "tags" : [ ]
  59535. }, {
  59536. "url" : "https://lists.apache.org/thread.html/r305fb82e5c005143c1e2ec986a19c0a44f42189ab2580344dc955359@%3Cdev.kafka.apache.org%3E",
  59537. "name" : "[kafka-dev] 20210506 [jira] [Resolved] (KAFKA-12752) CVE-2021-28168 upgrade jersey to 2.34 or 3.02",
  59538. "refsource" : "MLIST",
  59539. "tags" : [ ]
  59540. }, {
  59541. "url" : "https://lists.apache.org/thread.html/r280438f7cb4b3b1c9dfda9d7b05fa2a5cfab68618c6afee8169ecdaa@%3Ccommits.kafka.apache.org%3E",
  59542. "name" : "[kafka-commits] 20210506 [kafka] branch 2.8 updated: KAFKA-12752: Bump Jersey deps to 2.34 due to CVE-2021-28168 (#10636)",
  59543. "refsource" : "MLIST",
  59544. "tags" : [ ]
  59545. }, {
  59546. "url" : "https://lists.apache.org/thread.html/rdff6939e6c8dd620e20b013d9a35f57d42b3cd19e1d0483d85dfa2fd@%3Cjira.kafka.apache.org%3E",
  59547. "name" : "[kafka-jira] 20210506 [jira] [Resolved] (KAFKA-12752) CVE-2021-28168 upgrade jersey to 2.34 or 3.02",
  59548. "refsource" : "MLIST",
  59549. "tags" : [ ]
  59550. }, {
  59551. "url" : "https://lists.apache.org/thread.html/r96658b899fcdbf04947257d201dc5a0abdbb5fb0a8f4ec0a6c15e70f@%3Cjira.kafka.apache.org%3E",
  59552. "name" : "[kafka-jira] 20210506 [GitHub] [kafka] omkreddy merged pull request #10636: MINOR: Bump Jersey deps to 2.34 due to CVE-2021-28168",
  59553. "refsource" : "MLIST",
  59554. "tags" : [ ]
  59555. }, {
  59556. "url" : "https://lists.apache.org/thread.html/ra2722171d569370a9e15147d9f3f6138ad9a188ee879c0156aa2d73a@%3Cjira.kafka.apache.org%3E",
  59557. "name" : "[kafka-jira] 20210507 [GitHub] [kafka] dongjinleekr closed pull request #10641: KAFKA-12752: CVE-2021-28168 upgrade jersey to 2.34 or 3.02",
  59558. "refsource" : "MLIST",
  59559. "tags" : [ ]
  59560. }, {
  59561. "url" : "https://lists.apache.org/thread.html/ra3290fe51b4546fac195724c4187c4cb7fc5809bc596c2f7e97606f4@%3Cjira.kafka.apache.org%3E",
  59562. "name" : "[kafka-jira] 20210507 [GitHub] [kafka] dongjinleekr commented on pull request #10641: KAFKA-12752: CVE-2021-28168 upgrade jersey to 2.34 or 3.02",
  59563. "refsource" : "MLIST",
  59564. "tags" : [ ]
  59565. } ]
  59566. },
  59567. "description" : {
  59568. "description_data" : [ {
  59569. "lang" : "en",
  59570. "value" : "Eclipse Jersey 2.28 to 2.33 and Eclipse Jersey 3.0.0 to 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the File.createTempFile which creates a file inside of the system temporary directory with the permissions: -rw-r--r--. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users."
  59571. } ]
  59572. }
  59573. },
  59574. "configurations" : {
  59575. "CVE_data_version" : "4.0",
  59576. "nodes" : [ {
  59577. "operator" : "OR",
  59578. "children" : [ ],
  59579. "cpe_match" : [ {
  59580. "vulnerable" : true,
  59581. "cpe23Uri" : "cpe:2.3:a:eclipse:jersey:*:*:*:*:*:*:*:*",
  59582. "versionStartIncluding" : "2.28",
  59583. "versionEndExcluding" : "2.34",
  59584. "cpe_name" : [ ]
  59585. }, {
  59586. "vulnerable" : true,
  59587. "cpe23Uri" : "cpe:2.3:a:eclipse:jersey:*:*:*:*:*:*:*:*",
  59588. "versionStartIncluding" : "3.0.0",
  59589. "versionEndExcluding" : "3.0.2",
  59590. "cpe_name" : [ ]
  59591. } ]
  59592. } ]
  59593. },
  59594. "impact" : {
  59595. "baseMetricV3" : {
  59596. "cvssV3" : {
  59597. "version" : "3.1",
  59598. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  59599. "attackVector" : "LOCAL",
  59600. "attackComplexity" : "LOW",
  59601. "privilegesRequired" : "LOW",
  59602. "userInteraction" : "NONE",
  59603. "scope" : "UNCHANGED",
  59604. "confidentialityImpact" : "HIGH",
  59605. "integrityImpact" : "NONE",
  59606. "availabilityImpact" : "NONE",
  59607. "baseScore" : 5.5,
  59608. "baseSeverity" : "MEDIUM"
  59609. },
  59610. "exploitabilityScore" : 1.8,
  59611. "impactScore" : 3.6
  59612. },
  59613. "baseMetricV2" : {
  59614. "cvssV2" : {
  59615. "version" : "2.0",
  59616. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  59617. "accessVector" : "LOCAL",
  59618. "accessComplexity" : "LOW",
  59619. "authentication" : "NONE",
  59620. "confidentialityImpact" : "PARTIAL",
  59621. "integrityImpact" : "NONE",
  59622. "availabilityImpact" : "NONE",
  59623. "baseScore" : 2.1
  59624. },
  59625. "severity" : "LOW",
  59626. "exploitabilityScore" : 3.9,
  59627. "impactScore" : 2.9,
  59628. "acInsufInfo" : false,
  59629. "obtainAllPrivilege" : false,
  59630. "obtainUserPrivilege" : false,
  59631. "obtainOtherPrivilege" : false,
  59632. "userInteractionRequired" : false
  59633. }
  59634. },
  59635. "publishedDate" : "2021-04-22T18:15Z",
  59636. "lastModifiedDate" : "2021-05-07T16:15Z"
  59637. }, {
  59638. "cve" : {
  59639. "data_type" : "CVE",
  59640. "data_format" : "MITRE",
  59641. "data_version" : "4.0",
  59642. "CVE_data_meta" : {
  59643. "ID" : "CVE-2021-23133",
  59644. "ASSIGNER" : "psirt@paloaltonetworks.com"
  59645. },
  59646. "problemtype" : {
  59647. "problemtype_data" : [ {
  59648. "description" : [ {
  59649. "lang" : "en",
  59650. "value" : "CWE-362"
  59651. } ]
  59652. } ]
  59653. },
  59654. "references" : {
  59655. "reference_data" : [ {
  59656. "url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
  59657. "name" : "N/A",
  59658. "refsource" : "CONFIRM",
  59659. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  59660. }, {
  59661. "url" : "https://www.openwall.com/lists/oss-security/2021/04/18/2",
  59662. "name" : "N/A",
  59663. "refsource" : "CONFIRM",
  59664. "tags" : [ "Exploit", "Mailing List", "Patch", "Third Party Advisory" ]
  59665. }, {
  59666. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/",
  59667. "name" : "FEDORA-2021-8cd093f639",
  59668. "refsource" : "FEDORA",
  59669. "tags" : [ "Third Party Advisory" ]
  59670. }, {
  59671. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/",
  59672. "name" : "FEDORA-2021-e6b4847979",
  59673. "refsource" : "FEDORA",
  59674. "tags" : [ "Third Party Advisory" ]
  59675. }, {
  59676. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/",
  59677. "name" : "FEDORA-2021-a963f04012",
  59678. "refsource" : "FEDORA",
  59679. "tags" : [ ]
  59680. }, {
  59681. "url" : "http://www.openwall.com/lists/oss-security/2021/05/10/1",
  59682. "name" : "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets",
  59683. "refsource" : "MLIST",
  59684. "tags" : [ ]
  59685. }, {
  59686. "url" : "http://www.openwall.com/lists/oss-security/2021/05/10/2",
  59687. "name" : "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets",
  59688. "refsource" : "MLIST",
  59689. "tags" : [ ]
  59690. }, {
  59691. "url" : "http://www.openwall.com/lists/oss-security/2021/05/10/3",
  59692. "name" : "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets",
  59693. "refsource" : "MLIST",
  59694. "tags" : [ ]
  59695. }, {
  59696. "url" : "http://www.openwall.com/lists/oss-security/2021/05/10/4",
  59697. "name" : "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets",
  59698. "refsource" : "MLIST",
  59699. "tags" : [ ]
  59700. } ]
  59701. },
  59702. "description" : {
  59703. "description_data" : [ {
  59704. "lang" : "en",
  59705. "value" : "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket."
  59706. } ]
  59707. }
  59708. },
  59709. "configurations" : {
  59710. "CVE_data_version" : "4.0",
  59711. "nodes" : [ {
  59712. "operator" : "OR",
  59713. "children" : [ ],
  59714. "cpe_match" : [ {
  59715. "vulnerable" : true,
  59716. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
  59717. "versionEndExcluding" : "5.12",
  59718. "cpe_name" : [ ]
  59719. }, {
  59720. "vulnerable" : true,
  59721. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:*",
  59722. "cpe_name" : [ ]
  59723. }, {
  59724. "vulnerable" : true,
  59725. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*",
  59726. "cpe_name" : [ ]
  59727. }, {
  59728. "vulnerable" : true,
  59729. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*",
  59730. "cpe_name" : [ ]
  59731. }, {
  59732. "vulnerable" : true,
  59733. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:*",
  59734. "cpe_name" : [ ]
  59735. }, {
  59736. "vulnerable" : true,
  59737. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.12:rc4:*:*:*:*:*:*",
  59738. "cpe_name" : [ ]
  59739. }, {
  59740. "vulnerable" : true,
  59741. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:*",
  59742. "cpe_name" : [ ]
  59743. }, {
  59744. "vulnerable" : true,
  59745. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:*",
  59746. "cpe_name" : [ ]
  59747. }, {
  59748. "vulnerable" : true,
  59749. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:*",
  59750. "cpe_name" : [ ]
  59751. } ]
  59752. }, {
  59753. "operator" : "OR",
  59754. "children" : [ ],
  59755. "cpe_match" : [ {
  59756. "vulnerable" : true,
  59757. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  59758. "cpe_name" : [ ]
  59759. }, {
  59760. "vulnerable" : true,
  59761. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  59762. "cpe_name" : [ ]
  59763. } ]
  59764. } ]
  59765. },
  59766. "impact" : {
  59767. "baseMetricV3" : {
  59768. "cvssV3" : {
  59769. "version" : "3.1",
  59770. "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
  59771. "attackVector" : "LOCAL",
  59772. "attackComplexity" : "HIGH",
  59773. "privilegesRequired" : "LOW",
  59774. "userInteraction" : "NONE",
  59775. "scope" : "UNCHANGED",
  59776. "confidentialityImpact" : "HIGH",
  59777. "integrityImpact" : "HIGH",
  59778. "availabilityImpact" : "HIGH",
  59779. "baseScore" : 7.0,
  59780. "baseSeverity" : "HIGH"
  59781. },
  59782. "exploitabilityScore" : 1.0,
  59783. "impactScore" : 5.9
  59784. },
  59785. "baseMetricV2" : {
  59786. "cvssV2" : {
  59787. "version" : "2.0",
  59788. "vectorString" : "AV:L/AC:M/Au:N/C:C/I:C/A:C",
  59789. "accessVector" : "LOCAL",
  59790. "accessComplexity" : "MEDIUM",
  59791. "authentication" : "NONE",
  59792. "confidentialityImpact" : "COMPLETE",
  59793. "integrityImpact" : "COMPLETE",
  59794. "availabilityImpact" : "COMPLETE",
  59795. "baseScore" : 6.9
  59796. },
  59797. "severity" : "MEDIUM",
  59798. "exploitabilityScore" : 3.4,
  59799. "impactScore" : 10.0,
  59800. "acInsufInfo" : false,
  59801. "obtainAllPrivilege" : false,
  59802. "obtainUserPrivilege" : false,
  59803. "obtainOtherPrivilege" : false,
  59804. "userInteractionRequired" : false
  59805. }
  59806. },
  59807. "publishedDate" : "2021-04-22T18:15Z",
  59808. "lastModifiedDate" : "2021-05-10T12:15Z"
  59809. }, {
  59810. "cve" : {
  59811. "data_type" : "CVE",
  59812. "data_format" : "MITRE",
  59813. "data_version" : "4.0",
  59814. "CVE_data_meta" : {
  59815. "ID" : "CVE-2021-1078",
  59816. "ASSIGNER" : "psirt@nvidia.com"
  59817. },
  59818. "problemtype" : {
  59819. "problemtype_data" : [ {
  59820. "description" : [ {
  59821. "lang" : "en",
  59822. "value" : "CWE-476"
  59823. } ]
  59824. } ]
  59825. },
  59826. "references" : {
  59827. "reference_data" : [ {
  59828. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  59829. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  59830. "refsource" : "CONFIRM",
  59831. "tags" : [ "Vendor Advisory" ]
  59832. } ]
  59833. },
  59834. "description" : {
  59835. "description_data" : [ {
  59836. "lang" : "en",
  59837. "value" : "NVIDIA Windows GPU Display Driver for Windows, all versions, contains a vulnerability in the kernel driver (nvlddmkm.sys) where a NULL pointer dereference may lead to system crash."
  59838. } ]
  59839. }
  59840. },
  59841. "configurations" : {
  59842. "CVE_data_version" : "4.0",
  59843. "nodes" : [ {
  59844. "operator" : "OR",
  59845. "children" : [ ],
  59846. "cpe_match" : [ {
  59847. "vulnerable" : true,
  59848. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  59849. "versionStartIncluding" : "390",
  59850. "versionEndExcluding" : "392.65",
  59851. "cpe_name" : [ ]
  59852. }, {
  59853. "vulnerable" : true,
  59854. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  59855. "versionStartIncluding" : "418",
  59856. "versionEndExcluding" : "427.33",
  59857. "cpe_name" : [ ]
  59858. }, {
  59859. "vulnerable" : true,
  59860. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  59861. "versionStartIncluding" : "450",
  59862. "versionEndExcluding" : "452.96",
  59863. "cpe_name" : [ ]
  59864. }, {
  59865. "vulnerable" : true,
  59866. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  59867. "versionStartIncluding" : "460",
  59868. "versionEndExcluding" : "462.31",
  59869. "cpe_name" : [ ]
  59870. }, {
  59871. "vulnerable" : true,
  59872. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  59873. "versionStartIncluding" : "465",
  59874. "versionEndExcluding" : "466.11",
  59875. "cpe_name" : [ ]
  59876. } ]
  59877. } ]
  59878. },
  59879. "impact" : {
  59880. "baseMetricV3" : {
  59881. "cvssV3" : {
  59882. "version" : "3.1",
  59883. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  59884. "attackVector" : "LOCAL",
  59885. "attackComplexity" : "LOW",
  59886. "privilegesRequired" : "LOW",
  59887. "userInteraction" : "NONE",
  59888. "scope" : "UNCHANGED",
  59889. "confidentialityImpact" : "NONE",
  59890. "integrityImpact" : "NONE",
  59891. "availabilityImpact" : "HIGH",
  59892. "baseScore" : 5.5,
  59893. "baseSeverity" : "MEDIUM"
  59894. },
  59895. "exploitabilityScore" : 1.8,
  59896. "impactScore" : 3.6
  59897. },
  59898. "baseMetricV2" : {
  59899. "cvssV2" : {
  59900. "version" : "2.0",
  59901. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:C",
  59902. "accessVector" : "LOCAL",
  59903. "accessComplexity" : "LOW",
  59904. "authentication" : "NONE",
  59905. "confidentialityImpact" : "NONE",
  59906. "integrityImpact" : "NONE",
  59907. "availabilityImpact" : "COMPLETE",
  59908. "baseScore" : 4.9
  59909. },
  59910. "severity" : "MEDIUM",
  59911. "exploitabilityScore" : 3.9,
  59912. "impactScore" : 6.9,
  59913. "acInsufInfo" : false,
  59914. "obtainAllPrivilege" : false,
  59915. "obtainUserPrivilege" : false,
  59916. "obtainOtherPrivilege" : false,
  59917. "userInteractionRequired" : false
  59918. }
  59919. },
  59920. "publishedDate" : "2021-04-21T23:15Z",
  59921. "lastModifiedDate" : "2021-05-03T14:51Z"
  59922. }, {
  59923. "cve" : {
  59924. "data_type" : "CVE",
  59925. "data_format" : "MITRE",
  59926. "data_version" : "4.0",
  59927. "CVE_data_meta" : {
  59928. "ID" : "CVE-2021-1077",
  59929. "ASSIGNER" : "psirt@nvidia.com"
  59930. },
  59931. "problemtype" : {
  59932. "problemtype_data" : [ {
  59933. "description" : [ {
  59934. "lang" : "en",
  59935. "value" : "CWE-404"
  59936. } ]
  59937. } ]
  59938. },
  59939. "references" : {
  59940. "reference_data" : [ {
  59941. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  59942. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  59943. "refsource" : "CONFIRM",
  59944. "tags" : [ "Vendor Advisory" ]
  59945. } ]
  59946. },
  59947. "description" : {
  59948. "description_data" : [ {
  59949. "lang" : "en",
  59950. "value" : "NVIDIA GPU Display Driver for Windows and Linux, R450 and R460 driver branch, contains a vulnerability where the software uses a reference count to manage a resource that is incorrectly updated, which may lead to denial of service."
  59951. } ]
  59952. }
  59953. },
  59954. "configurations" : {
  59955. "CVE_data_version" : "4.0",
  59956. "nodes" : [ {
  59957. "operator" : "OR",
  59958. "children" : [ ],
  59959. "cpe_match" : [ {
  59960. "vulnerable" : true,
  59961. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
  59962. "versionStartIncluding" : "450",
  59963. "versionEndExcluding" : "450.119.03",
  59964. "cpe_name" : [ ]
  59965. }, {
  59966. "vulnerable" : true,
  59967. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  59968. "versionStartIncluding" : "450",
  59969. "versionEndExcluding" : "452.96",
  59970. "cpe_name" : [ ]
  59971. }, {
  59972. "vulnerable" : true,
  59973. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
  59974. "versionStartIncluding" : "460",
  59975. "versionEndExcluding" : "460.73.01",
  59976. "cpe_name" : [ ]
  59977. }, {
  59978. "vulnerable" : true,
  59979. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  59980. "versionStartIncluding" : "460",
  59981. "versionEndExcluding" : "462.31",
  59982. "cpe_name" : [ ]
  59983. } ]
  59984. } ]
  59985. },
  59986. "impact" : {
  59987. "baseMetricV3" : {
  59988. "cvssV3" : {
  59989. "version" : "3.1",
  59990. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  59991. "attackVector" : "LOCAL",
  59992. "attackComplexity" : "LOW",
  59993. "privilegesRequired" : "LOW",
  59994. "userInteraction" : "NONE",
  59995. "scope" : "UNCHANGED",
  59996. "confidentialityImpact" : "NONE",
  59997. "integrityImpact" : "NONE",
  59998. "availabilityImpact" : "HIGH",
  59999. "baseScore" : 5.5,
  60000. "baseSeverity" : "MEDIUM"
  60001. },
  60002. "exploitabilityScore" : 1.8,
  60003. "impactScore" : 3.6
  60004. },
  60005. "baseMetricV2" : {
  60006. "cvssV2" : {
  60007. "version" : "2.0",
  60008. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:P",
  60009. "accessVector" : "LOCAL",
  60010. "accessComplexity" : "LOW",
  60011. "authentication" : "NONE",
  60012. "confidentialityImpact" : "NONE",
  60013. "integrityImpact" : "NONE",
  60014. "availabilityImpact" : "PARTIAL",
  60015. "baseScore" : 2.1
  60016. },
  60017. "severity" : "LOW",
  60018. "exploitabilityScore" : 3.9,
  60019. "impactScore" : 2.9,
  60020. "acInsufInfo" : false,
  60021. "obtainAllPrivilege" : false,
  60022. "obtainUserPrivilege" : false,
  60023. "obtainOtherPrivilege" : false,
  60024. "userInteractionRequired" : false
  60025. }
  60026. },
  60027. "publishedDate" : "2021-04-21T23:15Z",
  60028. "lastModifiedDate" : "2021-05-03T14:58Z"
  60029. }, {
  60030. "cve" : {
  60031. "data_type" : "CVE",
  60032. "data_format" : "MITRE",
  60033. "data_version" : "4.0",
  60034. "CVE_data_meta" : {
  60035. "ID" : "CVE-2021-1076",
  60036. "ASSIGNER" : "psirt@nvidia.com"
  60037. },
  60038. "problemtype" : {
  60039. "problemtype_data" : [ {
  60040. "description" : [ {
  60041. "lang" : "en",
  60042. "value" : "CWE-863"
  60043. } ]
  60044. } ]
  60045. },
  60046. "references" : {
  60047. "reference_data" : [ {
  60048. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  60049. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  60050. "refsource" : "CONFIRM",
  60051. "tags" : [ "Vendor Advisory" ]
  60052. } ]
  60053. },
  60054. "description" : {
  60055. "description_data" : [ {
  60056. "lang" : "en",
  60057. "value" : "NVIDIA GPU Display Driver for Windows and Linux, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys or nvidia.ko) where improper access control may lead to denial of service, information disclosure, or data corruption."
  60058. } ]
  60059. }
  60060. },
  60061. "configurations" : {
  60062. "CVE_data_version" : "4.0",
  60063. "nodes" : [ {
  60064. "operator" : "OR",
  60065. "children" : [ ],
  60066. "cpe_match" : [ {
  60067. "vulnerable" : true,
  60068. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
  60069. "versionStartIncluding" : "390",
  60070. "versionEndExcluding" : "390.143",
  60071. "cpe_name" : [ ]
  60072. }, {
  60073. "vulnerable" : true,
  60074. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
  60075. "versionStartIncluding" : "418",
  60076. "versionEndExcluding" : "418.197.02",
  60077. "cpe_name" : [ ]
  60078. }, {
  60079. "vulnerable" : true,
  60080. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  60081. "versionStartIncluding" : "418",
  60082. "versionEndExcluding" : "427.33",
  60083. "cpe_name" : [ ]
  60084. }, {
  60085. "vulnerable" : true,
  60086. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
  60087. "versionStartIncluding" : "450",
  60088. "versionEndExcluding" : "450.119.03",
  60089. "cpe_name" : [ ]
  60090. }, {
  60091. "vulnerable" : true,
  60092. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  60093. "versionStartIncluding" : "450",
  60094. "versionEndExcluding" : "452.96",
  60095. "cpe_name" : [ ]
  60096. }, {
  60097. "vulnerable" : true,
  60098. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
  60099. "versionStartIncluding" : "460",
  60100. "versionEndExcluding" : "460.73.01",
  60101. "cpe_name" : [ ]
  60102. }, {
  60103. "vulnerable" : true,
  60104. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  60105. "versionStartIncluding" : "460",
  60106. "versionEndExcluding" : "462.31",
  60107. "cpe_name" : [ ]
  60108. }, {
  60109. "vulnerable" : true,
  60110. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
  60111. "versionStartIncluding" : "465",
  60112. "versionEndExcluding" : "465.24.02",
  60113. "cpe_name" : [ ]
  60114. }, {
  60115. "vulnerable" : true,
  60116. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  60117. "versionStartIncluding" : "465",
  60118. "versionEndExcluding" : "466.11",
  60119. "cpe_name" : [ ]
  60120. } ]
  60121. } ]
  60122. },
  60123. "impact" : {
  60124. "baseMetricV3" : {
  60125. "cvssV3" : {
  60126. "version" : "3.1",
  60127. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  60128. "attackVector" : "LOCAL",
  60129. "attackComplexity" : "LOW",
  60130. "privilegesRequired" : "LOW",
  60131. "userInteraction" : "NONE",
  60132. "scope" : "UNCHANGED",
  60133. "confidentialityImpact" : "HIGH",
  60134. "integrityImpact" : "HIGH",
  60135. "availabilityImpact" : "HIGH",
  60136. "baseScore" : 7.8,
  60137. "baseSeverity" : "HIGH"
  60138. },
  60139. "exploitabilityScore" : 1.8,
  60140. "impactScore" : 5.9
  60141. },
  60142. "baseMetricV2" : {
  60143. "cvssV2" : {
  60144. "version" : "2.0",
  60145. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  60146. "accessVector" : "LOCAL",
  60147. "accessComplexity" : "LOW",
  60148. "authentication" : "NONE",
  60149. "confidentialityImpact" : "PARTIAL",
  60150. "integrityImpact" : "PARTIAL",
  60151. "availabilityImpact" : "PARTIAL",
  60152. "baseScore" : 4.6
  60153. },
  60154. "severity" : "MEDIUM",
  60155. "exploitabilityScore" : 3.9,
  60156. "impactScore" : 6.4,
  60157. "acInsufInfo" : false,
  60158. "obtainAllPrivilege" : false,
  60159. "obtainUserPrivilege" : false,
  60160. "obtainOtherPrivilege" : false,
  60161. "userInteractionRequired" : false
  60162. }
  60163. },
  60164. "publishedDate" : "2021-04-21T23:15Z",
  60165. "lastModifiedDate" : "2021-05-03T14:59Z"
  60166. }, {
  60167. "cve" : {
  60168. "data_type" : "CVE",
  60169. "data_format" : "MITRE",
  60170. "data_version" : "4.0",
  60171. "CVE_data_meta" : {
  60172. "ID" : "CVE-2021-1075",
  60173. "ASSIGNER" : "psirt@nvidia.com"
  60174. },
  60175. "problemtype" : {
  60176. "problemtype_data" : [ {
  60177. "description" : [ {
  60178. "lang" : "en",
  60179. "value" : "CWE-269"
  60180. } ]
  60181. } ]
  60182. },
  60183. "references" : {
  60184. "reference_data" : [ {
  60185. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  60186. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  60187. "refsource" : "CONFIRM",
  60188. "tags" : [ "Vendor Advisory" ]
  60189. } ]
  60190. },
  60191. "description" : {
  60192. "description_data" : [ {
  60193. "lang" : "en",
  60194. "value" : "NVIDIA Windows GPU Display Driver for Windows, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where the program dereferences a pointer that contains a location for memory that is no longer valid, which may lead to code execution, denial of service, or escalation of privileges."
  60195. } ]
  60196. }
  60197. },
  60198. "configurations" : {
  60199. "CVE_data_version" : "4.0",
  60200. "nodes" : [ {
  60201. "operator" : "OR",
  60202. "children" : [ ],
  60203. "cpe_match" : [ {
  60204. "vulnerable" : true,
  60205. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  60206. "versionStartIncluding" : "418",
  60207. "versionEndExcluding" : "427.33",
  60208. "cpe_name" : [ ]
  60209. }, {
  60210. "vulnerable" : true,
  60211. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  60212. "versionStartIncluding" : "450",
  60213. "versionEndExcluding" : "452.96",
  60214. "cpe_name" : [ ]
  60215. }, {
  60216. "vulnerable" : true,
  60217. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  60218. "versionStartIncluding" : "460",
  60219. "versionEndExcluding" : "462.31",
  60220. "cpe_name" : [ ]
  60221. }, {
  60222. "vulnerable" : true,
  60223. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  60224. "versionStartIncluding" : "465",
  60225. "versionEndExcluding" : "466.11",
  60226. "cpe_name" : [ ]
  60227. } ]
  60228. } ]
  60229. },
  60230. "impact" : {
  60231. "baseMetricV3" : {
  60232. "cvssV3" : {
  60233. "version" : "3.1",
  60234. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  60235. "attackVector" : "LOCAL",
  60236. "attackComplexity" : "LOW",
  60237. "privilegesRequired" : "LOW",
  60238. "userInteraction" : "NONE",
  60239. "scope" : "UNCHANGED",
  60240. "confidentialityImpact" : "HIGH",
  60241. "integrityImpact" : "HIGH",
  60242. "availabilityImpact" : "HIGH",
  60243. "baseScore" : 7.8,
  60244. "baseSeverity" : "HIGH"
  60245. },
  60246. "exploitabilityScore" : 1.8,
  60247. "impactScore" : 5.9
  60248. },
  60249. "baseMetricV2" : {
  60250. "cvssV2" : {
  60251. "version" : "2.0",
  60252. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  60253. "accessVector" : "LOCAL",
  60254. "accessComplexity" : "LOW",
  60255. "authentication" : "NONE",
  60256. "confidentialityImpact" : "COMPLETE",
  60257. "integrityImpact" : "COMPLETE",
  60258. "availabilityImpact" : "COMPLETE",
  60259. "baseScore" : 7.2
  60260. },
  60261. "severity" : "HIGH",
  60262. "exploitabilityScore" : 3.9,
  60263. "impactScore" : 10.0,
  60264. "acInsufInfo" : false,
  60265. "obtainAllPrivilege" : false,
  60266. "obtainUserPrivilege" : false,
  60267. "obtainOtherPrivilege" : false,
  60268. "userInteractionRequired" : false
  60269. }
  60270. },
  60271. "publishedDate" : "2021-04-21T23:15Z",
  60272. "lastModifiedDate" : "2021-05-03T15:06Z"
  60273. }, {
  60274. "cve" : {
  60275. "data_type" : "CVE",
  60276. "data_format" : "MITRE",
  60277. "data_version" : "4.0",
  60278. "CVE_data_meta" : {
  60279. "ID" : "CVE-2021-1074",
  60280. "ASSIGNER" : "psirt@nvidia.com"
  60281. },
  60282. "problemtype" : {
  60283. "problemtype_data" : [ {
  60284. "description" : [ {
  60285. "lang" : "en",
  60286. "value" : "NVD-CWE-noinfo"
  60287. } ]
  60288. } ]
  60289. },
  60290. "references" : {
  60291. "reference_data" : [ {
  60292. "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  60293. "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5172",
  60294. "refsource" : "CONFIRM",
  60295. "tags" : [ "Vendor Advisory" ]
  60296. } ]
  60297. },
  60298. "description" : {
  60299. "description_data" : [ {
  60300. "lang" : "en",
  60301. "value" : "NVIDIA Windows GPU Display Driver for Windows, R390 driver branch, contains a vulnerability in its installer where an attacker with local system access may replace an application resource with malicious files. Such an attack may lead to code execution, escalation of privileges, denial of service, or information disclosure."
  60302. } ]
  60303. }
  60304. },
  60305. "configurations" : {
  60306. "CVE_data_version" : "4.0",
  60307. "nodes" : [ {
  60308. "operator" : "OR",
  60309. "children" : [ ],
  60310. "cpe_match" : [ {
  60311. "vulnerable" : true,
  60312. "cpe23Uri" : "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
  60313. "versionStartIncluding" : "390",
  60314. "versionEndExcluding" : "392.65",
  60315. "cpe_name" : [ ]
  60316. } ]
  60317. } ]
  60318. },
  60319. "impact" : {
  60320. "baseMetricV3" : {
  60321. "cvssV3" : {
  60322. "version" : "3.1",
  60323. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  60324. "attackVector" : "LOCAL",
  60325. "attackComplexity" : "LOW",
  60326. "privilegesRequired" : "LOW",
  60327. "userInteraction" : "NONE",
  60328. "scope" : "UNCHANGED",
  60329. "confidentialityImpact" : "HIGH",
  60330. "integrityImpact" : "HIGH",
  60331. "availabilityImpact" : "HIGH",
  60332. "baseScore" : 7.8,
  60333. "baseSeverity" : "HIGH"
  60334. },
  60335. "exploitabilityScore" : 1.8,
  60336. "impactScore" : 5.9
  60337. },
  60338. "baseMetricV2" : {
  60339. "cvssV2" : {
  60340. "version" : "2.0",
  60341. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  60342. "accessVector" : "LOCAL",
  60343. "accessComplexity" : "LOW",
  60344. "authentication" : "NONE",
  60345. "confidentialityImpact" : "COMPLETE",
  60346. "integrityImpact" : "COMPLETE",
  60347. "availabilityImpact" : "COMPLETE",
  60348. "baseScore" : 7.2
  60349. },
  60350. "severity" : "HIGH",
  60351. "exploitabilityScore" : 3.9,
  60352. "impactScore" : 10.0,
  60353. "acInsufInfo" : false,
  60354. "obtainAllPrivilege" : false,
  60355. "obtainUserPrivilege" : false,
  60356. "obtainOtherPrivilege" : false,
  60357. "userInteractionRequired" : false
  60358. }
  60359. },
  60360. "publishedDate" : "2021-04-21T23:15Z",
  60361. "lastModifiedDate" : "2021-05-03T15:03Z"
  60362. }, {
  60363. "cve" : {
  60364. "data_type" : "CVE",
  60365. "data_format" : "MITRE",
  60366. "data_version" : "4.0",
  60367. "CVE_data_meta" : {
  60368. "ID" : "CVE-2020-23922",
  60369. "ASSIGNER" : "cve@mitre.org"
  60370. },
  60371. "problemtype" : {
  60372. "problemtype_data" : [ {
  60373. "description" : [ {
  60374. "lang" : "en",
  60375. "value" : "CWE-125"
  60376. } ]
  60377. } ]
  60378. },
  60379. "references" : {
  60380. "reference_data" : [ {
  60381. "url" : "https://sourceforge.net/p/giflib/bugs/151/",
  60382. "name" : "https://sourceforge.net/p/giflib/bugs/151/",
  60383. "refsource" : "MISC",
  60384. "tags" : [ "Exploit", "Third Party Advisory" ]
  60385. } ]
  60386. },
  60387. "description" : {
  60388. "description_data" : [ {
  60389. "lang" : "en",
  60390. "value" : "An issue was discovered in giflib through 5.1.4. DumpScreen2RGB in gif2rgb.c has a heap-based buffer over-read."
  60391. } ]
  60392. }
  60393. },
  60394. "configurations" : {
  60395. "CVE_data_version" : "4.0",
  60396. "nodes" : [ {
  60397. "operator" : "OR",
  60398. "children" : [ ],
  60399. "cpe_match" : [ {
  60400. "vulnerable" : true,
  60401. "cpe23Uri" : "cpe:2.3:a:giflib_project:giflib:*:*:*:*:*:*:*:*",
  60402. "versionEndIncluding" : "5.1.4",
  60403. "cpe_name" : [ ]
  60404. } ]
  60405. } ]
  60406. },
  60407. "impact" : {
  60408. "baseMetricV3" : {
  60409. "cvssV3" : {
  60410. "version" : "3.1",
  60411. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
  60412. "attackVector" : "LOCAL",
  60413. "attackComplexity" : "LOW",
  60414. "privilegesRequired" : "NONE",
  60415. "userInteraction" : "REQUIRED",
  60416. "scope" : "UNCHANGED",
  60417. "confidentialityImpact" : "HIGH",
  60418. "integrityImpact" : "NONE",
  60419. "availabilityImpact" : "HIGH",
  60420. "baseScore" : 7.1,
  60421. "baseSeverity" : "HIGH"
  60422. },
  60423. "exploitabilityScore" : 1.8,
  60424. "impactScore" : 5.2
  60425. },
  60426. "baseMetricV2" : {
  60427. "cvssV2" : {
  60428. "version" : "2.0",
  60429. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:N/A:P",
  60430. "accessVector" : "NETWORK",
  60431. "accessComplexity" : "MEDIUM",
  60432. "authentication" : "NONE",
  60433. "confidentialityImpact" : "PARTIAL",
  60434. "integrityImpact" : "NONE",
  60435. "availabilityImpact" : "PARTIAL",
  60436. "baseScore" : 5.8
  60437. },
  60438. "severity" : "MEDIUM",
  60439. "exploitabilityScore" : 8.6,
  60440. "impactScore" : 4.9,
  60441. "acInsufInfo" : false,
  60442. "obtainAllPrivilege" : false,
  60443. "obtainUserPrivilege" : false,
  60444. "obtainOtherPrivilege" : false,
  60445. "userInteractionRequired" : true
  60446. }
  60447. },
  60448. "publishedDate" : "2021-04-21T18:15Z",
  60449. "lastModifiedDate" : "2021-05-05T19:19Z"
  60450. }, {
  60451. "cve" : {
  60452. "data_type" : "CVE",
  60453. "data_format" : "MITRE",
  60454. "data_version" : "4.0",
  60455. "CVE_data_meta" : {
  60456. "ID" : "CVE-2021-28492",
  60457. "ASSIGNER" : "cve@mitre.org"
  60458. },
  60459. "problemtype" : {
  60460. "problemtype_data" : [ {
  60461. "description" : [ {
  60462. "lang" : "en",
  60463. "value" : "NVD-CWE-Other"
  60464. } ]
  60465. } ]
  60466. },
  60467. "references" : {
  60468. "reference_data" : [ {
  60469. "url" : "https://public.support.unisys.com/common/public/vulnerability/NVD_Home.aspx",
  60470. "name" : "https://public.support.unisys.com/common/public/vulnerability/NVD_Home.aspx",
  60471. "refsource" : "MISC",
  60472. "tags" : [ "Vendor Advisory" ]
  60473. }, {
  60474. "url" : "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=63",
  60475. "name" : "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=63",
  60476. "refsource" : "CONFIRM",
  60477. "tags" : [ "Vendor Advisory" ]
  60478. } ]
  60479. },
  60480. "description" : {
  60481. "description_data" : [ {
  60482. "lang" : "en",
  60483. "value" : "Unisys Stealth (core) 5.x before 5.0.048.0, 5.1.x before 5.1.017.0, and 6.x before 6.0.037.0 stores passwords in a recoverable format."
  60484. } ]
  60485. }
  60486. },
  60487. "configurations" : {
  60488. "CVE_data_version" : "4.0",
  60489. "nodes" : [ {
  60490. "operator" : "OR",
  60491. "children" : [ ],
  60492. "cpe_match" : [ {
  60493. "vulnerable" : true,
  60494. "cpe23Uri" : "cpe:2.3:a:unisys:stealth:*:*:*:*:*:*:*:*",
  60495. "versionStartIncluding" : "5.0",
  60496. "versionEndExcluding" : "5.0.048.0",
  60497. "cpe_name" : [ ]
  60498. }, {
  60499. "vulnerable" : true,
  60500. "cpe23Uri" : "cpe:2.3:a:unisys:stealth:*:*:*:*:*:*:*:*",
  60501. "versionStartIncluding" : "5.1.0",
  60502. "versionEndExcluding" : "5.1.017.0",
  60503. "cpe_name" : [ ]
  60504. }, {
  60505. "vulnerable" : true,
  60506. "cpe23Uri" : "cpe:2.3:a:unisys:stealth:*:*:*:*:*:*:*:*",
  60507. "versionStartIncluding" : "6.0",
  60508. "versionEndExcluding" : "6.0.037.0",
  60509. "cpe_name" : [ ]
  60510. } ]
  60511. } ]
  60512. },
  60513. "impact" : {
  60514. "baseMetricV3" : {
  60515. "cvssV3" : {
  60516. "version" : "3.1",
  60517. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
  60518. "attackVector" : "NETWORK",
  60519. "attackComplexity" : "LOW",
  60520. "privilegesRequired" : "HIGH",
  60521. "userInteraction" : "NONE",
  60522. "scope" : "UNCHANGED",
  60523. "confidentialityImpact" : "HIGH",
  60524. "integrityImpact" : "NONE",
  60525. "availabilityImpact" : "NONE",
  60526. "baseScore" : 4.9,
  60527. "baseSeverity" : "MEDIUM"
  60528. },
  60529. "exploitabilityScore" : 1.2,
  60530. "impactScore" : 3.6
  60531. },
  60532. "baseMetricV2" : {
  60533. "cvssV2" : {
  60534. "version" : "2.0",
  60535. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
  60536. "accessVector" : "NETWORK",
  60537. "accessComplexity" : "LOW",
  60538. "authentication" : "SINGLE",
  60539. "confidentialityImpact" : "PARTIAL",
  60540. "integrityImpact" : "NONE",
  60541. "availabilityImpact" : "NONE",
  60542. "baseScore" : 4.0
  60543. },
  60544. "severity" : "MEDIUM",
  60545. "exploitabilityScore" : 8.0,
  60546. "impactScore" : 2.9,
  60547. "acInsufInfo" : false,
  60548. "obtainAllPrivilege" : false,
  60549. "obtainUserPrivilege" : false,
  60550. "obtainOtherPrivilege" : false,
  60551. "userInteractionRequired" : false
  60552. }
  60553. },
  60554. "publishedDate" : "2021-04-20T16:15Z",
  60555. "lastModifiedDate" : "2021-05-04T15:03Z"
  60556. }, {
  60557. "cve" : {
  60558. "data_type" : "CVE",
  60559. "data_format" : "MITRE",
  60560. "data_version" : "4.0",
  60561. "CVE_data_meta" : {
  60562. "ID" : "CVE-2021-3506",
  60563. "ASSIGNER" : "secalert@redhat.com"
  60564. },
  60565. "problemtype" : {
  60566. "problemtype_data" : [ {
  60567. "description" : [ {
  60568. "lang" : "en",
  60569. "value" : "CWE-125"
  60570. } ]
  60571. } ]
  60572. },
  60573. "references" : {
  60574. "reference_data" : [ {
  60575. "url" : "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2520013.html",
  60576. "name" : "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2520013.html",
  60577. "refsource" : "MISC",
  60578. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  60579. }, {
  60580. "url" : "https://www.openwall.com/lists/oss-security/2021/03/28/2",
  60581. "name" : "https://www.openwall.com/lists/oss-security/2021/03/28/2",
  60582. "refsource" : "MISC",
  60583. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  60584. }, {
  60585. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1944298",
  60586. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1944298",
  60587. "refsource" : "MISC",
  60588. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  60589. }, {
  60590. "url" : "http://www.openwall.com/lists/oss-security/2021/05/08/1",
  60591. "name" : "[oss-security] 20210508 Re: Linux kernel: f2fs: out-of-bounds memory access bug",
  60592. "refsource" : "MLIST",
  60593. "tags" : [ ]
  60594. } ]
  60595. },
  60596. "description" : {
  60597. "description_data" : [ {
  60598. "lang" : "en",
  60599. "value" : "An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability."
  60600. } ]
  60601. }
  60602. },
  60603. "configurations" : {
  60604. "CVE_data_version" : "4.0",
  60605. "nodes" : [ {
  60606. "operator" : "OR",
  60607. "children" : [ ],
  60608. "cpe_match" : [ {
  60609. "vulnerable" : true,
  60610. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
  60611. "versionEndExcluding" : "5.12",
  60612. "cpe_name" : [ ]
  60613. }, {
  60614. "vulnerable" : true,
  60615. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:*",
  60616. "cpe_name" : [ ]
  60617. }, {
  60618. "vulnerable" : true,
  60619. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*",
  60620. "cpe_name" : [ ]
  60621. }, {
  60622. "vulnerable" : true,
  60623. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*",
  60624. "cpe_name" : [ ]
  60625. }, {
  60626. "vulnerable" : true,
  60627. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:*",
  60628. "cpe_name" : [ ]
  60629. } ]
  60630. } ]
  60631. },
  60632. "impact" : {
  60633. "baseMetricV3" : {
  60634. "cvssV3" : {
  60635. "version" : "3.1",
  60636. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
  60637. "attackVector" : "LOCAL",
  60638. "attackComplexity" : "LOW",
  60639. "privilegesRequired" : "LOW",
  60640. "userInteraction" : "NONE",
  60641. "scope" : "UNCHANGED",
  60642. "confidentialityImpact" : "HIGH",
  60643. "integrityImpact" : "NONE",
  60644. "availabilityImpact" : "HIGH",
  60645. "baseScore" : 7.1,
  60646. "baseSeverity" : "HIGH"
  60647. },
  60648. "exploitabilityScore" : 1.8,
  60649. "impactScore" : 5.2
  60650. },
  60651. "baseMetricV2" : {
  60652. "cvssV2" : {
  60653. "version" : "2.0",
  60654. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:C",
  60655. "accessVector" : "LOCAL",
  60656. "accessComplexity" : "LOW",
  60657. "authentication" : "NONE",
  60658. "confidentialityImpact" : "PARTIAL",
  60659. "integrityImpact" : "NONE",
  60660. "availabilityImpact" : "COMPLETE",
  60661. "baseScore" : 5.6
  60662. },
  60663. "severity" : "MEDIUM",
  60664. "exploitabilityScore" : 3.9,
  60665. "impactScore" : 7.8,
  60666. "acInsufInfo" : false,
  60667. "obtainAllPrivilege" : false,
  60668. "obtainUserPrivilege" : false,
  60669. "obtainOtherPrivilege" : false,
  60670. "userInteractionRequired" : false
  60671. }
  60672. },
  60673. "publishedDate" : "2021-04-19T22:15Z",
  60674. "lastModifiedDate" : "2021-05-08T09:15Z"
  60675. }, {
  60676. "cve" : {
  60677. "data_type" : "CVE",
  60678. "data_format" : "MITRE",
  60679. "data_version" : "4.0",
  60680. "CVE_data_meta" : {
  60681. "ID" : "CVE-2021-3505",
  60682. "ASSIGNER" : "secalert@redhat.com"
  60683. },
  60684. "problemtype" : {
  60685. "problemtype_data" : [ {
  60686. "description" : [ {
  60687. "lang" : "en",
  60688. "value" : "CWE-331"
  60689. } ]
  60690. } ]
  60691. },
  60692. "references" : {
  60693. "reference_data" : [ {
  60694. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1950046",
  60695. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1950046",
  60696. "refsource" : "MISC",
  60697. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  60698. }, {
  60699. "url" : "https://github.com/stefanberger/libtpms/issues/183",
  60700. "name" : "https://github.com/stefanberger/libtpms/issues/183",
  60701. "refsource" : "MISC",
  60702. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  60703. }, {
  60704. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NUCZX4S53TUNTSGTCRDNOQZV2V2RI4RJ/",
  60705. "name" : "FEDORA-2021-cfdc434610",
  60706. "refsource" : "FEDORA",
  60707. "tags" : [ ]
  60708. } ]
  60709. },
  60710. "description" : {
  60711. "description_data" : [ {
  60712. "lang" : "en",
  60713. "value" : "A flaw was found in libtpms in versions before 0.8.0. The TPM 2 implementation returns 2048 bit keys with ~1984 bit strength due to a bug in the TCG specification. The bug is in the key creation algorithm in RsaAdjustPrimeCandidate(), which is called before the prime number check. The highest threat from this vulnerability is to data confidentiality."
  60714. } ]
  60715. }
  60716. },
  60717. "configurations" : {
  60718. "CVE_data_version" : "4.0",
  60719. "nodes" : [ {
  60720. "operator" : "OR",
  60721. "children" : [ ],
  60722. "cpe_match" : [ {
  60723. "vulnerable" : true,
  60724. "cpe23Uri" : "cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*",
  60725. "versionEndExcluding" : "0.8.0",
  60726. "cpe_name" : [ ]
  60727. } ]
  60728. }, {
  60729. "operator" : "OR",
  60730. "children" : [ ],
  60731. "cpe_match" : [ {
  60732. "vulnerable" : true,
  60733. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*",
  60734. "cpe_name" : [ ]
  60735. } ]
  60736. } ]
  60737. },
  60738. "impact" : {
  60739. "baseMetricV3" : {
  60740. "cvssV3" : {
  60741. "version" : "3.1",
  60742. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  60743. "attackVector" : "LOCAL",
  60744. "attackComplexity" : "LOW",
  60745. "privilegesRequired" : "LOW",
  60746. "userInteraction" : "NONE",
  60747. "scope" : "UNCHANGED",
  60748. "confidentialityImpact" : "HIGH",
  60749. "integrityImpact" : "NONE",
  60750. "availabilityImpact" : "NONE",
  60751. "baseScore" : 5.5,
  60752. "baseSeverity" : "MEDIUM"
  60753. },
  60754. "exploitabilityScore" : 1.8,
  60755. "impactScore" : 3.6
  60756. },
  60757. "baseMetricV2" : {
  60758. "cvssV2" : {
  60759. "version" : "2.0",
  60760. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  60761. "accessVector" : "LOCAL",
  60762. "accessComplexity" : "LOW",
  60763. "authentication" : "NONE",
  60764. "confidentialityImpact" : "PARTIAL",
  60765. "integrityImpact" : "NONE",
  60766. "availabilityImpact" : "NONE",
  60767. "baseScore" : 2.1
  60768. },
  60769. "severity" : "LOW",
  60770. "exploitabilityScore" : 3.9,
  60771. "impactScore" : 2.9,
  60772. "acInsufInfo" : false,
  60773. "obtainAllPrivilege" : false,
  60774. "obtainUserPrivilege" : false,
  60775. "obtainOtherPrivilege" : false,
  60776. "userInteractionRequired" : false
  60777. }
  60778. },
  60779. "publishedDate" : "2021-04-19T21:15Z",
  60780. "lastModifiedDate" : "2021-05-05T03:15Z"
  60781. }, {
  60782. "cve" : {
  60783. "data_type" : "CVE",
  60784. "data_format" : "MITRE",
  60785. "data_version" : "4.0",
  60786. "CVE_data_meta" : {
  60787. "ID" : "CVE-2021-29458",
  60788. "ASSIGNER" : "security-advisories@github.com"
  60789. },
  60790. "problemtype" : {
  60791. "problemtype_data" : [ {
  60792. "description" : [ {
  60793. "lang" : "en",
  60794. "value" : "CWE-125"
  60795. } ]
  60796. } ]
  60797. },
  60798. "references" : {
  60799. "reference_data" : [ {
  60800. "url" : "https://github.com/Exiv2/exiv2/pull/1536",
  60801. "name" : "https://github.com/Exiv2/exiv2/pull/1536",
  60802. "refsource" : "MISC",
  60803. "tags" : [ "Patch", "Third Party Advisory" ]
  60804. }, {
  60805. "url" : "https://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5",
  60806. "name" : "https://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5",
  60807. "refsource" : "CONFIRM",
  60808. "tags" : [ "Third Party Advisory" ]
  60809. }, {
  60810. "url" : "https://github.com/Exiv2/exiv2/issues/1530",
  60811. "name" : "https://github.com/Exiv2/exiv2/issues/1530",
  60812. "refsource" : "MISC",
  60813. "tags" : [ "Exploit", "Third Party Advisory" ]
  60814. }, {
  60815. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/",
  60816. "name" : "FEDORA-2021-10d7331a31",
  60817. "refsource" : "FEDORA",
  60818. "tags" : [ ]
  60819. } ]
  60820. },
  60821. "description" : {
  60822. "description_data" : [ {
  60823. "lang" : "en",
  60824. "value" : "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4."
  60825. } ]
  60826. }
  60827. },
  60828. "configurations" : {
  60829. "CVE_data_version" : "4.0",
  60830. "nodes" : [ {
  60831. "operator" : "OR",
  60832. "children" : [ ],
  60833. "cpe_match" : [ {
  60834. "vulnerable" : true,
  60835. "cpe23Uri" : "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
  60836. "versionEndExcluding" : "0.27.4",
  60837. "cpe_name" : [ ]
  60838. } ]
  60839. } ]
  60840. },
  60841. "impact" : {
  60842. "baseMetricV3" : {
  60843. "cvssV3" : {
  60844. "version" : "3.1",
  60845. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  60846. "attackVector" : "LOCAL",
  60847. "attackComplexity" : "LOW",
  60848. "privilegesRequired" : "NONE",
  60849. "userInteraction" : "REQUIRED",
  60850. "scope" : "UNCHANGED",
  60851. "confidentialityImpact" : "NONE",
  60852. "integrityImpact" : "NONE",
  60853. "availabilityImpact" : "HIGH",
  60854. "baseScore" : 5.5,
  60855. "baseSeverity" : "MEDIUM"
  60856. },
  60857. "exploitabilityScore" : 1.8,
  60858. "impactScore" : 3.6
  60859. },
  60860. "baseMetricV2" : {
  60861. "cvssV2" : {
  60862. "version" : "2.0",
  60863. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  60864. "accessVector" : "NETWORK",
  60865. "accessComplexity" : "MEDIUM",
  60866. "authentication" : "NONE",
  60867. "confidentialityImpact" : "NONE",
  60868. "integrityImpact" : "NONE",
  60869. "availabilityImpact" : "PARTIAL",
  60870. "baseScore" : 4.3
  60871. },
  60872. "severity" : "MEDIUM",
  60873. "exploitabilityScore" : 8.6,
  60874. "impactScore" : 2.9,
  60875. "acInsufInfo" : false,
  60876. "obtainAllPrivilege" : false,
  60877. "obtainUserPrivilege" : false,
  60878. "obtainOtherPrivilege" : false,
  60879. "userInteractionRequired" : true
  60880. }
  60881. },
  60882. "publishedDate" : "2021-04-19T19:15Z",
  60883. "lastModifiedDate" : "2021-05-04T03:15Z"
  60884. }, {
  60885. "cve" : {
  60886. "data_type" : "CVE",
  60887. "data_format" : "MITRE",
  60888. "data_version" : "4.0",
  60889. "CVE_data_meta" : {
  60890. "ID" : "CVE-2021-29457",
  60891. "ASSIGNER" : "security-advisories@github.com"
  60892. },
  60893. "problemtype" : {
  60894. "problemtype_data" : [ {
  60895. "description" : [ {
  60896. "lang" : "en",
  60897. "value" : "CWE-122"
  60898. } ]
  60899. } ]
  60900. },
  60901. "references" : {
  60902. "reference_data" : [ {
  60903. "url" : "https://github.com/Exiv2/exiv2/issues/1529",
  60904. "name" : "https://github.com/Exiv2/exiv2/issues/1529",
  60905. "refsource" : "MISC",
  60906. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  60907. }, {
  60908. "url" : "https://github.com/Exiv2/exiv2/pull/1534",
  60909. "name" : "https://github.com/Exiv2/exiv2/pull/1534",
  60910. "refsource" : "MISC",
  60911. "tags" : [ "Patch", "Third Party Advisory" ]
  60912. }, {
  60913. "url" : "https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm",
  60914. "name" : "https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm",
  60915. "refsource" : "CONFIRM",
  60916. "tags" : [ "Third Party Advisory" ]
  60917. }, {
  60918. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/",
  60919. "name" : "FEDORA-2021-10d7331a31",
  60920. "refsource" : "FEDORA",
  60921. "tags" : [ ]
  60922. } ]
  60923. },
  60924. "description" : {
  60925. "description_data" : [ {
  60926. "lang" : "en",
  60927. "value" : "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4."
  60928. } ]
  60929. }
  60930. },
  60931. "configurations" : {
  60932. "CVE_data_version" : "4.0",
  60933. "nodes" : [ {
  60934. "operator" : "OR",
  60935. "children" : [ ],
  60936. "cpe_match" : [ {
  60937. "vulnerable" : true,
  60938. "cpe23Uri" : "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
  60939. "versionEndExcluding" : "0.27.4",
  60940. "cpe_name" : [ ]
  60941. } ]
  60942. } ]
  60943. },
  60944. "impact" : {
  60945. "baseMetricV3" : {
  60946. "cvssV3" : {
  60947. "version" : "3.1",
  60948. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  60949. "attackVector" : "LOCAL",
  60950. "attackComplexity" : "LOW",
  60951. "privilegesRequired" : "NONE",
  60952. "userInteraction" : "REQUIRED",
  60953. "scope" : "UNCHANGED",
  60954. "confidentialityImpact" : "HIGH",
  60955. "integrityImpact" : "HIGH",
  60956. "availabilityImpact" : "HIGH",
  60957. "baseScore" : 7.8,
  60958. "baseSeverity" : "HIGH"
  60959. },
  60960. "exploitabilityScore" : 1.8,
  60961. "impactScore" : 5.9
  60962. },
  60963. "baseMetricV2" : {
  60964. "cvssV2" : {
  60965. "version" : "2.0",
  60966. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  60967. "accessVector" : "NETWORK",
  60968. "accessComplexity" : "MEDIUM",
  60969. "authentication" : "NONE",
  60970. "confidentialityImpact" : "PARTIAL",
  60971. "integrityImpact" : "PARTIAL",
  60972. "availabilityImpact" : "PARTIAL",
  60973. "baseScore" : 6.8
  60974. },
  60975. "severity" : "MEDIUM",
  60976. "exploitabilityScore" : 8.6,
  60977. "impactScore" : 6.4,
  60978. "acInsufInfo" : false,
  60979. "obtainAllPrivilege" : false,
  60980. "obtainUserPrivilege" : false,
  60981. "obtainOtherPrivilege" : false,
  60982. "userInteractionRequired" : true
  60983. }
  60984. },
  60985. "publishedDate" : "2021-04-19T19:15Z",
  60986. "lastModifiedDate" : "2021-05-04T03:15Z"
  60987. }, {
  60988. "cve" : {
  60989. "data_type" : "CVE",
  60990. "data_format" : "MITRE",
  60991. "data_version" : "4.0",
  60992. "CVE_data_meta" : {
  60993. "ID" : "CVE-2021-3493",
  60994. "ASSIGNER" : "security@ubuntu.com"
  60995. },
  60996. "problemtype" : {
  60997. "problemtype_data" : [ {
  60998. "description" : [ {
  60999. "lang" : "en",
  61000. "value" : "CWE-269"
  61001. } ]
  61002. } ]
  61003. },
  61004. "references" : {
  61005. "reference_data" : [ {
  61006. "url" : "https://www.openwall.com/lists/oss-security/2021/04/16/1",
  61007. "name" : "https://www.openwall.com/lists/oss-security/2021/04/16/1",
  61008. "refsource" : "MISC",
  61009. "tags" : [ "Mailing List", "Third Party Advisory" ]
  61010. }, {
  61011. "url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52",
  61012. "name" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52",
  61013. "refsource" : "MISC",
  61014. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  61015. }, {
  61016. "url" : "https://ubuntu.com/security/notices/USN-4917-1",
  61017. "name" : "https://ubuntu.com/security/notices/USN-4917-1",
  61018. "refsource" : "MISC",
  61019. "tags" : [ "Vendor Advisory" ]
  61020. }, {
  61021. "url" : "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html",
  61022. "name" : "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html",
  61023. "refsource" : "MISC",
  61024. "tags" : [ ]
  61025. } ]
  61026. },
  61027. "description" : {
  61028. "description_data" : [ {
  61029. "lang" : "en",
  61030. "value" : "The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges."
  61031. } ]
  61032. }
  61033. },
  61034. "configurations" : {
  61035. "CVE_data_version" : "4.0",
  61036. "nodes" : [ {
  61037. "operator" : "OR",
  61038. "children" : [ ],
  61039. "cpe_match" : [ {
  61040. "vulnerable" : true,
  61041. "cpe23Uri" : "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*",
  61042. "versionEndExcluding" : "18.04",
  61043. "cpe_name" : [ ]
  61044. }, {
  61045. "vulnerable" : true,
  61046. "cpe23Uri" : "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:lts:*:*:*",
  61047. "versionStartIncluding" : "18.04.1",
  61048. "versionEndExcluding" : "20.04",
  61049. "cpe_name" : [ ]
  61050. } ]
  61051. }, {
  61052. "operator" : "OR",
  61053. "children" : [ ],
  61054. "cpe_match" : [ {
  61055. "vulnerable" : true,
  61056. "cpe23Uri" : "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:-:*:*:*",
  61057. "versionEndExcluding" : "20.10",
  61058. "cpe_name" : [ ]
  61059. } ]
  61060. } ]
  61061. },
  61062. "impact" : {
  61063. "baseMetricV3" : {
  61064. "cvssV3" : {
  61065. "version" : "3.1",
  61066. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  61067. "attackVector" : "LOCAL",
  61068. "attackComplexity" : "LOW",
  61069. "privilegesRequired" : "LOW",
  61070. "userInteraction" : "NONE",
  61071. "scope" : "UNCHANGED",
  61072. "confidentialityImpact" : "HIGH",
  61073. "integrityImpact" : "HIGH",
  61074. "availabilityImpact" : "HIGH",
  61075. "baseScore" : 7.8,
  61076. "baseSeverity" : "HIGH"
  61077. },
  61078. "exploitabilityScore" : 1.8,
  61079. "impactScore" : 5.9
  61080. },
  61081. "baseMetricV2" : {
  61082. "cvssV2" : {
  61083. "version" : "2.0",
  61084. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  61085. "accessVector" : "LOCAL",
  61086. "accessComplexity" : "LOW",
  61087. "authentication" : "NONE",
  61088. "confidentialityImpact" : "COMPLETE",
  61089. "integrityImpact" : "COMPLETE",
  61090. "availabilityImpact" : "COMPLETE",
  61091. "baseScore" : 7.2
  61092. },
  61093. "severity" : "HIGH",
  61094. "exploitabilityScore" : 3.9,
  61095. "impactScore" : 10.0,
  61096. "acInsufInfo" : false,
  61097. "obtainAllPrivilege" : false,
  61098. "obtainUserPrivilege" : false,
  61099. "obtainOtherPrivilege" : false,
  61100. "userInteractionRequired" : false
  61101. }
  61102. },
  61103. "publishedDate" : "2021-04-17T05:15Z",
  61104. "lastModifiedDate" : "2021-05-03T23:15Z"
  61105. }, {
  61106. "cve" : {
  61107. "data_type" : "CVE",
  61108. "data_format" : "MITRE",
  61109. "data_version" : "4.0",
  61110. "CVE_data_meta" : {
  61111. "ID" : "CVE-2021-28055",
  61112. "ASSIGNER" : "cve@mitre.org"
  61113. },
  61114. "problemtype" : {
  61115. "problemtype_data" : [ {
  61116. "description" : [ {
  61117. "lang" : "en",
  61118. "value" : "CWE-352"
  61119. } ]
  61120. } ]
  61121. },
  61122. "references" : {
  61123. "reference_data" : [ {
  61124. "url" : "https://github.com/centreon/centreon/pull/9612",
  61125. "name" : "https://github.com/centreon/centreon/pull/9612",
  61126. "refsource" : "MISC",
  61127. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  61128. } ]
  61129. },
  61130. "description" : {
  61131. "description_data" : [ {
  61132. "lang" : "en",
  61133. "value" : "An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user."
  61134. } ]
  61135. }
  61136. },
  61137. "configurations" : {
  61138. "CVE_data_version" : "4.0",
  61139. "nodes" : [ {
  61140. "operator" : "OR",
  61141. "children" : [ ],
  61142. "cpe_match" : [ {
  61143. "vulnerable" : true,
  61144. "cpe23Uri" : "cpe:2.3:a:centreon:centreon:20.10.0:*:*:*:*:*:*:*",
  61145. "cpe_name" : [ ]
  61146. } ]
  61147. } ]
  61148. },
  61149. "impact" : {
  61150. "baseMetricV3" : {
  61151. "cvssV3" : {
  61152. "version" : "3.1",
  61153. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
  61154. "attackVector" : "NETWORK",
  61155. "attackComplexity" : "LOW",
  61156. "privilegesRequired" : "NONE",
  61157. "userInteraction" : "REQUIRED",
  61158. "scope" : "UNCHANGED",
  61159. "confidentialityImpact" : "NONE",
  61160. "integrityImpact" : "HIGH",
  61161. "availabilityImpact" : "NONE",
  61162. "baseScore" : 6.5,
  61163. "baseSeverity" : "MEDIUM"
  61164. },
  61165. "exploitabilityScore" : 2.8,
  61166. "impactScore" : 3.6
  61167. },
  61168. "baseMetricV2" : {
  61169. "cvssV2" : {
  61170. "version" : "2.0",
  61171. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  61172. "accessVector" : "NETWORK",
  61173. "accessComplexity" : "MEDIUM",
  61174. "authentication" : "NONE",
  61175. "confidentialityImpact" : "NONE",
  61176. "integrityImpact" : "PARTIAL",
  61177. "availabilityImpact" : "NONE",
  61178. "baseScore" : 4.3
  61179. },
  61180. "severity" : "MEDIUM",
  61181. "exploitabilityScore" : 8.6,
  61182. "impactScore" : 2.9,
  61183. "acInsufInfo" : false,
  61184. "obtainAllPrivilege" : false,
  61185. "obtainUserPrivilege" : false,
  61186. "obtainOtherPrivilege" : false,
  61187. "userInteractionRequired" : true
  61188. }
  61189. },
  61190. "publishedDate" : "2021-04-15T19:15Z",
  61191. "lastModifiedDate" : "2021-05-05T18:59Z"
  61192. }, {
  61193. "cve" : {
  61194. "data_type" : "CVE",
  61195. "data_format" : "MITRE",
  61196. "data_version" : "4.0",
  61197. "CVE_data_meta" : {
  61198. "ID" : "CVE-2021-20288",
  61199. "ASSIGNER" : "secalert@redhat.com"
  61200. },
  61201. "problemtype" : {
  61202. "problemtype_data" : [ {
  61203. "description" : [ {
  61204. "lang" : "en",
  61205. "value" : "CWE-287"
  61206. } ]
  61207. } ]
  61208. },
  61209. "references" : {
  61210. "reference_data" : [ {
  61211. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1938031",
  61212. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1938031",
  61213. "refsource" : "MISC",
  61214. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  61215. }, {
  61216. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/362CEPPYF3YMJZBEJQUT3KDE2EHYYIYQ/",
  61217. "name" : "FEDORA-2021-e29c1ee892",
  61218. "refsource" : "FEDORA",
  61219. "tags" : [ "Mailing List", "Third Party Advisory" ]
  61220. }, {
  61221. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5BPIAYTRCWAU4XWCDBK2THEFVXSC4XGK/",
  61222. "name" : "FEDORA-2021-e65b9fb52e",
  61223. "refsource" : "FEDORA",
  61224. "tags" : [ "Mailing List", "Third Party Advisory" ]
  61225. } ]
  61226. },
  61227. "description" : {
  61228. "description_data" : [ {
  61229. "lang" : "en",
  61230. "value" : "An authentication flaw was found in ceph in versions before 14.2.20. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys, allowing key reuse. An attacker who can request a global_id can exploit the ability of any user to request a global_id previously associated with another user, as ceph does not force the reuse of old keys to generate new ones. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
  61231. } ]
  61232. }
  61233. },
  61234. "configurations" : {
  61235. "CVE_data_version" : "4.0",
  61236. "nodes" : [ {
  61237. "operator" : "OR",
  61238. "children" : [ ],
  61239. "cpe_match" : [ {
  61240. "vulnerable" : true,
  61241. "cpe23Uri" : "cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*",
  61242. "versionEndExcluding" : "14.2.20",
  61243. "cpe_name" : [ ]
  61244. } ]
  61245. }, {
  61246. "operator" : "OR",
  61247. "children" : [ ],
  61248. "cpe_match" : [ {
  61249. "vulnerable" : true,
  61250. "cpe23Uri" : "cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*",
  61251. "cpe_name" : [ ]
  61252. } ]
  61253. }, {
  61254. "operator" : "OR",
  61255. "children" : [ ],
  61256. "cpe_match" : [ {
  61257. "vulnerable" : true,
  61258. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  61259. "cpe_name" : [ ]
  61260. }, {
  61261. "vulnerable" : true,
  61262. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  61263. "cpe_name" : [ ]
  61264. } ]
  61265. } ]
  61266. },
  61267. "impact" : {
  61268. "baseMetricV3" : {
  61269. "cvssV3" : {
  61270. "version" : "3.1",
  61271. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  61272. "attackVector" : "NETWORK",
  61273. "attackComplexity" : "LOW",
  61274. "privilegesRequired" : "HIGH",
  61275. "userInteraction" : "NONE",
  61276. "scope" : "UNCHANGED",
  61277. "confidentialityImpact" : "HIGH",
  61278. "integrityImpact" : "HIGH",
  61279. "availabilityImpact" : "HIGH",
  61280. "baseScore" : 7.2,
  61281. "baseSeverity" : "HIGH"
  61282. },
  61283. "exploitabilityScore" : 1.2,
  61284. "impactScore" : 5.9
  61285. },
  61286. "baseMetricV2" : {
  61287. "cvssV2" : {
  61288. "version" : "2.0",
  61289. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  61290. "accessVector" : "NETWORK",
  61291. "accessComplexity" : "LOW",
  61292. "authentication" : "SINGLE",
  61293. "confidentialityImpact" : "PARTIAL",
  61294. "integrityImpact" : "PARTIAL",
  61295. "availabilityImpact" : "PARTIAL",
  61296. "baseScore" : 6.5
  61297. },
  61298. "severity" : "MEDIUM",
  61299. "exploitabilityScore" : 8.0,
  61300. "impactScore" : 6.4,
  61301. "acInsufInfo" : false,
  61302. "obtainAllPrivilege" : false,
  61303. "obtainUserPrivilege" : false,
  61304. "obtainOtherPrivilege" : false,
  61305. "userInteractionRequired" : false
  61306. }
  61307. },
  61308. "publishedDate" : "2021-04-15T15:15Z",
  61309. "lastModifiedDate" : "2021-05-04T19:21Z"
  61310. }, {
  61311. "cve" : {
  61312. "data_type" : "CVE",
  61313. "data_format" : "MITRE",
  61314. "data_version" : "4.0",
  61315. "CVE_data_meta" : {
  61316. "ID" : "CVE-2021-3487",
  61317. "ASSIGNER" : "secalert@redhat.com"
  61318. },
  61319. "problemtype" : {
  61320. "problemtype_data" : [ {
  61321. "description" : [ {
  61322. "lang" : "en",
  61323. "value" : "CWE-20"
  61324. }, {
  61325. "lang" : "en",
  61326. "value" : "CWE-400"
  61327. } ]
  61328. } ]
  61329. },
  61330. "references" : {
  61331. "reference_data" : [ {
  61332. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1947111",
  61333. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1947111",
  61334. "refsource" : "MISC",
  61335. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  61336. }, {
  61337. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/",
  61338. "name" : "FEDORA-2021-d23d016509",
  61339. "refsource" : "FEDORA",
  61340. "tags" : [ "Third Party Advisory" ]
  61341. }, {
  61342. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/",
  61343. "name" : "FEDORA-2021-9bd201dd4d",
  61344. "refsource" : "FEDORA",
  61345. "tags" : [ "Third Party Advisory" ]
  61346. }, {
  61347. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/",
  61348. "name" : "FEDORA-2021-7ca24ddc86",
  61349. "refsource" : "FEDORA",
  61350. "tags" : [ "Third Party Advisory" ]
  61351. } ]
  61352. },
  61353. "description" : {
  61354. "description_data" : [ {
  61355. "lang" : "en",
  61356. "value" : "There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption."
  61357. } ]
  61358. }
  61359. },
  61360. "configurations" : {
  61361. "CVE_data_version" : "4.0",
  61362. "nodes" : [ {
  61363. "operator" : "OR",
  61364. "children" : [ ],
  61365. "cpe_match" : [ {
  61366. "vulnerable" : true,
  61367. "cpe23Uri" : "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
  61368. "versionEndExcluding" : "2.36",
  61369. "cpe_name" : [ ]
  61370. } ]
  61371. }, {
  61372. "operator" : "OR",
  61373. "children" : [ ],
  61374. "cpe_match" : [ {
  61375. "vulnerable" : true,
  61376. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
  61377. "cpe_name" : [ ]
  61378. }, {
  61379. "vulnerable" : true,
  61380. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
  61381. "cpe_name" : [ ]
  61382. }, {
  61383. "vulnerable" : true,
  61384. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
  61385. "cpe_name" : [ ]
  61386. } ]
  61387. }, {
  61388. "operator" : "OR",
  61389. "children" : [ ],
  61390. "cpe_match" : [ {
  61391. "vulnerable" : true,
  61392. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  61393. "cpe_name" : [ ]
  61394. }, {
  61395. "vulnerable" : true,
  61396. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  61397. "cpe_name" : [ ]
  61398. }, {
  61399. "vulnerable" : true,
  61400. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  61401. "cpe_name" : [ ]
  61402. } ]
  61403. } ]
  61404. },
  61405. "impact" : {
  61406. "baseMetricV3" : {
  61407. "cvssV3" : {
  61408. "version" : "3.1",
  61409. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  61410. "attackVector" : "NETWORK",
  61411. "attackComplexity" : "LOW",
  61412. "privilegesRequired" : "NONE",
  61413. "userInteraction" : "REQUIRED",
  61414. "scope" : "UNCHANGED",
  61415. "confidentialityImpact" : "NONE",
  61416. "integrityImpact" : "NONE",
  61417. "availabilityImpact" : "HIGH",
  61418. "baseScore" : 6.5,
  61419. "baseSeverity" : "MEDIUM"
  61420. },
  61421. "exploitabilityScore" : 2.8,
  61422. "impactScore" : 3.6
  61423. },
  61424. "baseMetricV2" : {
  61425. "cvssV2" : {
  61426. "version" : "2.0",
  61427. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:C",
  61428. "accessVector" : "NETWORK",
  61429. "accessComplexity" : "MEDIUM",
  61430. "authentication" : "NONE",
  61431. "confidentialityImpact" : "NONE",
  61432. "integrityImpact" : "NONE",
  61433. "availabilityImpact" : "COMPLETE",
  61434. "baseScore" : 7.1
  61435. },
  61436. "severity" : "HIGH",
  61437. "exploitabilityScore" : 8.6,
  61438. "impactScore" : 6.9,
  61439. "acInsufInfo" : false,
  61440. "obtainAllPrivilege" : false,
  61441. "obtainUserPrivilege" : false,
  61442. "obtainOtherPrivilege" : false,
  61443. "userInteractionRequired" : true
  61444. }
  61445. },
  61446. "publishedDate" : "2021-04-15T14:15Z",
  61447. "lastModifiedDate" : "2021-05-04T12:55Z"
  61448. }, {
  61449. "cve" : {
  61450. "data_type" : "CVE",
  61451. "data_format" : "MITRE",
  61452. "data_version" : "4.0",
  61453. "CVE_data_meta" : {
  61454. "ID" : "CVE-2021-28242",
  61455. "ASSIGNER" : "cve@mitre.org"
  61456. },
  61457. "problemtype" : {
  61458. "problemtype_data" : [ {
  61459. "description" : [ {
  61460. "lang" : "en",
  61461. "value" : "CWE-77"
  61462. } ]
  61463. } ]
  61464. },
  61465. "references" : {
  61466. "reference_data" : [ {
  61467. "url" : "https://github.com/b2evolution/b2evolution/issues/109",
  61468. "name" : "https://github.com/b2evolution/b2evolution/issues/109",
  61469. "refsource" : "MISC",
  61470. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  61471. }, {
  61472. "url" : "https://deadsh0t.medium.com/authenticated-boolean-based-blind-error-based-sql-injection-b752225f0644",
  61473. "name" : "https://deadsh0t.medium.com/authenticated-boolean-based-blind-error-based-sql-injection-b752225f0644",
  61474. "refsource" : "MISC",
  61475. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  61476. }, {
  61477. "url" : "http://packetstormsecurity.com/files/162489/b2evolution-7-2-2-SQL-Injection.html",
  61478. "name" : "http://packetstormsecurity.com/files/162489/b2evolution-7-2-2-SQL-Injection.html",
  61479. "refsource" : "MISC",
  61480. "tags" : [ ]
  61481. } ]
  61482. },
  61483. "description" : {
  61484. "description_data" : [ {
  61485. "lang" : "en",
  61486. "value" : "SQL Injection in the \"evoadm.php\" component of b2evolution v7.2.2-stable allows remote attackers to obtain sensitive database information by injecting SQL commands into the \"cf_name\" parameter when creating a new filter under the \"Collections\" tab."
  61487. } ]
  61488. }
  61489. },
  61490. "configurations" : {
  61491. "CVE_data_version" : "4.0",
  61492. "nodes" : [ {
  61493. "operator" : "OR",
  61494. "children" : [ ],
  61495. "cpe_match" : [ {
  61496. "vulnerable" : true,
  61497. "cpe23Uri" : "cpe:2.3:a:b2evolution:b2evolution:7.2.2:*:*:*:*:*:*:*",
  61498. "cpe_name" : [ ]
  61499. } ]
  61500. } ]
  61501. },
  61502. "impact" : {
  61503. "baseMetricV3" : {
  61504. "cvssV3" : {
  61505. "version" : "3.1",
  61506. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  61507. "attackVector" : "NETWORK",
  61508. "attackComplexity" : "LOW",
  61509. "privilegesRequired" : "LOW",
  61510. "userInteraction" : "NONE",
  61511. "scope" : "UNCHANGED",
  61512. "confidentialityImpact" : "HIGH",
  61513. "integrityImpact" : "HIGH",
  61514. "availabilityImpact" : "HIGH",
  61515. "baseScore" : 8.8,
  61516. "baseSeverity" : "HIGH"
  61517. },
  61518. "exploitabilityScore" : 2.8,
  61519. "impactScore" : 5.9
  61520. },
  61521. "baseMetricV2" : {
  61522. "cvssV2" : {
  61523. "version" : "2.0",
  61524. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  61525. "accessVector" : "NETWORK",
  61526. "accessComplexity" : "LOW",
  61527. "authentication" : "SINGLE",
  61528. "confidentialityImpact" : "PARTIAL",
  61529. "integrityImpact" : "PARTIAL",
  61530. "availabilityImpact" : "PARTIAL",
  61531. "baseScore" : 6.5
  61532. },
  61533. "severity" : "MEDIUM",
  61534. "exploitabilityScore" : 8.0,
  61535. "impactScore" : 6.4,
  61536. "acInsufInfo" : false,
  61537. "obtainAllPrivilege" : false,
  61538. "obtainUserPrivilege" : false,
  61539. "obtainOtherPrivilege" : false,
  61540. "userInteractionRequired" : false
  61541. }
  61542. },
  61543. "publishedDate" : "2021-04-15T14:15Z",
  61544. "lastModifiedDate" : "2021-05-06T17:15Z"
  61545. }, {
  61546. "cve" : {
  61547. "data_type" : "CVE",
  61548. "data_format" : "MITRE",
  61549. "data_version" : "4.0",
  61550. "CVE_data_meta" : {
  61551. "ID" : "CVE-2021-25314",
  61552. "ASSIGNER" : "security@suse.com"
  61553. },
  61554. "problemtype" : {
  61555. "problemtype_data" : [ {
  61556. "description" : [ {
  61557. "lang" : "en",
  61558. "value" : "CWE-378"
  61559. } ]
  61560. } ]
  61561. },
  61562. "references" : {
  61563. "reference_data" : [ {
  61564. "url" : "https://bugzilla.suse.com/show_bug.cgi?id=1182166",
  61565. "name" : "https://bugzilla.suse.com/show_bug.cgi?id=1182166",
  61566. "refsource" : "CONFIRM",
  61567. "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
  61568. } ]
  61569. },
  61570. "description" : {
  61571. "description_data" : [ {
  61572. "lang" : "en",
  61573. "value" : "A Creation of Temporary File With Insecure Permissions vulnerability in hawk2 of SUSE Linux Enterprise High Availability 12-SP3, SUSE Linux Enterprise High Availability 12-SP5, SUSE Linux Enterprise High Availability 15-SP2 allows local attackers to escalate to root. This issue affects: SUSE Linux Enterprise High Availability 12-SP3 hawk2 versions prior to 2.6.3+git.1614685906.812c31e9. SUSE Linux Enterprise High Availability 12-SP5 hawk2 versions prior to 2.6.3+git.1614685906.812c31e9. SUSE Linux Enterprise High Availability 15-SP2 hawk2 versions prior to 2.6.3+git.1614684118.af555ad9."
  61574. } ]
  61575. }
  61576. },
  61577. "configurations" : {
  61578. "CVE_data_version" : "4.0",
  61579. "nodes" : [ {
  61580. "operator" : "AND",
  61581. "children" : [ {
  61582. "operator" : "OR",
  61583. "children" : [ ],
  61584. "cpe_match" : [ {
  61585. "vulnerable" : true,
  61586. "cpe23Uri" : "cpe:2.3:a:suse:hawk2:*:*:*:*:*:*:*:*",
  61587. "versionEndExcluding" : "2.6.3\\+git.1614685906.812c31e9-2.42.1",
  61588. "cpe_name" : [ ]
  61589. } ]
  61590. }, {
  61591. "operator" : "OR",
  61592. "children" : [ ],
  61593. "cpe_match" : [ {
  61594. "vulnerable" : false,
  61595. "cpe23Uri" : "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:12:sp3:*:*:*:*:*:*",
  61596. "cpe_name" : [ ]
  61597. } ]
  61598. } ],
  61599. "cpe_match" : [ ]
  61600. }, {
  61601. "operator" : "AND",
  61602. "children" : [ {
  61603. "operator" : "OR",
  61604. "children" : [ ],
  61605. "cpe_match" : [ {
  61606. "vulnerable" : true,
  61607. "cpe23Uri" : "cpe:2.3:a:suse:hawk2:*:*:*:*:*:*:*:*",
  61608. "versionEndExcluding" : "2.6.3\\+git.1614684118.af555ad9",
  61609. "cpe_name" : [ ]
  61610. } ]
  61611. }, {
  61612. "operator" : "OR",
  61613. "children" : [ ],
  61614. "cpe_match" : [ {
  61615. "vulnerable" : false,
  61616. "cpe23Uri" : "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp2:*:*:*:*:*:*",
  61617. "cpe_name" : [ ]
  61618. } ]
  61619. } ],
  61620. "cpe_match" : [ ]
  61621. }, {
  61622. "operator" : "AND",
  61623. "children" : [ {
  61624. "operator" : "OR",
  61625. "children" : [ ],
  61626. "cpe_match" : [ {
  61627. "vulnerable" : true,
  61628. "cpe23Uri" : "cpe:2.3:a:suse:hawk2:*:*:*:*:*:*:*:*",
  61629. "versionEndExcluding" : "2.6.3\\+git.1614685906.812c31e9",
  61630. "cpe_name" : [ ]
  61631. } ]
  61632. }, {
  61633. "operator" : "OR",
  61634. "children" : [ ],
  61635. "cpe_match" : [ {
  61636. "vulnerable" : false,
  61637. "cpe23Uri" : "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:12:sp5:*:*:*:*:*:*",
  61638. "cpe_name" : [ ]
  61639. } ]
  61640. } ],
  61641. "cpe_match" : [ ]
  61642. } ]
  61643. },
  61644. "impact" : {
  61645. "baseMetricV3" : {
  61646. "cvssV3" : {
  61647. "version" : "3.1",
  61648. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  61649. "attackVector" : "LOCAL",
  61650. "attackComplexity" : "LOW",
  61651. "privilegesRequired" : "LOW",
  61652. "userInteraction" : "NONE",
  61653. "scope" : "UNCHANGED",
  61654. "confidentialityImpact" : "HIGH",
  61655. "integrityImpact" : "HIGH",
  61656. "availabilityImpact" : "HIGH",
  61657. "baseScore" : 7.8,
  61658. "baseSeverity" : "HIGH"
  61659. },
  61660. "exploitabilityScore" : 1.8,
  61661. "impactScore" : 5.9
  61662. },
  61663. "baseMetricV2" : {
  61664. "cvssV2" : {
  61665. "version" : "2.0",
  61666. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  61667. "accessVector" : "LOCAL",
  61668. "accessComplexity" : "LOW",
  61669. "authentication" : "NONE",
  61670. "confidentialityImpact" : "COMPLETE",
  61671. "integrityImpact" : "COMPLETE",
  61672. "availabilityImpact" : "COMPLETE",
  61673. "baseScore" : 7.2
  61674. },
  61675. "severity" : "HIGH",
  61676. "exploitabilityScore" : 3.9,
  61677. "impactScore" : 10.0,
  61678. "acInsufInfo" : false,
  61679. "obtainAllPrivilege" : false,
  61680. "obtainUserPrivilege" : false,
  61681. "obtainOtherPrivilege" : false,
  61682. "userInteractionRequired" : false
  61683. }
  61684. },
  61685. "publishedDate" : "2021-04-14T15:15Z",
  61686. "lastModifiedDate" : "2021-05-10T14:29Z"
  61687. }, {
  61688. "cve" : {
  61689. "data_type" : "CVE",
  61690. "data_format" : "MITRE",
  61691. "data_version" : "4.0",
  61692. "CVE_data_meta" : {
  61693. "ID" : "CVE-2021-29427",
  61694. "ASSIGNER" : "security-advisories@github.com"
  61695. },
  61696. "problemtype" : {
  61697. "problemtype_data" : [ {
  61698. "description" : [ {
  61699. "lang" : "en",
  61700. "value" : "CWE-829"
  61701. } ]
  61702. } ]
  61703. },
  61704. "references" : {
  61705. "reference_data" : [ {
  61706. "url" : "https://docs.gradle.org/7.0/release-notes.html#security-advisories",
  61707. "name" : "https://docs.gradle.org/7.0/release-notes.html#security-advisories",
  61708. "refsource" : "MISC",
  61709. "tags" : [ "Release Notes", "Vendor Advisory" ]
  61710. }, {
  61711. "url" : "https://github.com/gradle/gradle/security/advisories/GHSA-jvmj-rh6q-x395",
  61712. "name" : "https://github.com/gradle/gradle/security/advisories/GHSA-jvmj-rh6q-x395",
  61713. "refsource" : "CONFIRM",
  61714. "tags" : [ "Exploit", "Vendor Advisory" ]
  61715. } ]
  61716. },
  61717. "description" : {
  61718. "description_data" : [ {
  61719. "lang" : "en",
  61720. "value" : "In Gradle from version 5.1 and before version 7.0 there is a vulnerability which can lead to information disclosure and/or dependency poisoning. Repository content filtering is a security control Gradle introduced to help users specify what repositories are used to resolve specific dependencies. This feature was introduced in the wake of the \"A Confusing Dependency\" blog post. In some cases, Gradle may ignore content filters and search all repositories for dependencies. This only occurs when repository content filtering is used from within a `pluginManagement` block in a settings file. This may change how dependencies are resolved for Gradle plugins and build scripts. For builds that are vulnerable, there are two risks: 1) Information disclosure: Gradle could make dependency requests to repositories outside your organization and leak internal package identifiers. 2) Dependency poisoning/Dependency confusion: Gradle could download a malicious binary from a repository outside your organization due to name squatting. For a full example and more details refer to the referenced GitHub Security Advisory. The problem has been patched and released with Gradle 7.0. Users relying on this feature should upgrade their build as soon as possible. As a workaround, users may use a company repository which has the right rules for fetching packages from public repositories, or use project level repository content filtering, inside `buildscript.repositories`. This option is available since Gradle 5.1 when the feature was introduced."
  61721. } ]
  61722. }
  61723. },
  61724. "configurations" : {
  61725. "CVE_data_version" : "4.0",
  61726. "nodes" : [ {
  61727. "operator" : "OR",
  61728. "children" : [ ],
  61729. "cpe_match" : [ {
  61730. "vulnerable" : true,
  61731. "cpe23Uri" : "cpe:2.3:a:gradle:gradle:*:*:*:*:*:*:*:*",
  61732. "versionStartIncluding" : "5.1",
  61733. "versionEndExcluding" : "7.0",
  61734. "cpe_name" : [ ]
  61735. } ]
  61736. } ]
  61737. },
  61738. "impact" : {
  61739. "baseMetricV3" : {
  61740. "cvssV3" : {
  61741. "version" : "3.1",
  61742. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  61743. "attackVector" : "NETWORK",
  61744. "attackComplexity" : "LOW",
  61745. "privilegesRequired" : "HIGH",
  61746. "userInteraction" : "NONE",
  61747. "scope" : "UNCHANGED",
  61748. "confidentialityImpact" : "HIGH",
  61749. "integrityImpact" : "HIGH",
  61750. "availabilityImpact" : "HIGH",
  61751. "baseScore" : 7.2,
  61752. "baseSeverity" : "HIGH"
  61753. },
  61754. "exploitabilityScore" : 1.2,
  61755. "impactScore" : 5.9
  61756. },
  61757. "baseMetricV2" : {
  61758. "cvssV2" : {
  61759. "version" : "2.0",
  61760. "vectorString" : "AV:N/AC:M/Au:S/C:P/I:P/A:P",
  61761. "accessVector" : "NETWORK",
  61762. "accessComplexity" : "MEDIUM",
  61763. "authentication" : "SINGLE",
  61764. "confidentialityImpact" : "PARTIAL",
  61765. "integrityImpact" : "PARTIAL",
  61766. "availabilityImpact" : "PARTIAL",
  61767. "baseScore" : 6.0
  61768. },
  61769. "severity" : "MEDIUM",
  61770. "exploitabilityScore" : 6.8,
  61771. "impactScore" : 6.4,
  61772. "acInsufInfo" : false,
  61773. "obtainAllPrivilege" : false,
  61774. "obtainUserPrivilege" : false,
  61775. "obtainOtherPrivilege" : false,
  61776. "userInteractionRequired" : false
  61777. }
  61778. },
  61779. "publishedDate" : "2021-04-13T20:15Z",
  61780. "lastModifiedDate" : "2021-05-05T18:41Z"
  61781. }, {
  61782. "cve" : {
  61783. "data_type" : "CVE",
  61784. "data_format" : "MITRE",
  61785. "data_version" : "4.0",
  61786. "CVE_data_meta" : {
  61787. "ID" : "CVE-2021-0430",
  61788. "ASSIGNER" : "security@android.com"
  61789. },
  61790. "problemtype" : {
  61791. "problemtype_data" : [ {
  61792. "description" : [ {
  61793. "lang" : "en",
  61794. "value" : "CWE-787"
  61795. } ]
  61796. } ]
  61797. },
  61798. "references" : {
  61799. "reference_data" : [ {
  61800. "url" : "https://source.android.com/security/bulletin/2021-04-01",
  61801. "name" : "https://source.android.com/security/bulletin/2021-04-01",
  61802. "refsource" : "MISC",
  61803. "tags" : [ "Patch", "Vendor Advisory" ]
  61804. }, {
  61805. "url" : "http://packetstormsecurity.com/files/162380/Android-NFC-Stack-Out-Of-Bounds-Write.html",
  61806. "name" : "http://packetstormsecurity.com/files/162380/Android-NFC-Stack-Out-Of-Bounds-Write.html",
  61807. "refsource" : "MISC",
  61808. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  61809. } ]
  61810. },
  61811. "description" : {
  61812. "description_data" : [ {
  61813. "lang" : "en",
  61814. "value" : "In rw_mfc_handle_read_op of rw_mfc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution via a malicious NFC packet with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-178725766"
  61815. } ]
  61816. }
  61817. },
  61818. "configurations" : {
  61819. "CVE_data_version" : "4.0",
  61820. "nodes" : [ {
  61821. "operator" : "OR",
  61822. "children" : [ ],
  61823. "cpe_match" : [ {
  61824. "vulnerable" : true,
  61825. "cpe23Uri" : "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
  61826. "cpe_name" : [ ]
  61827. }, {
  61828. "vulnerable" : true,
  61829. "cpe23Uri" : "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
  61830. "cpe_name" : [ ]
  61831. } ]
  61832. } ]
  61833. },
  61834. "impact" : {
  61835. "baseMetricV3" : {
  61836. "cvssV3" : {
  61837. "version" : "3.1",
  61838. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  61839. "attackVector" : "NETWORK",
  61840. "attackComplexity" : "LOW",
  61841. "privilegesRequired" : "NONE",
  61842. "userInteraction" : "NONE",
  61843. "scope" : "UNCHANGED",
  61844. "confidentialityImpact" : "HIGH",
  61845. "integrityImpact" : "HIGH",
  61846. "availabilityImpact" : "HIGH",
  61847. "baseScore" : 9.8,
  61848. "baseSeverity" : "CRITICAL"
  61849. },
  61850. "exploitabilityScore" : 3.9,
  61851. "impactScore" : 5.9
  61852. },
  61853. "baseMetricV2" : {
  61854. "cvssV2" : {
  61855. "version" : "2.0",
  61856. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  61857. "accessVector" : "NETWORK",
  61858. "accessComplexity" : "LOW",
  61859. "authentication" : "NONE",
  61860. "confidentialityImpact" : "COMPLETE",
  61861. "integrityImpact" : "COMPLETE",
  61862. "availabilityImpact" : "COMPLETE",
  61863. "baseScore" : 10.0
  61864. },
  61865. "severity" : "HIGH",
  61866. "exploitabilityScore" : 10.0,
  61867. "impactScore" : 10.0,
  61868. "acInsufInfo" : false,
  61869. "obtainAllPrivilege" : false,
  61870. "obtainUserPrivilege" : false,
  61871. "obtainOtherPrivilege" : false,
  61872. "userInteractionRequired" : false
  61873. }
  61874. },
  61875. "publishedDate" : "2021-04-13T19:15Z",
  61876. "lastModifiedDate" : "2021-05-04T19:19Z"
  61877. }, {
  61878. "cve" : {
  61879. "data_type" : "CVE",
  61880. "data_format" : "MITRE",
  61881. "data_version" : "4.0",
  61882. "CVE_data_meta" : {
  61883. "ID" : "CVE-2021-29997",
  61884. "ASSIGNER" : "cve@mitre.org"
  61885. },
  61886. "problemtype" : {
  61887. "problemtype_data" : [ {
  61888. "description" : [ {
  61889. "lang" : "en",
  61890. "value" : "CWE-125"
  61891. } ]
  61892. } ]
  61893. },
  61894. "references" : {
  61895. "reference_data" : [ {
  61896. "url" : "https://support2.windriver.com/index.php?page=security-notices",
  61897. "name" : "https://support2.windriver.com/index.php?page=security-notices",
  61898. "refsource" : "MISC",
  61899. "tags" : [ "Vendor Advisory" ]
  61900. }, {
  61901. "url" : "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2021-29997",
  61902. "name" : "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2021-29997",
  61903. "refsource" : "CONFIRM",
  61904. "tags" : [ "Vendor Advisory" ]
  61905. } ]
  61906. },
  61907. "description" : {
  61908. "description_data" : [ {
  61909. "lang" : "en",
  61910. "value" : "An issue was discovered in Wind River VxWorks 7 before 21.03. A specially crafted packet may lead to buffer over-read on IKE."
  61911. } ]
  61912. }
  61913. },
  61914. "configurations" : {
  61915. "CVE_data_version" : "4.0",
  61916. "nodes" : [ {
  61917. "operator" : "OR",
  61918. "children" : [ ],
  61919. "cpe_match" : [ {
  61920. "vulnerable" : true,
  61921. "cpe23Uri" : "cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*",
  61922. "versionEndExcluding" : "21.03",
  61923. "cpe_name" : [ ]
  61924. } ]
  61925. } ]
  61926. },
  61927. "impact" : {
  61928. "baseMetricV3" : {
  61929. "cvssV3" : {
  61930. "version" : "3.1",
  61931. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
  61932. "attackVector" : "NETWORK",
  61933. "attackComplexity" : "LOW",
  61934. "privilegesRequired" : "NONE",
  61935. "userInteraction" : "NONE",
  61936. "scope" : "UNCHANGED",
  61937. "confidentialityImpact" : "HIGH",
  61938. "integrityImpact" : "NONE",
  61939. "availabilityImpact" : "HIGH",
  61940. "baseScore" : 9.1,
  61941. "baseSeverity" : "CRITICAL"
  61942. },
  61943. "exploitabilityScore" : 3.9,
  61944. "impactScore" : 5.2
  61945. },
  61946. "baseMetricV2" : {
  61947. "cvssV2" : {
  61948. "version" : "2.0",
  61949. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:P",
  61950. "accessVector" : "NETWORK",
  61951. "accessComplexity" : "LOW",
  61952. "authentication" : "NONE",
  61953. "confidentialityImpact" : "PARTIAL",
  61954. "integrityImpact" : "NONE",
  61955. "availabilityImpact" : "PARTIAL",
  61956. "baseScore" : 6.4
  61957. },
  61958. "severity" : "MEDIUM",
  61959. "exploitabilityScore" : 10.0,
  61960. "impactScore" : 4.9,
  61961. "acInsufInfo" : false,
  61962. "obtainAllPrivilege" : false,
  61963. "obtainUserPrivilege" : false,
  61964. "obtainOtherPrivilege" : false,
  61965. "userInteractionRequired" : false
  61966. }
  61967. },
  61968. "publishedDate" : "2021-04-13T17:15Z",
  61969. "lastModifiedDate" : "2021-05-05T15:13Z"
  61970. }, {
  61971. "cve" : {
  61972. "data_type" : "CVE",
  61973. "data_format" : "MITRE",
  61974. "data_version" : "4.0",
  61975. "CVE_data_meta" : {
  61976. "ID" : "CVE-2021-29425",
  61977. "ASSIGNER" : "security@apache.org"
  61978. },
  61979. "problemtype" : {
  61980. "problemtype_data" : [ {
  61981. "description" : [ {
  61982. "lang" : "en",
  61983. "value" : "CWE-22"
  61984. } ]
  61985. } ]
  61986. },
  61987. "references" : {
  61988. "reference_data" : [ {
  61989. "url" : "https://issues.apache.org/jira/browse/IO-556",
  61990. "name" : "https://issues.apache.org/jira/browse/IO-556",
  61991. "refsource" : "MISC",
  61992. "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
  61993. }, {
  61994. "url" : "https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E",
  61995. "name" : "https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E",
  61996. "refsource" : "MISC",
  61997. "tags" : [ "Mailing List", "Vendor Advisory" ]
  61998. }, {
  61999. "url" : "https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E",
  62000. "name" : "[commons-dev] 20210414 Re: [all] OSS Fuzz",
  62001. "refsource" : "MLIST",
  62002. "tags" : [ "Mailing List", "Vendor Advisory" ]
  62003. }, {
  62004. "url" : "https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E",
  62005. "name" : "[commons-dev] 20210415 Re: [all] OSS Fuzz",
  62006. "refsource" : "MLIST",
  62007. "tags" : [ "Mailing List", "Vendor Advisory" ]
  62008. }, {
  62009. "url" : "https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E",
  62010. "name" : "[pulsar-commits] 20210420 [GitHub] [pulsar] lhotari opened a new pull request #10287: [Security] Upgrade commons-io to address CVE-2021-29425",
  62011. "refsource" : "MLIST",
  62012. "tags" : [ "Mailing List", "Vendor Advisory" ]
  62013. }, {
  62014. "url" : "https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E",
  62015. "name" : "[pulsar-commits] 20210420 [GitHub] [pulsar] merlimat merged pull request #10287: [Security] Upgrade commons-io to address CVE-2021-29425",
  62016. "refsource" : "MLIST",
  62017. "tags" : [ "Mailing List", "Vendor Advisory" ]
  62018. }, {
  62019. "url" : "https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E",
  62020. "name" : "[creadur-dev] 20210427 [jira] [Created] (RAT-281) Update commons-io to fix CVE-2021-29425 Moderate severity",
  62021. "refsource" : "MLIST",
  62022. "tags" : [ "Mailing List", "Vendor Advisory" ]
  62023. }, {
  62024. "url" : "https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E",
  62025. "name" : "[creadur-dev] 20210427 [jira] [Commented] (RAT-281) Update commons-io to fix CVE-2021-29425 Moderate severity",
  62026. "refsource" : "MLIST",
  62027. "tags" : [ "Mailing List", "Vendor Advisory" ]
  62028. }, {
  62029. "url" : "https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E",
  62030. "name" : "[creadur-dev] 20210427 [jira] [Closed] (RAT-281) Update commons-io to fix CVE-2021-29425 Moderate severity",
  62031. "refsource" : "MLIST",
  62032. "tags" : [ "Mailing List", "Vendor Advisory" ]
  62033. }, {
  62034. "url" : "https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E",
  62035. "name" : "[creadur-dev] 20210427 [jira] [Updated] (RAT-281) Update commons-io to fix CVE-2021-29425 Moderate severity",
  62036. "refsource" : "MLIST",
  62037. "tags" : [ "Mailing List", "Vendor Advisory" ]
  62038. }, {
  62039. "url" : "https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E",
  62040. "name" : "[pulsar-commits] 20210429 [pulsar] branch branch-2.7 updated: [Security] Upgrade commons-io to address CVE-2021-29425 (#10287)",
  62041. "refsource" : "MLIST",
  62042. "tags" : [ "Mailing List", "Third Party Advisory" ]
  62043. }, {
  62044. "url" : "https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E",
  62045. "name" : "[myfaces-dev] 20210504 [GitHub] [myfaces-tobago] lofwyr14 opened a new pull request #808: build: CVE fix",
  62046. "refsource" : "MLIST",
  62047. "tags" : [ "Mailing List", "Third Party Advisory", "Vendor Advisory" ]
  62048. } ]
  62049. },
  62050. "description" : {
  62051. "description_data" : [ {
  62052. "lang" : "en",
  62053. "value" : "In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like \"//../foo\", or \"\\\\..\\foo\", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus \"limited\" path traversal), if the calling code would use the result to construct a path value."
  62054. } ]
  62055. }
  62056. },
  62057. "configurations" : {
  62058. "CVE_data_version" : "4.0",
  62059. "nodes" : [ {
  62060. "operator" : "OR",
  62061. "children" : [ ],
  62062. "cpe_match" : [ {
  62063. "vulnerable" : true,
  62064. "cpe23Uri" : "cpe:2.3:a:apache:commons_io:2.2:-:*:*:*:*:*:*",
  62065. "cpe_name" : [ ]
  62066. }, {
  62067. "vulnerable" : true,
  62068. "cpe23Uri" : "cpe:2.3:a:apache:commons_io:2.3:-:*:*:*:*:*:*",
  62069. "cpe_name" : [ ]
  62070. }, {
  62071. "vulnerable" : true,
  62072. "cpe23Uri" : "cpe:2.3:a:apache:commons_io:2.4:-:*:*:*:*:*:*",
  62073. "cpe_name" : [ ]
  62074. }, {
  62075. "vulnerable" : true,
  62076. "cpe23Uri" : "cpe:2.3:a:apache:commons_io:2.5:-:*:*:*:*:*:*",
  62077. "cpe_name" : [ ]
  62078. }, {
  62079. "vulnerable" : true,
  62080. "cpe23Uri" : "cpe:2.3:a:apache:commons_io:2.6:-:*:*:*:*:*:*",
  62081. "cpe_name" : [ ]
  62082. } ]
  62083. } ]
  62084. },
  62085. "impact" : {
  62086. "baseMetricV3" : {
  62087. "cvssV3" : {
  62088. "version" : "3.1",
  62089. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  62090. "attackVector" : "NETWORK",
  62091. "attackComplexity" : "LOW",
  62092. "privilegesRequired" : "NONE",
  62093. "userInteraction" : "NONE",
  62094. "scope" : "UNCHANGED",
  62095. "confidentialityImpact" : "LOW",
  62096. "integrityImpact" : "NONE",
  62097. "availabilityImpact" : "NONE",
  62098. "baseScore" : 5.3,
  62099. "baseSeverity" : "MEDIUM"
  62100. },
  62101. "exploitabilityScore" : 3.9,
  62102. "impactScore" : 1.4
  62103. },
  62104. "baseMetricV2" : {
  62105. "cvssV2" : {
  62106. "version" : "2.0",
  62107. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  62108. "accessVector" : "NETWORK",
  62109. "accessComplexity" : "LOW",
  62110. "authentication" : "NONE",
  62111. "confidentialityImpact" : "PARTIAL",
  62112. "integrityImpact" : "NONE",
  62113. "availabilityImpact" : "NONE",
  62114. "baseScore" : 5.0
  62115. },
  62116. "severity" : "MEDIUM",
  62117. "exploitabilityScore" : 10.0,
  62118. "impactScore" : 2.9,
  62119. "acInsufInfo" : false,
  62120. "obtainAllPrivilege" : false,
  62121. "obtainUserPrivilege" : false,
  62122. "obtainOtherPrivilege" : false,
  62123. "userInteractionRequired" : false
  62124. }
  62125. },
  62126. "publishedDate" : "2021-04-13T07:15Z",
  62127. "lastModifiedDate" : "2021-05-04T13:34Z"
  62128. }, {
  62129. "cve" : {
  62130. "data_type" : "CVE",
  62131. "data_format" : "MITRE",
  62132. "data_version" : "4.0",
  62133. "CVE_data_meta" : {
  62134. "ID" : "CVE-2021-28938",
  62135. "ASSIGNER" : "cve@mitre.org"
  62136. },
  62137. "problemtype" : {
  62138. "problemtype_data" : [ {
  62139. "description" : [ {
  62140. "lang" : "en",
  62141. "value" : "NVD-CWE-noinfo"
  62142. } ]
  62143. } ]
  62144. },
  62145. "references" : {
  62146. "reference_data" : [ {
  62147. "url" : "https://docs.siren.io/siren-federate-user-guide/22/siren-federate/release-notes.html",
  62148. "name" : "https://docs.siren.io/siren-federate-user-guide/22/siren-federate/release-notes.html",
  62149. "refsource" : "MISC",
  62150. "tags" : [ "Release Notes", "Vendor Advisory" ]
  62151. } ]
  62152. },
  62153. "description" : {
  62154. "description_data" : [ {
  62155. "lang" : "en",
  62156. "value" : "Siren Federate before 6.8.14-10.3.9, 6.9.x through 7.6.x before 7.6.2-20.2, 7.7.x through 7.9.x before 7.9.3-21.6, 7.10.x before 7.10.2-22.2, and 7.11.x before 7.11.2-23.0 can leak user information across thread contexts. This occurs in opportunistic circumstances when there is concurrent query execution by a low-privilege user and a high-privilege user. The former query might run with the latter query's privileges."
  62157. } ]
  62158. }
  62159. },
  62160. "configurations" : {
  62161. "CVE_data_version" : "4.0",
  62162. "nodes" : [ {
  62163. "operator" : "OR",
  62164. "children" : [ ],
  62165. "cpe_match" : [ {
  62166. "vulnerable" : true,
  62167. "cpe23Uri" : "cpe:2.3:a:siren:federate:*:*:*:*:*:elasticsearch:*:*",
  62168. "versionEndExcluding" : "6.8.14-10.3.9",
  62169. "cpe_name" : [ ]
  62170. }, {
  62171. "vulnerable" : true,
  62172. "cpe23Uri" : "cpe:2.3:a:siren:federate:*:*:*:*:*:elasticsearch:*:*",
  62173. "versionStartIncluding" : "7.3.2-19.0",
  62174. "versionEndExcluding" : "7.6.2-20.2",
  62175. "cpe_name" : [ ]
  62176. }, {
  62177. "vulnerable" : true,
  62178. "cpe23Uri" : "cpe:2.3:a:siren:federate:*:*:*:*:*:elasticsearch:*:*",
  62179. "versionStartIncluding" : "7.7.1-20.0",
  62180. "versionEndExcluding" : "7.9.3-21.6",
  62181. "cpe_name" : [ ]
  62182. }, {
  62183. "vulnerable" : true,
  62184. "cpe23Uri" : "cpe:2.3:a:siren:federate:*:*:*:*:*:elasticsearch:*:*",
  62185. "versionStartIncluding" : "7.10.1-22.0",
  62186. "versionEndExcluding" : "7.10.2-22.2",
  62187. "cpe_name" : [ ]
  62188. } ]
  62189. } ]
  62190. },
  62191. "impact" : {
  62192. "baseMetricV3" : {
  62193. "cvssV3" : {
  62194. "version" : "3.1",
  62195. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
  62196. "attackVector" : "NETWORK",
  62197. "attackComplexity" : "LOW",
  62198. "privilegesRequired" : "LOW",
  62199. "userInteraction" : "NONE",
  62200. "scope" : "UNCHANGED",
  62201. "confidentialityImpact" : "LOW",
  62202. "integrityImpact" : "NONE",
  62203. "availabilityImpact" : "NONE",
  62204. "baseScore" : 4.3,
  62205. "baseSeverity" : "MEDIUM"
  62206. },
  62207. "exploitabilityScore" : 2.8,
  62208. "impactScore" : 1.4
  62209. },
  62210. "baseMetricV2" : {
  62211. "cvssV2" : {
  62212. "version" : "2.0",
  62213. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
  62214. "accessVector" : "NETWORK",
  62215. "accessComplexity" : "LOW",
  62216. "authentication" : "SINGLE",
  62217. "confidentialityImpact" : "PARTIAL",
  62218. "integrityImpact" : "NONE",
  62219. "availabilityImpact" : "NONE",
  62220. "baseScore" : 4.0
  62221. },
  62222. "severity" : "MEDIUM",
  62223. "exploitabilityScore" : 8.0,
  62224. "impactScore" : 2.9,
  62225. "acInsufInfo" : false,
  62226. "obtainAllPrivilege" : false,
  62227. "obtainUserPrivilege" : false,
  62228. "obtainOtherPrivilege" : false,
  62229. "userInteractionRequired" : false
  62230. }
  62231. },
  62232. "publishedDate" : "2021-04-13T06:15Z",
  62233. "lastModifiedDate" : "2021-05-04T16:07Z"
  62234. }, {
  62235. "cve" : {
  62236. "data_type" : "CVE",
  62237. "data_format" : "MITRE",
  62238. "data_version" : "4.0",
  62239. "CVE_data_meta" : {
  62240. "ID" : "CVE-2021-24231",
  62241. "ASSIGNER" : "contact@wpscan.com"
  62242. },
  62243. "problemtype" : {
  62244. "problemtype_data" : [ {
  62245. "description" : [ {
  62246. "lang" : "en",
  62247. "value" : "CWE-352"
  62248. } ]
  62249. } ]
  62250. },
  62251. "references" : {
  62252. "reference_data" : [ {
  62253. "url" : "https://wpscan.com/vulnerability/f8ab6855-a319-47ac-82fb-58b181e77500",
  62254. "name" : "https://wpscan.com/vulnerability/f8ab6855-a319-47ac-82fb-58b181e77500",
  62255. "refsource" : "CONFIRM",
  62256. "tags" : [ "Third Party Advisory" ]
  62257. }, {
  62258. "url" : "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/",
  62259. "name" : "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/",
  62260. "refsource" : "MISC",
  62261. "tags" : [ "Exploit", "Third Party Advisory" ]
  62262. } ]
  62263. },
  62264. "description" : {
  62265. "description_data" : [ {
  62266. "lang" : "en",
  62267. "value" : "The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged administrator disconnect the site from Patreon by visiting a specially crafted link."
  62268. } ]
  62269. }
  62270. },
  62271. "configurations" : {
  62272. "CVE_data_version" : "4.0",
  62273. "nodes" : [ {
  62274. "operator" : "OR",
  62275. "children" : [ ],
  62276. "cpe_match" : [ {
  62277. "vulnerable" : true,
  62278. "cpe23Uri" : "cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*",
  62279. "versionEndExcluding" : "1.7.0",
  62280. "cpe_name" : [ ]
  62281. } ]
  62282. } ]
  62283. },
  62284. "impact" : {
  62285. "baseMetricV3" : {
  62286. "cvssV3" : {
  62287. "version" : "3.1",
  62288. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  62289. "attackVector" : "NETWORK",
  62290. "attackComplexity" : "LOW",
  62291. "privilegesRequired" : "NONE",
  62292. "userInteraction" : "REQUIRED",
  62293. "scope" : "UNCHANGED",
  62294. "confidentialityImpact" : "NONE",
  62295. "integrityImpact" : "NONE",
  62296. "availabilityImpact" : "HIGH",
  62297. "baseScore" : 6.5,
  62298. "baseSeverity" : "MEDIUM"
  62299. },
  62300. "exploitabilityScore" : 2.8,
  62301. "impactScore" : 3.6
  62302. },
  62303. "baseMetricV2" : {
  62304. "cvssV2" : {
  62305. "version" : "2.0",
  62306. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  62307. "accessVector" : "NETWORK",
  62308. "accessComplexity" : "MEDIUM",
  62309. "authentication" : "NONE",
  62310. "confidentialityImpact" : "NONE",
  62311. "integrityImpact" : "NONE",
  62312. "availabilityImpact" : "PARTIAL",
  62313. "baseScore" : 4.3
  62314. },
  62315. "severity" : "MEDIUM",
  62316. "exploitabilityScore" : 8.6,
  62317. "impactScore" : 2.9,
  62318. "acInsufInfo" : false,
  62319. "obtainAllPrivilege" : false,
  62320. "obtainUserPrivilege" : false,
  62321. "obtainOtherPrivilege" : false,
  62322. "userInteractionRequired" : true
  62323. }
  62324. },
  62325. "publishedDate" : "2021-04-12T14:15Z",
  62326. "lastModifiedDate" : "2021-05-04T15:01Z"
  62327. }, {
  62328. "cve" : {
  62329. "data_type" : "CVE",
  62330. "data_format" : "MITRE",
  62331. "data_version" : "4.0",
  62332. "CVE_data_meta" : {
  62333. "ID" : "CVE-2021-24230",
  62334. "ASSIGNER" : "contact@wpscan.com"
  62335. },
  62336. "problemtype" : {
  62337. "problemtype_data" : [ {
  62338. "description" : [ {
  62339. "lang" : "en",
  62340. "value" : "CWE-352"
  62341. } ]
  62342. } ]
  62343. },
  62344. "references" : {
  62345. "reference_data" : [ {
  62346. "url" : "https://wpscan.com/vulnerability/2deefa2d-3043-42e5-afef-a42c37703531",
  62347. "name" : "https://wpscan.com/vulnerability/2deefa2d-3043-42e5-afef-a42c37703531",
  62348. "refsource" : "CONFIRM",
  62349. "tags" : [ "Third Party Advisory" ]
  62350. }, {
  62351. "url" : "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/",
  62352. "name" : "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/",
  62353. "refsource" : "MISC",
  62354. "tags" : [ "Exploit", "Third Party Advisory" ]
  62355. } ]
  62356. },
  62357. "description" : {
  62358. "description_data" : [ {
  62359. "lang" : "en",
  62360. "value" : "The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content."
  62361. } ]
  62362. }
  62363. },
  62364. "configurations" : {
  62365. "CVE_data_version" : "4.0",
  62366. "nodes" : [ {
  62367. "operator" : "OR",
  62368. "children" : [ ],
  62369. "cpe_match" : [ {
  62370. "vulnerable" : true,
  62371. "cpe23Uri" : "cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*",
  62372. "versionEndExcluding" : "1.7.0",
  62373. "cpe_name" : [ ]
  62374. } ]
  62375. } ]
  62376. },
  62377. "impact" : {
  62378. "baseMetricV3" : {
  62379. "cvssV3" : {
  62380. "version" : "3.1",
  62381. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
  62382. "attackVector" : "NETWORK",
  62383. "attackComplexity" : "LOW",
  62384. "privilegesRequired" : "NONE",
  62385. "userInteraction" : "REQUIRED",
  62386. "scope" : "UNCHANGED",
  62387. "confidentialityImpact" : "NONE",
  62388. "integrityImpact" : "HIGH",
  62389. "availabilityImpact" : "HIGH",
  62390. "baseScore" : 8.1,
  62391. "baseSeverity" : "HIGH"
  62392. },
  62393. "exploitabilityScore" : 2.8,
  62394. "impactScore" : 5.2
  62395. },
  62396. "baseMetricV2" : {
  62397. "cvssV2" : {
  62398. "version" : "2.0",
  62399. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:P",
  62400. "accessVector" : "NETWORK",
  62401. "accessComplexity" : "MEDIUM",
  62402. "authentication" : "NONE",
  62403. "confidentialityImpact" : "NONE",
  62404. "integrityImpact" : "PARTIAL",
  62405. "availabilityImpact" : "PARTIAL",
  62406. "baseScore" : 5.8
  62407. },
  62408. "severity" : "MEDIUM",
  62409. "exploitabilityScore" : 8.6,
  62410. "impactScore" : 4.9,
  62411. "acInsufInfo" : false,
  62412. "obtainAllPrivilege" : false,
  62413. "obtainUserPrivilege" : false,
  62414. "obtainOtherPrivilege" : false,
  62415. "userInteractionRequired" : true
  62416. }
  62417. },
  62418. "publishedDate" : "2021-04-12T14:15Z",
  62419. "lastModifiedDate" : "2021-05-04T15:01Z"
  62420. }, {
  62421. "cve" : {
  62422. "data_type" : "CVE",
  62423. "data_format" : "MITRE",
  62424. "data_version" : "4.0",
  62425. "CVE_data_meta" : {
  62426. "ID" : "CVE-2021-21431",
  62427. "ASSIGNER" : "security-advisories@github.com"
  62428. },
  62429. "problemtype" : {
  62430. "problemtype_data" : [ {
  62431. "description" : [ {
  62432. "lang" : "en",
  62433. "value" : "CWE-20"
  62434. }, {
  62435. "lang" : "en",
  62436. "value" : "CWE-284"
  62437. } ]
  62438. } ]
  62439. },
  62440. "references" : {
  62441. "reference_data" : [ {
  62442. "url" : "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m",
  62443. "name" : "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m",
  62444. "refsource" : "CONFIRM",
  62445. "tags" : [ "Third Party Advisory" ]
  62446. }, {
  62447. "url" : "https://pypi.org/project/sopel-plugins.channelmgnt/",
  62448. "name" : "https://pypi.org/project/sopel-plugins.channelmgnt/",
  62449. "refsource" : "MISC",
  62450. "tags" : [ "Product", "Third Party Advisory" ]
  62451. }, {
  62452. "url" : "https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856",
  62453. "name" : "https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856",
  62454. "refsource" : "MISC",
  62455. "tags" : [ "Patch", "Third Party Advisory" ]
  62456. } ]
  62457. },
  62458. "description" : {
  62459. "description_data" : [ {
  62460. "lang" : "en",
  62461. "value" : "sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX > 1."
  62462. } ]
  62463. }
  62464. },
  62465. "configurations" : {
  62466. "CVE_data_version" : "4.0",
  62467. "nodes" : [ {
  62468. "operator" : "OR",
  62469. "children" : [ ],
  62470. "cpe_match" : [ {
  62471. "vulnerable" : true,
  62472. "cpe23Uri" : "cpe:2.3:a:mirahezebots:channelmgnt:*:*:*:*:*:sopel:*:*",
  62473. "versionEndExcluding" : "2.0.1",
  62474. "cpe_name" : [ ]
  62475. } ]
  62476. } ]
  62477. },
  62478. "impact" : {
  62479. "baseMetricV3" : {
  62480. "cvssV3" : {
  62481. "version" : "3.1",
  62482. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H",
  62483. "attackVector" : "NETWORK",
  62484. "attackComplexity" : "LOW",
  62485. "privilegesRequired" : "HIGH",
  62486. "userInteraction" : "REQUIRED",
  62487. "scope" : "CHANGED",
  62488. "confidentialityImpact" : "NONE",
  62489. "integrityImpact" : "HIGH",
  62490. "availabilityImpact" : "HIGH",
  62491. "baseScore" : 8.1,
  62492. "baseSeverity" : "HIGH"
  62493. },
  62494. "exploitabilityScore" : 1.7,
  62495. "impactScore" : 5.8
  62496. },
  62497. "baseMetricV2" : {
  62498. "cvssV2" : {
  62499. "version" : "2.0",
  62500. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:P",
  62501. "accessVector" : "NETWORK",
  62502. "accessComplexity" : "LOW",
  62503. "authentication" : "SINGLE",
  62504. "confidentialityImpact" : "NONE",
  62505. "integrityImpact" : "PARTIAL",
  62506. "availabilityImpact" : "PARTIAL",
  62507. "baseScore" : 5.5
  62508. },
  62509. "severity" : "MEDIUM",
  62510. "exploitabilityScore" : 8.0,
  62511. "impactScore" : 4.9,
  62512. "acInsufInfo" : false,
  62513. "obtainAllPrivilege" : false,
  62514. "obtainUserPrivilege" : false,
  62515. "obtainOtherPrivilege" : false,
  62516. "userInteractionRequired" : false
  62517. }
  62518. },
  62519. "publishedDate" : "2021-04-09T16:15Z",
  62520. "lastModifiedDate" : "2021-05-04T13:59Z"
  62521. }, {
  62522. "cve" : {
  62523. "data_type" : "CVE",
  62524. "data_format" : "MITRE",
  62525. "data_version" : "4.0",
  62526. "CVE_data_meta" : {
  62527. "ID" : "CVE-2021-25328",
  62528. "ASSIGNER" : "cve@mitre.org"
  62529. },
  62530. "problemtype" : {
  62531. "problemtype_data" : [ {
  62532. "description" : [ {
  62533. "lang" : "en",
  62534. "value" : "CWE-120"
  62535. } ]
  62536. } ]
  62537. },
  62538. "references" : {
  62539. "reference_data" : [ {
  62540. "url" : "https://s3curityb3ast.github.io/KSA-Dev-011.md",
  62541. "name" : "https://s3curityb3ast.github.io/KSA-Dev-011.md",
  62542. "refsource" : "MISC",
  62543. "tags" : [ "Exploit", "Third Party Advisory" ]
  62544. }, {
  62545. "url" : "http://seclists.org/fulldisclosure/2021/May/5",
  62546. "name" : "20210504 KSA-Dev-0010:CVE-2021-25328:Authenticated Stack Overflow in Skyworth RN510 mesh Device",
  62547. "refsource" : "FULLDISC",
  62548. "tags" : [ ]
  62549. }, {
  62550. "url" : "http://packetstormsecurity.com/files/162450/Shenzhen-Skyworth-RN510-Buffer-Overflow.html",
  62551. "name" : "http://packetstormsecurity.com/files/162450/Shenzhen-Skyworth-RN510-Buffer-Overflow.html",
  62552. "refsource" : "MISC",
  62553. "tags" : [ ]
  62554. } ]
  62555. },
  62556. "description" : {
  62557. "description_data" : [ {
  62558. "lang" : "en",
  62559. "value" : "Skyworth Digital Technology RN510 V.3.1.0.4 RN510 V.3.1.0.4 contains a buffer overflow vulnerability in /cgi-bin/app-staticIP.asp. An authenticated attacker can send a specially crafted request to endpoint which can lead to a denial of service (DoS) or possible code execution on the device."
  62560. } ]
  62561. }
  62562. },
  62563. "configurations" : {
  62564. "CVE_data_version" : "4.0",
  62565. "nodes" : [ {
  62566. "operator" : "AND",
  62567. "children" : [ {
  62568. "operator" : "OR",
  62569. "children" : [ ],
  62570. "cpe_match" : [ {
  62571. "vulnerable" : true,
  62572. "cpe23Uri" : "cpe:2.3:o:skyworthdigital:rn510_firmware:3.1.0.4:*:*:*:*:*:*:*",
  62573. "cpe_name" : [ ]
  62574. } ]
  62575. }, {
  62576. "operator" : "OR",
  62577. "children" : [ ],
  62578. "cpe_match" : [ {
  62579. "vulnerable" : false,
  62580. "cpe23Uri" : "cpe:2.3:h:skyworthdigital:rn510:-:*:*:*:*:*:*:*",
  62581. "cpe_name" : [ ]
  62582. } ]
  62583. } ],
  62584. "cpe_match" : [ ]
  62585. } ]
  62586. },
  62587. "impact" : {
  62588. "baseMetricV3" : {
  62589. "cvssV3" : {
  62590. "version" : "3.1",
  62591. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  62592. "attackVector" : "NETWORK",
  62593. "attackComplexity" : "LOW",
  62594. "privilegesRequired" : "LOW",
  62595. "userInteraction" : "NONE",
  62596. "scope" : "UNCHANGED",
  62597. "confidentialityImpact" : "HIGH",
  62598. "integrityImpact" : "HIGH",
  62599. "availabilityImpact" : "HIGH",
  62600. "baseScore" : 8.8,
  62601. "baseSeverity" : "HIGH"
  62602. },
  62603. "exploitabilityScore" : 2.8,
  62604. "impactScore" : 5.9
  62605. },
  62606. "baseMetricV2" : {
  62607. "cvssV2" : {
  62608. "version" : "2.0",
  62609. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  62610. "accessVector" : "NETWORK",
  62611. "accessComplexity" : "LOW",
  62612. "authentication" : "SINGLE",
  62613. "confidentialityImpact" : "PARTIAL",
  62614. "integrityImpact" : "PARTIAL",
  62615. "availabilityImpact" : "PARTIAL",
  62616. "baseScore" : 6.5
  62617. },
  62618. "severity" : "MEDIUM",
  62619. "exploitabilityScore" : 8.0,
  62620. "impactScore" : 6.4,
  62621. "acInsufInfo" : false,
  62622. "obtainAllPrivilege" : false,
  62623. "obtainUserPrivilege" : false,
  62624. "obtainOtherPrivilege" : false,
  62625. "userInteractionRequired" : false
  62626. }
  62627. },
  62628. "publishedDate" : "2021-04-09T13:15Z",
  62629. "lastModifiedDate" : "2021-05-04T21:15Z"
  62630. }, {
  62631. "cve" : {
  62632. "data_type" : "CVE",
  62633. "data_format" : "MITRE",
  62634. "data_version" : "4.0",
  62635. "CVE_data_meta" : {
  62636. "ID" : "CVE-2021-25327",
  62637. "ASSIGNER" : "cve@mitre.org"
  62638. },
  62639. "problemtype" : {
  62640. "problemtype_data" : [ {
  62641. "description" : [ {
  62642. "lang" : "en",
  62643. "value" : "CWE-352"
  62644. } ]
  62645. } ]
  62646. },
  62647. "references" : {
  62648. "reference_data" : [ {
  62649. "url" : "https://s3curityb3ast.github.io/KSA-Dev-012.md",
  62650. "name" : "https://s3curityb3ast.github.io/KSA-Dev-012.md",
  62651. "refsource" : "MISC",
  62652. "tags" : [ "Third Party Advisory" ]
  62653. }, {
  62654. "url" : "http://seclists.org/fulldisclosure/2021/May/6",
  62655. "name" : "20210504 KSA-Dev-0011:CVE-2021-25327: Authenticated XSRF in Skyworth RN510 Mesh Extender",
  62656. "refsource" : "FULLDISC",
  62657. "tags" : [ ]
  62658. }, {
  62659. "url" : "http://packetstormsecurity.com/files/162454/Shenzhen-Skyworth-RN510-Cross-Site-Request-Forgery-Cross-Site-Scripting.html",
  62660. "name" : "http://packetstormsecurity.com/files/162454/Shenzhen-Skyworth-RN510-Cross-Site-Request-Forgery-Cross-Site-Scripting.html",
  62661. "refsource" : "MISC",
  62662. "tags" : [ ]
  62663. } ]
  62664. },
  62665. "description" : {
  62666. "description_data" : [ {
  62667. "lang" : "en",
  62668. "value" : "Skyworth Digital Technology RN510 V.3.1.0.4 contains a cross-site request forgery (CSRF) vulnerability in /cgi-bin/net-routeadd.asp and /cgi-bin/sec-urlfilter.asp. Missing CSRF protection in devices can lead to XSRF, as the above pages are vulnerable to cross-site scripting (XSS)."
  62669. } ]
  62670. }
  62671. },
  62672. "configurations" : {
  62673. "CVE_data_version" : "4.0",
  62674. "nodes" : [ {
  62675. "operator" : "AND",
  62676. "children" : [ {
  62677. "operator" : "OR",
  62678. "children" : [ ],
  62679. "cpe_match" : [ {
  62680. "vulnerable" : true,
  62681. "cpe23Uri" : "cpe:2.3:o:skyworthdigital:rn510_firmware:3.1.0.4:*:*:*:*:*:*:*",
  62682. "cpe_name" : [ ]
  62683. } ]
  62684. }, {
  62685. "operator" : "OR",
  62686. "children" : [ ],
  62687. "cpe_match" : [ {
  62688. "vulnerable" : false,
  62689. "cpe23Uri" : "cpe:2.3:h:skyworthdigital:rn510:-:*:*:*:*:*:*:*",
  62690. "cpe_name" : [ ]
  62691. } ]
  62692. } ],
  62693. "cpe_match" : [ ]
  62694. } ]
  62695. },
  62696. "impact" : {
  62697. "baseMetricV3" : {
  62698. "cvssV3" : {
  62699. "version" : "3.1",
  62700. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
  62701. "attackVector" : "NETWORK",
  62702. "attackComplexity" : "LOW",
  62703. "privilegesRequired" : "NONE",
  62704. "userInteraction" : "REQUIRED",
  62705. "scope" : "UNCHANGED",
  62706. "confidentialityImpact" : "NONE",
  62707. "integrityImpact" : "HIGH",
  62708. "availabilityImpact" : "NONE",
  62709. "baseScore" : 6.5,
  62710. "baseSeverity" : "MEDIUM"
  62711. },
  62712. "exploitabilityScore" : 2.8,
  62713. "impactScore" : 3.6
  62714. },
  62715. "baseMetricV2" : {
  62716. "cvssV2" : {
  62717. "version" : "2.0",
  62718. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  62719. "accessVector" : "NETWORK",
  62720. "accessComplexity" : "MEDIUM",
  62721. "authentication" : "NONE",
  62722. "confidentialityImpact" : "NONE",
  62723. "integrityImpact" : "PARTIAL",
  62724. "availabilityImpact" : "NONE",
  62725. "baseScore" : 4.3
  62726. },
  62727. "severity" : "MEDIUM",
  62728. "exploitabilityScore" : 8.6,
  62729. "impactScore" : 2.9,
  62730. "acInsufInfo" : false,
  62731. "obtainAllPrivilege" : false,
  62732. "obtainUserPrivilege" : false,
  62733. "obtainOtherPrivilege" : false,
  62734. "userInteractionRequired" : true
  62735. }
  62736. },
  62737. "publishedDate" : "2021-04-09T13:15Z",
  62738. "lastModifiedDate" : "2021-05-04T21:15Z"
  62739. }, {
  62740. "cve" : {
  62741. "data_type" : "CVE",
  62742. "data_format" : "MITRE",
  62743. "data_version" : "4.0",
  62744. "CVE_data_meta" : {
  62745. "ID" : "CVE-2021-25326",
  62746. "ASSIGNER" : "cve@mitre.org"
  62747. },
  62748. "problemtype" : {
  62749. "problemtype_data" : [ {
  62750. "description" : [ {
  62751. "lang" : "en",
  62752. "value" : "CWE-79"
  62753. } ]
  62754. } ]
  62755. },
  62756. "references" : {
  62757. "reference_data" : [ {
  62758. "url" : "https://s3curityb3ast.github.io/KSA-Dev-013.md",
  62759. "name" : "https://s3curityb3ast.github.io/KSA-Dev-013.md",
  62760. "refsource" : "MISC",
  62761. "tags" : [ "Exploit", "Third Party Advisory" ]
  62762. }, {
  62763. "url" : "http://seclists.org/fulldisclosure/2021/May/8",
  62764. "name" : "20210504 KSA-Dev-0012:CVE-2021-25326:Unauthenticated Sensitive information Discloser in Skyworth RN510 Mesh Extender",
  62765. "refsource" : "FULLDISC",
  62766. "tags" : [ ]
  62767. }, {
  62768. "url" : "http://packetstormsecurity.com/files/162455/Shenzhen-Skyworth-RN510-Information-Disclosure.html",
  62769. "name" : "http://packetstormsecurity.com/files/162455/Shenzhen-Skyworth-RN510-Information-Disclosure.html",
  62770. "refsource" : "MISC",
  62771. "tags" : [ ]
  62772. } ]
  62773. },
  62774. "description" : {
  62775. "description_data" : [ {
  62776. "lang" : "en",
  62777. "value" : "Skyworth Digital Technology RN510 V.3.1.0.4 is affected by an incorrect access control vulnerability in/cgi-bin/test_version.asp. If Wi-Fi is connected but an unauthenticated user visits a URL, the SSID password and web UI password may be disclosed."
  62778. } ]
  62779. }
  62780. },
  62781. "configurations" : {
  62782. "CVE_data_version" : "4.0",
  62783. "nodes" : [ {
  62784. "operator" : "AND",
  62785. "children" : [ {
  62786. "operator" : "OR",
  62787. "children" : [ ],
  62788. "cpe_match" : [ {
  62789. "vulnerable" : true,
  62790. "cpe23Uri" : "cpe:2.3:o:skyworthdigital:rn510_firmware:3.1.0.4:*:*:*:*:*:*:*",
  62791. "cpe_name" : [ ]
  62792. } ]
  62793. }, {
  62794. "operator" : "OR",
  62795. "children" : [ ],
  62796. "cpe_match" : [ {
  62797. "vulnerable" : false,
  62798. "cpe23Uri" : "cpe:2.3:h:skyworthdigital:rn510:-:*:*:*:*:*:*:*",
  62799. "cpe_name" : [ ]
  62800. } ]
  62801. } ],
  62802. "cpe_match" : [ ]
  62803. } ]
  62804. },
  62805. "impact" : {
  62806. "baseMetricV3" : {
  62807. "cvssV3" : {
  62808. "version" : "3.1",
  62809. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  62810. "attackVector" : "NETWORK",
  62811. "attackComplexity" : "LOW",
  62812. "privilegesRequired" : "LOW",
  62813. "userInteraction" : "REQUIRED",
  62814. "scope" : "CHANGED",
  62815. "confidentialityImpact" : "LOW",
  62816. "integrityImpact" : "LOW",
  62817. "availabilityImpact" : "NONE",
  62818. "baseScore" : 5.4,
  62819. "baseSeverity" : "MEDIUM"
  62820. },
  62821. "exploitabilityScore" : 2.3,
  62822. "impactScore" : 2.7
  62823. },
  62824. "baseMetricV2" : {
  62825. "cvssV2" : {
  62826. "version" : "2.0",
  62827. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  62828. "accessVector" : "NETWORK",
  62829. "accessComplexity" : "MEDIUM",
  62830. "authentication" : "SINGLE",
  62831. "confidentialityImpact" : "NONE",
  62832. "integrityImpact" : "PARTIAL",
  62833. "availabilityImpact" : "NONE",
  62834. "baseScore" : 3.5
  62835. },
  62836. "severity" : "LOW",
  62837. "exploitabilityScore" : 6.8,
  62838. "impactScore" : 2.9,
  62839. "acInsufInfo" : false,
  62840. "obtainAllPrivilege" : false,
  62841. "obtainUserPrivilege" : false,
  62842. "obtainOtherPrivilege" : false,
  62843. "userInteractionRequired" : true
  62844. }
  62845. },
  62846. "publishedDate" : "2021-04-09T13:15Z",
  62847. "lastModifiedDate" : "2021-05-04T21:15Z"
  62848. }, {
  62849. "cve" : {
  62850. "data_type" : "CVE",
  62851. "data_format" : "MITRE",
  62852. "data_version" : "4.0",
  62853. "CVE_data_meta" : {
  62854. "ID" : "CVE-2021-30159",
  62855. "ASSIGNER" : "cve@mitre.org"
  62856. },
  62857. "problemtype" : {
  62858. "problemtype_data" : [ {
  62859. "description" : [ {
  62860. "lang" : "en",
  62861. "value" : "NVD-CWE-noinfo"
  62862. } ]
  62863. } ]
  62864. },
  62865. "references" : {
  62866. "reference_data" : [ {
  62867. "url" : "https://phabricator.wikimedia.org/T272386",
  62868. "name" : "https://phabricator.wikimedia.org/T272386",
  62869. "refsource" : "MISC",
  62870. "tags" : [ "Exploit", "Patch", "Vendor Advisory" ]
  62871. }, {
  62872. "url" : "https://www.debian.org/security/2021/dsa-4889",
  62873. "name" : "DSA-4889",
  62874. "refsource" : "DEBIAN",
  62875. "tags" : [ "Third Party Advisory" ]
  62876. }, {
  62877. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/",
  62878. "name" : "FEDORA-2021-f4223b6684",
  62879. "refsource" : "FEDORA",
  62880. "tags" : [ "Third Party Advisory" ]
  62881. }, {
  62882. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/",
  62883. "name" : "FEDORA-2021-d298103d3a",
  62884. "refsource" : "FEDORA",
  62885. "tags" : [ "Third Party Advisory" ]
  62886. }, {
  62887. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html",
  62888. "name" : "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update",
  62889. "refsource" : "MLIST",
  62890. "tags" : [ "Third Party Advisory" ]
  62891. }, {
  62892. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html",
  62893. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update",
  62894. "refsource" : "MLIST",
  62895. "tags" : [ ]
  62896. } ]
  62897. },
  62898. "description" : {
  62899. "description_data" : [ {
  62900. "lang" : "en",
  62901. "value" : "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Users can bypass intended restrictions on deleting pages in certain \"fast double move\" situations. MovePage::isValidMoveTarget() uses FOR UPDATE, but it's only called if Title::getArticleID() returns non-zero with no special flags. Next, MovePage::moveToInternal() will delete the page if getArticleID(READ_LATEST) is non-zero. Therefore, if the page is missing in the replica DB, isValidMove() will return true, and then moveToInternal() will unconditionally delete the page if it can be found in the master."
  62902. } ]
  62903. }
  62904. },
  62905. "configurations" : {
  62906. "CVE_data_version" : "4.0",
  62907. "nodes" : [ {
  62908. "operator" : "OR",
  62909. "children" : [ ],
  62910. "cpe_match" : [ {
  62911. "vulnerable" : true,
  62912. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  62913. "versionEndExcluding" : "1.31.12",
  62914. "cpe_name" : [ ]
  62915. }, {
  62916. "vulnerable" : true,
  62917. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  62918. "versionStartIncluding" : "1.32.0",
  62919. "versionEndExcluding" : "1.35.2",
  62920. "cpe_name" : [ ]
  62921. } ]
  62922. }, {
  62923. "operator" : "OR",
  62924. "children" : [ ],
  62925. "cpe_match" : [ {
  62926. "vulnerable" : true,
  62927. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  62928. "cpe_name" : [ ]
  62929. }, {
  62930. "vulnerable" : true,
  62931. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  62932. "cpe_name" : [ ]
  62933. } ]
  62934. }, {
  62935. "operator" : "OR",
  62936. "children" : [ ],
  62937. "cpe_match" : [ {
  62938. "vulnerable" : true,
  62939. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  62940. "cpe_name" : [ ]
  62941. }, {
  62942. "vulnerable" : true,
  62943. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  62944. "cpe_name" : [ ]
  62945. } ]
  62946. } ]
  62947. },
  62948. "impact" : {
  62949. "baseMetricV3" : {
  62950. "cvssV3" : {
  62951. "version" : "3.1",
  62952. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
  62953. "attackVector" : "NETWORK",
  62954. "attackComplexity" : "LOW",
  62955. "privilegesRequired" : "LOW",
  62956. "userInteraction" : "NONE",
  62957. "scope" : "UNCHANGED",
  62958. "confidentialityImpact" : "NONE",
  62959. "integrityImpact" : "LOW",
  62960. "availabilityImpact" : "NONE",
  62961. "baseScore" : 4.3,
  62962. "baseSeverity" : "MEDIUM"
  62963. },
  62964. "exploitabilityScore" : 2.8,
  62965. "impactScore" : 1.4
  62966. },
  62967. "baseMetricV2" : {
  62968. "cvssV2" : {
  62969. "version" : "2.0",
  62970. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:N",
  62971. "accessVector" : "NETWORK",
  62972. "accessComplexity" : "LOW",
  62973. "authentication" : "SINGLE",
  62974. "confidentialityImpact" : "NONE",
  62975. "integrityImpact" : "PARTIAL",
  62976. "availabilityImpact" : "NONE",
  62977. "baseScore" : 4.0
  62978. },
  62979. "severity" : "MEDIUM",
  62980. "exploitabilityScore" : 8.0,
  62981. "impactScore" : 2.9,
  62982. "acInsufInfo" : false,
  62983. "obtainAllPrivilege" : false,
  62984. "obtainUserPrivilege" : false,
  62985. "obtainOtherPrivilege" : false,
  62986. "userInteractionRequired" : false
  62987. }
  62988. },
  62989. "publishedDate" : "2021-04-09T07:15Z",
  62990. "lastModifiedDate" : "2021-05-06T23:15Z"
  62991. }, {
  62992. "cve" : {
  62993. "data_type" : "CVE",
  62994. "data_format" : "MITRE",
  62995. "data_version" : "4.0",
  62996. "CVE_data_meta" : {
  62997. "ID" : "CVE-2021-30156",
  62998. "ASSIGNER" : "cve@mitre.org"
  62999. },
  63000. "problemtype" : {
  63001. "problemtype_data" : [ {
  63002. "description" : [ {
  63003. "lang" : "en",
  63004. "value" : "CWE-732"
  63005. } ]
  63006. } ]
  63007. },
  63008. "references" : {
  63009. "reference_data" : [ {
  63010. "url" : "https://phabricator.wikimedia.org/T276306",
  63011. "name" : "https://phabricator.wikimedia.org/T276306",
  63012. "refsource" : "MISC",
  63013. "tags" : [ "Exploit", "Patch", "Vendor Advisory" ]
  63014. }, {
  63015. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/",
  63016. "name" : "FEDORA-2021-f4223b6684",
  63017. "refsource" : "FEDORA",
  63018. "tags" : [ "Third Party Advisory" ]
  63019. }, {
  63020. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/",
  63021. "name" : "FEDORA-2021-d298103d3a",
  63022. "refsource" : "FEDORA",
  63023. "tags" : [ "Third Party Advisory" ]
  63024. } ]
  63025. },
  63026. "description" : {
  63027. "description_data" : [ {
  63028. "lang" : "en",
  63029. "value" : "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Special:Contributions can leak that a \"hidden\" user exists."
  63030. } ]
  63031. }
  63032. },
  63033. "configurations" : {
  63034. "CVE_data_version" : "4.0",
  63035. "nodes" : [ {
  63036. "operator" : "OR",
  63037. "children" : [ ],
  63038. "cpe_match" : [ {
  63039. "vulnerable" : true,
  63040. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  63041. "versionEndExcluding" : "1.31.12",
  63042. "cpe_name" : [ ]
  63043. }, {
  63044. "vulnerable" : true,
  63045. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  63046. "versionStartIncluding" : "1.32.0",
  63047. "versionEndExcluding" : "1.35.2",
  63048. "cpe_name" : [ ]
  63049. } ]
  63050. }, {
  63051. "operator" : "OR",
  63052. "children" : [ ],
  63053. "cpe_match" : [ {
  63054. "vulnerable" : true,
  63055. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  63056. "cpe_name" : [ ]
  63057. }, {
  63058. "vulnerable" : true,
  63059. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  63060. "cpe_name" : [ ]
  63061. } ]
  63062. } ]
  63063. },
  63064. "impact" : {
  63065. "baseMetricV3" : {
  63066. "cvssV3" : {
  63067. "version" : "3.1",
  63068. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
  63069. "attackVector" : "NETWORK",
  63070. "attackComplexity" : "LOW",
  63071. "privilegesRequired" : "LOW",
  63072. "userInteraction" : "NONE",
  63073. "scope" : "UNCHANGED",
  63074. "confidentialityImpact" : "NONE",
  63075. "integrityImpact" : "LOW",
  63076. "availabilityImpact" : "NONE",
  63077. "baseScore" : 4.3,
  63078. "baseSeverity" : "MEDIUM"
  63079. },
  63080. "exploitabilityScore" : 2.8,
  63081. "impactScore" : 1.4
  63082. },
  63083. "baseMetricV2" : {
  63084. "cvssV2" : {
  63085. "version" : "2.0",
  63086. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:N",
  63087. "accessVector" : "NETWORK",
  63088. "accessComplexity" : "LOW",
  63089. "authentication" : "SINGLE",
  63090. "confidentialityImpact" : "NONE",
  63091. "integrityImpact" : "PARTIAL",
  63092. "availabilityImpact" : "NONE",
  63093. "baseScore" : 4.0
  63094. },
  63095. "severity" : "MEDIUM",
  63096. "exploitabilityScore" : 8.0,
  63097. "impactScore" : 2.9,
  63098. "acInsufInfo" : false,
  63099. "obtainAllPrivilege" : false,
  63100. "obtainUserPrivilege" : false,
  63101. "obtainOtherPrivilege" : false,
  63102. "userInteractionRequired" : false
  63103. }
  63104. },
  63105. "publishedDate" : "2021-04-09T07:15Z",
  63106. "lastModifiedDate" : "2021-05-03T20:00Z"
  63107. }, {
  63108. "cve" : {
  63109. "data_type" : "CVE",
  63110. "data_format" : "MITRE",
  63111. "data_version" : "4.0",
  63112. "CVE_data_meta" : {
  63113. "ID" : "CVE-2021-30155",
  63114. "ASSIGNER" : "cve@mitre.org"
  63115. },
  63116. "problemtype" : {
  63117. "problemtype_data" : [ {
  63118. "description" : [ {
  63119. "lang" : "en",
  63120. "value" : "CWE-862"
  63121. } ]
  63122. } ]
  63123. },
  63124. "references" : {
  63125. "reference_data" : [ {
  63126. "url" : "https://phabricator.wikimedia.org/T270988",
  63127. "name" : "https://phabricator.wikimedia.org/T270988",
  63128. "refsource" : "MISC",
  63129. "tags" : [ "Exploit", "Vendor Advisory" ]
  63130. }, {
  63131. "url" : "https://www.debian.org/security/2021/dsa-4889",
  63132. "name" : "DSA-4889",
  63133. "refsource" : "DEBIAN",
  63134. "tags" : [ "Third Party Advisory" ]
  63135. }, {
  63136. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/",
  63137. "name" : "FEDORA-2021-f4223b6684",
  63138. "refsource" : "FEDORA",
  63139. "tags" : [ "Third Party Advisory" ]
  63140. }, {
  63141. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/",
  63142. "name" : "FEDORA-2021-d298103d3a",
  63143. "refsource" : "FEDORA",
  63144. "tags" : [ "Third Party Advisory" ]
  63145. }, {
  63146. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html",
  63147. "name" : "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update",
  63148. "refsource" : "MLIST",
  63149. "tags" : [ ]
  63150. }, {
  63151. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html",
  63152. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update",
  63153. "refsource" : "MLIST",
  63154. "tags" : [ ]
  63155. } ]
  63156. },
  63157. "description" : {
  63158. "description_data" : [ {
  63159. "lang" : "en",
  63160. "value" : "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. ContentModelChange does not check if a user has correct permissions to create and set the content model of a nonexistent page."
  63161. } ]
  63162. }
  63163. },
  63164. "configurations" : {
  63165. "CVE_data_version" : "4.0",
  63166. "nodes" : [ {
  63167. "operator" : "OR",
  63168. "children" : [ ],
  63169. "cpe_match" : [ {
  63170. "vulnerable" : true,
  63171. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  63172. "versionEndExcluding" : "1.31.12",
  63173. "cpe_name" : [ ]
  63174. }, {
  63175. "vulnerable" : true,
  63176. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  63177. "versionStartIncluding" : "1.32.0",
  63178. "versionEndExcluding" : "1.35.2",
  63179. "cpe_name" : [ ]
  63180. } ]
  63181. }, {
  63182. "operator" : "OR",
  63183. "children" : [ ],
  63184. "cpe_match" : [ {
  63185. "vulnerable" : true,
  63186. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  63187. "cpe_name" : [ ]
  63188. } ]
  63189. }, {
  63190. "operator" : "OR",
  63191. "children" : [ ],
  63192. "cpe_match" : [ {
  63193. "vulnerable" : true,
  63194. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  63195. "cpe_name" : [ ]
  63196. }, {
  63197. "vulnerable" : true,
  63198. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  63199. "cpe_name" : [ ]
  63200. } ]
  63201. } ]
  63202. },
  63203. "impact" : {
  63204. "baseMetricV3" : {
  63205. "cvssV3" : {
  63206. "version" : "3.1",
  63207. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
  63208. "attackVector" : "NETWORK",
  63209. "attackComplexity" : "LOW",
  63210. "privilegesRequired" : "LOW",
  63211. "userInteraction" : "NONE",
  63212. "scope" : "UNCHANGED",
  63213. "confidentialityImpact" : "NONE",
  63214. "integrityImpact" : "LOW",
  63215. "availabilityImpact" : "NONE",
  63216. "baseScore" : 4.3,
  63217. "baseSeverity" : "MEDIUM"
  63218. },
  63219. "exploitabilityScore" : 2.8,
  63220. "impactScore" : 1.4
  63221. },
  63222. "baseMetricV2" : {
  63223. "cvssV2" : {
  63224. "version" : "2.0",
  63225. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:N",
  63226. "accessVector" : "NETWORK",
  63227. "accessComplexity" : "LOW",
  63228. "authentication" : "SINGLE",
  63229. "confidentialityImpact" : "NONE",
  63230. "integrityImpact" : "PARTIAL",
  63231. "availabilityImpact" : "NONE",
  63232. "baseScore" : 4.0
  63233. },
  63234. "severity" : "MEDIUM",
  63235. "exploitabilityScore" : 8.0,
  63236. "impactScore" : 2.9,
  63237. "acInsufInfo" : false,
  63238. "obtainAllPrivilege" : false,
  63239. "obtainUserPrivilege" : false,
  63240. "obtainOtherPrivilege" : false,
  63241. "userInteractionRequired" : false
  63242. }
  63243. },
  63244. "publishedDate" : "2021-04-09T07:15Z",
  63245. "lastModifiedDate" : "2021-05-06T23:15Z"
  63246. }, {
  63247. "cve" : {
  63248. "data_type" : "CVE",
  63249. "data_format" : "MITRE",
  63250. "data_version" : "4.0",
  63251. "CVE_data_meta" : {
  63252. "ID" : "CVE-2021-30152",
  63253. "ASSIGNER" : "cve@mitre.org"
  63254. },
  63255. "problemtype" : {
  63256. "problemtype_data" : [ {
  63257. "description" : [ {
  63258. "lang" : "en",
  63259. "value" : "CWE-732"
  63260. } ]
  63261. } ]
  63262. },
  63263. "references" : {
  63264. "reference_data" : [ {
  63265. "url" : "https://phabricator.wikimedia.org/T270713",
  63266. "name" : "https://phabricator.wikimedia.org/T270713",
  63267. "refsource" : "MISC",
  63268. "tags" : [ "Exploit", "Vendor Advisory" ]
  63269. }, {
  63270. "url" : "https://www.debian.org/security/2021/dsa-4889",
  63271. "name" : "DSA-4889",
  63272. "refsource" : "DEBIAN",
  63273. "tags" : [ "Third Party Advisory" ]
  63274. }, {
  63275. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/",
  63276. "name" : "FEDORA-2021-f4223b6684",
  63277. "refsource" : "FEDORA",
  63278. "tags" : [ "Third Party Advisory" ]
  63279. }, {
  63280. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/",
  63281. "name" : "FEDORA-2021-d298103d3a",
  63282. "refsource" : "FEDORA",
  63283. "tags" : [ "Third Party Advisory" ]
  63284. }, {
  63285. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html",
  63286. "name" : "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update",
  63287. "refsource" : "MLIST",
  63288. "tags" : [ ]
  63289. }, {
  63290. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html",
  63291. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update",
  63292. "refsource" : "MLIST",
  63293. "tags" : [ ]
  63294. } ]
  63295. },
  63296. "description" : {
  63297. "description_data" : [ {
  63298. "lang" : "en",
  63299. "value" : "An issue was discovered in MediaWiki before 1.31.13 and 1.32.x through 1.35.x before 1.35.2. When using the MediaWiki API to \"protect\" a page, a user is currently able to protect to a higher level than they currently have permissions for."
  63300. } ]
  63301. }
  63302. },
  63303. "configurations" : {
  63304. "CVE_data_version" : "4.0",
  63305. "nodes" : [ {
  63306. "operator" : "OR",
  63307. "children" : [ ],
  63308. "cpe_match" : [ {
  63309. "vulnerable" : true,
  63310. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  63311. "versionEndExcluding" : "1.31.13",
  63312. "cpe_name" : [ ]
  63313. }, {
  63314. "vulnerable" : true,
  63315. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  63316. "versionStartIncluding" : "1.32.0",
  63317. "versionEndExcluding" : "1.35.2",
  63318. "cpe_name" : [ ]
  63319. } ]
  63320. }, {
  63321. "operator" : "OR",
  63322. "children" : [ ],
  63323. "cpe_match" : [ {
  63324. "vulnerable" : true,
  63325. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  63326. "cpe_name" : [ ]
  63327. } ]
  63328. }, {
  63329. "operator" : "OR",
  63330. "children" : [ ],
  63331. "cpe_match" : [ {
  63332. "vulnerable" : true,
  63333. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  63334. "cpe_name" : [ ]
  63335. }, {
  63336. "vulnerable" : true,
  63337. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  63338. "cpe_name" : [ ]
  63339. } ]
  63340. } ]
  63341. },
  63342. "impact" : {
  63343. "baseMetricV3" : {
  63344. "cvssV3" : {
  63345. "version" : "3.1",
  63346. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
  63347. "attackVector" : "NETWORK",
  63348. "attackComplexity" : "LOW",
  63349. "privilegesRequired" : "LOW",
  63350. "userInteraction" : "NONE",
  63351. "scope" : "UNCHANGED",
  63352. "confidentialityImpact" : "NONE",
  63353. "integrityImpact" : "LOW",
  63354. "availabilityImpact" : "NONE",
  63355. "baseScore" : 4.3,
  63356. "baseSeverity" : "MEDIUM"
  63357. },
  63358. "exploitabilityScore" : 2.8,
  63359. "impactScore" : 1.4
  63360. },
  63361. "baseMetricV2" : {
  63362. "cvssV2" : {
  63363. "version" : "2.0",
  63364. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:N",
  63365. "accessVector" : "NETWORK",
  63366. "accessComplexity" : "LOW",
  63367. "authentication" : "SINGLE",
  63368. "confidentialityImpact" : "NONE",
  63369. "integrityImpact" : "PARTIAL",
  63370. "availabilityImpact" : "NONE",
  63371. "baseScore" : 4.0
  63372. },
  63373. "severity" : "MEDIUM",
  63374. "exploitabilityScore" : 8.0,
  63375. "impactScore" : 2.9,
  63376. "acInsufInfo" : false,
  63377. "obtainAllPrivilege" : false,
  63378. "obtainUserPrivilege" : false,
  63379. "obtainOtherPrivilege" : false,
  63380. "userInteractionRequired" : false
  63381. }
  63382. },
  63383. "publishedDate" : "2021-04-09T07:15Z",
  63384. "lastModifiedDate" : "2021-05-06T23:15Z"
  63385. }, {
  63386. "cve" : {
  63387. "data_type" : "CVE",
  63388. "data_format" : "MITRE",
  63389. "data_version" : "4.0",
  63390. "CVE_data_meta" : {
  63391. "ID" : "CVE-2021-3482",
  63392. "ASSIGNER" : "secalert@redhat.com"
  63393. },
  63394. "problemtype" : {
  63395. "problemtype_data" : [ {
  63396. "description" : [ {
  63397. "lang" : "en",
  63398. "value" : "CWE-119"
  63399. }, {
  63400. "lang" : "en",
  63401. "value" : "CWE-20"
  63402. } ]
  63403. } ]
  63404. },
  63405. "references" : {
  63406. "reference_data" : [ {
  63407. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1946314",
  63408. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1946314",
  63409. "refsource" : "MISC",
  63410. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  63411. }, {
  63412. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/",
  63413. "name" : "FEDORA-2021-10d7331a31",
  63414. "refsource" : "FEDORA",
  63415. "tags" : [ ]
  63416. } ]
  63417. },
  63418. "description" : {
  63419. "description_data" : [ {
  63420. "lang" : "en",
  63421. "value" : "A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data."
  63422. } ]
  63423. }
  63424. },
  63425. "configurations" : {
  63426. "CVE_data_version" : "4.0",
  63427. "nodes" : [ {
  63428. "operator" : "OR",
  63429. "children" : [ ],
  63430. "cpe_match" : [ {
  63431. "vulnerable" : true,
  63432. "cpe23Uri" : "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
  63433. "versionEndIncluding" : "0.27.3",
  63434. "cpe_name" : [ ]
  63435. }, {
  63436. "vulnerable" : true,
  63437. "cpe23Uri" : "cpe:2.3:a:exiv2:exiv2:0.27.4:rc1:*:*:*:*:*:*",
  63438. "cpe_name" : [ ]
  63439. } ]
  63440. }, {
  63441. "operator" : "OR",
  63442. "children" : [ ],
  63443. "cpe_match" : [ {
  63444. "vulnerable" : true,
  63445. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
  63446. "cpe_name" : [ ]
  63447. } ]
  63448. } ]
  63449. },
  63450. "impact" : {
  63451. "baseMetricV3" : {
  63452. "cvssV3" : {
  63453. "version" : "3.1",
  63454. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
  63455. "attackVector" : "NETWORK",
  63456. "attackComplexity" : "LOW",
  63457. "privilegesRequired" : "NONE",
  63458. "userInteraction" : "NONE",
  63459. "scope" : "UNCHANGED",
  63460. "confidentialityImpact" : "LOW",
  63461. "integrityImpact" : "NONE",
  63462. "availabilityImpact" : "LOW",
  63463. "baseScore" : 6.5,
  63464. "baseSeverity" : "MEDIUM"
  63465. },
  63466. "exploitabilityScore" : 3.9,
  63467. "impactScore" : 2.5
  63468. },
  63469. "baseMetricV2" : {
  63470. "cvssV2" : {
  63471. "version" : "2.0",
  63472. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:P",
  63473. "accessVector" : "NETWORK",
  63474. "accessComplexity" : "LOW",
  63475. "authentication" : "NONE",
  63476. "confidentialityImpact" : "PARTIAL",
  63477. "integrityImpact" : "NONE",
  63478. "availabilityImpact" : "PARTIAL",
  63479. "baseScore" : 6.4
  63480. },
  63481. "severity" : "MEDIUM",
  63482. "exploitabilityScore" : 10.0,
  63483. "impactScore" : 4.9,
  63484. "acInsufInfo" : false,
  63485. "obtainAllPrivilege" : false,
  63486. "obtainUserPrivilege" : false,
  63487. "obtainOtherPrivilege" : false,
  63488. "userInteractionRequired" : false
  63489. }
  63490. },
  63491. "publishedDate" : "2021-04-08T23:15Z",
  63492. "lastModifiedDate" : "2021-05-04T03:15Z"
  63493. }, {
  63494. "cve" : {
  63495. "data_type" : "CVE",
  63496. "data_format" : "MITRE",
  63497. "data_version" : "4.0",
  63498. "CVE_data_meta" : {
  63499. "ID" : "CVE-2021-3448",
  63500. "ASSIGNER" : "secalert@redhat.com"
  63501. },
  63502. "problemtype" : {
  63503. "problemtype_data" : [ {
  63504. "description" : [ {
  63505. "lang" : "en",
  63506. "value" : "CWE-358"
  63507. } ]
  63508. } ]
  63509. },
  63510. "references" : {
  63511. "reference_data" : [ {
  63512. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1939368",
  63513. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1939368",
  63514. "refsource" : "MISC",
  63515. "tags" : [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
  63516. }, {
  63517. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHURNEHHUBSW45KMIZ4FNBCSUPWPGV5V/",
  63518. "name" : "FEDORA-2021-62a5062b2d",
  63519. "refsource" : "FEDORA",
  63520. "tags" : [ "Third Party Advisory" ]
  63521. }, {
  63522. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FHG7GWSQWKF7JXIMLOGJBKZWBB4VIAJ7/",
  63523. "name" : "FEDORA-2021-9433bedebd",
  63524. "refsource" : "FEDORA",
  63525. "tags" : [ "Third Party Advisory" ]
  63526. }, {
  63527. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVTJUOFFFHINLKWAOC2ZSC5MOPD4SJ24/",
  63528. "name" : "FEDORA-2021-5cd2571751",
  63529. "refsource" : "FEDORA",
  63530. "tags" : [ "Third Party Advisory" ]
  63531. } ]
  63532. },
  63533. "description" : {
  63534. "description_data" : [ {
  63535. "lang" : "en",
  63536. "value" : "A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity."
  63537. } ]
  63538. }
  63539. },
  63540. "configurations" : {
  63541. "CVE_data_version" : "4.0",
  63542. "nodes" : [ {
  63543. "operator" : "OR",
  63544. "children" : [ ],
  63545. "cpe_match" : [ {
  63546. "vulnerable" : true,
  63547. "cpe23Uri" : "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*",
  63548. "versionEndExcluding" : "2.85",
  63549. "cpe_name" : [ ]
  63550. } ]
  63551. }, {
  63552. "operator" : "OR",
  63553. "children" : [ ],
  63554. "cpe_match" : [ {
  63555. "vulnerable" : true,
  63556. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
  63557. "cpe_name" : [ ]
  63558. } ]
  63559. }, {
  63560. "operator" : "OR",
  63561. "children" : [ ],
  63562. "cpe_match" : [ {
  63563. "vulnerable" : true,
  63564. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  63565. "cpe_name" : [ ]
  63566. }, {
  63567. "vulnerable" : true,
  63568. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  63569. "cpe_name" : [ ]
  63570. }, {
  63571. "vulnerable" : true,
  63572. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  63573. "cpe_name" : [ ]
  63574. } ]
  63575. } ]
  63576. },
  63577. "impact" : {
  63578. "baseMetricV3" : {
  63579. "cvssV3" : {
  63580. "version" : "3.1",
  63581. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
  63582. "attackVector" : "NETWORK",
  63583. "attackComplexity" : "HIGH",
  63584. "privilegesRequired" : "NONE",
  63585. "userInteraction" : "NONE",
  63586. "scope" : "CHANGED",
  63587. "confidentialityImpact" : "NONE",
  63588. "integrityImpact" : "LOW",
  63589. "availabilityImpact" : "NONE",
  63590. "baseScore" : 4.0,
  63591. "baseSeverity" : "MEDIUM"
  63592. },
  63593. "exploitabilityScore" : 2.2,
  63594. "impactScore" : 1.4
  63595. },
  63596. "baseMetricV2" : {
  63597. "cvssV2" : {
  63598. "version" : "2.0",
  63599. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  63600. "accessVector" : "NETWORK",
  63601. "accessComplexity" : "MEDIUM",
  63602. "authentication" : "NONE",
  63603. "confidentialityImpact" : "NONE",
  63604. "integrityImpact" : "PARTIAL",
  63605. "availabilityImpact" : "NONE",
  63606. "baseScore" : 4.3
  63607. },
  63608. "severity" : "MEDIUM",
  63609. "exploitabilityScore" : 8.6,
  63610. "impactScore" : 2.9,
  63611. "acInsufInfo" : false,
  63612. "obtainAllPrivilege" : false,
  63613. "obtainUserPrivilege" : false,
  63614. "obtainOtherPrivilege" : false,
  63615. "userInteractionRequired" : false
  63616. }
  63617. },
  63618. "publishedDate" : "2021-04-08T23:15Z",
  63619. "lastModifiedDate" : "2021-05-04T19:14Z"
  63620. }, {
  63621. "cve" : {
  63622. "data_type" : "CVE",
  63623. "data_format" : "MITRE",
  63624. "data_version" : "4.0",
  63625. "CVE_data_meta" : {
  63626. "ID" : "CVE-2021-29154",
  63627. "ASSIGNER" : "cve@mitre.org"
  63628. },
  63629. "problemtype" : {
  63630. "problemtype_data" : [ {
  63631. "description" : [ {
  63632. "lang" : "en",
  63633. "value" : "CWE-77"
  63634. } ]
  63635. } ]
  63636. },
  63637. "references" : {
  63638. "reference_data" : [ {
  63639. "url" : "https://www.openwall.com/lists/oss-security/2021/04/08/1",
  63640. "name" : "https://www.openwall.com/lists/oss-security/2021/04/08/1",
  63641. "refsource" : "MISC",
  63642. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  63643. }, {
  63644. "url" : "https://news.ycombinator.com/item?id=26757760",
  63645. "name" : "https://news.ycombinator.com/item?id=26757760",
  63646. "refsource" : "MISC",
  63647. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  63648. }, {
  63649. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5YFGIIF24475A2LNW3UWHW2SNCS3G7M/",
  63650. "name" : "FEDORA-2021-e71c033f88",
  63651. "refsource" : "FEDORA",
  63652. "tags" : [ "Third Party Advisory" ]
  63653. }, {
  63654. "url" : "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html",
  63655. "name" : "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html",
  63656. "refsource" : "MISC",
  63657. "tags" : [ ]
  63658. } ]
  63659. },
  63660. "description" : {
  63661. "description_data" : [ {
  63662. "lang" : "en",
  63663. "value" : "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c."
  63664. } ]
  63665. }
  63666. },
  63667. "configurations" : {
  63668. "CVE_data_version" : "4.0",
  63669. "nodes" : [ {
  63670. "operator" : "OR",
  63671. "children" : [ ],
  63672. "cpe_match" : [ {
  63673. "vulnerable" : true,
  63674. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
  63675. "versionEndIncluding" : "5.11.12",
  63676. "cpe_name" : [ ]
  63677. } ]
  63678. }, {
  63679. "operator" : "OR",
  63680. "children" : [ ],
  63681. "cpe_match" : [ {
  63682. "vulnerable" : true,
  63683. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  63684. "cpe_name" : [ ]
  63685. } ]
  63686. } ]
  63687. },
  63688. "impact" : {
  63689. "baseMetricV3" : {
  63690. "cvssV3" : {
  63691. "version" : "3.1",
  63692. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  63693. "attackVector" : "LOCAL",
  63694. "attackComplexity" : "LOW",
  63695. "privilegesRequired" : "LOW",
  63696. "userInteraction" : "NONE",
  63697. "scope" : "UNCHANGED",
  63698. "confidentialityImpact" : "HIGH",
  63699. "integrityImpact" : "HIGH",
  63700. "availabilityImpact" : "HIGH",
  63701. "baseScore" : 7.8,
  63702. "baseSeverity" : "HIGH"
  63703. },
  63704. "exploitabilityScore" : 1.8,
  63705. "impactScore" : 5.9
  63706. },
  63707. "baseMetricV2" : {
  63708. "cvssV2" : {
  63709. "version" : "2.0",
  63710. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  63711. "accessVector" : "LOCAL",
  63712. "accessComplexity" : "LOW",
  63713. "authentication" : "NONE",
  63714. "confidentialityImpact" : "COMPLETE",
  63715. "integrityImpact" : "COMPLETE",
  63716. "availabilityImpact" : "COMPLETE",
  63717. "baseScore" : 7.2
  63718. },
  63719. "severity" : "HIGH",
  63720. "exploitabilityScore" : 3.9,
  63721. "impactScore" : 10.0,
  63722. "acInsufInfo" : false,
  63723. "obtainAllPrivilege" : false,
  63724. "obtainUserPrivilege" : false,
  63725. "obtainOtherPrivilege" : false,
  63726. "userInteractionRequired" : false
  63727. }
  63728. },
  63729. "publishedDate" : "2021-04-08T21:15Z",
  63730. "lastModifiedDate" : "2021-05-03T23:15Z"
  63731. }, {
  63732. "cve" : {
  63733. "data_type" : "CVE",
  63734. "data_format" : "MITRE",
  63735. "data_version" : "4.0",
  63736. "CVE_data_meta" : {
  63737. "ID" : "CVE-2021-21425",
  63738. "ASSIGNER" : "security-advisories@github.com"
  63739. },
  63740. "problemtype" : {
  63741. "problemtype_data" : [ {
  63742. "description" : [ {
  63743. "lang" : "en",
  63744. "value" : "CWE-284"
  63745. } ]
  63746. } ]
  63747. },
  63748. "references" : {
  63749. "reference_data" : [ {
  63750. "url" : "https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/",
  63751. "name" : "https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/",
  63752. "refsource" : "MISC",
  63753. "tags" : [ "Exploit", "Third Party Advisory" ]
  63754. }, {
  63755. "url" : "https://github.com/getgrav/grav-plugin-admin/security/advisories/GHSA-6f53-6qgv-39pj",
  63756. "name" : "https://github.com/getgrav/grav-plugin-admin/security/advisories/GHSA-6f53-6qgv-39pj",
  63757. "refsource" : "CONFIRM",
  63758. "tags" : [ "Third Party Advisory" ]
  63759. }, {
  63760. "url" : "http://packetstormsecurity.com/files/162283/GravCMS-1.10.7-Remote-Command-Execution.html",
  63761. "name" : "http://packetstormsecurity.com/files/162283/GravCMS-1.10.7-Remote-Command-Execution.html",
  63762. "refsource" : "MISC",
  63763. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  63764. }, {
  63765. "url" : "http://packetstormsecurity.com/files/162457/GravCMS-1.10.7-Remote-Command-Execution.html",
  63766. "name" : "http://packetstormsecurity.com/files/162457/GravCMS-1.10.7-Remote-Command-Execution.html",
  63767. "refsource" : "MISC",
  63768. "tags" : [ "Third Party Advisory" ]
  63769. } ]
  63770. },
  63771. "description" : {
  63772. "description_data" : [ {
  63773. "lang" : "en",
  63774. "value" : "Grav Admin Plugin is an HTML user interface that provides a way to configure Grav and create and modify pages. In versions 1.10.7 and earlier, an unauthenticated user can execute some methods of administrator controller without needing any credentials. Particular method execution will result in arbitrary YAML file creation or content change of existing YAML files on the system. Successfully exploitation of that vulnerability results in configuration changes, such as general site information change, custom scheduler job definition, etc. Due to the nature of the vulnerability, an adversary can change some part of the webpage, or hijack an administrator account, or execute operating system command under the context of the web-server user. This vulnerability is fixed in version 1.10.8. Blocking access to the `/admin` path from untrusted sources can be applied as a workaround."
  63775. } ]
  63776. }
  63777. },
  63778. "configurations" : {
  63779. "CVE_data_version" : "4.0",
  63780. "nodes" : [ {
  63781. "operator" : "OR",
  63782. "children" : [ ],
  63783. "cpe_match" : [ {
  63784. "vulnerable" : true,
  63785. "cpe23Uri" : "cpe:2.3:a:getgrav:grav-plugin-admin:*:*:*:*:*:*:*:*",
  63786. "versionEndExcluding" : "1.10.8",
  63787. "cpe_name" : [ ]
  63788. } ]
  63789. } ]
  63790. },
  63791. "impact" : {
  63792. "baseMetricV3" : {
  63793. "cvssV3" : {
  63794. "version" : "3.1",
  63795. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  63796. "attackVector" : "NETWORK",
  63797. "attackComplexity" : "LOW",
  63798. "privilegesRequired" : "NONE",
  63799. "userInteraction" : "NONE",
  63800. "scope" : "UNCHANGED",
  63801. "confidentialityImpact" : "HIGH",
  63802. "integrityImpact" : "HIGH",
  63803. "availabilityImpact" : "HIGH",
  63804. "baseScore" : 9.8,
  63805. "baseSeverity" : "CRITICAL"
  63806. },
  63807. "exploitabilityScore" : 3.9,
  63808. "impactScore" : 5.9
  63809. },
  63810. "baseMetricV2" : {
  63811. "cvssV2" : {
  63812. "version" : "2.0",
  63813. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  63814. "accessVector" : "NETWORK",
  63815. "accessComplexity" : "LOW",
  63816. "authentication" : "NONE",
  63817. "confidentialityImpact" : "PARTIAL",
  63818. "integrityImpact" : "PARTIAL",
  63819. "availabilityImpact" : "PARTIAL",
  63820. "baseScore" : 7.5
  63821. },
  63822. "severity" : "HIGH",
  63823. "exploitabilityScore" : 10.0,
  63824. "impactScore" : 6.4,
  63825. "acInsufInfo" : false,
  63826. "obtainAllPrivilege" : false,
  63827. "obtainUserPrivilege" : false,
  63828. "obtainOtherPrivilege" : false,
  63829. "userInteractionRequired" : false
  63830. }
  63831. },
  63832. "publishedDate" : "2021-04-07T19:15Z",
  63833. "lastModifiedDate" : "2021-05-05T14:24Z"
  63834. }, {
  63835. "cve" : {
  63836. "data_type" : "CVE",
  63837. "data_format" : "MITRE",
  63838. "data_version" : "4.0",
  63839. "CVE_data_meta" : {
  63840. "ID" : "CVE-2021-30184",
  63841. "ASSIGNER" : "cve@mitre.org"
  63842. },
  63843. "problemtype" : {
  63844. "problemtype_data" : [ {
  63845. "description" : [ {
  63846. "lang" : "en",
  63847. "value" : "CWE-120"
  63848. } ]
  63849. } ]
  63850. },
  63851. "references" : {
  63852. "reference_data" : [ {
  63853. "url" : "https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html",
  63854. "name" : "https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html",
  63855. "refsource" : "MISC",
  63856. "tags" : [ "Exploit", "Mailing List", "Patch", "Vendor Advisory" ]
  63857. }, {
  63858. "url" : "https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html",
  63859. "name" : "https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html",
  63860. "refsource" : "MISC",
  63861. "tags" : [ "Exploit", "Mailing List", "Vendor Advisory" ]
  63862. }, {
  63863. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXOTMUSBVUZNA3JMPG6BU37DQW2YOJWS/",
  63864. "name" : "FEDORA-2021-a58cb9bc7a",
  63865. "refsource" : "FEDORA",
  63866. "tags" : [ "Third Party Advisory" ]
  63867. }, {
  63868. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QC74RWMDLSQGV6Z3ZABNTPABB33S4YNF/",
  63869. "name" : "FEDORA-2021-2c714d311f",
  63870. "refsource" : "FEDORA",
  63871. "tags" : [ "Third Party Advisory" ]
  63872. }, {
  63873. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOGPLC77ZL2FACSOE5MWDS3YH3RBNQAQ/",
  63874. "name" : "FEDORA-2021-ff3297913b",
  63875. "refsource" : "FEDORA",
  63876. "tags" : [ "Third Party Advisory" ]
  63877. } ]
  63878. },
  63879. "description" : {
  63880. "description_data" : [ {
  63881. "lang" : "en",
  63882. "value" : "GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc."
  63883. } ]
  63884. }
  63885. },
  63886. "configurations" : {
  63887. "CVE_data_version" : "4.0",
  63888. "nodes" : [ {
  63889. "operator" : "OR",
  63890. "children" : [ ],
  63891. "cpe_match" : [ {
  63892. "vulnerable" : true,
  63893. "cpe23Uri" : "cpe:2.3:a:gnu:chess:6.2.7:*:*:*:*:*:*:*",
  63894. "cpe_name" : [ ]
  63895. } ]
  63896. }, {
  63897. "operator" : "OR",
  63898. "children" : [ ],
  63899. "cpe_match" : [ {
  63900. "vulnerable" : true,
  63901. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  63902. "cpe_name" : [ ]
  63903. }, {
  63904. "vulnerable" : true,
  63905. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  63906. "cpe_name" : [ ]
  63907. }, {
  63908. "vulnerable" : true,
  63909. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  63910. "cpe_name" : [ ]
  63911. } ]
  63912. } ]
  63913. },
  63914. "impact" : {
  63915. "baseMetricV3" : {
  63916. "cvssV3" : {
  63917. "version" : "3.1",
  63918. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  63919. "attackVector" : "LOCAL",
  63920. "attackComplexity" : "LOW",
  63921. "privilegesRequired" : "NONE",
  63922. "userInteraction" : "REQUIRED",
  63923. "scope" : "UNCHANGED",
  63924. "confidentialityImpact" : "HIGH",
  63925. "integrityImpact" : "HIGH",
  63926. "availabilityImpact" : "HIGH",
  63927. "baseScore" : 7.8,
  63928. "baseSeverity" : "HIGH"
  63929. },
  63930. "exploitabilityScore" : 1.8,
  63931. "impactScore" : 5.9
  63932. },
  63933. "baseMetricV2" : {
  63934. "cvssV2" : {
  63935. "version" : "2.0",
  63936. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  63937. "accessVector" : "NETWORK",
  63938. "accessComplexity" : "MEDIUM",
  63939. "authentication" : "NONE",
  63940. "confidentialityImpact" : "PARTIAL",
  63941. "integrityImpact" : "PARTIAL",
  63942. "availabilityImpact" : "PARTIAL",
  63943. "baseScore" : 6.8
  63944. },
  63945. "severity" : "MEDIUM",
  63946. "exploitabilityScore" : 8.6,
  63947. "impactScore" : 6.4,
  63948. "acInsufInfo" : false,
  63949. "obtainAllPrivilege" : false,
  63950. "obtainUserPrivilege" : false,
  63951. "obtainOtherPrivilege" : false,
  63952. "userInteractionRequired" : true
  63953. }
  63954. },
  63955. "publishedDate" : "2021-04-07T12:15Z",
  63956. "lastModifiedDate" : "2021-05-04T13:35Z"
  63957. }, {
  63958. "cve" : {
  63959. "data_type" : "CVE",
  63960. "data_format" : "MITRE",
  63961. "data_version" : "4.0",
  63962. "CVE_data_meta" : {
  63963. "ID" : "CVE-2020-36309",
  63964. "ASSIGNER" : "cve@mitre.org"
  63965. },
  63966. "problemtype" : {
  63967. "problemtype_data" : [ {
  63968. "description" : [ {
  63969. "lang" : "en",
  63970. "value" : "NVD-CWE-noinfo"
  63971. } ]
  63972. } ]
  63973. },
  63974. "references" : {
  63975. "reference_data" : [ {
  63976. "url" : "https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16",
  63977. "name" : "https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16",
  63978. "refsource" : "MISC",
  63979. "tags" : [ "Patch", "Third Party Advisory" ]
  63980. }, {
  63981. "url" : "https://github.com/openresty/lua-nginx-module/pull/1654",
  63982. "name" : "https://github.com/openresty/lua-nginx-module/pull/1654",
  63983. "refsource" : "MISC",
  63984. "tags" : [ "Patch", "Third Party Advisory" ]
  63985. }, {
  63986. "url" : "https://news.ycombinator.com/item?id=26712562",
  63987. "name" : "https://news.ycombinator.com/item?id=26712562",
  63988. "refsource" : "MISC",
  63989. "tags" : [ "Third Party Advisory" ]
  63990. }, {
  63991. "url" : "https://security.netapp.com/advisory/ntap-20210507-0005/",
  63992. "name" : "https://security.netapp.com/advisory/ntap-20210507-0005/",
  63993. "refsource" : "CONFIRM",
  63994. "tags" : [ ]
  63995. } ]
  63996. },
  63997. "description" : {
  63998. "description_data" : [ {
  63999. "lang" : "en",
  64000. "value" : "ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or a request or response header."
  64001. } ]
  64002. }
  64003. },
  64004. "configurations" : {
  64005. "CVE_data_version" : "4.0",
  64006. "nodes" : [ {
  64007. "operator" : "OR",
  64008. "children" : [ ],
  64009. "cpe_match" : [ {
  64010. "vulnerable" : true,
  64011. "cpe23Uri" : "cpe:2.3:a:openresty:lua-nginx-module:*:*:*:*:*:*:*:*",
  64012. "versionEndExcluding" : "0.10.16",
  64013. "cpe_name" : [ ]
  64014. } ]
  64015. } ]
  64016. },
  64017. "impact" : {
  64018. "baseMetricV3" : {
  64019. "cvssV3" : {
  64020. "version" : "3.1",
  64021. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
  64022. "attackVector" : "NETWORK",
  64023. "attackComplexity" : "LOW",
  64024. "privilegesRequired" : "NONE",
  64025. "userInteraction" : "NONE",
  64026. "scope" : "UNCHANGED",
  64027. "confidentialityImpact" : "NONE",
  64028. "integrityImpact" : "LOW",
  64029. "availabilityImpact" : "NONE",
  64030. "baseScore" : 5.3,
  64031. "baseSeverity" : "MEDIUM"
  64032. },
  64033. "exploitabilityScore" : 3.9,
  64034. "impactScore" : 1.4
  64035. },
  64036. "baseMetricV2" : {
  64037. "cvssV2" : {
  64038. "version" : "2.0",
  64039. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  64040. "accessVector" : "NETWORK",
  64041. "accessComplexity" : "LOW",
  64042. "authentication" : "NONE",
  64043. "confidentialityImpact" : "NONE",
  64044. "integrityImpact" : "PARTIAL",
  64045. "availabilityImpact" : "NONE",
  64046. "baseScore" : 5.0
  64047. },
  64048. "severity" : "MEDIUM",
  64049. "exploitabilityScore" : 10.0,
  64050. "impactScore" : 2.9,
  64051. "acInsufInfo" : false,
  64052. "obtainAllPrivilege" : false,
  64053. "obtainUserPrivilege" : false,
  64054. "obtainOtherPrivilege" : false,
  64055. "userInteractionRequired" : false
  64056. }
  64057. },
  64058. "publishedDate" : "2021-04-06T19:15Z",
  64059. "lastModifiedDate" : "2021-05-07T05:15Z"
  64060. }, {
  64061. "cve" : {
  64062. "data_type" : "CVE",
  64063. "data_format" : "MITRE",
  64064. "data_version" : "4.0",
  64065. "CVE_data_meta" : {
  64066. "ID" : "CVE-2021-30158",
  64067. "ASSIGNER" : "cve@mitre.org"
  64068. },
  64069. "problemtype" : {
  64070. "problemtype_data" : [ {
  64071. "description" : [ {
  64072. "lang" : "en",
  64073. "value" : "CWE-287"
  64074. } ]
  64075. } ]
  64076. },
  64077. "references" : {
  64078. "reference_data" : [ {
  64079. "url" : "https://phabricator.wikimedia.org/T277009",
  64080. "name" : "https://phabricator.wikimedia.org/T277009",
  64081. "refsource" : "MISC",
  64082. "tags" : [ "Exploit", "Vendor Advisory" ]
  64083. }, {
  64084. "url" : "https://www.debian.org/security/2021/dsa-4889",
  64085. "name" : "DSA-4889",
  64086. "refsource" : "DEBIAN",
  64087. "tags" : [ "Third Party Advisory" ]
  64088. }, {
  64089. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/",
  64090. "name" : "FEDORA-2021-f4223b6684",
  64091. "refsource" : "FEDORA",
  64092. "tags" : [ "Third Party Advisory" ]
  64093. }, {
  64094. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/",
  64095. "name" : "FEDORA-2021-d298103d3a",
  64096. "refsource" : "FEDORA",
  64097. "tags" : [ "Third Party Advisory" ]
  64098. }, {
  64099. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html",
  64100. "name" : "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update",
  64101. "refsource" : "MLIST",
  64102. "tags" : [ ]
  64103. }, {
  64104. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html",
  64105. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update",
  64106. "refsource" : "MLIST",
  64107. "tags" : [ ]
  64108. } ]
  64109. },
  64110. "description" : {
  64111. "description_data" : [ {
  64112. "lang" : "en",
  64113. "value" : "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Blocked users are unable to use Special:ResetTokens. This has security relevance because a blocked user might have accidentally shared a token, or might know that a token has been compromised, and yet is not able to block any potential future use of the token by an unauthorized party."
  64114. } ]
  64115. }
  64116. },
  64117. "configurations" : {
  64118. "CVE_data_version" : "4.0",
  64119. "nodes" : [ {
  64120. "operator" : "OR",
  64121. "children" : [ ],
  64122. "cpe_match" : [ {
  64123. "vulnerable" : true,
  64124. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  64125. "versionEndExcluding" : "1.31.12",
  64126. "cpe_name" : [ ]
  64127. }, {
  64128. "vulnerable" : true,
  64129. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  64130. "versionStartIncluding" : "1.32.0",
  64131. "versionEndExcluding" : "1.35.2",
  64132. "cpe_name" : [ ]
  64133. } ]
  64134. }, {
  64135. "operator" : "OR",
  64136. "children" : [ ],
  64137. "cpe_match" : [ {
  64138. "vulnerable" : true,
  64139. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  64140. "cpe_name" : [ ]
  64141. } ]
  64142. }, {
  64143. "operator" : "OR",
  64144. "children" : [ ],
  64145. "cpe_match" : [ {
  64146. "vulnerable" : true,
  64147. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  64148. "cpe_name" : [ ]
  64149. }, {
  64150. "vulnerable" : true,
  64151. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  64152. "cpe_name" : [ ]
  64153. } ]
  64154. } ]
  64155. },
  64156. "impact" : {
  64157. "baseMetricV3" : {
  64158. "cvssV3" : {
  64159. "version" : "3.1",
  64160. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  64161. "attackVector" : "NETWORK",
  64162. "attackComplexity" : "LOW",
  64163. "privilegesRequired" : "NONE",
  64164. "userInteraction" : "NONE",
  64165. "scope" : "UNCHANGED",
  64166. "confidentialityImpact" : "LOW",
  64167. "integrityImpact" : "NONE",
  64168. "availabilityImpact" : "NONE",
  64169. "baseScore" : 5.3,
  64170. "baseSeverity" : "MEDIUM"
  64171. },
  64172. "exploitabilityScore" : 3.9,
  64173. "impactScore" : 1.4
  64174. },
  64175. "baseMetricV2" : {
  64176. "cvssV2" : {
  64177. "version" : "2.0",
  64178. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  64179. "accessVector" : "NETWORK",
  64180. "accessComplexity" : "LOW",
  64181. "authentication" : "NONE",
  64182. "confidentialityImpact" : "PARTIAL",
  64183. "integrityImpact" : "NONE",
  64184. "availabilityImpact" : "NONE",
  64185. "baseScore" : 5.0
  64186. },
  64187. "severity" : "MEDIUM",
  64188. "exploitabilityScore" : 10.0,
  64189. "impactScore" : 2.9,
  64190. "acInsufInfo" : false,
  64191. "obtainAllPrivilege" : false,
  64192. "obtainUserPrivilege" : false,
  64193. "obtainOtherPrivilege" : false,
  64194. "userInteractionRequired" : false
  64195. }
  64196. },
  64197. "publishedDate" : "2021-04-06T07:15Z",
  64198. "lastModifiedDate" : "2021-05-06T23:15Z"
  64199. }, {
  64200. "cve" : {
  64201. "data_type" : "CVE",
  64202. "data_format" : "MITRE",
  64203. "data_version" : "4.0",
  64204. "CVE_data_meta" : {
  64205. "ID" : "CVE-2021-30157",
  64206. "ASSIGNER" : "cve@mitre.org"
  64207. },
  64208. "problemtype" : {
  64209. "problemtype_data" : [ {
  64210. "description" : [ {
  64211. "lang" : "en",
  64212. "value" : "CWE-79"
  64213. } ]
  64214. } ]
  64215. },
  64216. "references" : {
  64217. "reference_data" : [ {
  64218. "url" : "https://phabricator.wikimedia.org/T278058",
  64219. "name" : "https://phabricator.wikimedia.org/T278058",
  64220. "refsource" : "MISC",
  64221. "tags" : [ "Exploit", "Patch", "Vendor Advisory" ]
  64222. }, {
  64223. "url" : "https://www.debian.org/security/2021/dsa-4889",
  64224. "name" : "DSA-4889",
  64225. "refsource" : "DEBIAN",
  64226. "tags" : [ "Third Party Advisory" ]
  64227. }, {
  64228. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/",
  64229. "name" : "FEDORA-2021-f4223b6684",
  64230. "refsource" : "FEDORA",
  64231. "tags" : [ "Third Party Advisory" ]
  64232. }, {
  64233. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/",
  64234. "name" : "FEDORA-2021-d298103d3a",
  64235. "refsource" : "FEDORA",
  64236. "tags" : [ "Third Party Advisory" ]
  64237. } ]
  64238. },
  64239. "description" : {
  64240. "description_data" : [ {
  64241. "lang" : "en",
  64242. "value" : "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On ChangesList special pages such as Special:RecentChanges and Special:Watchlist, some of the rcfilters-filter-* label messages are output in HTML unescaped, leading to XSS."
  64243. } ]
  64244. }
  64245. },
  64246. "configurations" : {
  64247. "CVE_data_version" : "4.0",
  64248. "nodes" : [ {
  64249. "operator" : "OR",
  64250. "children" : [ ],
  64251. "cpe_match" : [ {
  64252. "vulnerable" : true,
  64253. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  64254. "versionEndExcluding" : "1.31.12",
  64255. "cpe_name" : [ ]
  64256. }, {
  64257. "vulnerable" : true,
  64258. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  64259. "versionStartIncluding" : "1.32.0",
  64260. "versionEndExcluding" : "1.35.2",
  64261. "cpe_name" : [ ]
  64262. } ]
  64263. }, {
  64264. "operator" : "OR",
  64265. "children" : [ ],
  64266. "cpe_match" : [ {
  64267. "vulnerable" : true,
  64268. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  64269. "cpe_name" : [ ]
  64270. } ]
  64271. }, {
  64272. "operator" : "OR",
  64273. "children" : [ ],
  64274. "cpe_match" : [ {
  64275. "vulnerable" : true,
  64276. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  64277. "cpe_name" : [ ]
  64278. }, {
  64279. "vulnerable" : true,
  64280. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  64281. "cpe_name" : [ ]
  64282. } ]
  64283. } ]
  64284. },
  64285. "impact" : {
  64286. "baseMetricV3" : {
  64287. "cvssV3" : {
  64288. "version" : "3.1",
  64289. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  64290. "attackVector" : "NETWORK",
  64291. "attackComplexity" : "LOW",
  64292. "privilegesRequired" : "NONE",
  64293. "userInteraction" : "REQUIRED",
  64294. "scope" : "CHANGED",
  64295. "confidentialityImpact" : "LOW",
  64296. "integrityImpact" : "LOW",
  64297. "availabilityImpact" : "NONE",
  64298. "baseScore" : 6.1,
  64299. "baseSeverity" : "MEDIUM"
  64300. },
  64301. "exploitabilityScore" : 2.8,
  64302. "impactScore" : 2.7
  64303. },
  64304. "baseMetricV2" : {
  64305. "cvssV2" : {
  64306. "version" : "2.0",
  64307. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  64308. "accessVector" : "NETWORK",
  64309. "accessComplexity" : "MEDIUM",
  64310. "authentication" : "NONE",
  64311. "confidentialityImpact" : "NONE",
  64312. "integrityImpact" : "PARTIAL",
  64313. "availabilityImpact" : "NONE",
  64314. "baseScore" : 4.3
  64315. },
  64316. "severity" : "MEDIUM",
  64317. "exploitabilityScore" : 8.6,
  64318. "impactScore" : 2.9,
  64319. "acInsufInfo" : false,
  64320. "obtainAllPrivilege" : false,
  64321. "obtainUserPrivilege" : false,
  64322. "obtainOtherPrivilege" : false,
  64323. "userInteractionRequired" : true
  64324. }
  64325. },
  64326. "publishedDate" : "2021-04-06T07:15Z",
  64327. "lastModifiedDate" : "2021-05-03T19:55Z"
  64328. }, {
  64329. "cve" : {
  64330. "data_type" : "CVE",
  64331. "data_format" : "MITRE",
  64332. "data_version" : "4.0",
  64333. "CVE_data_meta" : {
  64334. "ID" : "CVE-2021-30154",
  64335. "ASSIGNER" : "cve@mitre.org"
  64336. },
  64337. "problemtype" : {
  64338. "problemtype_data" : [ {
  64339. "description" : [ {
  64340. "lang" : "en",
  64341. "value" : "CWE-79"
  64342. } ]
  64343. } ]
  64344. },
  64345. "references" : {
  64346. "reference_data" : [ {
  64347. "url" : "https://phabricator.wikimedia.org/T278014",
  64348. "name" : "https://phabricator.wikimedia.org/T278014",
  64349. "refsource" : "MISC",
  64350. "tags" : [ "Exploit", "Patch", "Vendor Advisory" ]
  64351. }, {
  64352. "url" : "https://www.debian.org/security/2021/dsa-4889",
  64353. "name" : "DSA-4889",
  64354. "refsource" : "DEBIAN",
  64355. "tags" : [ "Third Party Advisory" ]
  64356. }, {
  64357. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/",
  64358. "name" : "FEDORA-2021-f4223b6684",
  64359. "refsource" : "FEDORA",
  64360. "tags" : [ "Third Party Advisory" ]
  64361. }, {
  64362. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/",
  64363. "name" : "FEDORA-2021-d298103d3a",
  64364. "refsource" : "FEDORA",
  64365. "tags" : [ "Third Party Advisory" ]
  64366. } ]
  64367. },
  64368. "description" : {
  64369. "description_data" : [ {
  64370. "lang" : "en",
  64371. "value" : "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On Special:NewFiles, all the mediastatistics-header-* messages are output in HTML unescaped, leading to XSS."
  64372. } ]
  64373. }
  64374. },
  64375. "configurations" : {
  64376. "CVE_data_version" : "4.0",
  64377. "nodes" : [ {
  64378. "operator" : "OR",
  64379. "children" : [ ],
  64380. "cpe_match" : [ {
  64381. "vulnerable" : true,
  64382. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  64383. "versionEndExcluding" : "1.31.12",
  64384. "cpe_name" : [ ]
  64385. }, {
  64386. "vulnerable" : true,
  64387. "cpe23Uri" : "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
  64388. "versionStartIncluding" : "1.32.0",
  64389. "versionEndExcluding" : "1.35.2",
  64390. "cpe_name" : [ ]
  64391. } ]
  64392. }, {
  64393. "operator" : "OR",
  64394. "children" : [ ],
  64395. "cpe_match" : [ {
  64396. "vulnerable" : true,
  64397. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  64398. "cpe_name" : [ ]
  64399. } ]
  64400. }, {
  64401. "operator" : "OR",
  64402. "children" : [ ],
  64403. "cpe_match" : [ {
  64404. "vulnerable" : true,
  64405. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  64406. "cpe_name" : [ ]
  64407. }, {
  64408. "vulnerable" : true,
  64409. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  64410. "cpe_name" : [ ]
  64411. } ]
  64412. } ]
  64413. },
  64414. "impact" : {
  64415. "baseMetricV3" : {
  64416. "cvssV3" : {
  64417. "version" : "3.1",
  64418. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  64419. "attackVector" : "NETWORK",
  64420. "attackComplexity" : "LOW",
  64421. "privilegesRequired" : "NONE",
  64422. "userInteraction" : "REQUIRED",
  64423. "scope" : "CHANGED",
  64424. "confidentialityImpact" : "LOW",
  64425. "integrityImpact" : "LOW",
  64426. "availabilityImpact" : "NONE",
  64427. "baseScore" : 6.1,
  64428. "baseSeverity" : "MEDIUM"
  64429. },
  64430. "exploitabilityScore" : 2.8,
  64431. "impactScore" : 2.7
  64432. },
  64433. "baseMetricV2" : {
  64434. "cvssV2" : {
  64435. "version" : "2.0",
  64436. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  64437. "accessVector" : "NETWORK",
  64438. "accessComplexity" : "MEDIUM",
  64439. "authentication" : "NONE",
  64440. "confidentialityImpact" : "NONE",
  64441. "integrityImpact" : "PARTIAL",
  64442. "availabilityImpact" : "NONE",
  64443. "baseScore" : 4.3
  64444. },
  64445. "severity" : "MEDIUM",
  64446. "exploitabilityScore" : 8.6,
  64447. "impactScore" : 2.9,
  64448. "acInsufInfo" : false,
  64449. "obtainAllPrivilege" : false,
  64450. "obtainUserPrivilege" : false,
  64451. "obtainOtherPrivilege" : false,
  64452. "userInteractionRequired" : true
  64453. }
  64454. },
  64455. "publishedDate" : "2021-04-06T07:15Z",
  64456. "lastModifiedDate" : "2021-05-03T20:03Z"
  64457. }, {
  64458. "cve" : {
  64459. "data_type" : "CVE",
  64460. "data_format" : "MITRE",
  64461. "data_version" : "4.0",
  64462. "CVE_data_meta" : {
  64463. "ID" : "CVE-2021-24209",
  64464. "ASSIGNER" : "contact@wpscan.com"
  64465. },
  64466. "problemtype" : {
  64467. "problemtype_data" : [ {
  64468. "description" : [ {
  64469. "lang" : "en",
  64470. "value" : "CWE-20"
  64471. } ]
  64472. } ]
  64473. },
  64474. "references" : {
  64475. "reference_data" : [ {
  64476. "url" : "https://plugins.trac.wordpress.org/changeset/2496238/wp-super-cache",
  64477. "name" : "https://plugins.trac.wordpress.org/changeset/2496238/wp-super-cache",
  64478. "refsource" : "MISC",
  64479. "tags" : [ "Patch", "Third Party Advisory" ]
  64480. }, {
  64481. "url" : "https://m0ze.ru/vulnerability/[2021-03-13]-[WordPress]-[CWE-94]-WP-Super-Cache-WordPress-Plugin-v1.7.1.txt",
  64482. "name" : "https://m0ze.ru/vulnerability/[2021-03-13]-[WordPress]-[CWE-94]-WP-Super-Cache-WordPress-Plugin-v1.7.1.txt",
  64483. "refsource" : "MISC",
  64484. "tags" : [ "Exploit", "Third Party Advisory" ]
  64485. }, {
  64486. "url" : "https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3",
  64487. "name" : "https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3",
  64488. "refsource" : "CONFIRM",
  64489. "tags" : [ "Exploit", "Third Party Advisory" ]
  64490. } ]
  64491. },
  64492. "description" : {
  64493. "description_data" : [ {
  64494. "lang" : "en",
  64495. "value" : "The WP Super Cache WordPress plugin before 1.7.2 was affected by an authenticated (admin+) RCE in the settings page due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection."
  64496. } ]
  64497. }
  64498. },
  64499. "configurations" : {
  64500. "CVE_data_version" : "4.0",
  64501. "nodes" : [ {
  64502. "operator" : "OR",
  64503. "children" : [ ],
  64504. "cpe_match" : [ {
  64505. "vulnerable" : true,
  64506. "cpe23Uri" : "cpe:2.3:a:automattic:wp_super_cache:*:*:*:*:*:wordpress:*:*",
  64507. "versionEndExcluding" : "1.7.2",
  64508. "cpe_name" : [ ]
  64509. } ]
  64510. } ]
  64511. },
  64512. "impact" : {
  64513. "baseMetricV3" : {
  64514. "cvssV3" : {
  64515. "version" : "3.1",
  64516. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  64517. "attackVector" : "NETWORK",
  64518. "attackComplexity" : "LOW",
  64519. "privilegesRequired" : "HIGH",
  64520. "userInteraction" : "NONE",
  64521. "scope" : "UNCHANGED",
  64522. "confidentialityImpact" : "HIGH",
  64523. "integrityImpact" : "HIGH",
  64524. "availabilityImpact" : "HIGH",
  64525. "baseScore" : 7.2,
  64526. "baseSeverity" : "HIGH"
  64527. },
  64528. "exploitabilityScore" : 1.2,
  64529. "impactScore" : 5.9
  64530. },
  64531. "baseMetricV2" : {
  64532. "cvssV2" : {
  64533. "version" : "2.0",
  64534. "vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C",
  64535. "accessVector" : "NETWORK",
  64536. "accessComplexity" : "LOW",
  64537. "authentication" : "SINGLE",
  64538. "confidentialityImpact" : "COMPLETE",
  64539. "integrityImpact" : "COMPLETE",
  64540. "availabilityImpact" : "COMPLETE",
  64541. "baseScore" : 9.0
  64542. },
  64543. "severity" : "HIGH",
  64544. "exploitabilityScore" : 8.0,
  64545. "impactScore" : 10.0,
  64546. "acInsufInfo" : false,
  64547. "obtainAllPrivilege" : false,
  64548. "obtainUserPrivilege" : false,
  64549. "obtainOtherPrivilege" : false,
  64550. "userInteractionRequired" : false
  64551. }
  64552. },
  64553. "publishedDate" : "2021-04-05T19:15Z",
  64554. "lastModifiedDate" : "2021-05-04T15:02Z"
  64555. }, {
  64556. "cve" : {
  64557. "data_type" : "CVE",
  64558. "data_format" : "MITRE",
  64559. "data_version" : "4.0",
  64560. "CVE_data_meta" : {
  64561. "ID" : "CVE-2021-24207",
  64562. "ASSIGNER" : "contact@wpscan.com"
  64563. },
  64564. "problemtype" : {
  64565. "problemtype_data" : [ {
  64566. "description" : [ {
  64567. "lang" : "en",
  64568. "value" : "CWE-863"
  64569. } ]
  64570. } ]
  64571. },
  64572. "references" : {
  64573. "reference_data" : [ {
  64574. "url" : "https://wpscan.com/vulnerability/21e7a46f-e9a3-4b20-b44a-a5b6ce7b7ce6",
  64575. "name" : "https://wpscan.com/vulnerability/21e7a46f-e9a3-4b20-b44a-a5b6ce7b7ce6",
  64576. "refsource" : "CONFIRM",
  64577. "tags" : [ "Exploit", "Third Party Advisory" ]
  64578. }, {
  64579. "url" : "https://www.themeum.com/wp-page-builder-updated-v1-2-4/",
  64580. "name" : "https://www.themeum.com/wp-page-builder-updated-v1-2-4/",
  64581. "refsource" : "MISC",
  64582. "tags" : [ "Vendor Advisory" ]
  64583. } ]
  64584. },
  64585. "description" : {
  64586. "description_data" : [ {
  64587. "lang" : "en",
  64588. "value" : "By default, the WP Page Builder WordPress plugin before 1.2.4 allows subscriber-level users to edit and make changes to any and all posts pages - user roles must be specifically blocked from editing posts and pages."
  64589. } ]
  64590. }
  64591. },
  64592. "configurations" : {
  64593. "CVE_data_version" : "4.0",
  64594. "nodes" : [ {
  64595. "operator" : "OR",
  64596. "children" : [ ],
  64597. "cpe_match" : [ {
  64598. "vulnerable" : true,
  64599. "cpe23Uri" : "cpe:2.3:a:themeum:wp_page_builder:*:*:*:*:*:wordpress:*:*",
  64600. "versionEndExcluding" : "1.2.4",
  64601. "cpe_name" : [ ]
  64602. } ]
  64603. } ]
  64604. },
  64605. "impact" : {
  64606. "baseMetricV3" : {
  64607. "cvssV3" : {
  64608. "version" : "3.1",
  64609. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
  64610. "attackVector" : "NETWORK",
  64611. "attackComplexity" : "LOW",
  64612. "privilegesRequired" : "LOW",
  64613. "userInteraction" : "NONE",
  64614. "scope" : "UNCHANGED",
  64615. "confidentialityImpact" : "NONE",
  64616. "integrityImpact" : "LOW",
  64617. "availabilityImpact" : "NONE",
  64618. "baseScore" : 4.3,
  64619. "baseSeverity" : "MEDIUM"
  64620. },
  64621. "exploitabilityScore" : 2.8,
  64622. "impactScore" : 1.4
  64623. },
  64624. "baseMetricV2" : {
  64625. "cvssV2" : {
  64626. "version" : "2.0",
  64627. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:N",
  64628. "accessVector" : "NETWORK",
  64629. "accessComplexity" : "LOW",
  64630. "authentication" : "SINGLE",
  64631. "confidentialityImpact" : "NONE",
  64632. "integrityImpact" : "PARTIAL",
  64633. "availabilityImpact" : "NONE",
  64634. "baseScore" : 4.0
  64635. },
  64636. "severity" : "MEDIUM",
  64637. "exploitabilityScore" : 8.0,
  64638. "impactScore" : 2.9,
  64639. "acInsufInfo" : false,
  64640. "obtainAllPrivilege" : false,
  64641. "obtainUserPrivilege" : false,
  64642. "obtainOtherPrivilege" : false,
  64643. "userInteractionRequired" : false
  64644. }
  64645. },
  64646. "publishedDate" : "2021-04-05T19:15Z",
  64647. "lastModifiedDate" : "2021-05-04T15:02Z"
  64648. }, {
  64649. "cve" : {
  64650. "data_type" : "CVE",
  64651. "data_format" : "MITRE",
  64652. "data_version" : "4.0",
  64653. "CVE_data_meta" : {
  64654. "ID" : "CVE-2021-1844",
  64655. "ASSIGNER" : "product-security@apple.com"
  64656. },
  64657. "problemtype" : {
  64658. "problemtype_data" : [ {
  64659. "description" : [ {
  64660. "lang" : "en",
  64661. "value" : "CWE-119"
  64662. } ]
  64663. } ]
  64664. },
  64665. "references" : {
  64666. "reference_data" : [ {
  64667. "url" : "https://support.apple.com/en-us/HT212222",
  64668. "name" : "https://support.apple.com/en-us/HT212222",
  64669. "refsource" : "MISC",
  64670. "tags" : [ "Vendor Advisory" ]
  64671. }, {
  64672. "url" : "https://support.apple.com/en-us/HT212223",
  64673. "name" : "https://support.apple.com/en-us/HT212223",
  64674. "refsource" : "MISC",
  64675. "tags" : [ "Vendor Advisory" ]
  64676. }, {
  64677. "url" : "https://support.apple.com/en-us/HT212220",
  64678. "name" : "https://support.apple.com/en-us/HT212220",
  64679. "refsource" : "MISC",
  64680. "tags" : [ "Vendor Advisory" ]
  64681. }, {
  64682. "url" : "https://support.apple.com/en-us/HT212221",
  64683. "name" : "https://support.apple.com/en-us/HT212221",
  64684. "refsource" : "MISC",
  64685. "tags" : [ "Vendor Advisory" ]
  64686. }, {
  64687. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/",
  64688. "name" : "FEDORA-2021-864dc37032",
  64689. "refsource" : "FEDORA",
  64690. "tags" : [ "Mailing List", "Third Party Advisory" ]
  64691. }, {
  64692. "url" : "https://support.apple.com/kb/HT212323",
  64693. "name" : "https://support.apple.com/kb/HT212323",
  64694. "refsource" : "CONFIRM",
  64695. "tags" : [ "Vendor Advisory" ]
  64696. }, {
  64697. "url" : "http://seclists.org/fulldisclosure/2021/Apr/55",
  64698. "name" : "20210427 APPLE-SA-2021-04-26-6 tvOS 14.5",
  64699. "refsource" : "FULLDISC",
  64700. "tags" : [ "Mailing List", "Third Party Advisory" ]
  64701. } ]
  64702. },
  64703. "description" : {
  64704. "description_data" : [ {
  64705. "lang" : "en",
  64706. "value" : "A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1, Safari 14.0.3 (v. 14610.4.3.1.7 and 15610.4.3.1.7), watchOS 7.3.2, macOS Big Sur 11.2.3. Processing maliciously crafted web content may lead to arbitrary code execution."
  64707. } ]
  64708. }
  64709. },
  64710. "configurations" : {
  64711. "CVE_data_version" : "4.0",
  64712. "nodes" : [ {
  64713. "operator" : "OR",
  64714. "children" : [ ],
  64715. "cpe_match" : [ {
  64716. "vulnerable" : true,
  64717. "cpe23Uri" : "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
  64718. "versionEndExcluding" : "14.0.3",
  64719. "cpe_name" : [ ]
  64720. }, {
  64721. "vulnerable" : true,
  64722. "cpe23Uri" : "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
  64723. "versionEndExcluding" : "14.4.1",
  64724. "cpe_name" : [ ]
  64725. }, {
  64726. "vulnerable" : true,
  64727. "cpe23Uri" : "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
  64728. "versionEndExcluding" : "14.4.1",
  64729. "cpe_name" : [ ]
  64730. }, {
  64731. "vulnerable" : true,
  64732. "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
  64733. "versionEndExcluding" : "11.2.3",
  64734. "cpe_name" : [ ]
  64735. }, {
  64736. "vulnerable" : true,
  64737. "cpe23Uri" : "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
  64738. "versionEndExcluding" : "14.5",
  64739. "cpe_name" : [ ]
  64740. }, {
  64741. "vulnerable" : true,
  64742. "cpe23Uri" : "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
  64743. "versionEndExcluding" : "7.3.2",
  64744. "cpe_name" : [ ]
  64745. } ]
  64746. }, {
  64747. "operator" : "OR",
  64748. "children" : [ ],
  64749. "cpe_match" : [ {
  64750. "vulnerable" : true,
  64751. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  64752. "cpe_name" : [ ]
  64753. } ]
  64754. } ]
  64755. },
  64756. "impact" : {
  64757. "baseMetricV3" : {
  64758. "cvssV3" : {
  64759. "version" : "3.1",
  64760. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  64761. "attackVector" : "NETWORK",
  64762. "attackComplexity" : "LOW",
  64763. "privilegesRequired" : "NONE",
  64764. "userInteraction" : "REQUIRED",
  64765. "scope" : "UNCHANGED",
  64766. "confidentialityImpact" : "HIGH",
  64767. "integrityImpact" : "HIGH",
  64768. "availabilityImpact" : "HIGH",
  64769. "baseScore" : 8.8,
  64770. "baseSeverity" : "HIGH"
  64771. },
  64772. "exploitabilityScore" : 2.8,
  64773. "impactScore" : 5.9
  64774. },
  64775. "baseMetricV2" : {
  64776. "cvssV2" : {
  64777. "version" : "2.0",
  64778. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  64779. "accessVector" : "NETWORK",
  64780. "accessComplexity" : "MEDIUM",
  64781. "authentication" : "NONE",
  64782. "confidentialityImpact" : "PARTIAL",
  64783. "integrityImpact" : "PARTIAL",
  64784. "availabilityImpact" : "PARTIAL",
  64785. "baseScore" : 6.8
  64786. },
  64787. "severity" : "MEDIUM",
  64788. "exploitabilityScore" : 8.6,
  64789. "impactScore" : 6.4,
  64790. "acInsufInfo" : false,
  64791. "obtainAllPrivilege" : false,
  64792. "obtainUserPrivilege" : false,
  64793. "obtainOtherPrivilege" : false,
  64794. "userInteractionRequired" : true
  64795. }
  64796. },
  64797. "publishedDate" : "2021-04-02T19:15Z",
  64798. "lastModifiedDate" : "2021-05-04T19:35Z"
  64799. }, {
  64800. "cve" : {
  64801. "data_type" : "CVE",
  64802. "data_format" : "MITRE",
  64803. "data_version" : "4.0",
  64804. "CVE_data_meta" : {
  64805. "ID" : "CVE-2021-1806",
  64806. "ASSIGNER" : "product-security@apple.com"
  64807. },
  64808. "problemtype" : {
  64809. "problemtype_data" : [ {
  64810. "description" : [ {
  64811. "lang" : "en",
  64812. "value" : "CWE-362"
  64813. } ]
  64814. } ]
  64815. },
  64816. "references" : {
  64817. "reference_data" : [ {
  64818. "url" : "https://support.apple.com/en-us/HT212177",
  64819. "name" : "https://support.apple.com/en-us/HT212177",
  64820. "refsource" : "MISC",
  64821. "tags" : [ "Vendor Advisory" ]
  64822. }, {
  64823. "url" : "https://support.apple.com/kb/HT212327",
  64824. "name" : "https://support.apple.com/kb/HT212327",
  64825. "refsource" : "CONFIRM",
  64826. "tags" : [ "Vendor Advisory" ]
  64827. }, {
  64828. "url" : "http://seclists.org/fulldisclosure/2021/Apr/54",
  64829. "name" : "20210427 APPLE-SA-2021-04-26-4 Security Update 2021-003 Mojave",
  64830. "refsource" : "FULLDISC",
  64831. "tags" : [ "Mailing List", "Third Party Advisory" ]
  64832. } ]
  64833. },
  64834. "description" : {
  64835. "description_data" : [ {
  64836. "lang" : "en",
  64837. "value" : "A race condition was addressed with additional validation. This issue is fixed in macOS Big Sur 11.2.1, macOS Catalina 10.15.7 Supplemental Update, macOS Mojave 10.14.6 Security Update 2021-002. An application may be able to execute arbitrary code with kernel privileges."
  64838. } ]
  64839. }
  64840. },
  64841. "configurations" : {
  64842. "CVE_data_version" : "4.0",
  64843. "nodes" : [ {
  64844. "operator" : "OR",
  64845. "children" : [ ],
  64846. "cpe_match" : [ {
  64847. "vulnerable" : true,
  64848. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  64849. "versionStartIncluding" : "10.14",
  64850. "versionEndExcluding" : "10.14.6",
  64851. "cpe_name" : [ ]
  64852. }, {
  64853. "vulnerable" : true,
  64854. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
  64855. "cpe_name" : [ ]
  64856. }, {
  64857. "vulnerable" : true,
  64858. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
  64859. "cpe_name" : [ ]
  64860. }, {
  64861. "vulnerable" : true,
  64862. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
  64863. "cpe_name" : [ ]
  64864. }, {
  64865. "vulnerable" : true,
  64866. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
  64867. "cpe_name" : [ ]
  64868. }, {
  64869. "vulnerable" : true,
  64870. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
  64871. "cpe_name" : [ ]
  64872. }, {
  64873. "vulnerable" : true,
  64874. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
  64875. "cpe_name" : [ ]
  64876. }, {
  64877. "vulnerable" : true,
  64878. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
  64879. "cpe_name" : [ ]
  64880. }, {
  64881. "vulnerable" : true,
  64882. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
  64883. "cpe_name" : [ ]
  64884. }, {
  64885. "vulnerable" : true,
  64886. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
  64887. "cpe_name" : [ ]
  64888. }, {
  64889. "vulnerable" : true,
  64890. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
  64891. "cpe_name" : [ ]
  64892. }, {
  64893. "vulnerable" : true,
  64894. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
  64895. "cpe_name" : [ ]
  64896. }, {
  64897. "vulnerable" : true,
  64898. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*",
  64899. "cpe_name" : [ ]
  64900. }, {
  64901. "vulnerable" : true,
  64902. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  64903. "versionStartIncluding" : "10.15",
  64904. "versionEndExcluding" : "10.15.7",
  64905. "cpe_name" : [ ]
  64906. }, {
  64907. "vulnerable" : true,
  64908. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
  64909. "cpe_name" : [ ]
  64910. }, {
  64911. "vulnerable" : true,
  64912. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
  64913. "cpe_name" : [ ]
  64914. }, {
  64915. "vulnerable" : true,
  64916. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
  64917. "cpe_name" : [ ]
  64918. }, {
  64919. "vulnerable" : true,
  64920. "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
  64921. "versionStartIncluding" : "11.0",
  64922. "versionEndExcluding" : "11.2.1",
  64923. "cpe_name" : [ ]
  64924. } ]
  64925. } ]
  64926. },
  64927. "impact" : {
  64928. "baseMetricV3" : {
  64929. "cvssV3" : {
  64930. "version" : "3.1",
  64931. "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
  64932. "attackVector" : "LOCAL",
  64933. "attackComplexity" : "HIGH",
  64934. "privilegesRequired" : "NONE",
  64935. "userInteraction" : "REQUIRED",
  64936. "scope" : "UNCHANGED",
  64937. "confidentialityImpact" : "HIGH",
  64938. "integrityImpact" : "HIGH",
  64939. "availabilityImpact" : "HIGH",
  64940. "baseScore" : 7.0,
  64941. "baseSeverity" : "HIGH"
  64942. },
  64943. "exploitabilityScore" : 1.0,
  64944. "impactScore" : 5.9
  64945. },
  64946. "baseMetricV2" : {
  64947. "cvssV2" : {
  64948. "version" : "2.0",
  64949. "vectorString" : "AV:N/AC:H/Au:N/C:C/I:C/A:C",
  64950. "accessVector" : "NETWORK",
  64951. "accessComplexity" : "HIGH",
  64952. "authentication" : "NONE",
  64953. "confidentialityImpact" : "COMPLETE",
  64954. "integrityImpact" : "COMPLETE",
  64955. "availabilityImpact" : "COMPLETE",
  64956. "baseScore" : 7.6
  64957. },
  64958. "severity" : "HIGH",
  64959. "exploitabilityScore" : 4.9,
  64960. "impactScore" : 10.0,
  64961. "acInsufInfo" : false,
  64962. "obtainAllPrivilege" : false,
  64963. "obtainUserPrivilege" : false,
  64964. "obtainOtherPrivilege" : false,
  64965. "userInteractionRequired" : true
  64966. }
  64967. },
  64968. "publishedDate" : "2021-04-02T19:15Z",
  64969. "lastModifiedDate" : "2021-05-04T19:35Z"
  64970. }, {
  64971. "cve" : {
  64972. "data_type" : "CVE",
  64973. "data_format" : "MITRE",
  64974. "data_version" : "4.0",
  64975. "CVE_data_meta" : {
  64976. "ID" : "CVE-2021-1805",
  64977. "ASSIGNER" : "product-security@apple.com"
  64978. },
  64979. "problemtype" : {
  64980. "problemtype_data" : [ {
  64981. "description" : [ {
  64982. "lang" : "en",
  64983. "value" : "CWE-787"
  64984. } ]
  64985. } ]
  64986. },
  64987. "references" : {
  64988. "reference_data" : [ {
  64989. "url" : "https://support.apple.com/en-us/HT212177",
  64990. "name" : "https://support.apple.com/en-us/HT212177",
  64991. "refsource" : "MISC",
  64992. "tags" : [ "Vendor Advisory" ]
  64993. }, {
  64994. "url" : "https://support.apple.com/kb/HT212327",
  64995. "name" : "https://support.apple.com/kb/HT212327",
  64996. "refsource" : "CONFIRM",
  64997. "tags" : [ "Vendor Advisory" ]
  64998. }, {
  64999. "url" : "http://seclists.org/fulldisclosure/2021/Apr/54",
  65000. "name" : "20210427 APPLE-SA-2021-04-26-4 Security Update 2021-003 Mojave",
  65001. "refsource" : "FULLDISC",
  65002. "tags" : [ "Mailing List", "Third Party Advisory" ]
  65003. } ]
  65004. },
  65005. "description" : {
  65006. "description_data" : [ {
  65007. "lang" : "en",
  65008. "value" : "An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2.1, macOS Catalina 10.15.7 Supplemental Update, macOS Mojave 10.14.6 Security Update 2021-002. An application may be able to execute arbitrary code with kernel privileges."
  65009. } ]
  65010. }
  65011. },
  65012. "configurations" : {
  65013. "CVE_data_version" : "4.0",
  65014. "nodes" : [ {
  65015. "operator" : "OR",
  65016. "children" : [ ],
  65017. "cpe_match" : [ {
  65018. "vulnerable" : true,
  65019. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  65020. "versionStartIncluding" : "10.14",
  65021. "versionEndExcluding" : "10.14.6",
  65022. "cpe_name" : [ ]
  65023. }, {
  65024. "vulnerable" : true,
  65025. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
  65026. "cpe_name" : [ ]
  65027. }, {
  65028. "vulnerable" : true,
  65029. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
  65030. "cpe_name" : [ ]
  65031. }, {
  65032. "vulnerable" : true,
  65033. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
  65034. "cpe_name" : [ ]
  65035. }, {
  65036. "vulnerable" : true,
  65037. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
  65038. "cpe_name" : [ ]
  65039. }, {
  65040. "vulnerable" : true,
  65041. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
  65042. "cpe_name" : [ ]
  65043. }, {
  65044. "vulnerable" : true,
  65045. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
  65046. "cpe_name" : [ ]
  65047. }, {
  65048. "vulnerable" : true,
  65049. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
  65050. "cpe_name" : [ ]
  65051. }, {
  65052. "vulnerable" : true,
  65053. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
  65054. "cpe_name" : [ ]
  65055. }, {
  65056. "vulnerable" : true,
  65057. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
  65058. "cpe_name" : [ ]
  65059. }, {
  65060. "vulnerable" : true,
  65061. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
  65062. "cpe_name" : [ ]
  65063. }, {
  65064. "vulnerable" : true,
  65065. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
  65066. "cpe_name" : [ ]
  65067. }, {
  65068. "vulnerable" : true,
  65069. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*",
  65070. "cpe_name" : [ ]
  65071. }, {
  65072. "vulnerable" : true,
  65073. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
  65074. "cpe_name" : [ ]
  65075. }, {
  65076. "vulnerable" : true,
  65077. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
  65078. "cpe_name" : [ ]
  65079. }, {
  65080. "vulnerable" : true,
  65081. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  65082. "versionStartIncluding" : "10.15",
  65083. "versionEndExcluding" : "10.15.7",
  65084. "cpe_name" : [ ]
  65085. }, {
  65086. "vulnerable" : true,
  65087. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
  65088. "cpe_name" : [ ]
  65089. }, {
  65090. "vulnerable" : true,
  65091. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
  65092. "cpe_name" : [ ]
  65093. }, {
  65094. "vulnerable" : true,
  65095. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
  65096. "cpe_name" : [ ]
  65097. }, {
  65098. "vulnerable" : true,
  65099. "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
  65100. "versionStartIncluding" : "11.0",
  65101. "versionEndExcluding" : "11.2",
  65102. "cpe_name" : [ ]
  65103. } ]
  65104. } ]
  65105. },
  65106. "impact" : {
  65107. "baseMetricV3" : {
  65108. "cvssV3" : {
  65109. "version" : "3.1",
  65110. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  65111. "attackVector" : "LOCAL",
  65112. "attackComplexity" : "LOW",
  65113. "privilegesRequired" : "NONE",
  65114. "userInteraction" : "REQUIRED",
  65115. "scope" : "UNCHANGED",
  65116. "confidentialityImpact" : "HIGH",
  65117. "integrityImpact" : "HIGH",
  65118. "availabilityImpact" : "HIGH",
  65119. "baseScore" : 7.8,
  65120. "baseSeverity" : "HIGH"
  65121. },
  65122. "exploitabilityScore" : 1.8,
  65123. "impactScore" : 5.9
  65124. },
  65125. "baseMetricV2" : {
  65126. "cvssV2" : {
  65127. "version" : "2.0",
  65128. "vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C",
  65129. "accessVector" : "NETWORK",
  65130. "accessComplexity" : "MEDIUM",
  65131. "authentication" : "NONE",
  65132. "confidentialityImpact" : "COMPLETE",
  65133. "integrityImpact" : "COMPLETE",
  65134. "availabilityImpact" : "COMPLETE",
  65135. "baseScore" : 9.3
  65136. },
  65137. "severity" : "HIGH",
  65138. "exploitabilityScore" : 8.6,
  65139. "impactScore" : 10.0,
  65140. "acInsufInfo" : false,
  65141. "obtainAllPrivilege" : false,
  65142. "obtainUserPrivilege" : false,
  65143. "obtainOtherPrivilege" : false,
  65144. "userInteractionRequired" : true
  65145. }
  65146. },
  65147. "publishedDate" : "2021-04-02T19:15Z",
  65148. "lastModifiedDate" : "2021-05-04T19:35Z"
  65149. }, {
  65150. "cve" : {
  65151. "data_type" : "CVE",
  65152. "data_format" : "MITRE",
  65153. "data_version" : "4.0",
  65154. "CVE_data_meta" : {
  65155. "ID" : "CVE-2021-1797",
  65156. "ASSIGNER" : "product-security@apple.com"
  65157. },
  65158. "problemtype" : {
  65159. "problemtype_data" : [ {
  65160. "description" : [ {
  65161. "lang" : "en",
  65162. "value" : "NVD-CWE-noinfo"
  65163. } ]
  65164. } ]
  65165. },
  65166. "references" : {
  65167. "reference_data" : [ {
  65168. "url" : "https://support.apple.com/en-us/HT212146",
  65169. "name" : "https://support.apple.com/en-us/HT212146",
  65170. "refsource" : "MISC",
  65171. "tags" : [ "Vendor Advisory" ]
  65172. }, {
  65173. "url" : "https://support.apple.com/en-us/HT212149",
  65174. "name" : "https://support.apple.com/en-us/HT212149",
  65175. "refsource" : "MISC",
  65176. "tags" : [ "Vendor Advisory" ]
  65177. }, {
  65178. "url" : "https://support.apple.com/en-us/HT212147",
  65179. "name" : "https://support.apple.com/en-us/HT212147",
  65180. "refsource" : "MISC",
  65181. "tags" : [ "Vendor Advisory" ]
  65182. }, {
  65183. "url" : "https://support.apple.com/en-us/HT212148",
  65184. "name" : "https://support.apple.com/en-us/HT212148",
  65185. "refsource" : "MISC",
  65186. "tags" : [ "Vendor Advisory" ]
  65187. }, {
  65188. "url" : "https://support.apple.com/kb/HT212326",
  65189. "name" : "https://support.apple.com/kb/HT212326",
  65190. "refsource" : "CONFIRM",
  65191. "tags" : [ "Vendor Advisory" ]
  65192. }, {
  65193. "url" : "https://support.apple.com/kb/HT212327",
  65194. "name" : "https://support.apple.com/kb/HT212327",
  65195. "refsource" : "CONFIRM",
  65196. "tags" : [ "Vendor Advisory" ]
  65197. }, {
  65198. "url" : "http://seclists.org/fulldisclosure/2021/Apr/51",
  65199. "name" : "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
  65200. "refsource" : "FULLDISC",
  65201. "tags" : [ "Mailing List", "Third Party Advisory" ]
  65202. } ]
  65203. },
  65204. "description" : {
  65205. "description_data" : [ {
  65206. "lang" : "en",
  65207. "value" : "The issue was addressed with improved permissions logic. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A local user may be able to read arbitrary files."
  65208. } ]
  65209. }
  65210. },
  65211. "configurations" : {
  65212. "CVE_data_version" : "4.0",
  65213. "nodes" : [ {
  65214. "operator" : "OR",
  65215. "children" : [ ],
  65216. "cpe_match" : [ {
  65217. "vulnerable" : true,
  65218. "cpe23Uri" : "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
  65219. "versionEndExcluding" : "14.4",
  65220. "cpe_name" : [ ]
  65221. }, {
  65222. "vulnerable" : true,
  65223. "cpe23Uri" : "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
  65224. "versionEndExcluding" : "14.4",
  65225. "cpe_name" : [ ]
  65226. }, {
  65227. "vulnerable" : true,
  65228. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  65229. "versionEndExcluding" : "10.14.6",
  65230. "cpe_name" : [ ]
  65231. }, {
  65232. "vulnerable" : true,
  65233. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:*:*:*:*:*:*:*",
  65234. "cpe_name" : [ ]
  65235. }, {
  65236. "vulnerable" : true,
  65237. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
  65238. "cpe_name" : [ ]
  65239. }, {
  65240. "vulnerable" : true,
  65241. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
  65242. "cpe_name" : [ ]
  65243. }, {
  65244. "vulnerable" : true,
  65245. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
  65246. "cpe_name" : [ ]
  65247. }, {
  65248. "vulnerable" : true,
  65249. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
  65250. "cpe_name" : [ ]
  65251. }, {
  65252. "vulnerable" : true,
  65253. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
  65254. "cpe_name" : [ ]
  65255. }, {
  65256. "vulnerable" : true,
  65257. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
  65258. "cpe_name" : [ ]
  65259. }, {
  65260. "vulnerable" : true,
  65261. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
  65262. "cpe_name" : [ ]
  65263. }, {
  65264. "vulnerable" : true,
  65265. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
  65266. "cpe_name" : [ ]
  65267. }, {
  65268. "vulnerable" : true,
  65269. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
  65270. "cpe_name" : [ ]
  65271. }, {
  65272. "vulnerable" : true,
  65273. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
  65274. "cpe_name" : [ ]
  65275. }, {
  65276. "vulnerable" : true,
  65277. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
  65278. "cpe_name" : [ ]
  65279. }, {
  65280. "vulnerable" : true,
  65281. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  65282. "versionStartIncluding" : "10.15",
  65283. "versionEndExcluding" : "10.15.7",
  65284. "cpe_name" : [ ]
  65285. }, {
  65286. "vulnerable" : true,
  65287. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
  65288. "cpe_name" : [ ]
  65289. }, {
  65290. "vulnerable" : true,
  65291. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
  65292. "cpe_name" : [ ]
  65293. }, {
  65294. "vulnerable" : true,
  65295. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
  65296. "cpe_name" : [ ]
  65297. }, {
  65298. "vulnerable" : true,
  65299. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
  65300. "cpe_name" : [ ]
  65301. }, {
  65302. "vulnerable" : true,
  65303. "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
  65304. "versionStartIncluding" : "11.0.1",
  65305. "versionEndExcluding" : "11.2",
  65306. "cpe_name" : [ ]
  65307. }, {
  65308. "vulnerable" : true,
  65309. "cpe23Uri" : "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
  65310. "versionEndExcluding" : "14.4",
  65311. "cpe_name" : [ ]
  65312. }, {
  65313. "vulnerable" : true,
  65314. "cpe23Uri" : "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
  65315. "versionEndExcluding" : "7.3",
  65316. "cpe_name" : [ ]
  65317. } ]
  65318. } ]
  65319. },
  65320. "impact" : {
  65321. "baseMetricV3" : {
  65322. "cvssV3" : {
  65323. "version" : "3.1",
  65324. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  65325. "attackVector" : "LOCAL",
  65326. "attackComplexity" : "LOW",
  65327. "privilegesRequired" : "LOW",
  65328. "userInteraction" : "NONE",
  65329. "scope" : "UNCHANGED",
  65330. "confidentialityImpact" : "HIGH",
  65331. "integrityImpact" : "NONE",
  65332. "availabilityImpact" : "NONE",
  65333. "baseScore" : 5.5,
  65334. "baseSeverity" : "MEDIUM"
  65335. },
  65336. "exploitabilityScore" : 1.8,
  65337. "impactScore" : 3.6
  65338. },
  65339. "baseMetricV2" : {
  65340. "cvssV2" : {
  65341. "version" : "2.0",
  65342. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  65343. "accessVector" : "LOCAL",
  65344. "accessComplexity" : "LOW",
  65345. "authentication" : "NONE",
  65346. "confidentialityImpact" : "PARTIAL",
  65347. "integrityImpact" : "NONE",
  65348. "availabilityImpact" : "NONE",
  65349. "baseScore" : 2.1
  65350. },
  65351. "severity" : "LOW",
  65352. "exploitabilityScore" : 3.9,
  65353. "impactScore" : 2.9,
  65354. "acInsufInfo" : false,
  65355. "obtainAllPrivilege" : false,
  65356. "obtainUserPrivilege" : false,
  65357. "obtainOtherPrivilege" : false,
  65358. "userInteractionRequired" : false
  65359. }
  65360. },
  65361. "publishedDate" : "2021-04-02T19:15Z",
  65362. "lastModifiedDate" : "2021-05-04T19:35Z"
  65363. }, {
  65364. "cve" : {
  65365. "data_type" : "CVE",
  65366. "data_format" : "MITRE",
  65367. "data_version" : "4.0",
  65368. "CVE_data_meta" : {
  65369. "ID" : "CVE-2020-27897",
  65370. "ASSIGNER" : "product-security@apple.com"
  65371. },
  65372. "problemtype" : {
  65373. "problemtype_data" : [ {
  65374. "description" : [ {
  65375. "lang" : "en",
  65376. "value" : "CWE-787"
  65377. } ]
  65378. } ]
  65379. },
  65380. "references" : {
  65381. "reference_data" : [ {
  65382. "url" : "https://support.apple.com/en-us/HT212011",
  65383. "name" : "https://support.apple.com/en-us/HT212011",
  65384. "refsource" : "MISC",
  65385. "tags" : [ "Vendor Advisory" ]
  65386. }, {
  65387. "url" : "https://support.apple.com/en-us/HT211931",
  65388. "name" : "https://support.apple.com/en-us/HT211931",
  65389. "refsource" : "MISC",
  65390. "tags" : [ "Vendor Advisory" ]
  65391. }, {
  65392. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-486/",
  65393. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-486/",
  65394. "refsource" : "MISC",
  65395. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  65396. } ]
  65397. },
  65398. "description" : {
  65399. "description_data" : [ {
  65400. "lang" : "en",
  65401. "value" : "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges."
  65402. } ]
  65403. }
  65404. },
  65405. "configurations" : {
  65406. "CVE_data_version" : "4.0",
  65407. "nodes" : [ {
  65408. "operator" : "OR",
  65409. "children" : [ ],
  65410. "cpe_match" : [ {
  65411. "vulnerable" : true,
  65412. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  65413. "versionStartIncluding" : "10.14",
  65414. "versionEndExcluding" : "10.14.6",
  65415. "cpe_name" : [ ]
  65416. }, {
  65417. "vulnerable" : true,
  65418. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
  65419. "cpe_name" : [ ]
  65420. }, {
  65421. "vulnerable" : true,
  65422. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
  65423. "cpe_name" : [ ]
  65424. }, {
  65425. "vulnerable" : true,
  65426. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
  65427. "cpe_name" : [ ]
  65428. }, {
  65429. "vulnerable" : true,
  65430. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
  65431. "cpe_name" : [ ]
  65432. }, {
  65433. "vulnerable" : true,
  65434. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
  65435. "cpe_name" : [ ]
  65436. }, {
  65437. "vulnerable" : true,
  65438. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
  65439. "cpe_name" : [ ]
  65440. }, {
  65441. "vulnerable" : true,
  65442. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
  65443. "cpe_name" : [ ]
  65444. }, {
  65445. "vulnerable" : true,
  65446. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
  65447. "cpe_name" : [ ]
  65448. }, {
  65449. "vulnerable" : true,
  65450. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
  65451. "cpe_name" : [ ]
  65452. }, {
  65453. "vulnerable" : true,
  65454. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
  65455. "cpe_name" : [ ]
  65456. }, {
  65457. "vulnerable" : true,
  65458. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
  65459. "cpe_name" : [ ]
  65460. }, {
  65461. "vulnerable" : true,
  65462. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  65463. "versionStartIncluding" : "10.15",
  65464. "versionEndExcluding" : "10.15.7",
  65465. "cpe_name" : [ ]
  65466. }, {
  65467. "vulnerable" : true,
  65468. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
  65469. "cpe_name" : [ ]
  65470. }, {
  65471. "vulnerable" : true,
  65472. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
  65473. "cpe_name" : [ ]
  65474. }, {
  65475. "vulnerable" : true,
  65476. "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
  65477. "versionStartIncluding" : "11.0",
  65478. "versionEndExcluding" : "11.1",
  65479. "cpe_name" : [ ]
  65480. } ]
  65481. } ]
  65482. },
  65483. "impact" : {
  65484. "baseMetricV3" : {
  65485. "cvssV3" : {
  65486. "version" : "3.1",
  65487. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  65488. "attackVector" : "LOCAL",
  65489. "attackComplexity" : "LOW",
  65490. "privilegesRequired" : "LOW",
  65491. "userInteraction" : "NONE",
  65492. "scope" : "UNCHANGED",
  65493. "confidentialityImpact" : "HIGH",
  65494. "integrityImpact" : "HIGH",
  65495. "availabilityImpact" : "HIGH",
  65496. "baseScore" : 7.8,
  65497. "baseSeverity" : "HIGH"
  65498. },
  65499. "exploitabilityScore" : 1.8,
  65500. "impactScore" : 5.9
  65501. },
  65502. "baseMetricV2" : {
  65503. "cvssV2" : {
  65504. "version" : "2.0",
  65505. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  65506. "accessVector" : "LOCAL",
  65507. "accessComplexity" : "LOW",
  65508. "authentication" : "NONE",
  65509. "confidentialityImpact" : "COMPLETE",
  65510. "integrityImpact" : "COMPLETE",
  65511. "availabilityImpact" : "COMPLETE",
  65512. "baseScore" : 7.2
  65513. },
  65514. "severity" : "HIGH",
  65515. "exploitabilityScore" : 3.9,
  65516. "impactScore" : 10.0,
  65517. "acInsufInfo" : false,
  65518. "obtainAllPrivilege" : false,
  65519. "obtainUserPrivilege" : false,
  65520. "obtainOtherPrivilege" : false,
  65521. "userInteractionRequired" : false
  65522. }
  65523. },
  65524. "publishedDate" : "2021-04-02T18:15Z",
  65525. "lastModifiedDate" : "2021-05-04T13:52Z"
  65526. }, {
  65527. "cve" : {
  65528. "data_type" : "CVE",
  65529. "data_format" : "MITRE",
  65530. "data_version" : "4.0",
  65531. "CVE_data_meta" : {
  65532. "ID" : "CVE-2021-3447",
  65533. "ASSIGNER" : "secalert@redhat.com"
  65534. },
  65535. "problemtype" : {
  65536. "problemtype_data" : [ {
  65537. "description" : [ {
  65538. "lang" : "en",
  65539. "value" : "CWE-532"
  65540. } ]
  65541. } ]
  65542. },
  65543. "references" : {
  65544. "reference_data" : [ {
  65545. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1939349",
  65546. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1939349",
  65547. "refsource" : "MISC",
  65548. "tags" : [ "Issue Tracking", "Vendor Advisory" ]
  65549. }, {
  65550. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RUTGO4RS4ZXZSPBU2CHVPT75IAFVTTL3/",
  65551. "name" : "FEDORA-2021-c1116fb75e",
  65552. "refsource" : "FEDORA",
  65553. "tags" : [ ]
  65554. }, {
  65555. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MS4VPUYVLGSAKOX26IT52BSMEZRZ3KS/",
  65556. "name" : "FEDORA-2021-4a17f0225d",
  65557. "refsource" : "FEDORA",
  65558. "tags" : [ ]
  65559. }, {
  65560. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBZ75MAMVQVZROPYHMRDQKPPVASP63DG/",
  65561. "name" : "FEDORA-2021-0414eb891b",
  65562. "refsource" : "FEDORA",
  65563. "tags" : [ ]
  65564. } ]
  65565. },
  65566. "description" : {
  65567. "description_data" : [ {
  65568. "lang" : "en",
  65569. "value" : "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2."
  65570. } ]
  65571. }
  65572. },
  65573. "configurations" : {
  65574. "CVE_data_version" : "4.0",
  65575. "nodes" : [ {
  65576. "operator" : "OR",
  65577. "children" : [ ],
  65578. "cpe_match" : [ {
  65579. "vulnerable" : true,
  65580. "cpe23Uri" : "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
  65581. "versionEndExcluding" : "1.2.2",
  65582. "cpe_name" : [ ]
  65583. }, {
  65584. "vulnerable" : true,
  65585. "cpe23Uri" : "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*",
  65586. "versionEndExcluding" : "3.8.2",
  65587. "cpe_name" : [ ]
  65588. } ]
  65589. } ]
  65590. },
  65591. "impact" : {
  65592. "baseMetricV3" : {
  65593. "cvssV3" : {
  65594. "version" : "3.1",
  65595. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  65596. "attackVector" : "LOCAL",
  65597. "attackComplexity" : "LOW",
  65598. "privilegesRequired" : "LOW",
  65599. "userInteraction" : "NONE",
  65600. "scope" : "UNCHANGED",
  65601. "confidentialityImpact" : "HIGH",
  65602. "integrityImpact" : "NONE",
  65603. "availabilityImpact" : "NONE",
  65604. "baseScore" : 5.5,
  65605. "baseSeverity" : "MEDIUM"
  65606. },
  65607. "exploitabilityScore" : 1.8,
  65608. "impactScore" : 3.6
  65609. },
  65610. "baseMetricV2" : {
  65611. "cvssV2" : {
  65612. "version" : "2.0",
  65613. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  65614. "accessVector" : "LOCAL",
  65615. "accessComplexity" : "LOW",
  65616. "authentication" : "NONE",
  65617. "confidentialityImpact" : "PARTIAL",
  65618. "integrityImpact" : "NONE",
  65619. "availabilityImpact" : "NONE",
  65620. "baseScore" : 2.1
  65621. },
  65622. "severity" : "LOW",
  65623. "exploitabilityScore" : 3.9,
  65624. "impactScore" : 2.9,
  65625. "acInsufInfo" : false,
  65626. "obtainAllPrivilege" : false,
  65627. "obtainUserPrivilege" : false,
  65628. "obtainOtherPrivilege" : false,
  65629. "userInteractionRequired" : false
  65630. }
  65631. },
  65632. "publishedDate" : "2021-04-01T18:15Z",
  65633. "lastModifiedDate" : "2021-05-03T04:15Z"
  65634. }, {
  65635. "cve" : {
  65636. "data_type" : "CVE",
  65637. "data_format" : "MITRE",
  65638. "data_version" : "4.0",
  65639. "CVE_data_meta" : {
  65640. "ID" : "CVE-2021-20291",
  65641. "ASSIGNER" : "secalert@redhat.com"
  65642. },
  65643. "problemtype" : {
  65644. "problemtype_data" : [ {
  65645. "description" : [ {
  65646. "lang" : "en",
  65647. "value" : "CWE-667"
  65648. } ]
  65649. } ]
  65650. },
  65651. "references" : {
  65652. "reference_data" : [ {
  65653. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1939485",
  65654. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1939485",
  65655. "refsource" : "MISC",
  65656. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  65657. }, {
  65658. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5D7XL7FL24TWFMGQ3K2S72EOUSLZMKL/",
  65659. "name" : "FEDORA-2021-ec00da7faa",
  65660. "refsource" : "FEDORA",
  65661. "tags" : [ ]
  65662. }, {
  65663. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNMB7O2UIXE34PGSCSOULGHPX5LIJBMM/",
  65664. "name" : "FEDORA-2021-83b3740389",
  65665. "refsource" : "FEDORA",
  65666. "tags" : [ ]
  65667. }, {
  65668. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WX24EITRXVHDM5M223BVTJA2ODF2FSHI/",
  65669. "name" : "FEDORA-2021-a3703b9dc8",
  65670. "refsource" : "FEDORA",
  65671. "tags" : [ ]
  65672. }, {
  65673. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYOHNG2Q7DCAQZMGYLMENLKALGDLG3X/",
  65674. "name" : "FEDORA-2021-c56a213327",
  65675. "refsource" : "FEDORA",
  65676. "tags" : [ ]
  65677. } ]
  65678. },
  65679. "description" : {
  65680. "description_data" : [ {
  65681. "lang" : "en",
  65682. "value" : "A deadlock vulnerability was found in 'github.com/containers/storage' in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS)."
  65683. } ]
  65684. }
  65685. },
  65686. "configurations" : {
  65687. "CVE_data_version" : "4.0",
  65688. "nodes" : [ {
  65689. "operator" : "OR",
  65690. "children" : [ ],
  65691. "cpe_match" : [ {
  65692. "vulnerable" : true,
  65693. "cpe23Uri" : "cpe:2.3:a:storage_project:storage:*:*:*:*:*:*:*:*",
  65694. "versionEndExcluding" : "1.28.1",
  65695. "cpe_name" : [ ]
  65696. } ]
  65697. }, {
  65698. "operator" : "OR",
  65699. "children" : [ ],
  65700. "cpe_match" : [ {
  65701. "vulnerable" : true,
  65702. "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
  65703. "cpe_name" : [ ]
  65704. }, {
  65705. "vulnerable" : true,
  65706. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
  65707. "cpe_name" : [ ]
  65708. } ]
  65709. } ]
  65710. },
  65711. "impact" : {
  65712. "baseMetricV3" : {
  65713. "cvssV3" : {
  65714. "version" : "3.1",
  65715. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  65716. "attackVector" : "NETWORK",
  65717. "attackComplexity" : "LOW",
  65718. "privilegesRequired" : "NONE",
  65719. "userInteraction" : "REQUIRED",
  65720. "scope" : "UNCHANGED",
  65721. "confidentialityImpact" : "NONE",
  65722. "integrityImpact" : "NONE",
  65723. "availabilityImpact" : "HIGH",
  65724. "baseScore" : 6.5,
  65725. "baseSeverity" : "MEDIUM"
  65726. },
  65727. "exploitabilityScore" : 2.8,
  65728. "impactScore" : 3.6
  65729. },
  65730. "baseMetricV2" : {
  65731. "cvssV2" : {
  65732. "version" : "2.0",
  65733. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:C",
  65734. "accessVector" : "NETWORK",
  65735. "accessComplexity" : "MEDIUM",
  65736. "authentication" : "NONE",
  65737. "confidentialityImpact" : "NONE",
  65738. "integrityImpact" : "NONE",
  65739. "availabilityImpact" : "COMPLETE",
  65740. "baseScore" : 7.1
  65741. },
  65742. "severity" : "HIGH",
  65743. "exploitabilityScore" : 8.6,
  65744. "impactScore" : 6.9,
  65745. "acInsufInfo" : false,
  65746. "obtainAllPrivilege" : false,
  65747. "obtainUserPrivilege" : false,
  65748. "obtainOtherPrivilege" : false,
  65749. "userInteractionRequired" : true
  65750. }
  65751. },
  65752. "publishedDate" : "2021-04-01T18:15Z",
  65753. "lastModifiedDate" : "2021-05-06T14:15Z"
  65754. }, {
  65755. "cve" : {
  65756. "data_type" : "CVE",
  65757. "data_format" : "MITRE",
  65758. "data_version" : "4.0",
  65759. "CVE_data_meta" : {
  65760. "ID" : "CVE-2021-28165",
  65761. "ASSIGNER" : "security@eclipse.org"
  65762. },
  65763. "problemtype" : {
  65764. "problemtype_data" : [ {
  65765. "description" : [ {
  65766. "lang" : "en",
  65767. "value" : "CWE-400"
  65768. } ]
  65769. } ]
  65770. },
  65771. "references" : {
  65772. "reference_data" : [ {
  65773. "url" : "https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w",
  65774. "name" : "https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w",
  65775. "refsource" : "CONFIRM",
  65776. "tags" : [ "Exploit", "Third Party Advisory" ]
  65777. }, {
  65778. "url" : "https://lists.apache.org/thread.html/r9db72e9c33b93eba45a214af588f1d553839b5c3080fc913854a49ab@%3Cnotifications.zookeeper.apache.org%3E",
  65779. "name" : "[zookeeper-notifications] 20210407 [GitHub] [zookeeper] nkalmar commented on pull request #1675: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65780. "refsource" : "MLIST",
  65781. "tags" : [ ]
  65782. }, {
  65783. "url" : "https://lists.apache.org/thread.html/ra210e38ae0bf615084390b26ba01bb5d66c0a76f232277446ae0948a@%3Cnotifications.zookeeper.apache.org%3E",
  65784. "name" : "[zookeeper-notifications] 20210407 [GitHub] [zookeeper] nkalmar opened a new pull request #1675: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65785. "refsource" : "MLIST",
  65786. "tags" : [ ]
  65787. }, {
  65788. "url" : "https://lists.apache.org/thread.html/rbcd7b477df55857bb6cae21fcc4404683ac98aac1a47551f0dc55486@%3Cissues.zookeeper.apache.org%3E",
  65789. "name" : "[zookeeper-issues] 20210407 [jira] [Created] (ZOOKEEPER-4277) dependency-check:check failing - jetty-server-9.4.39 CVE-2021-28165",
  65790. "refsource" : "MLIST",
  65791. "tags" : [ ]
  65792. }, {
  65793. "url" : "https://lists.apache.org/thread.html/re6614b4fe7dbb945409daadb9e1cc73c02383df68bf9334736107a6e@%3Cdev.zookeeper.apache.org%3E",
  65794. "name" : "[zookeeper-dev] 20210407 [jira] [Created] (ZOOKEEPER-4277) dependency-check:check failing - jetty-server-9.4.39 CVE-2021-28165",
  65795. "refsource" : "MLIST",
  65796. "tags" : [ ]
  65797. }, {
  65798. "url" : "https://lists.apache.org/thread.html/r5f172f2dd8fb02f032ef4437218fd4f610605a3dd4f2a024c1e43b94@%3Cissues.zookeeper.apache.org%3E",
  65799. "name" : "[zookeeper-issues] 20210407 [jira] [Assigned] (ZOOKEEPER-4277) dependency-check:check failing - jetty-server-9.4.39 CVE-2021-28165",
  65800. "refsource" : "MLIST",
  65801. "tags" : [ ]
  65802. }, {
  65803. "url" : "https://lists.apache.org/thread.html/r17e26cf9a1e3cbc09522d15ece5d7c7a00cdced7641b92a22a783287@%3Cissues.zookeeper.apache.org%3E",
  65804. "name" : "[zookeeper-issues] 20210407 [jira] [Updated] (ZOOKEEPER-4277) dependency-check:check failing - jetty-server-9.4.39 CVE-2021-28165",
  65805. "refsource" : "MLIST",
  65806. "tags" : [ ]
  65807. }, {
  65808. "url" : "https://lists.apache.org/thread.html/re577736ca7da51952c910b345a500b7676ea9931c9b19709b87f292b@%3Cissues.zookeeper.apache.org%3E",
  65809. "name" : "[zookeeper-issues] 20210407 [jira] [Updated] (ZOOKEEPER-4277) dependency-check:check failing - jetty-server-9.4.38 CVE-2021-28165",
  65810. "refsource" : "MLIST",
  65811. "tags" : [ ]
  65812. }, {
  65813. "url" : "https://lists.apache.org/thread.html/r56e5568ac73daedcb3b5affbb4b908999f03d3c1b1ada3920b01e959@%3Cdev.zookeeper.apache.org%3E",
  65814. "name" : "[zookeeper-dev] 20210407 Re: [VOTE] Apache ZooKeeper release 3.6.3 candidate 1",
  65815. "refsource" : "MLIST",
  65816. "tags" : [ ]
  65817. }, {
  65818. "url" : "https://lists.apache.org/thread.html/ra21b3e6bd9669377139fe33fb46edf6fece3f31375bc42a0dcc964b2@%3Cnotifications.zookeeper.apache.org%3E",
  65819. "name" : "[zookeeper-notifications] 20210407 [GitHub] [zookeeper] nkalmar opened a new pull request #1676: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65820. "refsource" : "MLIST",
  65821. "tags" : [ ]
  65822. }, {
  65823. "url" : "https://lists.apache.org/thread.html/rbba0b02a3287e34af328070dd58f7828612f96e2e64992137f4dc63d@%3Cnotifications.zookeeper.apache.org%3E",
  65824. "name" : "[zookeeper-notifications] 20210407 [GitHub] [zookeeper] nkalmar edited a comment on pull request #1675: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65825. "refsource" : "MLIST",
  65826. "tags" : [ ]
  65827. }, {
  65828. "url" : "https://lists.apache.org/thread.html/r002258611ed0c35b82b839d284b43db9dcdec120db8afc1c993137dc@%3Cnotifications.zookeeper.apache.org%3E",
  65829. "name" : "[zookeeper-notifications] 20210407 [GitHub] [zookeeper] arshadmohammad commented on pull request #1676: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65830. "refsource" : "MLIST",
  65831. "tags" : [ ]
  65832. }, {
  65833. "url" : "https://lists.apache.org/thread.html/rdf4fe435891e8c35e70ea5da033b4c3da78760f15a8c4212fad89d9f@%3Ccommits.zookeeper.apache.org%3E",
  65834. "name" : "[zookeeper-commits] 20210407 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65835. "refsource" : "MLIST",
  65836. "tags" : [ ]
  65837. }, {
  65838. "url" : "https://lists.apache.org/thread.html/rc907ed7b089828364437de5ed57fa062330970dc1bc5cd214b711f77@%3Ccommits.zookeeper.apache.org%3E",
  65839. "name" : "[zookeeper-commits] 20210407 [zookeeper] branch branch-3.6.3 updated: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65840. "refsource" : "MLIST",
  65841. "tags" : [ ]
  65842. }, {
  65843. "url" : "https://lists.apache.org/thread.html/r7bf7004c18c914fae3d5a6a0191d477e5b6408d95669b3afbf6efa36@%3Ccommits.zookeeper.apache.org%3E",
  65844. "name" : "[zookeeper-commits] 20210407 [zookeeper] branch branch-3.7 updated: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65845. "refsource" : "MLIST",
  65846. "tags" : [ ]
  65847. }, {
  65848. "url" : "https://lists.apache.org/thread.html/ra9dd15ba8a4fb7e42c7fe948a6d6b3868fd6bbf8e3fb37fcf33b2cd0@%3Cnotifications.zookeeper.apache.org%3E",
  65849. "name" : "[zookeeper-notifications] 20210407 [GitHub] [zookeeper] asfgit closed pull request #1675: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65850. "refsource" : "MLIST",
  65851. "tags" : [ ]
  65852. }, {
  65853. "url" : "https://lists.apache.org/thread.html/rf99f9a25ca24fe519c9346388f61b5b3a09be31b800bf37f01473ad7@%3Cnotifications.zookeeper.apache.org%3E",
  65854. "name" : "[zookeeper-notifications] 20210407 [GitHub] [zookeeper] arshadmohammad commented on pull request #1675: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65855. "refsource" : "MLIST",
  65856. "tags" : [ ]
  65857. }, {
  65858. "url" : "https://lists.apache.org/thread.html/r33eb3889ca0aa12720355e64fc2f8f1e8c0c28a4d55b3b4b8891becb@%3Ccommits.zookeeper.apache.org%3E",
  65859. "name" : "[zookeeper-commits] 20210407 [zookeeper] branch master updated: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65860. "refsource" : "MLIST",
  65861. "tags" : [ ]
  65862. }, {
  65863. "url" : "https://lists.apache.org/thread.html/rb11a13e623218c70b9f2a2d0d122fdaaf905e04a2edcd23761894464@%3Cnotifications.zookeeper.apache.org%3E",
  65864. "name" : "[zookeeper-notifications] 20210407 [GitHub] [zookeeper] arshadmohammad closed pull request #1676: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65865. "refsource" : "MLIST",
  65866. "tags" : [ ]
  65867. }, {
  65868. "url" : "https://lists.apache.org/thread.html/r0a241b0649beef90d422b42a26a2470d336e59e66970eafd54f9c3e2@%3Ccommits.zookeeper.apache.org%3E",
  65869. "name" : "[zookeeper-commits] 20210407 [zookeeper] branch branch-3.5 updated: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165",
  65870. "refsource" : "MLIST",
  65871. "tags" : [ ]
  65872. }, {
  65873. "url" : "https://lists.apache.org/thread.html/r4abbd760d24bab2b8f1294c5c9216ae915100099c4391ad64e9ae38b@%3Cdev.hbase.apache.org%3E",
  65874. "name" : "[hbase-dev] 20210407 [jira] [Created] (HBASE-25746) [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165",
  65875. "refsource" : "MLIST",
  65876. "tags" : [ ]
  65877. }, {
  65878. "url" : "https://lists.apache.org/thread.html/rdbf2a2cd1800540ae50dd78b57411229223a6172117d62b8e57596aa@%3Cissues.hbase.apache.org%3E",
  65879. "name" : "[hbase-issues] 20210407 [GitHub] [hbase-thirdparty] Apache-HBase commented on pull request #49: HBASE-25746 [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165",
  65880. "refsource" : "MLIST",
  65881. "tags" : [ ]
  65882. }, {
  65883. "url" : "https://lists.apache.org/thread.html/ra50519652b0b7f869a14fbfb4be9758a29171d7fe561bb7e036e8449@%3Cissues.hbase.apache.org%3E",
  65884. "name" : "[hbase-issues] 20210407 [GitHub] [hbase-thirdparty] apurtell opened a new pull request #49: HBASE-25746 [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165",
  65885. "refsource" : "MLIST",
  65886. "tags" : [ ]
  65887. }, {
  65888. "url" : "https://lists.apache.org/thread.html/rbab9e67ec97591d063905bc7d4743e6a673f1bc457975fc0445ac97f@%3Cissues.hbase.apache.org%3E",
  65889. "name" : "[hbase-issues] 20210407 [jira] [Created] (HBASE-25746) [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165",
  65890. "refsource" : "MLIST",
  65891. "tags" : [ ]
  65892. }, {
  65893. "url" : "https://lists.apache.org/thread.html/r0f02034a33076fd7243cf3a8807d2766e373f5cb2e7fd0c9a78f97c4@%3Cissues.hbase.apache.org%3E",
  65894. "name" : "[hbase-issues] 20210407 [jira] [Updated] (HBASE-25746) [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165",
  65895. "refsource" : "MLIST",
  65896. "tags" : [ ]
  65897. }, {
  65898. "url" : "https://lists.apache.org/thread.html/r03ca0b69db1e3e5f72fe484b71370d537cd711cbf334e2913332730a@%3Cissues.spark.apache.org%3E",
  65899. "name" : "[spark-issues] 20210408 [jira] [Created] (SPARK-34988) Upgrade Jetty for CVE-2021-28165",
  65900. "refsource" : "MLIST",
  65901. "tags" : [ ]
  65902. }, {
  65903. "url" : "https://lists.apache.org/thread.html/r5d1f16dca2e010193840068f1a1ec17b7015e91acc646607cbc0a4da@%3Creviews.spark.apache.org%3E",
  65904. "name" : "[spark-reviews] 20210408 [GitHub] [spark] SparkQA commented on pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165",
  65905. "refsource" : "MLIST",
  65906. "tags" : [ ]
  65907. }, {
  65908. "url" : "https://lists.apache.org/thread.html/r942f4a903d0abb25ac75c592e57df98dea51350e8589269a72fd7913@%3Cissues.spark.apache.org%3E",
  65909. "name" : "[spark-issues] 20210408 [jira] [Assigned] (SPARK-34988) Upgrade Jetty for CVE-2021-28165",
  65910. "refsource" : "MLIST",
  65911. "tags" : [ ]
  65912. }, {
  65913. "url" : "https://lists.apache.org/thread.html/r7c40fb3a66a39b6e6c83b0454bc6917ffe6c69e3131322be9c07a1da@%3Cissues.spark.apache.org%3E",
  65914. "name" : "[spark-issues] 20210408 [jira] [Updated] (SPARK-34988) Upgrade Jetty for CVE-2021-28165",
  65915. "refsource" : "MLIST",
  65916. "tags" : [ ]
  65917. }, {
  65918. "url" : "https://lists.apache.org/thread.html/r83453ec252af729996476e5839d0b28f07294959d60fea1bd76f7d81@%3Cissues.spark.apache.org%3E",
  65919. "name" : "[spark-issues] 20210408 [jira] [Commented] (SPARK-34988) Upgrade Jetty for CVE-2021-28165",
  65920. "refsource" : "MLIST",
  65921. "tags" : [ ]
  65922. }, {
  65923. "url" : "https://lists.apache.org/thread.html/r940f15db77a96f6aea92d830bc94d8d95f26cc593394d144755824da@%3Creviews.spark.apache.org%3E",
  65924. "name" : "[spark-reviews] 20210408 [GitHub] [spark] sarutak opened a new pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165",
  65925. "refsource" : "MLIST",
  65926. "tags" : [ ]
  65927. }, {
  65928. "url" : "https://lists.apache.org/thread.html/rb8f5a6ded384eb00608e6137e87110e7dd7d5054cc34561cb89b81af@%3Creviews.spark.apache.org%3E",
  65929. "name" : "[spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins commented on pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165",
  65930. "refsource" : "MLIST",
  65931. "tags" : [ ]
  65932. }, {
  65933. "url" : "https://lists.apache.org/thread.html/rf6de4c249bd74007f5f66f683c110535f46e719d2f83a41e8faf295f@%3Creviews.spark.apache.org%3E",
  65934. "name" : "[spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins removed a comment on pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165",
  65935. "refsource" : "MLIST",
  65936. "tags" : [ ]
  65937. }, {
  65938. "url" : "https://lists.apache.org/thread.html/r769155244ca2da2948a44091bb3bb9a56e7e1c71ecc720b8ecf281f0@%3Creviews.spark.apache.org%3E",
  65939. "name" : "[spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins commented on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165",
  65940. "refsource" : "MLIST",
  65941. "tags" : [ ]
  65942. }, {
  65943. "url" : "https://lists.apache.org/thread.html/r31f591a0deac927ede8ccc3eac4bb92697ee2361bf01549f9e3440ca@%3Creviews.spark.apache.org%3E",
  65944. "name" : "[spark-reviews] 20210408 [GitHub] [spark] sarutak opened a new pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165",
  65945. "refsource" : "MLIST",
  65946. "tags" : [ ]
  65947. }, {
  65948. "url" : "https://lists.apache.org/thread.html/rc6c43c3180c0efe00497c73dd374cd34b62036cb67987ad42c1f2dce@%3Creviews.spark.apache.org%3E",
  65949. "name" : "[spark-reviews] 20210408 [GitHub] [spark] SparkQA commented on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165",
  65950. "refsource" : "MLIST",
  65951. "tags" : [ ]
  65952. }, {
  65953. "url" : "https://lists.apache.org/thread.html/r2f2d9c3b7cc750a6763d6388bcf5db0c7b467bd8be6ac4d6aea4f0cf@%3Creviews.spark.apache.org%3E",
  65954. "name" : "[spark-reviews] 20210408 [GitHub] [spark] HyukjinKwon commented on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165",
  65955. "refsource" : "MLIST",
  65956. "tags" : [ ]
  65957. }, {
  65958. "url" : "https://lists.apache.org/thread.html/r9b793db9f395b546e66fb9c44fe1cd75c7755029e944dfee31b8b779@%3Creviews.spark.apache.org%3E",
  65959. "name" : "[spark-reviews] 20210408 [GitHub] [spark] SparkQA commented on pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165",
  65960. "refsource" : "MLIST",
  65961. "tags" : [ ]
  65962. }, {
  65963. "url" : "https://lists.apache.org/thread.html/rdfe5f1c071ba9dadba18d7fb0ff13ea6ecb33da624250c559999eaeb@%3Creviews.spark.apache.org%3E",
  65964. "name" : "[spark-reviews] 20210408 [GitHub] [spark] sarutak commented on pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165",
  65965. "refsource" : "MLIST",
  65966. "tags" : [ ]
  65967. }, {
  65968. "url" : "https://lists.apache.org/thread.html/rb66ed0b4bb74836add60dd5ddf9172016380b2aeefb7f96fe348537b@%3Creviews.spark.apache.org%3E",
  65969. "name" : "[spark-reviews] 20210408 [GitHub] [spark] MaxGekk closed pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165",
  65970. "refsource" : "MLIST",
  65971. "tags" : [ ]
  65972. }, {
  65973. "url" : "https://lists.apache.org/thread.html/rae8bbc5a516f3e21b8a55e61ff6ad0ced03bdbd116d2170a3eed9f5c@%3Creviews.spark.apache.org%3E",
  65974. "name" : "[spark-reviews] 20210408 [GitHub] [spark] SparkQA commented on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165",
  65975. "refsource" : "MLIST",
  65976. "tags" : [ ]
  65977. }, {
  65978. "url" : "https://lists.apache.org/thread.html/re3a1617d16a7367f767b8209b2151f4c19958196354b39568c532f26@%3Creviews.spark.apache.org%3E",
  65979. "name" : "[spark-reviews] 20210408 [GitHub] [spark] sarutak opened a new pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165",
  65980. "refsource" : "MLIST",
  65981. "tags" : [ ]
  65982. }, {
  65983. "url" : "https://lists.apache.org/thread.html/rfd3ff6e66b6bbcfb2fefa9f5a20328937c0369b2e142e3e1c6774743@%3Creviews.spark.apache.org%3E",
  65984. "name" : "[spark-reviews] 20210408 [GitHub] [spark] MaxGekk commented on pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165",
  65985. "refsource" : "MLIST",
  65986. "tags" : [ ]
  65987. }, {
  65988. "url" : "https://lists.apache.org/thread.html/r0cd1a5e3f4ad4770b44f8aa96572fc09d5b35bec149c0cc247579c42@%3Creviews.spark.apache.org%3E",
  65989. "name" : "[spark-reviews] 20210408 [GitHub] [spark] sarutak opened a new pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165",
  65990. "refsource" : "MLIST",
  65991. "tags" : [ ]
  65992. }, {
  65993. "url" : "https://lists.apache.org/thread.html/r9fae5a4087d9ed1c9d4f0c7493b6981a4741cfb4bebb2416da638424@%3Cissues.spark.apache.org%3E",
  65994. "name" : "[spark-issues] 20210408 [jira] [Resolved] (SPARK-34988) Upgrade Jetty for CVE-2021-28165",
  65995. "refsource" : "MLIST",
  65996. "tags" : [ ]
  65997. }, {
  65998. "url" : "https://lists.apache.org/thread.html/rb00345f6b1620b553d2cc1acaf3017aa75cea3776b911e024fa3b187@%3Creviews.spark.apache.org%3E",
  65999. "name" : "[spark-reviews] 20210408 [GitHub] [spark] SparkQA removed a comment on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165",
  66000. "refsource" : "MLIST",
  66001. "tags" : [ ]
  66002. }, {
  66003. "url" : "https://lists.apache.org/thread.html/rb1624b9777a3070135e94331a428c6653a6a1edccd56fa9fb7a547f2@%3Creviews.spark.apache.org%3E",
  66004. "name" : "[spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins commented on pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165",
  66005. "refsource" : "MLIST",
  66006. "tags" : [ ]
  66007. }, {
  66008. "url" : "https://lists.apache.org/thread.html/rbd9a837a18ca57ac0d9b4165a6eec95ee132f55d025666fe41099f33@%3Creviews.spark.apache.org%3E",
  66009. "name" : "[spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins removed a comment on pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165",
  66010. "refsource" : "MLIST",
  66011. "tags" : [ ]
  66012. }, {
  66013. "url" : "https://lists.apache.org/thread.html/ree1895a256a9db951e0d97a76222909c2e1f28c1a3d89933173deed6@%3Creviews.spark.apache.org%3E",
  66014. "name" : "[spark-reviews] 20210408 [GitHub] [spark] SparkQA removed a comment on pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165",
  66015. "refsource" : "MLIST",
  66016. "tags" : [ ]
  66017. }, {
  66018. "url" : "https://lists.apache.org/thread.html/raea6e820644e8c5a577f77d4e2044f8ab52183c2536b00c56738beef@%3Creviews.spark.apache.org%3E",
  66019. "name" : "[spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins removed a comment on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165",
  66020. "refsource" : "MLIST",
  66021. "tags" : [ ]
  66022. }, {
  66023. "url" : "https://lists.apache.org/thread.html/rd6c1eb9a8a94b3ac8a525d74d792924e8469f201b77e1afcf774e7a6@%3Creviews.spark.apache.org%3E",
  66024. "name" : "[spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins commented on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165",
  66025. "refsource" : "MLIST",
  66026. "tags" : [ ]
  66027. }, {
  66028. "url" : "https://lists.apache.org/thread.html/rb2d34abb67cdf525945fe4b821c5cdbca29a78d586ae1f9f505a311c@%3Creviews.spark.apache.org%3E",
  66029. "name" : "[spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins removed a comment on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165",
  66030. "refsource" : "MLIST",
  66031. "tags" : [ ]
  66032. }, {
  66033. "url" : "https://lists.apache.org/thread.html/r06d54a297cb8217c66e5190912a955fb870ba47da164002bf2baffe5@%3Creviews.spark.apache.org%3E",
  66034. "name" : "[spark-reviews] 20210408 [GitHub] [spark] srowen commented on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165",
  66035. "refsource" : "MLIST",
  66036. "tags" : [ ]
  66037. }, {
  66038. "url" : "https://lists.apache.org/thread.html/r05db8e0ef01e1280cc7543575ae0fa1c2b4d06a8b928916ef65dd2ad@%3Creviews.spark.apache.org%3E",
  66039. "name" : "[spark-reviews] 20210408 [GitHub] [spark] SparkQA removed a comment on pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165",
  66040. "refsource" : "MLIST",
  66041. "tags" : [ ]
  66042. }, {
  66043. "url" : "https://lists.apache.org/thread.html/r71031d0acb1de55c9ab32f4750c50ce2f28543252e887ca03bd5621e@%3Creviews.spark.apache.org%3E",
  66044. "name" : "[spark-reviews] 20210408 [GitHub] [spark] SparkQA removed a comment on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165",
  66045. "refsource" : "MLIST",
  66046. "tags" : [ ]
  66047. }, {
  66048. "url" : "https://lists.apache.org/thread.html/r72bf813ed4737196ea3ed26494e949577be587fd5939fe8be09907c7@%3Creviews.spark.apache.org%3E",
  66049. "name" : "[spark-reviews] 20210408 [GitHub] [spark] srowen commented on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165",
  66050. "refsource" : "MLIST",
  66051. "tags" : [ ]
  66052. }, {
  66053. "url" : "https://lists.apache.org/thread.html/r746434be6abff9ad321ff54ecae09e1f09c1c7c139021f40a5774090@%3Creviews.spark.apache.org%3E",
  66054. "name" : "[spark-reviews] 20210408 [GitHub] [spark] srowen commented on pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165",
  66055. "refsource" : "MLIST",
  66056. "tags" : [ ]
  66057. }, {
  66058. "url" : "https://lists.apache.org/thread.html/r6ce2907b2691c025250ba010bc797677ef78d5994d08507a2e5477c9@%3Creviews.spark.apache.org%3E",
  66059. "name" : "[spark-reviews] 20210408 [GitHub] [spark] dongjoon-hyun commented on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165",
  66060. "refsource" : "MLIST",
  66061. "tags" : [ ]
  66062. }, {
  66063. "url" : "https://lists.apache.org/thread.html/rdde34d53aa80193cda016272d61e6749f8a9044ccb37a30768938f7e@%3Creviews.spark.apache.org%3E",
  66064. "name" : "[spark-reviews] 20210408 [GitHub] [spark] srowen closed pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165",
  66065. "refsource" : "MLIST",
  66066. "tags" : [ ]
  66067. }, {
  66068. "url" : "https://lists.apache.org/thread.html/r23785214d47673b811ef119ca3a40f729801865ea1e891572d15faa6@%3Creviews.spark.apache.org%3E",
  66069. "name" : "[spark-reviews] 20210408 [GitHub] [spark] srowen closed pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165",
  66070. "refsource" : "MLIST",
  66071. "tags" : [ ]
  66072. }, {
  66073. "url" : "https://lists.apache.org/thread.html/rf1b02dfccd27b8bbc3afd119b212452fa32e9ed7d506be9357a3a7ec@%3Creviews.spark.apache.org%3E",
  66074. "name" : "[spark-reviews] 20210408 [GitHub] [spark] viirya commented on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165",
  66075. "refsource" : "MLIST",
  66076. "tags" : [ ]
  66077. }, {
  66078. "url" : "https://lists.apache.org/thread.html/r411d75dc6bcefadaaea246549dd18e8d391a880ddf28a796f09ce152@%3Creviews.spark.apache.org%3E",
  66079. "name" : "[spark-reviews] 20210408 [GitHub] [spark] dongjoon-hyun edited a comment on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165",
  66080. "refsource" : "MLIST",
  66081. "tags" : [ ]
  66082. }, {
  66083. "url" : "https://lists.apache.org/thread.html/rd24d8a059233167b4a5aebda4b3534ca1d86caa8a85b10a73403ee97@%3Ccommits.spark.apache.org%3E",
  66084. "name" : "[spark-commits] 20210408 [spark] branch branch-2.4 updated: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165",
  66085. "refsource" : "MLIST",
  66086. "tags" : [ ]
  66087. }, {
  66088. "url" : "https://lists.apache.org/thread.html/r47a7542ab61da865fff3db0fe74bfe76c89a37b6e6d2c2a423f8baee@%3Creviews.spark.apache.org%3E",
  66089. "name" : "[spark-reviews] 20210408 [GitHub] [spark] dongjoon-hyun commented on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165",
  66090. "refsource" : "MLIST",
  66091. "tags" : [ ]
  66092. }, {
  66093. "url" : "https://lists.apache.org/thread.html/r2afc72af069a7fe89ca2de847f3ab3971cb1d668a9497c999946cd78@%3Ccommits.spark.apache.org%3E",
  66094. "name" : "[spark-commits] 20210408 [spark] branch branch-3.0 updated: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165",
  66095. "refsource" : "MLIST",
  66096. "tags" : [ ]
  66097. }, {
  66098. "url" : "https://lists.apache.org/thread.html/r0a4797ba6ceea8074f47574a4f3cc11493d514c1fab8203ebd212add@%3Creviews.spark.apache.org%3E",
  66099. "name" : "[spark-reviews] 20210408 [GitHub] [spark] dongjoon-hyun closed pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165",
  66100. "refsource" : "MLIST",
  66101. "tags" : [ ]
  66102. }, {
  66103. "url" : "https://lists.apache.org/thread.html/r7189bf41cb0c483629917a01cf296f9fbdbda3987084595192e3845d@%3Cissues.hbase.apache.org%3E",
  66104. "name" : "[hbase-issues] 20210408 [GitHub] [hbase-thirdparty] apurtell merged pull request #49: HBASE-25746 [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165",
  66105. "refsource" : "MLIST",
  66106. "tags" : [ ]
  66107. }, {
  66108. "url" : "https://lists.apache.org/thread.html/re0545ecced2d468c94ce4dcfa37d40a9573cc68ef5f6839ffca9c1c1@%3Ccommits.hbase.apache.org%3E",
  66109. "name" : "[hbase-commits] 20210408 [hbase-thirdparty] branch master updated: HBASE-25746 [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165 (#49)",
  66110. "refsource" : "MLIST",
  66111. "tags" : [ ]
  66112. }, {
  66113. "url" : "https://lists.apache.org/thread.html/r4891d45625cc522fe0eb764ac50d48bcca9c0db4805ea4a998d4c225@%3Cissues.hbase.apache.org%3E",
  66114. "name" : "[hbase-issues] 20210408 [jira] [Updated] (HBASE-25746) [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165",
  66115. "refsource" : "MLIST",
  66116. "tags" : [ ]
  66117. }, {
  66118. "url" : "https://lists.apache.org/thread.html/r520c56519b8820955a86966f499e7a0afcbcf669d6f7da59ef1eb155@%3Ccommits.pulsar.apache.org%3E",
  66119. "name" : "[pulsar-commits] 20210409 [GitHub] [pulsar] dinghram opened a new pull request #10183: CVE-2021-28165-Jetty",
  66120. "refsource" : "MLIST",
  66121. "tags" : [ ]
  66122. }, {
  66123. "url" : "https://lists.apache.org/thread.html/rfc9f51b4e21022b3cd6cb6f90791a6a6999560212e519b5f09db0aed@%3Ccommits.pulsar.apache.org%3E",
  66124. "name" : "[pulsar-commits] 20210409 [GitHub] [pulsar] merlimat commented on pull request #10183: CVE-2021-28165-Jetty",
  66125. "refsource" : "MLIST",
  66126. "tags" : [ ]
  66127. }, {
  66128. "url" : "https://lists.apache.org/thread.html/r6535b2beddf0ed2d263ab64ff365a5f790df135a1a2f45786417adb7@%3Cdev.kafka.apache.org%3E",
  66129. "name" : "[kafka-dev] 20210412 [jira] [Created] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66130. "refsource" : "MLIST",
  66131. "tags" : [ ]
  66132. }, {
  66133. "url" : "https://lists.apache.org/thread.html/r65daad30d13f7c56eb5c3d7733ad8dddbf62c469175410777a78d812@%3Cjira.kafka.apache.org%3E",
  66134. "name" : "[kafka-jira] 20210412 [jira] [Created] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66135. "refsource" : "MLIST",
  66136. "tags" : [ ]
  66137. }, {
  66138. "url" : "https://lists.apache.org/thread.html/rc4779abc1cface47e956cf9f8910f15d79c24477e7b1ac9be076a825@%3Cjira.kafka.apache.org%3E",
  66139. "name" : "[kafka-jira] 20210412 [jira] [Updated] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66140. "refsource" : "MLIST",
  66141. "tags" : [ ]
  66142. }, {
  66143. "url" : "https://lists.apache.org/thread.html/r90327f55db8f1d079f9a724aabf1f5eb3c00c1de49dc7fd04cad1ebc@%3Ccommits.pulsar.apache.org%3E",
  66144. "name" : "[pulsar-commits] 20210412 [GitHub] [pulsar] jiazhai commented on pull request #10183: CVE-2021-28165-Jetty",
  66145. "refsource" : "MLIST",
  66146. "tags" : [ ]
  66147. }, {
  66148. "url" : "https://lists.apache.org/thread.html/rcdea97f4d3233298296aabc103c9fcefbf629425418c2b69bb16745f@%3Ccommits.pulsar.apache.org%3E",
  66149. "name" : "[pulsar-commits] 20210412 [GitHub] [pulsar] jiazhai closed pull request #10183: CVE-2021-28165-Jetty",
  66150. "refsource" : "MLIST",
  66151. "tags" : [ ]
  66152. }, {
  66153. "url" : "https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E",
  66154. "name" : "[kafka-jira] 20210412 [GitHub] [kafka] dongjinleekr opened a new pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66155. "refsource" : "MLIST",
  66156. "tags" : [ ]
  66157. }, {
  66158. "url" : "https://lists.apache.org/thread.html/r0bf3aa065abd23960fc8bdc8090d6bc00d5e391cf94ec4e1f4537ae3@%3Cjira.kafka.apache.org%3E",
  66159. "name" : "[kafka-jira] 20210412 [jira] [Assigned] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66160. "refsource" : "MLIST",
  66161. "tags" : [ ]
  66162. }, {
  66163. "url" : "https://lists.apache.org/thread.html/r077b76cafb61520c14c87c4fc76419ed664002da0ddac5ad851ae7e7@%3Cjira.kafka.apache.org%3E",
  66164. "name" : "[kafka-jira] 20210412 [GitHub] [kafka] dongjinleekr commented on pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66165. "refsource" : "MLIST",
  66166. "tags" : [ ]
  66167. }, {
  66168. "url" : "https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E",
  66169. "name" : "[ignite-issues] 20210413 [jira] [Created] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty",
  66170. "refsource" : "MLIST",
  66171. "tags" : [ ]
  66172. }, {
  66173. "url" : "https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E",
  66174. "name" : "[ignite-dev] 20210413 [jira] [Created] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty",
  66175. "refsource" : "MLIST",
  66176. "tags" : [ ]
  66177. }, {
  66178. "url" : "https://lists.apache.org/thread.html/rd755dfe5f658c42704540ad7950cebd136739089c3231658e398cf38@%3Cjira.kafka.apache.org%3E",
  66179. "name" : "[kafka-jira] 20210413 [jira] [Resolved] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66180. "refsource" : "MLIST",
  66181. "tags" : [ ]
  66182. }, {
  66183. "url" : "https://lists.apache.org/thread.html/r6f256a1d15505f79f4050a69bb8f27b34cb353604dd2f765c9da5df7@%3Cjira.kafka.apache.org%3E",
  66184. "name" : "[kafka-jira] 20210413 [GitHub] [kafka] chia7712 merged pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66185. "refsource" : "MLIST",
  66186. "tags" : [ ]
  66187. }, {
  66188. "url" : "https://lists.apache.org/thread.html/rc4dbc9907b0bdd634200ac90a15283d9c143c11af66e7ec72128d020@%3Cjira.kafka.apache.org%3E",
  66189. "name" : "[kafka-jira] 20210413 [jira] [Updated] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66190. "refsource" : "MLIST",
  66191. "tags" : [ ]
  66192. }, {
  66193. "url" : "https://lists.apache.org/thread.html/r6b070441871a4e6ce8bb63e190c879bb60da7c5e15023de29ebd4f9f@%3Cjira.kafka.apache.org%3E",
  66194. "name" : "[kafka-jira] 20210413 [GitHub] [kafka] edwin092 commented on pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66195. "refsource" : "MLIST",
  66196. "tags" : [ ]
  66197. }, {
  66198. "url" : "https://lists.apache.org/thread.html/r694e57d74fcaa48818a03c282aecfa13ae68340c798dfcb55cb7acc7@%3Cdev.kafka.apache.org%3E",
  66199. "name" : "[kafka-dev] 20210413 [jira] [Resolved] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66200. "refsource" : "MLIST",
  66201. "tags" : [ ]
  66202. }, {
  66203. "url" : "https://lists.apache.org/thread.html/rd9ea411a58925cc82c32e15f541ead23cb25b4b2d57a2bdb0341536e@%3Cjira.kafka.apache.org%3E",
  66204. "name" : "[kafka-jira] 20210413 [GitHub] [kafka] chia7712 commented on pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66205. "refsource" : "MLIST",
  66206. "tags" : [ ]
  66207. }, {
  66208. "url" : "https://lists.apache.org/thread.html/r81748d56923882543f5be456043c67daef84d631cf54899082058ef1@%3Cjira.kafka.apache.org%3E",
  66209. "name" : "[kafka-jira] 20210413 [GitHub] [kafka] dongjinleekr commented on pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66210. "refsource" : "MLIST",
  66211. "tags" : [ ]
  66212. }, {
  66213. "url" : "https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E",
  66214. "name" : "[solr-issues] 20210414 [jira] [Updated] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr",
  66215. "refsource" : "MLIST",
  66216. "tags" : [ ]
  66217. }, {
  66218. "url" : "http://www.openwall.com/lists/oss-security/2021/04/20/3",
  66219. "name" : "[oss-security] 20210420 Vulnerability in Jenkins",
  66220. "refsource" : "MLIST",
  66221. "tags" : [ ]
  66222. }, {
  66223. "url" : "https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E",
  66224. "name" : "[ignite-issues] 20210426 [jira] [Commented] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty",
  66225. "refsource" : "MLIST",
  66226. "tags" : [ ]
  66227. }, {
  66228. "url" : "https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E",
  66229. "name" : "[ignite-issues] 20210426 [jira] [Updated] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty",
  66230. "refsource" : "MLIST",
  66231. "tags" : [ ]
  66232. }, {
  66233. "url" : "https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E",
  66234. "name" : "[ignite-issues] 20210426 [jira] [Updated] (IGNITE-14527) Upgrade Jetty version to fix CVE-2021-2816[3,4,5] in Jetty",
  66235. "refsource" : "MLIST",
  66236. "tags" : [ ]
  66237. }, {
  66238. "url" : "https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E",
  66239. "name" : "[solr-issues] 20210507 [jira] [Updated] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr",
  66240. "refsource" : "MLIST",
  66241. "tags" : [ ]
  66242. } ]
  66243. },
  66244. "description" : {
  66245. "description_data" : [ {
  66246. "lang" : "en",
  66247. "value" : "In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame."
  66248. } ]
  66249. }
  66250. },
  66251. "configurations" : {
  66252. "CVE_data_version" : "4.0",
  66253. "nodes" : [ {
  66254. "operator" : "OR",
  66255. "children" : [ ],
  66256. "cpe_match" : [ {
  66257. "vulnerable" : true,
  66258. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
  66259. "versionStartIncluding" : "7.2.2",
  66260. "versionEndExcluding" : "9.4.39",
  66261. "cpe_name" : [ ]
  66262. }, {
  66263. "vulnerable" : true,
  66264. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
  66265. "versionStartIncluding" : "10.0.0",
  66266. "versionEndExcluding" : "10.0.2",
  66267. "cpe_name" : [ ]
  66268. }, {
  66269. "vulnerable" : true,
  66270. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
  66271. "versionStartIncluding" : "11.0.0",
  66272. "versionEndExcluding" : "11.0.2",
  66273. "cpe_name" : [ ]
  66274. } ]
  66275. } ]
  66276. },
  66277. "impact" : {
  66278. "baseMetricV3" : {
  66279. "cvssV3" : {
  66280. "version" : "3.1",
  66281. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  66282. "attackVector" : "NETWORK",
  66283. "attackComplexity" : "LOW",
  66284. "privilegesRequired" : "NONE",
  66285. "userInteraction" : "NONE",
  66286. "scope" : "UNCHANGED",
  66287. "confidentialityImpact" : "NONE",
  66288. "integrityImpact" : "NONE",
  66289. "availabilityImpact" : "HIGH",
  66290. "baseScore" : 7.5,
  66291. "baseSeverity" : "HIGH"
  66292. },
  66293. "exploitabilityScore" : 3.9,
  66294. "impactScore" : 3.6
  66295. },
  66296. "baseMetricV2" : {
  66297. "cvssV2" : {
  66298. "version" : "2.0",
  66299. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C",
  66300. "accessVector" : "NETWORK",
  66301. "accessComplexity" : "LOW",
  66302. "authentication" : "NONE",
  66303. "confidentialityImpact" : "NONE",
  66304. "integrityImpact" : "NONE",
  66305. "availabilityImpact" : "COMPLETE",
  66306. "baseScore" : 7.8
  66307. },
  66308. "severity" : "HIGH",
  66309. "exploitabilityScore" : 10.0,
  66310. "impactScore" : 6.9,
  66311. "acInsufInfo" : false,
  66312. "obtainAllPrivilege" : false,
  66313. "obtainUserPrivilege" : false,
  66314. "obtainOtherPrivilege" : false,
  66315. "userInteractionRequired" : false
  66316. }
  66317. },
  66318. "publishedDate" : "2021-04-01T15:15Z",
  66319. "lastModifiedDate" : "2021-05-07T16:15Z"
  66320. }, {
  66321. "cve" : {
  66322. "data_type" : "CVE",
  66323. "data_format" : "MITRE",
  66324. "data_version" : "4.0",
  66325. "CVE_data_meta" : {
  66326. "ID" : "CVE-2021-28164",
  66327. "ASSIGNER" : "security@eclipse.org"
  66328. },
  66329. "problemtype" : {
  66330. "problemtype_data" : [ {
  66331. "description" : [ {
  66332. "lang" : "en",
  66333. "value" : "CWE-200"
  66334. } ]
  66335. } ]
  66336. },
  66337. "references" : {
  66338. "reference_data" : [ {
  66339. "url" : "https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5",
  66340. "name" : "https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5",
  66341. "refsource" : "CONFIRM",
  66342. "tags" : [ "Mitigation", "Third Party Advisory" ]
  66343. }, {
  66344. "url" : "https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E",
  66345. "name" : "[kafka-jira] 20210412 [GitHub] [kafka] dongjinleekr opened a new pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66346. "refsource" : "MLIST",
  66347. "tags" : [ ]
  66348. }, {
  66349. "url" : "https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E",
  66350. "name" : "[ignite-issues] 20210413 [jira] [Created] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty",
  66351. "refsource" : "MLIST",
  66352. "tags" : [ ]
  66353. }, {
  66354. "url" : "https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E",
  66355. "name" : "[ignite-dev] 20210413 [jira] [Created] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty",
  66356. "refsource" : "MLIST",
  66357. "tags" : [ ]
  66358. }, {
  66359. "url" : "https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E",
  66360. "name" : "[solr-issues] 20210414 [jira] [Updated] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr",
  66361. "refsource" : "MLIST",
  66362. "tags" : [ ]
  66363. }, {
  66364. "url" : "https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E",
  66365. "name" : "[ignite-issues] 20210426 [jira] [Commented] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty",
  66366. "refsource" : "MLIST",
  66367. "tags" : [ ]
  66368. }, {
  66369. "url" : "https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E",
  66370. "name" : "[ignite-issues] 20210426 [jira] [Updated] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty",
  66371. "refsource" : "MLIST",
  66372. "tags" : [ ]
  66373. }, {
  66374. "url" : "https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E",
  66375. "name" : "[ignite-issues] 20210426 [jira] [Updated] (IGNITE-14527) Upgrade Jetty version to fix CVE-2021-2816[3,4,5] in Jetty",
  66376. "refsource" : "MLIST",
  66377. "tags" : [ ]
  66378. }, {
  66379. "url" : "https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E",
  66380. "name" : "[solr-issues] 20210507 [jira] [Updated] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr",
  66381. "refsource" : "MLIST",
  66382. "tags" : [ ]
  66383. } ]
  66384. },
  66385. "description" : {
  66386. "description_data" : [ {
  66387. "lang" : "en",
  66388. "value" : "In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application."
  66389. } ]
  66390. }
  66391. },
  66392. "configurations" : {
  66393. "CVE_data_version" : "4.0",
  66394. "nodes" : [ {
  66395. "operator" : "OR",
  66396. "children" : [ ],
  66397. "cpe_match" : [ {
  66398. "vulnerable" : true,
  66399. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:9.4.37:20210219:*:*:*:*:*:*",
  66400. "cpe_name" : [ ]
  66401. }, {
  66402. "vulnerable" : true,
  66403. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:9.4.38:20210224:*:*:*:*:*:*",
  66404. "cpe_name" : [ ]
  66405. } ]
  66406. } ]
  66407. },
  66408. "impact" : {
  66409. "baseMetricV3" : {
  66410. "cvssV3" : {
  66411. "version" : "3.1",
  66412. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  66413. "attackVector" : "NETWORK",
  66414. "attackComplexity" : "LOW",
  66415. "privilegesRequired" : "NONE",
  66416. "userInteraction" : "NONE",
  66417. "scope" : "UNCHANGED",
  66418. "confidentialityImpact" : "LOW",
  66419. "integrityImpact" : "NONE",
  66420. "availabilityImpact" : "NONE",
  66421. "baseScore" : 5.3,
  66422. "baseSeverity" : "MEDIUM"
  66423. },
  66424. "exploitabilityScore" : 3.9,
  66425. "impactScore" : 1.4
  66426. },
  66427. "baseMetricV2" : {
  66428. "cvssV2" : {
  66429. "version" : "2.0",
  66430. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  66431. "accessVector" : "NETWORK",
  66432. "accessComplexity" : "LOW",
  66433. "authentication" : "NONE",
  66434. "confidentialityImpact" : "PARTIAL",
  66435. "integrityImpact" : "NONE",
  66436. "availabilityImpact" : "NONE",
  66437. "baseScore" : 5.0
  66438. },
  66439. "severity" : "MEDIUM",
  66440. "exploitabilityScore" : 10.0,
  66441. "impactScore" : 2.9,
  66442. "acInsufInfo" : false,
  66443. "obtainAllPrivilege" : false,
  66444. "obtainUserPrivilege" : false,
  66445. "obtainOtherPrivilege" : false,
  66446. "userInteractionRequired" : false
  66447. }
  66448. },
  66449. "publishedDate" : "2021-04-01T15:15Z",
  66450. "lastModifiedDate" : "2021-05-07T16:15Z"
  66451. }, {
  66452. "cve" : {
  66453. "data_type" : "CVE",
  66454. "data_format" : "MITRE",
  66455. "data_version" : "4.0",
  66456. "CVE_data_meta" : {
  66457. "ID" : "CVE-2021-28163",
  66458. "ASSIGNER" : "security@eclipse.org"
  66459. },
  66460. "problemtype" : {
  66461. "problemtype_data" : [ {
  66462. "description" : [ {
  66463. "lang" : "en",
  66464. "value" : "CWE-59"
  66465. } ]
  66466. } ]
  66467. },
  66468. "references" : {
  66469. "reference_data" : [ {
  66470. "url" : "https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq",
  66471. "name" : "https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq",
  66472. "refsource" : "CONFIRM",
  66473. "tags" : [ "Exploit", "Third Party Advisory" ]
  66474. }, {
  66475. "url" : "https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E",
  66476. "name" : "[kafka-jira] 20210412 [GitHub] [kafka] dongjinleekr opened a new pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39",
  66477. "refsource" : "MLIST",
  66478. "tags" : [ ]
  66479. }, {
  66480. "url" : "https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E",
  66481. "name" : "[ignite-issues] 20210413 [jira] [Created] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty",
  66482. "refsource" : "MLIST",
  66483. "tags" : [ ]
  66484. }, {
  66485. "url" : "https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E",
  66486. "name" : "[ignite-dev] 20210413 [jira] [Created] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty",
  66487. "refsource" : "MLIST",
  66488. "tags" : [ ]
  66489. }, {
  66490. "url" : "https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E",
  66491. "name" : "[solr-issues] 20210414 [jira] [Updated] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr",
  66492. "refsource" : "MLIST",
  66493. "tags" : [ ]
  66494. }, {
  66495. "url" : "https://lists.apache.org/thread.html/r787e47297a614b05b99d01b04c8a1d6c0cafb480c9cb7c624a6b8fc3@%3Cissues.solr.apache.org%3E",
  66496. "name" : "[solr-issues] 20210414 [jira] [Created] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr",
  66497. "refsource" : "MLIST",
  66498. "tags" : [ ]
  66499. }, {
  66500. "url" : "https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E",
  66501. "name" : "[ignite-issues] 20210426 [jira] [Commented] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty",
  66502. "refsource" : "MLIST",
  66503. "tags" : [ ]
  66504. }, {
  66505. "url" : "https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E",
  66506. "name" : "[ignite-issues] 20210426 [jira] [Updated] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty",
  66507. "refsource" : "MLIST",
  66508. "tags" : [ ]
  66509. }, {
  66510. "url" : "https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E",
  66511. "name" : "[ignite-issues] 20210426 [jira] [Updated] (IGNITE-14527) Upgrade Jetty version to fix CVE-2021-2816[3,4,5] in Jetty",
  66512. "refsource" : "MLIST",
  66513. "tags" : [ ]
  66514. }, {
  66515. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAAKW7S66TECXGJZWB3ZFGOQAK34IYHF/",
  66516. "name" : "FEDORA-2021-444e38face",
  66517. "refsource" : "FEDORA",
  66518. "tags" : [ ]
  66519. }, {
  66520. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5CXQIJVYU4R3JL6LSPXQ5GIV7WLLA7PI/",
  66521. "name" : "FEDORA-2021-35f06984d7",
  66522. "refsource" : "FEDORA",
  66523. "tags" : [ ]
  66524. }, {
  66525. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGNKXBNRRCZTGGXPIX3VBWCF2SAM3DWS/",
  66526. "name" : "FEDORA-2021-fd66b2bd53",
  66527. "refsource" : "FEDORA",
  66528. "tags" : [ ]
  66529. }, {
  66530. "url" : "https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E",
  66531. "name" : "[solr-issues] 20210507 [jira] [Updated] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr",
  66532. "refsource" : "MLIST",
  66533. "tags" : [ ]
  66534. } ]
  66535. },
  66536. "description" : {
  66537. "description_data" : [ {
  66538. "lang" : "en",
  66539. "value" : "In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory that is a symlink, the contents of the webapps directory is deployed as a static webapp, inadvertently serving the webapps themselves and anything else that might be in that directory."
  66540. } ]
  66541. }
  66542. },
  66543. "configurations" : {
  66544. "CVE_data_version" : "4.0",
  66545. "nodes" : [ {
  66546. "operator" : "OR",
  66547. "children" : [ ],
  66548. "cpe_match" : [ {
  66549. "vulnerable" : true,
  66550. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
  66551. "versionStartIncluding" : "9.4.32",
  66552. "versionEndExcluding" : "9.4.39",
  66553. "cpe_name" : [ ]
  66554. }, {
  66555. "vulnerable" : true,
  66556. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:10.0.0:beta2:*:*:*:*:*:*",
  66557. "cpe_name" : [ ]
  66558. }, {
  66559. "vulnerable" : true,
  66560. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:10.0.1:*:*:*:*:*:*:*",
  66561. "cpe_name" : [ ]
  66562. }, {
  66563. "vulnerable" : true,
  66564. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:11.0.0:-:*:*:*:*:*:*",
  66565. "cpe_name" : [ ]
  66566. }, {
  66567. "vulnerable" : true,
  66568. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:11.0.0:beta2:*:*:*:*:*:*",
  66569. "cpe_name" : [ ]
  66570. }, {
  66571. "vulnerable" : true,
  66572. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:11.0.0:beta3:*:*:*:*:*:*",
  66573. "cpe_name" : [ ]
  66574. }, {
  66575. "vulnerable" : true,
  66576. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:11.0.1:*:*:*:*:*:*:*",
  66577. "cpe_name" : [ ]
  66578. } ]
  66579. } ]
  66580. },
  66581. "impact" : {
  66582. "baseMetricV3" : {
  66583. "cvssV3" : {
  66584. "version" : "3.1",
  66585. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
  66586. "attackVector" : "NETWORK",
  66587. "attackComplexity" : "LOW",
  66588. "privilegesRequired" : "HIGH",
  66589. "userInteraction" : "NONE",
  66590. "scope" : "UNCHANGED",
  66591. "confidentialityImpact" : "LOW",
  66592. "integrityImpact" : "NONE",
  66593. "availabilityImpact" : "NONE",
  66594. "baseScore" : 2.7,
  66595. "baseSeverity" : "LOW"
  66596. },
  66597. "exploitabilityScore" : 1.2,
  66598. "impactScore" : 1.4
  66599. },
  66600. "baseMetricV2" : {
  66601. "cvssV2" : {
  66602. "version" : "2.0",
  66603. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
  66604. "accessVector" : "NETWORK",
  66605. "accessComplexity" : "LOW",
  66606. "authentication" : "SINGLE",
  66607. "confidentialityImpact" : "PARTIAL",
  66608. "integrityImpact" : "NONE",
  66609. "availabilityImpact" : "NONE",
  66610. "baseScore" : 4.0
  66611. },
  66612. "severity" : "MEDIUM",
  66613. "exploitabilityScore" : 8.0,
  66614. "impactScore" : 2.9,
  66615. "acInsufInfo" : false,
  66616. "obtainAllPrivilege" : false,
  66617. "obtainUserPrivilege" : false,
  66618. "obtainOtherPrivilege" : false,
  66619. "userInteractionRequired" : false
  66620. }
  66621. },
  66622. "publishedDate" : "2021-04-01T15:15Z",
  66623. "lastModifiedDate" : "2021-05-07T16:15Z"
  66624. }, {
  66625. "cve" : {
  66626. "data_type" : "CVE",
  66627. "data_format" : "MITRE",
  66628. "data_version" : "4.0",
  66629. "CVE_data_meta" : {
  66630. "ID" : "CVE-2021-3393",
  66631. "ASSIGNER" : "secalert@redhat.com"
  66632. },
  66633. "problemtype" : {
  66634. "problemtype_data" : [ {
  66635. "description" : [ {
  66636. "lang" : "en",
  66637. "value" : "CWE-209"
  66638. } ]
  66639. } ]
  66640. },
  66641. "references" : {
  66642. "reference_data" : [ {
  66643. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1924005",
  66644. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1924005",
  66645. "refsource" : "MISC",
  66646. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  66647. }, {
  66648. "url" : "https://security.netapp.com/advisory/ntap-20210507-0006/",
  66649. "name" : "https://security.netapp.com/advisory/ntap-20210507-0006/",
  66650. "refsource" : "CONFIRM",
  66651. "tags" : [ ]
  66652. } ]
  66653. },
  66654. "description" : {
  66655. "description_data" : [ {
  66656. "lang" : "en",
  66657. "value" : "An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read."
  66658. } ]
  66659. }
  66660. },
  66661. "configurations" : {
  66662. "CVE_data_version" : "4.0",
  66663. "nodes" : [ {
  66664. "operator" : "OR",
  66665. "children" : [ ],
  66666. "cpe_match" : [ {
  66667. "vulnerable" : true,
  66668. "cpe23Uri" : "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
  66669. "versionEndExcluding" : "11.11",
  66670. "cpe_name" : [ ]
  66671. }, {
  66672. "vulnerable" : true,
  66673. "cpe23Uri" : "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
  66674. "versionStartIncluding" : "12.0",
  66675. "versionEndExcluding" : "12.6",
  66676. "cpe_name" : [ ]
  66677. }, {
  66678. "vulnerable" : true,
  66679. "cpe23Uri" : "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
  66680. "versionStartIncluding" : "13.0",
  66681. "versionEndExcluding" : "13.2",
  66682. "cpe_name" : [ ]
  66683. } ]
  66684. }, {
  66685. "operator" : "OR",
  66686. "children" : [ ],
  66687. "cpe_match" : [ {
  66688. "vulnerable" : true,
  66689. "cpe23Uri" : "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*",
  66690. "cpe_name" : [ ]
  66691. }, {
  66692. "vulnerable" : true,
  66693. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
  66694. "cpe_name" : [ ]
  66695. } ]
  66696. } ]
  66697. },
  66698. "impact" : {
  66699. "baseMetricV3" : {
  66700. "cvssV3" : {
  66701. "version" : "3.1",
  66702. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
  66703. "attackVector" : "NETWORK",
  66704. "attackComplexity" : "LOW",
  66705. "privilegesRequired" : "LOW",
  66706. "userInteraction" : "NONE",
  66707. "scope" : "UNCHANGED",
  66708. "confidentialityImpact" : "LOW",
  66709. "integrityImpact" : "NONE",
  66710. "availabilityImpact" : "NONE",
  66711. "baseScore" : 4.3,
  66712. "baseSeverity" : "MEDIUM"
  66713. },
  66714. "exploitabilityScore" : 2.8,
  66715. "impactScore" : 1.4
  66716. },
  66717. "baseMetricV2" : {
  66718. "cvssV2" : {
  66719. "version" : "2.0",
  66720. "vectorString" : "AV:N/AC:M/Au:S/C:P/I:N/A:N",
  66721. "accessVector" : "NETWORK",
  66722. "accessComplexity" : "MEDIUM",
  66723. "authentication" : "SINGLE",
  66724. "confidentialityImpact" : "PARTIAL",
  66725. "integrityImpact" : "NONE",
  66726. "availabilityImpact" : "NONE",
  66727. "baseScore" : 3.5
  66728. },
  66729. "severity" : "LOW",
  66730. "exploitabilityScore" : 6.8,
  66731. "impactScore" : 2.9,
  66732. "acInsufInfo" : false,
  66733. "obtainAllPrivilege" : false,
  66734. "obtainUserPrivilege" : false,
  66735. "obtainOtherPrivilege" : false,
  66736. "userInteractionRequired" : false
  66737. }
  66738. },
  66739. "publishedDate" : "2021-04-01T14:15Z",
  66740. "lastModifiedDate" : "2021-05-07T05:15Z"
  66741. }, {
  66742. "cve" : {
  66743. "data_type" : "CVE",
  66744. "data_format" : "MITRE",
  66745. "data_version" : "4.0",
  66746. "CVE_data_meta" : {
  66747. "ID" : "CVE-2021-29251",
  66748. "ASSIGNER" : "cve@mitre.org"
  66749. },
  66750. "problemtype" : {
  66751. "problemtype_data" : [ {
  66752. "description" : [ {
  66753. "lang" : "en",
  66754. "value" : "NVD-CWE-noinfo"
  66755. } ]
  66756. } ]
  66757. },
  66758. "references" : {
  66759. "reference_data" : [ {
  66760. "url" : "https://github.com/btcpayserver/btcpayserver/releases/tag/v1.0.7.1",
  66761. "name" : "https://github.com/btcpayserver/btcpayserver/releases/tag/v1.0.7.1",
  66762. "refsource" : "MISC",
  66763. "tags" : [ "Release Notes", "Third Party Advisory" ]
  66764. }, {
  66765. "url" : "https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/",
  66766. "name" : "https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/",
  66767. "refsource" : "MISC",
  66768. "tags" : [ ]
  66769. } ]
  66770. },
  66771. "description" : {
  66772. "description_data" : [ {
  66773. "lang" : "en",
  66774. "value" : "BTCPay Server before 1.0.7.1 mishandles the policy setting in which users can register (in Server Settings > Policies). This affects Docker use cases in which a mail server is configured."
  66775. } ]
  66776. }
  66777. },
  66778. "configurations" : {
  66779. "CVE_data_version" : "4.0",
  66780. "nodes" : [ {
  66781. "operator" : "OR",
  66782. "children" : [ ],
  66783. "cpe_match" : [ {
  66784. "vulnerable" : true,
  66785. "cpe23Uri" : "cpe:2.3:a:btcpayserver:btcpay_server:*:*:*:*:*:*:*:*",
  66786. "versionEndExcluding" : "1.0.7.1",
  66787. "cpe_name" : [ ]
  66788. } ]
  66789. } ]
  66790. },
  66791. "impact" : {
  66792. "baseMetricV3" : {
  66793. "cvssV3" : {
  66794. "version" : "3.1",
  66795. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
  66796. "attackVector" : "NETWORK",
  66797. "attackComplexity" : "LOW",
  66798. "privilegesRequired" : "LOW",
  66799. "userInteraction" : "NONE",
  66800. "scope" : "UNCHANGED",
  66801. "confidentialityImpact" : "NONE",
  66802. "integrityImpact" : "HIGH",
  66803. "availabilityImpact" : "NONE",
  66804. "baseScore" : 6.5,
  66805. "baseSeverity" : "MEDIUM"
  66806. },
  66807. "exploitabilityScore" : 2.8,
  66808. "impactScore" : 3.6
  66809. },
  66810. "baseMetricV2" : {
  66811. "cvssV2" : {
  66812. "version" : "2.0",
  66813. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  66814. "accessVector" : "NETWORK",
  66815. "accessComplexity" : "MEDIUM",
  66816. "authentication" : "SINGLE",
  66817. "confidentialityImpact" : "NONE",
  66818. "integrityImpact" : "PARTIAL",
  66819. "availabilityImpact" : "NONE",
  66820. "baseScore" : 3.5
  66821. },
  66822. "severity" : "LOW",
  66823. "exploitabilityScore" : 6.8,
  66824. "impactScore" : 2.9,
  66825. "acInsufInfo" : false,
  66826. "obtainAllPrivilege" : false,
  66827. "obtainUserPrivilege" : false,
  66828. "obtainOtherPrivilege" : false,
  66829. "userInteractionRequired" : false
  66830. }
  66831. },
  66832. "publishedDate" : "2021-04-01T05:15Z",
  66833. "lastModifiedDate" : "2021-05-05T13:15Z"
  66834. }, {
  66835. "cve" : {
  66836. "data_type" : "CVE",
  66837. "data_format" : "MITRE",
  66838. "data_version" : "4.0",
  66839. "CVE_data_meta" : {
  66840. "ID" : "CVE-2021-21983",
  66841. "ASSIGNER" : "security@vmware.com"
  66842. },
  66843. "problemtype" : {
  66844. "problemtype_data" : [ {
  66845. "description" : [ {
  66846. "lang" : "en",
  66847. "value" : "NVD-CWE-noinfo"
  66848. } ]
  66849. } ]
  66850. },
  66851. "references" : {
  66852. "reference_data" : [ {
  66853. "url" : "https://www.vmware.com/security/advisories/VMSA-2021-0004.html",
  66854. "name" : "https://www.vmware.com/security/advisories/VMSA-2021-0004.html",
  66855. "refsource" : "MISC",
  66856. "tags" : [ "Vendor Advisory" ]
  66857. }, {
  66858. "url" : "http://packetstormsecurity.com/files/162349/VMware-vRealize-Operations-Manager-Server-Side-Request-Forgery-Code-Execution.html",
  66859. "name" : "http://packetstormsecurity.com/files/162349/VMware-vRealize-Operations-Manager-Server-Side-Request-Forgery-Code-Execution.html",
  66860. "refsource" : "MISC",
  66861. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  66862. } ]
  66863. },
  66864. "description" : {
  66865. "description_data" : [ {
  66866. "lang" : "en",
  66867. "value" : "Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system."
  66868. } ]
  66869. }
  66870. },
  66871. "configurations" : {
  66872. "CVE_data_version" : "4.0",
  66873. "nodes" : [ {
  66874. "operator" : "OR",
  66875. "children" : [ ],
  66876. "cpe_match" : [ {
  66877. "vulnerable" : true,
  66878. "cpe23Uri" : "cpe:2.3:a:vmare:vrealize_operations_manager:7.0.0:*:*:*:*:*:*:*",
  66879. "cpe_name" : [ ]
  66880. }, {
  66881. "vulnerable" : true,
  66882. "cpe23Uri" : "cpe:2.3:a:vmare:vrealize_operations_manager:7.5.0:*:*:*:*:*:*:*",
  66883. "cpe_name" : [ ]
  66884. }, {
  66885. "vulnerable" : true,
  66886. "cpe23Uri" : "cpe:2.3:a:vmare:vrealize_operations_manager:8.0.0:*:*:*:*:*:*:*",
  66887. "cpe_name" : [ ]
  66888. }, {
  66889. "vulnerable" : true,
  66890. "cpe23Uri" : "cpe:2.3:a:vmare:vrealize_operations_manager:8.0.1:*:*:*:*:*:*:*",
  66891. "cpe_name" : [ ]
  66892. }, {
  66893. "vulnerable" : true,
  66894. "cpe23Uri" : "cpe:2.3:a:vmare:vrealize_operations_manager:8.1.0:*:*:*:*:*:*:*",
  66895. "cpe_name" : [ ]
  66896. }, {
  66897. "vulnerable" : true,
  66898. "cpe23Uri" : "cpe:2.3:a:vmare:vrealize_operations_manager:8.1.1:*:*:*:*:*:*:*",
  66899. "cpe_name" : [ ]
  66900. }, {
  66901. "vulnerable" : true,
  66902. "cpe23Uri" : "cpe:2.3:a:vmare:vrealize_operations_manager:8.2.0:*:*:*:*:*:*:*",
  66903. "cpe_name" : [ ]
  66904. }, {
  66905. "vulnerable" : true,
  66906. "cpe23Uri" : "cpe:2.3:a:vmare:vrealize_operations_manager:8.3.0:*:*:*:*:*:*:*",
  66907. "cpe_name" : [ ]
  66908. }, {
  66909. "vulnerable" : true,
  66910. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.0:*:*:*:*:*:*:*",
  66911. "cpe_name" : [ ]
  66912. }, {
  66913. "vulnerable" : true,
  66914. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.0.1:*:*:*:*:*:*:*",
  66915. "cpe_name" : [ ]
  66916. }, {
  66917. "vulnerable" : true,
  66918. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.0.1.1:*:*:*:*:*:*:*",
  66919. "cpe_name" : [ ]
  66920. }, {
  66921. "vulnerable" : true,
  66922. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.5:*:*:*:*:*:*:*",
  66923. "cpe_name" : [ ]
  66924. }, {
  66925. "vulnerable" : true,
  66926. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.5.1:*:*:*:*:*:*:*",
  66927. "cpe_name" : [ ]
  66928. }, {
  66929. "vulnerable" : true,
  66930. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.7:*:*:*:*:*:*:*",
  66931. "cpe_name" : [ ]
  66932. }, {
  66933. "vulnerable" : true,
  66934. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.7.1:*:*:*:*:*:*:*",
  66935. "cpe_name" : [ ]
  66936. }, {
  66937. "vulnerable" : true,
  66938. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.7.2:*:*:*:*:*:*:*",
  66939. "cpe_name" : [ ]
  66940. }, {
  66941. "vulnerable" : true,
  66942. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.8:*:*:*:*:*:*:*",
  66943. "cpe_name" : [ ]
  66944. }, {
  66945. "vulnerable" : true,
  66946. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.8.1:*:*:*:*:*:*:*",
  66947. "cpe_name" : [ ]
  66948. }, {
  66949. "vulnerable" : true,
  66950. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.9:*:*:*:*:*:*:*",
  66951. "cpe_name" : [ ]
  66952. }, {
  66953. "vulnerable" : true,
  66954. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.9.1:*:*:*:*:*:*:*",
  66955. "cpe_name" : [ ]
  66956. }, {
  66957. "vulnerable" : true,
  66958. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:3.10:*:*:*:*:*:*:*",
  66959. "cpe_name" : [ ]
  66960. }, {
  66961. "vulnerable" : true,
  66962. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:*",
  66963. "cpe_name" : [ ]
  66964. }, {
  66965. "vulnerable" : true,
  66966. "cpe23Uri" : "cpe:2.3:a:vmware:cloud_foundation:4.0.1:*:*:*:*:*:*:*",
  66967. "cpe_name" : [ ]
  66968. }, {
  66969. "vulnerable" : true,
  66970. "cpe23Uri" : "cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.0:*:*:*:*:*:*:*",
  66971. "cpe_name" : [ ]
  66972. }, {
  66973. "vulnerable" : true,
  66974. "cpe23Uri" : "cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.0.1:*:*:*:*:*:*:*",
  66975. "cpe_name" : [ ]
  66976. }, {
  66977. "vulnerable" : true,
  66978. "cpe23Uri" : "cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.1:*:*:*:*:*:*:*",
  66979. "cpe_name" : [ ]
  66980. }, {
  66981. "vulnerable" : true,
  66982. "cpe23Uri" : "cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.2:*:*:*:*:*:*:*",
  66983. "cpe_name" : [ ]
  66984. } ]
  66985. } ]
  66986. },
  66987. "impact" : {
  66988. "baseMetricV3" : {
  66989. "cvssV3" : {
  66990. "version" : "3.1",
  66991. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
  66992. "attackVector" : "NETWORK",
  66993. "attackComplexity" : "LOW",
  66994. "privilegesRequired" : "HIGH",
  66995. "userInteraction" : "NONE",
  66996. "scope" : "UNCHANGED",
  66997. "confidentialityImpact" : "NONE",
  66998. "integrityImpact" : "HIGH",
  66999. "availabilityImpact" : "HIGH",
  67000. "baseScore" : 6.5,
  67001. "baseSeverity" : "MEDIUM"
  67002. },
  67003. "exploitabilityScore" : 1.2,
  67004. "impactScore" : 5.2
  67005. },
  67006. "baseMetricV2" : {
  67007. "cvssV2" : {
  67008. "version" : "2.0",
  67009. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:C/A:C",
  67010. "accessVector" : "NETWORK",
  67011. "accessComplexity" : "LOW",
  67012. "authentication" : "SINGLE",
  67013. "confidentialityImpact" : "NONE",
  67014. "integrityImpact" : "COMPLETE",
  67015. "availabilityImpact" : "COMPLETE",
  67016. "baseScore" : 8.5
  67017. },
  67018. "severity" : "HIGH",
  67019. "exploitabilityScore" : 8.0,
  67020. "impactScore" : 9.2,
  67021. "acInsufInfo" : false,
  67022. "obtainAllPrivilege" : false,
  67023. "obtainUserPrivilege" : false,
  67024. "obtainOtherPrivilege" : false,
  67025. "userInteractionRequired" : false
  67026. }
  67027. },
  67028. "publishedDate" : "2021-03-31T18:15Z",
  67029. "lastModifiedDate" : "2021-05-05T14:23Z"
  67030. }, {
  67031. "cve" : {
  67032. "data_type" : "CVE",
  67033. "data_format" : "MITRE",
  67034. "data_version" : "4.0",
  67035. "CVE_data_meta" : {
  67036. "ID" : "CVE-2021-28657",
  67037. "ASSIGNER" : "security@apache.org"
  67038. },
  67039. "problemtype" : {
  67040. "problemtype_data" : [ {
  67041. "description" : [ {
  67042. "lang" : "en",
  67043. "value" : "CWE-835"
  67044. } ]
  67045. } ]
  67046. },
  67047. "references" : {
  67048. "reference_data" : [ {
  67049. "url" : "https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E",
  67050. "name" : "https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E",
  67051. "refsource" : "MISC",
  67052. "tags" : [ "Mailing List", "Vendor Advisory" ]
  67053. }, {
  67054. "url" : "https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E",
  67055. "name" : "[james-notifications] 20210501 [GitHub] [james-project] chibenwa opened a new pull request #414: [UPGRADE] Adopt Apache Tika 1.26",
  67056. "refsource" : "MLIST",
  67057. "tags" : [ ]
  67058. }, {
  67059. "url" : "https://security.netapp.com/advisory/ntap-20210507-0004/",
  67060. "name" : "https://security.netapp.com/advisory/ntap-20210507-0004/",
  67061. "refsource" : "CONFIRM",
  67062. "tags" : [ ]
  67063. } ]
  67064. },
  67065. "description" : {
  67066. "description_data" : [ {
  67067. "lang" : "en",
  67068. "value" : "A carefully crafted or corrupt file may trigger an infinite loop in Tika's MP3Parser up to and including Tika 1.25. Apache Tika users should upgrade to 1.26 or later."
  67069. } ]
  67070. }
  67071. },
  67072. "configurations" : {
  67073. "CVE_data_version" : "4.0",
  67074. "nodes" : [ {
  67075. "operator" : "OR",
  67076. "children" : [ ],
  67077. "cpe_match" : [ {
  67078. "vulnerable" : true,
  67079. "cpe23Uri" : "cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:*",
  67080. "versionEndIncluding" : "1.25",
  67081. "cpe_name" : [ ]
  67082. } ]
  67083. } ]
  67084. },
  67085. "impact" : {
  67086. "baseMetricV3" : {
  67087. "cvssV3" : {
  67088. "version" : "3.1",
  67089. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  67090. "attackVector" : "LOCAL",
  67091. "attackComplexity" : "LOW",
  67092. "privilegesRequired" : "NONE",
  67093. "userInteraction" : "REQUIRED",
  67094. "scope" : "UNCHANGED",
  67095. "confidentialityImpact" : "NONE",
  67096. "integrityImpact" : "NONE",
  67097. "availabilityImpact" : "HIGH",
  67098. "baseScore" : 5.5,
  67099. "baseSeverity" : "MEDIUM"
  67100. },
  67101. "exploitabilityScore" : 1.8,
  67102. "impactScore" : 3.6
  67103. },
  67104. "baseMetricV2" : {
  67105. "cvssV2" : {
  67106. "version" : "2.0",
  67107. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  67108. "accessVector" : "NETWORK",
  67109. "accessComplexity" : "MEDIUM",
  67110. "authentication" : "NONE",
  67111. "confidentialityImpact" : "NONE",
  67112. "integrityImpact" : "NONE",
  67113. "availabilityImpact" : "PARTIAL",
  67114. "baseScore" : 4.3
  67115. },
  67116. "severity" : "MEDIUM",
  67117. "exploitabilityScore" : 8.6,
  67118. "impactScore" : 2.9,
  67119. "acInsufInfo" : false,
  67120. "obtainAllPrivilege" : false,
  67121. "obtainUserPrivilege" : false,
  67122. "obtainOtherPrivilege" : false,
  67123. "userInteractionRequired" : true
  67124. }
  67125. },
  67126. "publishedDate" : "2021-03-31T08:15Z",
  67127. "lastModifiedDate" : "2021-05-07T05:15Z"
  67128. }, {
  67129. "cve" : {
  67130. "data_type" : "CVE",
  67131. "data_format" : "MITRE",
  67132. "data_version" : "4.0",
  67133. "CVE_data_meta" : {
  67134. "ID" : "CVE-2021-21409",
  67135. "ASSIGNER" : "security-advisories@github.com"
  67136. },
  67137. "problemtype" : {
  67138. "problemtype_data" : [ {
  67139. "description" : [ {
  67140. "lang" : "en",
  67141. "value" : "CWE-444"
  67142. } ]
  67143. } ]
  67144. },
  67145. "references" : {
  67146. "reference_data" : [ {
  67147. "url" : "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21295",
  67148. "name" : "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21295",
  67149. "refsource" : "MISC",
  67150. "tags" : [ "Third Party Advisory" ]
  67151. }, {
  67152. "url" : "https://github.com/netty/netty/security/advisories/GHSA-f256-j965-7f32",
  67153. "name" : "https://github.com/netty/netty/security/advisories/GHSA-f256-j965-7f32",
  67154. "refsource" : "CONFIRM",
  67155. "tags" : [ "Third Party Advisory" ]
  67156. }, {
  67157. "url" : "https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj",
  67158. "name" : "https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj",
  67159. "refsource" : "MISC",
  67160. "tags" : [ "Third Party Advisory" ]
  67161. }, {
  67162. "url" : "https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432",
  67163. "name" : "https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432",
  67164. "refsource" : "MISC",
  67165. "tags" : [ "Patch", "Third Party Advisory" ]
  67166. }, {
  67167. "url" : "https://www.debian.org/security/2021/dsa-4885",
  67168. "name" : "DSA-4885",
  67169. "refsource" : "DEBIAN",
  67170. "tags" : [ "Third Party Advisory" ]
  67171. }, {
  67172. "url" : "https://lists.apache.org/thread.html/ra66e93703e3f4bd31bdfd0b6fb0c32ae96b528259bb1aa2b6d38e401@%3Cissues.zookeeper.apache.org%3E",
  67173. "name" : "[zookeeper-issues] 20210407 [jira] [Assigned] (ZOOKEEPER-4278) dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67174. "refsource" : "MLIST",
  67175. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67176. }, {
  67177. "url" : "https://lists.apache.org/thread.html/r2732aa3884cacfecac4c54cfaa77c279ba815cad44b464a567216f83@%3Cissues.zookeeper.apache.org%3E",
  67178. "name" : "[zookeeper-issues] 20210407 [jira] [Created] (ZOOKEEPER-4278) dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67179. "refsource" : "MLIST",
  67180. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67181. }, {
  67182. "url" : "https://lists.apache.org/thread.html/r70c3a7bfa904f06a1902f4df20ee26e4f09a46b8fd3eb304dc57a2de@%3Cdev.zookeeper.apache.org%3E",
  67183. "name" : "[zookeeper-dev] 20210407 [jira] [Created] (ZOOKEEPER-4278) dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67184. "refsource" : "MLIST",
  67185. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67186. }, {
  67187. "url" : "https://lists.apache.org/thread.html/r0ca82fec33334e571fe5b388272260778883e307e15415d7b1443de2@%3Cissues.zookeeper.apache.org%3E",
  67188. "name" : "[zookeeper-issues] 20210408 [jira] [Comment Edited] (ZOOKEEPER-4278) dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67189. "refsource" : "MLIST",
  67190. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67191. }, {
  67192. "url" : "https://lists.apache.org/thread.html/r823d4b27fcba8dad5fe945bdefce3ca5a0031187966eb6ef3cc22ba9@%3Cissues.zookeeper.apache.org%3E",
  67193. "name" : "[zookeeper-issues] 20210408 [jira] [Commented] (ZOOKEEPER-4278) dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67194. "refsource" : "MLIST",
  67195. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67196. }, {
  67197. "url" : "https://lists.apache.org/thread.html/r101f82d8f3b5af0bf79aecbd5b2dd3b404f6bb51d1a54c2c3d29bed9@%3Cnotifications.zookeeper.apache.org%3E",
  67198. "name" : "[zookeeper-notifications] 20210408 [GitHub] [zookeeper] ayushmantri opened a new pull request #1678: ZOOKEEPER-4278: dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67199. "refsource" : "MLIST",
  67200. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67201. }, {
  67202. "url" : "https://lists.apache.org/thread.html/rf521ff2be2e2dd38984174d3451e6ee935c845948845c8fccd86371d@%3Cissues.zookeeper.apache.org%3E",
  67203. "name" : "[zookeeper-issues] 20210408 [jira] [Updated] (ZOOKEEPER-4278) dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67204. "refsource" : "MLIST",
  67205. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67206. }, {
  67207. "url" : "https://lists.apache.org/thread.html/r5cbea8614812289a9b98d0cfc54b47f54cef424ac98d5e315b791795@%3Cnotifications.zookeeper.apache.org%3E",
  67208. "name" : "[zookeeper-notifications] 20210408 [GitHub] [zookeeper] arshadmohammad commented on pull request #1678: ZOOKEEPER-4278: dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67209. "refsource" : "MLIST",
  67210. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67211. }, {
  67212. "url" : "https://lists.apache.org/thread.html/r69efd8ef003f612c43e4154e788ca3b1f837feaacd16d97854402355@%3Ccommits.zookeeper.apache.org%3E",
  67213. "name" : "[zookeeper-commits] 20210408 [zookeeper] branch branch-3.7 updated: ZOOKEEPER-4278: dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67214. "refsource" : "MLIST",
  67215. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67216. }, {
  67217. "url" : "https://lists.apache.org/thread.html/rdd206d9dd7eb894cc089b37fe6edde2932de88d63a6d8368b44f5101@%3Ccommits.zookeeper.apache.org%3E",
  67218. "name" : "[zookeeper-commits] 20210408 [zookeeper] branch master updated: ZOOKEEPER-4278: dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67219. "refsource" : "MLIST",
  67220. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67221. }, {
  67222. "url" : "https://lists.apache.org/thread.html/r4a98827bb4a7edbd69ef862f2351391845697c40711820d10df52ca5@%3Ccommits.zookeeper.apache.org%3E",
  67223. "name" : "[zookeeper-commits] 20210408 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-4278: dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67224. "refsource" : "MLIST",
  67225. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67226. }, {
  67227. "url" : "https://lists.apache.org/thread.html/rac8cf45a1bab9ead5c9a860cbadd6faaeb7792203617b6ec3874736d@%3Cissues.zookeeper.apache.org%3E",
  67228. "name" : "[zookeeper-issues] 20210408 [jira] [Resolved] (ZOOKEEPER-4278) dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67229. "refsource" : "MLIST",
  67230. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67231. }, {
  67232. "url" : "https://lists.apache.org/thread.html/re4b0141939370304d676fe23774d0c6fbc584b648919825402d0cb39@%3Cnotifications.zookeeper.apache.org%3E",
  67233. "name" : "[zookeeper-notifications] 20210408 [GitHub] [zookeeper] asfgit closed pull request #1678: ZOOKEEPER-4278: dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67234. "refsource" : "MLIST",
  67235. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67236. }, {
  67237. "url" : "https://lists.apache.org/thread.html/r4b8be87acf5b9c098a2ee350b5ca5716fe7afeaf0a21a4ee45a90687@%3Cissues.zookeeper.apache.org%3E",
  67238. "name" : "[zookeeper-issues] 20210408 [jira] [Assigned] (ZOOKEEPER-4278) dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67239. "refsource" : "MLIST",
  67240. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67241. }, {
  67242. "url" : "https://lists.apache.org/thread.html/rdd5715f3ee5e3216d5e0083a07994f67da6dbb9731ce9e7a6389b18e@%3Ccommits.zookeeper.apache.org%3E",
  67243. "name" : "[zookeeper-commits] 20210408 [zookeeper] 01/02: ZOOKEEPER-4278: dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67244. "refsource" : "MLIST",
  67245. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67246. }, {
  67247. "url" : "https://lists.apache.org/thread.html/r1b3cb056364794f919aaf26ceaf7423de64e7fdd05a914066e7d5219@%3Cissues.zookeeper.apache.org%3E",
  67248. "name" : "[zookeeper-issues] 20210409 [jira] [Commented] (ZOOKEEPER-4278) dependency-check:check failing - netty-transport-4.1.60.Final CVE-2021-21409",
  67249. "refsource" : "MLIST",
  67250. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67251. }, {
  67252. "url" : "https://lists.apache.org/thread.html/rf38e4dcdefc7c59f7ba0799a399d6d6e37b555d406a1dfc2fcbf0b35@%3Ccommits.pulsar.apache.org%3E",
  67253. "name" : "[pulsar-commits] 20210419 [GitHub] [pulsar] lhotari opened a new pull request #10266: [Security] Upgrade Netty to 4.1.63.Final to address CVE-2021-21409",
  67254. "refsource" : "MLIST",
  67255. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67256. }, {
  67257. "url" : "https://lists.apache.org/thread.html/r61564d86a75403b854cdafee67fc69c8b88c5f6802c2c838f4282cc8@%3Ccommits.pulsar.apache.org%3E",
  67258. "name" : "[pulsar-commits] 20210419 [GitHub] [pulsar] lhotari commented on pull request #10266: [Security] Upgrade Netty to 4.1.63.Final to address CVE-2021-21409",
  67259. "refsource" : "MLIST",
  67260. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67261. }, {
  67262. "url" : "https://lists.apache.org/thread.html/r7879ddcb990c835c6b246654770d836f9d031dee982be836744e50ed@%3Ccommits.pulsar.apache.org%3E",
  67263. "name" : "[pulsar-commits] 20210420 [GitHub] [pulsar] eolivelli merged pull request #10266: [Security] Upgrade Netty to 4.1.63.Final to address CVE-2021-21409",
  67264. "refsource" : "MLIST",
  67265. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67266. }, {
  67267. "url" : "https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E",
  67268. "name" : "[flink-dev] 20210424 [jira] [Created] (FLINK-22441) In Flink v1.11.3 contains netty(version:3.10.6) netty(version:4.1.60) . There are many vulnerabilities, like CVE-2021-21409 etc. please confirm these version and fix. thx",
  67269. "refsource" : "MLIST",
  67270. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67271. }, {
  67272. "url" : "https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E",
  67273. "name" : "[flink-issues] 20210424 [jira] [Created] (FLINK-22441) In Flink v1.11.3 contains netty(version:3.10.6) netty(version:4.1.60) . There are many vulnerabilities, like CVE-2021-21409 etc. please confirm these version and fix. thx",
  67274. "refsource" : "MLIST",
  67275. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67276. }, {
  67277. "url" : "https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E",
  67278. "name" : "[flink-issues] 20210426 [jira] [Commented] (FLINK-22441) In Flink v1.11.3 contains netty(version:3.10.6) netty(version:4.1.60) . There are many vulnerabilities, like CVE-2021-21409 etc. please confirm these version and fix. thx",
  67279. "refsource" : "MLIST",
  67280. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67281. }, {
  67282. "url" : "https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E",
  67283. "name" : "[flink-issues] 20210426 [jira] [Updated] (FLINK-22441) In Flink v1.11.3 contains netty(version:3.10.6) netty(version:4.1.60) . There are many vulnerabilities, like CVE-2021-21409 etc. please confirm these version and fix. thx",
  67284. "refsource" : "MLIST",
  67285. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67286. }, {
  67287. "url" : "https://lists.apache.org/thread.html/rbde2f13daf4911504f0eaea43eee4f42555241b5f6d9d71564b6c5fa@%3Cjira.kafka.apache.org%3E",
  67288. "name" : "[kafka-jira] 20210506 [GitHub] [kafka] dongjinleekr opened a new pull request #10642: KAFKA-12756: Update Zookeeper to 3.6.3 or higher",
  67289. "refsource" : "MLIST",
  67290. "tags" : [ ]
  67291. } ]
  67292. },
  67293. "description" : {
  67294. "description_data" : [ {
  67295. "lang" : "en",
  67296. "value" : "Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final."
  67297. } ]
  67298. }
  67299. },
  67300. "configurations" : {
  67301. "CVE_data_version" : "4.0",
  67302. "nodes" : [ {
  67303. "operator" : "OR",
  67304. "children" : [ ],
  67305. "cpe_match" : [ {
  67306. "vulnerable" : true,
  67307. "cpe23Uri" : "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
  67308. "versionEndExcluding" : "4.1.61",
  67309. "cpe_name" : [ ]
  67310. } ]
  67311. }, {
  67312. "operator" : "OR",
  67313. "children" : [ ],
  67314. "cpe_match" : [ {
  67315. "vulnerable" : true,
  67316. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  67317. "cpe_name" : [ ]
  67318. } ]
  67319. }, {
  67320. "operator" : "OR",
  67321. "children" : [ ],
  67322. "cpe_match" : [ {
  67323. "vulnerable" : true,
  67324. "cpe23Uri" : "cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:*",
  67325. "versionEndExcluding" : "3.6.3",
  67326. "cpe_name" : [ ]
  67327. }, {
  67328. "vulnerable" : true,
  67329. "cpe23Uri" : "cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:*",
  67330. "versionStartIncluding" : "3.7.0",
  67331. "versionEndExcluding" : "3.7.1",
  67332. "cpe_name" : [ ]
  67333. } ]
  67334. } ]
  67335. },
  67336. "impact" : {
  67337. "baseMetricV3" : {
  67338. "cvssV3" : {
  67339. "version" : "3.1",
  67340. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
  67341. "attackVector" : "NETWORK",
  67342. "attackComplexity" : "HIGH",
  67343. "privilegesRequired" : "NONE",
  67344. "userInteraction" : "NONE",
  67345. "scope" : "UNCHANGED",
  67346. "confidentialityImpact" : "NONE",
  67347. "integrityImpact" : "HIGH",
  67348. "availabilityImpact" : "NONE",
  67349. "baseScore" : 5.9,
  67350. "baseSeverity" : "MEDIUM"
  67351. },
  67352. "exploitabilityScore" : 2.2,
  67353. "impactScore" : 3.6
  67354. },
  67355. "baseMetricV2" : {
  67356. "cvssV2" : {
  67357. "version" : "2.0",
  67358. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  67359. "accessVector" : "NETWORK",
  67360. "accessComplexity" : "LOW",
  67361. "authentication" : "NONE",
  67362. "confidentialityImpact" : "NONE",
  67363. "integrityImpact" : "PARTIAL",
  67364. "availabilityImpact" : "NONE",
  67365. "baseScore" : 5.0
  67366. },
  67367. "severity" : "MEDIUM",
  67368. "exploitabilityScore" : 10.0,
  67369. "impactScore" : 2.9,
  67370. "acInsufInfo" : false,
  67371. "obtainAllPrivilege" : false,
  67372. "obtainUserPrivilege" : false,
  67373. "obtainOtherPrivilege" : false,
  67374. "userInteractionRequired" : false
  67375. }
  67376. },
  67377. "publishedDate" : "2021-03-30T15:15Z",
  67378. "lastModifiedDate" : "2021-05-06T16:15Z"
  67379. }, {
  67380. "cve" : {
  67381. "data_type" : "CVE",
  67382. "data_format" : "MITRE",
  67383. "data_version" : "4.0",
  67384. "CVE_data_meta" : {
  67385. "ID" : "CVE-2021-3466",
  67386. "ASSIGNER" : "secalert@redhat.com"
  67387. },
  67388. "problemtype" : {
  67389. "problemtype_data" : [ {
  67390. "description" : [ {
  67391. "lang" : "en",
  67392. "value" : "CWE-120"
  67393. } ]
  67394. } ]
  67395. },
  67396. "references" : {
  67397. "reference_data" : [ {
  67398. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1939127",
  67399. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1939127",
  67400. "refsource" : "MISC",
  67401. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  67402. }, {
  67403. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4334XJNDJPYQNFE6S3S2KUJJ7TMHYCWL/",
  67404. "name" : "FEDORA-2021-6d5578e756",
  67405. "refsource" : "FEDORA",
  67406. "tags" : [ ]
  67407. }, {
  67408. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5NEPVGP3L2CZHLZ4UB44PEILHKPDBOG/",
  67409. "name" : "FEDORA-2021-d4149ff7fb",
  67410. "refsource" : "FEDORA",
  67411. "tags" : [ ]
  67412. }, {
  67413. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/75HDMREKITMGPGE62NP7KE62ZJVLETXN/",
  67414. "name" : "FEDORA-2021-5e10ad8c19",
  67415. "refsource" : "FEDORA",
  67416. "tags" : [ ]
  67417. } ]
  67418. },
  67419. "description" : {
  67420. "description_data" : [ {
  67421. "lang" : "en",
  67422. "value" : "A flaw was found in libmicrohttpd in versions before 0.9.71. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
  67423. } ]
  67424. }
  67425. },
  67426. "configurations" : {
  67427. "CVE_data_version" : "4.0",
  67428. "nodes" : [ {
  67429. "operator" : "OR",
  67430. "children" : [ ],
  67431. "cpe_match" : [ {
  67432. "vulnerable" : true,
  67433. "cpe23Uri" : "cpe:2.3:a:gnu:libmicrohttpd:*:*:*:*:*:*:*:*",
  67434. "versionEndExcluding" : "0.9.71",
  67435. "cpe_name" : [ ]
  67436. } ]
  67437. }, {
  67438. "operator" : "OR",
  67439. "children" : [ ],
  67440. "cpe_match" : [ {
  67441. "vulnerable" : true,
  67442. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
  67443. "cpe_name" : [ ]
  67444. }, {
  67445. "vulnerable" : true,
  67446. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
  67447. "cpe_name" : [ ]
  67448. }, {
  67449. "vulnerable" : true,
  67450. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
  67451. "cpe_name" : [ ]
  67452. } ]
  67453. }, {
  67454. "operator" : "OR",
  67455. "children" : [ ],
  67456. "cpe_match" : [ {
  67457. "vulnerable" : true,
  67458. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  67459. "cpe_name" : [ ]
  67460. } ]
  67461. } ]
  67462. },
  67463. "impact" : {
  67464. "baseMetricV3" : {
  67465. "cvssV3" : {
  67466. "version" : "3.1",
  67467. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  67468. "attackVector" : "NETWORK",
  67469. "attackComplexity" : "LOW",
  67470. "privilegesRequired" : "NONE",
  67471. "userInteraction" : "NONE",
  67472. "scope" : "UNCHANGED",
  67473. "confidentialityImpact" : "HIGH",
  67474. "integrityImpact" : "HIGH",
  67475. "availabilityImpact" : "HIGH",
  67476. "baseScore" : 9.8,
  67477. "baseSeverity" : "CRITICAL"
  67478. },
  67479. "exploitabilityScore" : 3.9,
  67480. "impactScore" : 5.9
  67481. },
  67482. "baseMetricV2" : {
  67483. "cvssV2" : {
  67484. "version" : "2.0",
  67485. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  67486. "accessVector" : "NETWORK",
  67487. "accessComplexity" : "LOW",
  67488. "authentication" : "NONE",
  67489. "confidentialityImpact" : "COMPLETE",
  67490. "integrityImpact" : "COMPLETE",
  67491. "availabilityImpact" : "COMPLETE",
  67492. "baseScore" : 10.0
  67493. },
  67494. "severity" : "HIGH",
  67495. "exploitabilityScore" : 10.0,
  67496. "impactScore" : 10.0,
  67497. "acInsufInfo" : false,
  67498. "obtainAllPrivilege" : false,
  67499. "obtainUserPrivilege" : false,
  67500. "obtainOtherPrivilege" : false,
  67501. "userInteractionRequired" : false
  67502. }
  67503. },
  67504. "publishedDate" : "2021-03-25T19:15Z",
  67505. "lastModifiedDate" : "2021-05-05T03:15Z"
  67506. }, {
  67507. "cve" : {
  67508. "data_type" : "CVE",
  67509. "data_format" : "MITRE",
  67510. "data_version" : "4.0",
  67511. "CVE_data_meta" : {
  67512. "ID" : "CVE-2021-3450",
  67513. "ASSIGNER" : "openssl-security@openssl.org"
  67514. },
  67515. "problemtype" : {
  67516. "problemtype_data" : [ {
  67517. "description" : [ {
  67518. "lang" : "en",
  67519. "value" : "CWE-295"
  67520. } ]
  67521. } ]
  67522. },
  67523. "references" : {
  67524. "reference_data" : [ {
  67525. "url" : "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b",
  67526. "name" : "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b",
  67527. "refsource" : "CONFIRM",
  67528. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  67529. }, {
  67530. "url" : "https://www.openssl.org/news/secadv/20210325.txt",
  67531. "name" : "https://www.openssl.org/news/secadv/20210325.txt",
  67532. "refsource" : "CONFIRM",
  67533. "tags" : [ "Vendor Advisory" ]
  67534. }, {
  67535. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd",
  67536. "name" : "20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021",
  67537. "refsource" : "CISCO",
  67538. "tags" : [ "Third Party Advisory" ]
  67539. }, {
  67540. "url" : "https://security.netapp.com/advisory/ntap-20210326-0006/",
  67541. "name" : "https://security.netapp.com/advisory/ntap-20210326-0006/",
  67542. "refsource" : "CONFIRM",
  67543. "tags" : [ "Third Party Advisory" ]
  67544. }, {
  67545. "url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc",
  67546. "name" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc",
  67547. "refsource" : "MISC",
  67548. "tags" : [ "Third Party Advisory" ]
  67549. }, {
  67550. "url" : "http://www.openwall.com/lists/oss-security/2021/03/27/1",
  67551. "name" : "[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
  67552. "refsource" : "MLIST",
  67553. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67554. }, {
  67555. "url" : "http://www.openwall.com/lists/oss-security/2021/03/27/2",
  67556. "name" : "[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
  67557. "refsource" : "MLIST",
  67558. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67559. }, {
  67560. "url" : "http://www.openwall.com/lists/oss-security/2021/03/28/3",
  67561. "name" : "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
  67562. "refsource" : "MLIST",
  67563. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67564. }, {
  67565. "url" : "http://www.openwall.com/lists/oss-security/2021/03/28/4",
  67566. "name" : "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
  67567. "refsource" : "MLIST",
  67568. "tags" : [ "Mailing List", "Third Party Advisory" ]
  67569. }, {
  67570. "url" : "https://security.gentoo.org/glsa/202103-03",
  67571. "name" : "GLSA-202103-03",
  67572. "refsource" : "GENTOO",
  67573. "tags" : [ "Third Party Advisory" ]
  67574. }, {
  67575. "url" : "https://www.tenable.com/security/tns-2021-05",
  67576. "name" : "https://www.tenable.com/security/tns-2021-05",
  67577. "refsource" : "CONFIRM",
  67578. "tags" : [ "Third Party Advisory" ]
  67579. }, {
  67580. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/",
  67581. "name" : "FEDORA-2021-cbf14ab8f9",
  67582. "refsource" : "FEDORA",
  67583. "tags" : [ "Third Party Advisory" ]
  67584. }, {
  67585. "url" : "https://www.tenable.com/security/tns-2021-08",
  67586. "name" : "https://www.tenable.com/security/tns-2021-08",
  67587. "refsource" : "CONFIRM",
  67588. "tags" : [ "Third Party Advisory" ]
  67589. }, {
  67590. "url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10356",
  67591. "name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10356",
  67592. "refsource" : "CONFIRM",
  67593. "tags" : [ ]
  67594. }, {
  67595. "url" : "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html",
  67596. "name" : "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html",
  67597. "refsource" : "MISC",
  67598. "tags" : [ ]
  67599. } ]
  67600. },
  67601. "description" : {
  67602. "description_data" : [ {
  67603. "lang" : "en",
  67604. "value" : "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j)."
  67605. } ]
  67606. }
  67607. },
  67608. "configurations" : {
  67609. "CVE_data_version" : "4.0",
  67610. "nodes" : [ {
  67611. "operator" : "OR",
  67612. "children" : [ ],
  67613. "cpe_match" : [ {
  67614. "vulnerable" : true,
  67615. "cpe23Uri" : "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
  67616. "versionStartIncluding" : "1.1.1h",
  67617. "versionEndExcluding" : "1.1.1k",
  67618. "cpe_name" : [ ]
  67619. } ]
  67620. }, {
  67621. "operator" : "OR",
  67622. "children" : [ ],
  67623. "cpe_match" : [ {
  67624. "vulnerable" : true,
  67625. "cpe23Uri" : "cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*",
  67626. "cpe_name" : [ ]
  67627. }, {
  67628. "vulnerable" : true,
  67629. "cpe23Uri" : "cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*",
  67630. "cpe_name" : [ ]
  67631. }, {
  67632. "vulnerable" : true,
  67633. "cpe23Uri" : "cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*",
  67634. "cpe_name" : [ ]
  67635. } ]
  67636. }, {
  67637. "operator" : "AND",
  67638. "children" : [ {
  67639. "operator" : "OR",
  67640. "children" : [ ],
  67641. "cpe_match" : [ {
  67642. "vulnerable" : true,
  67643. "cpe23Uri" : "cpe:2.3:o:netapp:santricity_smi-s_provider_firmware:-:*:*:*:*:*:*:*",
  67644. "cpe_name" : [ ]
  67645. } ]
  67646. }, {
  67647. "operator" : "OR",
  67648. "children" : [ ],
  67649. "cpe_match" : [ {
  67650. "vulnerable" : false,
  67651. "cpe23Uri" : "cpe:2.3:h:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*",
  67652. "cpe_name" : [ ]
  67653. } ]
  67654. } ],
  67655. "cpe_match" : [ ]
  67656. }, {
  67657. "operator" : "AND",
  67658. "children" : [ {
  67659. "operator" : "OR",
  67660. "children" : [ ],
  67661. "cpe_match" : [ {
  67662. "vulnerable" : true,
  67663. "cpe23Uri" : "cpe:2.3:o:netapp:storagegrid_firmware:-:*:*:*:*:*:*:*",
  67664. "cpe_name" : [ ]
  67665. } ]
  67666. }, {
  67667. "operator" : "OR",
  67668. "children" : [ ],
  67669. "cpe_match" : [ {
  67670. "vulnerable" : false,
  67671. "cpe23Uri" : "cpe:2.3:h:netapp:storagegrid:-:*:*:*:*:*:*:*",
  67672. "cpe_name" : [ ]
  67673. } ]
  67674. } ],
  67675. "cpe_match" : [ ]
  67676. }, {
  67677. "operator" : "OR",
  67678. "children" : [ ],
  67679. "cpe_match" : [ {
  67680. "vulnerable" : true,
  67681. "cpe23Uri" : "cpe:2.3:o:windriver:linux:-:*:*:*:cd:*:*:*",
  67682. "cpe_name" : [ ]
  67683. }, {
  67684. "vulnerable" : true,
  67685. "cpe23Uri" : "cpe:2.3:o:windriver:linux:17.0:*:*:*:lts:*:*:*",
  67686. "cpe_name" : [ ]
  67687. }, {
  67688. "vulnerable" : true,
  67689. "cpe23Uri" : "cpe:2.3:o:windriver:linux:18.0:*:*:*:lts:*:*:*",
  67690. "cpe_name" : [ ]
  67691. }, {
  67692. "vulnerable" : true,
  67693. "cpe23Uri" : "cpe:2.3:o:windriver:linux:19.0:*:*:*:lts:*:*:*",
  67694. "cpe_name" : [ ]
  67695. } ]
  67696. }, {
  67697. "operator" : "OR",
  67698. "children" : [ ],
  67699. "cpe_match" : [ {
  67700. "vulnerable" : true,
  67701. "cpe23Uri" : "cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*",
  67702. "cpe_name" : [ ]
  67703. }, {
  67704. "vulnerable" : true,
  67705. "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
  67706. "cpe_name" : [ ]
  67707. }, {
  67708. "vulnerable" : true,
  67709. "cpe23Uri" : "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
  67710. "cpe_name" : [ ]
  67711. }, {
  67712. "vulnerable" : true,
  67713. "cpe23Uri" : "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
  67714. "cpe_name" : [ ]
  67715. } ]
  67716. }, {
  67717. "operator" : "OR",
  67718. "children" : [ ],
  67719. "cpe_match" : [ {
  67720. "vulnerable" : true,
  67721. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  67722. "cpe_name" : [ ]
  67723. } ]
  67724. }, {
  67725. "operator" : "OR",
  67726. "children" : [ ],
  67727. "cpe_match" : [ {
  67728. "vulnerable" : true,
  67729. "cpe23Uri" : "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*",
  67730. "versionEndIncluding" : "8.13.1",
  67731. "cpe_name" : [ ]
  67732. }, {
  67733. "vulnerable" : true,
  67734. "cpe23Uri" : "cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*",
  67735. "versionStartIncluding" : "8.2.1",
  67736. "versionEndIncluding" : "8.2.3",
  67737. "cpe_name" : [ ]
  67738. } ]
  67739. } ]
  67740. },
  67741. "impact" : {
  67742. "baseMetricV3" : {
  67743. "cvssV3" : {
  67744. "version" : "3.1",
  67745. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
  67746. "attackVector" : "NETWORK",
  67747. "attackComplexity" : "HIGH",
  67748. "privilegesRequired" : "NONE",
  67749. "userInteraction" : "NONE",
  67750. "scope" : "UNCHANGED",
  67751. "confidentialityImpact" : "HIGH",
  67752. "integrityImpact" : "HIGH",
  67753. "availabilityImpact" : "NONE",
  67754. "baseScore" : 7.4,
  67755. "baseSeverity" : "HIGH"
  67756. },
  67757. "exploitabilityScore" : 2.2,
  67758. "impactScore" : 5.2
  67759. },
  67760. "baseMetricV2" : {
  67761. "cvssV2" : {
  67762. "version" : "2.0",
  67763. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:N",
  67764. "accessVector" : "NETWORK",
  67765. "accessComplexity" : "MEDIUM",
  67766. "authentication" : "NONE",
  67767. "confidentialityImpact" : "PARTIAL",
  67768. "integrityImpact" : "PARTIAL",
  67769. "availabilityImpact" : "NONE",
  67770. "baseScore" : 5.8
  67771. },
  67772. "severity" : "MEDIUM",
  67773. "exploitabilityScore" : 8.6,
  67774. "impactScore" : 4.9,
  67775. "acInsufInfo" : false,
  67776. "obtainAllPrivilege" : false,
  67777. "obtainUserPrivilege" : false,
  67778. "obtainOtherPrivilege" : false,
  67779. "userInteractionRequired" : false
  67780. }
  67781. },
  67782. "publishedDate" : "2021-03-25T15:15Z",
  67783. "lastModifiedDate" : "2021-05-06T13:15Z"
  67784. }, {
  67785. "cve" : {
  67786. "data_type" : "CVE",
  67787. "data_format" : "MITRE",
  67788. "data_version" : "4.0",
  67789. "CVE_data_meta" : {
  67790. "ID" : "CVE-2021-3409",
  67791. "ASSIGNER" : "secalert@redhat.com"
  67792. },
  67793. "problemtype" : {
  67794. "problemtype_data" : [ {
  67795. "description" : [ {
  67796. "lang" : "en",
  67797. "value" : "CWE-119"
  67798. } ]
  67799. } ]
  67800. },
  67801. "references" : {
  67802. "reference_data" : [ {
  67803. "url" : "https://www.openwall.com/lists/oss-security/2021/03/09/1",
  67804. "name" : "https://www.openwall.com/lists/oss-security/2021/03/09/1",
  67805. "refsource" : "MISC",
  67806. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  67807. }, {
  67808. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1928146",
  67809. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1928146",
  67810. "refsource" : "MISC",
  67811. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  67812. }, {
  67813. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00009.html",
  67814. "name" : "[debian-lts-announce] 20210410 [SECURITY] [DLA 2623-1] qemu security update",
  67815. "refsource" : "MLIST",
  67816. "tags" : [ ]
  67817. }, {
  67818. "url" : "https://security.netapp.com/advisory/ntap-20210507-0001/",
  67819. "name" : "https://security.netapp.com/advisory/ntap-20210507-0001/",
  67820. "refsource" : "CONFIRM",
  67821. "tags" : [ ]
  67822. } ]
  67823. },
  67824. "description" : {
  67825. "description_data" : [ {
  67826. "lang" : "en",
  67827. "value" : "The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this."
  67828. } ]
  67829. }
  67830. },
  67831. "configurations" : {
  67832. "CVE_data_version" : "4.0",
  67833. "nodes" : [ {
  67834. "operator" : "OR",
  67835. "children" : [ ],
  67836. "cpe_match" : [ {
  67837. "vulnerable" : true,
  67838. "cpe23Uri" : "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
  67839. "versionEndIncluding" : "5.2.0",
  67840. "cpe_name" : [ ]
  67841. } ]
  67842. }, {
  67843. "operator" : "OR",
  67844. "children" : [ ],
  67845. "cpe_match" : [ {
  67846. "vulnerable" : true,
  67847. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
  67848. "cpe_name" : [ ]
  67849. } ]
  67850. }, {
  67851. "operator" : "OR",
  67852. "children" : [ ],
  67853. "cpe_match" : [ {
  67854. "vulnerable" : true,
  67855. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  67856. "cpe_name" : [ ]
  67857. } ]
  67858. } ]
  67859. },
  67860. "impact" : {
  67861. "baseMetricV3" : {
  67862. "cvssV3" : {
  67863. "version" : "3.1",
  67864. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L",
  67865. "attackVector" : "LOCAL",
  67866. "attackComplexity" : "LOW",
  67867. "privilegesRequired" : "HIGH",
  67868. "userInteraction" : "NONE",
  67869. "scope" : "CHANGED",
  67870. "confidentialityImpact" : "LOW",
  67871. "integrityImpact" : "LOW",
  67872. "availabilityImpact" : "LOW",
  67873. "baseScore" : 5.7,
  67874. "baseSeverity" : "MEDIUM"
  67875. },
  67876. "exploitabilityScore" : 1.5,
  67877. "impactScore" : 3.7
  67878. },
  67879. "baseMetricV2" : {
  67880. "cvssV2" : {
  67881. "version" : "2.0",
  67882. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  67883. "accessVector" : "LOCAL",
  67884. "accessComplexity" : "LOW",
  67885. "authentication" : "NONE",
  67886. "confidentialityImpact" : "PARTIAL",
  67887. "integrityImpact" : "PARTIAL",
  67888. "availabilityImpact" : "PARTIAL",
  67889. "baseScore" : 4.6
  67890. },
  67891. "severity" : "MEDIUM",
  67892. "exploitabilityScore" : 3.9,
  67893. "impactScore" : 6.4,
  67894. "acInsufInfo" : false,
  67895. "obtainAllPrivilege" : false,
  67896. "obtainUserPrivilege" : false,
  67897. "obtainOtherPrivilege" : false,
  67898. "userInteractionRequired" : false
  67899. }
  67900. },
  67901. "publishedDate" : "2021-03-23T21:15Z",
  67902. "lastModifiedDate" : "2021-05-07T05:15Z"
  67903. }, {
  67904. "cve" : {
  67905. "data_type" : "CVE",
  67906. "data_format" : "MITRE",
  67907. "data_version" : "4.0",
  67908. "CVE_data_meta" : {
  67909. "ID" : "CVE-2021-3392",
  67910. "ASSIGNER" : "secalert@redhat.com"
  67911. },
  67912. "problemtype" : {
  67913. "problemtype_data" : [ {
  67914. "description" : [ {
  67915. "lang" : "en",
  67916. "value" : "CWE-416"
  67917. } ]
  67918. } ]
  67919. },
  67920. "references" : {
  67921. "reference_data" : [ {
  67922. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1924042",
  67923. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1924042",
  67924. "refsource" : "MISC",
  67925. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  67926. }, {
  67927. "url" : "https://bugs.launchpad.net/qemu/+bug/1914236",
  67928. "name" : "https://bugs.launchpad.net/qemu/+bug/1914236",
  67929. "refsource" : "MISC",
  67930. "tags" : [ "Exploit", "Third Party Advisory" ]
  67931. }, {
  67932. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00009.html",
  67933. "name" : "[debian-lts-announce] 20210410 [SECURITY] [DLA 2623-1] qemu security update",
  67934. "refsource" : "MLIST",
  67935. "tags" : [ ]
  67936. }, {
  67937. "url" : "https://security.netapp.com/advisory/ntap-20210507-0001/",
  67938. "name" : "https://security.netapp.com/advisory/ntap-20210507-0001/",
  67939. "refsource" : "CONFIRM",
  67940. "tags" : [ ]
  67941. } ]
  67942. },
  67943. "description" : {
  67944. "description_data" : [ {
  67945. "lang" : "en",
  67946. "value" : "A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected."
  67947. } ]
  67948. }
  67949. },
  67950. "configurations" : {
  67951. "CVE_data_version" : "4.0",
  67952. "nodes" : [ {
  67953. "operator" : "OR",
  67954. "children" : [ ],
  67955. "cpe_match" : [ {
  67956. "vulnerable" : true,
  67957. "cpe23Uri" : "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
  67958. "versionStartIncluding" : "2.10.0",
  67959. "versionEndIncluding" : "5.2.0",
  67960. "cpe_name" : [ ]
  67961. } ]
  67962. }, {
  67963. "operator" : "OR",
  67964. "children" : [ ],
  67965. "cpe_match" : [ {
  67966. "vulnerable" : true,
  67967. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  67968. "cpe_name" : [ ]
  67969. } ]
  67970. } ]
  67971. },
  67972. "impact" : {
  67973. "baseMetricV3" : {
  67974. "cvssV3" : {
  67975. "version" : "3.1",
  67976. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
  67977. "attackVector" : "LOCAL",
  67978. "attackComplexity" : "LOW",
  67979. "privilegesRequired" : "HIGH",
  67980. "userInteraction" : "NONE",
  67981. "scope" : "CHANGED",
  67982. "confidentialityImpact" : "NONE",
  67983. "integrityImpact" : "NONE",
  67984. "availabilityImpact" : "LOW",
  67985. "baseScore" : 3.2,
  67986. "baseSeverity" : "LOW"
  67987. },
  67988. "exploitabilityScore" : 1.5,
  67989. "impactScore" : 1.4
  67990. },
  67991. "baseMetricV2" : {
  67992. "cvssV2" : {
  67993. "version" : "2.0",
  67994. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:P",
  67995. "accessVector" : "LOCAL",
  67996. "accessComplexity" : "LOW",
  67997. "authentication" : "NONE",
  67998. "confidentialityImpact" : "NONE",
  67999. "integrityImpact" : "NONE",
  68000. "availabilityImpact" : "PARTIAL",
  68001. "baseScore" : 2.1
  68002. },
  68003. "severity" : "LOW",
  68004. "exploitabilityScore" : 3.9,
  68005. "impactScore" : 2.9,
  68006. "acInsufInfo" : false,
  68007. "obtainAllPrivilege" : false,
  68008. "obtainUserPrivilege" : false,
  68009. "obtainOtherPrivilege" : false,
  68010. "userInteractionRequired" : false
  68011. }
  68012. },
  68013. "publishedDate" : "2021-03-23T20:15Z",
  68014. "lastModifiedDate" : "2021-05-07T05:15Z"
  68015. }, {
  68016. "cve" : {
  68017. "data_type" : "CVE",
  68018. "data_format" : "MITRE",
  68019. "data_version" : "4.0",
  68020. "CVE_data_meta" : {
  68021. "ID" : "CVE-2021-20270",
  68022. "ASSIGNER" : "secalert@redhat.com"
  68023. },
  68024. "problemtype" : {
  68025. "problemtype_data" : [ {
  68026. "description" : [ {
  68027. "lang" : "en",
  68028. "value" : "CWE-835"
  68029. } ]
  68030. } ]
  68031. },
  68032. "references" : {
  68033. "reference_data" : [ {
  68034. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1922136",
  68035. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1922136",
  68036. "refsource" : "MISC",
  68037. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  68038. }, {
  68039. "url" : "https://www.debian.org/security/2021/dsa-4889",
  68040. "name" : "DSA-4889",
  68041. "refsource" : "DEBIAN",
  68042. "tags" : [ ]
  68043. }, {
  68044. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html",
  68045. "name" : "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update",
  68046. "refsource" : "MLIST",
  68047. "tags" : [ ]
  68048. }, {
  68049. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html",
  68050. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update",
  68051. "refsource" : "MLIST",
  68052. "tags" : [ ]
  68053. } ]
  68054. },
  68055. "description" : {
  68056. "description_data" : [ {
  68057. "lang" : "en",
  68058. "value" : "An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the \"exception\" keyword."
  68059. } ]
  68060. }
  68061. },
  68062. "configurations" : {
  68063. "CVE_data_version" : "4.0",
  68064. "nodes" : [ {
  68065. "operator" : "OR",
  68066. "children" : [ ],
  68067. "cpe_match" : [ {
  68068. "vulnerable" : true,
  68069. "cpe23Uri" : "cpe:2.3:a:pygments:pygments:*:*:*:*:*:*:*:*",
  68070. "versionStartIncluding" : "1.5",
  68071. "versionEndIncluding" : "2.7.3",
  68072. "cpe_name" : [ ]
  68073. } ]
  68074. }, {
  68075. "operator" : "OR",
  68076. "children" : [ ],
  68077. "cpe_match" : [ {
  68078. "vulnerable" : true,
  68079. "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
  68080. "cpe_name" : [ ]
  68081. }, {
  68082. "vulnerable" : true,
  68083. "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
  68084. "cpe_name" : [ ]
  68085. }, {
  68086. "vulnerable" : true,
  68087. "cpe23Uri" : "cpe:2.3:a:redhat:openstack_platform:10.0:*:*:*:*:*:*:*",
  68088. "cpe_name" : [ ]
  68089. }, {
  68090. "vulnerable" : true,
  68091. "cpe23Uri" : "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*",
  68092. "cpe_name" : [ ]
  68093. }, {
  68094. "vulnerable" : true,
  68095. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
  68096. "cpe_name" : [ ]
  68097. }, {
  68098. "vulnerable" : true,
  68099. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
  68100. "cpe_name" : [ ]
  68101. } ]
  68102. }, {
  68103. "operator" : "OR",
  68104. "children" : [ ],
  68105. "cpe_match" : [ {
  68106. "vulnerable" : true,
  68107. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  68108. "cpe_name" : [ ]
  68109. } ]
  68110. } ]
  68111. },
  68112. "impact" : {
  68113. "baseMetricV3" : {
  68114. "cvssV3" : {
  68115. "version" : "3.1",
  68116. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  68117. "attackVector" : "NETWORK",
  68118. "attackComplexity" : "LOW",
  68119. "privilegesRequired" : "NONE",
  68120. "userInteraction" : "NONE",
  68121. "scope" : "UNCHANGED",
  68122. "confidentialityImpact" : "NONE",
  68123. "integrityImpact" : "NONE",
  68124. "availabilityImpact" : "HIGH",
  68125. "baseScore" : 7.5,
  68126. "baseSeverity" : "HIGH"
  68127. },
  68128. "exploitabilityScore" : 3.9,
  68129. "impactScore" : 3.6
  68130. },
  68131. "baseMetricV2" : {
  68132. "cvssV2" : {
  68133. "version" : "2.0",
  68134. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  68135. "accessVector" : "NETWORK",
  68136. "accessComplexity" : "LOW",
  68137. "authentication" : "NONE",
  68138. "confidentialityImpact" : "NONE",
  68139. "integrityImpact" : "NONE",
  68140. "availabilityImpact" : "PARTIAL",
  68141. "baseScore" : 5.0
  68142. },
  68143. "severity" : "MEDIUM",
  68144. "exploitabilityScore" : 10.0,
  68145. "impactScore" : 2.9,
  68146. "acInsufInfo" : false,
  68147. "obtainAllPrivilege" : false,
  68148. "obtainUserPrivilege" : false,
  68149. "obtainOtherPrivilege" : false,
  68150. "userInteractionRequired" : false
  68151. }
  68152. },
  68153. "publishedDate" : "2021-03-23T17:15Z",
  68154. "lastModifiedDate" : "2021-05-06T23:15Z"
  68155. }, {
  68156. "cve" : {
  68157. "data_type" : "CVE",
  68158. "data_format" : "MITRE",
  68159. "data_version" : "4.0",
  68160. "CVE_data_meta" : {
  68161. "ID" : "CVE-2021-26295",
  68162. "ASSIGNER" : "security@apache.org"
  68163. },
  68164. "problemtype" : {
  68165. "problemtype_data" : [ {
  68166. "description" : [ {
  68167. "lang" : "en",
  68168. "value" : "CWE-502"
  68169. } ]
  68170. } ]
  68171. },
  68172. "references" : {
  68173. "reference_data" : [ {
  68174. "url" : "https://lists.apache.org/thread.html/r3c1802eaf34aa78a61b4e8e044c214bc94accbd28a11f3a276586a31%40%3Cuser.ofbiz.apache.org%3E",
  68175. "name" : "N/A",
  68176. "refsource" : "CONFIRM",
  68177. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  68178. }, {
  68179. "url" : "https://lists.apache.org/thread.html/r6e4579c4ebf7efeb462962e359501c6ca4045687f12212551df2d607@%3Cnotifications.ofbiz.apache.org%3E",
  68180. "name" : "[ofbiz-notifications] 20210324 [jira] [Commented] (OFBIZ-12167) Adds a blacklist (to be renamed soon to denylist) in Java serialisation (CVE-2021-26295)",
  68181. "refsource" : "MLIST",
  68182. "tags" : [ "Mailing List", "Vendor Advisory" ]
  68183. }, {
  68184. "url" : "https://lists.apache.org/thread.html/r0d97a3b7a14777b9e9e085b483629d2774343c4723236d1c73f43ff0@%3Cdev.ofbiz.apache.org%3E",
  68185. "name" : "[ofbiz-dev] 20210325 Comment out the SOAP and HTTP engines?",
  68186. "refsource" : "MLIST",
  68187. "tags" : [ "Mailing List", "Vendor Advisory" ]
  68188. }, {
  68189. "url" : "https://lists.apache.org/thread.html/reccf8c8a58337ce7c035495d3d82fbc549e97036a9789a2a7d9cccf6@%3Cdev.ofbiz.apache.org%3E",
  68190. "name" : "[ofbiz-dev] 20210325 Re: Comment out the SOAP and HTTP engines?",
  68191. "refsource" : "MLIST",
  68192. "tags" : [ "Mailing List", "Vendor Advisory" ]
  68193. }, {
  68194. "url" : "https://lists.apache.org/thread.html/rec5e9fdcdca13099cfb29f632333f44ad1dd60d90f67b90434e4467a@%3Cdev.ofbiz.apache.org%3E",
  68195. "name" : "[ofbiz-dev] 20210329 Re: Comment out the SOAP and HTTP engines?",
  68196. "refsource" : "MLIST",
  68197. "tags" : [ "Mailing List", "Vendor Advisory" ]
  68198. }, {
  68199. "url" : "https://lists.apache.org/thread.html/rc9bd0d3d794dc370bc70585960841868cb29b92dcc80552b84ca2599@%3Cnotifications.ofbiz.apache.org%3E",
  68200. "name" : "[ofbiz-notifications] 20210329 [jira] [Commented] (OFBIZ-12167) Adds a blacklist (to be renamed soon to denylist) in Java serialisation (CVE-2021-26295)",
  68201. "refsource" : "MLIST",
  68202. "tags" : [ "Mailing List", "Vendor Advisory" ]
  68203. }, {
  68204. "url" : "https://lists.apache.org/thread.html/r3ee005dd767cd83f522719423f5e7dd316f168ddbd1dc51a13d4e244@%3Cnotifications.ofbiz.apache.org%3E",
  68205. "name" : "[ofbiz-notifications] 20210329 [jira] [Commented] (OFBIZ-6942) Comment out RMI related code because of the Java deserialization issue [CVE-2016-2170]",
  68206. "refsource" : "MLIST",
  68207. "tags" : [ "Mailing List", "Vendor Advisory" ]
  68208. }, {
  68209. "url" : "http://packetstormsecurity.com/files/162104/Apache-OFBiz-SOAP-Java-Deserialization.html",
  68210. "name" : "http://packetstormsecurity.com/files/162104/Apache-OFBiz-SOAP-Java-Deserialization.html",
  68211. "refsource" : "MISC",
  68212. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  68213. }, {
  68214. "url" : "https://lists.apache.org/thread.html/rbe512e5ccd6b11169c6379daa1234bc805f3d53c5a38224e956295ce@%3Cnotifications.ofbiz.apache.org%3E",
  68215. "name" : "[ofbiz-notifications] 20210427 [jira] [Updated] (OFBIZ-12212) Comment out the SOAP and HTTP engines - Fix [CVE-2021-30128]",
  68216. "refsource" : "MLIST",
  68217. "tags" : [ "Mailing List", "Vendor Advisory" ]
  68218. }, {
  68219. "url" : "https://lists.apache.org/thread.html/r108a964764b8bd21ebd32ccd4f51c183ee80a251c105b849154a8e9d@%3Ccommits.ofbiz.apache.org%3E",
  68220. "name" : "[ofbiz-commits] 20210427 [ofbiz-site] branch master updated: Updates security page for CVE-2021-29200 and 30128 fixed in 17.12.07",
  68221. "refsource" : "MLIST",
  68222. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  68223. } ]
  68224. },
  68225. "description" : {
  68226. "description_data" : [ {
  68227. "lang" : "en",
  68228. "value" : "Apache OFBiz has unsafe deserialization prior to 17.12.06. An unauthenticated attacker can use this vulnerability to successfully take over Apache OFBiz."
  68229. } ]
  68230. }
  68231. },
  68232. "configurations" : {
  68233. "CVE_data_version" : "4.0",
  68234. "nodes" : [ {
  68235. "operator" : "OR",
  68236. "children" : [ ],
  68237. "cpe_match" : [ {
  68238. "vulnerable" : true,
  68239. "cpe23Uri" : "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*",
  68240. "versionEndExcluding" : "17.12.06",
  68241. "cpe_name" : [ ]
  68242. } ]
  68243. } ]
  68244. },
  68245. "impact" : {
  68246. "baseMetricV3" : {
  68247. "cvssV3" : {
  68248. "version" : "3.1",
  68249. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  68250. "attackVector" : "NETWORK",
  68251. "attackComplexity" : "LOW",
  68252. "privilegesRequired" : "NONE",
  68253. "userInteraction" : "NONE",
  68254. "scope" : "UNCHANGED",
  68255. "confidentialityImpact" : "HIGH",
  68256. "integrityImpact" : "HIGH",
  68257. "availabilityImpact" : "HIGH",
  68258. "baseScore" : 9.8,
  68259. "baseSeverity" : "CRITICAL"
  68260. },
  68261. "exploitabilityScore" : 3.9,
  68262. "impactScore" : 5.9
  68263. },
  68264. "baseMetricV2" : {
  68265. "cvssV2" : {
  68266. "version" : "2.0",
  68267. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  68268. "accessVector" : "NETWORK",
  68269. "accessComplexity" : "LOW",
  68270. "authentication" : "NONE",
  68271. "confidentialityImpact" : "PARTIAL",
  68272. "integrityImpact" : "PARTIAL",
  68273. "availabilityImpact" : "PARTIAL",
  68274. "baseScore" : 7.5
  68275. },
  68276. "severity" : "HIGH",
  68277. "exploitabilityScore" : 10.0,
  68278. "impactScore" : 6.4,
  68279. "acInsufInfo" : false,
  68280. "obtainAllPrivilege" : false,
  68281. "obtainUserPrivilege" : false,
  68282. "obtainOtherPrivilege" : false,
  68283. "userInteractionRequired" : false
  68284. }
  68285. },
  68286. "publishedDate" : "2021-03-22T12:15Z",
  68287. "lastModifiedDate" : "2021-05-03T17:45Z"
  68288. }, {
  68289. "cve" : {
  68290. "data_type" : "CVE",
  68291. "data_format" : "MITRE",
  68292. "data_version" : "4.0",
  68293. "CVE_data_meta" : {
  68294. "ID" : "CVE-2021-3416",
  68295. "ASSIGNER" : "secalert@redhat.com"
  68296. },
  68297. "problemtype" : {
  68298. "problemtype_data" : [ {
  68299. "description" : [ {
  68300. "lang" : "en",
  68301. "value" : "CWE-835"
  68302. } ]
  68303. } ]
  68304. },
  68305. "references" : {
  68306. "reference_data" : [ {
  68307. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1932827",
  68308. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1932827",
  68309. "refsource" : "MISC",
  68310. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  68311. }, {
  68312. "url" : "https://www.openwall.com/lists/oss-security/2021/02/26/1",
  68313. "name" : "https://www.openwall.com/lists/oss-security/2021/02/26/1",
  68314. "refsource" : "MISC",
  68315. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  68316. }, {
  68317. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00009.html",
  68318. "name" : "[debian-lts-announce] 20210410 [SECURITY] [DLA 2623-1] qemu security update",
  68319. "refsource" : "MLIST",
  68320. "tags" : [ ]
  68321. }, {
  68322. "url" : "https://security.netapp.com/advisory/ntap-20210507-0002/",
  68323. "name" : "https://security.netapp.com/advisory/ntap-20210507-0002/",
  68324. "refsource" : "CONFIRM",
  68325. "tags" : [ ]
  68326. } ]
  68327. },
  68328. "description" : {
  68329. "description_data" : [ {
  68330. "lang" : "en",
  68331. "value" : "A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario."
  68332. } ]
  68333. }
  68334. },
  68335. "configurations" : {
  68336. "CVE_data_version" : "4.0",
  68337. "nodes" : [ {
  68338. "operator" : "OR",
  68339. "children" : [ ],
  68340. "cpe_match" : [ {
  68341. "vulnerable" : true,
  68342. "cpe23Uri" : "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
  68343. "versionEndIncluding" : "5.2.0",
  68344. "cpe_name" : [ ]
  68345. } ]
  68346. }, {
  68347. "operator" : "OR",
  68348. "children" : [ ],
  68349. "cpe_match" : [ {
  68350. "vulnerable" : true,
  68351. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  68352. "cpe_name" : [ ]
  68353. } ]
  68354. }, {
  68355. "operator" : "OR",
  68356. "children" : [ ],
  68357. "cpe_match" : [ {
  68358. "vulnerable" : true,
  68359. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
  68360. "cpe_name" : [ ]
  68361. }, {
  68362. "vulnerable" : true,
  68363. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
  68364. "cpe_name" : [ ]
  68365. }, {
  68366. "vulnerable" : true,
  68367. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
  68368. "cpe_name" : [ ]
  68369. }, {
  68370. "vulnerable" : true,
  68371. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*",
  68372. "cpe_name" : [ ]
  68373. } ]
  68374. } ]
  68375. },
  68376. "impact" : {
  68377. "baseMetricV3" : {
  68378. "cvssV3" : {
  68379. "version" : "3.1",
  68380. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
  68381. "attackVector" : "LOCAL",
  68382. "attackComplexity" : "LOW",
  68383. "privilegesRequired" : "HIGH",
  68384. "userInteraction" : "NONE",
  68385. "scope" : "CHANGED",
  68386. "confidentialityImpact" : "NONE",
  68387. "integrityImpact" : "NONE",
  68388. "availabilityImpact" : "HIGH",
  68389. "baseScore" : 6.0,
  68390. "baseSeverity" : "MEDIUM"
  68391. },
  68392. "exploitabilityScore" : 1.5,
  68393. "impactScore" : 4.0
  68394. },
  68395. "baseMetricV2" : {
  68396. "cvssV2" : {
  68397. "version" : "2.0",
  68398. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:P",
  68399. "accessVector" : "LOCAL",
  68400. "accessComplexity" : "LOW",
  68401. "authentication" : "NONE",
  68402. "confidentialityImpact" : "NONE",
  68403. "integrityImpact" : "NONE",
  68404. "availabilityImpact" : "PARTIAL",
  68405. "baseScore" : 2.1
  68406. },
  68407. "severity" : "LOW",
  68408. "exploitabilityScore" : 3.9,
  68409. "impactScore" : 2.9,
  68410. "acInsufInfo" : false,
  68411. "obtainAllPrivilege" : false,
  68412. "obtainUserPrivilege" : false,
  68413. "obtainOtherPrivilege" : false,
  68414. "userInteractionRequired" : false
  68415. }
  68416. },
  68417. "publishedDate" : "2021-03-18T20:15Z",
  68418. "lastModifiedDate" : "2021-05-07T05:15Z"
  68419. }, {
  68420. "cve" : {
  68421. "data_type" : "CVE",
  68422. "data_format" : "MITRE",
  68423. "data_version" : "4.0",
  68424. "CVE_data_meta" : {
  68425. "ID" : "CVE-2021-28660",
  68426. "ASSIGNER" : "cve@mitre.org"
  68427. },
  68428. "problemtype" : {
  68429. "problemtype_data" : [ {
  68430. "description" : [ {
  68431. "lang" : "en",
  68432. "value" : "CWE-787"
  68433. } ]
  68434. } ]
  68435. },
  68436. "references" : {
  68437. "reference_data" : [ {
  68438. "url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=74b6b20df8cfe90ada777d621b54c32e69e27cd7",
  68439. "name" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=74b6b20df8cfe90ada777d621b54c32e69e27cd7",
  68440. "refsource" : "MISC",
  68441. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  68442. }, {
  68443. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJPVQZPY3DHPV5I3IVNMSMO6D3PKZISX/",
  68444. "name" : "FEDORA-2021-bb755ed5e3",
  68445. "refsource" : "FEDORA",
  68446. "tags" : [ "Mailing List", "Third Party Advisory" ]
  68447. }, {
  68448. "url" : "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html",
  68449. "name" : "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
  68450. "refsource" : "MLIST",
  68451. "tags" : [ ]
  68452. }, {
  68453. "url" : "https://security.netapp.com/advisory/ntap-20210507-0008/",
  68454. "name" : "https://security.netapp.com/advisory/ntap-20210507-0008/",
  68455. "refsource" : "CONFIRM",
  68456. "tags" : [ ]
  68457. } ]
  68458. },
  68459. "description" : {
  68460. "description_data" : [ {
  68461. "lang" : "en",
  68462. "value" : "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the ->ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base."
  68463. } ]
  68464. }
  68465. },
  68466. "configurations" : {
  68467. "CVE_data_version" : "4.0",
  68468. "nodes" : [ {
  68469. "operator" : "OR",
  68470. "children" : [ ],
  68471. "cpe_match" : [ {
  68472. "vulnerable" : true,
  68473. "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
  68474. "versionEndIncluding" : "5.11.6",
  68475. "cpe_name" : [ ]
  68476. } ]
  68477. }, {
  68478. "operator" : "OR",
  68479. "children" : [ ],
  68480. "cpe_match" : [ {
  68481. "vulnerable" : true,
  68482. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  68483. "cpe_name" : [ ]
  68484. } ]
  68485. } ]
  68486. },
  68487. "impact" : {
  68488. "baseMetricV3" : {
  68489. "cvssV3" : {
  68490. "version" : "3.1",
  68491. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  68492. "attackVector" : "LOCAL",
  68493. "attackComplexity" : "LOW",
  68494. "privilegesRequired" : "LOW",
  68495. "userInteraction" : "NONE",
  68496. "scope" : "UNCHANGED",
  68497. "confidentialityImpact" : "HIGH",
  68498. "integrityImpact" : "HIGH",
  68499. "availabilityImpact" : "HIGH",
  68500. "baseScore" : 7.8,
  68501. "baseSeverity" : "HIGH"
  68502. },
  68503. "exploitabilityScore" : 1.8,
  68504. "impactScore" : 5.9
  68505. },
  68506. "baseMetricV2" : {
  68507. "cvssV2" : {
  68508. "version" : "2.0",
  68509. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  68510. "accessVector" : "LOCAL",
  68511. "accessComplexity" : "LOW",
  68512. "authentication" : "NONE",
  68513. "confidentialityImpact" : "COMPLETE",
  68514. "integrityImpact" : "COMPLETE",
  68515. "availabilityImpact" : "COMPLETE",
  68516. "baseScore" : 7.2
  68517. },
  68518. "severity" : "HIGH",
  68519. "exploitabilityScore" : 3.9,
  68520. "impactScore" : 10.0,
  68521. "acInsufInfo" : false,
  68522. "obtainAllPrivilege" : false,
  68523. "obtainUserPrivilege" : false,
  68524. "obtainOtherPrivilege" : false,
  68525. "userInteractionRequired" : false
  68526. }
  68527. },
  68528. "publishedDate" : "2021-03-17T15:15Z",
  68529. "lastModifiedDate" : "2021-05-07T05:15Z"
  68530. }, {
  68531. "cve" : {
  68532. "data_type" : "CVE",
  68533. "data_format" : "MITRE",
  68534. "data_version" : "4.0",
  68535. "CVE_data_meta" : {
  68536. "ID" : "CVE-2021-27291",
  68537. "ASSIGNER" : "cve@mitre.org"
  68538. },
  68539. "problemtype" : {
  68540. "problemtype_data" : [ {
  68541. "description" : [ {
  68542. "lang" : "en",
  68543. "value" : "NVD-CWE-Other"
  68544. } ]
  68545. } ]
  68546. },
  68547. "references" : {
  68548. "reference_data" : [ {
  68549. "url" : "https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce",
  68550. "name" : "https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce",
  68551. "refsource" : "MISC",
  68552. "tags" : [ "Exploit", "Third Party Advisory" ]
  68553. }, {
  68554. "url" : "https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14",
  68555. "name" : "https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14",
  68556. "refsource" : "MISC",
  68557. "tags" : [ "Patch", "Third Party Advisory" ]
  68558. }, {
  68559. "url" : "https://lists.debian.org/debian-lts-announce/2021/03/msg00024.html",
  68560. "name" : "[debian-lts-announce] 20210319 [SECURITY] [DLA 2600-1] pygments security update",
  68561. "refsource" : "MLIST",
  68562. "tags" : [ "Mailing List", "Third Party Advisory" ]
  68563. }, {
  68564. "url" : "https://www.debian.org/security/2021/dsa-4878",
  68565. "name" : "DSA-4878",
  68566. "refsource" : "DEBIAN",
  68567. "tags" : [ ]
  68568. }, {
  68569. "url" : "https://www.debian.org/security/2021/dsa-4889",
  68570. "name" : "DSA-4889",
  68571. "refsource" : "DEBIAN",
  68572. "tags" : [ ]
  68573. }, {
  68574. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html",
  68575. "name" : "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update",
  68576. "refsource" : "MLIST",
  68577. "tags" : [ ]
  68578. }, {
  68579. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSLD67LFGXOX2K5YNESSWAS4AGZIJTUQ/",
  68580. "name" : "FEDORA-2021-3f975f68c8",
  68581. "refsource" : "FEDORA",
  68582. "tags" : [ ]
  68583. }, {
  68584. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSJRFHALQ7E3UV4FFMFU2YQ6LUDHAI55/",
  68585. "name" : "FEDORA-2021-166dfc62b2",
  68586. "refsource" : "FEDORA",
  68587. "tags" : [ ]
  68588. }, {
  68589. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html",
  68590. "name" : "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update",
  68591. "refsource" : "MLIST",
  68592. "tags" : [ ]
  68593. } ]
  68594. },
  68595. "description" : {
  68596. "description_data" : [ {
  68597. "lang" : "en",
  68598. "value" : "In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service."
  68599. } ]
  68600. }
  68601. },
  68602. "configurations" : {
  68603. "CVE_data_version" : "4.0",
  68604. "nodes" : [ {
  68605. "operator" : "OR",
  68606. "children" : [ ],
  68607. "cpe_match" : [ {
  68608. "vulnerable" : true,
  68609. "cpe23Uri" : "cpe:2.3:a:pygments:pygments:*:*:*:*:*:*:*:*",
  68610. "versionStartIncluding" : "1.1",
  68611. "versionEndExcluding" : "2.7.4",
  68612. "cpe_name" : [ ]
  68613. } ]
  68614. } ]
  68615. },
  68616. "impact" : {
  68617. "baseMetricV3" : {
  68618. "cvssV3" : {
  68619. "version" : "3.1",
  68620. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  68621. "attackVector" : "NETWORK",
  68622. "attackComplexity" : "LOW",
  68623. "privilegesRequired" : "NONE",
  68624. "userInteraction" : "NONE",
  68625. "scope" : "UNCHANGED",
  68626. "confidentialityImpact" : "NONE",
  68627. "integrityImpact" : "NONE",
  68628. "availabilityImpact" : "HIGH",
  68629. "baseScore" : 7.5,
  68630. "baseSeverity" : "HIGH"
  68631. },
  68632. "exploitabilityScore" : 3.9,
  68633. "impactScore" : 3.6
  68634. },
  68635. "baseMetricV2" : {
  68636. "cvssV2" : {
  68637. "version" : "2.0",
  68638. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  68639. "accessVector" : "NETWORK",
  68640. "accessComplexity" : "LOW",
  68641. "authentication" : "NONE",
  68642. "confidentialityImpact" : "NONE",
  68643. "integrityImpact" : "NONE",
  68644. "availabilityImpact" : "PARTIAL",
  68645. "baseScore" : 5.0
  68646. },
  68647. "severity" : "MEDIUM",
  68648. "exploitabilityScore" : 10.0,
  68649. "impactScore" : 2.9,
  68650. "acInsufInfo" : false,
  68651. "obtainAllPrivilege" : false,
  68652. "obtainUserPrivilege" : false,
  68653. "obtainOtherPrivilege" : false,
  68654. "userInteractionRequired" : false
  68655. }
  68656. },
  68657. "publishedDate" : "2021-03-17T13:15Z",
  68658. "lastModifiedDate" : "2021-05-06T23:15Z"
  68659. }, {
  68660. "cve" : {
  68661. "data_type" : "CVE",
  68662. "data_format" : "MITRE",
  68663. "data_version" : "4.0",
  68664. "CVE_data_meta" : {
  68665. "ID" : "CVE-2020-17525",
  68666. "ASSIGNER" : "security@apache.org"
  68667. },
  68668. "problemtype" : {
  68669. "problemtype_data" : [ {
  68670. "description" : [ {
  68671. "lang" : "en",
  68672. "value" : "CWE-476"
  68673. } ]
  68674. } ]
  68675. },
  68676. "references" : {
  68677. "reference_data" : [ {
  68678. "url" : "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt",
  68679. "name" : "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt",
  68680. "refsource" : "MISC",
  68681. "tags" : [ "Exploit", "Patch", "Vendor Advisory" ]
  68682. }, {
  68683. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html",
  68684. "name" : "[debian-lts-announce] 20210504 [SECURITY] [DLA 2646-1] subversion security update",
  68685. "refsource" : "MLIST",
  68686. "tags" : [ ]
  68687. } ]
  68688. },
  68689. "description" : {
  68690. "description_data" : [ {
  68691. "lang" : "en",
  68692. "value" : "Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7"
  68693. } ]
  68694. }
  68695. },
  68696. "configurations" : {
  68697. "CVE_data_version" : "4.0",
  68698. "nodes" : [ {
  68699. "operator" : "OR",
  68700. "children" : [ ],
  68701. "cpe_match" : [ {
  68702. "vulnerable" : true,
  68703. "cpe23Uri" : "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*",
  68704. "versionStartIncluding" : "1.9.0",
  68705. "versionEndExcluding" : "1.10.7",
  68706. "cpe_name" : [ ]
  68707. }, {
  68708. "vulnerable" : true,
  68709. "cpe23Uri" : "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*",
  68710. "versionStartIncluding" : "1.11.0",
  68711. "versionEndExcluding" : "1.14.1",
  68712. "cpe_name" : [ ]
  68713. } ]
  68714. } ]
  68715. },
  68716. "impact" : {
  68717. "baseMetricV3" : {
  68718. "cvssV3" : {
  68719. "version" : "3.1",
  68720. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  68721. "attackVector" : "NETWORK",
  68722. "attackComplexity" : "LOW",
  68723. "privilegesRequired" : "NONE",
  68724. "userInteraction" : "NONE",
  68725. "scope" : "UNCHANGED",
  68726. "confidentialityImpact" : "NONE",
  68727. "integrityImpact" : "NONE",
  68728. "availabilityImpact" : "HIGH",
  68729. "baseScore" : 7.5,
  68730. "baseSeverity" : "HIGH"
  68731. },
  68732. "exploitabilityScore" : 3.9,
  68733. "impactScore" : 3.6
  68734. },
  68735. "baseMetricV2" : {
  68736. "cvssV2" : {
  68737. "version" : "2.0",
  68738. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  68739. "accessVector" : "NETWORK",
  68740. "accessComplexity" : "MEDIUM",
  68741. "authentication" : "NONE",
  68742. "confidentialityImpact" : "NONE",
  68743. "integrityImpact" : "NONE",
  68744. "availabilityImpact" : "PARTIAL",
  68745. "baseScore" : 4.3
  68746. },
  68747. "severity" : "MEDIUM",
  68748. "exploitabilityScore" : 8.6,
  68749. "impactScore" : 2.9,
  68750. "acInsufInfo" : false,
  68751. "obtainAllPrivilege" : false,
  68752. "obtainUserPrivilege" : false,
  68753. "obtainOtherPrivilege" : false,
  68754. "userInteractionRequired" : false
  68755. }
  68756. },
  68757. "publishedDate" : "2021-03-17T10:15Z",
  68758. "lastModifiedDate" : "2021-05-04T09:15Z"
  68759. }, {
  68760. "cve" : {
  68761. "data_type" : "CVE",
  68762. "data_format" : "MITRE",
  68763. "data_version" : "4.0",
  68764. "CVE_data_meta" : {
  68765. "ID" : "CVE-2021-27077",
  68766. "ASSIGNER" : "secure@microsoft.com"
  68767. },
  68768. "problemtype" : {
  68769. "problemtype_data" : [ {
  68770. "description" : [ {
  68771. "lang" : "en",
  68772. "value" : "CWE-269"
  68773. } ]
  68774. } ]
  68775. },
  68776. "references" : {
  68777. "reference_data" : [ {
  68778. "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077",
  68779. "name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077",
  68780. "refsource" : "MISC",
  68781. "tags" : [ "Patch", "Vendor Advisory" ]
  68782. }, {
  68783. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-287/",
  68784. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-287/",
  68785. "refsource" : "MISC",
  68786. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  68787. }, {
  68788. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-403/",
  68789. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-403/",
  68790. "refsource" : "MISC",
  68791. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  68792. }, {
  68793. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-482/",
  68794. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-482/",
  68795. "refsource" : "MISC",
  68796. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  68797. }, {
  68798. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-494/",
  68799. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-494/",
  68800. "refsource" : "MISC",
  68801. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  68802. }, {
  68803. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-495/",
  68804. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-495/",
  68805. "refsource" : "MISC",
  68806. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  68807. }, {
  68808. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-496/",
  68809. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-496/",
  68810. "refsource" : "MISC",
  68811. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  68812. }, {
  68813. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-497/",
  68814. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-497/",
  68815. "refsource" : "MISC",
  68816. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  68817. }, {
  68818. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-498/",
  68819. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-498/",
  68820. "refsource" : "MISC",
  68821. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  68822. }, {
  68823. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-499/",
  68824. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-499/",
  68825. "refsource" : "MISC",
  68826. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  68827. }, {
  68828. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-500/",
  68829. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-500/",
  68830. "refsource" : "MISC",
  68831. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  68832. }, {
  68833. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-501/",
  68834. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-501/",
  68835. "refsource" : "MISC",
  68836. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  68837. } ]
  68838. },
  68839. "description" : {
  68840. "description_data" : [ {
  68841. "lang" : "en",
  68842. "value" : "Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-26900."
  68843. } ]
  68844. }
  68845. },
  68846. "configurations" : {
  68847. "CVE_data_version" : "4.0",
  68848. "nodes" : [ {
  68849. "operator" : "OR",
  68850. "children" : [ ],
  68851. "cpe_match" : [ {
  68852. "vulnerable" : true,
  68853. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
  68854. "cpe_name" : [ ]
  68855. }, {
  68856. "vulnerable" : true,
  68857. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
  68858. "cpe_name" : [ ]
  68859. }, {
  68860. "vulnerable" : true,
  68861. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
  68862. "cpe_name" : [ ]
  68863. }, {
  68864. "vulnerable" : true,
  68865. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
  68866. "cpe_name" : [ ]
  68867. }, {
  68868. "vulnerable" : true,
  68869. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
  68870. "cpe_name" : [ ]
  68871. }, {
  68872. "vulnerable" : true,
  68873. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
  68874. "cpe_name" : [ ]
  68875. }, {
  68876. "vulnerable" : true,
  68877. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
  68878. "cpe_name" : [ ]
  68879. }, {
  68880. "vulnerable" : true,
  68881. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
  68882. "cpe_name" : [ ]
  68883. }, {
  68884. "vulnerable" : true,
  68885. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
  68886. "cpe_name" : [ ]
  68887. }, {
  68888. "vulnerable" : true,
  68889. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
  68890. "cpe_name" : [ ]
  68891. }, {
  68892. "vulnerable" : true,
  68893. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
  68894. "cpe_name" : [ ]
  68895. }, {
  68896. "vulnerable" : true,
  68897. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp2:*:*:*:*:*:*",
  68898. "cpe_name" : [ ]
  68899. }, {
  68900. "vulnerable" : true,
  68901. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
  68902. "cpe_name" : [ ]
  68903. }, {
  68904. "vulnerable" : true,
  68905. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
  68906. "cpe_name" : [ ]
  68907. }, {
  68908. "vulnerable" : true,
  68909. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
  68910. "cpe_name" : [ ]
  68911. }, {
  68912. "vulnerable" : true,
  68913. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
  68914. "cpe_name" : [ ]
  68915. }, {
  68916. "vulnerable" : true,
  68917. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
  68918. "cpe_name" : [ ]
  68919. }, {
  68920. "vulnerable" : true,
  68921. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
  68922. "cpe_name" : [ ]
  68923. }, {
  68924. "vulnerable" : true,
  68925. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
  68926. "cpe_name" : [ ]
  68927. } ]
  68928. } ]
  68929. },
  68930. "impact" : {
  68931. "baseMetricV3" : {
  68932. "cvssV3" : {
  68933. "version" : "3.1",
  68934. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  68935. "attackVector" : "LOCAL",
  68936. "attackComplexity" : "LOW",
  68937. "privilegesRequired" : "LOW",
  68938. "userInteraction" : "NONE",
  68939. "scope" : "UNCHANGED",
  68940. "confidentialityImpact" : "HIGH",
  68941. "integrityImpact" : "HIGH",
  68942. "availabilityImpact" : "HIGH",
  68943. "baseScore" : 7.8,
  68944. "baseSeverity" : "HIGH"
  68945. },
  68946. "exploitabilityScore" : 1.8,
  68947. "impactScore" : 5.9
  68948. },
  68949. "baseMetricV2" : {
  68950. "cvssV2" : {
  68951. "version" : "2.0",
  68952. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  68953. "accessVector" : "LOCAL",
  68954. "accessComplexity" : "LOW",
  68955. "authentication" : "NONE",
  68956. "confidentialityImpact" : "PARTIAL",
  68957. "integrityImpact" : "PARTIAL",
  68958. "availabilityImpact" : "PARTIAL",
  68959. "baseScore" : 4.6
  68960. },
  68961. "severity" : "MEDIUM",
  68962. "exploitabilityScore" : 3.9,
  68963. "impactScore" : 6.4,
  68964. "acInsufInfo" : false,
  68965. "obtainAllPrivilege" : false,
  68966. "obtainUserPrivilege" : false,
  68967. "obtainOtherPrivilege" : false,
  68968. "userInteractionRequired" : false
  68969. }
  68970. },
  68971. "publishedDate" : "2021-03-11T16:15Z",
  68972. "lastModifiedDate" : "2021-05-04T14:03Z"
  68973. }, {
  68974. "cve" : {
  68975. "data_type" : "CVE",
  68976. "data_format" : "MITRE",
  68977. "data_version" : "4.0",
  68978. "CVE_data_meta" : {
  68979. "ID" : "CVE-2021-27054",
  68980. "ASSIGNER" : "secure@microsoft.com"
  68981. },
  68982. "problemtype" : {
  68983. "problemtype_data" : [ {
  68984. "description" : [ {
  68985. "lang" : "en",
  68986. "value" : "NVD-CWE-noinfo"
  68987. } ]
  68988. } ]
  68989. },
  68990. "references" : {
  68991. "reference_data" : [ {
  68992. "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27054",
  68993. "name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27054",
  68994. "refsource" : "MISC",
  68995. "tags" : [ "Patch", "Vendor Advisory" ]
  68996. }, {
  68997. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-507/",
  68998. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-507/",
  68999. "refsource" : "MISC",
  69000. "tags" : [ ]
  69001. } ]
  69002. },
  69003. "description" : {
  69004. "description_data" : [ {
  69005. "lang" : "en",
  69006. "value" : "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27053."
  69007. } ]
  69008. }
  69009. },
  69010. "configurations" : {
  69011. "CVE_data_version" : "4.0",
  69012. "nodes" : [ {
  69013. "operator" : "OR",
  69014. "children" : [ ],
  69015. "cpe_match" : [ {
  69016. "vulnerable" : true,
  69017. "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
  69018. "cpe_name" : [ ]
  69019. }, {
  69020. "vulnerable" : true,
  69021. "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
  69022. "cpe_name" : [ ]
  69023. }, {
  69024. "vulnerable" : true,
  69025. "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*",
  69026. "cpe_name" : [ ]
  69027. }, {
  69028. "vulnerable" : true,
  69029. "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*",
  69030. "cpe_name" : [ ]
  69031. }, {
  69032. "vulnerable" : true,
  69033. "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
  69034. "cpe_name" : [ ]
  69035. }, {
  69036. "vulnerable" : true,
  69037. "cpe23Uri" : "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
  69038. "cpe_name" : [ ]
  69039. }, {
  69040. "vulnerable" : true,
  69041. "cpe23Uri" : "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
  69042. "cpe_name" : [ ]
  69043. }, {
  69044. "vulnerable" : true,
  69045. "cpe23Uri" : "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
  69046. "cpe_name" : [ ]
  69047. }, {
  69048. "vulnerable" : true,
  69049. "cpe23Uri" : "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
  69050. "cpe_name" : [ ]
  69051. }, {
  69052. "vulnerable" : true,
  69053. "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*",
  69054. "cpe_name" : [ ]
  69055. }, {
  69056. "vulnerable" : true,
  69057. "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*",
  69058. "cpe_name" : [ ]
  69059. }, {
  69060. "vulnerable" : true,
  69061. "cpe23Uri" : "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
  69062. "cpe_name" : [ ]
  69063. }, {
  69064. "vulnerable" : true,
  69065. "cpe23Uri" : "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*",
  69066. "cpe_name" : [ ]
  69067. } ]
  69068. } ]
  69069. },
  69070. "impact" : {
  69071. "baseMetricV3" : {
  69072. "cvssV3" : {
  69073. "version" : "3.1",
  69074. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  69075. "attackVector" : "LOCAL",
  69076. "attackComplexity" : "LOW",
  69077. "privilegesRequired" : "NONE",
  69078. "userInteraction" : "REQUIRED",
  69079. "scope" : "UNCHANGED",
  69080. "confidentialityImpact" : "HIGH",
  69081. "integrityImpact" : "HIGH",
  69082. "availabilityImpact" : "HIGH",
  69083. "baseScore" : 7.8,
  69084. "baseSeverity" : "HIGH"
  69085. },
  69086. "exploitabilityScore" : 1.8,
  69087. "impactScore" : 5.9
  69088. },
  69089. "baseMetricV2" : {
  69090. "cvssV2" : {
  69091. "version" : "2.0",
  69092. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  69093. "accessVector" : "NETWORK",
  69094. "accessComplexity" : "MEDIUM",
  69095. "authentication" : "NONE",
  69096. "confidentialityImpact" : "PARTIAL",
  69097. "integrityImpact" : "PARTIAL",
  69098. "availabilityImpact" : "PARTIAL",
  69099. "baseScore" : 6.8
  69100. },
  69101. "severity" : "MEDIUM",
  69102. "exploitabilityScore" : 8.6,
  69103. "impactScore" : 6.4,
  69104. "acInsufInfo" : false,
  69105. "obtainAllPrivilege" : false,
  69106. "obtainUserPrivilege" : false,
  69107. "obtainOtherPrivilege" : false,
  69108. "userInteractionRequired" : true
  69109. }
  69110. },
  69111. "publishedDate" : "2021-03-11T16:15Z",
  69112. "lastModifiedDate" : "2021-05-05T16:15Z"
  69113. }, {
  69114. "cve" : {
  69115. "data_type" : "CVE",
  69116. "data_format" : "MITRE",
  69117. "data_version" : "4.0",
  69118. "CVE_data_meta" : {
  69119. "ID" : "CVE-2021-1640",
  69120. "ASSIGNER" : "secure@microsoft.com"
  69121. },
  69122. "problemtype" : {
  69123. "problemtype_data" : [ {
  69124. "description" : [ {
  69125. "lang" : "en",
  69126. "value" : "CWE-269"
  69127. } ]
  69128. } ]
  69129. },
  69130. "references" : {
  69131. "reference_data" : [ {
  69132. "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1640",
  69133. "name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1640",
  69134. "refsource" : "MISC",
  69135. "tags" : [ "Patch", "Vendor Advisory" ]
  69136. }, {
  69137. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-493/",
  69138. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-493/",
  69139. "refsource" : "MISC",
  69140. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  69141. } ]
  69142. },
  69143. "description" : {
  69144. "description_data" : [ {
  69145. "lang" : "en",
  69146. "value" : "Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26878."
  69147. } ]
  69148. }
  69149. },
  69150. "configurations" : {
  69151. "CVE_data_version" : "4.0",
  69152. "nodes" : [ {
  69153. "operator" : "OR",
  69154. "children" : [ ],
  69155. "cpe_match" : [ {
  69156. "vulnerable" : true,
  69157. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
  69158. "cpe_name" : [ ]
  69159. }, {
  69160. "vulnerable" : true,
  69161. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
  69162. "cpe_name" : [ ]
  69163. }, {
  69164. "vulnerable" : true,
  69165. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
  69166. "cpe_name" : [ ]
  69167. }, {
  69168. "vulnerable" : true,
  69169. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
  69170. "cpe_name" : [ ]
  69171. }, {
  69172. "vulnerable" : true,
  69173. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
  69174. "cpe_name" : [ ]
  69175. }, {
  69176. "vulnerable" : true,
  69177. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
  69178. "cpe_name" : [ ]
  69179. }, {
  69180. "vulnerable" : true,
  69181. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
  69182. "cpe_name" : [ ]
  69183. }, {
  69184. "vulnerable" : true,
  69185. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
  69186. "cpe_name" : [ ]
  69187. }, {
  69188. "vulnerable" : true,
  69189. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
  69190. "cpe_name" : [ ]
  69191. }, {
  69192. "vulnerable" : true,
  69193. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
  69194. "cpe_name" : [ ]
  69195. }, {
  69196. "vulnerable" : true,
  69197. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
  69198. "cpe_name" : [ ]
  69199. }, {
  69200. "vulnerable" : true,
  69201. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
  69202. "cpe_name" : [ ]
  69203. }, {
  69204. "vulnerable" : true,
  69205. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
  69206. "cpe_name" : [ ]
  69207. }, {
  69208. "vulnerable" : true,
  69209. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
  69210. "cpe_name" : [ ]
  69211. }, {
  69212. "vulnerable" : true,
  69213. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
  69214. "cpe_name" : [ ]
  69215. }, {
  69216. "vulnerable" : true,
  69217. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
  69218. "cpe_name" : [ ]
  69219. }, {
  69220. "vulnerable" : true,
  69221. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
  69222. "cpe_name" : [ ]
  69223. }, {
  69224. "vulnerable" : true,
  69225. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
  69226. "cpe_name" : [ ]
  69227. }, {
  69228. "vulnerable" : true,
  69229. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
  69230. "cpe_name" : [ ]
  69231. } ]
  69232. } ]
  69233. },
  69234. "impact" : {
  69235. "baseMetricV3" : {
  69236. "cvssV3" : {
  69237. "version" : "3.1",
  69238. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  69239. "attackVector" : "LOCAL",
  69240. "attackComplexity" : "LOW",
  69241. "privilegesRequired" : "LOW",
  69242. "userInteraction" : "NONE",
  69243. "scope" : "UNCHANGED",
  69244. "confidentialityImpact" : "HIGH",
  69245. "integrityImpact" : "HIGH",
  69246. "availabilityImpact" : "HIGH",
  69247. "baseScore" : 7.8,
  69248. "baseSeverity" : "HIGH"
  69249. },
  69250. "exploitabilityScore" : 1.8,
  69251. "impactScore" : 5.9
  69252. },
  69253. "baseMetricV2" : {
  69254. "cvssV2" : {
  69255. "version" : "2.0",
  69256. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  69257. "accessVector" : "LOCAL",
  69258. "accessComplexity" : "LOW",
  69259. "authentication" : "NONE",
  69260. "confidentialityImpact" : "PARTIAL",
  69261. "integrityImpact" : "PARTIAL",
  69262. "availabilityImpact" : "PARTIAL",
  69263. "baseScore" : 4.6
  69264. },
  69265. "severity" : "MEDIUM",
  69266. "exploitabilityScore" : 3.9,
  69267. "impactScore" : 6.4,
  69268. "acInsufInfo" : false,
  69269. "obtainAllPrivilege" : false,
  69270. "obtainUserPrivilege" : false,
  69271. "obtainOtherPrivilege" : false,
  69272. "userInteractionRequired" : false
  69273. }
  69274. },
  69275. "publishedDate" : "2021-03-11T16:15Z",
  69276. "lastModifiedDate" : "2021-05-04T14:03Z"
  69277. }, {
  69278. "cve" : {
  69279. "data_type" : "CVE",
  69280. "data_format" : "MITRE",
  69281. "data_version" : "4.0",
  69282. "CVE_data_meta" : {
  69283. "ID" : "CVE-2021-20205",
  69284. "ASSIGNER" : "secalert@redhat.com"
  69285. },
  69286. "problemtype" : {
  69287. "problemtype_data" : [ {
  69288. "description" : [ {
  69289. "lang" : "en",
  69290. "value" : "CWE-369"
  69291. } ]
  69292. } ]
  69293. },
  69294. "references" : {
  69295. "reference_data" : [ {
  69296. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1937385",
  69297. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1937385",
  69298. "refsource" : "MISC",
  69299. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  69300. }, {
  69301. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TM3AHZEYGYFEDL6AW5RLEAJNVRWEJDFL/",
  69302. "name" : "FEDORA-2021-7de3c2fe57",
  69303. "refsource" : "FEDORA",
  69304. "tags" : [ "Third Party Advisory" ]
  69305. }, {
  69306. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMLEY6HLVZAGXIOGGPPUAMRJUA6LB3FD/",
  69307. "name" : "FEDORA-2021-94e37443bb",
  69308. "refsource" : "FEDORA",
  69309. "tags" : [ "Third Party Advisory" ]
  69310. } ]
  69311. },
  69312. "description" : {
  69313. "description_data" : [ {
  69314. "lang" : "en",
  69315. "value" : "Libjpeg-turbo versions 2.0.91 and 2.0.90 is vulnerable to a denial of service vulnerability caused by a divide by zero when processing a crafted GIF image."
  69316. } ]
  69317. }
  69318. },
  69319. "configurations" : {
  69320. "CVE_data_version" : "4.0",
  69321. "nodes" : [ {
  69322. "operator" : "OR",
  69323. "children" : [ ],
  69324. "cpe_match" : [ {
  69325. "vulnerable" : true,
  69326. "cpe23Uri" : "cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:2.0.90:*:*:*:*:*:*:*",
  69327. "cpe_name" : [ ]
  69328. } ]
  69329. }, {
  69330. "operator" : "OR",
  69331. "children" : [ ],
  69332. "cpe_match" : [ {
  69333. "vulnerable" : true,
  69334. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  69335. "cpe_name" : [ ]
  69336. } ]
  69337. } ]
  69338. },
  69339. "impact" : {
  69340. "baseMetricV3" : {
  69341. "cvssV3" : {
  69342. "version" : "3.1",
  69343. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  69344. "attackVector" : "NETWORK",
  69345. "attackComplexity" : "LOW",
  69346. "privilegesRequired" : "NONE",
  69347. "userInteraction" : "REQUIRED",
  69348. "scope" : "UNCHANGED",
  69349. "confidentialityImpact" : "NONE",
  69350. "integrityImpact" : "NONE",
  69351. "availabilityImpact" : "HIGH",
  69352. "baseScore" : 6.5,
  69353. "baseSeverity" : "MEDIUM"
  69354. },
  69355. "exploitabilityScore" : 2.8,
  69356. "impactScore" : 3.6
  69357. },
  69358. "baseMetricV2" : {
  69359. "cvssV2" : {
  69360. "version" : "2.0",
  69361. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  69362. "accessVector" : "NETWORK",
  69363. "accessComplexity" : "MEDIUM",
  69364. "authentication" : "NONE",
  69365. "confidentialityImpact" : "NONE",
  69366. "integrityImpact" : "NONE",
  69367. "availabilityImpact" : "PARTIAL",
  69368. "baseScore" : 4.3
  69369. },
  69370. "severity" : "MEDIUM",
  69371. "exploitabilityScore" : 8.6,
  69372. "impactScore" : 2.9,
  69373. "acInsufInfo" : false,
  69374. "obtainAllPrivilege" : false,
  69375. "obtainUserPrivilege" : false,
  69376. "obtainOtherPrivilege" : false,
  69377. "userInteractionRequired" : true
  69378. }
  69379. },
  69380. "publishedDate" : "2021-03-10T17:15Z",
  69381. "lastModifiedDate" : "2021-05-04T19:41Z"
  69382. }, {
  69383. "cve" : {
  69384. "data_type" : "CVE",
  69385. "data_format" : "MITRE",
  69386. "data_version" : "4.0",
  69387. "CVE_data_meta" : {
  69388. "ID" : "CVE-2021-21300",
  69389. "ASSIGNER" : "security-advisories@github.com"
  69390. },
  69391. "problemtype" : {
  69392. "problemtype_data" : [ {
  69393. "description" : [ {
  69394. "lang" : "en",
  69395. "value" : "CWE-59"
  69396. } ]
  69397. } ]
  69398. },
  69399. "references" : {
  69400. "reference_data" : [ {
  69401. "url" : "https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592",
  69402. "name" : "https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592",
  69403. "refsource" : "MISC",
  69404. "tags" : [ "Patch", "Third Party Advisory" ]
  69405. }, {
  69406. "url" : "https://git-scm.com/docs/gitattributes#_filter",
  69407. "name" : "https://git-scm.com/docs/gitattributes#_filter",
  69408. "refsource" : "MISC",
  69409. "tags" : [ "Vendor Advisory" ]
  69410. }, {
  69411. "url" : "https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm",
  69412. "name" : "https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm",
  69413. "refsource" : "CONFIRM",
  69414. "tags" : [ "Third Party Advisory" ]
  69415. }, {
  69416. "url" : "https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/",
  69417. "name" : "https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/",
  69418. "refsource" : "MISC",
  69419. "tags" : [ "Release Notes", "Third Party Advisory" ]
  69420. }, {
  69421. "url" : "https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks",
  69422. "name" : "https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks",
  69423. "refsource" : "MISC",
  69424. "tags" : [ "Vendor Advisory" ]
  69425. }, {
  69426. "url" : "http://www.openwall.com/lists/oss-security/2021/03/09/3",
  69427. "name" : "[oss-security] 20210309 git: malicious repositories can execute remote code while cloning",
  69428. "refsource" : "MLIST",
  69429. "tags" : [ "Exploit", "Mailing List", "Third Party Advisory" ]
  69430. }, {
  69431. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/",
  69432. "name" : "FEDORA-2021-63fcbd126e",
  69433. "refsource" : "FEDORA",
  69434. "tags" : [ "Third Party Advisory" ]
  69435. }, {
  69436. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/",
  69437. "name" : "FEDORA-2021-ffd0b2108d",
  69438. "refsource" : "FEDORA",
  69439. "tags" : [ "Mailing List", "Third Party Advisory" ]
  69440. }, {
  69441. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/",
  69442. "name" : "FEDORA-2021-03e61a6647",
  69443. "refsource" : "FEDORA",
  69444. "tags" : [ "Mailing List", "Third Party Advisory" ]
  69445. }, {
  69446. "url" : "https://support.apple.com/kb/HT212320",
  69447. "name" : "https://support.apple.com/kb/HT212320",
  69448. "refsource" : "CONFIRM",
  69449. "tags" : [ "Third Party Advisory" ]
  69450. }, {
  69451. "url" : "http://seclists.org/fulldisclosure/2021/Apr/60",
  69452. "name" : "20210427 APPLE-SA-2021-04-26-10 Xcode 12.5",
  69453. "refsource" : "FULLDISC",
  69454. "tags" : [ "Mailing List", "Third Party Advisory" ]
  69455. }, {
  69456. "url" : "https://security.gentoo.org/glsa/202104-01",
  69457. "name" : "GLSA-202104-01",
  69458. "refsource" : "GENTOO",
  69459. "tags" : [ "Third Party Advisory" ]
  69460. } ]
  69461. },
  69462. "description" : {
  69463. "description_data" : [ {
  69464. "lang" : "en",
  69465. "value" : "Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6."
  69466. } ]
  69467. }
  69468. },
  69469. "configurations" : {
  69470. "CVE_data_version" : "4.0",
  69471. "nodes" : [ {
  69472. "operator" : "OR",
  69473. "children" : [ ],
  69474. "cpe_match" : [ {
  69475. "vulnerable" : true,
  69476. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69477. "versionEndIncluding" : "2.14.2",
  69478. "cpe_name" : [ ]
  69479. }, {
  69480. "vulnerable" : true,
  69481. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69482. "versionStartIncluding" : "2.17.0",
  69483. "versionEndExcluding" : "2.17.6",
  69484. "cpe_name" : [ ]
  69485. }, {
  69486. "vulnerable" : true,
  69487. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69488. "versionStartIncluding" : "2.18.0",
  69489. "versionEndExcluding" : "2.18.5",
  69490. "cpe_name" : [ ]
  69491. }, {
  69492. "vulnerable" : true,
  69493. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69494. "versionStartIncluding" : "2.19.0",
  69495. "versionEndExcluding" : "2.19.6",
  69496. "cpe_name" : [ ]
  69497. }, {
  69498. "vulnerable" : true,
  69499. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69500. "versionStartIncluding" : "2.20.0",
  69501. "versionEndExcluding" : "2.20.5",
  69502. "cpe_name" : [ ]
  69503. }, {
  69504. "vulnerable" : true,
  69505. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69506. "versionStartIncluding" : "2.21.0",
  69507. "versionEndExcluding" : "2.21.4",
  69508. "cpe_name" : [ ]
  69509. }, {
  69510. "vulnerable" : true,
  69511. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69512. "versionStartIncluding" : "2.22.0",
  69513. "versionEndExcluding" : "2.22.5",
  69514. "cpe_name" : [ ]
  69515. }, {
  69516. "vulnerable" : true,
  69517. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69518. "versionStartIncluding" : "2.23.0",
  69519. "versionEndExcluding" : "2.23.4",
  69520. "cpe_name" : [ ]
  69521. }, {
  69522. "vulnerable" : true,
  69523. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69524. "versionStartIncluding" : "2.24.0",
  69525. "versionEndExcluding" : "2.24.4",
  69526. "cpe_name" : [ ]
  69527. }, {
  69528. "vulnerable" : true,
  69529. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69530. "versionStartIncluding" : "2.25.0",
  69531. "versionEndExcluding" : "2.25.5",
  69532. "cpe_name" : [ ]
  69533. }, {
  69534. "vulnerable" : true,
  69535. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69536. "versionStartIncluding" : "2.26.0",
  69537. "versionEndExcluding" : "2.26.3",
  69538. "cpe_name" : [ ]
  69539. }, {
  69540. "vulnerable" : true,
  69541. "cpe23Uri" : "cpe:2.3:a:git-scm:git:2.27.0:*:*:*:*:*:*:*",
  69542. "cpe_name" : [ ]
  69543. }, {
  69544. "vulnerable" : true,
  69545. "cpe23Uri" : "cpe:2.3:a:git-scm:git:2.28.0:*:*:*:*:*:*:*",
  69546. "cpe_name" : [ ]
  69547. }, {
  69548. "vulnerable" : true,
  69549. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69550. "versionStartIncluding" : "2.29.0",
  69551. "versionEndExcluding" : "2.29.3",
  69552. "cpe_name" : [ ]
  69553. }, {
  69554. "vulnerable" : true,
  69555. "cpe23Uri" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
  69556. "versionStartIncluding" : "2.30.0",
  69557. "versionEndExcluding" : "2.30.2",
  69558. "cpe_name" : [ ]
  69559. } ]
  69560. }, {
  69561. "operator" : "OR",
  69562. "children" : [ ],
  69563. "cpe_match" : [ {
  69564. "vulnerable" : true,
  69565. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  69566. "cpe_name" : [ ]
  69567. }, {
  69568. "vulnerable" : true,
  69569. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  69570. "cpe_name" : [ ]
  69571. }, {
  69572. "vulnerable" : true,
  69573. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  69574. "cpe_name" : [ ]
  69575. } ]
  69576. }, {
  69577. "operator" : "AND",
  69578. "children" : [ {
  69579. "operator" : "OR",
  69580. "children" : [ ],
  69581. "cpe_match" : [ {
  69582. "vulnerable" : true,
  69583. "cpe23Uri" : "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*",
  69584. "versionEndExcluding" : "12.5",
  69585. "cpe_name" : [ ]
  69586. } ]
  69587. }, {
  69588. "operator" : "OR",
  69589. "children" : [ ],
  69590. "cpe_match" : [ {
  69591. "vulnerable" : false,
  69592. "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
  69593. "versionStartIncluding" : "11.0",
  69594. "cpe_name" : [ ]
  69595. } ]
  69596. } ],
  69597. "cpe_match" : [ ]
  69598. } ]
  69599. },
  69600. "impact" : {
  69601. "baseMetricV3" : {
  69602. "cvssV3" : {
  69603. "version" : "3.1",
  69604. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
  69605. "attackVector" : "NETWORK",
  69606. "attackComplexity" : "HIGH",
  69607. "privilegesRequired" : "NONE",
  69608. "userInteraction" : "REQUIRED",
  69609. "scope" : "UNCHANGED",
  69610. "confidentialityImpact" : "HIGH",
  69611. "integrityImpact" : "HIGH",
  69612. "availabilityImpact" : "HIGH",
  69613. "baseScore" : 7.5,
  69614. "baseSeverity" : "HIGH"
  69615. },
  69616. "exploitabilityScore" : 1.6,
  69617. "impactScore" : 5.9
  69618. },
  69619. "baseMetricV2" : {
  69620. "cvssV2" : {
  69621. "version" : "2.0",
  69622. "vectorString" : "AV:N/AC:H/Au:N/C:P/I:P/A:P",
  69623. "accessVector" : "NETWORK",
  69624. "accessComplexity" : "HIGH",
  69625. "authentication" : "NONE",
  69626. "confidentialityImpact" : "PARTIAL",
  69627. "integrityImpact" : "PARTIAL",
  69628. "availabilityImpact" : "PARTIAL",
  69629. "baseScore" : 5.1
  69630. },
  69631. "severity" : "MEDIUM",
  69632. "exploitabilityScore" : 4.9,
  69633. "impactScore" : 6.4,
  69634. "acInsufInfo" : false,
  69635. "obtainAllPrivilege" : false,
  69636. "obtainUserPrivilege" : false,
  69637. "obtainOtherPrivilege" : false,
  69638. "userInteractionRequired" : true
  69639. }
  69640. },
  69641. "publishedDate" : "2021-03-09T20:15Z",
  69642. "lastModifiedDate" : "2021-05-05T14:23Z"
  69643. }, {
  69644. "cve" : {
  69645. "data_type" : "CVE",
  69646. "data_format" : "MITRE",
  69647. "data_version" : "4.0",
  69648. "CVE_data_meta" : {
  69649. "ID" : "CVE-2021-20255",
  69650. "ASSIGNER" : "secalert@redhat.com"
  69651. },
  69652. "problemtype" : {
  69653. "problemtype_data" : [ {
  69654. "description" : [ {
  69655. "lang" : "en",
  69656. "value" : "CWE-835"
  69657. } ]
  69658. } ]
  69659. },
  69660. "references" : {
  69661. "reference_data" : [ {
  69662. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1930646",
  69663. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1930646",
  69664. "refsource" : "MISC",
  69665. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  69666. }, {
  69667. "url" : "https://www.openwall.com/lists/oss-security/2021/02/25/1",
  69668. "name" : "https://www.openwall.com/lists/oss-security/2021/02/25/1",
  69669. "refsource" : "MISC",
  69670. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  69671. }, {
  69672. "url" : "https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Feepro100_stackoverflow1",
  69673. "name" : "https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Feepro100_stackoverflow1",
  69674. "refsource" : "MISC",
  69675. "tags" : [ "Third Party Advisory" ]
  69676. }, {
  69677. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00009.html",
  69678. "name" : "[debian-lts-announce] 20210410 [SECURITY] [DLA 2623-1] qemu security update",
  69679. "refsource" : "MLIST",
  69680. "tags" : [ ]
  69681. }, {
  69682. "url" : "https://security.netapp.com/advisory/ntap-20210507-0003/",
  69683. "name" : "https://security.netapp.com/advisory/ntap-20210507-0003/",
  69684. "refsource" : "CONFIRM",
  69685. "tags" : [ ]
  69686. } ]
  69687. },
  69688. "description" : {
  69689. "description_data" : [ {
  69690. "lang" : "en",
  69691. "value" : "A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability."
  69692. } ]
  69693. }
  69694. },
  69695. "configurations" : {
  69696. "CVE_data_version" : "4.0",
  69697. "nodes" : [ {
  69698. "operator" : "OR",
  69699. "children" : [ ],
  69700. "cpe_match" : [ {
  69701. "vulnerable" : true,
  69702. "cpe23Uri" : "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
  69703. "cpe_name" : [ ]
  69704. } ]
  69705. } ]
  69706. },
  69707. "impact" : {
  69708. "baseMetricV3" : {
  69709. "cvssV3" : {
  69710. "version" : "3.1",
  69711. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  69712. "attackVector" : "LOCAL",
  69713. "attackComplexity" : "LOW",
  69714. "privilegesRequired" : "LOW",
  69715. "userInteraction" : "NONE",
  69716. "scope" : "UNCHANGED",
  69717. "confidentialityImpact" : "NONE",
  69718. "integrityImpact" : "NONE",
  69719. "availabilityImpact" : "HIGH",
  69720. "baseScore" : 5.5,
  69721. "baseSeverity" : "MEDIUM"
  69722. },
  69723. "exploitabilityScore" : 1.8,
  69724. "impactScore" : 3.6
  69725. },
  69726. "baseMetricV2" : {
  69727. "cvssV2" : {
  69728. "version" : "2.0",
  69729. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:P",
  69730. "accessVector" : "LOCAL",
  69731. "accessComplexity" : "LOW",
  69732. "authentication" : "NONE",
  69733. "confidentialityImpact" : "NONE",
  69734. "integrityImpact" : "NONE",
  69735. "availabilityImpact" : "PARTIAL",
  69736. "baseScore" : 2.1
  69737. },
  69738. "severity" : "LOW",
  69739. "exploitabilityScore" : 3.9,
  69740. "impactScore" : 2.9,
  69741. "acInsufInfo" : false,
  69742. "obtainAllPrivilege" : false,
  69743. "obtainUserPrivilege" : false,
  69744. "obtainOtherPrivilege" : false,
  69745. "userInteractionRequired" : false
  69746. }
  69747. },
  69748. "publishedDate" : "2021-03-09T20:15Z",
  69749. "lastModifiedDate" : "2021-05-07T05:15Z"
  69750. }, {
  69751. "cve" : {
  69752. "data_type" : "CVE",
  69753. "data_format" : "MITRE",
  69754. "data_version" : "4.0",
  69755. "CVE_data_meta" : {
  69756. "ID" : "CVE-2020-35524",
  69757. "ASSIGNER" : "secalert@redhat.com"
  69758. },
  69759. "problemtype" : {
  69760. "problemtype_data" : [ {
  69761. "description" : [ {
  69762. "lang" : "en",
  69763. "value" : "CWE-119"
  69764. } ]
  69765. } ]
  69766. },
  69767. "references" : {
  69768. "reference_data" : [ {
  69769. "url" : "https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22",
  69770. "name" : "https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22",
  69771. "refsource" : "MISC",
  69772. "tags" : [ "Patch", "Third Party Advisory" ]
  69773. }, {
  69774. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1932044",
  69775. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1932044",
  69776. "refsource" : "MISC",
  69777. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  69778. }, {
  69779. "url" : "https://gitlab.com/libtiff/libtiff/-/merge_requests/159",
  69780. "name" : "https://gitlab.com/libtiff/libtiff/-/merge_requests/159",
  69781. "refsource" : "MISC",
  69782. "tags" : [ "Patch", "Third Party Advisory" ]
  69783. }, {
  69784. "url" : "https://www.debian.org/security/2021/dsa-4869",
  69785. "name" : "DSA-4869",
  69786. "refsource" : "DEBIAN",
  69787. "tags" : [ "Third Party Advisory" ]
  69788. }, {
  69789. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/",
  69790. "name" : "FEDORA-2021-1bf4f2f13a",
  69791. "refsource" : "FEDORA",
  69792. "tags" : [ "Third Party Advisory" ]
  69793. }, {
  69794. "url" : "https://security.gentoo.org/glsa/202104-06",
  69795. "name" : "GLSA-202104-06",
  69796. "refsource" : "GENTOO",
  69797. "tags" : [ "Third Party Advisory" ]
  69798. } ]
  69799. },
  69800. "description" : {
  69801. "description_data" : [ {
  69802. "lang" : "en",
  69803. "value" : "A heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability."
  69804. } ]
  69805. }
  69806. },
  69807. "configurations" : {
  69808. "CVE_data_version" : "4.0",
  69809. "nodes" : [ {
  69810. "operator" : "OR",
  69811. "children" : [ ],
  69812. "cpe_match" : [ {
  69813. "vulnerable" : true,
  69814. "cpe23Uri" : "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
  69815. "versionEndExcluding" : "4.2.0",
  69816. "cpe_name" : [ ]
  69817. } ]
  69818. }, {
  69819. "operator" : "OR",
  69820. "children" : [ ],
  69821. "cpe_match" : [ {
  69822. "vulnerable" : true,
  69823. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  69824. "cpe_name" : [ ]
  69825. }, {
  69826. "vulnerable" : true,
  69827. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  69828. "cpe_name" : [ ]
  69829. } ]
  69830. } ]
  69831. },
  69832. "impact" : {
  69833. "baseMetricV3" : {
  69834. "cvssV3" : {
  69835. "version" : "3.1",
  69836. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  69837. "attackVector" : "LOCAL",
  69838. "attackComplexity" : "LOW",
  69839. "privilegesRequired" : "NONE",
  69840. "userInteraction" : "REQUIRED",
  69841. "scope" : "UNCHANGED",
  69842. "confidentialityImpact" : "HIGH",
  69843. "integrityImpact" : "HIGH",
  69844. "availabilityImpact" : "HIGH",
  69845. "baseScore" : 7.8,
  69846. "baseSeverity" : "HIGH"
  69847. },
  69848. "exploitabilityScore" : 1.8,
  69849. "impactScore" : 5.9
  69850. },
  69851. "baseMetricV2" : {
  69852. "cvssV2" : {
  69853. "version" : "2.0",
  69854. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  69855. "accessVector" : "NETWORK",
  69856. "accessComplexity" : "MEDIUM",
  69857. "authentication" : "NONE",
  69858. "confidentialityImpact" : "PARTIAL",
  69859. "integrityImpact" : "PARTIAL",
  69860. "availabilityImpact" : "PARTIAL",
  69861. "baseScore" : 6.8
  69862. },
  69863. "severity" : "MEDIUM",
  69864. "exploitabilityScore" : 8.6,
  69865. "impactScore" : 6.4,
  69866. "acInsufInfo" : false,
  69867. "obtainAllPrivilege" : false,
  69868. "obtainUserPrivilege" : false,
  69869. "obtainOtherPrivilege" : false,
  69870. "userInteractionRequired" : true
  69871. }
  69872. },
  69873. "publishedDate" : "2021-03-09T20:15Z",
  69874. "lastModifiedDate" : "2021-05-05T15:04Z"
  69875. }, {
  69876. "cve" : {
  69877. "data_type" : "CVE",
  69878. "data_format" : "MITRE",
  69879. "data_version" : "4.0",
  69880. "CVE_data_meta" : {
  69881. "ID" : "CVE-2021-21295",
  69882. "ASSIGNER" : "security-advisories@github.com"
  69883. },
  69884. "problemtype" : {
  69885. "problemtype_data" : [ {
  69886. "description" : [ {
  69887. "lang" : "en",
  69888. "value" : "CWE-444"
  69889. } ]
  69890. } ]
  69891. },
  69892. "references" : {
  69893. "reference_data" : [ {
  69894. "url" : "https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj",
  69895. "name" : "https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj",
  69896. "refsource" : "CONFIRM",
  69897. "tags" : [ "Third Party Advisory" ]
  69898. }, {
  69899. "url" : "https://github.com/Netflix/zuul/pull/980",
  69900. "name" : "https://github.com/Netflix/zuul/pull/980",
  69901. "refsource" : "MISC",
  69902. "tags" : [ "Patch", "Third Party Advisory" ]
  69903. }, {
  69904. "url" : "https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4",
  69905. "name" : "https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4",
  69906. "refsource" : "MISC",
  69907. "tags" : [ "Patch", "Vendor Advisory" ]
  69908. }, {
  69909. "url" : "https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E",
  69910. "name" : "[ranger-dev] 20210317 [jira] [Created] (RANGER-3209) Upgrade netty to 4.1.60+ due to CVE-2021-21290 and CVE-2021-21295",
  69911. "refsource" : "MLIST",
  69912. "tags" : [ "Mailing List", "Third Party Advisory" ]
  69913. }, {
  69914. "url" : "https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E",
  69915. "name" : "[ranger-dev] 20210317 [jira] [Assigned] (RANGER-3209) Upgrade netty to 4.1.60+ due to CVE-2021-21290 and CVE-2021-21295",
  69916. "refsource" : "MLIST",
  69917. "tags" : [ "Mailing List", "Third Party Advisory" ]
  69918. }, {
  69919. "url" : "https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3Ccommits.servicecomb.apache.org%3E",
  69920. "name" : "https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3Ccommits.servicecomb.apache.org%3E",
  69921. "refsource" : "MISC",
  69922. "tags" : [ "Mailing List", "Third Party Advisory" ]
  69923. }, {
  69924. "url" : "https://lists.apache.org/thread.html/rb523bb6c60196c5f58514b86a8585c2069a4852039b45de3818b29d2@%3Ccommits.servicecomb.apache.org%3E",
  69925. "name" : "https://lists.apache.org/thread.html/rb523bb6c60196c5f58514b86a8585c2069a4852039b45de3818b29d2@%3Ccommits.servicecomb.apache.org%3E",
  69926. "refsource" : "MISC",
  69927. "tags" : [ "Mailing List", "Third Party Advisory" ]
  69928. }, {
  69929. "url" : "https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3Ccommits.servicecomb.apache.org%3E",
  69930. "name" : "https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3Ccommits.servicecomb.apache.org%3E",
  69931. "refsource" : "MISC",
  69932. "tags" : [ "Mailing List", "Third Party Advisory" ]
  69933. }, {
  69934. "url" : "https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3Ccommits.servicecomb.apache.org%3E",
  69935. "name" : "https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3Ccommits.servicecomb.apache.org%3E",
  69936. "refsource" : "MISC",
  69937. "tags" : [ "Mailing List", "Third Party Advisory" ]
  69938. }, {
  69939. "url" : "https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E",
  69940. "name" : "[pulsar-commits] 20210329 [GitHub] [pulsar] yaswanthnadella opened a new issue #10071: CVE-2021-21295 & CVE-2021-21290",
  69941. "refsource" : "MLIST",
  69942. "tags" : [ ]
  69943. }, {
  69944. "url" : "https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E",
  69945. "name" : "[pulsar-commits] 20210329 [GitHub] [pulsar] aahmed-se opened a new pull request #10073: Upgrade Netty version to 4.1.60.final",
  69946. "refsource" : "MLIST",
  69947. "tags" : [ ]
  69948. }, {
  69949. "url" : "https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E",
  69950. "name" : "[pulsar-commits] 20210329 [GitHub] [pulsar] merlimat closed issue #10071: CVE-2021-21295 & CVE-2021-21290",
  69951. "refsource" : "MLIST",
  69952. "tags" : [ ]
  69953. }, {
  69954. "url" : "https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E",
  69955. "name" : "[bookkeeper-issues] 20210330 [GitHub] [bookkeeper] eolivelli opened a new issue #2669: Update Netty to 4.1.60.final",
  69956. "refsource" : "MLIST",
  69957. "tags" : [ ]
  69958. }, {
  69959. "url" : "https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E",
  69960. "name" : "[zookeeper-issues] 20210330 [jira] [Updated] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  69961. "refsource" : "MLIST",
  69962. "tags" : [ ]
  69963. }, {
  69964. "url" : "https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E",
  69965. "name" : "[zookeeper-issues] 20210330 [jira] [Created] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  69966. "refsource" : "MLIST",
  69967. "tags" : [ ]
  69968. }, {
  69969. "url" : "https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E",
  69970. "name" : "[kafka-jira] 20210330 [jira] [Created] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
  69971. "refsource" : "MLIST",
  69972. "tags" : [ ]
  69973. }, {
  69974. "url" : "https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E",
  69975. "name" : "[zookeeper-dev] 20210330 [jira] [Created] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  69976. "refsource" : "MLIST",
  69977. "tags" : [ ]
  69978. }, {
  69979. "url" : "https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E",
  69980. "name" : "[kafka-dev] 20210330 [jira] [Created] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
  69981. "refsource" : "MLIST",
  69982. "tags" : [ ]
  69983. }, {
  69984. "url" : "https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E",
  69985. "name" : "[kafka-jira] 20210330 [jira] [Updated] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
  69986. "refsource" : "MLIST",
  69987. "tags" : [ ]
  69988. }, {
  69989. "url" : "https://lists.apache.org/thread.html/r3ff9e735ca33612d900607dc139ebd38a64cadc6bce292e53eb86d7f@%3Cissues.zookeeper.apache.org%3E",
  69990. "name" : "[zookeeper-issues] 20210331 [jira] [Commented] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  69991. "refsource" : "MLIST",
  69992. "tags" : [ ]
  69993. }, {
  69994. "url" : "https://lists.apache.org/thread.html/r1bca0b81193b74a451fc6d687ab58ef3a1f5ec40f6c61561d8dd9509@%3Cissues.zookeeper.apache.org%3E",
  69995. "name" : "[zookeeper-issues] 20210331 [jira] [Assigned] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  69996. "refsource" : "MLIST",
  69997. "tags" : [ ]
  69998. }, {
  69999. "url" : "https://lists.apache.org/thread.html/r312ce5bd3c6bf08c138349b507b6f1c25fe9cf40b6f2b0014c9d12b1@%3Cnotifications.zookeeper.apache.org%3E",
  70000. "name" : "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] ayushmantri opened a new pull request #1669: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70001. "refsource" : "MLIST",
  70002. "tags" : [ ]
  70003. }, {
  70004. "url" : "https://lists.apache.org/thread.html/r9051e4f484a970b5566dc1870ecd9c1eb435214e2652cf3ea4d0c0cc@%3Cjira.kafka.apache.org%3E",
  70005. "name" : "[kafka-jira] 20210331 [GitHub] [kafka] dongjinleekr opened a new pull request #10448: KAFKA-12583: Upgrade of netty-codec due to CVE-2021-21295",
  70006. "refsource" : "MLIST",
  70007. "tags" : [ ]
  70008. }, {
  70009. "url" : "https://lists.apache.org/thread.html/rcfc535afd413d9934d6ee509dce234dac41fa3747a7555befb17447e@%3Cissues.zookeeper.apache.org%3E",
  70010. "name" : "[zookeeper-issues] 20210331 [jira] [Updated] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70011. "refsource" : "MLIST",
  70012. "tags" : [ ]
  70013. }, {
  70014. "url" : "https://lists.apache.org/thread.html/r3c293431c781696681abbfe1c573c2d9dcdae6fd3ff330ea22f0433f@%3Cjira.kafka.apache.org%3E",
  70015. "name" : "[kafka-jira] 20210331 [GitHub] [kafka] dongjinleekr commented on pull request #10448: KAFKA-12583: Upgrade of netty-codec due to CVE-2021-21295",
  70016. "refsource" : "MLIST",
  70017. "tags" : [ ]
  70018. }, {
  70019. "url" : "https://lists.apache.org/thread.html/rbadcbcb50195f00bbd196403865ced521ca70787999583c07be38d0e@%3Cnotifications.zookeeper.apache.org%3E",
  70020. "name" : "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] arshadmohammad commented on pull request #1669: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70021. "refsource" : "MLIST",
  70022. "tags" : [ ]
  70023. }, {
  70024. "url" : "https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E",
  70025. "name" : "https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E",
  70026. "refsource" : "MISC",
  70027. "tags" : [ ]
  70028. }, {
  70029. "url" : "https://lists.apache.org/thread.html/r67e6a636cbc1958383a1cd72b7fd0cd7493360b1dd0e6c12f5761798@%3Cnotifications.zookeeper.apache.org%3E",
  70030. "name" : "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] eolivelli commented on pull request #1669: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70031. "refsource" : "MLIST",
  70032. "tags" : [ ]
  70033. }, {
  70034. "url" : "https://lists.apache.org/thread.html/r6a29316d758db628a1df49ca219d64caf493999b52cc77847bfba675@%3Cnotifications.zookeeper.apache.org%3E",
  70035. "name" : "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] ayushmantri opened a new pull request #1670: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70036. "refsource" : "MLIST",
  70037. "tags" : [ ]
  70038. }, {
  70039. "url" : "https://lists.apache.org/thread.html/r8db1d7b3b9acc9e8d2776395e280eb9615dd7790e1da8c57039963de@%3Cnotifications.zookeeper.apache.org%3E",
  70040. "name" : "https://lists.apache.org/thread.html/r8db1d7b3b9acc9e8d2776395e280eb9615dd7790e1da8c57039963de@%3Cnotifications.zookeeper.apache.org%3E",
  70041. "refsource" : "MISC",
  70042. "tags" : [ ]
  70043. }, {
  70044. "url" : "https://lists.apache.org/thread.html/r5470456cf1409a99893ae9dd57439799f6dc1a60fda90e11570f66fe@%3Cnotifications.zookeeper.apache.org%3E",
  70045. "name" : "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] arshadmohammad commented on pull request #1670: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70046. "refsource" : "MLIST",
  70047. "tags" : [ ]
  70048. }, {
  70049. "url" : "https://lists.apache.org/thread.html/r837bbcbf12e335e83ab448b1bd2c1ad7e86efdc14034b23811422e6a@%3Ccommits.zookeeper.apache.org%3E",
  70050. "name" : "[zookeeper-commits] 20210331 [zookeeper] branch master updated: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70051. "refsource" : "MLIST",
  70052. "tags" : [ ]
  70053. }, {
  70054. "url" : "https://lists.apache.org/thread.html/r22adb45fe902aeafcd0a1c4db13984224a667676c323c66db3af38a1@%3Ccommits.zookeeper.apache.org%3E",
  70055. "name" : "[zookeeper-commits] 20210331 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70056. "refsource" : "MLIST",
  70057. "tags" : [ ]
  70058. }, {
  70059. "url" : "https://lists.apache.org/thread.html/rbed09768f496244a2e138dbbe6d2847ddf796c9c8ef9e50f2e3e30d9@%3Cnotifications.zookeeper.apache.org%3E",
  70060. "name" : "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] arshadmohammad closed pull request #1670: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70061. "refsource" : "MLIST",
  70062. "tags" : [ ]
  70063. }, {
  70064. "url" : "https://lists.apache.org/thread.html/r6a122c25e352eb134d01e7f4fc4d345a491c5ee9453fef6fc754d15b@%3Ccommits.zookeeper.apache.org%3E",
  70065. "name" : "[zookeeper-commits] 20210331 [zookeeper] branch branch-3.7 updated: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70066. "refsource" : "MLIST",
  70067. "tags" : [ ]
  70068. }, {
  70069. "url" : "https://lists.apache.org/thread.html/r5232e33a1f3b310a3e083423f736f3925ebdb150844d60ac582809f8@%3Cnotifications.zookeeper.apache.org%3E",
  70070. "name" : "[zookeeper-notifications] 20210331 [GitHub] [zookeeper] asfgit closed pull request #1669: ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70071. "refsource" : "MLIST",
  70072. "tags" : [ ]
  70073. }, {
  70074. "url" : "https://lists.apache.org/thread.html/r70cebada51bc6d49138272437d8a28fe971d0197334ef906b575044c@%3Ccommits.zookeeper.apache.org%3E",
  70075. "name" : "[zookeeper-commits] 20210331 [zookeeper] branch branch-3.5 updated: ZOOKEEPER-4272 ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70076. "refsource" : "MLIST",
  70077. "tags" : [ ]
  70078. }, {
  70079. "url" : "https://lists.apache.org/thread.html/re6207ebe2ca4d44f2a6deee695ad6f27fd29d78980f1d46ed1574f91@%3Cissues.zookeeper.apache.org%3E",
  70080. "name" : "[zookeeper-issues] 20210331 [jira] [Resolved] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70081. "refsource" : "MLIST",
  70082. "tags" : [ ]
  70083. }, {
  70084. "url" : "https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3Ccommits.servicecomb.apache.org%3E",
  70085. "name" : "https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3Ccommits.servicecomb.apache.org%3E",
  70086. "refsource" : "MISC",
  70087. "tags" : [ ]
  70088. }, {
  70089. "url" : "https://lists.apache.org/thread.html/rdc096e13ac4501ea2e2b03a197682a313b85d3d3ec89d5ae5551b384@%3Cissues.zookeeper.apache.org%3E",
  70090. "name" : "[zookeeper-issues] 20210401 [jira] [Commented] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70091. "refsource" : "MLIST",
  70092. "tags" : [ ]
  70093. }, {
  70094. "url" : "https://lists.apache.org/thread.html/r5fc5786cdd640b1b0a3c643237ce0011f0a08a296b11c0e2c669022c@%3Cdev.kafka.apache.org%3E",
  70095. "name" : "[kafka-dev] 20210401 [jira] [Resolved] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
  70096. "refsource" : "MLIST",
  70097. "tags" : [ ]
  70098. }, {
  70099. "url" : "https://lists.apache.org/thread.html/r96ce18044880c33634c4b3fcecc57b8b90673c9364d63eba00385523@%3Cjira.kafka.apache.org%3E",
  70100. "name" : "[kafka-jira] 20210401 [jira] [Commented] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
  70101. "refsource" : "MLIST",
  70102. "tags" : [ ]
  70103. }, {
  70104. "url" : "https://lists.apache.org/thread.html/rc165e36ca7cb5417aec3f21bbc4ec00fb38ecebdd96a82cfab9bd56f@%3Cjira.kafka.apache.org%3E",
  70105. "name" : "[kafka-jira] 20210401 [jira] [Resolved] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
  70106. "refsource" : "MLIST",
  70107. "tags" : [ ]
  70108. }, {
  70109. "url" : "https://lists.apache.org/thread.html/rc73b8dd01b1be276d06bdf07883ecd93fe1a01f139a99ef30ba4308c@%3Ccommits.servicecomb.apache.org%3E",
  70110. "name" : "https://lists.apache.org/thread.html/rc73b8dd01b1be276d06bdf07883ecd93fe1a01f139a99ef30ba4308c@%3Ccommits.servicecomb.apache.org%3E",
  70111. "refsource" : "MISC",
  70112. "tags" : [ ]
  70113. }, {
  70114. "url" : "https://lists.apache.org/thread.html/rd25c88aad0e76240dd09f0eb34bdab924933946429e068a167adcb73@%3Ccommits.servicecomb.apache.org%3E",
  70115. "name" : "https://lists.apache.org/thread.html/rd25c88aad0e76240dd09f0eb34bdab924933946429e068a167adcb73@%3Ccommits.servicecomb.apache.org%3E",
  70116. "refsource" : "MISC",
  70117. "tags" : [ ]
  70118. }, {
  70119. "url" : "https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3Cissues.zookeeper.apache.org%3E",
  70120. "name" : "[zookeeper-issues] 20210402 [jira] [Commented] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70121. "refsource" : "MLIST",
  70122. "tags" : [ ]
  70123. }, {
  70124. "url" : "https://lists.apache.org/thread.html/r27b7e5a588ec826b15f38c40be500c50073400019ce7b8adfd07fece@%3Cissues.hbase.apache.org%3E",
  70125. "name" : "[hbase-issues] 20210402 [jira] [Updated] (HBASE-25728) [hbase-thirdparty] Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70126. "refsource" : "MLIST",
  70127. "tags" : [ ]
  70128. }, {
  70129. "url" : "https://lists.apache.org/thread.html/rb95d42ce220ed4a4683aa17833b5006d657bc4254bc5cb03cd5e6bfb@%3Cissues.hbase.apache.org%3E",
  70130. "name" : "[hbase-issues] 20210402 [GitHub] [hbase-thirdparty] HorizonNet commented on pull request #48: HBASE-25728 [hbase-thirdparty] Upgrade Netty library to >= 4.1.60 due to security vulnerability CVE-2021-21295",
  70131. "refsource" : "MLIST",
  70132. "tags" : [ ]
  70133. }, {
  70134. "url" : "https://lists.apache.org/thread.html/r393a339ab0b63ef9e6502253eeab26e7643b3e69738d5948b2b1d064@%3Cissues.hbase.apache.org%3E",
  70135. "name" : "[hbase-issues] 20210402 [jira] [Assigned] (HBASE-25728) [hbase-thirdparty] Upgrade Netty library to >= 4.1.60 due to security vulnerability CVE-2021-21295",
  70136. "refsource" : "MLIST",
  70137. "tags" : [ ]
  70138. }, {
  70139. "url" : "https://lists.apache.org/thread.html/rcf3752209a8b04996373bf57fdc808b3bfaa2be8702698a0323641f8@%3Ccommits.hbase.apache.org%3E",
  70140. "name" : "[hbase-commits] 20210402 [hbase-thirdparty] branch master updated: HBASE-25728 [hbase-thirdparty] Upgrade Netty library to >= 4.1.60 due to security vulnerability CVE-2021-21295 (#48)",
  70141. "refsource" : "MLIST",
  70142. "tags" : [ ]
  70143. }, {
  70144. "url" : "https://lists.apache.org/thread.html/r040a5e4d9cca2f98354b58a70b27099672276f66995c4e2e39545d0b@%3Cissues.hbase.apache.org%3E",
  70145. "name" : "[hbase-issues] 20210402 [GitHub] [hbase-thirdparty] apurtell opened a new pull request #48: HBASE-25728 [hbase-thirdparty] Upgrade Netty library to >= 4.1.60 due to security vulnerability CVE-2021-21295",
  70146. "refsource" : "MLIST",
  70147. "tags" : [ ]
  70148. }, {
  70149. "url" : "https://lists.apache.org/thread.html/ra83096bcbfe6e1f4d54449f8a013117a0536404e9d307ab4a0d34f81@%3Cissues.hbase.apache.org%3E",
  70150. "name" : "[hbase-issues] 20210402 [jira] [Updated] (HBASE-25728) [hbase-thirdparty] Upgrade Netty library to >= 4.1.60 due to security vulnerability CVE-2021-21295",
  70151. "refsource" : "MLIST",
  70152. "tags" : [ ]
  70153. }, {
  70154. "url" : "https://lists.apache.org/thread.html/r86cd38a825ab2344f3e6cad570528852f29a4ffdf56ab67d75c36edf@%3Cissues.hbase.apache.org%3E",
  70155. "name" : "[hbase-issues] 20210402 [GitHub] [hbase-thirdparty] apurtell commented on pull request #48: HBASE-25728 [hbase-thirdparty] Upgrade Netty library to >= 4.1.60 due to security vulnerability CVE-2021-21295",
  70156. "refsource" : "MLIST",
  70157. "tags" : [ ]
  70158. }, {
  70159. "url" : "https://lists.apache.org/thread.html/r6aee7e3566cb3e51eeed2fd8786704d91f80a7581e00a787ba9f37f6@%3Cissues.hbase.apache.org%3E",
  70160. "name" : "[hbase-issues] 20210402 [GitHub] [hbase-thirdparty] Apache-HBase commented on pull request #48: HBASE-25728 [hbase-thirdparty] Upgrade Netty library to >= 4.1.60 due to security vulnerability CVE-2021-21295",
  70161. "refsource" : "MLIST",
  70162. "tags" : [ ]
  70163. }, {
  70164. "url" : "https://lists.apache.org/thread.html/r22b2f34447d71c9a0ad9079b7860323d5584fb9b40eb42668c21eaf1@%3Cissues.hbase.apache.org%3E",
  70165. "name" : "[hbase-issues] 20210402 [GitHub] [hbase-thirdparty] apurtell merged pull request #48: HBASE-25728 [hbase-thirdparty] Upgrade Netty library to >= 4.1.60 due to security vulnerability CVE-2021-21295",
  70166. "refsource" : "MLIST",
  70167. "tags" : [ ]
  70168. }, {
  70169. "url" : "https://lists.apache.org/thread.html/r905b92099998291956eebf4f1c5d95f5a0cbcece2946cc46d32274fd@%3Cdev.hbase.apache.org%3E",
  70170. "name" : "[hbase-dev] 20210402 [jira] [Created] (HBASE-25728) [hbase-thirdparty] ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70171. "refsource" : "MLIST",
  70172. "tags" : [ ]
  70173. }, {
  70174. "url" : "https://lists.apache.org/thread.html/r15f66ada9a5faf4bac69d9e7c4521cedfefa62df9509881603791969@%3Cjira.kafka.apache.org%3E",
  70175. "name" : "[kafka-jira] 20210402 [jira] [Assigned] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295",
  70176. "refsource" : "MLIST",
  70177. "tags" : [ ]
  70178. }, {
  70179. "url" : "https://lists.apache.org/thread.html/r268850f26639ebe249356ed6d8edb54ee8943be6f200f770784fb190@%3Cissues.hbase.apache.org%3E",
  70180. "name" : "[hbase-issues] 20210402 [jira] [Created] (HBASE-25728) [hbase-thirdparty] ZOOKEEPER-4272: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295",
  70181. "refsource" : "MLIST",
  70182. "tags" : [ ]
  70183. }, {
  70184. "url" : "https://www.debian.org/security/2021/dsa-4885",
  70185. "name" : "DSA-4885",
  70186. "refsource" : "DEBIAN",
  70187. "tags" : [ ]
  70188. }, {
  70189. "url" : "https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E",
  70190. "name" : "[flink-issues] 20210424 [jira] [Created] (FLINK-22441) In Flink v1.11.3 contains netty(version:3.10.6) netty(version:4.1.60) . There are many vulnerabilities, like CVE-2021-21409 etc. please confirm these version and fix. thx",
  70191. "refsource" : "MLIST",
  70192. "tags" : [ ]
  70193. }, {
  70194. "url" : "https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E",
  70195. "name" : "[flink-dev] 20210424 [jira] [Created] (FLINK-22441) In Flink v1.11.3 contains netty(version:3.10.6) netty(version:4.1.60) . There are many vulnerabilities, like CVE-2021-21409 etc. please confirm these version and fix. thx",
  70196. "refsource" : "MLIST",
  70197. "tags" : [ ]
  70198. }, {
  70199. "url" : "https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E",
  70200. "name" : "[flink-issues] 20210426 [jira] [Updated] (FLINK-22441) In Flink v1.11.3 contains netty(version:3.10.6) netty(version:4.1.60) . There are many vulnerabilities, like CVE-2021-21409 etc. please confirm these version and fix. thx",
  70201. "refsource" : "MLIST",
  70202. "tags" : [ ]
  70203. }, {
  70204. "url" : "https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E",
  70205. "name" : "[flink-issues] 20210426 [jira] [Commented] (FLINK-22441) In Flink v1.11.3 contains netty(version:3.10.6) netty(version:4.1.60) . There are many vulnerabilities, like CVE-2021-21409 etc. please confirm these version and fix. thx",
  70206. "refsource" : "MLIST",
  70207. "tags" : [ ]
  70208. }, {
  70209. "url" : "https://lists.apache.org/thread.html/rcfc154eb2de23d2dc08a56100341161e1a40a8ea86c693735437e8f2@%3Ccommits.servicecomb.apache.org%3E",
  70210. "name" : "https://lists.apache.org/thread.html/rcfc154eb2de23d2dc08a56100341161e1a40a8ea86c693735437e8f2@%3Ccommits.servicecomb.apache.org%3E",
  70211. "refsource" : "MISC",
  70212. "tags" : [ ]
  70213. }, {
  70214. "url" : "https://lists.apache.org/thread.html/ra96c74c37ed7252f78392e1ad16442bd16ae72a4d6c8db50dd55c88b@%3Ccommits.servicecomb.apache.org%3E",
  70215. "name" : "https://lists.apache.org/thread.html/ra96c74c37ed7252f78392e1ad16442bd16ae72a4d6c8db50dd55c88b@%3Ccommits.servicecomb.apache.org%3E",
  70216. "refsource" : "MISC",
  70217. "tags" : [ ]
  70218. } ]
  70219. },
  70220. "description" : {
  70221. "description_data" : [ {
  70222. "lang" : "en",
  70223. "value" : "Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerability that enables request smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. For an example attack refer to the linked GitHub Advisory. Users are only affected if all of this is true: `HTTP2MultiplexCodec` or `Http2FrameCodec` is used, `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects, and these HTTP/1.1 objects are forwarded to another remote peer. This has been patched in 4.1.60.Final As a workaround, the user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`."
  70224. } ]
  70225. }
  70226. },
  70227. "configurations" : {
  70228. "CVE_data_version" : "4.0",
  70229. "nodes" : [ {
  70230. "operator" : "OR",
  70231. "children" : [ ],
  70232. "cpe_match" : [ {
  70233. "vulnerable" : true,
  70234. "cpe23Uri" : "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
  70235. "versionEndExcluding" : "4.1.60",
  70236. "cpe_name" : [ ]
  70237. } ]
  70238. } ]
  70239. },
  70240. "impact" : {
  70241. "baseMetricV3" : {
  70242. "cvssV3" : {
  70243. "version" : "3.1",
  70244. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
  70245. "attackVector" : "NETWORK",
  70246. "attackComplexity" : "HIGH",
  70247. "privilegesRequired" : "NONE",
  70248. "userInteraction" : "NONE",
  70249. "scope" : "UNCHANGED",
  70250. "confidentialityImpact" : "NONE",
  70251. "integrityImpact" : "HIGH",
  70252. "availabilityImpact" : "NONE",
  70253. "baseScore" : 5.9,
  70254. "baseSeverity" : "MEDIUM"
  70255. },
  70256. "exploitabilityScore" : 2.2,
  70257. "impactScore" : 3.6
  70258. },
  70259. "baseMetricV2" : {
  70260. "cvssV2" : {
  70261. "version" : "2.0",
  70262. "vectorString" : "AV:N/AC:H/Au:N/C:N/I:P/A:N",
  70263. "accessVector" : "NETWORK",
  70264. "accessComplexity" : "HIGH",
  70265. "authentication" : "NONE",
  70266. "confidentialityImpact" : "NONE",
  70267. "integrityImpact" : "PARTIAL",
  70268. "availabilityImpact" : "NONE",
  70269. "baseScore" : 2.6
  70270. },
  70271. "severity" : "LOW",
  70272. "exploitabilityScore" : 4.9,
  70273. "impactScore" : 2.9,
  70274. "acInsufInfo" : false,
  70275. "obtainAllPrivilege" : false,
  70276. "obtainUserPrivilege" : false,
  70277. "obtainOtherPrivilege" : false,
  70278. "userInteractionRequired" : false
  70279. }
  70280. },
  70281. "publishedDate" : "2021-03-09T19:15Z",
  70282. "lastModifiedDate" : "2021-05-07T05:15Z"
  70283. }, {
  70284. "cve" : {
  70285. "data_type" : "CVE",
  70286. "data_format" : "MITRE",
  70287. "data_version" : "4.0",
  70288. "CVE_data_meta" : {
  70289. "ID" : "CVE-2021-20263",
  70290. "ASSIGNER" : "secalert@redhat.com"
  70291. },
  70292. "problemtype" : {
  70293. "problemtype_data" : [ {
  70294. "description" : [ {
  70295. "lang" : "en",
  70296. "value" : "CWE-281"
  70297. } ]
  70298. } ]
  70299. },
  70300. "references" : {
  70301. "reference_data" : [ {
  70302. "url" : "https://www.openwall.com/lists/oss-security/2021/03/08/1",
  70303. "name" : "https://www.openwall.com/lists/oss-security/2021/03/08/1",
  70304. "refsource" : "MISC",
  70305. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  70306. }, {
  70307. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1933668",
  70308. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1933668",
  70309. "refsource" : "MISC",
  70310. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  70311. }, {
  70312. "url" : "https://security.netapp.com/advisory/ntap-20210507-0002/",
  70313. "name" : "https://security.netapp.com/advisory/ntap-20210507-0002/",
  70314. "refsource" : "CONFIRM",
  70315. "tags" : [ ]
  70316. } ]
  70317. },
  70318. "description" : {
  70319. "description_data" : [ {
  70320. "lang" : "en",
  70321. "value" : "A flaw was found in the virtio-fs shared file system daemon (virtiofsd) of QEMU. The new 'xattrmap' option may cause the 'security.capability' xattr in the guest to not drop on file write, potentially leading to a modified, privileged executable in the guest. In rare circumstances, this flaw could be used by a malicious user to elevate their privileges within the guest."
  70322. } ]
  70323. }
  70324. },
  70325. "configurations" : {
  70326. "CVE_data_version" : "4.0",
  70327. "nodes" : [ {
  70328. "operator" : "OR",
  70329. "children" : [ ],
  70330. "cpe_match" : [ {
  70331. "vulnerable" : true,
  70332. "cpe23Uri" : "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
  70333. "versionStartIncluding" : "5.0.0",
  70334. "versionEndExcluding" : "5.2.50",
  70335. "cpe_name" : [ ]
  70336. } ]
  70337. } ]
  70338. },
  70339. "impact" : {
  70340. "baseMetricV3" : {
  70341. "cvssV3" : {
  70342. "version" : "3.1",
  70343. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
  70344. "attackVector" : "LOCAL",
  70345. "attackComplexity" : "LOW",
  70346. "privilegesRequired" : "LOW",
  70347. "userInteraction" : "NONE",
  70348. "scope" : "UNCHANGED",
  70349. "confidentialityImpact" : "NONE",
  70350. "integrityImpact" : "LOW",
  70351. "availabilityImpact" : "NONE",
  70352. "baseScore" : 3.3,
  70353. "baseSeverity" : "LOW"
  70354. },
  70355. "exploitabilityScore" : 1.8,
  70356. "impactScore" : 1.4
  70357. },
  70358. "baseMetricV2" : {
  70359. "cvssV2" : {
  70360. "version" : "2.0",
  70361. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:P/A:N",
  70362. "accessVector" : "LOCAL",
  70363. "accessComplexity" : "LOW",
  70364. "authentication" : "NONE",
  70365. "confidentialityImpact" : "NONE",
  70366. "integrityImpact" : "PARTIAL",
  70367. "availabilityImpact" : "NONE",
  70368. "baseScore" : 2.1
  70369. },
  70370. "severity" : "LOW",
  70371. "exploitabilityScore" : 3.9,
  70372. "impactScore" : 2.9,
  70373. "acInsufInfo" : false,
  70374. "obtainAllPrivilege" : false,
  70375. "obtainUserPrivilege" : false,
  70376. "obtainOtherPrivilege" : false,
  70377. "userInteractionRequired" : false
  70378. }
  70379. },
  70380. "publishedDate" : "2021-03-09T18:15Z",
  70381. "lastModifiedDate" : "2021-05-07T05:15Z"
  70382. }, {
  70383. "cve" : {
  70384. "data_type" : "CVE",
  70385. "data_format" : "MITRE",
  70386. "data_version" : "4.0",
  70387. "CVE_data_meta" : {
  70388. "ID" : "CVE-2021-22134",
  70389. "ASSIGNER" : "security@elastic.co"
  70390. },
  70391. "problemtype" : {
  70392. "problemtype_data" : [ {
  70393. "description" : [ {
  70394. "lang" : "en",
  70395. "value" : "CWE-200"
  70396. } ]
  70397. } ]
  70398. },
  70399. "references" : {
  70400. "reference_data" : [ {
  70401. "url" : "https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835",
  70402. "name" : "https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835",
  70403. "refsource" : "MISC",
  70404. "tags" : [ "Release Notes", "Vendor Advisory" ]
  70405. }, {
  70406. "url" : "https://security.netapp.com/advisory/ntap-20210430-0006/",
  70407. "name" : "https://security.netapp.com/advisory/ntap-20210430-0006/",
  70408. "refsource" : "CONFIRM",
  70409. "tags" : [ "Third Party Advisory" ]
  70410. } ]
  70411. },
  70412. "description" : {
  70413. "description_data" : [ {
  70414. "lang" : "en",
  70415. "value" : "A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view."
  70416. } ]
  70417. }
  70418. },
  70419. "configurations" : {
  70420. "CVE_data_version" : "4.0",
  70421. "nodes" : [ {
  70422. "operator" : "OR",
  70423. "children" : [ ],
  70424. "cpe_match" : [ {
  70425. "vulnerable" : true,
  70426. "cpe23Uri" : "cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*",
  70427. "versionStartIncluding" : "7.6.0",
  70428. "versionEndIncluding" : "7.11.0",
  70429. "cpe_name" : [ ]
  70430. } ]
  70431. } ]
  70432. },
  70433. "impact" : {
  70434. "baseMetricV3" : {
  70435. "cvssV3" : {
  70436. "version" : "3.1",
  70437. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
  70438. "attackVector" : "NETWORK",
  70439. "attackComplexity" : "LOW",
  70440. "privilegesRequired" : "LOW",
  70441. "userInteraction" : "NONE",
  70442. "scope" : "UNCHANGED",
  70443. "confidentialityImpact" : "LOW",
  70444. "integrityImpact" : "NONE",
  70445. "availabilityImpact" : "NONE",
  70446. "baseScore" : 4.3,
  70447. "baseSeverity" : "MEDIUM"
  70448. },
  70449. "exploitabilityScore" : 2.8,
  70450. "impactScore" : 1.4
  70451. },
  70452. "baseMetricV2" : {
  70453. "cvssV2" : {
  70454. "version" : "2.0",
  70455. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N",
  70456. "accessVector" : "NETWORK",
  70457. "accessComplexity" : "LOW",
  70458. "authentication" : "SINGLE",
  70459. "confidentialityImpact" : "PARTIAL",
  70460. "integrityImpact" : "NONE",
  70461. "availabilityImpact" : "NONE",
  70462. "baseScore" : 4.0
  70463. },
  70464. "severity" : "MEDIUM",
  70465. "exploitabilityScore" : 8.0,
  70466. "impactScore" : 2.9,
  70467. "acInsufInfo" : false,
  70468. "obtainAllPrivilege" : false,
  70469. "obtainUserPrivilege" : false,
  70470. "obtainOtherPrivilege" : false,
  70471. "userInteractionRequired" : false
  70472. }
  70473. },
  70474. "publishedDate" : "2021-03-08T21:15Z",
  70475. "lastModifiedDate" : "2021-05-05T13:28Z"
  70476. }, {
  70477. "cve" : {
  70478. "data_type" : "CVE",
  70479. "data_format" : "MITRE",
  70480. "data_version" : "4.0",
  70481. "CVE_data_meta" : {
  70482. "ID" : "CVE-2020-35636",
  70483. "ASSIGNER" : "talos-cna@cisco.com"
  70484. },
  70485. "problemtype" : {
  70486. "problemtype_data" : [ {
  70487. "description" : [ {
  70488. "lang" : "en",
  70489. "value" : "CWE-125"
  70490. } ]
  70491. } ]
  70492. },
  70493. "references" : {
  70494. "reference_data" : [ {
  70495. "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225",
  70496. "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225",
  70497. "refsource" : "MISC",
  70498. "tags" : [ "Third Party Advisory" ]
  70499. }, {
  70500. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/",
  70501. "name" : "FEDORA-2021-0d42c7cb33",
  70502. "refsource" : "FEDORA",
  70503. "tags" : [ "Mailing List", "Third Party Advisory" ]
  70504. }, {
  70505. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB5SF5OJR2DSV7CC6U7FVW5VJSJO5EKV/",
  70506. "name" : "FEDORA-2021-9de542ab4c",
  70507. "refsource" : "FEDORA",
  70508. "tags" : [ "Mailing List", "Third Party Advisory" ]
  70509. }, {
  70510. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00002.html",
  70511. "name" : "[debian-lts-announce] 20210505 [SECURITY] [DLA 2649-1] cgal security update",
  70512. "refsource" : "MLIST",
  70513. "tags" : [ ]
  70514. } ]
  70515. },
  70516. "description" : {
  70517. "description_data" : [ {
  70518. "lang" : "en",
  70519. "value" : "A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sface() sfh->volume(). An attacker can provide malicious input to trigger this vulnerability."
  70520. } ]
  70521. }
  70522. },
  70523. "configurations" : {
  70524. "CVE_data_version" : "4.0",
  70525. "nodes" : [ {
  70526. "operator" : "OR",
  70527. "children" : [ ],
  70528. "cpe_match" : [ {
  70529. "vulnerable" : true,
  70530. "cpe23Uri" : "cpe:2.3:a:cgal:computational_geometry_algorithms_library:5.1.1:*:*:*:*:*:*:*",
  70531. "cpe_name" : [ ]
  70532. } ]
  70533. }, {
  70534. "operator" : "OR",
  70535. "children" : [ ],
  70536. "cpe_match" : [ {
  70537. "vulnerable" : true,
  70538. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  70539. "cpe_name" : [ ]
  70540. }, {
  70541. "vulnerable" : true,
  70542. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  70543. "cpe_name" : [ ]
  70544. } ]
  70545. } ]
  70546. },
  70547. "impact" : {
  70548. "baseMetricV3" : {
  70549. "cvssV3" : {
  70550. "version" : "3.1",
  70551. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  70552. "attackVector" : "NETWORK",
  70553. "attackComplexity" : "LOW",
  70554. "privilegesRequired" : "NONE",
  70555. "userInteraction" : "NONE",
  70556. "scope" : "UNCHANGED",
  70557. "confidentialityImpact" : "HIGH",
  70558. "integrityImpact" : "HIGH",
  70559. "availabilityImpact" : "HIGH",
  70560. "baseScore" : 9.8,
  70561. "baseSeverity" : "CRITICAL"
  70562. },
  70563. "exploitabilityScore" : 3.9,
  70564. "impactScore" : 5.9
  70565. },
  70566. "baseMetricV2" : {
  70567. "cvssV2" : {
  70568. "version" : "2.0",
  70569. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  70570. "accessVector" : "NETWORK",
  70571. "accessComplexity" : "LOW",
  70572. "authentication" : "NONE",
  70573. "confidentialityImpact" : "PARTIAL",
  70574. "integrityImpact" : "PARTIAL",
  70575. "availabilityImpact" : "PARTIAL",
  70576. "baseScore" : 7.5
  70577. },
  70578. "severity" : "HIGH",
  70579. "exploitabilityScore" : 10.0,
  70580. "impactScore" : 6.4,
  70581. "acInsufInfo" : false,
  70582. "obtainAllPrivilege" : false,
  70583. "obtainUserPrivilege" : false,
  70584. "obtainOtherPrivilege" : false,
  70585. "userInteractionRequired" : false
  70586. }
  70587. },
  70588. "publishedDate" : "2021-03-04T20:15Z",
  70589. "lastModifiedDate" : "2021-05-05T07:15Z"
  70590. }, {
  70591. "cve" : {
  70592. "data_type" : "CVE",
  70593. "data_format" : "MITRE",
  70594. "data_version" : "4.0",
  70595. "CVE_data_meta" : {
  70596. "ID" : "CVE-2020-35628",
  70597. "ASSIGNER" : "talos-cna@cisco.com"
  70598. },
  70599. "problemtype" : {
  70600. "problemtype_data" : [ {
  70601. "description" : [ {
  70602. "lang" : "en",
  70603. "value" : "CWE-125"
  70604. } ]
  70605. } ]
  70606. },
  70607. "references" : {
  70608. "reference_data" : [ {
  70609. "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225",
  70610. "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225",
  70611. "refsource" : "MISC",
  70612. "tags" : [ "Technical Description", "Third Party Advisory" ]
  70613. }, {
  70614. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/",
  70615. "name" : "FEDORA-2021-0d42c7cb33",
  70616. "refsource" : "FEDORA",
  70617. "tags" : [ "Mailing List", "Third Party Advisory" ]
  70618. }, {
  70619. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB5SF5OJR2DSV7CC6U7FVW5VJSJO5EKV/",
  70620. "name" : "FEDORA-2021-9de542ab4c",
  70621. "refsource" : "FEDORA",
  70622. "tags" : [ "Mailing List", "Third Party Advisory" ]
  70623. }, {
  70624. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00002.html",
  70625. "name" : "[debian-lts-announce] 20210505 [SECURITY] [DLA 2649-1] cgal security update",
  70626. "refsource" : "MLIST",
  70627. "tags" : [ ]
  70628. } ]
  70629. },
  70630. "description" : {
  70631. "description_data" : [ {
  70632. "lang" : "en",
  70633. "value" : "A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->incident_sface. An attacker can provide malicious input to trigger this vulnerability."
  70634. } ]
  70635. }
  70636. },
  70637. "configurations" : {
  70638. "CVE_data_version" : "4.0",
  70639. "nodes" : [ {
  70640. "operator" : "OR",
  70641. "children" : [ ],
  70642. "cpe_match" : [ {
  70643. "vulnerable" : true,
  70644. "cpe23Uri" : "cpe:2.3:a:cgal:computational_geometry_algorithms_library:5.1.1:*:*:*:*:*:*:*",
  70645. "cpe_name" : [ ]
  70646. } ]
  70647. }, {
  70648. "operator" : "OR",
  70649. "children" : [ ],
  70650. "cpe_match" : [ {
  70651. "vulnerable" : true,
  70652. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  70653. "cpe_name" : [ ]
  70654. }, {
  70655. "vulnerable" : true,
  70656. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  70657. "cpe_name" : [ ]
  70658. } ]
  70659. } ]
  70660. },
  70661. "impact" : {
  70662. "baseMetricV3" : {
  70663. "cvssV3" : {
  70664. "version" : "3.1",
  70665. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  70666. "attackVector" : "NETWORK",
  70667. "attackComplexity" : "LOW",
  70668. "privilegesRequired" : "NONE",
  70669. "userInteraction" : "NONE",
  70670. "scope" : "UNCHANGED",
  70671. "confidentialityImpact" : "HIGH",
  70672. "integrityImpact" : "HIGH",
  70673. "availabilityImpact" : "HIGH",
  70674. "baseScore" : 9.8,
  70675. "baseSeverity" : "CRITICAL"
  70676. },
  70677. "exploitabilityScore" : 3.9,
  70678. "impactScore" : 5.9
  70679. },
  70680. "baseMetricV2" : {
  70681. "cvssV2" : {
  70682. "version" : "2.0",
  70683. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  70684. "accessVector" : "NETWORK",
  70685. "accessComplexity" : "LOW",
  70686. "authentication" : "NONE",
  70687. "confidentialityImpact" : "PARTIAL",
  70688. "integrityImpact" : "PARTIAL",
  70689. "availabilityImpact" : "PARTIAL",
  70690. "baseScore" : 7.5
  70691. },
  70692. "severity" : "HIGH",
  70693. "exploitabilityScore" : 10.0,
  70694. "impactScore" : 6.4,
  70695. "acInsufInfo" : false,
  70696. "obtainAllPrivilege" : false,
  70697. "obtainUserPrivilege" : false,
  70698. "obtainOtherPrivilege" : false,
  70699. "userInteractionRequired" : false
  70700. }
  70701. },
  70702. "publishedDate" : "2021-03-04T20:15Z",
  70703. "lastModifiedDate" : "2021-05-05T07:15Z"
  70704. }, {
  70705. "cve" : {
  70706. "data_type" : "CVE",
  70707. "data_format" : "MITRE",
  70708. "data_version" : "4.0",
  70709. "CVE_data_meta" : {
  70710. "ID" : "CVE-2020-28636",
  70711. "ASSIGNER" : "talos-cna@cisco.com"
  70712. },
  70713. "problemtype" : {
  70714. "problemtype_data" : [ {
  70715. "description" : [ {
  70716. "lang" : "en",
  70717. "value" : "CWE-125"
  70718. } ]
  70719. } ]
  70720. },
  70721. "references" : {
  70722. "reference_data" : [ {
  70723. "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225",
  70724. "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225",
  70725. "refsource" : "MISC",
  70726. "tags" : [ "Technical Description", "Third Party Advisory" ]
  70727. }, {
  70728. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/",
  70729. "name" : "FEDORA-2021-0d42c7cb33",
  70730. "refsource" : "FEDORA",
  70731. "tags" : [ "Mailing List", "Third Party Advisory" ]
  70732. }, {
  70733. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB5SF5OJR2DSV7CC6U7FVW5VJSJO5EKV/",
  70734. "name" : "FEDORA-2021-9de542ab4c",
  70735. "refsource" : "FEDORA",
  70736. "tags" : [ "Mailing List", "Third Party Advisory" ]
  70737. }, {
  70738. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00002.html",
  70739. "name" : "[debian-lts-announce] 20210505 [SECURITY] [DLA 2649-1] cgal security update",
  70740. "refsource" : "MLIST",
  70741. "tags" : [ ]
  70742. } ]
  70743. },
  70744. "description" : {
  70745. "description_data" : [ {
  70746. "lang" : "en",
  70747. "value" : "A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->twin() An attacker can provide malicious input to trigger this vulnerability."
  70748. } ]
  70749. }
  70750. },
  70751. "configurations" : {
  70752. "CVE_data_version" : "4.0",
  70753. "nodes" : [ {
  70754. "operator" : "OR",
  70755. "children" : [ ],
  70756. "cpe_match" : [ {
  70757. "vulnerable" : true,
  70758. "cpe23Uri" : "cpe:2.3:a:cgal:computational_geometry_algorithms_library:5.1.1:*:*:*:*:*:*:*",
  70759. "cpe_name" : [ ]
  70760. } ]
  70761. }, {
  70762. "operator" : "OR",
  70763. "children" : [ ],
  70764. "cpe_match" : [ {
  70765. "vulnerable" : true,
  70766. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  70767. "cpe_name" : [ ]
  70768. }, {
  70769. "vulnerable" : true,
  70770. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  70771. "cpe_name" : [ ]
  70772. } ]
  70773. } ]
  70774. },
  70775. "impact" : {
  70776. "baseMetricV3" : {
  70777. "cvssV3" : {
  70778. "version" : "3.1",
  70779. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  70780. "attackVector" : "NETWORK",
  70781. "attackComplexity" : "LOW",
  70782. "privilegesRequired" : "NONE",
  70783. "userInteraction" : "NONE",
  70784. "scope" : "UNCHANGED",
  70785. "confidentialityImpact" : "HIGH",
  70786. "integrityImpact" : "HIGH",
  70787. "availabilityImpact" : "HIGH",
  70788. "baseScore" : 9.8,
  70789. "baseSeverity" : "CRITICAL"
  70790. },
  70791. "exploitabilityScore" : 3.9,
  70792. "impactScore" : 5.9
  70793. },
  70794. "baseMetricV2" : {
  70795. "cvssV2" : {
  70796. "version" : "2.0",
  70797. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  70798. "accessVector" : "NETWORK",
  70799. "accessComplexity" : "LOW",
  70800. "authentication" : "NONE",
  70801. "confidentialityImpact" : "PARTIAL",
  70802. "integrityImpact" : "PARTIAL",
  70803. "availabilityImpact" : "PARTIAL",
  70804. "baseScore" : 7.5
  70805. },
  70806. "severity" : "HIGH",
  70807. "exploitabilityScore" : 10.0,
  70808. "impactScore" : 6.4,
  70809. "acInsufInfo" : false,
  70810. "obtainAllPrivilege" : false,
  70811. "obtainUserPrivilege" : false,
  70812. "obtainOtherPrivilege" : false,
  70813. "userInteractionRequired" : false
  70814. }
  70815. },
  70816. "publishedDate" : "2021-03-04T20:15Z",
  70817. "lastModifiedDate" : "2021-05-05T07:15Z"
  70818. }, {
  70819. "cve" : {
  70820. "data_type" : "CVE",
  70821. "data_format" : "MITRE",
  70822. "data_version" : "4.0",
  70823. "CVE_data_meta" : {
  70824. "ID" : "CVE-2020-28601",
  70825. "ASSIGNER" : "talos-cna@cisco.com"
  70826. },
  70827. "problemtype" : {
  70828. "problemtype_data" : [ {
  70829. "description" : [ {
  70830. "lang" : "en",
  70831. "value" : "CWE-125"
  70832. } ]
  70833. } ]
  70834. },
  70835. "references" : {
  70836. "reference_data" : [ {
  70837. "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225",
  70838. "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225",
  70839. "refsource" : "MISC",
  70840. "tags" : [ "Technical Description", "Third Party Advisory" ]
  70841. }, {
  70842. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/",
  70843. "name" : "FEDORA-2021-0d42c7cb33",
  70844. "refsource" : "FEDORA",
  70845. "tags" : [ "Mailing List", "Third Party Advisory" ]
  70846. }, {
  70847. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB5SF5OJR2DSV7CC6U7FVW5VJSJO5EKV/",
  70848. "name" : "FEDORA-2021-9de542ab4c",
  70849. "refsource" : "FEDORA",
  70850. "tags" : [ "Mailing List", "Third Party Advisory" ]
  70851. }, {
  70852. "url" : "https://lists.debian.org/debian-lts-announce/2021/05/msg00002.html",
  70853. "name" : "[debian-lts-announce] 20210505 [SECURITY] [DLA 2649-1] cgal security update",
  70854. "refsource" : "MLIST",
  70855. "tags" : [ ]
  70856. } ]
  70857. },
  70858. "description" : {
  70859. "description_data" : [ {
  70860. "lang" : "en",
  70861. "value" : "A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser::read_vertex() Face_of[] OOB read. An attacker can provide malicious input to trigger this vulnerability."
  70862. } ]
  70863. }
  70864. },
  70865. "configurations" : {
  70866. "CVE_data_version" : "4.0",
  70867. "nodes" : [ {
  70868. "operator" : "OR",
  70869. "children" : [ ],
  70870. "cpe_match" : [ {
  70871. "vulnerable" : true,
  70872. "cpe23Uri" : "cpe:2.3:a:cgal:computational_geometry_algorithms_library:5.1.1:*:*:*:*:*:*:*",
  70873. "cpe_name" : [ ]
  70874. } ]
  70875. }, {
  70876. "operator" : "OR",
  70877. "children" : [ ],
  70878. "cpe_match" : [ {
  70879. "vulnerable" : true,
  70880. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  70881. "cpe_name" : [ ]
  70882. }, {
  70883. "vulnerable" : true,
  70884. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  70885. "cpe_name" : [ ]
  70886. } ]
  70887. } ]
  70888. },
  70889. "impact" : {
  70890. "baseMetricV3" : {
  70891. "cvssV3" : {
  70892. "version" : "3.1",
  70893. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  70894. "attackVector" : "NETWORK",
  70895. "attackComplexity" : "LOW",
  70896. "privilegesRequired" : "NONE",
  70897. "userInteraction" : "NONE",
  70898. "scope" : "UNCHANGED",
  70899. "confidentialityImpact" : "HIGH",
  70900. "integrityImpact" : "HIGH",
  70901. "availabilityImpact" : "HIGH",
  70902. "baseScore" : 9.8,
  70903. "baseSeverity" : "CRITICAL"
  70904. },
  70905. "exploitabilityScore" : 3.9,
  70906. "impactScore" : 5.9
  70907. },
  70908. "baseMetricV2" : {
  70909. "cvssV2" : {
  70910. "version" : "2.0",
  70911. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  70912. "accessVector" : "NETWORK",
  70913. "accessComplexity" : "LOW",
  70914. "authentication" : "NONE",
  70915. "confidentialityImpact" : "PARTIAL",
  70916. "integrityImpact" : "PARTIAL",
  70917. "availabilityImpact" : "PARTIAL",
  70918. "baseScore" : 7.5
  70919. },
  70920. "severity" : "HIGH",
  70921. "exploitabilityScore" : 10.0,
  70922. "impactScore" : 6.4,
  70923. "acInsufInfo" : false,
  70924. "obtainAllPrivilege" : false,
  70925. "obtainUserPrivilege" : false,
  70926. "obtainOtherPrivilege" : false,
  70927. "userInteractionRequired" : false
  70928. }
  70929. },
  70930. "publishedDate" : "2021-03-04T20:15Z",
  70931. "lastModifiedDate" : "2021-05-05T07:15Z"
  70932. }, {
  70933. "cve" : {
  70934. "data_type" : "CVE",
  70935. "data_format" : "MITRE",
  70936. "data_version" : "4.0",
  70937. "CVE_data_meta" : {
  70938. "ID" : "CVE-2021-26813",
  70939. "ASSIGNER" : "cve@mitre.org"
  70940. },
  70941. "problemtype" : {
  70942. "problemtype_data" : [ {
  70943. "description" : [ {
  70944. "lang" : "en",
  70945. "value" : "NVD-CWE-Other"
  70946. } ]
  70947. } ]
  70948. },
  70949. "references" : {
  70950. "reference_data" : [ {
  70951. "url" : "https://github.com/trentm/python-markdown2/pull/387",
  70952. "name" : "https://github.com/trentm/python-markdown2/pull/387",
  70953. "refsource" : "MISC",
  70954. "tags" : [ "Exploit", "Third Party Advisory" ]
  70955. }, {
  70956. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRP5RN35JZTSJ3JT4722F447ZDK7LZS5/",
  70957. "name" : "FEDORA-2021-0337384e41",
  70958. "refsource" : "FEDORA",
  70959. "tags" : [ ]
  70960. }, {
  70961. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTIX5UXRDJZJ57DO4V33ZNJTNKWGBQLY/",
  70962. "name" : "FEDORA-2021-e235a0da4a",
  70963. "refsource" : "FEDORA",
  70964. "tags" : [ ]
  70965. }, {
  70966. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J752422YELXLMLZJPVJVKD2KKHHQRVEH/",
  70967. "name" : "FEDORA-2021-77191478ad",
  70968. "refsource" : "FEDORA",
  70969. "tags" : [ ]
  70970. } ]
  70971. },
  70972. "description" : {
  70973. "description_data" : [ {
  70974. "lang" : "en",
  70975. "value" : "markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time."
  70976. } ]
  70977. }
  70978. },
  70979. "configurations" : {
  70980. "CVE_data_version" : "4.0",
  70981. "nodes" : [ {
  70982. "operator" : "OR",
  70983. "children" : [ ],
  70984. "cpe_match" : [ {
  70985. "vulnerable" : true,
  70986. "cpe23Uri" : "cpe:2.3:a:markdown2_project:markdown2:*:*:*:*:*:*:*:*",
  70987. "versionStartIncluding" : "1.0.1.18",
  70988. "versionEndExcluding" : "2.4.0",
  70989. "cpe_name" : [ ]
  70990. } ]
  70991. } ]
  70992. },
  70993. "impact" : {
  70994. "baseMetricV3" : {
  70995. "cvssV3" : {
  70996. "version" : "3.1",
  70997. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  70998. "attackVector" : "NETWORK",
  70999. "attackComplexity" : "LOW",
  71000. "privilegesRequired" : "NONE",
  71001. "userInteraction" : "NONE",
  71002. "scope" : "UNCHANGED",
  71003. "confidentialityImpact" : "NONE",
  71004. "integrityImpact" : "NONE",
  71005. "availabilityImpact" : "HIGH",
  71006. "baseScore" : 7.5,
  71007. "baseSeverity" : "HIGH"
  71008. },
  71009. "exploitabilityScore" : 3.9,
  71010. "impactScore" : 3.6
  71011. },
  71012. "baseMetricV2" : {
  71013. "cvssV2" : {
  71014. "version" : "2.0",
  71015. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  71016. "accessVector" : "NETWORK",
  71017. "accessComplexity" : "LOW",
  71018. "authentication" : "NONE",
  71019. "confidentialityImpact" : "NONE",
  71020. "integrityImpact" : "NONE",
  71021. "availabilityImpact" : "PARTIAL",
  71022. "baseScore" : 5.0
  71023. },
  71024. "severity" : "MEDIUM",
  71025. "exploitabilityScore" : 10.0,
  71026. "impactScore" : 2.9,
  71027. "acInsufInfo" : false,
  71028. "obtainAllPrivilege" : false,
  71029. "obtainUserPrivilege" : false,
  71030. "obtainOtherPrivilege" : false,
  71031. "userInteractionRequired" : false
  71032. }
  71033. },
  71034. "publishedDate" : "2021-03-03T16:15Z",
  71035. "lastModifiedDate" : "2021-05-10T03:15Z"
  71036. }, {
  71037. "cve" : {
  71038. "data_type" : "CVE",
  71039. "data_format" : "MITRE",
  71040. "data_version" : "4.0",
  71041. "CVE_data_meta" : {
  71042. "ID" : "CVE-2021-25315",
  71043. "ASSIGNER" : "security@suse.com"
  71044. },
  71045. "problemtype" : {
  71046. "problemtype_data" : [ {
  71047. "description" : [ {
  71048. "lang" : "en",
  71049. "value" : "CWE-303"
  71050. } ]
  71051. } ]
  71052. },
  71053. "references" : {
  71054. "reference_data" : [ {
  71055. "url" : "https://bugzilla.suse.com/show_bug.cgi?id=1182382",
  71056. "name" : "https://bugzilla.suse.com/show_bug.cgi?id=1182382",
  71057. "refsource" : "CONFIRM",
  71058. "tags" : [ "Issue Tracking", "Vendor Advisory" ]
  71059. } ]
  71060. },
  71061. "description" : {
  71062. "description_data" : [ {
  71063. "lang" : "en",
  71064. "value" : "A Incorrect Implementation of Authentication Algorithm vulnerability in of SUSE SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions."
  71065. } ]
  71066. }
  71067. },
  71068. "configurations" : {
  71069. "CVE_data_version" : "4.0",
  71070. "nodes" : [ {
  71071. "operator" : "AND",
  71072. "children" : [ {
  71073. "operator" : "OR",
  71074. "children" : [ ],
  71075. "cpe_match" : [ {
  71076. "vulnerable" : true,
  71077. "cpe23Uri" : "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
  71078. "versionEndExcluding" : "3002.2:",
  71079. "cpe_name" : [ ]
  71080. } ]
  71081. }, {
  71082. "operator" : "OR",
  71083. "children" : [ ],
  71084. "cpe_match" : [ {
  71085. "vulnerable" : false,
  71086. "cpe23Uri" : "cpe:2.3:o:opensuse:tumbleweed:-:*:*:*:*:*:*:*",
  71087. "cpe_name" : [ ]
  71088. }, {
  71089. "vulnerable" : false,
  71090. "cpe23Uri" : "cpe:2.3:o:suse:suse_linux_enterprise_server:15:sp3:*:*:*:*:*:*",
  71091. "cpe_name" : [ ]
  71092. } ]
  71093. } ],
  71094. "cpe_match" : [ ]
  71095. } ]
  71096. },
  71097. "impact" : {
  71098. "baseMetricV3" : {
  71099. "cvssV3" : {
  71100. "version" : "3.1",
  71101. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  71102. "attackVector" : "LOCAL",
  71103. "attackComplexity" : "LOW",
  71104. "privilegesRequired" : "LOW",
  71105. "userInteraction" : "NONE",
  71106. "scope" : "UNCHANGED",
  71107. "confidentialityImpact" : "HIGH",
  71108. "integrityImpact" : "HIGH",
  71109. "availabilityImpact" : "HIGH",
  71110. "baseScore" : 7.8,
  71111. "baseSeverity" : "HIGH"
  71112. },
  71113. "exploitabilityScore" : 1.8,
  71114. "impactScore" : 5.9
  71115. },
  71116. "baseMetricV2" : {
  71117. "cvssV2" : {
  71118. "version" : "2.0",
  71119. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  71120. "accessVector" : "LOCAL",
  71121. "accessComplexity" : "LOW",
  71122. "authentication" : "NONE",
  71123. "confidentialityImpact" : "PARTIAL",
  71124. "integrityImpact" : "PARTIAL",
  71125. "availabilityImpact" : "PARTIAL",
  71126. "baseScore" : 4.6
  71127. },
  71128. "severity" : "MEDIUM",
  71129. "exploitabilityScore" : 3.9,
  71130. "impactScore" : 6.4,
  71131. "acInsufInfo" : false,
  71132. "obtainAllPrivilege" : false,
  71133. "obtainUserPrivilege" : false,
  71134. "obtainOtherPrivilege" : false,
  71135. "userInteractionRequired" : false
  71136. }
  71137. },
  71138. "publishedDate" : "2021-03-03T10:15Z",
  71139. "lastModifiedDate" : "2021-05-06T15:47Z"
  71140. }, {
  71141. "cve" : {
  71142. "data_type" : "CVE",
  71143. "data_format" : "MITRE",
  71144. "data_version" : "4.0",
  71145. "CVE_data_meta" : {
  71146. "ID" : "CVE-2021-22187",
  71147. "ASSIGNER" : "cve@gitlab.com"
  71148. },
  71149. "problemtype" : {
  71150. "problemtype_data" : [ {
  71151. "description" : [ {
  71152. "lang" : "en",
  71153. "value" : "CWE-400"
  71154. } ]
  71155. } ]
  71156. },
  71157. "references" : {
  71158. "reference_data" : [ {
  71159. "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/300452",
  71160. "name" : "https://gitlab.com/gitlab-org/gitlab/-/issues/300452",
  71161. "refsource" : "MISC",
  71162. "tags" : [ "Broken Link" ]
  71163. }, {
  71164. "url" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22187.json",
  71165. "name" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22187.json",
  71166. "refsource" : "CONFIRM",
  71167. "tags" : [ "Vendor Advisory" ]
  71168. } ]
  71169. },
  71170. "description" : {
  71171. "description_data" : [ {
  71172. "lang" : "en",
  71173. "value" : "An issue has been discovered in GitLab affecting all versions of Gitlab EE/CE before 13.6.7. A potential resource exhaustion issue that allowed running or pending jobs to continue even after project was deleted."
  71174. } ]
  71175. }
  71176. },
  71177. "configurations" : {
  71178. "CVE_data_version" : "4.0",
  71179. "nodes" : [ {
  71180. "operator" : "OR",
  71181. "children" : [ ],
  71182. "cpe_match" : [ {
  71183. "vulnerable" : true,
  71184. "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
  71185. "versionEndExcluding" : "12.6.7",
  71186. "cpe_name" : [ ]
  71187. }, {
  71188. "vulnerable" : true,
  71189. "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
  71190. "versionEndExcluding" : "12.6.7",
  71191. "cpe_name" : [ ]
  71192. } ]
  71193. } ]
  71194. },
  71195. "impact" : {
  71196. "baseMetricV3" : {
  71197. "cvssV3" : {
  71198. "version" : "3.1",
  71199. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
  71200. "attackVector" : "NETWORK",
  71201. "attackComplexity" : "LOW",
  71202. "privilegesRequired" : "LOW",
  71203. "userInteraction" : "NONE",
  71204. "scope" : "UNCHANGED",
  71205. "confidentialityImpact" : "NONE",
  71206. "integrityImpact" : "NONE",
  71207. "availabilityImpact" : "LOW",
  71208. "baseScore" : 4.3,
  71209. "baseSeverity" : "MEDIUM"
  71210. },
  71211. "exploitabilityScore" : 2.8,
  71212. "impactScore" : 1.4
  71213. },
  71214. "baseMetricV2" : {
  71215. "cvssV2" : {
  71216. "version" : "2.0",
  71217. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P",
  71218. "accessVector" : "NETWORK",
  71219. "accessComplexity" : "LOW",
  71220. "authentication" : "SINGLE",
  71221. "confidentialityImpact" : "NONE",
  71222. "integrityImpact" : "NONE",
  71223. "availabilityImpact" : "PARTIAL",
  71224. "baseScore" : 4.0
  71225. },
  71226. "severity" : "MEDIUM",
  71227. "exploitabilityScore" : 8.0,
  71228. "impactScore" : 2.9,
  71229. "acInsufInfo" : false,
  71230. "obtainAllPrivilege" : false,
  71231. "obtainUserPrivilege" : false,
  71232. "obtainOtherPrivilege" : false,
  71233. "userInteractionRequired" : false
  71234. }
  71235. },
  71236. "publishedDate" : "2021-03-02T19:15Z",
  71237. "lastModifiedDate" : "2021-05-04T12:15Z"
  71238. }, {
  71239. "cve" : {
  71240. "data_type" : "CVE",
  71241. "data_format" : "MITRE",
  71242. "data_version" : "4.0",
  71243. "CVE_data_meta" : {
  71244. "ID" : "CVE-2021-3332",
  71245. "ASSIGNER" : "cve@mitre.org"
  71246. },
  71247. "problemtype" : {
  71248. "problemtype_data" : [ {
  71249. "description" : [ {
  71250. "lang" : "en",
  71251. "value" : "CWE-863"
  71252. } ]
  71253. } ]
  71254. },
  71255. "references" : {
  71256. "reference_data" : [ {
  71257. "url" : "https://blog.sebastianschmitt.eu/security/wps-hide-login-1-6-1-protection-bypass-cve-2021-3332",
  71258. "name" : "https://blog.sebastianschmitt.eu/security/wps-hide-login-1-6-1-protection-bypass-cve-2021-3332",
  71259. "refsource" : "MISC",
  71260. "tags" : [ "Exploit", "Third Party Advisory" ]
  71261. } ]
  71262. },
  71263. "description" : {
  71264. "description_data" : [ {
  71265. "lang" : "en",
  71266. "value" : "WPS Hide Login 1.6.1 allows remote attackers to bypass a protection mechanism via post_password."
  71267. } ]
  71268. }
  71269. },
  71270. "configurations" : {
  71271. "CVE_data_version" : "4.0",
  71272. "nodes" : [ {
  71273. "operator" : "OR",
  71274. "children" : [ ],
  71275. "cpe_match" : [ {
  71276. "vulnerable" : true,
  71277. "cpe23Uri" : "cpe:2.3:a:wpserveur:wps_hide_login:1.6.1:*:*:*:*:wordpress:*:*",
  71278. "cpe_name" : [ ]
  71279. } ]
  71280. } ]
  71281. },
  71282. "impact" : {
  71283. "baseMetricV3" : {
  71284. "cvssV3" : {
  71285. "version" : "3.1",
  71286. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  71287. "attackVector" : "NETWORK",
  71288. "attackComplexity" : "LOW",
  71289. "privilegesRequired" : "NONE",
  71290. "userInteraction" : "NONE",
  71291. "scope" : "UNCHANGED",
  71292. "confidentialityImpact" : "LOW",
  71293. "integrityImpact" : "NONE",
  71294. "availabilityImpact" : "NONE",
  71295. "baseScore" : 5.3,
  71296. "baseSeverity" : "MEDIUM"
  71297. },
  71298. "exploitabilityScore" : 3.9,
  71299. "impactScore" : 1.4
  71300. },
  71301. "baseMetricV2" : {
  71302. "cvssV2" : {
  71303. "version" : "2.0",
  71304. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  71305. "accessVector" : "NETWORK",
  71306. "accessComplexity" : "LOW",
  71307. "authentication" : "NONE",
  71308. "confidentialityImpact" : "PARTIAL",
  71309. "integrityImpact" : "NONE",
  71310. "availabilityImpact" : "NONE",
  71311. "baseScore" : 5.0
  71312. },
  71313. "severity" : "MEDIUM",
  71314. "exploitabilityScore" : 10.0,
  71315. "impactScore" : 2.9,
  71316. "acInsufInfo" : false,
  71317. "obtainAllPrivilege" : false,
  71318. "obtainUserPrivilege" : false,
  71319. "obtainOtherPrivilege" : false,
  71320. "userInteractionRequired" : false
  71321. }
  71322. },
  71323. "publishedDate" : "2021-03-01T21:15Z",
  71324. "lastModifiedDate" : "2021-05-05T18:30Z"
  71325. }, {
  71326. "cve" : {
  71327. "data_type" : "CVE",
  71328. "data_format" : "MITRE",
  71329. "data_version" : "4.0",
  71330. "CVE_data_meta" : {
  71331. "ID" : "CVE-2020-27223",
  71332. "ASSIGNER" : "security@eclipse.org"
  71333. },
  71334. "problemtype" : {
  71335. "problemtype_data" : [ {
  71336. "description" : [ {
  71337. "lang" : "en",
  71338. "value" : "CWE-400"
  71339. } ]
  71340. } ]
  71341. },
  71342. "references" : {
  71343. "reference_data" : [ {
  71344. "url" : "https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128",
  71345. "name" : "https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128",
  71346. "refsource" : "CONFIRM",
  71347. "tags" : [ "Vendor Advisory" ]
  71348. }, {
  71349. "url" : "https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7",
  71350. "name" : "https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7",
  71351. "refsource" : "CONFIRM",
  71352. "tags" : [ "Third Party Advisory" ]
  71353. }, {
  71354. "url" : "https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E",
  71355. "name" : "[karaf-user] 20210301 Re: Jetty security defect",
  71356. "refsource" : "MLIST",
  71357. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71358. }, {
  71359. "url" : "https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E",
  71360. "name" : "[kafka-jira] 20210302 [GitHub] [kafka] dongjinleekr commented on pull request #10245: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223",
  71361. "refsource" : "MLIST",
  71362. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71363. }, {
  71364. "url" : "https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E",
  71365. "name" : "[kafka-jira] 20210302 [jira] [Created] (KAFKA-12400) Upgrade jetty to fix CVE-2020-27223",
  71366. "refsource" : "MLIST",
  71367. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71368. }, {
  71369. "url" : "https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E",
  71370. "name" : "[kafka-dev] 20210302 [jira] [Created] (KAFKA-12400) Upgrade jetty to fix CVE-2020-27223",
  71371. "refsource" : "MLIST",
  71372. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71373. }, {
  71374. "url" : "https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E",
  71375. "name" : "[kafka-jira] 20210302 [GitHub] [kafka] dongjinleekr opened a new pull request #10245: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223",
  71376. "refsource" : "MLIST",
  71377. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71378. }, {
  71379. "url" : "https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E",
  71380. "name" : "[druid-commits] 20210302 [GitHub] [druid] a2l007 opened a new pull request #10937: Upgrade jetty to latest version",
  71381. "refsource" : "MLIST",
  71382. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71383. }, {
  71384. "url" : "https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E",
  71385. "name" : "[kafka-jira] 20210302 [GitHub] [kafka] ableegoldman commented on pull request #10245: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223",
  71386. "refsource" : "MLIST",
  71387. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71388. }, {
  71389. "url" : "https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E",
  71390. "name" : "[kafka-jira] 20210302 [GitHub] [kafka] omkreddy closed pull request #10245: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223",
  71391. "refsource" : "MLIST",
  71392. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71393. }, {
  71394. "url" : "https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E",
  71395. "name" : "[kafka-dev] 20210302 [jira] [Resolved] (KAFKA-12400) Upgrade jetty to fix CVE-2020-27223",
  71396. "refsource" : "MLIST",
  71397. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71398. }, {
  71399. "url" : "https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E",
  71400. "name" : "[kafka-commits] 20210302 [kafka] branch 2.8 updated: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223",
  71401. "refsource" : "MLIST",
  71402. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71403. }, {
  71404. "url" : "https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E",
  71405. "name" : "[kafka-commits] 20210302 [kafka] branch 2.6 updated: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223",
  71406. "refsource" : "MLIST",
  71407. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71408. }, {
  71409. "url" : "https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E",
  71410. "name" : "[kafka-jira] 20210302 [jira] [Resolved] (KAFKA-12400) Upgrade jetty to fix CVE-2020-27223",
  71411. "refsource" : "MLIST",
  71412. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71413. }, {
  71414. "url" : "https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E",
  71415. "name" : "[kafka-commits] 20210302 [kafka] branch 2.7 updated: KAFKA-12400: Upgrade jetty to fix CVE-2020-27223",
  71416. "refsource" : "MLIST",
  71417. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71418. }, {
  71419. "url" : "https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E",
  71420. "name" : "https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E",
  71421. "refsource" : "MISC",
  71422. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71423. }, {
  71424. "url" : "https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E",
  71425. "name" : "https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E",
  71426. "refsource" : "MISC",
  71427. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71428. }, {
  71429. "url" : "https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E",
  71430. "name" : "[activemq-gitbox] 20210303 [GitHub] [activemq] ehossack-aws opened a new pull request #616: Upgrade to Jetty 9.4.38.v20210224",
  71431. "refsource" : "MLIST",
  71432. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71433. }, {
  71434. "url" : "https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E",
  71435. "name" : "[zookeeper-notifications] 20210307 [GitHub] [zookeeper] ztzg commented on pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71436. "refsource" : "MLIST",
  71437. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71438. }, {
  71439. "url" : "https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E",
  71440. "name" : "[zookeeper-notifications] 20210307 [GitHub] [zookeeper] ztzg opened a new pull request #1624: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71441. "refsource" : "MLIST",
  71442. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71443. }, {
  71444. "url" : "https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E",
  71445. "name" : "[zookeeper-notifications] 20210307 [GitHub] [zookeeper] ztzg opened a new pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71446. "refsource" : "MLIST",
  71447. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71448. }, {
  71449. "url" : "https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E",
  71450. "name" : "[zookeeper-notifications] 20210307 [GitHub] [zookeeper] ztzg opened a new pull request #1625: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71451. "refsource" : "MLIST",
  71452. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71453. }, {
  71454. "url" : "https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E",
  71455. "name" : "[zookeeper-issues] 20210307 [jira] [Created] (ZOOKEEPER-4233) dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71456. "refsource" : "MLIST",
  71457. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71458. }, {
  71459. "url" : "https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E",
  71460. "name" : "[zookeeper-dev] 20210307 [jira] [Created] (ZOOKEEPER-4233) dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71461. "refsource" : "MLIST",
  71462. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71463. }, {
  71464. "url" : "https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E",
  71465. "name" : "[zookeeper-issues] 20210307 [jira] [Updated] (ZOOKEEPER-4233) dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71466. "refsource" : "MLIST",
  71467. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71468. }, {
  71469. "url" : "https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E",
  71470. "name" : "[zookeeper-notifications] 20210308 [GitHub] [zookeeper] arshadmohammad commented on a change in pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71471. "refsource" : "MLIST",
  71472. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71473. }, {
  71474. "url" : "https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E",
  71475. "name" : "[zookeeper-commits] 20210308 [zookeeper] branch branch-3.5 updated: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71476. "refsource" : "MLIST",
  71477. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71478. }, {
  71479. "url" : "https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E",
  71480. "name" : "[zookeeper-notifications] 20210308 [GitHub] [zookeeper] arshadmohammad commented on pull request #1625: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71481. "refsource" : "MLIST",
  71482. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71483. }, {
  71484. "url" : "https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E",
  71485. "name" : "[zookeeper-notifications] 20210308 [GitHub] [zookeeper] arshadmohammad commented on pull request #1624: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71486. "refsource" : "MLIST",
  71487. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71488. }, {
  71489. "url" : "https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E",
  71490. "name" : "[zookeeper-commits] 20210308 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71491. "refsource" : "MLIST",
  71492. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71493. }, {
  71494. "url" : "https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E",
  71495. "name" : "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg closed pull request #1625: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71496. "refsource" : "MLIST",
  71497. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71498. }, {
  71499. "url" : "https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E",
  71500. "name" : "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg commented on pull request #1624: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71501. "refsource" : "MLIST",
  71502. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71503. }, {
  71504. "url" : "https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E",
  71505. "name" : "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg commented on pull request #1625: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71506. "refsource" : "MLIST",
  71507. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71508. }, {
  71509. "url" : "https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E",
  71510. "name" : "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg closed pull request #1624: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71511. "refsource" : "MLIST",
  71512. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71513. }, {
  71514. "url" : "https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E",
  71515. "name" : "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg commented on a change in pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71516. "refsource" : "MLIST",
  71517. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71518. }, {
  71519. "url" : "https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E",
  71520. "name" : "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] ztzg commented on pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71521. "refsource" : "MLIST",
  71522. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71523. }, {
  71524. "url" : "https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E",
  71525. "name" : "[zookeeper-notifications] 20210309 [GitHub] [zookeeper] arshadmohammad commented on pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71526. "refsource" : "MLIST",
  71527. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71528. }, {
  71529. "url" : "https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E",
  71530. "name" : "[zookeeper-issues] 20210310 [jira] [Resolved] (ZOOKEEPER-4233) dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71531. "refsource" : "MLIST",
  71532. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71533. }, {
  71534. "url" : "https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E",
  71535. "name" : "[zookeeper-commits] 20210310 [zookeeper] branch branch-3.7.0 updated: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71536. "refsource" : "MLIST",
  71537. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71538. }, {
  71539. "url" : "https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E",
  71540. "name" : "[zookeeper-commits] 20210310 [zookeeper] branch master updated: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71541. "refsource" : "MLIST",
  71542. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71543. }, {
  71544. "url" : "https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E",
  71545. "name" : "[zookeeper-commits] 20210310 [zookeeper] branch branch-3.7 updated: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71546. "refsource" : "MLIST",
  71547. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71548. }, {
  71549. "url" : "https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E",
  71550. "name" : "[zookeeper-notifications] 20210310 [GitHub] [zookeeper] asfgit closed pull request #1623: ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223",
  71551. "refsource" : "MLIST",
  71552. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71553. }, {
  71554. "url" : "https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E",
  71555. "name" : "[nifi-issues] 20210310 [jira] [Created] (NIFI-8309) Update to latest Jetty due to reported CVE-2020-27223",
  71556. "refsource" : "MLIST",
  71557. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71558. }, {
  71559. "url" : "https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E",
  71560. "name" : "[solr-users] 20210310 Does CVE-2020-27223 impact Solr 8.6.1",
  71561. "refsource" : "MLIST",
  71562. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71563. }, {
  71564. "url" : "https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E",
  71565. "name" : "[lucene-dev] 20210310 Does CVE-2020-27223 impact Solr 8.6.1",
  71566. "refsource" : "MLIST",
  71567. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71568. }, {
  71569. "url" : "https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E",
  71570. "name" : "[nifi-issues] 20210310 [jira] [Resolved] (NIFI-8309) Update to latest Jetty due to reported CVE-2020-27223",
  71571. "refsource" : "MLIST",
  71572. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71573. }, {
  71574. "url" : "https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E",
  71575. "name" : "[lucene-dev] 20210310 Re: Does CVE-2020-27223 impact Solr 8.6.1",
  71576. "refsource" : "MLIST",
  71577. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71578. }, {
  71579. "url" : "https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E",
  71580. "name" : "[nifi-issues] 20210310 [jira] [Commented] (NIFI-8309) Update to latest Jetty due to reported CVE-2020-27223",
  71581. "refsource" : "MLIST",
  71582. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71583. }, {
  71584. "url" : "https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E",
  71585. "name" : "[spark-issues] 20210315 [jira] [Assigned] (SPARK-34752) Upgrade Jetty to 9.4.37 to fix CVE-2020-27223",
  71586. "refsource" : "MLIST",
  71587. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71588. }, {
  71589. "url" : "https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E",
  71590. "name" : "[spark-issues] 20210315 [jira] [Created] (SPARK-34752) Upgrade Jetty to 9.3.37 to fix CVE-2020-27223",
  71591. "refsource" : "MLIST",
  71592. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71593. }, {
  71594. "url" : "https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E",
  71595. "name" : "[spark-issues] 20210315 [jira] [Commented] (SPARK-34752) Upgrade Jetty to 9.4.37 to fix CVE-2020-27223",
  71596. "refsource" : "MLIST",
  71597. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71598. }, {
  71599. "url" : "https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E",
  71600. "name" : "[spark-reviews] 20210315 [GitHub] [spark] AmplabJenkins commented on pull request #31846: [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223",
  71601. "refsource" : "MLIST",
  71602. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71603. }, {
  71604. "url" : "https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E",
  71605. "name" : "[spark-issues] 20210315 [jira] [Updated] (SPARK-34752) Upgrade Jetty to 9.4.37 to fix CVE-2020-27223",
  71606. "refsource" : "MLIST",
  71607. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71608. }, {
  71609. "url" : "https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E",
  71610. "name" : "[spark-issues] 20210315 [jira] [Updated] (SPARK-34752) Upgrade Jetty to 9.3.37 to fix CVE-2020-27223",
  71611. "refsource" : "MLIST",
  71612. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71613. }, {
  71614. "url" : "https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E",
  71615. "name" : "[spark-reviews] 20210315 [GitHub] [spark] xkrogen opened a new pull request #31846: [SPARK-34752] Bump Jetty to 9.4.37 to address CVE-2020-27223",
  71616. "refsource" : "MLIST",
  71617. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71618. }, {
  71619. "url" : "https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E",
  71620. "name" : "[spark-reviews] 20210315 [GitHub] [spark] HyukjinKwon closed pull request #31846: [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223",
  71621. "refsource" : "MLIST",
  71622. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71623. }, {
  71624. "url" : "https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E",
  71625. "name" : "[spark-reviews] 20210315 [GitHub] [spark] HyukjinKwon commented on pull request #31846: [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223",
  71626. "refsource" : "MLIST",
  71627. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71628. }, {
  71629. "url" : "https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E",
  71630. "name" : "[spark-issues] 20210315 [jira] [Resolved] (SPARK-34752) Upgrade Jetty to 9.4.37 to fix CVE-2020-27223",
  71631. "refsource" : "MLIST",
  71632. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71633. }, {
  71634. "url" : "https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E",
  71635. "name" : "[spark-reviews] 20210316 [GitHub] [spark] xkrogen commented on pull request #31846: [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223",
  71636. "refsource" : "MLIST",
  71637. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71638. }, {
  71639. "url" : "https://security.netapp.com/advisory/ntap-20210401-0005/",
  71640. "name" : "https://security.netapp.com/advisory/ntap-20210401-0005/",
  71641. "refsource" : "CONFIRM",
  71642. "tags" : [ ]
  71643. }, {
  71644. "url" : "https://lists.apache.org/thread.html/r068dfd35ce2193f6af28b74ff29ab148c2b2cacb235995576f5bea78@%3Cissues.solr.apache.org%3E",
  71645. "name" : "[solr-issues] 20210407 [jira] [Created] (SOLR-15325) High security vulnerability in Jetty library bundled within Solr - CVE-2020-27223 (+1)",
  71646. "refsource" : "MLIST",
  71647. "tags" : [ ]
  71648. }, {
  71649. "url" : "https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E",
  71650. "name" : "[solr-issues] 20210507 [jira] [Updated] (SOLR-15325) High security vulnerability in Jetty library bundled within Solr - CVE-2020-27223 (+1)",
  71651. "refsource" : "MLIST",
  71652. "tags" : [ ]
  71653. } ]
  71654. },
  71655. "description" : {
  71656. "description_data" : [ {
  71657. "lang" : "en",
  71658. "value" : "In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values."
  71659. } ]
  71660. }
  71661. },
  71662. "configurations" : {
  71663. "CVE_data_version" : "4.0",
  71664. "nodes" : [ {
  71665. "operator" : "OR",
  71666. "children" : [ ],
  71667. "cpe_match" : [ {
  71668. "vulnerable" : true,
  71669. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:9.4.6:20170531:*:*:*:*:*:*",
  71670. "cpe_name" : [ ]
  71671. }, {
  71672. "vulnerable" : true,
  71673. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:9.4.6:20180619:*:*:*:*:*:*",
  71674. "cpe_name" : [ ]
  71675. }, {
  71676. "vulnerable" : true,
  71677. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
  71678. "versionStartIncluding" : "9.4.7",
  71679. "versionEndExcluding" : "9.4.36",
  71680. "cpe_name" : [ ]
  71681. }, {
  71682. "vulnerable" : true,
  71683. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:9.4.36:-:*:*:*:*:*:*",
  71684. "cpe_name" : [ ]
  71685. }, {
  71686. "vulnerable" : true,
  71687. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:9.4.36:20210114:*:*:*:*:*:*",
  71688. "cpe_name" : [ ]
  71689. }, {
  71690. "vulnerable" : true,
  71691. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:10.0.0:-:*:*:*:*:*:*",
  71692. "cpe_name" : [ ]
  71693. }, {
  71694. "vulnerable" : true,
  71695. "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:11.0.0:-:*:*:*:*:*:*",
  71696. "cpe_name" : [ ]
  71697. } ]
  71698. }, {
  71699. "operator" : "OR",
  71700. "children" : [ ],
  71701. "cpe_match" : [ {
  71702. "vulnerable" : true,
  71703. "cpe23Uri" : "cpe:2.3:a:apache:nifi:1.13.0:*:*:*:*:*:*:*",
  71704. "cpe_name" : [ ]
  71705. }, {
  71706. "vulnerable" : true,
  71707. "cpe23Uri" : "cpe:2.3:a:apache:spark:3.1.1:-:*:*:*:*:*:*",
  71708. "cpe_name" : [ ]
  71709. } ]
  71710. } ]
  71711. },
  71712. "impact" : {
  71713. "baseMetricV3" : {
  71714. "cvssV3" : {
  71715. "version" : "3.1",
  71716. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
  71717. "attackVector" : "NETWORK",
  71718. "attackComplexity" : "LOW",
  71719. "privilegesRequired" : "NONE",
  71720. "userInteraction" : "NONE",
  71721. "scope" : "UNCHANGED",
  71722. "confidentialityImpact" : "NONE",
  71723. "integrityImpact" : "NONE",
  71724. "availabilityImpact" : "LOW",
  71725. "baseScore" : 5.3,
  71726. "baseSeverity" : "MEDIUM"
  71727. },
  71728. "exploitabilityScore" : 3.9,
  71729. "impactScore" : 1.4
  71730. },
  71731. "baseMetricV2" : {
  71732. "cvssV2" : {
  71733. "version" : "2.0",
  71734. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  71735. "accessVector" : "NETWORK",
  71736. "accessComplexity" : "MEDIUM",
  71737. "authentication" : "NONE",
  71738. "confidentialityImpact" : "NONE",
  71739. "integrityImpact" : "NONE",
  71740. "availabilityImpact" : "PARTIAL",
  71741. "baseScore" : 4.3
  71742. },
  71743. "severity" : "MEDIUM",
  71744. "exploitabilityScore" : 8.6,
  71745. "impactScore" : 2.9,
  71746. "acInsufInfo" : false,
  71747. "obtainAllPrivilege" : false,
  71748. "obtainUserPrivilege" : false,
  71749. "obtainOtherPrivilege" : false,
  71750. "userInteractionRequired" : false
  71751. }
  71752. },
  71753. "publishedDate" : "2021-02-26T22:15Z",
  71754. "lastModifiedDate" : "2021-05-07T16:15Z"
  71755. }, {
  71756. "cve" : {
  71757. "data_type" : "CVE",
  71758. "data_format" : "MITRE",
  71759. "data_version" : "4.0",
  71760. "CVE_data_meta" : {
  71761. "ID" : "CVE-2021-27568",
  71762. "ASSIGNER" : "cve@mitre.org"
  71763. },
  71764. "problemtype" : {
  71765. "problemtype_data" : [ {
  71766. "description" : [ {
  71767. "lang" : "en",
  71768. "value" : "CWE-754"
  71769. } ]
  71770. } ]
  71771. },
  71772. "references" : {
  71773. "reference_data" : [ {
  71774. "url" : "https://github.com/netplex/json-smart-v2/issues/60",
  71775. "name" : "https://github.com/netplex/json-smart-v2/issues/60",
  71776. "refsource" : "MISC",
  71777. "tags" : [ "Exploit", "Third Party Advisory" ]
  71778. }, {
  71779. "url" : "https://github.com/netplex/json-smart-v1/issues/7",
  71780. "name" : "https://github.com/netplex/json-smart-v1/issues/7",
  71781. "refsource" : "MISC",
  71782. "tags" : [ "Exploit", "Third Party Advisory" ]
  71783. } ]
  71784. },
  71785. "description" : {
  71786. "description_data" : [ {
  71787. "lang" : "en",
  71788. "value" : "An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information."
  71789. } ]
  71790. }
  71791. },
  71792. "configurations" : {
  71793. "CVE_data_version" : "4.0",
  71794. "nodes" : [ {
  71795. "operator" : "OR",
  71796. "children" : [ ],
  71797. "cpe_match" : [ {
  71798. "vulnerable" : true,
  71799. "cpe23Uri" : "cpe:2.3:a:json-smart_project:json-smart-v1:*:*:*:*:*:*:*:*",
  71800. "versionEndExcluding" : "1.3.2",
  71801. "cpe_name" : [ ]
  71802. }, {
  71803. "vulnerable" : true,
  71804. "cpe23Uri" : "cpe:2.3:a:json-smart_project:json-smart-v2:*:*:*:*:*:*:*:*",
  71805. "versionEndExcluding" : "2.3.1",
  71806. "cpe_name" : [ ]
  71807. }, {
  71808. "vulnerable" : true,
  71809. "cpe23Uri" : "cpe:2.3:a:json-smart_project:json-smart-v2:*:*:*:*:*:*:*:*",
  71810. "versionStartIncluding" : "2.4",
  71811. "versionEndExcluding" : "2.4.1",
  71812. "cpe_name" : [ ]
  71813. } ]
  71814. } ]
  71815. },
  71816. "impact" : {
  71817. "baseMetricV3" : {
  71818. "cvssV3" : {
  71819. "version" : "3.1",
  71820. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
  71821. "attackVector" : "NETWORK",
  71822. "attackComplexity" : "LOW",
  71823. "privilegesRequired" : "NONE",
  71824. "userInteraction" : "NONE",
  71825. "scope" : "UNCHANGED",
  71826. "confidentialityImpact" : "HIGH",
  71827. "integrityImpact" : "NONE",
  71828. "availabilityImpact" : "HIGH",
  71829. "baseScore" : 9.1,
  71830. "baseSeverity" : "CRITICAL"
  71831. },
  71832. "exploitabilityScore" : 3.9,
  71833. "impactScore" : 5.2
  71834. },
  71835. "baseMetricV2" : {
  71836. "cvssV2" : {
  71837. "version" : "2.0",
  71838. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:P",
  71839. "accessVector" : "NETWORK",
  71840. "accessComplexity" : "LOW",
  71841. "authentication" : "NONE",
  71842. "confidentialityImpact" : "PARTIAL",
  71843. "integrityImpact" : "NONE",
  71844. "availabilityImpact" : "PARTIAL",
  71845. "baseScore" : 6.4
  71846. },
  71847. "severity" : "MEDIUM",
  71848. "exploitabilityScore" : 10.0,
  71849. "impactScore" : 4.9,
  71850. "acInsufInfo" : false,
  71851. "obtainAllPrivilege" : false,
  71852. "obtainUserPrivilege" : false,
  71853. "obtainOtherPrivilege" : false,
  71854. "userInteractionRequired" : false
  71855. }
  71856. },
  71857. "publishedDate" : "2021-02-23T02:15Z",
  71858. "lastModifiedDate" : "2021-05-04T13:58Z"
  71859. }, {
  71860. "cve" : {
  71861. "data_type" : "CVE",
  71862. "data_format" : "MITRE",
  71863. "data_version" : "4.0",
  71864. "CVE_data_meta" : {
  71865. "ID" : "CVE-2021-23336",
  71866. "ASSIGNER" : "report@snyk.io"
  71867. },
  71868. "problemtype" : {
  71869. "problemtype_data" : [ {
  71870. "description" : [ {
  71871. "lang" : "en",
  71872. "value" : "CWE-444"
  71873. } ]
  71874. } ]
  71875. },
  71876. "references" : {
  71877. "reference_data" : [ {
  71878. "url" : "https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933",
  71879. "name" : "https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933",
  71880. "refsource" : "MISC",
  71881. "tags" : [ "Exploit", "Third Party Advisory" ]
  71882. }, {
  71883. "url" : "https://github.com/python/cpython/pull/24297",
  71884. "name" : "https://github.com/python/cpython/pull/24297",
  71885. "refsource" : "MISC",
  71886. "tags" : [ "Patch", "Third Party Advisory" ]
  71887. }, {
  71888. "url" : "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/",
  71889. "name" : "https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/",
  71890. "refsource" : "MISC",
  71891. "tags" : [ "Technical Description", "Third Party Advisory" ]
  71892. }, {
  71893. "url" : "http://www.openwall.com/lists/oss-security/2021/02/19/4",
  71894. "name" : "[oss-security] 20210219 Django security releases: CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()``",
  71895. "refsource" : "MLIST",
  71896. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  71897. }, {
  71898. "url" : "https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html",
  71899. "name" : "[debian-lts-announce] 20210219 [SECURITY] [DLA 2569-1] python-django security update",
  71900. "refsource" : "MLIST",
  71901. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71902. }, {
  71903. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/",
  71904. "name" : "FEDORA-2021-7547ad987f",
  71905. "refsource" : "FEDORA",
  71906. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71907. }, {
  71908. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/",
  71909. "name" : "FEDORA-2021-f4fd9372c7",
  71910. "refsource" : "FEDORA",
  71911. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71912. }, {
  71913. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/",
  71914. "name" : "FEDORA-2021-7d3a9004e2",
  71915. "refsource" : "FEDORA",
  71916. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71917. }, {
  71918. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/",
  71919. "name" : "FEDORA-2021-3352c1c802",
  71920. "refsource" : "FEDORA",
  71921. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71922. }, {
  71923. "url" : "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
  71924. "name" : "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
  71925. "refsource" : "MLIST",
  71926. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71927. }, {
  71928. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/",
  71929. "name" : "FEDORA-2021-907f3bacae",
  71930. "refsource" : "FEDORA",
  71931. "tags" : [ "Mailing List", "Mailing List", "Third Party Advisory" ]
  71932. }, {
  71933. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/",
  71934. "name" : "FEDORA-2021-7c1bb32d13",
  71935. "refsource" : "FEDORA",
  71936. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71937. }, {
  71938. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/",
  71939. "name" : "FEDORA-2021-b1843407ca",
  71940. "refsource" : "FEDORA",
  71941. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71942. }, {
  71943. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/",
  71944. "name" : "FEDORA-2021-2897f5366c",
  71945. "refsource" : "FEDORA",
  71946. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71947. }, {
  71948. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/",
  71949. "name" : "FEDORA-2021-b326fcb83f",
  71950. "refsource" : "FEDORA",
  71951. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71952. }, {
  71953. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/",
  71954. "name" : "FEDORA-2021-1bb399a5af",
  71955. "refsource" : "FEDORA",
  71956. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71957. }, {
  71958. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/",
  71959. "name" : "FEDORA-2021-ef83e8525a",
  71960. "refsource" : "FEDORA",
  71961. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71962. }, {
  71963. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/",
  71964. "name" : "FEDORA-2021-b76ede8f4d",
  71965. "refsource" : "FEDORA",
  71966. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71967. }, {
  71968. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/",
  71969. "name" : "FEDORA-2021-309bc2e727",
  71970. "refsource" : "FEDORA",
  71971. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71972. }, {
  71973. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/",
  71974. "name" : "FEDORA-2021-e525e48886",
  71975. "refsource" : "FEDORA",
  71976. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71977. }, {
  71978. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/",
  71979. "name" : "FEDORA-2021-5a09621ebb",
  71980. "refsource" : "FEDORA",
  71981. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71982. }, {
  71983. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/",
  71984. "name" : "FEDORA-2021-e22bb0e548",
  71985. "refsource" : "FEDORA",
  71986. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71987. }, {
  71988. "url" : "https://security.netapp.com/advisory/ntap-20210326-0004/",
  71989. "name" : "https://security.netapp.com/advisory/ntap-20210326-0004/",
  71990. "refsource" : "CONFIRM",
  71991. "tags" : [ "Third Party Advisory" ]
  71992. }, {
  71993. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html",
  71994. "name" : "[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update",
  71995. "refsource" : "MLIST",
  71996. "tags" : [ "Mailing List", "Third Party Advisory" ]
  71997. }, {
  71998. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html",
  71999. "name" : "[debian-lts-announce] 20210417 [SECURITY] [DLA 2628-1] python2.7 security update",
  72000. "refsource" : "MLIST",
  72001. "tags" : [ "Mailing List", "Third Party Advisory" ]
  72002. }, {
  72003. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/",
  72004. "name" : "FEDORA-2021-b6b6093b3a",
  72005. "refsource" : "FEDORA",
  72006. "tags" : [ "Third Party Advisory" ]
  72007. }, {
  72008. "url" : "https://security.gentoo.org/glsa/202104-04",
  72009. "name" : "GLSA-202104-04",
  72010. "refsource" : "GENTOO",
  72011. "tags" : [ ]
  72012. }, {
  72013. "url" : "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E",
  72014. "name" : "[airflow-users] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
  72015. "refsource" : "MLIST",
  72016. "tags" : [ ]
  72017. }, {
  72018. "url" : "http://www.openwall.com/lists/oss-security/2021/05/01/2",
  72019. "name" : "[oss-security] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
  72020. "refsource" : "MLIST",
  72021. "tags" : [ ]
  72022. }, {
  72023. "url" : "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E",
  72024. "name" : "[announce] 20210501 Apache Airflow CVE: CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
  72025. "refsource" : "MLIST",
  72026. "tags" : [ ]
  72027. } ]
  72028. },
  72029. "description" : {
  72030. "description_data" : [ {
  72031. "lang" : "en",
  72032. "value" : "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter."
  72033. } ]
  72034. }
  72035. },
  72036. "configurations" : {
  72037. "CVE_data_version" : "4.0",
  72038. "nodes" : [ {
  72039. "operator" : "OR",
  72040. "children" : [ ],
  72041. "cpe_match" : [ {
  72042. "vulnerable" : true,
  72043. "cpe23Uri" : "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
  72044. "versionEndExcluding" : "3.6.13",
  72045. "cpe_name" : [ ]
  72046. }, {
  72047. "vulnerable" : true,
  72048. "cpe23Uri" : "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
  72049. "versionStartIncluding" : "3.7.0",
  72050. "versionEndExcluding" : "3.7.10",
  72051. "cpe_name" : [ ]
  72052. }, {
  72053. "vulnerable" : true,
  72054. "cpe23Uri" : "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
  72055. "versionStartIncluding" : "3.8.0",
  72056. "versionEndExcluding" : "3.8.8",
  72057. "cpe_name" : [ ]
  72058. }, {
  72059. "vulnerable" : true,
  72060. "cpe23Uri" : "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
  72061. "versionStartIncluding" : "3.9.0",
  72062. "versionEndExcluding" : "3.9.2",
  72063. "cpe_name" : [ ]
  72064. } ]
  72065. }, {
  72066. "operator" : "OR",
  72067. "children" : [ ],
  72068. "cpe_match" : [ {
  72069. "vulnerable" : true,
  72070. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  72071. "cpe_name" : [ ]
  72072. }, {
  72073. "vulnerable" : true,
  72074. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  72075. "cpe_name" : [ ]
  72076. }, {
  72077. "vulnerable" : true,
  72078. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  72079. "cpe_name" : [ ]
  72080. } ]
  72081. }, {
  72082. "operator" : "OR",
  72083. "children" : [ ],
  72084. "cpe_match" : [ {
  72085. "vulnerable" : true,
  72086. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  72087. "cpe_name" : [ ]
  72088. } ]
  72089. }, {
  72090. "operator" : "OR",
  72091. "children" : [ ],
  72092. "cpe_match" : [ {
  72093. "vulnerable" : true,
  72094. "cpe23Uri" : "cpe:2.3:a:netapp:inventory_collect_tool:-:*:*:*:*:*:*:*",
  72095. "cpe_name" : [ ]
  72096. }, {
  72097. "vulnerable" : true,
  72098. "cpe23Uri" : "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
  72099. "cpe_name" : [ ]
  72100. }, {
  72101. "vulnerable" : true,
  72102. "cpe23Uri" : "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
  72103. "cpe_name" : [ ]
  72104. } ]
  72105. }, {
  72106. "operator" : "OR",
  72107. "children" : [ ],
  72108. "cpe_match" : [ {
  72109. "vulnerable" : true,
  72110. "cpe23Uri" : "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
  72111. "versionStartIncluding" : "2.2",
  72112. "versionEndExcluding" : "2.2.19",
  72113. "cpe_name" : [ ]
  72114. }, {
  72115. "vulnerable" : true,
  72116. "cpe23Uri" : "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
  72117. "versionStartIncluding" : "3.0",
  72118. "versionEndExcluding" : "3.0.13",
  72119. "cpe_name" : [ ]
  72120. }, {
  72121. "vulnerable" : true,
  72122. "cpe23Uri" : "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
  72123. "versionStartIncluding" : "3.1",
  72124. "versionEndExcluding" : "3.1.7",
  72125. "cpe_name" : [ ]
  72126. } ]
  72127. } ]
  72128. },
  72129. "impact" : {
  72130. "baseMetricV3" : {
  72131. "cvssV3" : {
  72132. "version" : "3.1",
  72133. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
  72134. "attackVector" : "NETWORK",
  72135. "attackComplexity" : "HIGH",
  72136. "privilegesRequired" : "NONE",
  72137. "userInteraction" : "REQUIRED",
  72138. "scope" : "UNCHANGED",
  72139. "confidentialityImpact" : "NONE",
  72140. "integrityImpact" : "LOW",
  72141. "availabilityImpact" : "HIGH",
  72142. "baseScore" : 5.9,
  72143. "baseSeverity" : "MEDIUM"
  72144. },
  72145. "exploitabilityScore" : 1.6,
  72146. "impactScore" : 4.2
  72147. },
  72148. "baseMetricV2" : {
  72149. "cvssV2" : {
  72150. "version" : "2.0",
  72151. "vectorString" : "AV:N/AC:H/Au:N/C:N/I:P/A:P",
  72152. "accessVector" : "NETWORK",
  72153. "accessComplexity" : "HIGH",
  72154. "authentication" : "NONE",
  72155. "confidentialityImpact" : "NONE",
  72156. "integrityImpact" : "PARTIAL",
  72157. "availabilityImpact" : "PARTIAL",
  72158. "baseScore" : 4.0
  72159. },
  72160. "severity" : "MEDIUM",
  72161. "exploitabilityScore" : 4.9,
  72162. "impactScore" : 4.9,
  72163. "acInsufInfo" : false,
  72164. "obtainAllPrivilege" : false,
  72165. "obtainUserPrivilege" : false,
  72166. "obtainOtherPrivilege" : false,
  72167. "userInteractionRequired" : true
  72168. }
  72169. },
  72170. "publishedDate" : "2021-02-15T13:15Z",
  72171. "lastModifiedDate" : "2021-05-04T00:15Z"
  72172. }, {
  72173. "cve" : {
  72174. "data_type" : "CVE",
  72175. "data_format" : "MITRE",
  72176. "data_version" : "4.0",
  72177. "CVE_data_meta" : {
  72178. "ID" : "CVE-2020-13949",
  72179. "ASSIGNER" : "security@apache.org"
  72180. },
  72181. "problemtype" : {
  72182. "problemtype_data" : [ {
  72183. "description" : [ {
  72184. "lang" : "en",
  72185. "value" : "CWE-400"
  72186. } ]
  72187. } ]
  72188. },
  72189. "references" : {
  72190. "reference_data" : [ {
  72191. "url" : "https://lists.apache.org/thread.html/r43dc2b2e928e9d845b07ac075634cb759d91bb852421dc282f87a74a%40%3Cdev.thrift.apache.org%3E",
  72192. "name" : "https://lists.apache.org/thread.html/r43dc2b2e928e9d845b07ac075634cb759d91bb852421dc282f87a74a%40%3Cdev.thrift.apache.org%3E",
  72193. "refsource" : "MISC",
  72194. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72195. }, {
  72196. "url" : "https://lists.apache.org/thread.html/r3a1291a7ab8ee43db87cb0253371489810877028fc6e7c68dc640926@%3Cissues.hbase.apache.org%3E",
  72197. "name" : "[hbase-issues] 20210215 [GitHub] [hbase] pankaj72981 opened a new pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72198. "refsource" : "MLIST",
  72199. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72200. }, {
  72201. "url" : "https://lists.apache.org/thread.html/r27b7d3d95ffa8498899ef1c9de553d469f8fe857640a3f6e58dba640@%3Cissues.hbase.apache.org%3E",
  72202. "name" : "[hbase-issues] 20210215 [jira] [Work started] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72203. "refsource" : "MLIST",
  72204. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72205. }, {
  72206. "url" : "https://lists.apache.org/thread.html/r143ca388b0c83fe659db14be76889d50b453b0ee06f423181f736933@%3Cissues.hbase.apache.org%3E",
  72207. "name" : "[hbase-issues] 20210215 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72208. "refsource" : "MLIST",
  72209. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72210. }, {
  72211. "url" : "https://lists.apache.org/thread.html/r515e01a30443cfa2dbb355c44c63149869afd684fb7b0344c58fa67b@%3Cissues.hbase.apache.org%3E",
  72212. "name" : "[hbase-issues] 20210215 [GitHub] [hbase] pankaj72981 commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72213. "refsource" : "MLIST",
  72214. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72215. }, {
  72216. "url" : "https://lists.apache.org/thread.html/r93f23f74315e009f4fb68ef7fc794dceee42cf87fe6613814dcd8c70@%3Cissues.hbase.apache.org%3E",
  72217. "name" : "[hbase-issues] 20210215 [GitHub] [hbase] pankaj72981 edited a comment on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72218. "refsource" : "MLIST",
  72219. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72220. }, {
  72221. "url" : "https://lists.apache.org/thread.html/rd78cdd87d84499a404202f015f55935db3658bd0983ecec81e6b18c6@%3Cissues.hbase.apache.org%3E",
  72222. "name" : "[hbase-issues] 20210215 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72223. "refsource" : "MLIST",
  72224. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72225. }, {
  72226. "url" : "https://lists.apache.org/thread.html/rd49d53b146d94a7d3a135f6b505589655ffec24ea470e345d31351bb@%3Cissues.hbase.apache.org%3E",
  72227. "name" : "[hbase-issues] 20210215 [GitHub] [hbase] apurtell edited a comment on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72228. "refsource" : "MLIST",
  72229. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72230. }, {
  72231. "url" : "https://lists.apache.org/thread.html/r3f3e1d562c528b4bafef2dde51f79dd444a4b68ef24920d68068b6f9@%3Cissues.hbase.apache.org%3E",
  72232. "name" : "[hbase-issues] 20210215 [GitHub] [hbase] apurtell commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72233. "refsource" : "MLIST",
  72234. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72235. }, {
  72236. "url" : "https://lists.apache.org/thread.html/r2d180180f37c2ab5cebd711d080d01d8452efa8ad43c5d9cd7064621@%3Cissues.hbase.apache.org%3E",
  72237. "name" : "[hbase-issues] 20210216 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72238. "refsource" : "MLIST",
  72239. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72240. }, {
  72241. "url" : "https://lists.apache.org/thread.html/r89fdd39965efb7c6d22bc21c286d203252cea476e1782724aca0748e@%3Cuser.thrift.apache.org%3E",
  72242. "name" : "[thrift-user] 20210217 Apache Thrift 0.14.0 Release not on Maven central",
  72243. "refsource" : "MLIST",
  72244. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72245. }, {
  72246. "url" : "https://lists.apache.org/thread.html/rbc5cad06a46d23253a3c819229efedecfc05f89ef53f5fdde77a86d6@%3Cuser.thrift.apache.org%3E",
  72247. "name" : "[thrift-user] 20210224 Re: [SECURITY] CVE-2020-13949 Announcement",
  72248. "refsource" : "MLIST",
  72249. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72250. }, {
  72251. "url" : "https://lists.apache.org/thread.html/r02f7771863383ae993eb83cdfb70c3cb65a355c913242c850f61f1b8@%3Cissues.hbase.apache.org%3E",
  72252. "name" : "[hbase-issues] 20210301 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72253. "refsource" : "MLIST",
  72254. "tags" : [ "Exploit", "Mailing List", "Vendor Advisory" ]
  72255. }, {
  72256. "url" : "https://lists.apache.org/thread.html/r7ae909438ff5a2ffed9211e6ab0bd926396fd0b1fc33f31a406ee704@%3Cissues.hbase.apache.org%3E",
  72257. "name" : "[hbase-issues] 20210302 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72258. "refsource" : "MLIST",
  72259. "tags" : [ "Exploit", "Mailing List", "Vendor Advisory" ]
  72260. }, {
  72261. "url" : "https://lists.apache.org/thread.html/rf603d25213cfff81d6727c259328846b366fd32a43107637527c9768@%3Cissues.hbase.apache.org%3E",
  72262. "name" : "[hbase-issues] 20210302 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72263. "refsource" : "MLIST",
  72264. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72265. }, {
  72266. "url" : "https://lists.apache.org/thread.html/r6990c849aeafe65366794bfd002febd47b7ffa8cf3c059b400bbb11d@%3Cissues.hbase.apache.org%3E",
  72267. "name" : "[hbase-issues] 20210302 [jira] [Updated] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72268. "refsource" : "MLIST",
  72269. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72270. }, {
  72271. "url" : "https://lists.apache.org/thread.html/r298a25228868ebc0943d56c8f3641212a0962d2dbcf1507d5860038e@%3Cissues.hbase.apache.org%3E",
  72272. "name" : "[hbase-issues] 20210302 [GitHub] [hbase] Apache9 commented on a change in pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72273. "refsource" : "MLIST",
  72274. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72275. }, {
  72276. "url" : "https://lists.apache.org/thread.html/rf741d08c7e0ab1542c81ea718467422bd01159ed284796a36ad88311@%3Cissues.hbase.apache.org%3E",
  72277. "name" : "[hbase-issues] 20210302 [GitHub] [hbase] pankaj72981 commented on a change in pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72278. "refsource" : "MLIST",
  72279. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72280. }, {
  72281. "url" : "https://lists.apache.org/thread.html/r278e96edc4bc13efb2cb1620a73e48f569162b833c6bda3e6ea18b80@%3Cissues.hbase.apache.org%3E",
  72282. "name" : "[hbase-issues] 20210303 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72283. "refsource" : "MLIST",
  72284. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72285. }, {
  72286. "url" : "https://lists.apache.org/thread.html/r421a9a76811c1aed7637b5fe5376ab14c09ccdd7b70d5211d6e76d1e@%3Cissues.hbase.apache.org%3E",
  72287. "name" : "[hbase-issues] 20210308 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72288. "refsource" : "MLIST",
  72289. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72290. }, {
  72291. "url" : "https://lists.apache.org/thread.html/r1fb2d26b81c64ce96c4fd42b9e6842ff315b02c36518213b6c057350@%3Cissues.hbase.apache.org%3E",
  72292. "name" : "[hbase-issues] 20210309 [GitHub] [hbase] pankaj72981 commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72293. "refsource" : "MLIST",
  72294. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72295. }, {
  72296. "url" : "https://lists.apache.org/thread.html/r286e9a13d3ab0550042997219101cb87871834b8d5ec293b0c60f009@%3Cissues.hbase.apache.org%3E",
  72297. "name" : "[hbase-issues] 20210310 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72298. "refsource" : "MLIST",
  72299. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72300. }, {
  72301. "url" : "https://lists.apache.org/thread.html/r117d5d2b08d505b69558a2a31b0a1cf8990cd0385060b147e70e76a9@%3Cissues.hbase.apache.org%3E",
  72302. "name" : "[hbase-issues] 20210310 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72303. "refsource" : "MLIST",
  72304. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72305. }, {
  72306. "url" : "https://lists.apache.org/thread.html/r2f6a547f226579f542eb08793631d1f2d47d7aed7e2f9d11a4e6af9f@%3Cissues.hbase.apache.org%3E",
  72307. "name" : "[hbase-issues] 20210311 [GitHub] [hbase] Apache-HBase commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72308. "refsource" : "MLIST",
  72309. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72310. }, {
  72311. "url" : "https://lists.apache.org/thread.html/r449288f6a941a2585262e0f4454fdefe169d5faee33314f6f89fab30@%3Cissues.hbase.apache.org%3E",
  72312. "name" : "[hbase-issues] 20210311 [GitHub] [hbase] pankaj72981 opened a new pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72313. "refsource" : "MLIST",
  72314. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72315. }, {
  72316. "url" : "https://lists.apache.org/thread.html/r01b34416677f1ba869525e1b891ac66fa6f88c024ee4d7cdea6b456b@%3Cissues.hbase.apache.org%3E",
  72317. "name" : "[hbase-issues] 20210311 [GitHub] [hbase] pankaj72981 commented on pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72318. "refsource" : "MLIST",
  72319. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72320. }, {
  72321. "url" : "https://lists.apache.org/thread.html/r3550b61639688e0efbc253c6c3e6358851c1f053109f1c149330b535@%3Cissues.hbase.apache.org%3E",
  72322. "name" : "[hbase-issues] 20210311 [GitHub] [hbase] pankaj72981 closed pull request #2958: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72323. "refsource" : "MLIST",
  72324. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72325. }, {
  72326. "url" : "https://lists.apache.org/thread.html/r890b8ec5203d70a59a6b1289420d46938d9029ed706aa724978789be@%3Cissues.hbase.apache.org%3E",
  72327. "name" : "[hbase-issues] 20210311 [GitHub] [hbase] Apache-HBase commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72328. "refsource" : "MLIST",
  72329. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72330. }, {
  72331. "url" : "https://lists.apache.org/thread.html/r2ed66a3823990306b742b281af1834b9bc85f98259c870b8ffb13d93@%3Cissues.hbase.apache.org%3E",
  72332. "name" : "[hbase-issues] 20210312 [GitHub] [hbase] pankaj72981 commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72333. "refsource" : "MLIST",
  72334. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72335. }, {
  72336. "url" : "https://lists.apache.org/thread.html/r587b4a5bcbc290269df0906bafba074f3fe4e50d4e959212f56fa7ea@%3Cissues.hbase.apache.org%3E",
  72337. "name" : "[hbase-issues] 20210312 [GitHub] [hbase] Apache-HBase commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72338. "refsource" : "MLIST",
  72339. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72340. }, {
  72341. "url" : "https://lists.apache.org/thread.html/rcdf62ecd36e39e4ff9c61802eee4927ce9ecff1602eed1493977ef4c@%3Cuser.thrift.apache.org%3E",
  72342. "name" : "[thrift-user] 20210312 Thrift 0.13 micro for CVE-2020-13949?",
  72343. "refsource" : "MLIST",
  72344. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72345. }, {
  72346. "url" : "https://lists.apache.org/thread.html/r1504886a550426d3c05772c47b1a6350c3235e51fd1fdffbec43e974@%3Cuser.thrift.apache.org%3E",
  72347. "name" : "[thrift-user] 20210312 RE: Thrift 0.13 micro for CVE-2020-13949?",
  72348. "refsource" : "MLIST",
  72349. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72350. }, {
  72351. "url" : "https://lists.apache.org/thread.html/rf65df763f630163a3f620887efec082080555cee1adb0b8eaf2c7ddb@%3Cissues.hbase.apache.org%3E",
  72352. "name" : "[hbase-issues] 20210315 [GitHub] [hbase] saintstack commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72353. "refsource" : "MLIST",
  72354. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72355. }, {
  72356. "url" : "https://lists.apache.org/thread.html/rdc8e0f92d06decaee5db58de4ded16d80016a7db2240a8db17225c49@%3Cissues.hbase.apache.org%3E",
  72357. "name" : "[hbase-issues] 20210315 [GitHub] [hbase] Apache-HBase commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72358. "refsource" : "MLIST",
  72359. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72360. }, {
  72361. "url" : "https://lists.apache.org/thread.html/r191a9279e2863b68e5496ee4ecd8be0d4fe43b324b934f0d1f106e1d@%3Cissues.hbase.apache.org%3E",
  72362. "name" : "[hbase-issues] 20210316 [GitHub] [hbase] pankaj72981 commented on pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72363. "refsource" : "MLIST",
  72364. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72365. }, {
  72366. "url" : "https://lists.apache.org/thread.html/r0372f0af2dad0b76fbd7a6cfdaad29d50384ad48dda475a5026ff9a3@%3Cissues.hbase.apache.org%3E",
  72367. "name" : "[hbase-issues] 20210316 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72368. "refsource" : "MLIST",
  72369. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72370. }, {
  72371. "url" : "https://lists.apache.org/thread.html/r850522c56c05aa06391546bdb530bb8fc3437f2b77d16e571ae73309@%3Cissues.hbase.apache.org%3E",
  72372. "name" : "[hbase-issues] 20210316 [GitHub] [hbase] pankaj72981 merged pull request #3043: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72373. "refsource" : "MLIST",
  72374. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72375. }, {
  72376. "url" : "https://lists.apache.org/thread.html/r02ba8db500d15a5949e9a7742815438002ba1cf1b361bdda52ed40ca@%3Cissues.hbase.apache.org%3E",
  72377. "name" : "[hbase-issues] 20210317 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72378. "refsource" : "MLIST",
  72379. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72380. }, {
  72381. "url" : "https://lists.apache.org/thread.html/r3e31ec7e8c39db7553be4f4fd4d27cf27c41f1ba9c985995c4ea9c5a@%3Cnotifications.thrift.apache.org%3E",
  72382. "name" : "[thrift-notifications] 20210317 [GitHub] [thrift] cyril867 edited a comment on pull request #2208: THRIFT-5237 Implement MAX_MESSAGE_SIZE and consolidate limits into a TConfiguration class (c_glib)",
  72383. "refsource" : "MLIST",
  72384. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72385. }, {
  72386. "url" : "https://lists.apache.org/thread.html/r3f97dbbbb1b2a7324521208bb595392853714e141a37b8f68d395835@%3Cnotifications.thrift.apache.org%3E",
  72387. "name" : "[thrift-notifications] 20210317 [GitHub] [thrift] cyril867 commented on pull request #2208: THRIFT-5237 Implement MAX_MESSAGE_SIZE and consolidate limits into a TConfiguration class (c_glib)",
  72388. "refsource" : "MLIST",
  72389. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72390. }, {
  72391. "url" : "https://lists.apache.org/thread.html/r8dfbefcd606af6737b62461a45a9af9222040b62eab474ff2287cf75@%3Cissues.hbase.apache.org%3E",
  72392. "name" : "[hbase-issues] 20210318 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72393. "refsource" : "MLIST",
  72394. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72395. }, {
  72396. "url" : "https://lists.apache.org/thread.html/r668aed02e287c93403e0b8df16089011ee4a96afc8f479809f1fc07f@%3Cissues.hbase.apache.org%3E",
  72397. "name" : "[hbase-issues] 20210319 [jira] [Comment Edited] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72398. "refsource" : "MLIST",
  72399. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72400. }, {
  72401. "url" : "https://lists.apache.org/thread.html/ra7371efd8363c1cd0f5331aafd359a808cf7277472b8616d7b392128@%3Cissues.hbase.apache.org%3E",
  72402. "name" : "[hbase-issues] 20210319 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72403. "refsource" : "MLIST",
  72404. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72405. }, {
  72406. "url" : "https://lists.apache.org/thread.html/rf568168e7f83871969928c0379813da6d034485f8b20fa73884816d6@%3Cissues.hbase.apache.org%3E",
  72407. "name" : "[hbase-issues] 20210320 RE: [jira] [Work started] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72408. "refsource" : "MLIST",
  72409. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72410. }, {
  72411. "url" : "https://lists.apache.org/thread.html/r18732bb1343894143d68db58fe4c8f56d9cd221b37f1378ed7373372@%3Cissues.hbase.apache.org%3E",
  72412. "name" : "[hbase-issues] 20210324 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72413. "refsource" : "MLIST",
  72414. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72415. }, {
  72416. "url" : "https://lists.apache.org/thread.html/rc896ce7761999b088f3adabcb99dde2102b6a66130b8eec6c8265eab@%3Cissues.hbase.apache.org%3E",
  72417. "name" : "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949",
  72418. "refsource" : "MLIST",
  72419. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72420. }, {
  72421. "url" : "https://lists.apache.org/thread.html/rc7a79b08822337c68705f16ee7ddcfd352313b836e78a4b86c7a7e3d@%3Cissues.hbase.apache.org%3E",
  72422. "name" : "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3084: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.4)",
  72423. "refsource" : "MLIST",
  72424. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72425. }, {
  72426. "url" : "https://lists.apache.org/thread.html/r6c5b7324274fd361b038c5cc316e99344b7ae20beae7163214fac14d@%3Cissues.hbase.apache.org%3E",
  72427. "name" : "[hbase-issues] 20210324 [GitHub] [hbase] Apache-HBase commented on pull request #3084: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.4)",
  72428. "refsource" : "MLIST",
  72429. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72430. }, {
  72431. "url" : "https://lists.apache.org/thread.html/rae95c2234b6644bfd666b2671a1b42a09f38514d0f27cca3c7d5d55a@%3Cissues.hbase.apache.org%3E",
  72432. "name" : "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3085: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.3)",
  72433. "refsource" : "MLIST",
  72434. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72435. }, {
  72436. "url" : "https://lists.apache.org/thread.html/race178e9500ab8a5a6112667d27c48559150cadb60f2814bc67c40af@%3Cissues.hbase.apache.org%3E",
  72437. "name" : "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 opened a new pull request #3086: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.2)",
  72438. "refsource" : "MLIST",
  72439. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72440. }, {
  72441. "url" : "https://lists.apache.org/thread.html/r1456eab5f3768be69436d5b0a68b483eb316eb85eb3ef6eba156a302@%3Cissues.hbase.apache.org%3E",
  72442. "name" : "[hbase-issues] 20210324 [GitHub] [hbase] Apache-HBase commented on pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2)",
  72443. "refsource" : "MLIST",
  72444. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72445. }, {
  72446. "url" : "https://lists.apache.org/thread.html/r3de0e0c26d4bd00dd28cab27fb44fba11d1c1d20275f7cce71393dd1@%3Cissues.hbase.apache.org%3E",
  72447. "name" : "[hbase-issues] 20210324 [GitHub] [hbase] Apache-HBase commented on pull request #3085: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.3)",
  72448. "refsource" : "MLIST",
  72449. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72450. }, {
  72451. "url" : "https://lists.apache.org/thread.html/r7597683cc8b87a31ec864835225a543dad112d7841bf1f17bf7eb8db@%3Cissues.hbase.apache.org%3E",
  72452. "name" : "[hbase-issues] 20210324 [GitHub] [hbase] Apache-HBase commented on pull request #3086: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.2)",
  72453. "refsource" : "MLIST",
  72454. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72455. }, {
  72456. "url" : "https://lists.apache.org/thread.html/rfbb01bb85cdc2022f3b96bdc416dbfcb49a2855b3a340aa88b2e1de9@%3Ccommits.druid.apache.org%3E",
  72457. "name" : "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new issue #11028: Bump Thrift library version",
  72458. "refsource" : "MLIST",
  72459. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72460. }, {
  72461. "url" : "https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E",
  72462. "name" : "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new pull request #11030: Suppress cves",
  72463. "refsource" : "MLIST",
  72464. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72465. }, {
  72466. "url" : "https://lists.apache.org/thread.html/r9b51e7c253cb0989b4c03ed9f4e5f0478e427473357209ccc4d08ebf@%3Cissues.hbase.apache.org%3E",
  72467. "name" : "[hbase-issues] 20210325 [jira] [Updated] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72468. "refsource" : "MLIST",
  72469. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72470. }, {
  72471. "url" : "https://lists.apache.org/thread.html/r1dea91f0562e0a960b45b1c5635b2a47b258b77171334276bcf260a7@%3Cissues.hbase.apache.org%3E",
  72472. "name" : "[hbase-issues] 20210325 [GitHub] [hbase] pankaj72981 commented on pull request #3085: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.3)",
  72473. "refsource" : "MLIST",
  72474. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72475. }, {
  72476. "url" : "https://lists.apache.org/thread.html/rb3574bc1036b577b265be510e6b208f0a5d5d84cd7198347dc8482df@%3Cissues.hbase.apache.org%3E",
  72477. "name" : "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 merged pull request #3084: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.4)",
  72478. "refsource" : "MLIST",
  72479. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72480. }, {
  72481. "url" : "https://lists.apache.org/thread.html/r409e296c890753296c544a74d4de0d4a3ce719207a5878262fa2bd71@%3Ccommits.hbase.apache.org%3E",
  72482. "name" : "[hbase-commits] 20210324 [hbase] branch branch-2.2 updated: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (#3086)",
  72483. "refsource" : "MLIST",
  72484. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72485. }, {
  72486. "url" : "https://lists.apache.org/thread.html/rb44ec04e5a9b1f87fef97bb5f054010cbfaa3b8586472a3a38a16fca@%3Cissues.hbase.apache.org%3E",
  72487. "name" : "[hbase-issues] 20210325 [GitHub] [hbase] pankaj72981 merged pull request #3085: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.3)",
  72488. "refsource" : "MLIST",
  72489. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72490. }, {
  72491. "url" : "https://lists.apache.org/thread.html/r699c031e6921b0ad0f943848e7ba1d0e88c953619d47908618998f76@%3Cissues.hbase.apache.org%3E",
  72492. "name" : "[hbase-issues] 20210324 [GitHub] [hbase] pankaj72981 merged pull request #3086: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2.2)",
  72493. "refsource" : "MLIST",
  72494. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72495. }, {
  72496. "url" : "https://lists.apache.org/thread.html/r74eb88b422421c65514c23cb9c2b2216efb9254317ea1b6a264fe6dc@%3Ccommits.hbase.apache.org%3E",
  72497. "name" : "[hbase-commits] 20210325 [hbase] branch branch-2.3 updated: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (#3085)",
  72498. "refsource" : "MLIST",
  72499. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72500. }, {
  72501. "url" : "https://lists.apache.org/thread.html/rada9d2244a66ede0be29afc5d5f178a209f9988db56b9b845d955741@%3Ccommits.hbase.apache.org%3E",
  72502. "name" : "[hbase-commits] 20210324 [hbase] branch branch-2.4 updated: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (#3084)",
  72503. "refsource" : "MLIST",
  72504. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72505. }, {
  72506. "url" : "https://lists.apache.org/thread.html/rad635e16b300cf434280001ee6ecd2ed2c70987bf16eb862bfa86e02@%3Cissues.hbase.apache.org%3E",
  72507. "name" : "[hbase-issues] 20210325 [GitHub] [hbase] Apache-HBase commented on pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2)",
  72508. "refsource" : "MLIST",
  72509. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72510. }, {
  72511. "url" : "https://lists.apache.org/thread.html/ra3f7f06a1759c8e2985ed24ae2f5483393c744c1956d661adc873f2c@%3Cissues.hbase.apache.org%3E",
  72512. "name" : "[hbase-issues] 20210325 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72513. "refsource" : "MLIST",
  72514. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72515. }, {
  72516. "url" : "https://lists.apache.org/thread.html/rd370fdb419652c5219409b315a6349b07a7e479bd3f151e9a5671774@%3Ccommits.hbase.apache.org%3E",
  72517. "name" : "[hbase-commits] 20210326 [hbase] branch branch-2 updated: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (#3083)",
  72518. "refsource" : "MLIST",
  72519. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72520. }, {
  72521. "url" : "https://lists.apache.org/thread.html/rc48ab5455bdece9a4afab53ca0f1e4f742d5baacb241323454a87b4e@%3Cissues.hbase.apache.org%3E",
  72522. "name" : "[hbase-issues] 20210326 [jira] [Updated] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72523. "refsource" : "MLIST",
  72524. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72525. }, {
  72526. "url" : "https://lists.apache.org/thread.html/r08a7bd19470ef8950d58cc9d9e7b02bc69c43f56c601989a7729cce5@%3Cissues.hbase.apache.org%3E",
  72527. "name" : "[hbase-issues] 20210326 [GitHub] [hbase] pankaj72981 merged pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2)",
  72528. "refsource" : "MLIST",
  72529. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72530. }, {
  72531. "url" : "https://lists.apache.org/thread.html/rdcf00186c34d69826d9c6b1f010136c98b00a586136de0061f7d267e@%3Cissues.hbase.apache.org%3E",
  72532. "name" : "[hbase-issues] 20210326 [GitHub] [hbase] pankaj72981 commented on pull request #3083: HBASE-25568 Upgrade Thrift jar to fix CVE-2020-13949 (branch-2)",
  72533. "refsource" : "MLIST",
  72534. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72535. }, {
  72536. "url" : "https://lists.apache.org/thread.html/r4fa53eacca2ac38904f38dc226caebb3f2f668b2da887f2fd416f4a7@%3Cissues.hbase.apache.org%3E",
  72537. "name" : "[hbase-issues] 20210326 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72538. "refsource" : "MLIST",
  72539. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72540. }, {
  72541. "url" : "https://lists.apache.org/thread.html/ra9f7c755790313e1adb95d29794043fb102029e803daf4212ae18063@%3Cissues.solr.apache.org%3E",
  72542. "name" : "[solr-issues] 20210407 [jira] [Created] (SOLR-15324) High security vulnerability in Apache Thrift - CVE-2020-13949 (+1) bundled within Solr",
  72543. "refsource" : "MLIST",
  72544. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72545. }, {
  72546. "url" : "https://lists.apache.org/thread.html/r13f40151513ff095a44a86556c65597a7e55c00f5e19764a05530266@%3Cissues.hbase.apache.org%3E",
  72547. "name" : "[hbase-issues] 20210415 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
  72548. "refsource" : "MLIST",
  72549. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72550. }, {
  72551. "url" : "https://lists.apache.org/thread.html/r886b6d9a89b6fa0aafbf0a8f8f14351548d6c6f027886a3646dbd075@%3Cissues.solr.apache.org%3E",
  72552. "name" : "[solr-issues] 20210420 [jira] [Commented] (SOLR-15324) High security vulnerability in Apache Thrift - CVE-2020-13949 (+1) bundled within Solr",
  72553. "refsource" : "MLIST",
  72554. "tags" : [ "Mailing List", "Vendor Advisory" ]
  72555. }, {
  72556. "url" : "https://lists.apache.org/thread.html/rb91c32194eb5006f0b0c8bcdbd512c13495a1b277d4d51d45687f036@%3Cissues.solr.apache.org%3E",
  72557. "name" : "[solr-issues] 20210507 [jira] [Updated] (SOLR-15324) High security vulnerability in Apache Thrift - CVE-2020-13949 (+1) bundled within Solr",
  72558. "refsource" : "MLIST",
  72559. "tags" : [ ]
  72560. }, {
  72561. "url" : "https://lists.apache.org/thread.html/r15eed5d21e16a5cce810c1e096ffcffc36cd08c2f78ce2f9b24b4a6a@%3Cissues.hive.apache.org%3E",
  72562. "name" : "[hive-issues] 20210510 [jira] [Assigned] (HIVE-25098) [CVE-2020-13949] Upgrade thrift from 0.13.0 to 0.14.0 due",
  72563. "refsource" : "MLIST",
  72564. "tags" : [ ]
  72565. }, {
  72566. "url" : "https://lists.apache.org/thread.html/rcace846f74ea9e2af2f7c30cef0796724aa74089f109c8029b850163@%3Cdev.hive.apache.org%3E",
  72567. "name" : "[hive-dev] 20210510 [jira] [Created] (HIVE-25098) [CVE-2020-13949] Upgrade thrift from 0.13.0 to 0.14.0 due",
  72568. "refsource" : "MLIST",
  72569. "tags" : [ ]
  72570. }, {
  72571. "url" : "https://lists.apache.org/thread.html/r635133a74fa07ef3331cae49a9a088365922266edd58099a6162a5d3@%3Cissues.hive.apache.org%3E",
  72572. "name" : "[hive-issues] 20210510 [jira] [Updated] (HIVE-25098) [CVE-2020-13949] Upgrade thrift from 0.13.0 to 0.14.0",
  72573. "refsource" : "MLIST",
  72574. "tags" : [ ]
  72575. } ]
  72576. },
  72577. "description" : {
  72578. "description_data" : [ {
  72579. "lang" : "en",
  72580. "value" : "In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service."
  72581. } ]
  72582. }
  72583. },
  72584. "configurations" : {
  72585. "CVE_data_version" : "4.0",
  72586. "nodes" : [ {
  72587. "operator" : "OR",
  72588. "children" : [ ],
  72589. "cpe_match" : [ {
  72590. "vulnerable" : true,
  72591. "cpe23Uri" : "cpe:2.3:a:apache:thrift:*:*:*:*:*:*:*:*",
  72592. "versionStartIncluding" : "0.9.3",
  72593. "versionEndIncluding" : "0.13.0",
  72594. "cpe_name" : [ ]
  72595. } ]
  72596. } ]
  72597. },
  72598. "impact" : {
  72599. "baseMetricV3" : {
  72600. "cvssV3" : {
  72601. "version" : "3.1",
  72602. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  72603. "attackVector" : "NETWORK",
  72604. "attackComplexity" : "LOW",
  72605. "privilegesRequired" : "NONE",
  72606. "userInteraction" : "NONE",
  72607. "scope" : "UNCHANGED",
  72608. "confidentialityImpact" : "NONE",
  72609. "integrityImpact" : "NONE",
  72610. "availabilityImpact" : "HIGH",
  72611. "baseScore" : 7.5,
  72612. "baseSeverity" : "HIGH"
  72613. },
  72614. "exploitabilityScore" : 3.9,
  72615. "impactScore" : 3.6
  72616. },
  72617. "baseMetricV2" : {
  72618. "cvssV2" : {
  72619. "version" : "2.0",
  72620. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  72621. "accessVector" : "NETWORK",
  72622. "accessComplexity" : "LOW",
  72623. "authentication" : "NONE",
  72624. "confidentialityImpact" : "NONE",
  72625. "integrityImpact" : "NONE",
  72626. "availabilityImpact" : "PARTIAL",
  72627. "baseScore" : 5.0
  72628. },
  72629. "severity" : "MEDIUM",
  72630. "exploitabilityScore" : 10.0,
  72631. "impactScore" : 2.9,
  72632. "acInsufInfo" : false,
  72633. "obtainAllPrivilege" : false,
  72634. "obtainUserPrivilege" : false,
  72635. "obtainOtherPrivilege" : false,
  72636. "userInteractionRequired" : false
  72637. }
  72638. },
  72639. "publishedDate" : "2021-02-12T20:15Z",
  72640. "lastModifiedDate" : "2021-05-10T13:15Z"
  72641. }, {
  72642. "cve" : {
  72643. "data_type" : "CVE",
  72644. "data_format" : "MITRE",
  72645. "data_version" : "4.0",
  72646. "CVE_data_meta" : {
  72647. "ID" : "CVE-2019-19005",
  72648. "ASSIGNER" : "cve@mitre.org"
  72649. },
  72650. "problemtype" : {
  72651. "problemtype_data" : [ {
  72652. "description" : [ {
  72653. "lang" : "en",
  72654. "value" : "CWE-415"
  72655. } ]
  72656. } ]
  72657. },
  72658. "references" : {
  72659. "reference_data" : [ {
  72660. "url" : "https://github.com/autotrace/autotrace/commits/master",
  72661. "name" : "https://github.com/autotrace/autotrace/commits/master",
  72662. "refsource" : "MISC",
  72663. "tags" : [ "Patch", "Third Party Advisory" ]
  72664. }, {
  72665. "url" : "https://github.com/autotrace/autotrace/pull/40",
  72666. "name" : "https://github.com/autotrace/autotrace/pull/40",
  72667. "refsource" : "CONFIRM",
  72668. "tags" : [ "Patch", "Third Party Advisory" ]
  72669. }, {
  72670. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC6MUH2RLVEA634LHBNZ2KO7MQKI2RDZ/",
  72671. "name" : "FEDORA-2021-cb871c9e6c",
  72672. "refsource" : "FEDORA",
  72673. "tags" : [ ]
  72674. } ]
  72675. },
  72676. "description" : {
  72677. "description_data" : [ {
  72678. "lang" : "en",
  72679. "value" : "A bitmap double free in main.c in autotrace 0.31.1 allows attackers to cause an unspecified impact via a malformed bitmap image. This may occur after the use-after-free in CVE-2017-9182."
  72680. } ]
  72681. }
  72682. },
  72683. "configurations" : {
  72684. "CVE_data_version" : "4.0",
  72685. "nodes" : [ {
  72686. "operator" : "OR",
  72687. "children" : [ ],
  72688. "cpe_match" : [ {
  72689. "vulnerable" : true,
  72690. "cpe23Uri" : "cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*",
  72691. "cpe_name" : [ ]
  72692. } ]
  72693. } ]
  72694. },
  72695. "impact" : {
  72696. "baseMetricV3" : {
  72697. "cvssV3" : {
  72698. "version" : "3.1",
  72699. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  72700. "attackVector" : "LOCAL",
  72701. "attackComplexity" : "LOW",
  72702. "privilegesRequired" : "NONE",
  72703. "userInteraction" : "REQUIRED",
  72704. "scope" : "UNCHANGED",
  72705. "confidentialityImpact" : "HIGH",
  72706. "integrityImpact" : "HIGH",
  72707. "availabilityImpact" : "HIGH",
  72708. "baseScore" : 7.8,
  72709. "baseSeverity" : "HIGH"
  72710. },
  72711. "exploitabilityScore" : 1.8,
  72712. "impactScore" : 5.9
  72713. },
  72714. "baseMetricV2" : {
  72715. "cvssV2" : {
  72716. "version" : "2.0",
  72717. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  72718. "accessVector" : "NETWORK",
  72719. "accessComplexity" : "MEDIUM",
  72720. "authentication" : "NONE",
  72721. "confidentialityImpact" : "PARTIAL",
  72722. "integrityImpact" : "PARTIAL",
  72723. "availabilityImpact" : "PARTIAL",
  72724. "baseScore" : 6.8
  72725. },
  72726. "severity" : "MEDIUM",
  72727. "exploitabilityScore" : 8.6,
  72728. "impactScore" : 6.4,
  72729. "acInsufInfo" : false,
  72730. "obtainAllPrivilege" : false,
  72731. "obtainUserPrivilege" : false,
  72732. "obtainOtherPrivilege" : false,
  72733. "userInteractionRequired" : true
  72734. }
  72735. },
  72736. "publishedDate" : "2021-02-11T21:15Z",
  72737. "lastModifiedDate" : "2021-05-10T03:15Z"
  72738. }, {
  72739. "cve" : {
  72740. "data_type" : "CVE",
  72741. "data_format" : "MITRE",
  72742. "data_version" : "4.0",
  72743. "CVE_data_meta" : {
  72744. "ID" : "CVE-2019-19004",
  72745. "ASSIGNER" : "cve@mitre.org"
  72746. },
  72747. "problemtype" : {
  72748. "problemtype_data" : [ {
  72749. "description" : [ {
  72750. "lang" : "en",
  72751. "value" : "CWE-190"
  72752. } ]
  72753. } ]
  72754. },
  72755. "references" : {
  72756. "reference_data" : [ {
  72757. "url" : "https://github.com/autotrace/autotrace/commits/master",
  72758. "name" : "https://github.com/autotrace/autotrace/commits/master",
  72759. "refsource" : "MISC",
  72760. "tags" : [ "Patch", "Third Party Advisory" ]
  72761. }, {
  72762. "url" : "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c",
  72763. "name" : "https://github.com/autotrace/autotrace/commits/master/src/input-bmp.c",
  72764. "refsource" : "MISC",
  72765. "tags" : [ "Patch", "Third Party Advisory" ]
  72766. }, {
  72767. "url" : "https://github.com/autotrace/autotrace/pull/40",
  72768. "name" : "https://github.com/autotrace/autotrace/pull/40",
  72769. "refsource" : "CONFIRM",
  72770. "tags" : [ "Patch", "Third Party Advisory" ]
  72771. }, {
  72772. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC6MUH2RLVEA634LHBNZ2KO7MQKI2RDZ/",
  72773. "name" : "FEDORA-2021-cb871c9e6c",
  72774. "refsource" : "FEDORA",
  72775. "tags" : [ ]
  72776. } ]
  72777. },
  72778. "description" : {
  72779. "description_data" : [ {
  72780. "lang" : "en",
  72781. "value" : "A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image."
  72782. } ]
  72783. }
  72784. },
  72785. "configurations" : {
  72786. "CVE_data_version" : "4.0",
  72787. "nodes" : [ {
  72788. "operator" : "OR",
  72789. "children" : [ ],
  72790. "cpe_match" : [ {
  72791. "vulnerable" : true,
  72792. "cpe23Uri" : "cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*",
  72793. "cpe_name" : [ ]
  72794. } ]
  72795. } ]
  72796. },
  72797. "impact" : {
  72798. "baseMetricV3" : {
  72799. "cvssV3" : {
  72800. "version" : "3.1",
  72801. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
  72802. "attackVector" : "LOCAL",
  72803. "attackComplexity" : "LOW",
  72804. "privilegesRequired" : "NONE",
  72805. "userInteraction" : "REQUIRED",
  72806. "scope" : "UNCHANGED",
  72807. "confidentialityImpact" : "NONE",
  72808. "integrityImpact" : "NONE",
  72809. "availabilityImpact" : "LOW",
  72810. "baseScore" : 3.3,
  72811. "baseSeverity" : "LOW"
  72812. },
  72813. "exploitabilityScore" : 1.8,
  72814. "impactScore" : 1.4
  72815. },
  72816. "baseMetricV2" : {
  72817. "cvssV2" : {
  72818. "version" : "2.0",
  72819. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  72820. "accessVector" : "NETWORK",
  72821. "accessComplexity" : "MEDIUM",
  72822. "authentication" : "NONE",
  72823. "confidentialityImpact" : "NONE",
  72824. "integrityImpact" : "NONE",
  72825. "availabilityImpact" : "PARTIAL",
  72826. "baseScore" : 4.3
  72827. },
  72828. "severity" : "MEDIUM",
  72829. "exploitabilityScore" : 8.6,
  72830. "impactScore" : 2.9,
  72831. "acInsufInfo" : false,
  72832. "obtainAllPrivilege" : false,
  72833. "obtainUserPrivilege" : false,
  72834. "obtainOtherPrivilege" : false,
  72835. "userInteractionRequired" : true
  72836. }
  72837. },
  72838. "publishedDate" : "2021-02-11T21:15Z",
  72839. "lastModifiedDate" : "2021-05-10T03:15Z"
  72840. }, {
  72841. "cve" : {
  72842. "data_type" : "CVE",
  72843. "data_format" : "MITRE",
  72844. "data_version" : "4.0",
  72845. "CVE_data_meta" : {
  72846. "ID" : "CVE-2021-22881",
  72847. "ASSIGNER" : "cve-assignments@hackerone.com"
  72848. },
  72849. "problemtype" : {
  72850. "problemtype_data" : [ {
  72851. "description" : [ {
  72852. "lang" : "en",
  72853. "value" : "CWE-601"
  72854. } ]
  72855. } ]
  72856. },
  72857. "references" : {
  72858. "reference_data" : [ {
  72859. "url" : "https://hackerone.com/reports/1047447",
  72860. "name" : "https://hackerone.com/reports/1047447",
  72861. "refsource" : "MISC",
  72862. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  72863. }, {
  72864. "url" : "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130",
  72865. "name" : "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130",
  72866. "refsource" : "MISC",
  72867. "tags" : [ "Mitigation", "Patch", "Vendor Advisory" ]
  72868. }, {
  72869. "url" : "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/",
  72870. "name" : "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/",
  72871. "refsource" : "MISC",
  72872. "tags" : [ "Patch", "Third Party Advisory" ]
  72873. }, {
  72874. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/",
  72875. "name" : "FEDORA-2021-b571fca1b8",
  72876. "refsource" : "FEDORA",
  72877. "tags" : [ "Mailing List", "Third Party Advisory" ]
  72878. }, {
  72879. "url" : "http://www.openwall.com/lists/oss-security/2021/05/05/2",
  72880. "name" : "[oss-security] 20210505 [CVE-2021-22903] Possible Open Redirect Vulnerability in Action Pack",
  72881. "refsource" : "MLIST",
  72882. "tags" : [ ]
  72883. } ]
  72884. },
  72885. "description" : {
  72886. "description_data" : [ {
  72887. "lang" : "en",
  72888. "value" : "The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website."
  72889. } ]
  72890. }
  72891. },
  72892. "configurations" : {
  72893. "CVE_data_version" : "4.0",
  72894. "nodes" : [ {
  72895. "operator" : "OR",
  72896. "children" : [ ],
  72897. "cpe_match" : [ {
  72898. "vulnerable" : true,
  72899. "cpe23Uri" : "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
  72900. "versionStartIncluding" : "6.0.0",
  72901. "versionEndExcluding" : "6.0.3.5",
  72902. "cpe_name" : [ ]
  72903. }, {
  72904. "vulnerable" : true,
  72905. "cpe23Uri" : "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
  72906. "versionStartIncluding" : "6.1.0",
  72907. "versionEndExcluding" : "6.1.2.1",
  72908. "cpe_name" : [ ]
  72909. } ]
  72910. }, {
  72911. "operator" : "OR",
  72912. "children" : [ ],
  72913. "cpe_match" : [ {
  72914. "vulnerable" : true,
  72915. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  72916. "cpe_name" : [ ]
  72917. } ]
  72918. } ]
  72919. },
  72920. "impact" : {
  72921. "baseMetricV3" : {
  72922. "cvssV3" : {
  72923. "version" : "3.1",
  72924. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  72925. "attackVector" : "NETWORK",
  72926. "attackComplexity" : "LOW",
  72927. "privilegesRequired" : "NONE",
  72928. "userInteraction" : "REQUIRED",
  72929. "scope" : "CHANGED",
  72930. "confidentialityImpact" : "LOW",
  72931. "integrityImpact" : "LOW",
  72932. "availabilityImpact" : "NONE",
  72933. "baseScore" : 6.1,
  72934. "baseSeverity" : "MEDIUM"
  72935. },
  72936. "exploitabilityScore" : 2.8,
  72937. "impactScore" : 2.7
  72938. },
  72939. "baseMetricV2" : {
  72940. "cvssV2" : {
  72941. "version" : "2.0",
  72942. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:N",
  72943. "accessVector" : "NETWORK",
  72944. "accessComplexity" : "MEDIUM",
  72945. "authentication" : "NONE",
  72946. "confidentialityImpact" : "PARTIAL",
  72947. "integrityImpact" : "PARTIAL",
  72948. "availabilityImpact" : "NONE",
  72949. "baseScore" : 5.8
  72950. },
  72951. "severity" : "MEDIUM",
  72952. "exploitabilityScore" : 8.6,
  72953. "impactScore" : 4.9,
  72954. "acInsufInfo" : false,
  72955. "obtainAllPrivilege" : false,
  72956. "obtainUserPrivilege" : false,
  72957. "obtainOtherPrivilege" : false,
  72958. "userInteractionRequired" : true
  72959. }
  72960. },
  72961. "publishedDate" : "2021-02-11T18:15Z",
  72962. "lastModifiedDate" : "2021-05-06T14:15Z"
  72963. }, {
  72964. "cve" : {
  72965. "data_type" : "CVE",
  72966. "data_format" : "MITRE",
  72967. "data_version" : "4.0",
  72968. "CVE_data_meta" : {
  72969. "ID" : "CVE-2021-26676",
  72970. "ASSIGNER" : "cve@mitre.org"
  72971. },
  72972. "problemtype" : {
  72973. "problemtype_data" : [ {
  72974. "description" : [ {
  72975. "lang" : "en",
  72976. "value" : "NVD-CWE-noinfo"
  72977. } ]
  72978. } ]
  72979. },
  72980. "references" : {
  72981. "reference_data" : [ {
  72982. "url" : "https://www.openwall.com/lists/oss-security/2021/02/08/2",
  72983. "name" : "https://www.openwall.com/lists/oss-security/2021/02/08/2",
  72984. "refsource" : "MISC",
  72985. "tags" : [ "Mailing List", "Third Party Advisory" ]
  72986. }, {
  72987. "url" : "https://bugzilla.suse.com/show_bug.cgi?id=1181751",
  72988. "name" : "https://bugzilla.suse.com/show_bug.cgi?id=1181751",
  72989. "refsource" : "MISC",
  72990. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  72991. }, {
  72992. "url" : "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog",
  72993. "name" : "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog",
  72994. "refsource" : "CONFIRM",
  72995. "tags" : [ "Release Notes", "Third Party Advisory" ]
  72996. }, {
  72997. "url" : "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=58d397ba74873384aee449690a9070bacd5676fa",
  72998. "name" : "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=58d397ba74873384aee449690a9070bacd5676fa",
  72999. "refsource" : "CONFIRM",
  73000. "tags" : [ "Patch", "Third Party Advisory" ]
  73001. }, {
  73002. "url" : "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=a74524b3e3fad81b0fd1084ffdf9f2ea469cd9b1",
  73003. "name" : "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=a74524b3e3fad81b0fd1084ffdf9f2ea469cd9b1",
  73004. "refsource" : "CONFIRM",
  73005. "tags" : [ "Patch", "Third Party Advisory" ]
  73006. }, {
  73007. "url" : "https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html",
  73008. "name" : "[debian-lts-announce] 20210209 [SECURITY] [DLA 2552-1] connman security update",
  73009. "refsource" : "MLIST",
  73010. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73011. }, {
  73012. "url" : "https://www.debian.org/security/2021/dsa-4847",
  73013. "name" : "DSA-4847",
  73014. "refsource" : "DEBIAN",
  73015. "tags" : [ "Third Party Advisory" ]
  73016. }, {
  73017. "url" : "https://kunnamon.io/tbone/",
  73018. "name" : "https://kunnamon.io/tbone/",
  73019. "refsource" : "MISC",
  73020. "tags" : [ ]
  73021. } ]
  73022. },
  73023. "description" : {
  73024. "description_data" : [ {
  73025. "lang" : "en",
  73026. "value" : "gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp."
  73027. } ]
  73028. }
  73029. },
  73030. "configurations" : {
  73031. "CVE_data_version" : "4.0",
  73032. "nodes" : [ {
  73033. "operator" : "OR",
  73034. "children" : [ ],
  73035. "cpe_match" : [ {
  73036. "vulnerable" : true,
  73037. "cpe23Uri" : "cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:*",
  73038. "versionEndExcluding" : "1.39",
  73039. "cpe_name" : [ ]
  73040. } ]
  73041. }, {
  73042. "operator" : "OR",
  73043. "children" : [ ],
  73044. "cpe_match" : [ {
  73045. "vulnerable" : true,
  73046. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  73047. "cpe_name" : [ ]
  73048. }, {
  73049. "vulnerable" : true,
  73050. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  73051. "cpe_name" : [ ]
  73052. } ]
  73053. }, {
  73054. "operator" : "OR",
  73055. "children" : [ ],
  73056. "cpe_match" : [ {
  73057. "vulnerable" : true,
  73058. "cpe23Uri" : "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
  73059. "cpe_name" : [ ]
  73060. } ]
  73061. } ]
  73062. },
  73063. "impact" : {
  73064. "baseMetricV3" : {
  73065. "cvssV3" : {
  73066. "version" : "3.1",
  73067. "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  73068. "attackVector" : "ADJACENT_NETWORK",
  73069. "attackComplexity" : "LOW",
  73070. "privilegesRequired" : "NONE",
  73071. "userInteraction" : "NONE",
  73072. "scope" : "UNCHANGED",
  73073. "confidentialityImpact" : "HIGH",
  73074. "integrityImpact" : "NONE",
  73075. "availabilityImpact" : "NONE",
  73076. "baseScore" : 6.5,
  73077. "baseSeverity" : "MEDIUM"
  73078. },
  73079. "exploitabilityScore" : 2.8,
  73080. "impactScore" : 3.6
  73081. },
  73082. "baseMetricV2" : {
  73083. "cvssV2" : {
  73084. "version" : "2.0",
  73085. "vectorString" : "AV:A/AC:L/Au:N/C:P/I:N/A:N",
  73086. "accessVector" : "ADJACENT_NETWORK",
  73087. "accessComplexity" : "LOW",
  73088. "authentication" : "NONE",
  73089. "confidentialityImpact" : "PARTIAL",
  73090. "integrityImpact" : "NONE",
  73091. "availabilityImpact" : "NONE",
  73092. "baseScore" : 3.3
  73093. },
  73094. "severity" : "LOW",
  73095. "exploitabilityScore" : 6.5,
  73096. "impactScore" : 2.9,
  73097. "acInsufInfo" : false,
  73098. "obtainAllPrivilege" : false,
  73099. "obtainUserPrivilege" : false,
  73100. "obtainOtherPrivilege" : false,
  73101. "userInteractionRequired" : false
  73102. }
  73103. },
  73104. "publishedDate" : "2021-02-09T16:15Z",
  73105. "lastModifiedDate" : "2021-05-05T14:15Z"
  73106. }, {
  73107. "cve" : {
  73108. "data_type" : "CVE",
  73109. "data_format" : "MITRE",
  73110. "data_version" : "4.0",
  73111. "CVE_data_meta" : {
  73112. "ID" : "CVE-2021-26675",
  73113. "ASSIGNER" : "cve@mitre.org"
  73114. },
  73115. "problemtype" : {
  73116. "problemtype_data" : [ {
  73117. "description" : [ {
  73118. "lang" : "en",
  73119. "value" : "CWE-787"
  73120. } ]
  73121. } ]
  73122. },
  73123. "references" : {
  73124. "reference_data" : [ {
  73125. "url" : "https://www.openwall.com/lists/oss-security/2021/02/08/2",
  73126. "name" : "https://www.openwall.com/lists/oss-security/2021/02/08/2",
  73127. "refsource" : "MISC",
  73128. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73129. }, {
  73130. "url" : "https://bugzilla.suse.com/show_bug.cgi?id=1181751",
  73131. "name" : "https://bugzilla.suse.com/show_bug.cgi?id=1181751",
  73132. "refsource" : "MISC",
  73133. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  73134. }, {
  73135. "url" : "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog",
  73136. "name" : "https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog",
  73137. "refsource" : "CONFIRM",
  73138. "tags" : [ "Release Notes", "Third Party Advisory" ]
  73139. }, {
  73140. "url" : "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb",
  73141. "name" : "https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb",
  73142. "refsource" : "CONFIRM",
  73143. "tags" : [ "Patch", "Third Party Advisory" ]
  73144. }, {
  73145. "url" : "https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html",
  73146. "name" : "[debian-lts-announce] 20210209 [SECURITY] [DLA 2552-1] connman security update",
  73147. "refsource" : "MLIST",
  73148. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73149. }, {
  73150. "url" : "https://www.debian.org/security/2021/dsa-4847",
  73151. "name" : "DSA-4847",
  73152. "refsource" : "DEBIAN",
  73153. "tags" : [ "Third Party Advisory" ]
  73154. }, {
  73155. "url" : "https://kunnamon.io/tbone/",
  73156. "name" : "https://kunnamon.io/tbone/",
  73157. "refsource" : "MISC",
  73158. "tags" : [ ]
  73159. } ]
  73160. },
  73161. "description" : {
  73162. "description_data" : [ {
  73163. "lang" : "en",
  73164. "value" : "A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code."
  73165. } ]
  73166. }
  73167. },
  73168. "configurations" : {
  73169. "CVE_data_version" : "4.0",
  73170. "nodes" : [ {
  73171. "operator" : "OR",
  73172. "children" : [ ],
  73173. "cpe_match" : [ {
  73174. "vulnerable" : true,
  73175. "cpe23Uri" : "cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:*",
  73176. "versionEndExcluding" : "1.39",
  73177. "cpe_name" : [ ]
  73178. } ]
  73179. }, {
  73180. "operator" : "OR",
  73181. "children" : [ ],
  73182. "cpe_match" : [ {
  73183. "vulnerable" : true,
  73184. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  73185. "cpe_name" : [ ]
  73186. }, {
  73187. "vulnerable" : true,
  73188. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  73189. "cpe_name" : [ ]
  73190. } ]
  73191. }, {
  73192. "operator" : "OR",
  73193. "children" : [ ],
  73194. "cpe_match" : [ {
  73195. "vulnerable" : true,
  73196. "cpe23Uri" : "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
  73197. "cpe_name" : [ ]
  73198. } ]
  73199. } ]
  73200. },
  73201. "impact" : {
  73202. "baseMetricV3" : {
  73203. "cvssV3" : {
  73204. "version" : "3.1",
  73205. "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  73206. "attackVector" : "ADJACENT_NETWORK",
  73207. "attackComplexity" : "LOW",
  73208. "privilegesRequired" : "NONE",
  73209. "userInteraction" : "NONE",
  73210. "scope" : "UNCHANGED",
  73211. "confidentialityImpact" : "HIGH",
  73212. "integrityImpact" : "HIGH",
  73213. "availabilityImpact" : "HIGH",
  73214. "baseScore" : 8.8,
  73215. "baseSeverity" : "HIGH"
  73216. },
  73217. "exploitabilityScore" : 2.8,
  73218. "impactScore" : 5.9
  73219. },
  73220. "baseMetricV2" : {
  73221. "cvssV2" : {
  73222. "version" : "2.0",
  73223. "vectorString" : "AV:A/AC:L/Au:N/C:P/I:P/A:P",
  73224. "accessVector" : "ADJACENT_NETWORK",
  73225. "accessComplexity" : "LOW",
  73226. "authentication" : "NONE",
  73227. "confidentialityImpact" : "PARTIAL",
  73228. "integrityImpact" : "PARTIAL",
  73229. "availabilityImpact" : "PARTIAL",
  73230. "baseScore" : 5.8
  73231. },
  73232. "severity" : "MEDIUM",
  73233. "exploitabilityScore" : 6.5,
  73234. "impactScore" : 6.4,
  73235. "acInsufInfo" : false,
  73236. "obtainAllPrivilege" : false,
  73237. "obtainUserPrivilege" : false,
  73238. "obtainOtherPrivilege" : false,
  73239. "userInteractionRequired" : false
  73240. }
  73241. },
  73242. "publishedDate" : "2021-02-09T16:15Z",
  73243. "lastModifiedDate" : "2021-05-05T14:15Z"
  73244. }, {
  73245. "cve" : {
  73246. "data_type" : "CVE",
  73247. "data_format" : "MITRE",
  73248. "data_version" : "4.0",
  73249. "CVE_data_meta" : {
  73250. "ID" : "CVE-2020-17523",
  73251. "ASSIGNER" : "security@apache.org"
  73252. },
  73253. "problemtype" : {
  73254. "problemtype_data" : [ {
  73255. "description" : [ {
  73256. "lang" : "en",
  73257. "value" : "CWE-863"
  73258. } ]
  73259. } ]
  73260. },
  73261. "references" : {
  73262. "reference_data" : [ {
  73263. "url" : "https://lists.apache.org/thread.html/rce5943430a6136d37a1f2fc201d245fe094e2727a0bc27e3b2d43a39%40%3Cdev.shiro.apache.org%3E",
  73264. "name" : "https://lists.apache.org/thread.html/rce5943430a6136d37a1f2fc201d245fe094e2727a0bc27e3b2d43a39%40%3Cdev.shiro.apache.org%3E",
  73265. "refsource" : "MISC",
  73266. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73267. }, {
  73268. "url" : "https://lists.apache.org/thread.html/r5b93ddf97e2c4cda779d22fab30539bdec454cfa5baec4ad0ffae235@%3Cgitbox.activemq.apache.org%3E",
  73269. "name" : "[activemq-gitbox] 20210210 [GitHub] [activemq] ehossack-aws opened a new pull request #614: Update shiro to 1.7.1",
  73270. "refsource" : "MLIST",
  73271. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73272. }, {
  73273. "url" : "https://lists.apache.org/thread.html/rd4b613e121438b97e3eb263cac3137caddb1dbd8f648b73a4f1898a6@%3Cissues.activemq.apache.org%3E",
  73274. "name" : "[activemq-issues] 20210301 [jira] [Created] (AMQ-8159) High severity security issues found in Apache Shiro v.1.7.0",
  73275. "refsource" : "MLIST",
  73276. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73277. }, {
  73278. "url" : "https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E",
  73279. "name" : "[shiro-dev] 20210331 Re: Request for assistance to backport CVE-2020-13933 fix",
  73280. "refsource" : "MLIST",
  73281. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73282. }, {
  73283. "url" : "https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E",
  73284. "name" : "[shiro-dev] 20210407 Re: Request for assistance to backport CVE-2020-13933 fix",
  73285. "refsource" : "MLIST",
  73286. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73287. }, {
  73288. "url" : "https://lists.apache.org/thread.html/r679ca97813384bdb1a4c087810ba44d9ad9c7c11583979bb7481d196@%3Cdev.shiro.apache.org%3E",
  73289. "name" : "[shiro-dev] 20210424 Re: Ask help for upgrading Shiro in CDH platform to 1.7.1",
  73290. "refsource" : "MLIST",
  73291. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73292. }, {
  73293. "url" : "https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E",
  73294. "name" : "[activemq-users] 20210427 Release date for ActiveMQ v5.16.2 to fix CVEs",
  73295. "refsource" : "MLIST",
  73296. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73297. }, {
  73298. "url" : "https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E",
  73299. "name" : "[shiro-dev] 20210504 Re: Request for assistance to backport CVE-2020-13933 fix",
  73300. "refsource" : "MLIST",
  73301. "tags" : [ ]
  73302. } ]
  73303. },
  73304. "description" : {
  73305. "description_data" : [ {
  73306. "lang" : "en",
  73307. "value" : "Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass."
  73308. } ]
  73309. }
  73310. },
  73311. "configurations" : {
  73312. "CVE_data_version" : "4.0",
  73313. "nodes" : [ {
  73314. "operator" : "OR",
  73315. "children" : [ ],
  73316. "cpe_match" : [ {
  73317. "vulnerable" : true,
  73318. "cpe23Uri" : "cpe:2.3:a:apache:shiro:*:*:*:*:*:*:*:*",
  73319. "versionEndExcluding" : "1.7.1",
  73320. "cpe_name" : [ ]
  73321. } ]
  73322. } ]
  73323. },
  73324. "impact" : {
  73325. "baseMetricV3" : {
  73326. "cvssV3" : {
  73327. "version" : "3.1",
  73328. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  73329. "attackVector" : "NETWORK",
  73330. "attackComplexity" : "LOW",
  73331. "privilegesRequired" : "NONE",
  73332. "userInteraction" : "NONE",
  73333. "scope" : "UNCHANGED",
  73334. "confidentialityImpact" : "HIGH",
  73335. "integrityImpact" : "HIGH",
  73336. "availabilityImpact" : "HIGH",
  73337. "baseScore" : 9.8,
  73338. "baseSeverity" : "CRITICAL"
  73339. },
  73340. "exploitabilityScore" : 3.9,
  73341. "impactScore" : 5.9
  73342. },
  73343. "baseMetricV2" : {
  73344. "cvssV2" : {
  73345. "version" : "2.0",
  73346. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:C",
  73347. "accessVector" : "NETWORK",
  73348. "accessComplexity" : "LOW",
  73349. "authentication" : "NONE",
  73350. "confidentialityImpact" : "PARTIAL",
  73351. "integrityImpact" : "PARTIAL",
  73352. "availabilityImpact" : "COMPLETE",
  73353. "baseScore" : 9.0
  73354. },
  73355. "severity" : "HIGH",
  73356. "exploitabilityScore" : 10.0,
  73357. "impactScore" : 8.5,
  73358. "acInsufInfo" : false,
  73359. "obtainAllPrivilege" : false,
  73360. "obtainUserPrivilege" : false,
  73361. "obtainOtherPrivilege" : false,
  73362. "userInteractionRequired" : false
  73363. }
  73364. },
  73365. "publishedDate" : "2021-02-03T17:15Z",
  73366. "lastModifiedDate" : "2021-05-05T03:15Z"
  73367. }, {
  73368. "cve" : {
  73369. "data_type" : "CVE",
  73370. "data_format" : "MITRE",
  73371. "data_version" : "4.0",
  73372. "CVE_data_meta" : {
  73373. "ID" : "CVE-2021-25646",
  73374. "ASSIGNER" : "security@apache.org"
  73375. },
  73376. "problemtype" : {
  73377. "problemtype_data" : [ {
  73378. "description" : [ {
  73379. "lang" : "en",
  73380. "value" : "CWE-732"
  73381. } ]
  73382. } ]
  73383. },
  73384. "references" : {
  73385. "reference_data" : [ {
  73386. "url" : "https://lists.apache.org/thread.html/rfda8a3aa6ac06a80c5cbfdeae0fc85f88a5984e32ea05e6dda46f866%40%3Cdev.druid.apache.org%3E",
  73387. "name" : "https://lists.apache.org/thread.html/rfda8a3aa6ac06a80c5cbfdeae0fc85f88a5984e32ea05e6dda46f866%40%3Cdev.druid.apache.org%3E",
  73388. "refsource" : "MISC",
  73389. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73390. }, {
  73391. "url" : "http://www.openwall.com/lists/oss-security/2021/01/29/6",
  73392. "name" : "[oss-security] 20210129 CVE-2021-25646: Authenticated users can override system configurations in their requests which allows them to execute arbitrary code.",
  73393. "refsource" : "MLIST",
  73394. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73395. }, {
  73396. "url" : "https://lists.apache.org/thread.html/r64431c2b97209f566b5dff92415e7afba0ed3bfab4695ebaa8a62e5d@%3Cdev.druid.apache.org%3E",
  73397. "name" : "[druid-dev] 20210129 Re: [druid-user] Re: CVE-2021-25646: Authenticated users can override system configurations in their requests which allows them to execute arbitrary code.",
  73398. "refsource" : "MLIST",
  73399. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73400. }, {
  73401. "url" : "https://lists.apache.org/thread.html/rc167d5e57f3120578718a7a458ce3e73b3830ac4efbb1b085bd06b92@%3Cdev.druid.apache.org%3E",
  73402. "name" : "[druid-dev] 20210129 Re: CVE-2021-25646: Authenticated users can override system configurations in their requests which allows them to execute arbitrary code.",
  73403. "refsource" : "MLIST",
  73404. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73405. }, {
  73406. "url" : "https://lists.apache.org/thread.html/r20e0c3b10ae2c05a3aad40f1476713c45bdefc32c920b9986b941d8f@%3Cannounce.apache.org%3E",
  73407. "name" : "[announce] 20210129 Subject: [CVE-2021-25646] Apache Druid remote code execution vulnerability",
  73408. "refsource" : "MLIST",
  73409. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73410. }, {
  73411. "url" : "https://lists.apache.org/thread.html/r121abe8014d381943b63c60615149d40bde9dc1c868bcee90d0d0848@%3Ccommits.druid.apache.org%3E",
  73412. "name" : "[druid-commits] 20210204 [GitHub] [druid] jihoonson opened a new pull request #10854: [Backport] Fix CVE-2021-25646",
  73413. "refsource" : "MLIST",
  73414. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73415. }, {
  73416. "url" : "https://lists.apache.org/thread.html/rea9436a4063927a567d698431ddae55e760c3f876c22ac5b9813685f@%3Ccommits.druid.apache.org%3E",
  73417. "name" : "[druid-commits] 20210204 [GitHub] [druid] jihoonson commented on pull request #10818: Fix CVE-2021-25646",
  73418. "refsource" : "MLIST",
  73419. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73420. }, {
  73421. "url" : "https://lists.apache.org/thread.html/r04fa1ba93599487c95a8497044d37f8c02a439bfcf92b4567bfb7c8f@%3Ccommits.druid.apache.org%3E",
  73422. "name" : "[druid-commits] 20210204 [GitHub] [druid] jihoonson merged pull request #10854: [Backport] Fix CVE-2021-25646",
  73423. "refsource" : "MLIST",
  73424. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73425. }, {
  73426. "url" : "https://lists.apache.org/thread.html/rfeb775822cd3baef1595b60f6860f5ca849eb1903236483f3297bd5c@%3Ccommits.druid.apache.org%3E",
  73427. "name" : "[druid-commits] 20210204 [druid] branch 0.21.0 updated: Fix CVE-2021-25646 (#10818) (#10854)",
  73428. "refsource" : "MLIST",
  73429. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  73430. }, {
  73431. "url" : "https://lists.apache.org/thread.html/r4f84b542417ea46202867c0a8b3eaf3b4cfed30e09174a52122ba210@%3Ccommits.druid.apache.org%3E",
  73432. "name" : "[druid-commits] 20210204 [GitHub] [druid] jihoonson merged pull request #10818: Fix CVE-2021-25646",
  73433. "refsource" : "MLIST",
  73434. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73435. }, {
  73436. "url" : "https://lists.apache.org/thread.html/ra4225912f501016bc5e0ac44e14b8d6779173a3a1dc7baacaabcc9ba@%3Ccommits.druid.apache.org%3E",
  73437. "name" : "[druid-commits] 20210205 [GitHub] [druid] jihoonson commented on pull request #10818: Fix CVE-2021-25646",
  73438. "refsource" : "MLIST",
  73439. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73440. }, {
  73441. "url" : "https://lists.apache.org/thread.html/r7dff4790e7a5c697fc0360adf11f5aeb31cd6ad80644fffee690673c@%3Ccommits.druid.apache.org%3E",
  73442. "name" : "[druid-commits] 20210205 [GitHub] [druid] jihoonson merged pull request #10818: Fix CVE-2021-25646",
  73443. "refsource" : "MLIST",
  73444. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73445. }, {
  73446. "url" : "https://lists.apache.org/thread.html/r5ef625076982aee7d23c23f07717e626b73f421fba5154d1e4de15e1@%3Ccommits.druid.apache.org%3E",
  73447. "name" : "[druid-commits] 20210205 [GitHub] [druid] jihoonson merged pull request #10854: [Backport] Fix CVE-2021-25646",
  73448. "refsource" : "MLIST",
  73449. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73450. }, {
  73451. "url" : "https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E",
  73452. "name" : "[druid-dev] 20210331 Regarding the 0.21.0 release",
  73453. "refsource" : "MLIST",
  73454. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73455. }, {
  73456. "url" : "https://lists.apache.org/thread.html/r87aa94e28dd21ee2252d30c63f01ab9cb5474ee5bdd98dd8d7d734aa@%3Ccommits.druid.apache.org%3E",
  73457. "name" : "[druid-commits] 20210205 [GitHub] [druid] jihoonson opened a new pull request #10854: [Backport] Fix CVE-2021-25646",
  73458. "refsource" : "MLIST",
  73459. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73460. }, {
  73461. "url" : "http://packetstormsecurity.com/files/162345/Apache-Druid-0.20.0-Remote-Command-Execution.html",
  73462. "name" : "http://packetstormsecurity.com/files/162345/Apache-Druid-0.20.0-Remote-Command-Execution.html",
  73463. "refsource" : "MISC",
  73464. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  73465. } ]
  73466. },
  73467. "description" : {
  73468. "description_data" : [ {
  73469. "lang" : "en",
  73470. "value" : "Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process."
  73471. } ]
  73472. }
  73473. },
  73474. "configurations" : {
  73475. "CVE_data_version" : "4.0",
  73476. "nodes" : [ {
  73477. "operator" : "OR",
  73478. "children" : [ ],
  73479. "cpe_match" : [ {
  73480. "vulnerable" : true,
  73481. "cpe23Uri" : "cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*",
  73482. "versionEndIncluding" : "0.20.0",
  73483. "cpe_name" : [ ]
  73484. } ]
  73485. } ]
  73486. },
  73487. "impact" : {
  73488. "baseMetricV3" : {
  73489. "cvssV3" : {
  73490. "version" : "3.1",
  73491. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  73492. "attackVector" : "NETWORK",
  73493. "attackComplexity" : "LOW",
  73494. "privilegesRequired" : "LOW",
  73495. "userInteraction" : "NONE",
  73496. "scope" : "UNCHANGED",
  73497. "confidentialityImpact" : "HIGH",
  73498. "integrityImpact" : "HIGH",
  73499. "availabilityImpact" : "HIGH",
  73500. "baseScore" : 8.8,
  73501. "baseSeverity" : "HIGH"
  73502. },
  73503. "exploitabilityScore" : 2.8,
  73504. "impactScore" : 5.9
  73505. },
  73506. "baseMetricV2" : {
  73507. "cvssV2" : {
  73508. "version" : "2.0",
  73509. "vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C",
  73510. "accessVector" : "NETWORK",
  73511. "accessComplexity" : "LOW",
  73512. "authentication" : "SINGLE",
  73513. "confidentialityImpact" : "COMPLETE",
  73514. "integrityImpact" : "COMPLETE",
  73515. "availabilityImpact" : "COMPLETE",
  73516. "baseScore" : 9.0
  73517. },
  73518. "severity" : "HIGH",
  73519. "exploitabilityScore" : 8.0,
  73520. "impactScore" : 10.0,
  73521. "acInsufInfo" : false,
  73522. "obtainAllPrivilege" : false,
  73523. "obtainUserPrivilege" : false,
  73524. "obtainOtherPrivilege" : false,
  73525. "userInteractionRequired" : false
  73526. }
  73527. },
  73528. "publishedDate" : "2021-01-29T20:15Z",
  73529. "lastModifiedDate" : "2021-05-05T13:27Z"
  73530. }, {
  73531. "cve" : {
  73532. "data_type" : "CVE",
  73533. "data_format" : "MITRE",
  73534. "data_version" : "4.0",
  73535. "CVE_data_meta" : {
  73536. "ID" : "CVE-2021-26117",
  73537. "ASSIGNER" : "security@apache.org"
  73538. },
  73539. "problemtype" : {
  73540. "problemtype_data" : [ {
  73541. "description" : [ {
  73542. "lang" : "en",
  73543. "value" : "CWE-287"
  73544. } ]
  73545. } ]
  73546. },
  73547. "references" : {
  73548. "reference_data" : [ {
  73549. "url" : "https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3cCAH+vQmMeUEiKN4wYX9nLBbqmFZFPXqajNvBKmzb2V8QZANcSTA@mail.gmail.com%3e",
  73550. "name" : "https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3cCAH+vQmMeUEiKN4wYX9nLBbqmFZFPXqajNvBKmzb2V8QZANcSTA@mail.gmail.com%3e",
  73551. "refsource" : "MISC",
  73552. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73553. }, {
  73554. "url" : "https://lists.apache.org/thread.html/rffa5cd05d01c4c9853b17f3004d80ea6eb8856c422a8545c5f79b1a6@%3Ccommits.activemq.apache.org%3E",
  73555. "name" : "[activemq-commits] 20210128 [activemq-website] branch master updated: CVE-2021-26117 - add mitigation section",
  73556. "refsource" : "MLIST",
  73557. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73558. }, {
  73559. "url" : "https://lists.apache.org/thread.html/re1b98da90a5f2e1c2e2d50e31c12e2578d61fe01c0737f9d0bd8de99@%3Cannounce.apache.org%3E",
  73560. "name" : "[announce] 20210128 CVE-2021-26117: ActiveMQ: LDAP-Authentication does not verify passwords on servers with anonymous bind",
  73561. "refsource" : "MLIST",
  73562. "tags" : [ "Mailing List", "Vendor Advisory" ]
  73563. }, {
  73564. "url" : "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E",
  73565. "name" : "[activemq-commits] 20210208 [activemq-website] branch master updated: Publish CVE-2020-13947",
  73566. "refsource" : "MLIST",
  73567. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  73568. }, {
  73569. "url" : "https://security.netapp.com/advisory/ntap-20210304-0008/",
  73570. "name" : "https://security.netapp.com/advisory/ntap-20210304-0008/",
  73571. "refsource" : "CONFIRM",
  73572. "tags" : [ "Third Party Advisory" ]
  73573. }, {
  73574. "url" : "https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html",
  73575. "name" : "[debian-lts-announce] 20210305 [SECURITY] [DLA 2583-1] activemq security update",
  73576. "refsource" : "MLIST",
  73577. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73578. }, {
  73579. "url" : "https://lists.apache.org/thread.html/r70389648227317bdadcdecbd9f238571a6047469d156bd72bb0ca2f7@%3Cgitbox.activemq.apache.org%3E",
  73580. "name" : "[activemq-gitbox] 20210323 [GitHub] [activemq-artemis] trevorlinton opened a new pull request #3515: Update activmq5 version to fix CVE-2021-26117",
  73581. "refsource" : "MLIST",
  73582. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  73583. }, {
  73584. "url" : "https://lists.apache.org/thread.html/rec93794f8aeddf8a5f1a643d264b4e66b933f06fd72a38f31448f0ac@%3Cgitbox.activemq.apache.org%3E",
  73585. "name" : "[activemq-gitbox] 20210409 [GitHub] [activemq-artemis] brusdev closed pull request #3515: Update activmq5 version to fix CVE-2021-26117",
  73586. "refsource" : "MLIST",
  73587. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73588. }, {
  73589. "url" : "https://lists.apache.org/thread.html/r5899ece90bcae5805ad6142fdb05c58595cff19cb2e98cc58a91f55b@%3Cgitbox.activemq.apache.org%3E",
  73590. "name" : "[activemq-gitbox] 20210409 [GitHub] [activemq-artemis] brusdev commented on pull request #3515: Update activmq5 version to fix CVE-2021-26117",
  73591. "refsource" : "MLIST",
  73592. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73593. }, {
  73594. "url" : "https://lists.apache.org/thread.html/r110cacfa754471361234965ffe851a046e302ff2693b055f49f47b02@%3Cissues.activemq.apache.org%3E",
  73595. "name" : "[activemq-issues] 20210421 [jira] [Created] (AMQ-8245) CVE-2021-26117 on AMQ 5.16.1",
  73596. "refsource" : "MLIST",
  73597. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73598. }, {
  73599. "url" : "https://lists.apache.org/thread.html/r22cdc0fb45e223ac92bc2ceff7af92f1193dfc614c8b248534456229@%3Cissues.activemq.apache.org%3E",
  73600. "name" : "[activemq-issues] 20210421 [jira] [Created] (AMQ-8246) CVE-2021-26117 still exists on 5.16.1",
  73601. "refsource" : "MLIST",
  73602. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73603. }, {
  73604. "url" : "https://lists.apache.org/thread.html/raea451de09baed76950d6a60cc4bb1b74476c505e03205a3c68c9808@%3Cissues.activemq.apache.org%3E",
  73605. "name" : "[activemq-issues] 20210421 [jira] [Created] (AMQ-8244) CVE-2021-26117 on AMQ 5.16.1",
  73606. "refsource" : "MLIST",
  73607. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73608. }, {
  73609. "url" : "https://lists.apache.org/thread.html/rd75600cee29cb248d548edcf6338fe296466d63a69e2ed0afc439ec7@%3Cissues.activemq.apache.org%3E",
  73610. "name" : "[activemq-issues] 20210421 [jira] [Updated] (AMQ-8246) CVE-2021-26117 still exists on 5.16.1",
  73611. "refsource" : "MLIST",
  73612. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73613. }, {
  73614. "url" : "https://lists.apache.org/thread.html/r3341d96d8f956e878fb7b463b08d57ca1d58fec9c970aee929b58e0d@%3Cissues.activemq.apache.org%3E",
  73615. "name" : "[activemq-issues] 20210509 [jira] [Commented] (AMQ-8246) CVE-2021-26117 still exists on 5.16.1",
  73616. "refsource" : "MLIST",
  73617. "tags" : [ ]
  73618. }, {
  73619. "url" : "https://lists.apache.org/thread.html/r519bfafd67091d0b91243efcb1c49b1eea27321355ba5594f679277d@%3Cissues.activemq.apache.org%3E",
  73620. "name" : "[activemq-issues] 20210509 [jira] [Deleted] (AMQ-8244) CVE-2021-26117 on AMQ 5.16.1",
  73621. "refsource" : "MLIST",
  73622. "tags" : [ ]
  73623. }, {
  73624. "url" : "https://lists.apache.org/thread.html/rd05b1c9d61dbd220664d559aa0e2b55e5830f006a09e82057f3f7863@%3Cissues.activemq.apache.org%3E",
  73625. "name" : "[activemq-issues] 20210509 [jira] [Deleted] (AMQ-8245) CVE-2021-26117 on AMQ 5.16.1",
  73626. "refsource" : "MLIST",
  73627. "tags" : [ ]
  73628. } ]
  73629. },
  73630. "description" : {
  73631. "description_data" : [ {
  73632. "lang" : "en",
  73633. "value" : "The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password."
  73634. } ]
  73635. }
  73636. },
  73637. "configurations" : {
  73638. "CVE_data_version" : "4.0",
  73639. "nodes" : [ {
  73640. "operator" : "OR",
  73641. "children" : [ ],
  73642. "cpe_match" : [ {
  73643. "vulnerable" : true,
  73644. "cpe23Uri" : "cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*",
  73645. "versionStartIncluding" : "5.15.0",
  73646. "versionEndExcluding" : "5.15.14",
  73647. "cpe_name" : [ ]
  73648. }, {
  73649. "vulnerable" : true,
  73650. "cpe23Uri" : "cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*",
  73651. "versionStartIncluding" : "5.16.0",
  73652. "versionEndExcluding" : "5.16.1",
  73653. "cpe_name" : [ ]
  73654. }, {
  73655. "vulnerable" : true,
  73656. "cpe23Uri" : "cpe:2.3:a:apache:activemq_artemis:*:*:*:*:*:*:*:*",
  73657. "versionEndExcluding" : "2.16.0",
  73658. "cpe_name" : [ ]
  73659. } ]
  73660. }, {
  73661. "operator" : "OR",
  73662. "children" : [ ],
  73663. "cpe_match" : [ {
  73664. "vulnerable" : true,
  73665. "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
  73666. "cpe_name" : [ ]
  73667. } ]
  73668. }, {
  73669. "operator" : "OR",
  73670. "children" : [ ],
  73671. "cpe_match" : [ {
  73672. "vulnerable" : true,
  73673. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  73674. "cpe_name" : [ ]
  73675. } ]
  73676. } ]
  73677. },
  73678. "impact" : {
  73679. "baseMetricV3" : {
  73680. "cvssV3" : {
  73681. "version" : "3.1",
  73682. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
  73683. "attackVector" : "NETWORK",
  73684. "attackComplexity" : "LOW",
  73685. "privilegesRequired" : "NONE",
  73686. "userInteraction" : "NONE",
  73687. "scope" : "UNCHANGED",
  73688. "confidentialityImpact" : "NONE",
  73689. "integrityImpact" : "HIGH",
  73690. "availabilityImpact" : "NONE",
  73691. "baseScore" : 7.5,
  73692. "baseSeverity" : "HIGH"
  73693. },
  73694. "exploitabilityScore" : 3.9,
  73695. "impactScore" : 3.6
  73696. },
  73697. "baseMetricV2" : {
  73698. "cvssV2" : {
  73699. "version" : "2.0",
  73700. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  73701. "accessVector" : "NETWORK",
  73702. "accessComplexity" : "LOW",
  73703. "authentication" : "NONE",
  73704. "confidentialityImpact" : "NONE",
  73705. "integrityImpact" : "PARTIAL",
  73706. "availabilityImpact" : "NONE",
  73707. "baseScore" : 5.0
  73708. },
  73709. "severity" : "MEDIUM",
  73710. "exploitabilityScore" : 10.0,
  73711. "impactScore" : 2.9,
  73712. "acInsufInfo" : false,
  73713. "obtainAllPrivilege" : false,
  73714. "obtainUserPrivilege" : false,
  73715. "obtainOtherPrivilege" : false,
  73716. "userInteractionRequired" : false
  73717. }
  73718. },
  73719. "publishedDate" : "2021-01-27T19:15Z",
  73720. "lastModifiedDate" : "2021-05-09T17:15Z"
  73721. }, {
  73722. "cve" : {
  73723. "data_type" : "CVE",
  73724. "data_format" : "MITRE",
  73725. "data_version" : "4.0",
  73726. "CVE_data_meta" : {
  73727. "ID" : "CVE-2021-20190",
  73728. "ASSIGNER" : "secalert@redhat.com"
  73729. },
  73730. "problemtype" : {
  73731. "problemtype_data" : [ {
  73732. "description" : [ {
  73733. "lang" : "en",
  73734. "value" : "CWE-502"
  73735. } ]
  73736. } ]
  73737. },
  73738. "references" : {
  73739. "reference_data" : [ {
  73740. "url" : "https://github.com/FasterXML/jackson-databind/issues/2854",
  73741. "name" : "https://github.com/FasterXML/jackson-databind/issues/2854",
  73742. "refsource" : "MISC",
  73743. "tags" : [ "Patch", "Third Party Advisory" ]
  73744. }, {
  73745. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1916633",
  73746. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1916633",
  73747. "refsource" : "MISC",
  73748. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  73749. }, {
  73750. "url" : "https://security.netapp.com/advisory/ntap-20210219-0008/",
  73751. "name" : "https://security.netapp.com/advisory/ntap-20210219-0008/",
  73752. "refsource" : "CONFIRM",
  73753. "tags" : [ "Third Party Advisory" ]
  73754. }, {
  73755. "url" : "https://lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a@%3Ccommits.nifi.apache.org%3E",
  73756. "name" : "[nifi-commits] 20210222 svn commit: r1886814 - /nifi/site/trunk/security.html",
  73757. "refsource" : "MLIST",
  73758. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73759. }, {
  73760. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html",
  73761. "name" : "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
  73762. "refsource" : "MLIST",
  73763. "tags" : [ "Mailing List", "Third Party Advisory" ]
  73764. } ]
  73765. },
  73766. "description" : {
  73767. "description_data" : [ {
  73768. "lang" : "en",
  73769. "value" : "A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
  73770. } ]
  73771. }
  73772. },
  73773. "configurations" : {
  73774. "CVE_data_version" : "4.0",
  73775. "nodes" : [ {
  73776. "operator" : "OR",
  73777. "children" : [ ],
  73778. "cpe_match" : [ {
  73779. "vulnerable" : true,
  73780. "cpe23Uri" : "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
  73781. "versionStartIncluding" : "2.9.0",
  73782. "versionEndExcluding" : "2.9.10.7",
  73783. "cpe_name" : [ ]
  73784. } ]
  73785. }, {
  73786. "operator" : "OR",
  73787. "children" : [ ],
  73788. "cpe_match" : [ {
  73789. "vulnerable" : true,
  73790. "cpe23Uri" : "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*",
  73791. "cpe_name" : [ ]
  73792. }, {
  73793. "vulnerable" : true,
  73794. "cpe23Uri" : "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
  73795. "cpe_name" : [ ]
  73796. }, {
  73797. "vulnerable" : true,
  73798. "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_api_services:-:*:*:*:*:*:*:*",
  73799. "cpe_name" : [ ]
  73800. }, {
  73801. "vulnerable" : true,
  73802. "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
  73803. "cpe_name" : [ ]
  73804. }, {
  73805. "vulnerable" : true,
  73806. "cpe23Uri" : "cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*",
  73807. "cpe_name" : [ ]
  73808. } ]
  73809. }, {
  73810. "operator" : "OR",
  73811. "children" : [ ],
  73812. "cpe_match" : [ {
  73813. "vulnerable" : true,
  73814. "cpe23Uri" : "cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*",
  73815. "versionStartIncluding" : "1.7.0",
  73816. "versionEndIncluding" : "1.12.1",
  73817. "cpe_name" : [ ]
  73818. } ]
  73819. }, {
  73820. "operator" : "OR",
  73821. "children" : [ ],
  73822. "cpe_match" : [ {
  73823. "vulnerable" : true,
  73824. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  73825. "cpe_name" : [ ]
  73826. } ]
  73827. } ]
  73828. },
  73829. "impact" : {
  73830. "baseMetricV3" : {
  73831. "cvssV3" : {
  73832. "version" : "3.1",
  73833. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
  73834. "attackVector" : "NETWORK",
  73835. "attackComplexity" : "HIGH",
  73836. "privilegesRequired" : "NONE",
  73837. "userInteraction" : "NONE",
  73838. "scope" : "UNCHANGED",
  73839. "confidentialityImpact" : "HIGH",
  73840. "integrityImpact" : "HIGH",
  73841. "availabilityImpact" : "HIGH",
  73842. "baseScore" : 8.1,
  73843. "baseSeverity" : "HIGH"
  73844. },
  73845. "exploitabilityScore" : 2.2,
  73846. "impactScore" : 5.9
  73847. },
  73848. "baseMetricV2" : {
  73849. "cvssV2" : {
  73850. "version" : "2.0",
  73851. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:C",
  73852. "accessVector" : "NETWORK",
  73853. "accessComplexity" : "MEDIUM",
  73854. "authentication" : "NONE",
  73855. "confidentialityImpact" : "PARTIAL",
  73856. "integrityImpact" : "PARTIAL",
  73857. "availabilityImpact" : "COMPLETE",
  73858. "baseScore" : 8.3
  73859. },
  73860. "severity" : "HIGH",
  73861. "exploitabilityScore" : 8.6,
  73862. "impactScore" : 8.5,
  73863. "acInsufInfo" : false,
  73864. "obtainAllPrivilege" : false,
  73865. "obtainUserPrivilege" : false,
  73866. "obtainOtherPrivilege" : false,
  73867. "userInteractionRequired" : false
  73868. }
  73869. },
  73870. "publishedDate" : "2021-01-19T17:15Z",
  73871. "lastModifiedDate" : "2021-05-05T12:49Z"
  73872. }, {
  73873. "cve" : {
  73874. "data_type" : "CVE",
  73875. "data_format" : "MITRE",
  73876. "data_version" : "4.0",
  73877. "CVE_data_meta" : {
  73878. "ID" : "CVE-2021-1648",
  73879. "ASSIGNER" : "secure@microsoft.com"
  73880. },
  73881. "problemtype" : {
  73882. "problemtype_data" : [ {
  73883. "description" : [ {
  73884. "lang" : "en",
  73885. "value" : "CWE-269"
  73886. } ]
  73887. } ]
  73888. },
  73889. "references" : {
  73890. "reference_data" : [ {
  73891. "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1648",
  73892. "name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1648",
  73893. "refsource" : "MISC",
  73894. "tags" : [ "Patch", "Vendor Advisory" ]
  73895. }, {
  73896. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-21-504/",
  73897. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-21-504/",
  73898. "refsource" : "MISC",
  73899. "tags" : [ ]
  73900. } ]
  73901. },
  73902. "description" : {
  73903. "description_data" : [ {
  73904. "lang" : "en",
  73905. "value" : "Microsoft splwow64 Elevation of Privilege Vulnerability"
  73906. } ]
  73907. }
  73908. },
  73909. "configurations" : {
  73910. "CVE_data_version" : "4.0",
  73911. "nodes" : [ {
  73912. "operator" : "OR",
  73913. "children" : [ ],
  73914. "cpe_match" : [ {
  73915. "vulnerable" : true,
  73916. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
  73917. "cpe_name" : [ ]
  73918. }, {
  73919. "vulnerable" : true,
  73920. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
  73921. "cpe_name" : [ ]
  73922. }, {
  73923. "vulnerable" : true,
  73924. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
  73925. "cpe_name" : [ ]
  73926. }, {
  73927. "vulnerable" : true,
  73928. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
  73929. "cpe_name" : [ ]
  73930. }, {
  73931. "vulnerable" : true,
  73932. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
  73933. "cpe_name" : [ ]
  73934. }, {
  73935. "vulnerable" : true,
  73936. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
  73937. "cpe_name" : [ ]
  73938. }, {
  73939. "vulnerable" : true,
  73940. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
  73941. "cpe_name" : [ ]
  73942. }, {
  73943. "vulnerable" : true,
  73944. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
  73945. "cpe_name" : [ ]
  73946. }, {
  73947. "vulnerable" : true,
  73948. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
  73949. "cpe_name" : [ ]
  73950. }, {
  73951. "vulnerable" : true,
  73952. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
  73953. "cpe_name" : [ ]
  73954. }, {
  73955. "vulnerable" : true,
  73956. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
  73957. "cpe_name" : [ ]
  73958. }, {
  73959. "vulnerable" : true,
  73960. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
  73961. "cpe_name" : [ ]
  73962. }, {
  73963. "vulnerable" : true,
  73964. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
  73965. "cpe_name" : [ ]
  73966. }, {
  73967. "vulnerable" : true,
  73968. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
  73969. "cpe_name" : [ ]
  73970. }, {
  73971. "vulnerable" : true,
  73972. "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
  73973. "cpe_name" : [ ]
  73974. } ]
  73975. } ]
  73976. },
  73977. "impact" : {
  73978. "baseMetricV3" : {
  73979. "cvssV3" : {
  73980. "version" : "3.1",
  73981. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  73982. "attackVector" : "LOCAL",
  73983. "attackComplexity" : "LOW",
  73984. "privilegesRequired" : "LOW",
  73985. "userInteraction" : "NONE",
  73986. "scope" : "UNCHANGED",
  73987. "confidentialityImpact" : "HIGH",
  73988. "integrityImpact" : "HIGH",
  73989. "availabilityImpact" : "HIGH",
  73990. "baseScore" : 7.8,
  73991. "baseSeverity" : "HIGH"
  73992. },
  73993. "exploitabilityScore" : 1.8,
  73994. "impactScore" : 5.9
  73995. },
  73996. "baseMetricV2" : {
  73997. "cvssV2" : {
  73998. "version" : "2.0",
  73999. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  74000. "accessVector" : "LOCAL",
  74001. "accessComplexity" : "LOW",
  74002. "authentication" : "NONE",
  74003. "confidentialityImpact" : "COMPLETE",
  74004. "integrityImpact" : "COMPLETE",
  74005. "availabilityImpact" : "COMPLETE",
  74006. "baseScore" : 7.2
  74007. },
  74008. "severity" : "HIGH",
  74009. "exploitabilityScore" : 3.9,
  74010. "impactScore" : 10.0,
  74011. "acInsufInfo" : false,
  74012. "obtainAllPrivilege" : false,
  74013. "obtainUserPrivilege" : false,
  74014. "obtainOtherPrivilege" : false,
  74015. "userInteractionRequired" : false
  74016. }
  74017. },
  74018. "publishedDate" : "2021-01-12T20:15Z",
  74019. "lastModifiedDate" : "2021-05-03T20:15Z"
  74020. }, {
  74021. "cve" : {
  74022. "data_type" : "CVE",
  74023. "data_format" : "MITRE",
  74024. "data_version" : "4.0",
  74025. "CVE_data_meta" : {
  74026. "ID" : "CVE-2020-36183",
  74027. "ASSIGNER" : "cve@mitre.org"
  74028. },
  74029. "problemtype" : {
  74030. "problemtype_data" : [ {
  74031. "description" : [ {
  74032. "lang" : "en",
  74033. "value" : "CWE-502"
  74034. } ]
  74035. } ]
  74036. },
  74037. "references" : {
  74038. "reference_data" : [ {
  74039. "url" : "https://github.com/FasterXML/jackson-databind/issues/3003",
  74040. "name" : "https://github.com/FasterXML/jackson-databind/issues/3003",
  74041. "refsource" : "MISC",
  74042. "tags" : [ "Patch", "Third Party Advisory" ]
  74043. }, {
  74044. "url" : "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
  74045. "name" : "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
  74046. "refsource" : "MISC",
  74047. "tags" : [ "Exploit", "Technical Description", "Third Party Advisory" ]
  74048. }, {
  74049. "url" : "https://security.netapp.com/advisory/ntap-20210205-0005/",
  74050. "name" : "https://security.netapp.com/advisory/ntap-20210205-0005/",
  74051. "refsource" : "CONFIRM",
  74052. "tags" : [ "Third Party Advisory" ]
  74053. }, {
  74054. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html",
  74055. "name" : "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
  74056. "refsource" : "MLIST",
  74057. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74058. } ]
  74059. },
  74060. "description" : {
  74061. "description_data" : [ {
  74062. "lang" : "en",
  74063. "value" : "FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool."
  74064. } ]
  74065. }
  74066. },
  74067. "configurations" : {
  74068. "CVE_data_version" : "4.0",
  74069. "nodes" : [ {
  74070. "operator" : "OR",
  74071. "children" : [ ],
  74072. "cpe_match" : [ {
  74073. "vulnerable" : true,
  74074. "cpe23Uri" : "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
  74075. "versionStartIncluding" : "2.9.0",
  74076. "versionEndExcluding" : "2.9.10.8",
  74077. "cpe_name" : [ ]
  74078. } ]
  74079. }, {
  74080. "operator" : "OR",
  74081. "children" : [ ],
  74082. "cpe_match" : [ {
  74083. "vulnerable" : true,
  74084. "cpe23Uri" : "cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*",
  74085. "cpe_name" : [ ]
  74086. } ]
  74087. }, {
  74088. "operator" : "OR",
  74089. "children" : [ ],
  74090. "cpe_match" : [ {
  74091. "vulnerable" : true,
  74092. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  74093. "cpe_name" : [ ]
  74094. } ]
  74095. } ]
  74096. },
  74097. "impact" : {
  74098. "baseMetricV3" : {
  74099. "cvssV3" : {
  74100. "version" : "3.1",
  74101. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
  74102. "attackVector" : "NETWORK",
  74103. "attackComplexity" : "HIGH",
  74104. "privilegesRequired" : "NONE",
  74105. "userInteraction" : "NONE",
  74106. "scope" : "UNCHANGED",
  74107. "confidentialityImpact" : "HIGH",
  74108. "integrityImpact" : "HIGH",
  74109. "availabilityImpact" : "HIGH",
  74110. "baseScore" : 8.1,
  74111. "baseSeverity" : "HIGH"
  74112. },
  74113. "exploitabilityScore" : 2.2,
  74114. "impactScore" : 5.9
  74115. },
  74116. "baseMetricV2" : {
  74117. "cvssV2" : {
  74118. "version" : "2.0",
  74119. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  74120. "accessVector" : "NETWORK",
  74121. "accessComplexity" : "MEDIUM",
  74122. "authentication" : "NONE",
  74123. "confidentialityImpact" : "PARTIAL",
  74124. "integrityImpact" : "PARTIAL",
  74125. "availabilityImpact" : "PARTIAL",
  74126. "baseScore" : 6.8
  74127. },
  74128. "severity" : "MEDIUM",
  74129. "exploitabilityScore" : 8.6,
  74130. "impactScore" : 6.4,
  74131. "acInsufInfo" : false,
  74132. "obtainAllPrivilege" : false,
  74133. "obtainUserPrivilege" : false,
  74134. "obtainOtherPrivilege" : false,
  74135. "userInteractionRequired" : false
  74136. }
  74137. },
  74138. "publishedDate" : "2021-01-07T00:15Z",
  74139. "lastModifiedDate" : "2021-05-05T15:03Z"
  74140. }, {
  74141. "cve" : {
  74142. "data_type" : "CVE",
  74143. "data_format" : "MITRE",
  74144. "data_version" : "4.0",
  74145. "CVE_data_meta" : {
  74146. "ID" : "CVE-2020-36180",
  74147. "ASSIGNER" : "cve@mitre.org"
  74148. },
  74149. "problemtype" : {
  74150. "problemtype_data" : [ {
  74151. "description" : [ {
  74152. "lang" : "en",
  74153. "value" : "CWE-502"
  74154. } ]
  74155. } ]
  74156. },
  74157. "references" : {
  74158. "reference_data" : [ {
  74159. "url" : "https://github.com/FasterXML/jackson-databind/issues/3004",
  74160. "name" : "https://github.com/FasterXML/jackson-databind/issues/3004",
  74161. "refsource" : "MISC",
  74162. "tags" : [ "Patch", "Third Party Advisory" ]
  74163. }, {
  74164. "url" : "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
  74165. "name" : "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
  74166. "refsource" : "MISC",
  74167. "tags" : [ "Exploit", "Technical Description", "Third Party Advisory" ]
  74168. }, {
  74169. "url" : "https://security.netapp.com/advisory/ntap-20210205-0005/",
  74170. "name" : "https://security.netapp.com/advisory/ntap-20210205-0005/",
  74171. "refsource" : "CONFIRM",
  74172. "tags" : [ "Third Party Advisory" ]
  74173. }, {
  74174. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html",
  74175. "name" : "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
  74176. "refsource" : "MLIST",
  74177. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74178. } ]
  74179. },
  74180. "description" : {
  74181. "description_data" : [ {
  74182. "lang" : "en",
  74183. "value" : "FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS."
  74184. } ]
  74185. }
  74186. },
  74187. "configurations" : {
  74188. "CVE_data_version" : "4.0",
  74189. "nodes" : [ {
  74190. "operator" : "OR",
  74191. "children" : [ ],
  74192. "cpe_match" : [ {
  74193. "vulnerable" : true,
  74194. "cpe23Uri" : "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
  74195. "versionStartIncluding" : "2.9.0",
  74196. "versionEndExcluding" : "2.9.10.8",
  74197. "cpe_name" : [ ]
  74198. } ]
  74199. }, {
  74200. "operator" : "OR",
  74201. "children" : [ ],
  74202. "cpe_match" : [ {
  74203. "vulnerable" : true,
  74204. "cpe23Uri" : "cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*",
  74205. "cpe_name" : [ ]
  74206. } ]
  74207. }, {
  74208. "operator" : "OR",
  74209. "children" : [ ],
  74210. "cpe_match" : [ {
  74211. "vulnerable" : true,
  74212. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  74213. "cpe_name" : [ ]
  74214. } ]
  74215. } ]
  74216. },
  74217. "impact" : {
  74218. "baseMetricV3" : {
  74219. "cvssV3" : {
  74220. "version" : "3.1",
  74221. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
  74222. "attackVector" : "NETWORK",
  74223. "attackComplexity" : "HIGH",
  74224. "privilegesRequired" : "NONE",
  74225. "userInteraction" : "NONE",
  74226. "scope" : "UNCHANGED",
  74227. "confidentialityImpact" : "HIGH",
  74228. "integrityImpact" : "HIGH",
  74229. "availabilityImpact" : "HIGH",
  74230. "baseScore" : 8.1,
  74231. "baseSeverity" : "HIGH"
  74232. },
  74233. "exploitabilityScore" : 2.2,
  74234. "impactScore" : 5.9
  74235. },
  74236. "baseMetricV2" : {
  74237. "cvssV2" : {
  74238. "version" : "2.0",
  74239. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  74240. "accessVector" : "NETWORK",
  74241. "accessComplexity" : "MEDIUM",
  74242. "authentication" : "NONE",
  74243. "confidentialityImpact" : "PARTIAL",
  74244. "integrityImpact" : "PARTIAL",
  74245. "availabilityImpact" : "PARTIAL",
  74246. "baseScore" : 6.8
  74247. },
  74248. "severity" : "MEDIUM",
  74249. "exploitabilityScore" : 8.6,
  74250. "impactScore" : 6.4,
  74251. "acInsufInfo" : false,
  74252. "obtainAllPrivilege" : false,
  74253. "obtainUserPrivilege" : false,
  74254. "obtainOtherPrivilege" : false,
  74255. "userInteractionRequired" : false
  74256. }
  74257. },
  74258. "publishedDate" : "2021-01-07T00:15Z",
  74259. "lastModifiedDate" : "2021-05-05T15:03Z"
  74260. }, {
  74261. "cve" : {
  74262. "data_type" : "CVE",
  74263. "data_format" : "MITRE",
  74264. "data_version" : "4.0",
  74265. "CVE_data_meta" : {
  74266. "ID" : "CVE-2020-27841",
  74267. "ASSIGNER" : "secalert@redhat.com"
  74268. },
  74269. "problemtype" : {
  74270. "problemtype_data" : [ {
  74271. "description" : [ {
  74272. "lang" : "en",
  74273. "value" : "CWE-122"
  74274. } ]
  74275. } ]
  74276. },
  74277. "references" : {
  74278. "reference_data" : [ {
  74279. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1907510",
  74280. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1907510",
  74281. "refsource" : "MISC",
  74282. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  74283. }, {
  74284. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/",
  74285. "name" : "FEDORA-2020-d32853a28d",
  74286. "refsource" : "FEDORA",
  74287. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74288. }, {
  74289. "url" : "https://security.gentoo.org/glsa/202101-29",
  74290. "name" : "GLSA-202101-29",
  74291. "refsource" : "GENTOO",
  74292. "tags" : [ "Third Party Advisory" ]
  74293. }, {
  74294. "url" : "https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html",
  74295. "name" : "[debian-lts-announce] 20210208 [SECURITY] [DLA 2550-1] openjpeg2 security update",
  74296. "refsource" : "MLIST",
  74297. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74298. }, {
  74299. "url" : "https://www.debian.org/security/2021/dsa-4882",
  74300. "name" : "DSA-4882",
  74301. "refsource" : "DEBIAN",
  74302. "tags" : [ "Third Party Advisory" ]
  74303. } ]
  74304. },
  74305. "description" : {
  74306. "description_data" : [ {
  74307. "lang" : "en",
  74308. "value" : "There's a flaw in openjpeg in versions prior to 2.4.0 in src/lib/openjp2/pi.c. When an attacker is able to provide crafted input to be processed by the openjpeg encoder, this could cause an out-of-bounds read. The greatest impact from this flaw is to application availability."
  74309. } ]
  74310. }
  74311. },
  74312. "configurations" : {
  74313. "CVE_data_version" : "4.0",
  74314. "nodes" : [ {
  74315. "operator" : "OR",
  74316. "children" : [ ],
  74317. "cpe_match" : [ {
  74318. "vulnerable" : true,
  74319. "cpe23Uri" : "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*",
  74320. "versionEndExcluding" : "2.4.0",
  74321. "cpe_name" : [ ]
  74322. } ]
  74323. }, {
  74324. "operator" : "OR",
  74325. "children" : [ ],
  74326. "cpe_match" : [ {
  74327. "vulnerable" : true,
  74328. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  74329. "cpe_name" : [ ]
  74330. } ]
  74331. }, {
  74332. "operator" : "OR",
  74333. "children" : [ ],
  74334. "cpe_match" : [ {
  74335. "vulnerable" : true,
  74336. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  74337. "cpe_name" : [ ]
  74338. }, {
  74339. "vulnerable" : true,
  74340. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  74341. "cpe_name" : [ ]
  74342. } ]
  74343. } ]
  74344. },
  74345. "impact" : {
  74346. "baseMetricV3" : {
  74347. "cvssV3" : {
  74348. "version" : "3.1",
  74349. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
  74350. "attackVector" : "LOCAL",
  74351. "attackComplexity" : "LOW",
  74352. "privilegesRequired" : "NONE",
  74353. "userInteraction" : "REQUIRED",
  74354. "scope" : "UNCHANGED",
  74355. "confidentialityImpact" : "NONE",
  74356. "integrityImpact" : "NONE",
  74357. "availabilityImpact" : "HIGH",
  74358. "baseScore" : 5.5,
  74359. "baseSeverity" : "MEDIUM"
  74360. },
  74361. "exploitabilityScore" : 1.8,
  74362. "impactScore" : 3.6
  74363. },
  74364. "baseMetricV2" : {
  74365. "cvssV2" : {
  74366. "version" : "2.0",
  74367. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
  74368. "accessVector" : "NETWORK",
  74369. "accessComplexity" : "MEDIUM",
  74370. "authentication" : "NONE",
  74371. "confidentialityImpact" : "NONE",
  74372. "integrityImpact" : "NONE",
  74373. "availabilityImpact" : "PARTIAL",
  74374. "baseScore" : 4.3
  74375. },
  74376. "severity" : "MEDIUM",
  74377. "exploitabilityScore" : 8.6,
  74378. "impactScore" : 2.9,
  74379. "acInsufInfo" : false,
  74380. "obtainAllPrivilege" : false,
  74381. "obtainUserPrivilege" : false,
  74382. "obtainOtherPrivilege" : false,
  74383. "userInteractionRequired" : true
  74384. }
  74385. },
  74386. "publishedDate" : "2021-01-05T18:15Z",
  74387. "lastModifiedDate" : "2021-05-05T12:54Z"
  74388. }, {
  74389. "cve" : {
  74390. "data_type" : "CVE",
  74391. "data_format" : "MITRE",
  74392. "data_version" : "4.0",
  74393. "CVE_data_meta" : {
  74394. "ID" : "CVE-2019-25013",
  74395. "ASSIGNER" : "cve@mitre.org"
  74396. },
  74397. "problemtype" : {
  74398. "problemtype_data" : [ {
  74399. "description" : [ {
  74400. "lang" : "en",
  74401. "value" : "CWE-125"
  74402. } ]
  74403. } ]
  74404. },
  74405. "references" : {
  74406. "reference_data" : [ {
  74407. "url" : "https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b",
  74408. "name" : "https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b",
  74409. "refsource" : "MISC",
  74410. "tags" : [ "Patch", "Third Party Advisory" ]
  74411. }, {
  74412. "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=24973",
  74413. "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=24973",
  74414. "refsource" : "MISC",
  74415. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  74416. }, {
  74417. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/",
  74418. "name" : "FEDORA-2021-6feb090c97",
  74419. "refsource" : "FEDORA",
  74420. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74421. }, {
  74422. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/",
  74423. "name" : "FEDORA-2021-6e581c051a",
  74424. "refsource" : "FEDORA",
  74425. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74426. }, {
  74427. "url" : "https://security.netapp.com/advisory/ntap-20210205-0004/",
  74428. "name" : "https://security.netapp.com/advisory/ntap-20210205-0004/",
  74429. "refsource" : "CONFIRM",
  74430. "tags" : [ "Third Party Advisory" ]
  74431. }, {
  74432. "url" : "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
  74433. "name" : "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
  74434. "refsource" : "MLIST",
  74435. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74436. }, {
  74437. "url" : "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E",
  74438. "name" : "[kafka-jira] 20210420 [jira] [Created] (KAFKA-12698) CVE-2019-25013 vulnerability reported in Kafka",
  74439. "refsource" : "MLIST",
  74440. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74441. }, {
  74442. "url" : "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E",
  74443. "name" : "[kafka-dev] 20210420 [jira] [Created] (KAFKA-12698) CVE-2019-25013 vulnerability reported in Kafka",
  74444. "refsource" : "MLIST",
  74445. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74446. }, {
  74447. "url" : "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E",
  74448. "name" : "[zookeeper-issues] 20210423 [jira] [Created] (ZOOKEEPER-4285) High CVE-2019-25013 reported by Clair scanner for Zookeeper 3.6.1",
  74449. "refsource" : "MLIST",
  74450. "tags" : [ ]
  74451. }, {
  74452. "url" : "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E",
  74453. "name" : "[kafka-jira] 20210423 [jira] [Commented] (KAFKA-12698) CVE-2019-25013 high priority vulnerability reported in Kafka",
  74454. "refsource" : "MLIST",
  74455. "tags" : [ ]
  74456. }, {
  74457. "url" : "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E",
  74458. "name" : "[zookeeper-dev] 20210423 [jira] [Created] (ZOOKEEPER-4285) High CVE-2019-25013 reported by Clair scanner for Zookeeper 3.6.1",
  74459. "refsource" : "MLIST",
  74460. "tags" : [ ]
  74461. }, {
  74462. "url" : "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E",
  74463. "name" : "[kafka-jira] 20210423 [jira] [Updated] (KAFKA-12698) CVE-2019-25013 high priority vulnerability reported in Kafka",
  74464. "refsource" : "MLIST",
  74465. "tags" : [ ]
  74466. }, {
  74467. "url" : "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E",
  74468. "name" : "[kafka-jira] 20210423 [jira] [Comment Edited] (KAFKA-12698) CVE-2019-25013 high priority vulnerability reported in Kafka",
  74469. "refsource" : "MLIST",
  74470. "tags" : [ ]
  74471. }, {
  74472. "url" : "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E",
  74473. "name" : "[zookeeper-issues] 20210506 [jira] [Resolved] (ZOOKEEPER-4285) High CVE-2019-25013 reported by Clair scanner for Zookeeper 3.6.1",
  74474. "refsource" : "MLIST",
  74475. "tags" : [ ]
  74476. } ]
  74477. },
  74478. "description" : {
  74479. "description_data" : [ {
  74480. "lang" : "en",
  74481. "value" : "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read."
  74482. } ]
  74483. }
  74484. },
  74485. "configurations" : {
  74486. "CVE_data_version" : "4.0",
  74487. "nodes" : [ {
  74488. "operator" : "OR",
  74489. "children" : [ ],
  74490. "cpe_match" : [ {
  74491. "vulnerable" : true,
  74492. "cpe23Uri" : "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
  74493. "versionEndIncluding" : "2.32",
  74494. "cpe_name" : [ ]
  74495. } ]
  74496. }, {
  74497. "operator" : "OR",
  74498. "children" : [ ],
  74499. "cpe_match" : [ {
  74500. "vulnerable" : true,
  74501. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  74502. "cpe_name" : [ ]
  74503. }, {
  74504. "vulnerable" : true,
  74505. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  74506. "cpe_name" : [ ]
  74507. } ]
  74508. }, {
  74509. "operator" : "OR",
  74510. "children" : [ ],
  74511. "cpe_match" : [ {
  74512. "vulnerable" : true,
  74513. "cpe23Uri" : "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
  74514. "cpe_name" : [ ]
  74515. }, {
  74516. "vulnerable" : true,
  74517. "cpe23Uri" : "cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*",
  74518. "cpe_name" : [ ]
  74519. }, {
  74520. "vulnerable" : true,
  74521. "cpe23Uri" : "cpe:2.3:o:netapp:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
  74522. "cpe_name" : [ ]
  74523. } ]
  74524. }, {
  74525. "operator" : "AND",
  74526. "children" : [ {
  74527. "operator" : "OR",
  74528. "children" : [ ],
  74529. "cpe_match" : [ {
  74530. "vulnerable" : true,
  74531. "cpe23Uri" : "cpe:2.3:o:netapp:baseboard_management_controller_a250_firmware:-:*:*:*:*:*:*:*",
  74532. "cpe_name" : [ ]
  74533. } ]
  74534. }, {
  74535. "operator" : "OR",
  74536. "children" : [ ],
  74537. "cpe_match" : [ {
  74538. "vulnerable" : false,
  74539. "cpe23Uri" : "cpe:2.3:h:netapp:baseboard_management_controller_a250:-:*:*:*:*:*:*:*",
  74540. "cpe_name" : [ ]
  74541. } ]
  74542. } ],
  74543. "cpe_match" : [ ]
  74544. }, {
  74545. "operator" : "AND",
  74546. "children" : [ {
  74547. "operator" : "OR",
  74548. "children" : [ ],
  74549. "cpe_match" : [ {
  74550. "vulnerable" : true,
  74551. "cpe23Uri" : "cpe:2.3:o:netapp:baseboard_management_controller_500f_firmware:-:*:*:*:*:*:*:*",
  74552. "cpe_name" : [ ]
  74553. } ]
  74554. }, {
  74555. "operator" : "OR",
  74556. "children" : [ ],
  74557. "cpe_match" : [ {
  74558. "vulnerable" : false,
  74559. "cpe23Uri" : "cpe:2.3:h:netapp:baseboard_management_controller_500f:-:*:*:*:*:*:*:*",
  74560. "cpe_name" : [ ]
  74561. } ]
  74562. } ],
  74563. "cpe_match" : [ ]
  74564. }, {
  74565. "operator" : "OR",
  74566. "children" : [ ],
  74567. "cpe_match" : [ {
  74568. "vulnerable" : true,
  74569. "cpe23Uri" : "cpe:2.3:a:apache:kafka:2.6.0:*:*:*:*:*:*:*",
  74570. "cpe_name" : [ ]
  74571. } ]
  74572. } ]
  74573. },
  74574. "impact" : {
  74575. "baseMetricV3" : {
  74576. "cvssV3" : {
  74577. "version" : "3.1",
  74578. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
  74579. "attackVector" : "NETWORK",
  74580. "attackComplexity" : "HIGH",
  74581. "privilegesRequired" : "NONE",
  74582. "userInteraction" : "NONE",
  74583. "scope" : "UNCHANGED",
  74584. "confidentialityImpact" : "NONE",
  74585. "integrityImpact" : "NONE",
  74586. "availabilityImpact" : "HIGH",
  74587. "baseScore" : 5.9,
  74588. "baseSeverity" : "MEDIUM"
  74589. },
  74590. "exploitabilityScore" : 2.2,
  74591. "impactScore" : 3.6
  74592. },
  74593. "baseMetricV2" : {
  74594. "cvssV2" : {
  74595. "version" : "2.0",
  74596. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:C",
  74597. "accessVector" : "NETWORK",
  74598. "accessComplexity" : "MEDIUM",
  74599. "authentication" : "NONE",
  74600. "confidentialityImpact" : "NONE",
  74601. "integrityImpact" : "NONE",
  74602. "availabilityImpact" : "COMPLETE",
  74603. "baseScore" : 7.1
  74604. },
  74605. "severity" : "HIGH",
  74606. "exploitabilityScore" : 8.6,
  74607. "impactScore" : 6.9,
  74608. "acInsufInfo" : false,
  74609. "obtainAllPrivilege" : false,
  74610. "obtainUserPrivilege" : false,
  74611. "obtainOtherPrivilege" : false,
  74612. "userInteractionRequired" : false
  74613. }
  74614. },
  74615. "publishedDate" : "2021-01-04T18:15Z",
  74616. "lastModifiedDate" : "2021-05-06T14:15Z"
  74617. }, {
  74618. "cve" : {
  74619. "data_type" : "CVE",
  74620. "data_format" : "MITRE",
  74621. "data_version" : "4.0",
  74622. "CVE_data_meta" : {
  74623. "ID" : "CVE-2020-14874",
  74624. "ASSIGNER" : "secalert_us@oracle.com"
  74625. },
  74626. "problemtype" : {
  74627. "problemtype_data" : [ {
  74628. "description" : [ {
  74629. "lang" : "en",
  74630. "value" : "NVD-CWE-noinfo"
  74631. } ]
  74632. } ]
  74633. },
  74634. "references" : {
  74635. "reference_data" : [ {
  74636. "url" : "https://www.oracle.com/security-alerts/oracle-cves-outside-other-oracle-public-documents.html",
  74637. "name" : "https://www.oracle.com/security-alerts/oracle-cves-outside-other-oracle-public-documents.html",
  74638. "refsource" : "MISC",
  74639. "tags" : [ ]
  74640. } ]
  74641. },
  74642. "description" : {
  74643. "description_data" : [ {
  74644. "lang" : "en",
  74645. "value" : "Vulnerability in the Oracle Cloud Infrastructure Identity and Access Management product of Oracle Cloud Services. Easily exploitable vulnerability allows high privileged attacker with network access to compromise Oracle Cloud Infrastructure Identity and Access Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Cloud Infrastructure Identity and Access Management accessible data as well as unauthorized read access to a subset of Oracle Cloud Infrastructure Identity and Access Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Cloud Infrastructure Identity and Access Management."
  74646. } ]
  74647. }
  74648. },
  74649. "configurations" : {
  74650. "CVE_data_version" : "4.0",
  74651. "nodes" : [ {
  74652. "operator" : "OR",
  74653. "children" : [ ],
  74654. "cpe_match" : [ {
  74655. "vulnerable" : true,
  74656. "cpe23Uri" : "cpe:2.3:a:oracle:cloud_infrastructure_identity_and_access_management:-:*:*:*:*:*:*:*",
  74657. "cpe_name" : [ ]
  74658. } ]
  74659. } ]
  74660. },
  74661. "impact" : {
  74662. "baseMetricV3" : {
  74663. "cvssV3" : {
  74664. "version" : "3.1",
  74665. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
  74666. "attackVector" : "NETWORK",
  74667. "attackComplexity" : "LOW",
  74668. "privilegesRequired" : "HIGH",
  74669. "userInteraction" : "NONE",
  74670. "scope" : "UNCHANGED",
  74671. "confidentialityImpact" : "LOW",
  74672. "integrityImpact" : "LOW",
  74673. "availabilityImpact" : "LOW",
  74674. "baseScore" : 4.7,
  74675. "baseSeverity" : "MEDIUM"
  74676. },
  74677. "exploitabilityScore" : 1.2,
  74678. "impactScore" : 3.4
  74679. },
  74680. "baseMetricV2" : {
  74681. "cvssV2" : {
  74682. "version" : "2.0",
  74683. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  74684. "accessVector" : "NETWORK",
  74685. "accessComplexity" : "LOW",
  74686. "authentication" : "SINGLE",
  74687. "confidentialityImpact" : "PARTIAL",
  74688. "integrityImpact" : "PARTIAL",
  74689. "availabilityImpact" : "PARTIAL",
  74690. "baseScore" : 6.5
  74691. },
  74692. "severity" : "MEDIUM",
  74693. "exploitabilityScore" : 8.0,
  74694. "impactScore" : 6.4,
  74695. "acInsufInfo" : false,
  74696. "obtainAllPrivilege" : false,
  74697. "obtainUserPrivilege" : false,
  74698. "obtainOtherPrivilege" : false,
  74699. "userInteractionRequired" : false
  74700. }
  74701. },
  74702. "publishedDate" : "2020-12-22T22:15Z",
  74703. "lastModifiedDate" : "2021-05-10T12:15Z"
  74704. }, {
  74705. "cve" : {
  74706. "data_type" : "CVE",
  74707. "data_format" : "MITRE",
  74708. "data_version" : "4.0",
  74709. "CVE_data_meta" : {
  74710. "ID" : "CVE-2020-8286",
  74711. "ASSIGNER" : "cve-assignments@hackerone.com"
  74712. },
  74713. "problemtype" : {
  74714. "problemtype_data" : [ {
  74715. "description" : [ {
  74716. "lang" : "en",
  74717. "value" : "CWE-295"
  74718. } ]
  74719. } ]
  74720. },
  74721. "references" : {
  74722. "reference_data" : [ {
  74723. "url" : "https://hackerone.com/reports/1048457",
  74724. "name" : "https://hackerone.com/reports/1048457",
  74725. "refsource" : "MISC",
  74726. "tags" : [ "Exploit", "Patch", "Third Party Advisory" ]
  74727. }, {
  74728. "url" : "https://curl.se/docs/CVE-2020-8286.html",
  74729. "name" : "https://curl.se/docs/CVE-2020-8286.html",
  74730. "refsource" : "MISC",
  74731. "tags" : [ "Vendor Advisory" ]
  74732. }, {
  74733. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/",
  74734. "name" : "FEDORA-2020-ceaf490686",
  74735. "refsource" : "FEDORA",
  74736. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74737. }, {
  74738. "url" : "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html",
  74739. "name" : "[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update",
  74740. "refsource" : "MLIST",
  74741. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74742. }, {
  74743. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/",
  74744. "name" : "FEDORA-2020-7ab62c73bc",
  74745. "refsource" : "FEDORA",
  74746. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74747. }, {
  74748. "url" : "https://security.gentoo.org/glsa/202012-14",
  74749. "name" : "GLSA-202012-14",
  74750. "refsource" : "GENTOO",
  74751. "tags" : [ "Third Party Advisory" ]
  74752. }, {
  74753. "url" : "https://security.netapp.com/advisory/ntap-20210122-0007/",
  74754. "name" : "https://security.netapp.com/advisory/ntap-20210122-0007/",
  74755. "refsource" : "CONFIRM",
  74756. "tags" : [ "Third Party Advisory" ]
  74757. }, {
  74758. "url" : "https://www.debian.org/security/2021/dsa-4881",
  74759. "name" : "DSA-4881",
  74760. "refsource" : "DEBIAN",
  74761. "tags" : [ "Third Party Advisory" ]
  74762. }, {
  74763. "url" : "https://support.apple.com/kb/HT212325",
  74764. "name" : "https://support.apple.com/kb/HT212325",
  74765. "refsource" : "CONFIRM",
  74766. "tags" : [ "Third Party Advisory" ]
  74767. }, {
  74768. "url" : "https://support.apple.com/kb/HT212326",
  74769. "name" : "https://support.apple.com/kb/HT212326",
  74770. "refsource" : "CONFIRM",
  74771. "tags" : [ "Third Party Advisory" ]
  74772. }, {
  74773. "url" : "https://support.apple.com/kb/HT212327",
  74774. "name" : "https://support.apple.com/kb/HT212327",
  74775. "refsource" : "CONFIRM",
  74776. "tags" : [ "Third Party Advisory" ]
  74777. }, {
  74778. "url" : "http://seclists.org/fulldisclosure/2021/Apr/51",
  74779. "name" : "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
  74780. "refsource" : "FULLDISC",
  74781. "tags" : [ "Mailing List", "Third Party Advisory" ]
  74782. } ]
  74783. },
  74784. "description" : {
  74785. "description_data" : [ {
  74786. "lang" : "en",
  74787. "value" : "curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response."
  74788. } ]
  74789. }
  74790. },
  74791. "configurations" : {
  74792. "CVE_data_version" : "4.0",
  74793. "nodes" : [ {
  74794. "operator" : "OR",
  74795. "children" : [ ],
  74796. "cpe_match" : [ {
  74797. "vulnerable" : true,
  74798. "cpe23Uri" : "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
  74799. "versionStartIncluding" : "7.41.0",
  74800. "versionEndExcluding" : "7.74.0",
  74801. "cpe_name" : [ ]
  74802. } ]
  74803. }, {
  74804. "operator" : "OR",
  74805. "children" : [ ],
  74806. "cpe_match" : [ {
  74807. "vulnerable" : true,
  74808. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  74809. "cpe_name" : [ ]
  74810. }, {
  74811. "vulnerable" : true,
  74812. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  74813. "cpe_name" : [ ]
  74814. } ]
  74815. }, {
  74816. "operator" : "OR",
  74817. "children" : [ ],
  74818. "cpe_match" : [ {
  74819. "vulnerable" : true,
  74820. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  74821. "cpe_name" : [ ]
  74822. }, {
  74823. "vulnerable" : true,
  74824. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  74825. "cpe_name" : [ ]
  74826. } ]
  74827. }, {
  74828. "operator" : "OR",
  74829. "children" : [ ],
  74830. "cpe_match" : [ {
  74831. "vulnerable" : true,
  74832. "cpe23Uri" : "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
  74833. "cpe_name" : [ ]
  74834. }, {
  74835. "vulnerable" : true,
  74836. "cpe23Uri" : "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
  74837. "cpe_name" : [ ]
  74838. }, {
  74839. "vulnerable" : true,
  74840. "cpe23Uri" : "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
  74841. "cpe_name" : [ ]
  74842. } ]
  74843. }, {
  74844. "operator" : "AND",
  74845. "children" : [ {
  74846. "operator" : "OR",
  74847. "children" : [ ],
  74848. "cpe_match" : [ {
  74849. "vulnerable" : true,
  74850. "cpe23Uri" : "cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*",
  74851. "cpe_name" : [ ]
  74852. } ]
  74853. }, {
  74854. "operator" : "OR",
  74855. "children" : [ ],
  74856. "cpe_match" : [ {
  74857. "vulnerable" : false,
  74858. "cpe23Uri" : "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
  74859. "cpe_name" : [ ]
  74860. } ]
  74861. } ],
  74862. "cpe_match" : [ ]
  74863. }, {
  74864. "operator" : "AND",
  74865. "children" : [ {
  74866. "operator" : "OR",
  74867. "children" : [ ],
  74868. "cpe_match" : [ {
  74869. "vulnerable" : true,
  74870. "cpe23Uri" : "cpe:2.3:o:netapp:hci_storage_node_firmware:-:*:*:*:*:*:*:*",
  74871. "cpe_name" : [ ]
  74872. } ]
  74873. }, {
  74874. "operator" : "OR",
  74875. "children" : [ ],
  74876. "cpe_match" : [ {
  74877. "vulnerable" : false,
  74878. "cpe23Uri" : "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*",
  74879. "cpe_name" : [ ]
  74880. } ]
  74881. } ],
  74882. "cpe_match" : [ ]
  74883. }, {
  74884. "operator" : "OR",
  74885. "children" : [ ],
  74886. "cpe_match" : [ {
  74887. "vulnerable" : true,
  74888. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  74889. "versionEndExcluding" : "10.14.6",
  74890. "cpe_name" : [ ]
  74891. }, {
  74892. "vulnerable" : true,
  74893. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
  74894. "cpe_name" : [ ]
  74895. }, {
  74896. "vulnerable" : true,
  74897. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
  74898. "cpe_name" : [ ]
  74899. }, {
  74900. "vulnerable" : true,
  74901. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
  74902. "cpe_name" : [ ]
  74903. }, {
  74904. "vulnerable" : true,
  74905. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
  74906. "cpe_name" : [ ]
  74907. }, {
  74908. "vulnerable" : true,
  74909. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
  74910. "cpe_name" : [ ]
  74911. }, {
  74912. "vulnerable" : true,
  74913. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
  74914. "cpe_name" : [ ]
  74915. }, {
  74916. "vulnerable" : true,
  74917. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
  74918. "cpe_name" : [ ]
  74919. }, {
  74920. "vulnerable" : true,
  74921. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
  74922. "cpe_name" : [ ]
  74923. }, {
  74924. "vulnerable" : true,
  74925. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
  74926. "cpe_name" : [ ]
  74927. }, {
  74928. "vulnerable" : true,
  74929. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
  74930. "cpe_name" : [ ]
  74931. }, {
  74932. "vulnerable" : true,
  74933. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
  74934. "cpe_name" : [ ]
  74935. }, {
  74936. "vulnerable" : true,
  74937. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  74938. "versionStartIncluding" : "10.15",
  74939. "versionEndExcluding" : "10.15.7",
  74940. "cpe_name" : [ ]
  74941. }, {
  74942. "vulnerable" : true,
  74943. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
  74944. "cpe_name" : [ ]
  74945. }, {
  74946. "vulnerable" : true,
  74947. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
  74948. "cpe_name" : [ ]
  74949. }, {
  74950. "vulnerable" : true,
  74951. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
  74952. "cpe_name" : [ ]
  74953. }, {
  74954. "vulnerable" : true,
  74955. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
  74956. "cpe_name" : [ ]
  74957. }, {
  74958. "vulnerable" : true,
  74959. "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
  74960. "versionStartIncluding" : "11.0",
  74961. "versionEndExcluding" : "11.3",
  74962. "cpe_name" : [ ]
  74963. } ]
  74964. } ]
  74965. },
  74966. "impact" : {
  74967. "baseMetricV3" : {
  74968. "cvssV3" : {
  74969. "version" : "3.1",
  74970. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
  74971. "attackVector" : "NETWORK",
  74972. "attackComplexity" : "LOW",
  74973. "privilegesRequired" : "NONE",
  74974. "userInteraction" : "NONE",
  74975. "scope" : "UNCHANGED",
  74976. "confidentialityImpact" : "NONE",
  74977. "integrityImpact" : "HIGH",
  74978. "availabilityImpact" : "NONE",
  74979. "baseScore" : 7.5,
  74980. "baseSeverity" : "HIGH"
  74981. },
  74982. "exploitabilityScore" : 3.9,
  74983. "impactScore" : 3.6
  74984. },
  74985. "baseMetricV2" : {
  74986. "cvssV2" : {
  74987. "version" : "2.0",
  74988. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  74989. "accessVector" : "NETWORK",
  74990. "accessComplexity" : "LOW",
  74991. "authentication" : "NONE",
  74992. "confidentialityImpact" : "NONE",
  74993. "integrityImpact" : "PARTIAL",
  74994. "availabilityImpact" : "NONE",
  74995. "baseScore" : 5.0
  74996. },
  74997. "severity" : "MEDIUM",
  74998. "exploitabilityScore" : 10.0,
  74999. "impactScore" : 2.9,
  75000. "acInsufInfo" : false,
  75001. "obtainAllPrivilege" : false,
  75002. "obtainUserPrivilege" : false,
  75003. "obtainOtherPrivilege" : false,
  75004. "userInteractionRequired" : false
  75005. }
  75006. },
  75007. "publishedDate" : "2020-12-14T20:15Z",
  75008. "lastModifiedDate" : "2021-05-03T20:33Z"
  75009. }, {
  75010. "cve" : {
  75011. "data_type" : "CVE",
  75012. "data_format" : "MITRE",
  75013. "data_version" : "4.0",
  75014. "CVE_data_meta" : {
  75015. "ID" : "CVE-2020-8285",
  75016. "ASSIGNER" : "cve-assignments@hackerone.com"
  75017. },
  75018. "problemtype" : {
  75019. "problemtype_data" : [ {
  75020. "description" : [ {
  75021. "lang" : "en",
  75022. "value" : "CWE-787"
  75023. }, {
  75024. "lang" : "en",
  75025. "value" : "CWE-674"
  75026. } ]
  75027. } ]
  75028. },
  75029. "references" : {
  75030. "reference_data" : [ {
  75031. "url" : "https://curl.se/docs/CVE-2020-8285.html",
  75032. "name" : "https://curl.se/docs/CVE-2020-8285.html",
  75033. "refsource" : "MISC",
  75034. "tags" : [ "Vendor Advisory" ]
  75035. }, {
  75036. "url" : "https://hackerone.com/reports/1045844",
  75037. "name" : "https://hackerone.com/reports/1045844",
  75038. "refsource" : "MISC",
  75039. "tags" : [ "Permissions Required" ]
  75040. }, {
  75041. "url" : "https://github.com/curl/curl/issues/6255",
  75042. "name" : "https://github.com/curl/curl/issues/6255",
  75043. "refsource" : "MISC",
  75044. "tags" : [ "Exploit", "Third Party Advisory" ]
  75045. }, {
  75046. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/",
  75047. "name" : "FEDORA-2020-ceaf490686",
  75048. "refsource" : "FEDORA",
  75049. "tags" : [ "Mailing List", "Third Party Advisory" ]
  75050. }, {
  75051. "url" : "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html",
  75052. "name" : "[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update",
  75053. "refsource" : "MLIST",
  75054. "tags" : [ "Mailing List", "Third Party Advisory" ]
  75055. }, {
  75056. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/",
  75057. "name" : "FEDORA-2020-7ab62c73bc",
  75058. "refsource" : "FEDORA",
  75059. "tags" : [ "Mailing List", "Third Party Advisory" ]
  75060. }, {
  75061. "url" : "https://security.gentoo.org/glsa/202012-14",
  75062. "name" : "GLSA-202012-14",
  75063. "refsource" : "GENTOO",
  75064. "tags" : [ "Third Party Advisory" ]
  75065. }, {
  75066. "url" : "https://security.netapp.com/advisory/ntap-20210122-0007/",
  75067. "name" : "https://security.netapp.com/advisory/ntap-20210122-0007/",
  75068. "refsource" : "CONFIRM",
  75069. "tags" : [ "Third Party Advisory" ]
  75070. }, {
  75071. "url" : "https://www.debian.org/security/2021/dsa-4881",
  75072. "name" : "DSA-4881",
  75073. "refsource" : "DEBIAN",
  75074. "tags" : [ "Third Party Advisory" ]
  75075. }, {
  75076. "url" : "https://support.apple.com/kb/HT212325",
  75077. "name" : "https://support.apple.com/kb/HT212325",
  75078. "refsource" : "CONFIRM",
  75079. "tags" : [ "Third Party Advisory" ]
  75080. }, {
  75081. "url" : "https://support.apple.com/kb/HT212326",
  75082. "name" : "https://support.apple.com/kb/HT212326",
  75083. "refsource" : "CONFIRM",
  75084. "tags" : [ "Third Party Advisory" ]
  75085. }, {
  75086. "url" : "https://support.apple.com/kb/HT212327",
  75087. "name" : "https://support.apple.com/kb/HT212327",
  75088. "refsource" : "CONFIRM",
  75089. "tags" : [ "Third Party Advisory" ]
  75090. }, {
  75091. "url" : "http://seclists.org/fulldisclosure/2021/Apr/51",
  75092. "name" : "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
  75093. "refsource" : "FULLDISC",
  75094. "tags" : [ "Mailing List", "Third Party Advisory" ]
  75095. } ]
  75096. },
  75097. "description" : {
  75098. "description_data" : [ {
  75099. "lang" : "en",
  75100. "value" : "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing."
  75101. } ]
  75102. }
  75103. },
  75104. "configurations" : {
  75105. "CVE_data_version" : "4.0",
  75106. "nodes" : [ {
  75107. "operator" : "OR",
  75108. "children" : [ ],
  75109. "cpe_match" : [ {
  75110. "vulnerable" : true,
  75111. "cpe23Uri" : "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
  75112. "versionStartIncluding" : "7.21.0",
  75113. "versionEndExcluding" : "7.74.0",
  75114. "cpe_name" : [ ]
  75115. } ]
  75116. }, {
  75117. "operator" : "OR",
  75118. "children" : [ ],
  75119. "cpe_match" : [ {
  75120. "vulnerable" : true,
  75121. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  75122. "cpe_name" : [ ]
  75123. }, {
  75124. "vulnerable" : true,
  75125. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  75126. "cpe_name" : [ ]
  75127. } ]
  75128. }, {
  75129. "operator" : "OR",
  75130. "children" : [ ],
  75131. "cpe_match" : [ {
  75132. "vulnerable" : true,
  75133. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  75134. "cpe_name" : [ ]
  75135. }, {
  75136. "vulnerable" : true,
  75137. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  75138. "cpe_name" : [ ]
  75139. } ]
  75140. }, {
  75141. "operator" : "OR",
  75142. "children" : [ ],
  75143. "cpe_match" : [ {
  75144. "vulnerable" : true,
  75145. "cpe23Uri" : "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
  75146. "cpe_name" : [ ]
  75147. }, {
  75148. "vulnerable" : true,
  75149. "cpe23Uri" : "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
  75150. "cpe_name" : [ ]
  75151. }, {
  75152. "vulnerable" : true,
  75153. "cpe23Uri" : "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
  75154. "cpe_name" : [ ]
  75155. } ]
  75156. }, {
  75157. "operator" : "AND",
  75158. "children" : [ {
  75159. "operator" : "OR",
  75160. "children" : [ ],
  75161. "cpe_match" : [ {
  75162. "vulnerable" : true,
  75163. "cpe23Uri" : "cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*",
  75164. "cpe_name" : [ ]
  75165. } ]
  75166. }, {
  75167. "operator" : "OR",
  75168. "children" : [ ],
  75169. "cpe_match" : [ {
  75170. "vulnerable" : false,
  75171. "cpe23Uri" : "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
  75172. "cpe_name" : [ ]
  75173. } ]
  75174. } ],
  75175. "cpe_match" : [ ]
  75176. }, {
  75177. "operator" : "AND",
  75178. "children" : [ {
  75179. "operator" : "OR",
  75180. "children" : [ ],
  75181. "cpe_match" : [ {
  75182. "vulnerable" : true,
  75183. "cpe23Uri" : "cpe:2.3:o:netapp:hci_storage_node_firmware:-:*:*:*:*:*:*:*",
  75184. "cpe_name" : [ ]
  75185. } ]
  75186. }, {
  75187. "operator" : "OR",
  75188. "children" : [ ],
  75189. "cpe_match" : [ {
  75190. "vulnerable" : false,
  75191. "cpe23Uri" : "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*",
  75192. "cpe_name" : [ ]
  75193. } ]
  75194. } ],
  75195. "cpe_match" : [ ]
  75196. }, {
  75197. "operator" : "OR",
  75198. "children" : [ ],
  75199. "cpe_match" : [ {
  75200. "vulnerable" : true,
  75201. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  75202. "versionEndExcluding" : "10.14.6",
  75203. "cpe_name" : [ ]
  75204. }, {
  75205. "vulnerable" : true,
  75206. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
  75207. "cpe_name" : [ ]
  75208. }, {
  75209. "vulnerable" : true,
  75210. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
  75211. "cpe_name" : [ ]
  75212. }, {
  75213. "vulnerable" : true,
  75214. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
  75215. "cpe_name" : [ ]
  75216. }, {
  75217. "vulnerable" : true,
  75218. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
  75219. "cpe_name" : [ ]
  75220. }, {
  75221. "vulnerable" : true,
  75222. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
  75223. "cpe_name" : [ ]
  75224. }, {
  75225. "vulnerable" : true,
  75226. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
  75227. "cpe_name" : [ ]
  75228. }, {
  75229. "vulnerable" : true,
  75230. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
  75231. "cpe_name" : [ ]
  75232. }, {
  75233. "vulnerable" : true,
  75234. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
  75235. "cpe_name" : [ ]
  75236. }, {
  75237. "vulnerable" : true,
  75238. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
  75239. "cpe_name" : [ ]
  75240. }, {
  75241. "vulnerable" : true,
  75242. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
  75243. "cpe_name" : [ ]
  75244. }, {
  75245. "vulnerable" : true,
  75246. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
  75247. "cpe_name" : [ ]
  75248. }, {
  75249. "vulnerable" : true,
  75250. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  75251. "versionStartIncluding" : "10.15",
  75252. "versionEndExcluding" : "10.15.7",
  75253. "cpe_name" : [ ]
  75254. }, {
  75255. "vulnerable" : true,
  75256. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
  75257. "cpe_name" : [ ]
  75258. }, {
  75259. "vulnerable" : true,
  75260. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
  75261. "cpe_name" : [ ]
  75262. }, {
  75263. "vulnerable" : true,
  75264. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
  75265. "cpe_name" : [ ]
  75266. }, {
  75267. "vulnerable" : true,
  75268. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
  75269. "cpe_name" : [ ]
  75270. }, {
  75271. "vulnerable" : true,
  75272. "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
  75273. "versionStartIncluding" : "11.0",
  75274. "versionEndExcluding" : "11.3",
  75275. "cpe_name" : [ ]
  75276. } ]
  75277. } ]
  75278. },
  75279. "impact" : {
  75280. "baseMetricV3" : {
  75281. "cvssV3" : {
  75282. "version" : "3.1",
  75283. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  75284. "attackVector" : "NETWORK",
  75285. "attackComplexity" : "LOW",
  75286. "privilegesRequired" : "NONE",
  75287. "userInteraction" : "NONE",
  75288. "scope" : "UNCHANGED",
  75289. "confidentialityImpact" : "NONE",
  75290. "integrityImpact" : "NONE",
  75291. "availabilityImpact" : "HIGH",
  75292. "baseScore" : 7.5,
  75293. "baseSeverity" : "HIGH"
  75294. },
  75295. "exploitabilityScore" : 3.9,
  75296. "impactScore" : 3.6
  75297. },
  75298. "baseMetricV2" : {
  75299. "cvssV2" : {
  75300. "version" : "2.0",
  75301. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  75302. "accessVector" : "NETWORK",
  75303. "accessComplexity" : "LOW",
  75304. "authentication" : "NONE",
  75305. "confidentialityImpact" : "NONE",
  75306. "integrityImpact" : "NONE",
  75307. "availabilityImpact" : "PARTIAL",
  75308. "baseScore" : 5.0
  75309. },
  75310. "severity" : "MEDIUM",
  75311. "exploitabilityScore" : 10.0,
  75312. "impactScore" : 2.9,
  75313. "acInsufInfo" : false,
  75314. "obtainAllPrivilege" : false,
  75315. "obtainUserPrivilege" : false,
  75316. "obtainOtherPrivilege" : false,
  75317. "userInteractionRequired" : false
  75318. }
  75319. },
  75320. "publishedDate" : "2020-12-14T20:15Z",
  75321. "lastModifiedDate" : "2021-05-03T20:34Z"
  75322. }, {
  75323. "cve" : {
  75324. "data_type" : "CVE",
  75325. "data_format" : "MITRE",
  75326. "data_version" : "4.0",
  75327. "CVE_data_meta" : {
  75328. "ID" : "CVE-2020-8284",
  75329. "ASSIGNER" : "cve-assignments@hackerone.com"
  75330. },
  75331. "problemtype" : {
  75332. "problemtype_data" : [ {
  75333. "description" : [ {
  75334. "lang" : "en",
  75335. "value" : "CWE-200"
  75336. } ]
  75337. } ]
  75338. },
  75339. "references" : {
  75340. "reference_data" : [ {
  75341. "url" : "https://hackerone.com/reports/1040166",
  75342. "name" : "https://hackerone.com/reports/1040166",
  75343. "refsource" : "MISC",
  75344. "tags" : [ "Permissions Required" ]
  75345. }, {
  75346. "url" : "https://curl.se/docs/CVE-2020-8284.html",
  75347. "name" : "https://curl.se/docs/CVE-2020-8284.html",
  75348. "refsource" : "MISC",
  75349. "tags" : [ "Vendor Advisory" ]
  75350. }, {
  75351. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/",
  75352. "name" : "FEDORA-2020-ceaf490686",
  75353. "refsource" : "FEDORA",
  75354. "tags" : [ "Third Party Advisory" ]
  75355. }, {
  75356. "url" : "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html",
  75357. "name" : "[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update",
  75358. "refsource" : "MLIST",
  75359. "tags" : [ "Mailing List", "Third Party Advisory" ]
  75360. }, {
  75361. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/",
  75362. "name" : "FEDORA-2020-7ab62c73bc",
  75363. "refsource" : "FEDORA",
  75364. "tags" : [ "Third Party Advisory" ]
  75365. }, {
  75366. "url" : "https://security.gentoo.org/glsa/202012-14",
  75367. "name" : "GLSA-202012-14",
  75368. "refsource" : "GENTOO",
  75369. "tags" : [ ]
  75370. }, {
  75371. "url" : "https://security.netapp.com/advisory/ntap-20210122-0007/",
  75372. "name" : "https://security.netapp.com/advisory/ntap-20210122-0007/",
  75373. "refsource" : "CONFIRM",
  75374. "tags" : [ ]
  75375. }, {
  75376. "url" : "https://www.debian.org/security/2021/dsa-4881",
  75377. "name" : "DSA-4881",
  75378. "refsource" : "DEBIAN",
  75379. "tags" : [ ]
  75380. }, {
  75381. "url" : "https://support.apple.com/kb/HT212325",
  75382. "name" : "https://support.apple.com/kb/HT212325",
  75383. "refsource" : "CONFIRM",
  75384. "tags" : [ ]
  75385. }, {
  75386. "url" : "https://support.apple.com/kb/HT212326",
  75387. "name" : "https://support.apple.com/kb/HT212326",
  75388. "refsource" : "CONFIRM",
  75389. "tags" : [ ]
  75390. }, {
  75391. "url" : "https://support.apple.com/kb/HT212327",
  75392. "name" : "https://support.apple.com/kb/HT212327",
  75393. "refsource" : "CONFIRM",
  75394. "tags" : [ ]
  75395. } ]
  75396. },
  75397. "description" : {
  75398. "description_data" : [ {
  75399. "lang" : "en",
  75400. "value" : "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions."
  75401. } ]
  75402. }
  75403. },
  75404. "configurations" : {
  75405. "CVE_data_version" : "4.0",
  75406. "nodes" : [ {
  75407. "operator" : "OR",
  75408. "children" : [ ],
  75409. "cpe_match" : [ {
  75410. "vulnerable" : true,
  75411. "cpe23Uri" : "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
  75412. "versionEndIncluding" : "7.73.0",
  75413. "cpe_name" : [ ]
  75414. } ]
  75415. }, {
  75416. "operator" : "OR",
  75417. "children" : [ ],
  75418. "cpe_match" : [ {
  75419. "vulnerable" : true,
  75420. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  75421. "cpe_name" : [ ]
  75422. }, {
  75423. "vulnerable" : true,
  75424. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  75425. "cpe_name" : [ ]
  75426. } ]
  75427. }, {
  75428. "operator" : "OR",
  75429. "children" : [ ],
  75430. "cpe_match" : [ {
  75431. "vulnerable" : true,
  75432. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  75433. "cpe_name" : [ ]
  75434. } ]
  75435. } ]
  75436. },
  75437. "impact" : {
  75438. "baseMetricV3" : {
  75439. "cvssV3" : {
  75440. "version" : "3.1",
  75441. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
  75442. "attackVector" : "NETWORK",
  75443. "attackComplexity" : "HIGH",
  75444. "privilegesRequired" : "NONE",
  75445. "userInteraction" : "NONE",
  75446. "scope" : "UNCHANGED",
  75447. "confidentialityImpact" : "LOW",
  75448. "integrityImpact" : "NONE",
  75449. "availabilityImpact" : "NONE",
  75450. "baseScore" : 3.7,
  75451. "baseSeverity" : "LOW"
  75452. },
  75453. "exploitabilityScore" : 2.2,
  75454. "impactScore" : 1.4
  75455. },
  75456. "baseMetricV2" : {
  75457. "cvssV2" : {
  75458. "version" : "2.0",
  75459. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:N/A:N",
  75460. "accessVector" : "NETWORK",
  75461. "accessComplexity" : "MEDIUM",
  75462. "authentication" : "NONE",
  75463. "confidentialityImpact" : "PARTIAL",
  75464. "integrityImpact" : "NONE",
  75465. "availabilityImpact" : "NONE",
  75466. "baseScore" : 4.3
  75467. },
  75468. "severity" : "MEDIUM",
  75469. "exploitabilityScore" : 8.6,
  75470. "impactScore" : 2.9,
  75471. "acInsufInfo" : false,
  75472. "obtainAllPrivilege" : false,
  75473. "obtainUserPrivilege" : false,
  75474. "obtainOtherPrivilege" : false,
  75475. "userInteractionRequired" : false
  75476. }
  75477. },
  75478. "publishedDate" : "2020-12-14T20:15Z",
  75479. "lastModifiedDate" : "2021-05-07T02:15Z"
  75480. }, {
  75481. "cve" : {
  75482. "data_type" : "CVE",
  75483. "data_format" : "MITRE",
  75484. "data_version" : "4.0",
  75485. "CVE_data_meta" : {
  75486. "ID" : "CVE-2020-7791",
  75487. "ASSIGNER" : "report@snyk.io"
  75488. },
  75489. "problemtype" : {
  75490. "problemtype_data" : [ {
  75491. "description" : [ {
  75492. "lang" : "en",
  75493. "value" : "NVD-CWE-noinfo"
  75494. } ]
  75495. } ]
  75496. },
  75497. "references" : {
  75498. "reference_data" : [ {
  75499. "url" : "https://github.com/turquoiseowl/i18n/issues/387",
  75500. "name" : "https://github.com/turquoiseowl/i18n/issues/387",
  75501. "refsource" : "MISC",
  75502. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  75503. }, {
  75504. "url" : "https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3",
  75505. "name" : "https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3",
  75506. "refsource" : "MISC",
  75507. "tags" : [ "Patch", "Third Party Advisory" ]
  75508. }, {
  75509. "url" : "https://snyk.io/vuln/SNYK-DOTNET-I18N-1050179",
  75510. "name" : "https://snyk.io/vuln/SNYK-DOTNET-I18N-1050179",
  75511. "refsource" : "MISC",
  75512. "tags" : [ "Third Party Advisory" ]
  75513. }, {
  75514. "url" : "https://lists.apache.org/thread.html/rc2abba7aa0450198494bbee654fce9b97fad72a4989323e189faede4@%3Cdev.myfaces.apache.org%3E",
  75515. "name" : "[myfaces-dev] 20210506 [GitHub] [myfaces-tobago] lofwyr14 opened a new pull request #821: build: CVE fix",
  75516. "refsource" : "MLIST",
  75517. "tags" : [ ]
  75518. }, {
  75519. "url" : "https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E",
  75520. "name" : "[druid-commits] 20210506 [GitHub] [druid] jihoonson commented on a change in pull request #11215: Suppressing false positive CVE-2020-7791",
  75521. "refsource" : "MLIST",
  75522. "tags" : [ ]
  75523. }, {
  75524. "url" : "https://lists.apache.org/thread.html/r9744574911e7e4edf5f4eeae92a4ccc83e3723cec937950062bb8775@%3Ccommits.druid.apache.org%3E",
  75525. "name" : "[druid-commits] 20210506 [GitHub] [druid] maytasm opened a new pull request #11215: Suppressing false positive CVE-2020-7791",
  75526. "refsource" : "MLIST",
  75527. "tags" : [ ]
  75528. }, {
  75529. "url" : "https://lists.apache.org/thread.html/r394b1ae54693609a60ea8aab02ff045dc92f593aa3aebff562e69958@%3Ccommits.druid.apache.org%3E",
  75530. "name" : "[druid-commits] 20210506 [GitHub] [druid] maytasm merged pull request #11215: Suppressing false positive CVE-2020-7791",
  75531. "refsource" : "MLIST",
  75532. "tags" : [ ]
  75533. }, {
  75534. "url" : "https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E",
  75535. "name" : "[druid-commits] 20210506 [GitHub] [druid] maytasm commented on a change in pull request #11215: Suppressing false positive CVE-2020-7791",
  75536. "refsource" : "MLIST",
  75537. "tags" : [ ]
  75538. }, {
  75539. "url" : "https://lists.apache.org/thread.html/ra5047392edf1fecba441c9adc8807ed6c5f7d2cc71f2f3bb89f35371@%3Ccommits.druid.apache.org%3E",
  75540. "name" : "[druid-commits] 20210506 [GitHub] [druid] clintropolis opened a new pull request #11217: [Backport] Suppressing false positive CVE-2020-7791",
  75541. "refsource" : "MLIST",
  75542. "tags" : [ ]
  75543. }, {
  75544. "url" : "https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E",
  75545. "name" : "[druid-commits] 20210507 [druid] branch 0.21.1 updated: Suppressing false positive CVE-2020-7791 (#11215) (#11217)",
  75546. "refsource" : "MLIST",
  75547. "tags" : [ ]
  75548. }, {
  75549. "url" : "https://lists.apache.org/thread.html/rc850d0fce066f9eb9e8553172d9207bad7df4d2059d93abc5c7e85c4@%3Ccommits.druid.apache.org%3E",
  75550. "name" : "[druid-commits] 20210507 [GitHub] [druid] clintropolis commented on pull request #11217: [Backport] Suppressing false positive CVE-2020-7791",
  75551. "refsource" : "MLIST",
  75552. "tags" : [ ]
  75553. }, {
  75554. "url" : "https://lists.apache.org/thread.html/r1573c58dc283b05f7a40a3f5ff0079b5bbde0492d406ee0fe98d40b6@%3Ccommits.druid.apache.org%3E",
  75555. "name" : "[druid-commits] 20210507 [GitHub] [druid] clintropolis merged pull request #11217: [Backport] Suppressing false positive CVE-2020-7791",
  75556. "refsource" : "MLIST",
  75557. "tags" : [ ]
  75558. } ]
  75559. },
  75560. "description" : {
  75561. "description_data" : [ {
  75562. "lang" : "en",
  75563. "value" : "This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs."
  75564. } ]
  75565. }
  75566. },
  75567. "configurations" : {
  75568. "CVE_data_version" : "4.0",
  75569. "nodes" : [ {
  75570. "operator" : "OR",
  75571. "children" : [ ],
  75572. "cpe_match" : [ {
  75573. "vulnerable" : true,
  75574. "cpe23Uri" : "cpe:2.3:a:i18n_project:i18n:*:*:*:*:*:asp.net:*:*",
  75575. "versionEndExcluding" : "2.1.15",
  75576. "cpe_name" : [ ]
  75577. } ]
  75578. } ]
  75579. },
  75580. "impact" : {
  75581. "baseMetricV3" : {
  75582. "cvssV3" : {
  75583. "version" : "3.1",
  75584. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  75585. "attackVector" : "NETWORK",
  75586. "attackComplexity" : "LOW",
  75587. "privilegesRequired" : "NONE",
  75588. "userInteraction" : "NONE",
  75589. "scope" : "UNCHANGED",
  75590. "confidentialityImpact" : "NONE",
  75591. "integrityImpact" : "NONE",
  75592. "availabilityImpact" : "HIGH",
  75593. "baseScore" : 7.5,
  75594. "baseSeverity" : "HIGH"
  75595. },
  75596. "exploitabilityScore" : 3.9,
  75597. "impactScore" : 3.6
  75598. },
  75599. "baseMetricV2" : {
  75600. "cvssV2" : {
  75601. "version" : "2.0",
  75602. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  75603. "accessVector" : "NETWORK",
  75604. "accessComplexity" : "LOW",
  75605. "authentication" : "NONE",
  75606. "confidentialityImpact" : "NONE",
  75607. "integrityImpact" : "NONE",
  75608. "availabilityImpact" : "PARTIAL",
  75609. "baseScore" : 5.0
  75610. },
  75611. "severity" : "MEDIUM",
  75612. "exploitabilityScore" : 10.0,
  75613. "impactScore" : 2.9,
  75614. "acInsufInfo" : false,
  75615. "obtainAllPrivilege" : false,
  75616. "obtainUserPrivilege" : false,
  75617. "obtainOtherPrivilege" : false,
  75618. "userInteractionRequired" : false
  75619. }
  75620. },
  75621. "publishedDate" : "2020-12-11T17:15Z",
  75622. "lastModifiedDate" : "2021-05-07T11:15Z"
  75623. }, {
  75624. "cve" : {
  75625. "data_type" : "CVE",
  75626. "data_format" : "MITRE",
  75627. "data_version" : "4.0",
  75628. "CVE_data_meta" : {
  75629. "ID" : "CVE-2020-17515",
  75630. "ASSIGNER" : "security@apache.org"
  75631. },
  75632. "problemtype" : {
  75633. "problemtype_data" : [ {
  75634. "description" : [ {
  75635. "lang" : "en",
  75636. "value" : "CWE-79"
  75637. } ]
  75638. } ]
  75639. },
  75640. "references" : {
  75641. "reference_data" : [ {
  75642. "url" : "https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e%40%3Cusers.airflow.apache.org%3E",
  75643. "name" : "https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e%40%3Cusers.airflow.apache.org%3E",
  75644. "refsource" : "MISC",
  75645. "tags" : [ "Issue Tracking", "Mailing List", "Vendor Advisory" ]
  75646. }, {
  75647. "url" : "https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cusers.airflow.apache.org%3E",
  75648. "name" : "[airflow-users] 20201211 Apache Airflow Security Vulnerabilities fixed in v1.10.13: CVE-2020-17515",
  75649. "refsource" : "MLIST",
  75650. "tags" : [ "Issue Tracking", "Mailing List", "Vendor Advisory" ]
  75651. }, {
  75652. "url" : "https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e@%3Cusers.airflow.apache.org%3E",
  75653. "name" : "[airflow-users] 20201211 CVE-2020-17515: Apache Airflow Reflected XSS via Origin Parameter",
  75654. "refsource" : "MLIST",
  75655. "tags" : [ "Issue Tracking", "Mailing List", "Vendor Advisory" ]
  75656. }, {
  75657. "url" : "https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cdev.airflow.apache.org%3E",
  75658. "name" : "[airflow-dev] 20201211 Apache Airflow Security Vulnerabilities fixed in v1.10.13: CVE-2020-17515",
  75659. "refsource" : "MLIST",
  75660. "tags" : [ "Mailing List", "Vendor Advisory" ]
  75661. }, {
  75662. "url" : "http://www.openwall.com/lists/oss-security/2020/12/11/2",
  75663. "name" : "[oss-security] 20201211 CVE-2020-17515: Apache Airflow Reflected XSS via Origin Parameter",
  75664. "refsource" : "MLIST",
  75665. "tags" : [ "Mailing List", "Vendor Advisory" ]
  75666. }, {
  75667. "url" : "https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E",
  75668. "name" : "[announce] 20201211 Apache Airflow Security Vulnerabilities fixed in v1.10.13: CVE-2020-17515",
  75669. "refsource" : "MLIST",
  75670. "tags" : [ "Mailing List", "Vendor Advisory" ]
  75671. }, {
  75672. "url" : "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E",
  75673. "name" : "[airflow-users] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
  75674. "refsource" : "MLIST",
  75675. "tags" : [ ]
  75676. }, {
  75677. "url" : "http://www.openwall.com/lists/oss-security/2021/05/01/2",
  75678. "name" : "[oss-security] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
  75679. "refsource" : "MLIST",
  75680. "tags" : [ ]
  75681. }, {
  75682. "url" : "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E",
  75683. "name" : "[announce] 20210501 Apache Airflow CVE: CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
  75684. "refsource" : "MLIST",
  75685. "tags" : [ ]
  75686. } ]
  75687. },
  75688. "description" : {
  75689. "description_data" : [ {
  75690. "lang" : "en",
  75691. "value" : "The \"origin\" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely."
  75692. } ]
  75693. }
  75694. },
  75695. "configurations" : {
  75696. "CVE_data_version" : "4.0",
  75697. "nodes" : [ {
  75698. "operator" : "OR",
  75699. "children" : [ ],
  75700. "cpe_match" : [ {
  75701. "vulnerable" : true,
  75702. "cpe23Uri" : "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*",
  75703. "versionEndExcluding" : "1.10.13",
  75704. "cpe_name" : [ ]
  75705. } ]
  75706. } ]
  75707. },
  75708. "impact" : {
  75709. "baseMetricV3" : {
  75710. "cvssV3" : {
  75711. "version" : "3.1",
  75712. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  75713. "attackVector" : "NETWORK",
  75714. "attackComplexity" : "LOW",
  75715. "privilegesRequired" : "NONE",
  75716. "userInteraction" : "REQUIRED",
  75717. "scope" : "CHANGED",
  75718. "confidentialityImpact" : "LOW",
  75719. "integrityImpact" : "LOW",
  75720. "availabilityImpact" : "NONE",
  75721. "baseScore" : 6.1,
  75722. "baseSeverity" : "MEDIUM"
  75723. },
  75724. "exploitabilityScore" : 2.8,
  75725. "impactScore" : 2.7
  75726. },
  75727. "baseMetricV2" : {
  75728. "cvssV2" : {
  75729. "version" : "2.0",
  75730. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  75731. "accessVector" : "NETWORK",
  75732. "accessComplexity" : "MEDIUM",
  75733. "authentication" : "NONE",
  75734. "confidentialityImpact" : "NONE",
  75735. "integrityImpact" : "PARTIAL",
  75736. "availabilityImpact" : "NONE",
  75737. "baseScore" : 4.3
  75738. },
  75739. "severity" : "MEDIUM",
  75740. "exploitabilityScore" : 8.6,
  75741. "impactScore" : 2.9,
  75742. "acInsufInfo" : false,
  75743. "obtainAllPrivilege" : false,
  75744. "obtainUserPrivilege" : false,
  75745. "obtainOtherPrivilege" : false,
  75746. "userInteractionRequired" : true
  75747. }
  75748. },
  75749. "publishedDate" : "2020-12-11T14:15Z",
  75750. "lastModifiedDate" : "2021-05-04T00:15Z"
  75751. }, {
  75752. "cve" : {
  75753. "data_type" : "CVE",
  75754. "data_format" : "MITRE",
  75755. "data_version" : "4.0",
  75756. "CVE_data_meta" : {
  75757. "ID" : "CVE-2020-8908",
  75758. "ASSIGNER" : "security@google.com"
  75759. },
  75760. "problemtype" : {
  75761. "problemtype_data" : [ {
  75762. "description" : [ {
  75763. "lang" : "en",
  75764. "value" : "CWE-732"
  75765. } ]
  75766. } ]
  75767. },
  75768. "references" : {
  75769. "reference_data" : [ {
  75770. "url" : "https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40",
  75771. "name" : "https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40",
  75772. "refsource" : "CONFIRM",
  75773. "tags" : [ "Patch", "Third Party Advisory" ]
  75774. }, {
  75775. "url" : "https://github.com/google/guava/issues/4011",
  75776. "name" : "https://github.com/google/guava/issues/4011",
  75777. "refsource" : "CONFIRM",
  75778. "tags" : [ "Third Party Advisory" ]
  75779. }, {
  75780. "url" : "https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415",
  75781. "name" : "https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415",
  75782. "refsource" : "MISC",
  75783. "tags" : [ "Exploit", "Third Party Advisory" ]
  75784. }, {
  75785. "url" : "https://lists.apache.org/thread.html/r215b3d50f56faeb2f9383505f3e62faa9f549bb23e8a9848b78a968e@%3Ccommits.ws.apache.org%3E",
  75786. "name" : "[ws-commits] 20210104 [ws-wss4j] branch 2_3_x-fixes updated: Updating Guava to 30.1 due to CVE-2020-8908",
  75787. "refsource" : "MLIST",
  75788. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  75789. }, {
  75790. "url" : "https://lists.apache.org/thread.html/r68d86f4b06c808204f62bcb254fcb5b0432528ee8d37a07ef4bc8222@%3Ccommits.ws.apache.org%3E",
  75791. "name" : "[ws-commits] 20210104 [ws-wss4j] branch master updated: Updating Guava to 30.1 due to CVE-2020-8908",
  75792. "refsource" : "MLIST",
  75793. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  75794. }, {
  75795. "url" : "https://lists.apache.org/thread.html/r4776f62dfae4a0006658542f43034a7fc199350e35a66d4e18164ee6@%3Ccommits.cxf.apache.org%3E",
  75796. "name" : "[cxf-commits] 20210104 [cxf] 02/02: Updating Guava to 30.1 due to CVE-2020-8908",
  75797. "refsource" : "MLIST",
  75798. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  75799. }, {
  75800. "url" : "https://lists.apache.org/thread.html/rb8c0f1b7589864396690fe42a91a71dea9412e86eec66dc85bbacaaf@%3Ccommits.cxf.apache.org%3E",
  75801. "name" : "[cxf-commits] 20210104 [cxf] 03/04: Updating Guava to 30.1 due to CVE-2020-8908",
  75802. "refsource" : "MLIST",
  75803. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  75804. }, {
  75805. "url" : "https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E",
  75806. "name" : "https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E",
  75807. "refsource" : "MISC",
  75808. "tags" : [ "Mailing List", "Third Party Advisory" ]
  75809. }, {
  75810. "url" : "https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E",
  75811. "name" : "[maven-issues] 20210122 [GitHub] [maven-indexer] akurtakov opened a new pull request #75: Remove guava dependency from indexer-core",
  75812. "refsource" : "MLIST",
  75813. "tags" : [ "Mailing List", "Third Party Advisory" ]
  75814. }, {
  75815. "url" : "https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E",
  75816. "name" : "[db-torque-dev] 20210127 Re: Items for our (delayed) quarterly report to the board?",
  75817. "refsource" : "MLIST",
  75818. "tags" : [ "Mailing List", "Third Party Advisory" ]
  75819. }, {
  75820. "url" : "https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E",
  75821. "name" : "[db-torque-dev] 20210128 Antwort: Re: Items for our (delayed) quarterly report to the board?",
  75822. "refsource" : "MLIST",
  75823. "tags" : [ "Mailing List", "Third Party Advisory" ]
  75824. }, {
  75825. "url" : "https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E",
  75826. "name" : "[pulsar-commits] 20210406 [GitHub] [pulsar] lhotari opened a new pull request #10149: Upgrade jclouds to 2.3.0 to fix security vulnerabilities",
  75827. "refsource" : "MLIST",
  75828. "tags" : [ ]
  75829. }, {
  75830. "url" : "https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594@%3Cdev.myfaces.apache.org%3E",
  75831. "name" : "[myfaces-dev] 20210506 [GitHub] [myfaces-tobago] lofwyr14 opened a new pull request #817: build: CVE fix",
  75832. "refsource" : "MLIST",
  75833. "tags" : [ ]
  75834. } ]
  75835. },
  75836. "description" : {
  75837. "description_data" : [ {
  75838. "lang" : "en",
  75839. "value" : "A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured."
  75840. } ]
  75841. }
  75842. },
  75843. "configurations" : {
  75844. "CVE_data_version" : "4.0",
  75845. "nodes" : [ {
  75846. "operator" : "OR",
  75847. "children" : [ ],
  75848. "cpe_match" : [ {
  75849. "vulnerable" : true,
  75850. "cpe23Uri" : "cpe:2.3:a:google:guava:*:*:*:*:*:*:*:*",
  75851. "versionEndExcluding" : "30.0",
  75852. "cpe_name" : [ ]
  75853. } ]
  75854. }, {
  75855. "operator" : "OR",
  75856. "children" : [ ],
  75857. "cpe_match" : [ {
  75858. "vulnerable" : true,
  75859. "cpe23Uri" : "cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*",
  75860. "versionEndExcluding" : "1.11.4",
  75861. "cpe_name" : [ ]
  75862. } ]
  75863. } ]
  75864. },
  75865. "impact" : {
  75866. "baseMetricV3" : {
  75867. "cvssV3" : {
  75868. "version" : "3.1",
  75869. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
  75870. "attackVector" : "LOCAL",
  75871. "attackComplexity" : "LOW",
  75872. "privilegesRequired" : "LOW",
  75873. "userInteraction" : "NONE",
  75874. "scope" : "UNCHANGED",
  75875. "confidentialityImpact" : "LOW",
  75876. "integrityImpact" : "NONE",
  75877. "availabilityImpact" : "NONE",
  75878. "baseScore" : 3.3,
  75879. "baseSeverity" : "LOW"
  75880. },
  75881. "exploitabilityScore" : 1.8,
  75882. "impactScore" : 1.4
  75883. },
  75884. "baseMetricV2" : {
  75885. "cvssV2" : {
  75886. "version" : "2.0",
  75887. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  75888. "accessVector" : "LOCAL",
  75889. "accessComplexity" : "LOW",
  75890. "authentication" : "NONE",
  75891. "confidentialityImpact" : "PARTIAL",
  75892. "integrityImpact" : "NONE",
  75893. "availabilityImpact" : "NONE",
  75894. "baseScore" : 2.1
  75895. },
  75896. "severity" : "LOW",
  75897. "exploitabilityScore" : 3.9,
  75898. "impactScore" : 2.9,
  75899. "acInsufInfo" : false,
  75900. "obtainAllPrivilege" : false,
  75901. "obtainUserPrivilege" : false,
  75902. "obtainOtherPrivilege" : false,
  75903. "userInteractionRequired" : false
  75904. }
  75905. },
  75906. "publishedDate" : "2020-12-10T23:15Z",
  75907. "lastModifiedDate" : "2021-05-06T14:15Z"
  75908. }, {
  75909. "cve" : {
  75910. "data_type" : "CVE",
  75911. "data_format" : "MITRE",
  75912. "data_version" : "4.0",
  75913. "CVE_data_meta" : {
  75914. "ID" : "CVE-2020-25693",
  75915. "ASSIGNER" : "secalert@redhat.com"
  75916. },
  75917. "problemtype" : {
  75918. "problemtype_data" : [ {
  75919. "description" : [ {
  75920. "lang" : "en",
  75921. "value" : "CWE-787"
  75922. }, {
  75923. "lang" : "en",
  75924. "value" : "CWE-190"
  75925. }, {
  75926. "lang" : "en",
  75927. "value" : "CWE-122"
  75928. } ]
  75929. } ]
  75930. },
  75931. "references" : {
  75932. "reference_data" : [ {
  75933. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1893377",
  75934. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1893377",
  75935. "refsource" : "MISC",
  75936. "tags" : [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
  75937. }, {
  75938. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MJ5Q7NNUPXATTBUKHFKIYYAV5GJDYCZL/",
  75939. "name" : "FEDORA-2021-ca1151e997",
  75940. "refsource" : "FEDORA",
  75941. "tags" : [ "Third Party Advisory" ]
  75942. }, {
  75943. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QZ3NPLYXZWEL7HETIFZVCXEZZ2WYYRWA/",
  75944. "name" : "FEDORA-2021-bc6585e31a",
  75945. "refsource" : "FEDORA",
  75946. "tags" : [ "Third Party Advisory" ]
  75947. }, {
  75948. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERBZALTF7LXN2LZLPGAUSVMV53GHHTUC/",
  75949. "name" : "FEDORA-2021-2aaba884af",
  75950. "refsource" : "FEDORA",
  75951. "tags" : [ "Third Party Advisory" ]
  75952. } ]
  75953. },
  75954. "description" : {
  75955. "description_data" : [ {
  75956. "lang" : "en",
  75957. "value" : "A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity."
  75958. } ]
  75959. }
  75960. },
  75961. "configurations" : {
  75962. "CVE_data_version" : "4.0",
  75963. "nodes" : [ {
  75964. "operator" : "OR",
  75965. "children" : [ ],
  75966. "cpe_match" : [ {
  75967. "vulnerable" : true,
  75968. "cpe23Uri" : "cpe:2.3:a:cimg:cimg:*:*:*:*:*:*:*:*",
  75969. "versionEndExcluding" : "2.9.3",
  75970. "cpe_name" : [ ]
  75971. } ]
  75972. }, {
  75973. "operator" : "OR",
  75974. "children" : [ ],
  75975. "cpe_match" : [ {
  75976. "vulnerable" : true,
  75977. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  75978. "cpe_name" : [ ]
  75979. }, {
  75980. "vulnerable" : true,
  75981. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  75982. "cpe_name" : [ ]
  75983. }, {
  75984. "vulnerable" : true,
  75985. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
  75986. "cpe_name" : [ ]
  75987. } ]
  75988. } ]
  75989. },
  75990. "impact" : {
  75991. "baseMetricV3" : {
  75992. "cvssV3" : {
  75993. "version" : "3.1",
  75994. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
  75995. "attackVector" : "NETWORK",
  75996. "attackComplexity" : "LOW",
  75997. "privilegesRequired" : "NONE",
  75998. "userInteraction" : "REQUIRED",
  75999. "scope" : "UNCHANGED",
  76000. "confidentialityImpact" : "HIGH",
  76001. "integrityImpact" : "NONE",
  76002. "availabilityImpact" : "HIGH",
  76003. "baseScore" : 8.1,
  76004. "baseSeverity" : "HIGH"
  76005. },
  76006. "exploitabilityScore" : 2.8,
  76007. "impactScore" : 5.2
  76008. },
  76009. "baseMetricV2" : {
  76010. "cvssV2" : {
  76011. "version" : "2.0",
  76012. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:N/A:P",
  76013. "accessVector" : "NETWORK",
  76014. "accessComplexity" : "MEDIUM",
  76015. "authentication" : "NONE",
  76016. "confidentialityImpact" : "PARTIAL",
  76017. "integrityImpact" : "NONE",
  76018. "availabilityImpact" : "PARTIAL",
  76019. "baseScore" : 5.8
  76020. },
  76021. "severity" : "MEDIUM",
  76022. "exploitabilityScore" : 8.6,
  76023. "impactScore" : 4.9,
  76024. "acInsufInfo" : false,
  76025. "obtainAllPrivilege" : false,
  76026. "obtainUserPrivilege" : false,
  76027. "obtainOtherPrivilege" : false,
  76028. "userInteractionRequired" : true
  76029. }
  76030. },
  76031. "publishedDate" : "2020-12-03T17:15Z",
  76032. "lastModifiedDate" : "2021-05-05T13:06Z"
  76033. }, {
  76034. "cve" : {
  76035. "data_type" : "CVE",
  76036. "data_format" : "MITRE",
  76037. "data_version" : "4.0",
  76038. "CVE_data_meta" : {
  76039. "ID" : "CVE-2020-25649",
  76040. "ASSIGNER" : "secalert@redhat.com"
  76041. },
  76042. "problemtype" : {
  76043. "problemtype_data" : [ {
  76044. "description" : [ {
  76045. "lang" : "en",
  76046. "value" : "CWE-611"
  76047. } ]
  76048. } ]
  76049. },
  76050. "references" : {
  76051. "reference_data" : [ {
  76052. "url" : "https://github.com/FasterXML/jackson-databind/issues/2589",
  76053. "name" : "https://github.com/FasterXML/jackson-databind/issues/2589",
  76054. "refsource" : "MISC",
  76055. "tags" : [ "Patch", "Third Party Advisory" ]
  76056. }, {
  76057. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1887664",
  76058. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1887664",
  76059. "refsource" : "MISC",
  76060. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  76061. }, {
  76062. "url" : "https://lists.apache.org/thread.html/ra1157e57a01d25e36b0dc17959ace758fc21ba36746de29ba1d8b130@%3Cjira.kafka.apache.org%3E",
  76063. "name" : "[kafka-jira] 20201205 [GitHub] [kafka] sirocchj opened a new pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1",
  76064. "refsource" : "MLIST",
  76065. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76066. }, {
  76067. "url" : "https://lists.apache.org/thread.html/r2b6ddb3a4f4cd11d8f6305011e1b7438ba813511f2e3ab3180c7ffda@%3Ccommits.druid.apache.org%3E",
  76068. "name" : "[druid-commits] 20201208 [GitHub] [druid] jihoonson opened a new pull request #10655: Bump up jackson-databind to 2.10.5.1",
  76069. "refsource" : "MLIST",
  76070. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76071. }, {
  76072. "url" : "https://lists.apache.org/thread.html/r2882fc1f3032cd7be66e28787f04ec6f1874ac68d47e310e30ff7eb1@%3Cjira.kafka.apache.org%3E",
  76073. "name" : "[kafka-jira] 20201209 [GitHub] [kafka] ijuma commented on pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1",
  76074. "refsource" : "MLIST",
  76075. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76076. }, {
  76077. "url" : "https://lists.apache.org/thread.html/r1b7ed0c4b6c4301d4dfd6fdbc5581b0a789d3240cab55d766f33c6c6@%3Cjira.kafka.apache.org%3E",
  76078. "name" : "[kafka-jira] 20201209 [GitHub] [kafka] sirocchj edited a comment on pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1",
  76079. "refsource" : "MLIST",
  76080. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76081. }, {
  76082. "url" : "https://lists.apache.org/thread.html/rd317f15a675d114dbf5b488d27eeb2467b4424356b16116eb18a652d@%3Cjira.kafka.apache.org%3E",
  76083. "name" : "[kafka-jira] 20201209 [GitHub] [kafka] sirocchj commented on pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1",
  76084. "refsource" : "MLIST",
  76085. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76086. }, {
  76087. "url" : "https://lists.apache.org/thread.html/re96dc7a13e13e56190a5d80f9e5440a0d0c83aeec6467b562fbf2dca@%3Cjira.kafka.apache.org%3E",
  76088. "name" : "[kafka-jira] 20201209 [GitHub] [kafka] niteshmor commented on pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1",
  76089. "refsource" : "MLIST",
  76090. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76091. }, {
  76092. "url" : "https://lists.apache.org/thread.html/rc15e90bbef196a5c6c01659e015249d6c9a73581ca9afb8aeecf00d2@%3Cjira.kafka.apache.org%3E",
  76093. "name" : "[kafka-jira] 20201210 [GitHub] [kafka] sirocchj commented on pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1",
  76094. "refsource" : "MLIST",
  76095. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76096. }, {
  76097. "url" : "https://lists.apache.org/thread.html/r63c87aab97155f3f3cbe11d030c4a184ea0de440ee714977db02e956@%3Cjira.kafka.apache.org%3E",
  76098. "name" : "[kafka-jira] 20201210 [GitHub] [kafka] niteshmor edited a comment on pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1",
  76099. "refsource" : "MLIST",
  76100. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76101. }, {
  76102. "url" : "https://lists.apache.org/thread.html/rc959cdb57c4fe198316130ff4a5ecbf9d680e356032ff2e9f4f05d54@%3Cjira.kafka.apache.org%3E",
  76103. "name" : "[kafka-jira] 20201210 [GitHub] [kafka] niteshmor commented on pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1",
  76104. "refsource" : "MLIST",
  76105. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76106. }, {
  76107. "url" : "https://lists.apache.org/thread.html/raf13235de6df1d47a717199e1ecd700dff3236632f5c9a1488d9845b@%3Cjira.kafka.apache.org%3E",
  76108. "name" : "[kafka-jira] 20201215 [GitHub] [kafka] ijuma commented on pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1",
  76109. "refsource" : "MLIST",
  76110. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76111. }, {
  76112. "url" : "https://lists.apache.org/thread.html/r6b11eca1d646f45eb0d35d174e6b1e47cfae5295b92000856bfb6304@%3Cusers.kafka.apache.org%3E",
  76113. "name" : "[kafka-users] 20201215 Re: [VOTE] 2.7.0 RC5",
  76114. "refsource" : "MLIST",
  76115. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76116. }, {
  76117. "url" : "https://lists.apache.org/thread.html/r6b11eca1d646f45eb0d35d174e6b1e47cfae5295b92000856bfb6304@%3Cdev.kafka.apache.org%3E",
  76118. "name" : "[kafka-dev] 20201215 Re: [VOTE] 2.7.0 RC5",
  76119. "refsource" : "MLIST",
  76120. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76121. }, {
  76122. "url" : "https://lists.apache.org/thread.html/r5f8a1608d758936bd6bbc5eed980777437b611537bf6fff40663fc71@%3Cjira.kafka.apache.org%3E",
  76123. "name" : "[kafka-jira] 20201215 [GitHub] [kafka] ijuma merged pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1",
  76124. "refsource" : "MLIST",
  76125. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76126. }, {
  76127. "url" : "https://lists.apache.org/thread.html/r78d53a0a269c18394daf5940105dc8c7f9a2399503c2e78be20abe7e@%3Cjira.kafka.apache.org%3E",
  76128. "name" : "[kafka-jira] 20201215 [GitHub] [kafka] ijuma edited a comment on pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1",
  76129. "refsource" : "MLIST",
  76130. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76131. }, {
  76132. "url" : "https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E",
  76133. "name" : "https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E",
  76134. "refsource" : "MISC",
  76135. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76136. }, {
  76137. "url" : "https://lists.apache.org/thread.html/r90d1e97b0a743cf697d89a792a9b669909cc5a1692d1e0083a22e66c@%3Cissues.zookeeper.apache.org%3E",
  76138. "name" : "[zookeeper-issues] 20210105 [jira] [Updated] (ZOOKEEPER-4045) CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76139. "refsource" : "MLIST",
  76140. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76141. }, {
  76142. "url" : "https://lists.apache.org/thread.html/r900d4408c4189b376d1ec580ea7740ea6f8710dc2f0b7e9c9eeb5ae0@%3Cdev.zookeeper.apache.org%3E",
  76143. "name" : "[zookeeper-dev] 20210105 [jira] [Created] (ZOOKEEPER-4045) CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76144. "refsource" : "MLIST",
  76145. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76146. }, {
  76147. "url" : "https://lists.apache.org/thread.html/r98bfe3b90ea9408f12c4b447edcb5638703d80bc782430aa0c210a54@%3Cissues.zookeeper.apache.org%3E",
  76148. "name" : "[zookeeper-issues] 20210105 [jira] [Created] (ZOOKEEPER-4045) CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76149. "refsource" : "MLIST",
  76150. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76151. }, {
  76152. "url" : "https://lists.apache.org/thread.html/r8937a7160717fe8b2221767163c4de4f65bc5466405cb1c5310f9080@%3Cusers.kafka.apache.org%3E",
  76153. "name" : "[kafka-users] 20210105 Re: [kafka-clients] Re: [VOTE] 2.6.1 RC3",
  76154. "refsource" : "MLIST",
  76155. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  76156. }, {
  76157. "url" : "https://lists.apache.org/thread.html/r8937a7160717fe8b2221767163c4de4f65bc5466405cb1c5310f9080@%3Cdev.kafka.apache.org%3E",
  76158. "name" : "[kafka-dev] 20210105 Re: [kafka-clients] Re: [VOTE] 2.6.1 RC3",
  76159. "refsource" : "MLIST",
  76160. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  76161. }, {
  76162. "url" : "https://lists.apache.org/thread.html/r6e3d4f7991542119a4ca6330271d7fbf7b9fb3abab24ada82ddf1ee4@%3Cnotifications.zookeeper.apache.org%3E",
  76163. "name" : "[zookeeper-notifications] 20210106 [GitHub] [zookeeper] edwin092 opened a new pull request #1572: ZOOKEEPER-4045: CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76164. "refsource" : "MLIST",
  76165. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76166. }, {
  76167. "url" : "https://lists.apache.org/thread.html/rd6f6bf848c2d47fa4a85c27d011d948778b8f7e58ba495968435a0b3@%3Cissues.zookeeper.apache.org%3E",
  76168. "name" : "[zookeeper-issues] 20210106 [jira] [Updated] (ZOOKEEPER-4045) CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76169. "refsource" : "MLIST",
  76170. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76171. }, {
  76172. "url" : "https://lists.apache.org/thread.html/r0b8dc3acd4503e4ecb6fbd6ea7d95f59941168d8452ac0ab1d1d96bb@%3Cissues.zookeeper.apache.org%3E",
  76173. "name" : "[zookeeper-issues] 20210106 [jira] [Commented] (ZOOKEEPER-4045) CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76174. "refsource" : "MLIST",
  76175. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76176. }, {
  76177. "url" : "https://lists.apache.org/thread.html/r68d029ee74ab0f3b0569d0c05f5688cb45dd3abe96a6534735252805@%3Cnotifications.zookeeper.apache.org%3E",
  76178. "name" : "[zookeeper-notifications] 20210106 [GitHub] [zookeeper] asfgit closed pull request #1572: ZOOKEEPER-4045: CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76179. "refsource" : "MLIST",
  76180. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76181. }, {
  76182. "url" : "https://lists.apache.org/thread.html/rdf9a34726482222c90d50ae1b9847881de67dde8cfde4999633d2cdc@%3Ccommits.zookeeper.apache.org%3E",
  76183. "name" : "[zookeeper-commits] 20210106 [zookeeper] branch branch-3.5 updated: ZOOKEEPER-4045: CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76184. "refsource" : "MLIST",
  76185. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  76186. }, {
  76187. "url" : "https://lists.apache.org/thread.html/r04529cedaca40c2ff90af4880493f9c88a8ebf4d1d6c861d23108a5a@%3Cnotifications.zookeeper.apache.org%3E",
  76188. "name" : "[zookeeper-notifications] 20210106 [GitHub] [zookeeper] nkalmar commented on pull request #1572: ZOOKEEPER-4045: CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76189. "refsource" : "MLIST",
  76190. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76191. }, {
  76192. "url" : "https://lists.apache.org/thread.html/r86c78bf7656fdb2dab69cbf17f3d7492300f771025f1a3a65d5e5ce5@%3Ccommits.zookeeper.apache.org%3E",
  76193. "name" : "[zookeeper-commits] 20210106 [zookeeper] branch master updated: ZOOKEEPER-4045: CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76194. "refsource" : "MLIST",
  76195. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  76196. }, {
  76197. "url" : "https://lists.apache.org/thread.html/rc88f2fa2b7bd6443921727aeee7704a1fb02433e722e2abf677e0d3d@%3Ccommits.zookeeper.apache.org%3E",
  76198. "name" : "[zookeeper-commits] 20210106 [zookeeper] branch branch-3.5.9 updated: ZOOKEEPER-4045: CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76199. "refsource" : "MLIST",
  76200. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  76201. }, {
  76202. "url" : "https://lists.apache.org/thread.html/r94c7e86e546120f157264ba5ba61fd29b3a8d530ed325a9b4fa334d7@%3Ccommits.zookeeper.apache.org%3E",
  76203. "name" : "[zookeeper-commits] 20210106 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-4045: CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76204. "refsource" : "MLIST",
  76205. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  76206. }, {
  76207. "url" : "https://security.netapp.com/advisory/ntap-20210108-0007/",
  76208. "name" : "https://security.netapp.com/advisory/ntap-20210108-0007/",
  76209. "refsource" : "CONFIRM",
  76210. "tags" : [ "Third Party Advisory" ]
  76211. }, {
  76212. "url" : "https://lists.apache.org/thread.html/rb674520b9f6c808c1bf263b1369e14048ec3243615f35cfd24e33604@%3Cissues.zookeeper.apache.org%3E",
  76213. "name" : "[zookeeper-issues] 20210116 [jira] [Commented] (ZOOKEEPER-4045) CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
  76214. "refsource" : "MLIST",
  76215. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76216. }, {
  76217. "url" : "https://lists.apache.org/thread.html/ra95faf968f3463acb3f31a6fbec31453fc5045325f99f396961886d3@%3Cissues.flink.apache.org%3E",
  76218. "name" : "[flink-issues] 20210121 [GitHub] [flink-shaded] HuangXingBo opened a new pull request #93: [FLINK-21020][jackson] Bump version to 2.12.1",
  76219. "refsource" : "MLIST",
  76220. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76221. }, {
  76222. "url" : "https://lists.apache.org/thread.html/r45e7350dfc92bb192f3f88e9971c11ab2be0953cc375be3dda5170bd@%3Cissues.flink.apache.org%3E",
  76223. "name" : "[flink-issues] 20210122 [GitHub] [flink-shaded] HuangXingBo opened a new pull request #93: [FLINK-21020][jackson] Bump version to 2.12.1",
  76224. "refsource" : "MLIST",
  76225. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76226. }, {
  76227. "url" : "https://lists.apache.org/thread.html/r95a297eb5fd1f2d3a2281f15340e2413f952e9d5503296c3adc7201a@%3Ccommits.tomee.apache.org%3E",
  76228. "name" : "[tomee-commits] 20210127 [jira] [Created] (TOMEE-2965) CVE-2020-25649 - Update jackson databind",
  76229. "refsource" : "MLIST",
  76230. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76231. }, {
  76232. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6X2UT4X6M7DLQYBOOHMXBWGYJ65RL2CT/",
  76233. "name" : "FEDORA-2021-1d8254899c",
  76234. "refsource" : "FEDORA",
  76235. "tags" : [ "Third Party Advisory" ]
  76236. }, {
  76237. "url" : "https://lists.apache.org/thread.html/re16f81d3ad49a93dd2f0cba9f8fc88e5fb89f30bf9a2ad7b6f3e69c1@%3Ccommits.karaf.apache.org%3E",
  76238. "name" : "[karaf-commits] 20210217 [GitHub] [karaf] svogt opened a new pull request #1296: Update jackson-databind to fix CVE-2020-25649 / BDSA-2020-2965",
  76239. "refsource" : "MLIST",
  76240. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76241. }, {
  76242. "url" : "https://lists.apache.org/thread.html/r91722ecfba688b0c565675f8bf380269fde8ec62b54d6161db544c22@%3Ccommits.karaf.apache.org%3E",
  76243. "name" : "[karaf-commits] 20210217 [karaf] branch master updated: Update jackson-databind to fix CVE-2020-25649 / BDSA-2020-2965",
  76244. "refsource" : "MLIST",
  76245. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76246. }, {
  76247. "url" : "https://lists.apache.org/thread.html/r3e6ae311842de4e64c5d560a475b7f9cc7e0a9a8649363c6cf7537eb@%3Ccommits.karaf.apache.org%3E",
  76248. "name" : "[karaf-commits] 20210217 [GitHub] [karaf] jbonofre merged pull request #1296: Update jackson-databind to fix CVE-2020-25649 / BDSA-2020-2965",
  76249. "refsource" : "MLIST",
  76250. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76251. }, {
  76252. "url" : "https://lists.apache.org/thread.html/rf1809a1374041a969d77afab21fc38925de066bc97e86157d3ac3402@%3Ccommits.karaf.apache.org%3E",
  76253. "name" : "[karaf-commits] 20210217 [GitHub] [karaf] jbonofre commented on pull request #1296: Update jackson-databind to fix CVE-2020-25649 / BDSA-2020-2965",
  76254. "refsource" : "MLIST",
  76255. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76256. }, {
  76257. "url" : "https://lists.apache.org/thread.html/r0881e23bd9034c8f51fdccdc8f4d085ba985dcd738f8520569ca5c3d@%3Cissues.hive.apache.org%3E",
  76258. "name" : "[hive-issues] 20210223 [jira] [Assigned] (HIVE-24816) Upgrade jackson to 2.10.5.1 or 2.11.0+ due to CVE-2020-25649",
  76259. "refsource" : "MLIST",
  76260. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76261. }, {
  76262. "url" : "https://lists.apache.org/thread.html/r5b130fe668503c4b7e2caf1b16f86b7f2070fd1b7ef8f26195a2ffbd@%3Cissues.hive.apache.org%3E",
  76263. "name" : "[hive-issues] 20210223 [jira] [Updated] (HIVE-24816) Upgrade jackson to 2.10.5.1 or 2.11.0+ due to CVE-2020-25649",
  76264. "refsource" : "MLIST",
  76265. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76266. }, {
  76267. "url" : "https://lists.apache.org/thread.html/r2eb66c182853c69ecfb52f63d3dec09495e9b65be829fd889a081ae1@%3Cdev.hive.apache.org%3E",
  76268. "name" : "[hive-dev] 20210223 [jira] [Created] (HIVE-24816) Upgrade jackson to 2.10.5.1 or 2.11.0+ due to CVE-2020-25649",
  76269. "refsource" : "MLIST",
  76270. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76271. }, {
  76272. "url" : "https://lists.apache.org/thread.html/rd57c7582adc90e233f23f3727db3df9115b27a823b92374f11453f34@%3Cissues.hive.apache.org%3E",
  76273. "name" : "[hive-issues] 20210223 [jira] [Work logged] (HIVE-24816) Upgrade jackson to 2.10.5.1 or 2.11.0+ due to CVE-2020-25649",
  76274. "refsource" : "MLIST",
  76275. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76276. }, {
  76277. "url" : "https://lists.apache.org/thread.html/r407538adec3185dd35a05c9a26ae2f74425b15132470cf540f41d85b@%3Cissues.hive.apache.org%3E",
  76278. "name" : "[hive-issues] 20210315 [jira] [Work logged] (HIVE-24816) Upgrade jackson to 2.10.5.1 or 2.11.0+ due to CVE-2020-25649",
  76279. "refsource" : "MLIST",
  76280. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76281. }, {
  76282. "url" : "https://lists.apache.org/thread.html/r011d1430e8f40dff9550c3bc5d0f48b14c01ba8aecabd91d5e495386@%3Ccommits.turbine.apache.org%3E",
  76283. "name" : "[turbine-commits] 20210316 svn commit: r1887732 - in /turbine/fulcrum/trunk/json: ./ jackson/ jackson/src/test/org/apache/fulcrum/json/jackson/ jackson2/ jackson2/src/test/org/apache/fulcrum/json/jackson/ jackson2/src/test/org/apache/fulcrum/json/jackson/mixins/",
  76284. "refsource" : "MLIST",
  76285. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76286. }, {
  76287. "url" : "https://lists.apache.org/thread.html/r2f5c5479f99398ef344b7ebd4d90bc3316236c45d0f3bc42090efcd7@%3Cissues.hive.apache.org%3E",
  76288. "name" : "[hive-issues] 20210316 [jira] [Work logged] (HIVE-24816) Upgrade jackson to 2.10.5.1 or 2.11.0+ due to CVE-2020-25649",
  76289. "refsource" : "MLIST",
  76290. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76291. }, {
  76292. "url" : "https://lists.apache.org/thread.html/r605764e05e201db33b3e9c2e66ff620658f07ad74f296abe483f7042@%3Creviews.iotdb.apache.org%3E",
  76293. "name" : "[iotdb-reviews] 20210324 [GitHub] [iotdb] wangchao316 opened a new pull request #2896: [IOTDB-1256] Jackson have loopholes CVE-2020-25649",
  76294. "refsource" : "MLIST",
  76295. "tags" : [ ]
  76296. }, {
  76297. "url" : "https://lists.apache.org/thread.html/r765283e145049df9b8998f14dcd444345555aae02b1610cfb3188bf8@%3Cnotifications.iotdb.apache.org%3E",
  76298. "name" : "[iotdb-notifications] 20210324 [jira] [Created] (IOTDB-1256) Jackson have loopholes CVE-2020-25649",
  76299. "refsource" : "MLIST",
  76300. "tags" : [ ]
  76301. }, {
  76302. "url" : "https://lists.apache.org/thread.html/r7cb5b4b3e4bd41a8042e5725b7285877a17bcbf07f4eb3f7b316af60@%3Creviews.iotdb.apache.org%3E",
  76303. "name" : "[iotdb-reviews] 20210324 [GitHub] [iotdb] wangchao316 closed pull request #2896: [IOTDB-1256] Jackson have loopholes CVE-2020-25649",
  76304. "refsource" : "MLIST",
  76305. "tags" : [ ]
  76306. }, {
  76307. "url" : "https://lists.apache.org/thread.html/r73bef1bb601a9f093f915f8075eb49fcca51efade57b817afd5def07@%3Ccommits.iotdb.apache.org%3E",
  76308. "name" : "[iotdb-commits] 20210325 [iotdb] branch master updated: [IOTDB-1256] upgrade Jackson to 2.11.0 because of loopholes CVE-2020-25649 (#2896)",
  76309. "refsource" : "MLIST",
  76310. "tags" : [ ]
  76311. }, {
  76312. "url" : "https://lists.apache.org/thread.html/r6cbd599b80e787f02ff7a1391d9278a03f37d6a6f4f943f0f01a62fb@%3Creviews.iotdb.apache.org%3E",
  76313. "name" : "[iotdb-reviews] 20210325 [GitHub] [iotdb] jixuan1989 merged pull request #2896: [IOTDB-1256] Jackson have loopholes CVE-2020-25649",
  76314. "refsource" : "MLIST",
  76315. "tags" : [ ]
  76316. }, {
  76317. "url" : "https://lists.apache.org/thread.html/ra409f798a1e5a6652b7097429b388650ccd65fd958cee0b6f69bba00@%3Cissues.hive.apache.org%3E",
  76318. "name" : "[hive-issues] 20210503 [jira] [Work logged] (HIVE-24816) Upgrade jackson to 2.10.5.1 or 2.11.0+ due to CVE-2020-25649",
  76319. "refsource" : "MLIST",
  76320. "tags" : [ ]
  76321. } ]
  76322. },
  76323. "description" : {
  76324. "description_data" : [ {
  76325. "lang" : "en",
  76326. "value" : "A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity."
  76327. } ]
  76328. }
  76329. },
  76330. "configurations" : {
  76331. "CVE_data_version" : "4.0",
  76332. "nodes" : [ {
  76333. "operator" : "OR",
  76334. "children" : [ ],
  76335. "cpe_match" : [ {
  76336. "vulnerable" : true,
  76337. "cpe23Uri" : "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
  76338. "versionStartIncluding" : "2.6.0",
  76339. "versionEndExcluding" : "2.6.7.4",
  76340. "cpe_name" : [ ]
  76341. }, {
  76342. "vulnerable" : true,
  76343. "cpe23Uri" : "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
  76344. "versionStartIncluding" : "2.9.0",
  76345. "versionEndExcluding" : "2.9.10.7",
  76346. "cpe_name" : [ ]
  76347. }, {
  76348. "vulnerable" : true,
  76349. "cpe23Uri" : "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
  76350. "versionStartIncluding" : "2.10.0",
  76351. "versionEndExcluding" : "2.10.5.1",
  76352. "cpe_name" : [ ]
  76353. } ]
  76354. }, {
  76355. "operator" : "OR",
  76356. "children" : [ ],
  76357. "cpe_match" : [ {
  76358. "vulnerable" : true,
  76359. "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_api_services:-:*:*:*:*:*:*:*",
  76360. "cpe_name" : [ ]
  76361. }, {
  76362. "vulnerable" : true,
  76363. "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
  76364. "cpe_name" : [ ]
  76365. }, {
  76366. "vulnerable" : true,
  76367. "cpe23Uri" : "cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*",
  76368. "cpe_name" : [ ]
  76369. } ]
  76370. }, {
  76371. "operator" : "OR",
  76372. "children" : [ ],
  76373. "cpe_match" : [ {
  76374. "vulnerable" : true,
  76375. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  76376. "cpe_name" : [ ]
  76377. } ]
  76378. }, {
  76379. "operator" : "OR",
  76380. "children" : [ ],
  76381. "cpe_match" : [ {
  76382. "vulnerable" : true,
  76383. "cpe23Uri" : "cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*",
  76384. "versionEndIncluding" : "1.6.1",
  76385. "cpe_name" : [ ]
  76386. } ]
  76387. } ]
  76388. },
  76389. "impact" : {
  76390. "baseMetricV3" : {
  76391. "cvssV3" : {
  76392. "version" : "3.1",
  76393. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
  76394. "attackVector" : "NETWORK",
  76395. "attackComplexity" : "LOW",
  76396. "privilegesRequired" : "NONE",
  76397. "userInteraction" : "NONE",
  76398. "scope" : "UNCHANGED",
  76399. "confidentialityImpact" : "NONE",
  76400. "integrityImpact" : "HIGH",
  76401. "availabilityImpact" : "NONE",
  76402. "baseScore" : 7.5,
  76403. "baseSeverity" : "HIGH"
  76404. },
  76405. "exploitabilityScore" : 3.9,
  76406. "impactScore" : 3.6
  76407. },
  76408. "baseMetricV2" : {
  76409. "cvssV2" : {
  76410. "version" : "2.0",
  76411. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  76412. "accessVector" : "NETWORK",
  76413. "accessComplexity" : "LOW",
  76414. "authentication" : "NONE",
  76415. "confidentialityImpact" : "NONE",
  76416. "integrityImpact" : "PARTIAL",
  76417. "availabilityImpact" : "NONE",
  76418. "baseScore" : 5.0
  76419. },
  76420. "severity" : "MEDIUM",
  76421. "exploitabilityScore" : 10.0,
  76422. "impactScore" : 2.9,
  76423. "acInsufInfo" : false,
  76424. "obtainAllPrivilege" : false,
  76425. "obtainUserPrivilege" : false,
  76426. "obtainOtherPrivilege" : false,
  76427. "userInteractionRequired" : false
  76428. }
  76429. },
  76430. "publishedDate" : "2020-12-03T17:15Z",
  76431. "lastModifiedDate" : "2021-05-03T20:15Z"
  76432. }, {
  76433. "cve" : {
  76434. "data_type" : "CVE",
  76435. "data_format" : "MITRE",
  76436. "data_version" : "4.0",
  76437. "CVE_data_meta" : {
  76438. "ID" : "CVE-2020-14383",
  76439. "ASSIGNER" : "secalert@redhat.com"
  76440. },
  76441. "problemtype" : {
  76442. "problemtype_data" : [ {
  76443. "description" : [ {
  76444. "lang" : "en",
  76445. "value" : "NVD-CWE-Other"
  76446. } ]
  76447. } ]
  76448. },
  76449. "references" : {
  76450. "reference_data" : [ {
  76451. "url" : "https://www.samba.org/samba/security/CVE-2020-14383.html",
  76452. "name" : "https://www.samba.org/samba/security/CVE-2020-14383.html",
  76453. "refsource" : "MISC",
  76454. "tags" : [ "Vendor Advisory" ]
  76455. }, {
  76456. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1892636",
  76457. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1892636",
  76458. "refsource" : "MISC",
  76459. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  76460. }, {
  76461. "url" : "https://security.gentoo.org/glsa/202012-24",
  76462. "name" : "GLSA-202012-24",
  76463. "refsource" : "GENTOO",
  76464. "tags" : [ "Third Party Advisory" ]
  76465. } ]
  76466. },
  76467. "description" : {
  76468. "description_data" : [ {
  76469. "lang" : "en",
  76470. "value" : "A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not."
  76471. } ]
  76472. }
  76473. },
  76474. "configurations" : {
  76475. "CVE_data_version" : "4.0",
  76476. "nodes" : [ {
  76477. "operator" : "OR",
  76478. "children" : [ ],
  76479. "cpe_match" : [ {
  76480. "vulnerable" : true,
  76481. "cpe23Uri" : "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
  76482. "versionStartIncluding" : "4.0.0",
  76483. "versionEndExcluding" : "4.11.15",
  76484. "cpe_name" : [ ]
  76485. }, {
  76486. "vulnerable" : true,
  76487. "cpe23Uri" : "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
  76488. "versionStartIncluding" : "4.12.0",
  76489. "versionEndExcluding" : "4.12.9",
  76490. "cpe_name" : [ ]
  76491. }, {
  76492. "vulnerable" : true,
  76493. "cpe23Uri" : "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
  76494. "versionStartIncluding" : "4.13.0",
  76495. "versionEndExcluding" : "4.13.1",
  76496. "cpe_name" : [ ]
  76497. } ]
  76498. }, {
  76499. "operator" : "OR",
  76500. "children" : [ ],
  76501. "cpe_match" : [ {
  76502. "vulnerable" : true,
  76503. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
  76504. "cpe_name" : [ ]
  76505. } ]
  76506. } ]
  76507. },
  76508. "impact" : {
  76509. "baseMetricV3" : {
  76510. "cvssV3" : {
  76511. "version" : "3.1",
  76512. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  76513. "attackVector" : "NETWORK",
  76514. "attackComplexity" : "LOW",
  76515. "privilegesRequired" : "LOW",
  76516. "userInteraction" : "NONE",
  76517. "scope" : "UNCHANGED",
  76518. "confidentialityImpact" : "NONE",
  76519. "integrityImpact" : "NONE",
  76520. "availabilityImpact" : "HIGH",
  76521. "baseScore" : 6.5,
  76522. "baseSeverity" : "MEDIUM"
  76523. },
  76524. "exploitabilityScore" : 2.8,
  76525. "impactScore" : 3.6
  76526. },
  76527. "baseMetricV2" : {
  76528. "cvssV2" : {
  76529. "version" : "2.0",
  76530. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P",
  76531. "accessVector" : "NETWORK",
  76532. "accessComplexity" : "LOW",
  76533. "authentication" : "SINGLE",
  76534. "confidentialityImpact" : "NONE",
  76535. "integrityImpact" : "NONE",
  76536. "availabilityImpact" : "PARTIAL",
  76537. "baseScore" : 4.0
  76538. },
  76539. "severity" : "MEDIUM",
  76540. "exploitabilityScore" : 8.0,
  76541. "impactScore" : 2.9,
  76542. "acInsufInfo" : false,
  76543. "obtainAllPrivilege" : false,
  76544. "obtainUserPrivilege" : false,
  76545. "obtainOtherPrivilege" : false,
  76546. "userInteractionRequired" : false
  76547. }
  76548. },
  76549. "publishedDate" : "2020-12-02T01:15Z",
  76550. "lastModifiedDate" : "2021-05-05T12:57Z"
  76551. }, {
  76552. "cve" : {
  76553. "data_type" : "CVE",
  76554. "data_format" : "MITRE",
  76555. "data_version" : "4.0",
  76556. "CVE_data_meta" : {
  76557. "ID" : "CVE-2020-28928",
  76558. "ASSIGNER" : "cve@mitre.org"
  76559. },
  76560. "problemtype" : {
  76561. "problemtype_data" : [ {
  76562. "description" : [ {
  76563. "lang" : "en",
  76564. "value" : "CWE-787"
  76565. } ]
  76566. } ]
  76567. },
  76568. "references" : {
  76569. "reference_data" : [ {
  76570. "url" : "http://www.openwall.com/lists/oss-security/2020/11/20/4",
  76571. "name" : "http://www.openwall.com/lists/oss-security/2020/11/20/4",
  76572. "refsource" : "CONFIRM",
  76573. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76574. }, {
  76575. "url" : "https://musl.libc.org/releases.html",
  76576. "name" : "https://musl.libc.org/releases.html",
  76577. "refsource" : "MISC",
  76578. "tags" : [ "Release Notes", "Vendor Advisory" ]
  76579. }, {
  76580. "url" : "https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html",
  76581. "name" : "[debian-lts-announce] 20201130 [SECURITY] [DLA 2474-1] musl security update",
  76582. "refsource" : "MLIST",
  76583. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76584. }, {
  76585. "url" : "https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E",
  76586. "name" : "[apisix-notifications] 20210428 [apisix-docker] branch master updated: fix: upgrade alpine version due to CVE-2020-28928 (#166)",
  76587. "refsource" : "MLIST",
  76588. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76589. }, {
  76590. "url" : "https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E",
  76591. "name" : "[apisix-notifications] 20210428 [GitHub] [apisix-docker] tao12345666333 opened a new pull request #166: fix: upgrade alpine version due to CVE-2020-28928",
  76592. "refsource" : "MLIST",
  76593. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76594. }, {
  76595. "url" : "https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E",
  76596. "name" : "[apisix-notifications] 20210428 [GitHub] [apisix-docker] starsz merged pull request #166: fix: upgrade alpine version due to CVE-2020-28928",
  76597. "refsource" : "MLIST",
  76598. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76599. } ]
  76600. },
  76601. "description" : {
  76602. "description_data" : [ {
  76603. "lang" : "en",
  76604. "value" : "In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow)."
  76605. } ]
  76606. }
  76607. },
  76608. "configurations" : {
  76609. "CVE_data_version" : "4.0",
  76610. "nodes" : [ {
  76611. "operator" : "OR",
  76612. "children" : [ ],
  76613. "cpe_match" : [ {
  76614. "vulnerable" : true,
  76615. "cpe23Uri" : "cpe:2.3:a:musl-libc:musl:*:*:*:*:*:*:*:*",
  76616. "versionEndIncluding" : "1.2.1",
  76617. "cpe_name" : [ ]
  76618. } ]
  76619. }, {
  76620. "operator" : "OR",
  76621. "children" : [ ],
  76622. "cpe_match" : [ {
  76623. "vulnerable" : true,
  76624. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  76625. "cpe_name" : [ ]
  76626. } ]
  76627. } ]
  76628. },
  76629. "impact" : {
  76630. "baseMetricV3" : {
  76631. "cvssV3" : {
  76632. "version" : "3.1",
  76633. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  76634. "attackVector" : "LOCAL",
  76635. "attackComplexity" : "LOW",
  76636. "privilegesRequired" : "LOW",
  76637. "userInteraction" : "NONE",
  76638. "scope" : "UNCHANGED",
  76639. "confidentialityImpact" : "NONE",
  76640. "integrityImpact" : "NONE",
  76641. "availabilityImpact" : "HIGH",
  76642. "baseScore" : 5.5,
  76643. "baseSeverity" : "MEDIUM"
  76644. },
  76645. "exploitabilityScore" : 1.8,
  76646. "impactScore" : 3.6
  76647. },
  76648. "baseMetricV2" : {
  76649. "cvssV2" : {
  76650. "version" : "2.0",
  76651. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:P",
  76652. "accessVector" : "LOCAL",
  76653. "accessComplexity" : "LOW",
  76654. "authentication" : "NONE",
  76655. "confidentialityImpact" : "NONE",
  76656. "integrityImpact" : "NONE",
  76657. "availabilityImpact" : "PARTIAL",
  76658. "baseScore" : 2.1
  76659. },
  76660. "severity" : "LOW",
  76661. "exploitabilityScore" : 3.9,
  76662. "impactScore" : 2.9,
  76663. "acInsufInfo" : false,
  76664. "obtainAllPrivilege" : false,
  76665. "obtainUserPrivilege" : false,
  76666. "obtainOtherPrivilege" : false,
  76667. "userInteractionRequired" : false
  76668. }
  76669. },
  76670. "publishedDate" : "2020-11-24T18:15Z",
  76671. "lastModifiedDate" : "2021-05-04T14:04Z"
  76672. }, {
  76673. "cve" : {
  76674. "data_type" : "CVE",
  76675. "data_format" : "MITRE",
  76676. "data_version" : "4.0",
  76677. "CVE_data_meta" : {
  76678. "ID" : "CVE-2020-13942",
  76679. "ASSIGNER" : "security@apache.org"
  76680. },
  76681. "problemtype" : {
  76682. "problemtype_data" : [ {
  76683. "description" : [ {
  76684. "lang" : "en",
  76685. "value" : "CWE-74"
  76686. } ]
  76687. } ]
  76688. },
  76689. "references" : {
  76690. "reference_data" : [ {
  76691. "url" : "http://unomi.apache.org./security/cve-2020-13942.txt",
  76692. "name" : "N/A",
  76693. "refsource" : "CONFIRM",
  76694. "tags" : [ "Mailing List", "Vendor Advisory" ]
  76695. }, {
  76696. "url" : "https://lists.apache.org/thread.html/r4a8fa91836687eaca42b5420a778ca8c8fd3a3740e4cf4401acc9118@%3Cusers.unomi.apache.org%3E",
  76697. "name" : "[unomi-users] 20201124 Apache Unomi 1.5.4 Release",
  76698. "refsource" : "MLIST",
  76699. "tags" : [ "Mailing List", "Vendor Advisory" ]
  76700. }, {
  76701. "url" : "https://lists.apache.org/thread.html/r4a8fa91836687eaca42b5420a778ca8c8fd3a3740e4cf4401acc9118@%3Cdev.unomi.apache.org%3E",
  76702. "name" : "[unomi-dev] 20201124 Apache Unomi 1.5.4 Release",
  76703. "refsource" : "MLIST",
  76704. "tags" : [ "Mailing List", "Vendor Advisory" ]
  76705. }, {
  76706. "url" : "https://lists.apache.org/thread.html/rcb6d2eafcf15def433aaddfa06738e5faa5060cef2647769e178999a@%3Cusers.unomi.apache.org%3E",
  76707. "name" : "[unomi-users] 20201124 CVE-2020-13942: Remote Code Execution in Apache Unomi",
  76708. "refsource" : "MLIST",
  76709. "tags" : [ "Mailing List", "Vendor Advisory" ]
  76710. }, {
  76711. "url" : "https://lists.apache.org/thread.html/rcb6d2eafcf15def433aaddfa06738e5faa5060cef2647769e178999a@%3Cdev.unomi.apache.org%3E",
  76712. "name" : "[unomi-dev] 20201124 CVE-2020-13942: Remote Code Execution in Apache Unomi",
  76713. "refsource" : "MLIST",
  76714. "tags" : [ "Mailing List", "Vendor Advisory" ]
  76715. }, {
  76716. "url" : "http://www.openwall.com/lists/oss-security/2020/11/24/5",
  76717. "name" : "[oss-security] 20201124 CVE-2020-13942: Remote Code Execution in Apache Unomi",
  76718. "refsource" : "MLIST",
  76719. "tags" : [ "Mailing List", "Third Party Advisory" ]
  76720. }, {
  76721. "url" : "https://lists.apache.org/thread.html/r08a4057ff7196b8880117edaa4b6207cbd36ed692d8dd1f5a56b4d0f@%3Cannounce.apache.org%3E",
  76722. "name" : "[announce] 20201124 CVE-2020-13942: Remote Code Execution in Apache Unomi",
  76723. "refsource" : "MLIST",
  76724. "tags" : [ "Mailing List", "Vendor Advisory" ]
  76725. }, {
  76726. "url" : "https://advisory.checkmarx.net/advisory/CX-2020-4284",
  76727. "name" : "https://advisory.checkmarx.net/advisory/CX-2020-4284",
  76728. "refsource" : "MISC",
  76729. "tags" : [ "Exploit", "Third Party Advisory" ]
  76730. }, {
  76731. "url" : "https://lists.apache.org/thread.html/r79672c25e0ef9bb4b9148376281200a8e61c6d5ef5bb705e9a363460@%3Ccommits.unomi.apache.org%3E",
  76732. "name" : "[unomi-commits] 20210428 svn commit: r1889256 - in /unomi/website: contribute-release-guide.html documentation.html download.html index.html security/cve-2021-31164.txt",
  76733. "refsource" : "MLIST",
  76734. "tags" : [ "Exploit", "Mailing List", "Vendor Advisory" ]
  76735. } ]
  76736. },
  76737. "description" : {
  76738. "description_data" : [ {
  76739. "lang" : "en",
  76740. "value" : "It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem."
  76741. } ]
  76742. }
  76743. },
  76744. "configurations" : {
  76745. "CVE_data_version" : "4.0",
  76746. "nodes" : [ {
  76747. "operator" : "OR",
  76748. "children" : [ ],
  76749. "cpe_match" : [ {
  76750. "vulnerable" : true,
  76751. "cpe23Uri" : "cpe:2.3:a:apache:unomi:*:*:*:*:*:*:*:*",
  76752. "versionStartIncluding" : "1.5.0",
  76753. "versionEndExcluding" : "1.5.2",
  76754. "cpe_name" : [ ]
  76755. } ]
  76756. } ]
  76757. },
  76758. "impact" : {
  76759. "baseMetricV3" : {
  76760. "cvssV3" : {
  76761. "version" : "3.1",
  76762. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  76763. "attackVector" : "NETWORK",
  76764. "attackComplexity" : "LOW",
  76765. "privilegesRequired" : "NONE",
  76766. "userInteraction" : "NONE",
  76767. "scope" : "UNCHANGED",
  76768. "confidentialityImpact" : "HIGH",
  76769. "integrityImpact" : "HIGH",
  76770. "availabilityImpact" : "HIGH",
  76771. "baseScore" : 9.8,
  76772. "baseSeverity" : "CRITICAL"
  76773. },
  76774. "exploitabilityScore" : 3.9,
  76775. "impactScore" : 5.9
  76776. },
  76777. "baseMetricV2" : {
  76778. "cvssV2" : {
  76779. "version" : "2.0",
  76780. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  76781. "accessVector" : "NETWORK",
  76782. "accessComplexity" : "LOW",
  76783. "authentication" : "NONE",
  76784. "confidentialityImpact" : "PARTIAL",
  76785. "integrityImpact" : "PARTIAL",
  76786. "availabilityImpact" : "PARTIAL",
  76787. "baseScore" : 7.5
  76788. },
  76789. "severity" : "HIGH",
  76790. "exploitabilityScore" : 10.0,
  76791. "impactScore" : 6.4,
  76792. "acInsufInfo" : false,
  76793. "obtainAllPrivilege" : false,
  76794. "obtainUserPrivilege" : false,
  76795. "obtainOtherPrivilege" : false,
  76796. "userInteractionRequired" : false
  76797. }
  76798. },
  76799. "publishedDate" : "2020-11-24T18:15Z",
  76800. "lastModifiedDate" : "2021-05-05T13:26Z"
  76801. }, {
  76802. "cve" : {
  76803. "data_type" : "CVE",
  76804. "data_format" : "MITRE",
  76805. "data_version" : "4.0",
  76806. "CVE_data_meta" : {
  76807. "ID" : "CVE-2020-11209",
  76808. "ASSIGNER" : "product-security@qualcomm.com"
  76809. },
  76810. "problemtype" : {
  76811. "problemtype_data" : [ {
  76812. "description" : [ {
  76813. "lang" : "en",
  76814. "value" : "CWE-125"
  76815. } ]
  76816. } ]
  76817. },
  76818. "references" : {
  76819. "reference_data" : [ {
  76820. "url" : "https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin",
  76821. "name" : "https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin",
  76822. "refsource" : "CONFIRM",
  76823. "tags" : [ "Vendor Advisory" ]
  76824. }, {
  76825. "url" : "https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/",
  76826. "name" : "https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/",
  76827. "refsource" : "MISC",
  76828. "tags" : [ ]
  76829. }, {
  76830. "url" : "https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/",
  76831. "name" : "https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/",
  76832. "refsource" : "MISC",
  76833. "tags" : [ ]
  76834. } ]
  76835. },
  76836. "description" : {
  76837. "description_data" : [ {
  76838. "lang" : "en",
  76839. "value" : "Improper authorization in DSP process could allow unauthorized users to downgrade the library versions in SD820, SD821, SD820, QCS603, QCS605, SDA855, SA6155P, SA6145P, SA6155, SA6155P, SD855, SD 675, SD660, SD429, SD439"
  76840. } ]
  76841. }
  76842. },
  76843. "configurations" : {
  76844. "CVE_data_version" : "4.0",
  76845. "nodes" : [ {
  76846. "operator" : "AND",
  76847. "children" : [ {
  76848. "operator" : "OR",
  76849. "children" : [ ],
  76850. "cpe_match" : [ {
  76851. "vulnerable" : true,
  76852. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*",
  76853. "cpe_name" : [ ]
  76854. } ]
  76855. }, {
  76856. "operator" : "OR",
  76857. "children" : [ ],
  76858. "cpe_match" : [ {
  76859. "vulnerable" : false,
  76860. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*",
  76861. "cpe_name" : [ ]
  76862. } ]
  76863. } ],
  76864. "cpe_match" : [ ]
  76865. }, {
  76866. "operator" : "AND",
  76867. "children" : [ {
  76868. "operator" : "OR",
  76869. "children" : [ ],
  76870. "cpe_match" : [ {
  76871. "vulnerable" : true,
  76872. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*",
  76873. "cpe_name" : [ ]
  76874. } ]
  76875. }, {
  76876. "operator" : "OR",
  76877. "children" : [ ],
  76878. "cpe_match" : [ {
  76879. "vulnerable" : false,
  76880. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd821:-:*:*:*:*:*:*:*",
  76881. "cpe_name" : [ ]
  76882. } ]
  76883. } ],
  76884. "cpe_match" : [ ]
  76885. }, {
  76886. "operator" : "AND",
  76887. "children" : [ {
  76888. "operator" : "OR",
  76889. "children" : [ ],
  76890. "cpe_match" : [ {
  76891. "vulnerable" : true,
  76892. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*",
  76893. "cpe_name" : [ ]
  76894. } ]
  76895. }, {
  76896. "operator" : "OR",
  76897. "children" : [ ],
  76898. "cpe_match" : [ {
  76899. "vulnerable" : false,
  76900. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
  76901. "cpe_name" : [ ]
  76902. } ]
  76903. } ],
  76904. "cpe_match" : [ ]
  76905. }, {
  76906. "operator" : "AND",
  76907. "children" : [ {
  76908. "operator" : "OR",
  76909. "children" : [ ],
  76910. "cpe_match" : [ {
  76911. "vulnerable" : true,
  76912. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
  76913. "cpe_name" : [ ]
  76914. } ]
  76915. }, {
  76916. "operator" : "OR",
  76917. "children" : [ ],
  76918. "cpe_match" : [ {
  76919. "vulnerable" : false,
  76920. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
  76921. "cpe_name" : [ ]
  76922. } ]
  76923. } ],
  76924. "cpe_match" : [ ]
  76925. }, {
  76926. "operator" : "AND",
  76927. "children" : [ {
  76928. "operator" : "OR",
  76929. "children" : [ ],
  76930. "cpe_match" : [ {
  76931. "vulnerable" : true,
  76932. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda855_firmware:-:*:*:*:*:*:*:*",
  76933. "cpe_name" : [ ]
  76934. } ]
  76935. }, {
  76936. "operator" : "OR",
  76937. "children" : [ ],
  76938. "cpe_match" : [ {
  76939. "vulnerable" : false,
  76940. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda855:-:*:*:*:*:*:*:*",
  76941. "cpe_name" : [ ]
  76942. } ]
  76943. } ],
  76944. "cpe_match" : [ ]
  76945. }, {
  76946. "operator" : "AND",
  76947. "children" : [ {
  76948. "operator" : "OR",
  76949. "children" : [ ],
  76950. "cpe_match" : [ {
  76951. "vulnerable" : true,
  76952. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
  76953. "cpe_name" : [ ]
  76954. } ]
  76955. }, {
  76956. "operator" : "OR",
  76957. "children" : [ ],
  76958. "cpe_match" : [ {
  76959. "vulnerable" : false,
  76960. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
  76961. "cpe_name" : [ ]
  76962. } ]
  76963. } ],
  76964. "cpe_match" : [ ]
  76965. }, {
  76966. "operator" : "AND",
  76967. "children" : [ {
  76968. "operator" : "OR",
  76969. "children" : [ ],
  76970. "cpe_match" : [ {
  76971. "vulnerable" : true,
  76972. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
  76973. "cpe_name" : [ ]
  76974. } ]
  76975. }, {
  76976. "operator" : "OR",
  76977. "children" : [ ],
  76978. "cpe_match" : [ {
  76979. "vulnerable" : false,
  76980. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
  76981. "cpe_name" : [ ]
  76982. } ]
  76983. } ],
  76984. "cpe_match" : [ ]
  76985. }, {
  76986. "operator" : "AND",
  76987. "children" : [ {
  76988. "operator" : "OR",
  76989. "children" : [ ],
  76990. "cpe_match" : [ {
  76991. "vulnerable" : true,
  76992. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
  76993. "cpe_name" : [ ]
  76994. } ]
  76995. }, {
  76996. "operator" : "OR",
  76997. "children" : [ ],
  76998. "cpe_match" : [ {
  76999. "vulnerable" : false,
  77000. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
  77001. "cpe_name" : [ ]
  77002. } ]
  77003. } ],
  77004. "cpe_match" : [ ]
  77005. }, {
  77006. "operator" : "AND",
  77007. "children" : [ {
  77008. "operator" : "OR",
  77009. "children" : [ ],
  77010. "cpe_match" : [ {
  77011. "vulnerable" : true,
  77012. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
  77013. "cpe_name" : [ ]
  77014. } ]
  77015. }, {
  77016. "operator" : "OR",
  77017. "children" : [ ],
  77018. "cpe_match" : [ {
  77019. "vulnerable" : false,
  77020. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
  77021. "cpe_name" : [ ]
  77022. } ]
  77023. } ],
  77024. "cpe_match" : [ ]
  77025. }, {
  77026. "operator" : "AND",
  77027. "children" : [ {
  77028. "operator" : "OR",
  77029. "children" : [ ],
  77030. "cpe_match" : [ {
  77031. "vulnerable" : true,
  77032. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
  77033. "cpe_name" : [ ]
  77034. } ]
  77035. }, {
  77036. "operator" : "OR",
  77037. "children" : [ ],
  77038. "cpe_match" : [ {
  77039. "vulnerable" : false,
  77040. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
  77041. "cpe_name" : [ ]
  77042. } ]
  77043. } ],
  77044. "cpe_match" : [ ]
  77045. }, {
  77046. "operator" : "AND",
  77047. "children" : [ {
  77048. "operator" : "OR",
  77049. "children" : [ ],
  77050. "cpe_match" : [ {
  77051. "vulnerable" : true,
  77052. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
  77053. "cpe_name" : [ ]
  77054. } ]
  77055. }, {
  77056. "operator" : "OR",
  77057. "children" : [ ],
  77058. "cpe_match" : [ {
  77059. "vulnerable" : false,
  77060. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
  77061. "cpe_name" : [ ]
  77062. } ]
  77063. } ],
  77064. "cpe_match" : [ ]
  77065. }, {
  77066. "operator" : "AND",
  77067. "children" : [ {
  77068. "operator" : "OR",
  77069. "children" : [ ],
  77070. "cpe_match" : [ {
  77071. "vulnerable" : true,
  77072. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
  77073. "cpe_name" : [ ]
  77074. } ]
  77075. }, {
  77076. "operator" : "OR",
  77077. "children" : [ ],
  77078. "cpe_match" : [ {
  77079. "vulnerable" : false,
  77080. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
  77081. "cpe_name" : [ ]
  77082. } ]
  77083. } ],
  77084. "cpe_match" : [ ]
  77085. }, {
  77086. "operator" : "AND",
  77087. "children" : [ {
  77088. "operator" : "OR",
  77089. "children" : [ ],
  77090. "cpe_match" : [ {
  77091. "vulnerable" : true,
  77092. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*",
  77093. "cpe_name" : [ ]
  77094. } ]
  77095. }, {
  77096. "operator" : "OR",
  77097. "children" : [ ],
  77098. "cpe_match" : [ {
  77099. "vulnerable" : false,
  77100. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*",
  77101. "cpe_name" : [ ]
  77102. } ]
  77103. } ],
  77104. "cpe_match" : [ ]
  77105. }, {
  77106. "operator" : "AND",
  77107. "children" : [ {
  77108. "operator" : "OR",
  77109. "children" : [ ],
  77110. "cpe_match" : [ {
  77111. "vulnerable" : true,
  77112. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:*",
  77113. "cpe_name" : [ ]
  77114. } ]
  77115. }, {
  77116. "operator" : "OR",
  77117. "children" : [ ],
  77118. "cpe_match" : [ {
  77119. "vulnerable" : false,
  77120. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*",
  77121. "cpe_name" : [ ]
  77122. } ]
  77123. } ],
  77124. "cpe_match" : [ ]
  77125. } ]
  77126. },
  77127. "impact" : {
  77128. "baseMetricV3" : {
  77129. "cvssV3" : {
  77130. "version" : "3.1",
  77131. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
  77132. "attackVector" : "LOCAL",
  77133. "attackComplexity" : "LOW",
  77134. "privilegesRequired" : "LOW",
  77135. "userInteraction" : "NONE",
  77136. "scope" : "UNCHANGED",
  77137. "confidentialityImpact" : "NONE",
  77138. "integrityImpact" : "HIGH",
  77139. "availabilityImpact" : "NONE",
  77140. "baseScore" : 5.5,
  77141. "baseSeverity" : "MEDIUM"
  77142. },
  77143. "exploitabilityScore" : 1.8,
  77144. "impactScore" : 3.6
  77145. },
  77146. "baseMetricV2" : {
  77147. "cvssV2" : {
  77148. "version" : "2.0",
  77149. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:P/A:N",
  77150. "accessVector" : "LOCAL",
  77151. "accessComplexity" : "LOW",
  77152. "authentication" : "NONE",
  77153. "confidentialityImpact" : "NONE",
  77154. "integrityImpact" : "PARTIAL",
  77155. "availabilityImpact" : "NONE",
  77156. "baseScore" : 2.1
  77157. },
  77158. "severity" : "LOW",
  77159. "exploitabilityScore" : 3.9,
  77160. "impactScore" : 2.9,
  77161. "acInsufInfo" : false,
  77162. "obtainAllPrivilege" : false,
  77163. "obtainUserPrivilege" : false,
  77164. "obtainOtherPrivilege" : false,
  77165. "userInteractionRequired" : false
  77166. }
  77167. },
  77168. "publishedDate" : "2020-11-12T10:15Z",
  77169. "lastModifiedDate" : "2021-05-10T13:15Z"
  77170. }, {
  77171. "cve" : {
  77172. "data_type" : "CVE",
  77173. "data_format" : "MITRE",
  77174. "data_version" : "4.0",
  77175. "CVE_data_meta" : {
  77176. "ID" : "CVE-2020-11208",
  77177. "ASSIGNER" : "product-security@qualcomm.com"
  77178. },
  77179. "problemtype" : {
  77180. "problemtype_data" : [ {
  77181. "description" : [ {
  77182. "lang" : "en",
  77183. "value" : "CWE-191"
  77184. } ]
  77185. } ]
  77186. },
  77187. "references" : {
  77188. "reference_data" : [ {
  77189. "url" : "https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin",
  77190. "name" : "https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin",
  77191. "refsource" : "CONFIRM",
  77192. "tags" : [ "Vendor Advisory" ]
  77193. }, {
  77194. "url" : "https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/",
  77195. "name" : "https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/",
  77196. "refsource" : "MISC",
  77197. "tags" : [ ]
  77198. }, {
  77199. "url" : "https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/",
  77200. "name" : "https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/",
  77201. "refsource" : "MISC",
  77202. "tags" : [ ]
  77203. } ]
  77204. },
  77205. "description" : {
  77206. "description_data" : [ {
  77207. "lang" : "en",
  77208. "value" : "Out of Bound issue in DSP services while processing received arguments due to improper validation of length received as an argument' in SD820, SD821, SD820, QCS603, QCS605, SDA855, SA6155P, SA6145P, SA6155, SA6155P, SD855, SD 675, SD660, SD429, SD439"
  77209. } ]
  77210. }
  77211. },
  77212. "configurations" : {
  77213. "CVE_data_version" : "4.0",
  77214. "nodes" : [ {
  77215. "operator" : "AND",
  77216. "children" : [ {
  77217. "operator" : "OR",
  77218. "children" : [ ],
  77219. "cpe_match" : [ {
  77220. "vulnerable" : true,
  77221. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*",
  77222. "cpe_name" : [ ]
  77223. } ]
  77224. }, {
  77225. "operator" : "OR",
  77226. "children" : [ ],
  77227. "cpe_match" : [ {
  77228. "vulnerable" : false,
  77229. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*",
  77230. "cpe_name" : [ ]
  77231. } ]
  77232. } ],
  77233. "cpe_match" : [ ]
  77234. }, {
  77235. "operator" : "AND",
  77236. "children" : [ {
  77237. "operator" : "OR",
  77238. "children" : [ ],
  77239. "cpe_match" : [ {
  77240. "vulnerable" : true,
  77241. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*",
  77242. "cpe_name" : [ ]
  77243. } ]
  77244. }, {
  77245. "operator" : "OR",
  77246. "children" : [ ],
  77247. "cpe_match" : [ {
  77248. "vulnerable" : false,
  77249. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd821:-:*:*:*:*:*:*:*",
  77250. "cpe_name" : [ ]
  77251. } ]
  77252. } ],
  77253. "cpe_match" : [ ]
  77254. }, {
  77255. "operator" : "AND",
  77256. "children" : [ {
  77257. "operator" : "OR",
  77258. "children" : [ ],
  77259. "cpe_match" : [ {
  77260. "vulnerable" : true,
  77261. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*",
  77262. "cpe_name" : [ ]
  77263. } ]
  77264. }, {
  77265. "operator" : "OR",
  77266. "children" : [ ],
  77267. "cpe_match" : [ {
  77268. "vulnerable" : false,
  77269. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
  77270. "cpe_name" : [ ]
  77271. } ]
  77272. } ],
  77273. "cpe_match" : [ ]
  77274. }, {
  77275. "operator" : "AND",
  77276. "children" : [ {
  77277. "operator" : "OR",
  77278. "children" : [ ],
  77279. "cpe_match" : [ {
  77280. "vulnerable" : true,
  77281. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
  77282. "cpe_name" : [ ]
  77283. } ]
  77284. }, {
  77285. "operator" : "OR",
  77286. "children" : [ ],
  77287. "cpe_match" : [ {
  77288. "vulnerable" : false,
  77289. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
  77290. "cpe_name" : [ ]
  77291. } ]
  77292. } ],
  77293. "cpe_match" : [ ]
  77294. }, {
  77295. "operator" : "AND",
  77296. "children" : [ {
  77297. "operator" : "OR",
  77298. "children" : [ ],
  77299. "cpe_match" : [ {
  77300. "vulnerable" : true,
  77301. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda855_firmware:-:*:*:*:*:*:*:*",
  77302. "cpe_name" : [ ]
  77303. } ]
  77304. }, {
  77305. "operator" : "OR",
  77306. "children" : [ ],
  77307. "cpe_match" : [ {
  77308. "vulnerable" : false,
  77309. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda855:-:*:*:*:*:*:*:*",
  77310. "cpe_name" : [ ]
  77311. } ]
  77312. } ],
  77313. "cpe_match" : [ ]
  77314. }, {
  77315. "operator" : "AND",
  77316. "children" : [ {
  77317. "operator" : "OR",
  77318. "children" : [ ],
  77319. "cpe_match" : [ {
  77320. "vulnerable" : true,
  77321. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
  77322. "cpe_name" : [ ]
  77323. } ]
  77324. }, {
  77325. "operator" : "OR",
  77326. "children" : [ ],
  77327. "cpe_match" : [ {
  77328. "vulnerable" : false,
  77329. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
  77330. "cpe_name" : [ ]
  77331. } ]
  77332. } ],
  77333. "cpe_match" : [ ]
  77334. }, {
  77335. "operator" : "AND",
  77336. "children" : [ {
  77337. "operator" : "OR",
  77338. "children" : [ ],
  77339. "cpe_match" : [ {
  77340. "vulnerable" : true,
  77341. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
  77342. "cpe_name" : [ ]
  77343. } ]
  77344. }, {
  77345. "operator" : "OR",
  77346. "children" : [ ],
  77347. "cpe_match" : [ {
  77348. "vulnerable" : false,
  77349. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
  77350. "cpe_name" : [ ]
  77351. } ]
  77352. } ],
  77353. "cpe_match" : [ ]
  77354. }, {
  77355. "operator" : "AND",
  77356. "children" : [ {
  77357. "operator" : "OR",
  77358. "children" : [ ],
  77359. "cpe_match" : [ {
  77360. "vulnerable" : true,
  77361. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
  77362. "cpe_name" : [ ]
  77363. } ]
  77364. }, {
  77365. "operator" : "OR",
  77366. "children" : [ ],
  77367. "cpe_match" : [ {
  77368. "vulnerable" : false,
  77369. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
  77370. "cpe_name" : [ ]
  77371. } ]
  77372. } ],
  77373. "cpe_match" : [ ]
  77374. }, {
  77375. "operator" : "AND",
  77376. "children" : [ {
  77377. "operator" : "OR",
  77378. "children" : [ ],
  77379. "cpe_match" : [ {
  77380. "vulnerable" : true,
  77381. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
  77382. "cpe_name" : [ ]
  77383. } ]
  77384. }, {
  77385. "operator" : "OR",
  77386. "children" : [ ],
  77387. "cpe_match" : [ {
  77388. "vulnerable" : false,
  77389. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
  77390. "cpe_name" : [ ]
  77391. } ]
  77392. } ],
  77393. "cpe_match" : [ ]
  77394. }, {
  77395. "operator" : "AND",
  77396. "children" : [ {
  77397. "operator" : "OR",
  77398. "children" : [ ],
  77399. "cpe_match" : [ {
  77400. "vulnerable" : true,
  77401. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
  77402. "cpe_name" : [ ]
  77403. } ]
  77404. }, {
  77405. "operator" : "OR",
  77406. "children" : [ ],
  77407. "cpe_match" : [ {
  77408. "vulnerable" : false,
  77409. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
  77410. "cpe_name" : [ ]
  77411. } ]
  77412. } ],
  77413. "cpe_match" : [ ]
  77414. }, {
  77415. "operator" : "AND",
  77416. "children" : [ {
  77417. "operator" : "OR",
  77418. "children" : [ ],
  77419. "cpe_match" : [ {
  77420. "vulnerable" : true,
  77421. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
  77422. "cpe_name" : [ ]
  77423. } ]
  77424. }, {
  77425. "operator" : "OR",
  77426. "children" : [ ],
  77427. "cpe_match" : [ {
  77428. "vulnerable" : false,
  77429. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
  77430. "cpe_name" : [ ]
  77431. } ]
  77432. } ],
  77433. "cpe_match" : [ ]
  77434. }, {
  77435. "operator" : "AND",
  77436. "children" : [ {
  77437. "operator" : "OR",
  77438. "children" : [ ],
  77439. "cpe_match" : [ {
  77440. "vulnerable" : true,
  77441. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
  77442. "cpe_name" : [ ]
  77443. } ]
  77444. }, {
  77445. "operator" : "OR",
  77446. "children" : [ ],
  77447. "cpe_match" : [ {
  77448. "vulnerable" : false,
  77449. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
  77450. "cpe_name" : [ ]
  77451. } ]
  77452. } ],
  77453. "cpe_match" : [ ]
  77454. }, {
  77455. "operator" : "AND",
  77456. "children" : [ {
  77457. "operator" : "OR",
  77458. "children" : [ ],
  77459. "cpe_match" : [ {
  77460. "vulnerable" : true,
  77461. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*",
  77462. "cpe_name" : [ ]
  77463. } ]
  77464. }, {
  77465. "operator" : "OR",
  77466. "children" : [ ],
  77467. "cpe_match" : [ {
  77468. "vulnerable" : false,
  77469. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*",
  77470. "cpe_name" : [ ]
  77471. } ]
  77472. } ],
  77473. "cpe_match" : [ ]
  77474. }, {
  77475. "operator" : "AND",
  77476. "children" : [ {
  77477. "operator" : "OR",
  77478. "children" : [ ],
  77479. "cpe_match" : [ {
  77480. "vulnerable" : true,
  77481. "cpe23Uri" : "cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:*",
  77482. "cpe_name" : [ ]
  77483. } ]
  77484. }, {
  77485. "operator" : "OR",
  77486. "children" : [ ],
  77487. "cpe_match" : [ {
  77488. "vulnerable" : false,
  77489. "cpe23Uri" : "cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*",
  77490. "cpe_name" : [ ]
  77491. } ]
  77492. } ],
  77493. "cpe_match" : [ ]
  77494. } ]
  77495. },
  77496. "impact" : {
  77497. "baseMetricV3" : {
  77498. "cvssV3" : {
  77499. "version" : "3.1",
  77500. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  77501. "attackVector" : "LOCAL",
  77502. "attackComplexity" : "LOW",
  77503. "privilegesRequired" : "LOW",
  77504. "userInteraction" : "NONE",
  77505. "scope" : "UNCHANGED",
  77506. "confidentialityImpact" : "HIGH",
  77507. "integrityImpact" : "HIGH",
  77508. "availabilityImpact" : "HIGH",
  77509. "baseScore" : 7.8,
  77510. "baseSeverity" : "HIGH"
  77511. },
  77512. "exploitabilityScore" : 1.8,
  77513. "impactScore" : 5.9
  77514. },
  77515. "baseMetricV2" : {
  77516. "cvssV2" : {
  77517. "version" : "2.0",
  77518. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  77519. "accessVector" : "LOCAL",
  77520. "accessComplexity" : "LOW",
  77521. "authentication" : "NONE",
  77522. "confidentialityImpact" : "COMPLETE",
  77523. "integrityImpact" : "COMPLETE",
  77524. "availabilityImpact" : "COMPLETE",
  77525. "baseScore" : 7.2
  77526. },
  77527. "severity" : "HIGH",
  77528. "exploitabilityScore" : 3.9,
  77529. "impactScore" : 10.0,
  77530. "acInsufInfo" : false,
  77531. "obtainAllPrivilege" : false,
  77532. "obtainUserPrivilege" : false,
  77533. "obtainOtherPrivilege" : false,
  77534. "userInteractionRequired" : false
  77535. }
  77536. },
  77537. "publishedDate" : "2020-11-12T10:15Z",
  77538. "lastModifiedDate" : "2021-05-10T13:15Z"
  77539. }, {
  77540. "cve" : {
  77541. "data_type" : "CVE",
  77542. "data_format" : "MITRE",
  77543. "data_version" : "4.0",
  77544. "CVE_data_meta" : {
  77545. "ID" : "CVE-2020-11207",
  77546. "ASSIGNER" : "product-security@qualcomm.com"
  77547. },
  77548. "problemtype" : {
  77549. "problemtype_data" : [ {
  77550. "description" : [ {
  77551. "lang" : "en",
  77552. "value" : "CWE-120"
  77553. } ]
  77554. } ]
  77555. },
  77556. "references" : {
  77557. "reference_data" : [ {
  77558. "url" : "https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin",
  77559. "name" : "https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin",
  77560. "refsource" : "CONFIRM",
  77561. "tags" : [ "Vendor Advisory" ]
  77562. }, {
  77563. "url" : "https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/",
  77564. "name" : "https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/",
  77565. "refsource" : "MISC",
  77566. "tags" : [ ]
  77567. }, {
  77568. "url" : "https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/",
  77569. "name" : "https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/",
  77570. "refsource" : "MISC",
  77571. "tags" : [ ]
  77572. } ]
  77573. },
  77574. "description" : {
  77575. "description_data" : [ {
  77576. "lang" : "en",
  77577. "value" : "Buffer overflow in LibFastCV library due to improper size checks with respect to buffer length' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8052, APQ8056, APQ8076, APQ8096, APQ8096SG, APQ8098, MDM9655, MSM8952, MSM8956, MSM8976, MSM8976SG, MSM8996, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR2130, SXR2130P"
  77578. } ]
  77579. }
  77580. },
  77581. "configurations" : {
  77582. "CVE_data_version" : "4.0",
  77583. "nodes" : [ {
  77584. "operator" : "AND",
  77585. "children" : [ {
  77586. "operator" : "OR",
  77587. "children" : [ ],
  77588. "cpe_match" : [ {
  77589. "vulnerable" : true,
  77590. "cpe23Uri" : "cpe:2.3:o:qualcomm:apq8052_firmware:-:*:*:*:*:*:*:*",
  77591. "cpe_name" : [ ]
  77592. } ]
  77593. }, {
  77594. "operator" : "OR",
  77595. "children" : [ ],
  77596. "cpe_match" : [ {
  77597. "vulnerable" : false,
  77598. "cpe23Uri" : "cpe:2.3:h:qualcomm:apq8052:-:*:*:*:*:*:*:*",
  77599. "cpe_name" : [ ]
  77600. } ]
  77601. } ],
  77602. "cpe_match" : [ ]
  77603. }, {
  77604. "operator" : "AND",
  77605. "children" : [ {
  77606. "operator" : "OR",
  77607. "children" : [ ],
  77608. "cpe_match" : [ {
  77609. "vulnerable" : true,
  77610. "cpe23Uri" : "cpe:2.3:o:qualcomm:apq8056_firmware:-:*:*:*:*:*:*:*",
  77611. "cpe_name" : [ ]
  77612. } ]
  77613. }, {
  77614. "operator" : "OR",
  77615. "children" : [ ],
  77616. "cpe_match" : [ {
  77617. "vulnerable" : false,
  77618. "cpe23Uri" : "cpe:2.3:h:qualcomm:apq8056:-:*:*:*:*:*:*:*",
  77619. "cpe_name" : [ ]
  77620. } ]
  77621. } ],
  77622. "cpe_match" : [ ]
  77623. }, {
  77624. "operator" : "AND",
  77625. "children" : [ {
  77626. "operator" : "OR",
  77627. "children" : [ ],
  77628. "cpe_match" : [ {
  77629. "vulnerable" : true,
  77630. "cpe23Uri" : "cpe:2.3:o:qualcomm:apq8076_firmware:-:*:*:*:*:*:*:*",
  77631. "cpe_name" : [ ]
  77632. } ]
  77633. }, {
  77634. "operator" : "OR",
  77635. "children" : [ ],
  77636. "cpe_match" : [ {
  77637. "vulnerable" : false,
  77638. "cpe23Uri" : "cpe:2.3:h:qualcomm:apq8076:-:*:*:*:*:*:*:*",
  77639. "cpe_name" : [ ]
  77640. } ]
  77641. } ],
  77642. "cpe_match" : [ ]
  77643. }, {
  77644. "operator" : "AND",
  77645. "children" : [ {
  77646. "operator" : "OR",
  77647. "children" : [ ],
  77648. "cpe_match" : [ {
  77649. "vulnerable" : true,
  77650. "cpe23Uri" : "cpe:2.3:o:qualcomm:apq8096_firmware:-:*:*:*:*:*:*:*",
  77651. "cpe_name" : [ ]
  77652. } ]
  77653. }, {
  77654. "operator" : "OR",
  77655. "children" : [ ],
  77656. "cpe_match" : [ {
  77657. "vulnerable" : false,
  77658. "cpe23Uri" : "cpe:2.3:h:qualcomm:apq8096:-:*:*:*:*:*:*:*",
  77659. "cpe_name" : [ ]
  77660. } ]
  77661. } ],
  77662. "cpe_match" : [ ]
  77663. }, {
  77664. "operator" : "AND",
  77665. "children" : [ {
  77666. "operator" : "OR",
  77667. "children" : [ ],
  77668. "cpe_match" : [ {
  77669. "vulnerable" : true,
  77670. "cpe23Uri" : "cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
  77671. "cpe_name" : [ ]
  77672. } ]
  77673. }, {
  77674. "operator" : "OR",
  77675. "children" : [ ],
  77676. "cpe_match" : [ {
  77677. "vulnerable" : false,
  77678. "cpe23Uri" : "cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
  77679. "cpe_name" : [ ]
  77680. } ]
  77681. } ],
  77682. "cpe_match" : [ ]
  77683. }, {
  77684. "operator" : "AND",
  77685. "children" : [ {
  77686. "operator" : "OR",
  77687. "children" : [ ],
  77688. "cpe_match" : [ {
  77689. "vulnerable" : true,
  77690. "cpe23Uri" : "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
  77691. "cpe_name" : [ ]
  77692. } ]
  77693. }, {
  77694. "operator" : "OR",
  77695. "children" : [ ],
  77696. "cpe_match" : [ {
  77697. "vulnerable" : false,
  77698. "cpe23Uri" : "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
  77699. "cpe_name" : [ ]
  77700. } ]
  77701. } ],
  77702. "cpe_match" : [ ]
  77703. }, {
  77704. "operator" : "AND",
  77705. "children" : [ {
  77706. "operator" : "OR",
  77707. "children" : [ ],
  77708. "cpe_match" : [ {
  77709. "vulnerable" : true,
  77710. "cpe23Uri" : "cpe:2.3:o:qualcomm:msm8952_firmware:-:*:*:*:*:*:*:*",
  77711. "cpe_name" : [ ]
  77712. } ]
  77713. }, {
  77714. "operator" : "OR",
  77715. "children" : [ ],
  77716. "cpe_match" : [ {
  77717. "vulnerable" : false,
  77718. "cpe23Uri" : "cpe:2.3:h:qualcomm:msm8952:-:*:*:*:*:*:*:*",
  77719. "cpe_name" : [ ]
  77720. } ]
  77721. } ],
  77722. "cpe_match" : [ ]
  77723. }, {
  77724. "operator" : "AND",
  77725. "children" : [ {
  77726. "operator" : "OR",
  77727. "children" : [ ],
  77728. "cpe_match" : [ {
  77729. "vulnerable" : true,
  77730. "cpe23Uri" : "cpe:2.3:o:qualcomm:msm8956_firmware:-:*:*:*:*:*:*:*",
  77731. "cpe_name" : [ ]
  77732. } ]
  77733. }, {
  77734. "operator" : "OR",
  77735. "children" : [ ],
  77736. "cpe_match" : [ {
  77737. "vulnerable" : false,
  77738. "cpe23Uri" : "cpe:2.3:h:qualcomm:msm8956:-:*:*:*:*:*:*:*",
  77739. "cpe_name" : [ ]
  77740. } ]
  77741. } ],
  77742. "cpe_match" : [ ]
  77743. }, {
  77744. "operator" : "AND",
  77745. "children" : [ {
  77746. "operator" : "OR",
  77747. "children" : [ ],
  77748. "cpe_match" : [ {
  77749. "vulnerable" : true,
  77750. "cpe23Uri" : "cpe:2.3:o:qualcomm:msm8976_firmware:-:*:*:*:*:*:*:*",
  77751. "cpe_name" : [ ]
  77752. } ]
  77753. }, {
  77754. "operator" : "OR",
  77755. "children" : [ ],
  77756. "cpe_match" : [ {
  77757. "vulnerable" : false,
  77758. "cpe23Uri" : "cpe:2.3:h:qualcomm:msm8976:-:*:*:*:*:*:*:*",
  77759. "cpe_name" : [ ]
  77760. } ]
  77761. } ],
  77762. "cpe_match" : [ ]
  77763. }, {
  77764. "operator" : "AND",
  77765. "children" : [ {
  77766. "operator" : "OR",
  77767. "children" : [ ],
  77768. "cpe_match" : [ {
  77769. "vulnerable" : true,
  77770. "cpe23Uri" : "cpe:2.3:o:qualcomm:msm8976sg_firmware:-:*:*:*:*:*:*:*",
  77771. "cpe_name" : [ ]
  77772. } ]
  77773. }, {
  77774. "operator" : "OR",
  77775. "children" : [ ],
  77776. "cpe_match" : [ {
  77777. "vulnerable" : false,
  77778. "cpe23Uri" : "cpe:2.3:h:qualcomm:msm8976sg:-:*:*:*:*:*:*:*",
  77779. "cpe_name" : [ ]
  77780. } ]
  77781. } ],
  77782. "cpe_match" : [ ]
  77783. }, {
  77784. "operator" : "AND",
  77785. "children" : [ {
  77786. "operator" : "OR",
  77787. "children" : [ ],
  77788. "cpe_match" : [ {
  77789. "vulnerable" : true,
  77790. "cpe23Uri" : "cpe:2.3:o:qualcomm:msm8996_firmware:-:*:*:*:*:*:*:*",
  77791. "cpe_name" : [ ]
  77792. } ]
  77793. }, {
  77794. "operator" : "OR",
  77795. "children" : [ ],
  77796. "cpe_match" : [ {
  77797. "vulnerable" : false,
  77798. "cpe23Uri" : "cpe:2.3:h:qualcomm:msm8996:-:*:*:*:*:*:*:*",
  77799. "cpe_name" : [ ]
  77800. } ]
  77801. } ],
  77802. "cpe_match" : [ ]
  77803. }, {
  77804. "operator" : "AND",
  77805. "children" : [ {
  77806. "operator" : "OR",
  77807. "children" : [ ],
  77808. "cpe_match" : [ {
  77809. "vulnerable" : true,
  77810. "cpe23Uri" : "cpe:2.3:o:qualcomm:msm8996sg_firmware:-:*:*:*:*:*:*:*",
  77811. "cpe_name" : [ ]
  77812. } ]
  77813. }, {
  77814. "operator" : "OR",
  77815. "children" : [ ],
  77816. "cpe_match" : [ {
  77817. "vulnerable" : false,
  77818. "cpe23Uri" : "cpe:2.3:h:qualcomm:msm8996sg:-:*:*:*:*:*:*:*",
  77819. "cpe_name" : [ ]
  77820. } ]
  77821. } ],
  77822. "cpe_match" : [ ]
  77823. }, {
  77824. "operator" : "AND",
  77825. "children" : [ {
  77826. "operator" : "OR",
  77827. "children" : [ ],
  77828. "cpe_match" : [ {
  77829. "vulnerable" : true,
  77830. "cpe23Uri" : "cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
  77831. "cpe_name" : [ ]
  77832. } ]
  77833. }, {
  77834. "operator" : "OR",
  77835. "children" : [ ],
  77836. "cpe_match" : [ {
  77837. "vulnerable" : false,
  77838. "cpe23Uri" : "cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
  77839. "cpe_name" : [ ]
  77840. } ]
  77841. } ],
  77842. "cpe_match" : [ ]
  77843. }, {
  77844. "operator" : "AND",
  77845. "children" : [ {
  77846. "operator" : "OR",
  77847. "children" : [ ],
  77848. "cpe_match" : [ {
  77849. "vulnerable" : true,
  77850. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
  77851. "cpe_name" : [ ]
  77852. } ]
  77853. }, {
  77854. "operator" : "OR",
  77855. "children" : [ ],
  77856. "cpe_match" : [ {
  77857. "vulnerable" : false,
  77858. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
  77859. "cpe_name" : [ ]
  77860. } ]
  77861. } ],
  77862. "cpe_match" : [ ]
  77863. }, {
  77864. "operator" : "AND",
  77865. "children" : [ {
  77866. "operator" : "OR",
  77867. "children" : [ ],
  77868. "cpe_match" : [ {
  77869. "vulnerable" : true,
  77870. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
  77871. "cpe_name" : [ ]
  77872. } ]
  77873. }, {
  77874. "operator" : "OR",
  77875. "children" : [ ],
  77876. "cpe_match" : [ {
  77877. "vulnerable" : false,
  77878. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
  77879. "cpe_name" : [ ]
  77880. } ]
  77881. } ],
  77882. "cpe_match" : [ ]
  77883. }, {
  77884. "operator" : "AND",
  77885. "children" : [ {
  77886. "operator" : "OR",
  77887. "children" : [ ],
  77888. "cpe_match" : [ {
  77889. "vulnerable" : true,
  77890. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
  77891. "cpe_name" : [ ]
  77892. } ]
  77893. }, {
  77894. "operator" : "OR",
  77895. "children" : [ ],
  77896. "cpe_match" : [ {
  77897. "vulnerable" : false,
  77898. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
  77899. "cpe_name" : [ ]
  77900. } ]
  77901. } ],
  77902. "cpe_match" : [ ]
  77903. }, {
  77904. "operator" : "AND",
  77905. "children" : [ {
  77906. "operator" : "OR",
  77907. "children" : [ ],
  77908. "cpe_match" : [ {
  77909. "vulnerable" : true,
  77910. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
  77911. "cpe_name" : [ ]
  77912. } ]
  77913. }, {
  77914. "operator" : "OR",
  77915. "children" : [ ],
  77916. "cpe_match" : [ {
  77917. "vulnerable" : false,
  77918. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
  77919. "cpe_name" : [ ]
  77920. } ]
  77921. } ],
  77922. "cpe_match" : [ ]
  77923. }, {
  77924. "operator" : "AND",
  77925. "children" : [ {
  77926. "operator" : "OR",
  77927. "children" : [ ],
  77928. "cpe_match" : [ {
  77929. "vulnerable" : true,
  77930. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
  77931. "cpe_name" : [ ]
  77932. } ]
  77933. }, {
  77934. "operator" : "OR",
  77935. "children" : [ ],
  77936. "cpe_match" : [ {
  77937. "vulnerable" : false,
  77938. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
  77939. "cpe_name" : [ ]
  77940. } ]
  77941. } ],
  77942. "cpe_match" : [ ]
  77943. }, {
  77944. "operator" : "AND",
  77945. "children" : [ {
  77946. "operator" : "OR",
  77947. "children" : [ ],
  77948. "cpe_match" : [ {
  77949. "vulnerable" : true,
  77950. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
  77951. "cpe_name" : [ ]
  77952. } ]
  77953. }, {
  77954. "operator" : "OR",
  77955. "children" : [ ],
  77956. "cpe_match" : [ {
  77957. "vulnerable" : false,
  77958. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
  77959. "cpe_name" : [ ]
  77960. } ]
  77961. } ],
  77962. "cpe_match" : [ ]
  77963. }, {
  77964. "operator" : "AND",
  77965. "children" : [ {
  77966. "operator" : "OR",
  77967. "children" : [ ],
  77968. "cpe_match" : [ {
  77969. "vulnerable" : true,
  77970. "cpe23Uri" : "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*",
  77971. "cpe_name" : [ ]
  77972. } ]
  77973. }, {
  77974. "operator" : "OR",
  77975. "children" : [ ],
  77976. "cpe_match" : [ {
  77977. "vulnerable" : false,
  77978. "cpe23Uri" : "cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*",
  77979. "cpe_name" : [ ]
  77980. } ]
  77981. } ],
  77982. "cpe_match" : [ ]
  77983. }, {
  77984. "operator" : "AND",
  77985. "children" : [ {
  77986. "operator" : "OR",
  77987. "children" : [ ],
  77988. "cpe_match" : [ {
  77989. "vulnerable" : true,
  77990. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
  77991. "cpe_name" : [ ]
  77992. } ]
  77993. }, {
  77994. "operator" : "OR",
  77995. "children" : [ ],
  77996. "cpe_match" : [ {
  77997. "vulnerable" : false,
  77998. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
  77999. "cpe_name" : [ ]
  78000. } ]
  78001. } ],
  78002. "cpe_match" : [ ]
  78003. }, {
  78004. "operator" : "AND",
  78005. "children" : [ {
  78006. "operator" : "OR",
  78007. "children" : [ ],
  78008. "cpe_match" : [ {
  78009. "vulnerable" : true,
  78010. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
  78011. "cpe_name" : [ ]
  78012. } ]
  78013. }, {
  78014. "operator" : "OR",
  78015. "children" : [ ],
  78016. "cpe_match" : [ {
  78017. "vulnerable" : false,
  78018. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
  78019. "cpe_name" : [ ]
  78020. } ]
  78021. } ],
  78022. "cpe_match" : [ ]
  78023. }, {
  78024. "operator" : "AND",
  78025. "children" : [ {
  78026. "operator" : "OR",
  78027. "children" : [ ],
  78028. "cpe_match" : [ {
  78029. "vulnerable" : true,
  78030. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
  78031. "cpe_name" : [ ]
  78032. } ]
  78033. }, {
  78034. "operator" : "OR",
  78035. "children" : [ ],
  78036. "cpe_match" : [ {
  78037. "vulnerable" : false,
  78038. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
  78039. "cpe_name" : [ ]
  78040. } ]
  78041. } ],
  78042. "cpe_match" : [ ]
  78043. }, {
  78044. "operator" : "AND",
  78045. "children" : [ {
  78046. "operator" : "OR",
  78047. "children" : [ ],
  78048. "cpe_match" : [ {
  78049. "vulnerable" : true,
  78050. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
  78051. "cpe_name" : [ ]
  78052. } ]
  78053. }, {
  78054. "operator" : "OR",
  78055. "children" : [ ],
  78056. "cpe_match" : [ {
  78057. "vulnerable" : false,
  78058. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
  78059. "cpe_name" : [ ]
  78060. } ]
  78061. } ],
  78062. "cpe_match" : [ ]
  78063. }, {
  78064. "operator" : "AND",
  78065. "children" : [ {
  78066. "operator" : "OR",
  78067. "children" : [ ],
  78068. "cpe_match" : [ {
  78069. "vulnerable" : true,
  78070. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
  78071. "cpe_name" : [ ]
  78072. } ]
  78073. }, {
  78074. "operator" : "OR",
  78075. "children" : [ ],
  78076. "cpe_match" : [ {
  78077. "vulnerable" : false,
  78078. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
  78079. "cpe_name" : [ ]
  78080. } ]
  78081. } ],
  78082. "cpe_match" : [ ]
  78083. }, {
  78084. "operator" : "AND",
  78085. "children" : [ {
  78086. "operator" : "OR",
  78087. "children" : [ ],
  78088. "cpe_match" : [ {
  78089. "vulnerable" : true,
  78090. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
  78091. "cpe_name" : [ ]
  78092. } ]
  78093. }, {
  78094. "operator" : "OR",
  78095. "children" : [ ],
  78096. "cpe_match" : [ {
  78097. "vulnerable" : false,
  78098. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
  78099. "cpe_name" : [ ]
  78100. } ]
  78101. } ],
  78102. "cpe_match" : [ ]
  78103. }, {
  78104. "operator" : "AND",
  78105. "children" : [ {
  78106. "operator" : "OR",
  78107. "children" : [ ],
  78108. "cpe_match" : [ {
  78109. "vulnerable" : true,
  78110. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
  78111. "cpe_name" : [ ]
  78112. } ]
  78113. }, {
  78114. "operator" : "OR",
  78115. "children" : [ ],
  78116. "cpe_match" : [ {
  78117. "vulnerable" : false,
  78118. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
  78119. "cpe_name" : [ ]
  78120. } ]
  78121. } ],
  78122. "cpe_match" : [ ]
  78123. }, {
  78124. "operator" : "AND",
  78125. "children" : [ {
  78126. "operator" : "OR",
  78127. "children" : [ ],
  78128. "cpe_match" : [ {
  78129. "vulnerable" : true,
  78130. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
  78131. "cpe_name" : [ ]
  78132. } ]
  78133. }, {
  78134. "operator" : "OR",
  78135. "children" : [ ],
  78136. "cpe_match" : [ {
  78137. "vulnerable" : false,
  78138. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
  78139. "cpe_name" : [ ]
  78140. } ]
  78141. } ],
  78142. "cpe_match" : [ ]
  78143. }, {
  78144. "operator" : "AND",
  78145. "children" : [ {
  78146. "operator" : "OR",
  78147. "children" : [ ],
  78148. "cpe_match" : [ {
  78149. "vulnerable" : true,
  78150. "cpe23Uri" : "cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*",
  78151. "cpe_name" : [ ]
  78152. } ]
  78153. }, {
  78154. "operator" : "OR",
  78155. "children" : [ ],
  78156. "cpe_match" : [ {
  78157. "vulnerable" : false,
  78158. "cpe23Uri" : "cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*",
  78159. "cpe_name" : [ ]
  78160. } ]
  78161. } ],
  78162. "cpe_match" : [ ]
  78163. }, {
  78164. "operator" : "AND",
  78165. "children" : [ {
  78166. "operator" : "OR",
  78167. "children" : [ ],
  78168. "cpe_match" : [ {
  78169. "vulnerable" : true,
  78170. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda640_firmware:-:*:*:*:*:*:*:*",
  78171. "cpe_name" : [ ]
  78172. } ]
  78173. }, {
  78174. "operator" : "OR",
  78175. "children" : [ ],
  78176. "cpe_match" : [ {
  78177. "vulnerable" : false,
  78178. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda640:-:*:*:*:*:*:*:*",
  78179. "cpe_name" : [ ]
  78180. } ]
  78181. } ],
  78182. "cpe_match" : [ ]
  78183. }, {
  78184. "operator" : "AND",
  78185. "children" : [ {
  78186. "operator" : "OR",
  78187. "children" : [ ],
  78188. "cpe_match" : [ {
  78189. "vulnerable" : true,
  78190. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
  78191. "cpe_name" : [ ]
  78192. } ]
  78193. }, {
  78194. "operator" : "OR",
  78195. "children" : [ ],
  78196. "cpe_match" : [ {
  78197. "vulnerable" : false,
  78198. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
  78199. "cpe_name" : [ ]
  78200. } ]
  78201. } ],
  78202. "cpe_match" : [ ]
  78203. }, {
  78204. "operator" : "AND",
  78205. "children" : [ {
  78206. "operator" : "OR",
  78207. "children" : [ ],
  78208. "cpe_match" : [ {
  78209. "vulnerable" : true,
  78210. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
  78211. "cpe_name" : [ ]
  78212. } ]
  78213. }, {
  78214. "operator" : "OR",
  78215. "children" : [ ],
  78216. "cpe_match" : [ {
  78217. "vulnerable" : false,
  78218. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
  78219. "cpe_name" : [ ]
  78220. } ]
  78221. } ],
  78222. "cpe_match" : [ ]
  78223. }, {
  78224. "operator" : "AND",
  78225. "children" : [ {
  78226. "operator" : "OR",
  78227. "children" : [ ],
  78228. "cpe_match" : [ {
  78229. "vulnerable" : true,
  78230. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda855_firmware:-:*:*:*:*:*:*:*",
  78231. "cpe_name" : [ ]
  78232. } ]
  78233. }, {
  78234. "operator" : "OR",
  78235. "children" : [ ],
  78236. "cpe_match" : [ {
  78237. "vulnerable" : false,
  78238. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda855:-:*:*:*:*:*:*:*",
  78239. "cpe_name" : [ ]
  78240. } ]
  78241. } ],
  78242. "cpe_match" : [ ]
  78243. }, {
  78244. "operator" : "AND",
  78245. "children" : [ {
  78246. "operator" : "OR",
  78247. "children" : [ ],
  78248. "cpe_match" : [ {
  78249. "vulnerable" : true,
  78250. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm640_firmware:-:*:*:*:*:*:*:*",
  78251. "cpe_name" : [ ]
  78252. } ]
  78253. }, {
  78254. "operator" : "OR",
  78255. "children" : [ ],
  78256. "cpe_match" : [ {
  78257. "vulnerable" : false,
  78258. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm640:-:*:*:*:*:*:*:*",
  78259. "cpe_name" : [ ]
  78260. } ]
  78261. } ],
  78262. "cpe_match" : [ ]
  78263. }, {
  78264. "operator" : "AND",
  78265. "children" : [ {
  78266. "operator" : "OR",
  78267. "children" : [ ],
  78268. "cpe_match" : [ {
  78269. "vulnerable" : true,
  78270. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
  78271. "cpe_name" : [ ]
  78272. } ]
  78273. }, {
  78274. "operator" : "OR",
  78275. "children" : [ ],
  78276. "cpe_match" : [ {
  78277. "vulnerable" : false,
  78278. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
  78279. "cpe_name" : [ ]
  78280. } ]
  78281. } ],
  78282. "cpe_match" : [ ]
  78283. }, {
  78284. "operator" : "AND",
  78285. "children" : [ {
  78286. "operator" : "OR",
  78287. "children" : [ ],
  78288. "cpe_match" : [ {
  78289. "vulnerable" : true,
  78290. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:*",
  78291. "cpe_name" : [ ]
  78292. } ]
  78293. }, {
  78294. "operator" : "OR",
  78295. "children" : [ ],
  78296. "cpe_match" : [ {
  78297. "vulnerable" : false,
  78298. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*",
  78299. "cpe_name" : [ ]
  78300. } ]
  78301. } ],
  78302. "cpe_match" : [ ]
  78303. }, {
  78304. "operator" : "AND",
  78305. "children" : [ {
  78306. "operator" : "OR",
  78307. "children" : [ ],
  78308. "cpe_match" : [ {
  78309. "vulnerable" : true,
  78310. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
  78311. "cpe_name" : [ ]
  78312. } ]
  78313. }, {
  78314. "operator" : "OR",
  78315. "children" : [ ],
  78316. "cpe_match" : [ {
  78317. "vulnerable" : false,
  78318. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
  78319. "cpe_name" : [ ]
  78320. } ]
  78321. } ],
  78322. "cpe_match" : [ ]
  78323. }, {
  78324. "operator" : "AND",
  78325. "children" : [ {
  78326. "operator" : "OR",
  78327. "children" : [ ],
  78328. "cpe_match" : [ {
  78329. "vulnerable" : true,
  78330. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
  78331. "cpe_name" : [ ]
  78332. } ]
  78333. }, {
  78334. "operator" : "OR",
  78335. "children" : [ ],
  78336. "cpe_match" : [ {
  78337. "vulnerable" : false,
  78338. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
  78339. "cpe_name" : [ ]
  78340. } ]
  78341. } ],
  78342. "cpe_match" : [ ]
  78343. }, {
  78344. "operator" : "AND",
  78345. "children" : [ {
  78346. "operator" : "OR",
  78347. "children" : [ ],
  78348. "cpe_match" : [ {
  78349. "vulnerable" : true,
  78350. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
  78351. "cpe_name" : [ ]
  78352. } ]
  78353. }, {
  78354. "operator" : "OR",
  78355. "children" : [ ],
  78356. "cpe_match" : [ {
  78357. "vulnerable" : false,
  78358. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
  78359. "cpe_name" : [ ]
  78360. } ]
  78361. } ],
  78362. "cpe_match" : [ ]
  78363. }, {
  78364. "operator" : "AND",
  78365. "children" : [ {
  78366. "operator" : "OR",
  78367. "children" : [ ],
  78368. "cpe_match" : [ {
  78369. "vulnerable" : true,
  78370. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
  78371. "cpe_name" : [ ]
  78372. } ]
  78373. }, {
  78374. "operator" : "OR",
  78375. "children" : [ ],
  78376. "cpe_match" : [ {
  78377. "vulnerable" : false,
  78378. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
  78379. "cpe_name" : [ ]
  78380. } ]
  78381. } ],
  78382. "cpe_match" : [ ]
  78383. }, {
  78384. "operator" : "AND",
  78385. "children" : [ {
  78386. "operator" : "OR",
  78387. "children" : [ ],
  78388. "cpe_match" : [ {
  78389. "vulnerable" : true,
  78390. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
  78391. "cpe_name" : [ ]
  78392. } ]
  78393. }, {
  78394. "operator" : "OR",
  78395. "children" : [ ],
  78396. "cpe_match" : [ {
  78397. "vulnerable" : false,
  78398. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
  78399. "cpe_name" : [ ]
  78400. } ]
  78401. } ],
  78402. "cpe_match" : [ ]
  78403. }, {
  78404. "operator" : "AND",
  78405. "children" : [ {
  78406. "operator" : "OR",
  78407. "children" : [ ],
  78408. "cpe_match" : [ {
  78409. "vulnerable" : true,
  78410. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm4250_firmware:-:*:*:*:*:*:*:*",
  78411. "cpe_name" : [ ]
  78412. } ]
  78413. }, {
  78414. "operator" : "OR",
  78415. "children" : [ ],
  78416. "cpe_match" : [ {
  78417. "vulnerable" : false,
  78418. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm4250:-:*:*:*:*:*:*:*",
  78419. "cpe_name" : [ ]
  78420. } ]
  78421. } ],
  78422. "cpe_match" : [ ]
  78423. }, {
  78424. "operator" : "AND",
  78425. "children" : [ {
  78426. "operator" : "OR",
  78427. "children" : [ ],
  78428. "cpe_match" : [ {
  78429. "vulnerable" : true,
  78430. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm4250p_firmware:-:*:*:*:*:*:*:*",
  78431. "cpe_name" : [ ]
  78432. } ]
  78433. }, {
  78434. "operator" : "OR",
  78435. "children" : [ ],
  78436. "cpe_match" : [ {
  78437. "vulnerable" : false,
  78438. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm4250p:-:*:*:*:*:*:*:*",
  78439. "cpe_name" : [ ]
  78440. } ]
  78441. } ],
  78442. "cpe_match" : [ ]
  78443. }, {
  78444. "operator" : "AND",
  78445. "children" : [ {
  78446. "operator" : "OR",
  78447. "children" : [ ],
  78448. "cpe_match" : [ {
  78449. "vulnerable" : true,
  78450. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6115_firmware:-:*:*:*:*:*:*:*",
  78451. "cpe_name" : [ ]
  78452. } ]
  78453. }, {
  78454. "operator" : "OR",
  78455. "children" : [ ],
  78456. "cpe_match" : [ {
  78457. "vulnerable" : false,
  78458. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6115:-:*:*:*:*:*:*:*",
  78459. "cpe_name" : [ ]
  78460. } ]
  78461. } ],
  78462. "cpe_match" : [ ]
  78463. }, {
  78464. "operator" : "AND",
  78465. "children" : [ {
  78466. "operator" : "OR",
  78467. "children" : [ ],
  78468. "cpe_match" : [ {
  78469. "vulnerable" : true,
  78470. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6115p_firmware:-:*:*:*:*:*:*:*",
  78471. "cpe_name" : [ ]
  78472. } ]
  78473. }, {
  78474. "operator" : "OR",
  78475. "children" : [ ],
  78476. "cpe_match" : [ {
  78477. "vulnerable" : false,
  78478. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6115p:-:*:*:*:*:*:*:*",
  78479. "cpe_name" : [ ]
  78480. } ]
  78481. } ],
  78482. "cpe_match" : [ ]
  78483. }, {
  78484. "operator" : "AND",
  78485. "children" : [ {
  78486. "operator" : "OR",
  78487. "children" : [ ],
  78488. "cpe_match" : [ {
  78489. "vulnerable" : true,
  78490. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:*",
  78491. "cpe_name" : [ ]
  78492. } ]
  78493. }, {
  78494. "operator" : "OR",
  78495. "children" : [ ],
  78496. "cpe_match" : [ {
  78497. "vulnerable" : false,
  78498. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6125:-:*:*:*:*:*:*:*",
  78499. "cpe_name" : [ ]
  78500. } ]
  78501. } ],
  78502. "cpe_match" : [ ]
  78503. }, {
  78504. "operator" : "AND",
  78505. "children" : [ {
  78506. "operator" : "OR",
  78507. "children" : [ ],
  78508. "cpe_match" : [ {
  78509. "vulnerable" : true,
  78510. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
  78511. "cpe_name" : [ ]
  78512. } ]
  78513. }, {
  78514. "operator" : "OR",
  78515. "children" : [ ],
  78516. "cpe_match" : [ {
  78517. "vulnerable" : false,
  78518. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
  78519. "cpe_name" : [ ]
  78520. } ]
  78521. } ],
  78522. "cpe_match" : [ ]
  78523. }, {
  78524. "operator" : "AND",
  78525. "children" : [ {
  78526. "operator" : "OR",
  78527. "children" : [ ],
  78528. "cpe_match" : [ {
  78529. "vulnerable" : true,
  78530. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6150p_firmware:-:*:*:*:*:*:*:*",
  78531. "cpe_name" : [ ]
  78532. } ]
  78533. }, {
  78534. "operator" : "OR",
  78535. "children" : [ ],
  78536. "cpe_match" : [ {
  78537. "vulnerable" : false,
  78538. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6150p:-:*:*:*:*:*:*:*",
  78539. "cpe_name" : [ ]
  78540. } ]
  78541. } ],
  78542. "cpe_match" : [ ]
  78543. }, {
  78544. "operator" : "AND",
  78545. "children" : [ {
  78546. "operator" : "OR",
  78547. "children" : [ ],
  78548. "cpe_match" : [ {
  78549. "vulnerable" : true,
  78550. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
  78551. "cpe_name" : [ ]
  78552. } ]
  78553. }, {
  78554. "operator" : "OR",
  78555. "children" : [ ],
  78556. "cpe_match" : [ {
  78557. "vulnerable" : false,
  78558. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
  78559. "cpe_name" : [ ]
  78560. } ]
  78561. } ],
  78562. "cpe_match" : [ ]
  78563. }, {
  78564. "operator" : "AND",
  78565. "children" : [ {
  78566. "operator" : "OR",
  78567. "children" : [ ],
  78568. "cpe_match" : [ {
  78569. "vulnerable" : true,
  78570. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
  78571. "cpe_name" : [ ]
  78572. } ]
  78573. }, {
  78574. "operator" : "OR",
  78575. "children" : [ ],
  78576. "cpe_match" : [ {
  78577. "vulnerable" : false,
  78578. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
  78579. "cpe_name" : [ ]
  78580. } ]
  78581. } ],
  78582. "cpe_match" : [ ]
  78583. }, {
  78584. "operator" : "AND",
  78585. "children" : [ {
  78586. "operator" : "OR",
  78587. "children" : [ ],
  78588. "cpe_match" : [ {
  78589. "vulnerable" : true,
  78590. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6350_firmware:-:*:*:*:*:*:*:*",
  78591. "cpe_name" : [ ]
  78592. } ]
  78593. }, {
  78594. "operator" : "OR",
  78595. "children" : [ ],
  78596. "cpe_match" : [ {
  78597. "vulnerable" : false,
  78598. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6350:-:*:*:*:*:*:*:*",
  78599. "cpe_name" : [ ]
  78600. } ]
  78601. } ],
  78602. "cpe_match" : [ ]
  78603. }, {
  78604. "operator" : "AND",
  78605. "children" : [ {
  78606. "operator" : "OR",
  78607. "children" : [ ],
  78608. "cpe_match" : [ {
  78609. "vulnerable" : true,
  78610. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:*",
  78611. "cpe_name" : [ ]
  78612. } ]
  78613. }, {
  78614. "operator" : "OR",
  78615. "children" : [ ],
  78616. "cpe_match" : [ {
  78617. "vulnerable" : false,
  78618. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*",
  78619. "cpe_name" : [ ]
  78620. } ]
  78621. } ],
  78622. "cpe_match" : [ ]
  78623. }, {
  78624. "operator" : "AND",
  78625. "children" : [ {
  78626. "operator" : "OR",
  78627. "children" : [ ],
  78628. "cpe_match" : [ {
  78629. "vulnerable" : true,
  78630. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
  78631. "cpe_name" : [ ]
  78632. } ]
  78633. }, {
  78634. "operator" : "OR",
  78635. "children" : [ ],
  78636. "cpe_match" : [ {
  78637. "vulnerable" : false,
  78638. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
  78639. "cpe_name" : [ ]
  78640. } ]
  78641. } ],
  78642. "cpe_match" : [ ]
  78643. }, {
  78644. "operator" : "AND",
  78645. "children" : [ {
  78646. "operator" : "OR",
  78647. "children" : [ ],
  78648. "cpe_match" : [ {
  78649. "vulnerable" : true,
  78650. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7150p_firmware:-:*:*:*:*:*:*:*",
  78651. "cpe_name" : [ ]
  78652. } ]
  78653. }, {
  78654. "operator" : "OR",
  78655. "children" : [ ],
  78656. "cpe_match" : [ {
  78657. "vulnerable" : false,
  78658. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7150p:-:*:*:*:*:*:*:*",
  78659. "cpe_name" : [ ]
  78660. } ]
  78661. } ],
  78662. "cpe_match" : [ ]
  78663. }, {
  78664. "operator" : "AND",
  78665. "children" : [ {
  78666. "operator" : "OR",
  78667. "children" : [ ],
  78668. "cpe_match" : [ {
  78669. "vulnerable" : true,
  78670. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7225_firmware:-:*:*:*:*:*:*:*",
  78671. "cpe_name" : [ ]
  78672. } ]
  78673. }, {
  78674. "operator" : "OR",
  78675. "children" : [ ],
  78676. "cpe_match" : [ {
  78677. "vulnerable" : false,
  78678. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7225:-:*:*:*:*:*:*:*",
  78679. "cpe_name" : [ ]
  78680. } ]
  78681. } ],
  78682. "cpe_match" : [ ]
  78683. }, {
  78684. "operator" : "AND",
  78685. "children" : [ {
  78686. "operator" : "OR",
  78687. "children" : [ ],
  78688. "cpe_match" : [ {
  78689. "vulnerable" : true,
  78690. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:*",
  78691. "cpe_name" : [ ]
  78692. } ]
  78693. }, {
  78694. "operator" : "OR",
  78695. "children" : [ ],
  78696. "cpe_match" : [ {
  78697. "vulnerable" : false,
  78698. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*",
  78699. "cpe_name" : [ ]
  78700. } ]
  78701. } ],
  78702. "cpe_match" : [ ]
  78703. }, {
  78704. "operator" : "AND",
  78705. "children" : [ {
  78706. "operator" : "OR",
  78707. "children" : [ ],
  78708. "cpe_match" : [ {
  78709. "vulnerable" : true,
  78710. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
  78711. "cpe_name" : [ ]
  78712. } ]
  78713. }, {
  78714. "operator" : "OR",
  78715. "children" : [ ],
  78716. "cpe_match" : [ {
  78717. "vulnerable" : false,
  78718. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
  78719. "cpe_name" : [ ]
  78720. } ]
  78721. } ],
  78722. "cpe_match" : [ ]
  78723. }, {
  78724. "operator" : "AND",
  78725. "children" : [ {
  78726. "operator" : "OR",
  78727. "children" : [ ],
  78728. "cpe_match" : [ {
  78729. "vulnerable" : true,
  78730. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
  78731. "cpe_name" : [ ]
  78732. } ]
  78733. }, {
  78734. "operator" : "OR",
  78735. "children" : [ ],
  78736. "cpe_match" : [ {
  78737. "vulnerable" : false,
  78738. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
  78739. "cpe_name" : [ ]
  78740. } ]
  78741. } ],
  78742. "cpe_match" : [ ]
  78743. }, {
  78744. "operator" : "AND",
  78745. "children" : [ {
  78746. "operator" : "OR",
  78747. "children" : [ ],
  78748. "cpe_match" : [ {
  78749. "vulnerable" : true,
  78750. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8150p_firmware:-:*:*:*:*:*:*:*",
  78751. "cpe_name" : [ ]
  78752. } ]
  78753. }, {
  78754. "operator" : "OR",
  78755. "children" : [ ],
  78756. "cpe_match" : [ {
  78757. "vulnerable" : false,
  78758. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8150p:-:*:*:*:*:*:*:*",
  78759. "cpe_name" : [ ]
  78760. } ]
  78761. } ],
  78762. "cpe_match" : [ ]
  78763. }, {
  78764. "operator" : "AND",
  78765. "children" : [ {
  78766. "operator" : "OR",
  78767. "children" : [ ],
  78768. "cpe_match" : [ {
  78769. "vulnerable" : true,
  78770. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
  78771. "cpe_name" : [ ]
  78772. } ]
  78773. }, {
  78774. "operator" : "OR",
  78775. "children" : [ ],
  78776. "cpe_match" : [ {
  78777. "vulnerable" : false,
  78778. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
  78779. "cpe_name" : [ ]
  78780. } ]
  78781. } ],
  78782. "cpe_match" : [ ]
  78783. }, {
  78784. "operator" : "AND",
  78785. "children" : [ {
  78786. "operator" : "OR",
  78787. "children" : [ ],
  78788. "cpe_match" : [ {
  78789. "vulnerable" : true,
  78790. "cpe23Uri" : "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
  78791. "cpe_name" : [ ]
  78792. } ]
  78793. }, {
  78794. "operator" : "OR",
  78795. "children" : [ ],
  78796. "cpe_match" : [ {
  78797. "vulnerable" : false,
  78798. "cpe23Uri" : "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
  78799. "cpe_name" : [ ]
  78800. } ]
  78801. } ],
  78802. "cpe_match" : [ ]
  78803. }, {
  78804. "operator" : "AND",
  78805. "children" : [ {
  78806. "operator" : "OR",
  78807. "children" : [ ],
  78808. "cpe_match" : [ {
  78809. "vulnerable" : true,
  78810. "cpe23Uri" : "cpe:2.3:o:qualcomm:sxr2130p_firmware:-:*:*:*:*:*:*:*",
  78811. "cpe_name" : [ ]
  78812. } ]
  78813. }, {
  78814. "operator" : "OR",
  78815. "children" : [ ],
  78816. "cpe_match" : [ {
  78817. "vulnerable" : false,
  78818. "cpe23Uri" : "cpe:2.3:h:qualcomm:sxr2130p:-:*:*:*:*:*:*:*",
  78819. "cpe_name" : [ ]
  78820. } ]
  78821. } ],
  78822. "cpe_match" : [ ]
  78823. } ]
  78824. },
  78825. "impact" : {
  78826. "baseMetricV3" : {
  78827. "cvssV3" : {
  78828. "version" : "3.1",
  78829. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  78830. "attackVector" : "LOCAL",
  78831. "attackComplexity" : "LOW",
  78832. "privilegesRequired" : "LOW",
  78833. "userInteraction" : "NONE",
  78834. "scope" : "UNCHANGED",
  78835. "confidentialityImpact" : "HIGH",
  78836. "integrityImpact" : "HIGH",
  78837. "availabilityImpact" : "HIGH",
  78838. "baseScore" : 7.8,
  78839. "baseSeverity" : "HIGH"
  78840. },
  78841. "exploitabilityScore" : 1.8,
  78842. "impactScore" : 5.9
  78843. },
  78844. "baseMetricV2" : {
  78845. "cvssV2" : {
  78846. "version" : "2.0",
  78847. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  78848. "accessVector" : "LOCAL",
  78849. "accessComplexity" : "LOW",
  78850. "authentication" : "NONE",
  78851. "confidentialityImpact" : "COMPLETE",
  78852. "integrityImpact" : "COMPLETE",
  78853. "availabilityImpact" : "COMPLETE",
  78854. "baseScore" : 7.2
  78855. },
  78856. "severity" : "HIGH",
  78857. "exploitabilityScore" : 3.9,
  78858. "impactScore" : 10.0,
  78859. "acInsufInfo" : false,
  78860. "obtainAllPrivilege" : false,
  78861. "obtainUserPrivilege" : false,
  78862. "obtainOtherPrivilege" : false,
  78863. "userInteractionRequired" : false
  78864. }
  78865. },
  78866. "publishedDate" : "2020-11-12T10:15Z",
  78867. "lastModifiedDate" : "2021-05-10T13:15Z"
  78868. }, {
  78869. "cve" : {
  78870. "data_type" : "CVE",
  78871. "data_format" : "MITRE",
  78872. "data_version" : "4.0",
  78873. "CVE_data_meta" : {
  78874. "ID" : "CVE-2020-11206",
  78875. "ASSIGNER" : "product-security@qualcomm.com"
  78876. },
  78877. "problemtype" : {
  78878. "problemtype_data" : [ {
  78879. "description" : [ {
  78880. "lang" : "en",
  78881. "value" : "NVD-CWE-Other"
  78882. } ]
  78883. } ]
  78884. },
  78885. "references" : {
  78886. "reference_data" : [ {
  78887. "url" : "https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin",
  78888. "name" : "https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin",
  78889. "refsource" : "CONFIRM",
  78890. "tags" : [ "Vendor Advisory" ]
  78891. }, {
  78892. "url" : "https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/",
  78893. "name" : "https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/",
  78894. "refsource" : "MISC",
  78895. "tags" : [ ]
  78896. }, {
  78897. "url" : "https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/",
  78898. "name" : "https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/",
  78899. "refsource" : "MISC",
  78900. "tags" : [ ]
  78901. } ]
  78902. },
  78903. "description" : {
  78904. "description_data" : [ {
  78905. "lang" : "en",
  78906. "value" : "Possible buffer overflow in Fastrpc while handling received parameters due to lack of validation on input parameters' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8098, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, QSM8350, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P"
  78907. } ]
  78908. }
  78909. },
  78910. "configurations" : {
  78911. "CVE_data_version" : "4.0",
  78912. "nodes" : [ {
  78913. "operator" : "AND",
  78914. "children" : [ {
  78915. "operator" : "OR",
  78916. "children" : [ ],
  78917. "cpe_match" : [ {
  78918. "vulnerable" : true,
  78919. "cpe23Uri" : "cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
  78920. "cpe_name" : [ ]
  78921. } ]
  78922. }, {
  78923. "operator" : "OR",
  78924. "children" : [ ],
  78925. "cpe_match" : [ {
  78926. "vulnerable" : false,
  78927. "cpe23Uri" : "cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
  78928. "cpe_name" : [ ]
  78929. } ]
  78930. } ],
  78931. "cpe_match" : [ ]
  78932. }, {
  78933. "operator" : "AND",
  78934. "children" : [ {
  78935. "operator" : "OR",
  78936. "children" : [ ],
  78937. "cpe_match" : [ {
  78938. "vulnerable" : true,
  78939. "cpe23Uri" : "cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
  78940. "cpe_name" : [ ]
  78941. } ]
  78942. }, {
  78943. "operator" : "OR",
  78944. "children" : [ ],
  78945. "cpe_match" : [ {
  78946. "vulnerable" : false,
  78947. "cpe23Uri" : "cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
  78948. "cpe_name" : [ ]
  78949. } ]
  78950. } ],
  78951. "cpe_match" : [ ]
  78952. }, {
  78953. "operator" : "AND",
  78954. "children" : [ {
  78955. "operator" : "OR",
  78956. "children" : [ ],
  78957. "cpe_match" : [ {
  78958. "vulnerable" : true,
  78959. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
  78960. "cpe_name" : [ ]
  78961. } ]
  78962. }, {
  78963. "operator" : "OR",
  78964. "children" : [ ],
  78965. "cpe_match" : [ {
  78966. "vulnerable" : false,
  78967. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
  78968. "cpe_name" : [ ]
  78969. } ]
  78970. } ],
  78971. "cpe_match" : [ ]
  78972. }, {
  78973. "operator" : "AND",
  78974. "children" : [ {
  78975. "operator" : "OR",
  78976. "children" : [ ],
  78977. "cpe_match" : [ {
  78978. "vulnerable" : true,
  78979. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
  78980. "cpe_name" : [ ]
  78981. } ]
  78982. }, {
  78983. "operator" : "OR",
  78984. "children" : [ ],
  78985. "cpe_match" : [ {
  78986. "vulnerable" : false,
  78987. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
  78988. "cpe_name" : [ ]
  78989. } ]
  78990. } ],
  78991. "cpe_match" : [ ]
  78992. }, {
  78993. "operator" : "AND",
  78994. "children" : [ {
  78995. "operator" : "OR",
  78996. "children" : [ ],
  78997. "cpe_match" : [ {
  78998. "vulnerable" : true,
  78999. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
  79000. "cpe_name" : [ ]
  79001. } ]
  79002. }, {
  79003. "operator" : "OR",
  79004. "children" : [ ],
  79005. "cpe_match" : [ {
  79006. "vulnerable" : false,
  79007. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
  79008. "cpe_name" : [ ]
  79009. } ]
  79010. } ],
  79011. "cpe_match" : [ ]
  79012. }, {
  79013. "operator" : "AND",
  79014. "children" : [ {
  79015. "operator" : "OR",
  79016. "children" : [ ],
  79017. "cpe_match" : [ {
  79018. "vulnerable" : true,
  79019. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
  79020. "cpe_name" : [ ]
  79021. } ]
  79022. }, {
  79023. "operator" : "OR",
  79024. "children" : [ ],
  79025. "cpe_match" : [ {
  79026. "vulnerable" : false,
  79027. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
  79028. "cpe_name" : [ ]
  79029. } ]
  79030. } ],
  79031. "cpe_match" : [ ]
  79032. }, {
  79033. "operator" : "AND",
  79034. "children" : [ {
  79035. "operator" : "OR",
  79036. "children" : [ ],
  79037. "cpe_match" : [ {
  79038. "vulnerable" : true,
  79039. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
  79040. "cpe_name" : [ ]
  79041. } ]
  79042. }, {
  79043. "operator" : "OR",
  79044. "children" : [ ],
  79045. "cpe_match" : [ {
  79046. "vulnerable" : false,
  79047. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
  79048. "cpe_name" : [ ]
  79049. } ]
  79050. } ],
  79051. "cpe_match" : [ ]
  79052. }, {
  79053. "operator" : "AND",
  79054. "children" : [ {
  79055. "operator" : "OR",
  79056. "children" : [ ],
  79057. "cpe_match" : [ {
  79058. "vulnerable" : true,
  79059. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
  79060. "cpe_name" : [ ]
  79061. } ]
  79062. }, {
  79063. "operator" : "OR",
  79064. "children" : [ ],
  79065. "cpe_match" : [ {
  79066. "vulnerable" : false,
  79067. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
  79068. "cpe_name" : [ ]
  79069. } ]
  79070. } ],
  79071. "cpe_match" : [ ]
  79072. }, {
  79073. "operator" : "AND",
  79074. "children" : [ {
  79075. "operator" : "OR",
  79076. "children" : [ ],
  79077. "cpe_match" : [ {
  79078. "vulnerable" : true,
  79079. "cpe23Uri" : "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*",
  79080. "cpe_name" : [ ]
  79081. } ]
  79082. }, {
  79083. "operator" : "OR",
  79084. "children" : [ ],
  79085. "cpe_match" : [ {
  79086. "vulnerable" : false,
  79087. "cpe23Uri" : "cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*",
  79088. "cpe_name" : [ ]
  79089. } ]
  79090. } ],
  79091. "cpe_match" : [ ]
  79092. }, {
  79093. "operator" : "AND",
  79094. "children" : [ {
  79095. "operator" : "OR",
  79096. "children" : [ ],
  79097. "cpe_match" : [ {
  79098. "vulnerable" : true,
  79099. "cpe23Uri" : "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*",
  79100. "cpe_name" : [ ]
  79101. } ]
  79102. }, {
  79103. "operator" : "OR",
  79104. "children" : [ ],
  79105. "cpe_match" : [ {
  79106. "vulnerable" : false,
  79107. "cpe23Uri" : "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*",
  79108. "cpe_name" : [ ]
  79109. } ]
  79110. } ],
  79111. "cpe_match" : [ ]
  79112. }, {
  79113. "operator" : "AND",
  79114. "children" : [ {
  79115. "operator" : "OR",
  79116. "children" : [ ],
  79117. "cpe_match" : [ {
  79118. "vulnerable" : true,
  79119. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
  79120. "cpe_name" : [ ]
  79121. } ]
  79122. }, {
  79123. "operator" : "OR",
  79124. "children" : [ ],
  79125. "cpe_match" : [ {
  79126. "vulnerable" : false,
  79127. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
  79128. "cpe_name" : [ ]
  79129. } ]
  79130. } ],
  79131. "cpe_match" : [ ]
  79132. }, {
  79133. "operator" : "AND",
  79134. "children" : [ {
  79135. "operator" : "OR",
  79136. "children" : [ ],
  79137. "cpe_match" : [ {
  79138. "vulnerable" : true,
  79139. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
  79140. "cpe_name" : [ ]
  79141. } ]
  79142. }, {
  79143. "operator" : "OR",
  79144. "children" : [ ],
  79145. "cpe_match" : [ {
  79146. "vulnerable" : false,
  79147. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
  79148. "cpe_name" : [ ]
  79149. } ]
  79150. } ],
  79151. "cpe_match" : [ ]
  79152. }, {
  79153. "operator" : "AND",
  79154. "children" : [ {
  79155. "operator" : "OR",
  79156. "children" : [ ],
  79157. "cpe_match" : [ {
  79158. "vulnerable" : true,
  79159. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
  79160. "cpe_name" : [ ]
  79161. } ]
  79162. }, {
  79163. "operator" : "OR",
  79164. "children" : [ ],
  79165. "cpe_match" : [ {
  79166. "vulnerable" : false,
  79167. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
  79168. "cpe_name" : [ ]
  79169. } ]
  79170. } ],
  79171. "cpe_match" : [ ]
  79172. }, {
  79173. "operator" : "AND",
  79174. "children" : [ {
  79175. "operator" : "OR",
  79176. "children" : [ ],
  79177. "cpe_match" : [ {
  79178. "vulnerable" : true,
  79179. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
  79180. "cpe_name" : [ ]
  79181. } ]
  79182. }, {
  79183. "operator" : "OR",
  79184. "children" : [ ],
  79185. "cpe_match" : [ {
  79186. "vulnerable" : false,
  79187. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
  79188. "cpe_name" : [ ]
  79189. } ]
  79190. } ],
  79191. "cpe_match" : [ ]
  79192. }, {
  79193. "operator" : "AND",
  79194. "children" : [ {
  79195. "operator" : "OR",
  79196. "children" : [ ],
  79197. "cpe_match" : [ {
  79198. "vulnerable" : true,
  79199. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
  79200. "cpe_name" : [ ]
  79201. } ]
  79202. }, {
  79203. "operator" : "OR",
  79204. "children" : [ ],
  79205. "cpe_match" : [ {
  79206. "vulnerable" : false,
  79207. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
  79208. "cpe_name" : [ ]
  79209. } ]
  79210. } ],
  79211. "cpe_match" : [ ]
  79212. }, {
  79213. "operator" : "AND",
  79214. "children" : [ {
  79215. "operator" : "OR",
  79216. "children" : [ ],
  79217. "cpe_match" : [ {
  79218. "vulnerable" : true,
  79219. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
  79220. "cpe_name" : [ ]
  79221. } ]
  79222. }, {
  79223. "operator" : "OR",
  79224. "children" : [ ],
  79225. "cpe_match" : [ {
  79226. "vulnerable" : false,
  79227. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
  79228. "cpe_name" : [ ]
  79229. } ]
  79230. } ],
  79231. "cpe_match" : [ ]
  79232. }, {
  79233. "operator" : "AND",
  79234. "children" : [ {
  79235. "operator" : "OR",
  79236. "children" : [ ],
  79237. "cpe_match" : [ {
  79238. "vulnerable" : true,
  79239. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
  79240. "cpe_name" : [ ]
  79241. } ]
  79242. }, {
  79243. "operator" : "OR",
  79244. "children" : [ ],
  79245. "cpe_match" : [ {
  79246. "vulnerable" : false,
  79247. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
  79248. "cpe_name" : [ ]
  79249. } ]
  79250. } ],
  79251. "cpe_match" : [ ]
  79252. }, {
  79253. "operator" : "AND",
  79254. "children" : [ {
  79255. "operator" : "OR",
  79256. "children" : [ ],
  79257. "cpe_match" : [ {
  79258. "vulnerable" : true,
  79259. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
  79260. "cpe_name" : [ ]
  79261. } ]
  79262. }, {
  79263. "operator" : "OR",
  79264. "children" : [ ],
  79265. "cpe_match" : [ {
  79266. "vulnerable" : false,
  79267. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
  79268. "cpe_name" : [ ]
  79269. } ]
  79270. } ],
  79271. "cpe_match" : [ ]
  79272. }, {
  79273. "operator" : "AND",
  79274. "children" : [ {
  79275. "operator" : "OR",
  79276. "children" : [ ],
  79277. "cpe_match" : [ {
  79278. "vulnerable" : true,
  79279. "cpe23Uri" : "cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*",
  79280. "cpe_name" : [ ]
  79281. } ]
  79282. }, {
  79283. "operator" : "OR",
  79284. "children" : [ ],
  79285. "cpe_match" : [ {
  79286. "vulnerable" : false,
  79287. "cpe23Uri" : "cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*",
  79288. "cpe_name" : [ ]
  79289. } ]
  79290. } ],
  79291. "cpe_match" : [ ]
  79292. }, {
  79293. "operator" : "AND",
  79294. "children" : [ {
  79295. "operator" : "OR",
  79296. "children" : [ ],
  79297. "cpe_match" : [ {
  79298. "vulnerable" : true,
  79299. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda640_firmware:-:*:*:*:*:*:*:*",
  79300. "cpe_name" : [ ]
  79301. } ]
  79302. }, {
  79303. "operator" : "OR",
  79304. "children" : [ ],
  79305. "cpe_match" : [ {
  79306. "vulnerable" : false,
  79307. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda640:-:*:*:*:*:*:*:*",
  79308. "cpe_name" : [ ]
  79309. } ]
  79310. } ],
  79311. "cpe_match" : [ ]
  79312. }, {
  79313. "operator" : "AND",
  79314. "children" : [ {
  79315. "operator" : "OR",
  79316. "children" : [ ],
  79317. "cpe_match" : [ {
  79318. "vulnerable" : true,
  79319. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
  79320. "cpe_name" : [ ]
  79321. } ]
  79322. }, {
  79323. "operator" : "OR",
  79324. "children" : [ ],
  79325. "cpe_match" : [ {
  79326. "vulnerable" : false,
  79327. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
  79328. "cpe_name" : [ ]
  79329. } ]
  79330. } ],
  79331. "cpe_match" : [ ]
  79332. }, {
  79333. "operator" : "AND",
  79334. "children" : [ {
  79335. "operator" : "OR",
  79336. "children" : [ ],
  79337. "cpe_match" : [ {
  79338. "vulnerable" : true,
  79339. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
  79340. "cpe_name" : [ ]
  79341. } ]
  79342. }, {
  79343. "operator" : "OR",
  79344. "children" : [ ],
  79345. "cpe_match" : [ {
  79346. "vulnerable" : false,
  79347. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
  79348. "cpe_name" : [ ]
  79349. } ]
  79350. } ],
  79351. "cpe_match" : [ ]
  79352. }, {
  79353. "operator" : "AND",
  79354. "children" : [ {
  79355. "operator" : "OR",
  79356. "children" : [ ],
  79357. "cpe_match" : [ {
  79358. "vulnerable" : true,
  79359. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda855_firmware:-:*:*:*:*:*:*:*",
  79360. "cpe_name" : [ ]
  79361. } ]
  79362. }, {
  79363. "operator" : "OR",
  79364. "children" : [ ],
  79365. "cpe_match" : [ {
  79366. "vulnerable" : false,
  79367. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda855:-:*:*:*:*:*:*:*",
  79368. "cpe_name" : [ ]
  79369. } ]
  79370. } ],
  79371. "cpe_match" : [ ]
  79372. }, {
  79373. "operator" : "AND",
  79374. "children" : [ {
  79375. "operator" : "OR",
  79376. "children" : [ ],
  79377. "cpe_match" : [ {
  79378. "vulnerable" : true,
  79379. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm640_firmware:-:*:*:*:*:*:*:*",
  79380. "cpe_name" : [ ]
  79381. } ]
  79382. }, {
  79383. "operator" : "OR",
  79384. "children" : [ ],
  79385. "cpe_match" : [ {
  79386. "vulnerable" : false,
  79387. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm640:-:*:*:*:*:*:*:*",
  79388. "cpe_name" : [ ]
  79389. } ]
  79390. } ],
  79391. "cpe_match" : [ ]
  79392. }, {
  79393. "operator" : "AND",
  79394. "children" : [ {
  79395. "operator" : "OR",
  79396. "children" : [ ],
  79397. "cpe_match" : [ {
  79398. "vulnerable" : true,
  79399. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
  79400. "cpe_name" : [ ]
  79401. } ]
  79402. }, {
  79403. "operator" : "OR",
  79404. "children" : [ ],
  79405. "cpe_match" : [ {
  79406. "vulnerable" : false,
  79407. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
  79408. "cpe_name" : [ ]
  79409. } ]
  79410. } ],
  79411. "cpe_match" : [ ]
  79412. }, {
  79413. "operator" : "AND",
  79414. "children" : [ {
  79415. "operator" : "OR",
  79416. "children" : [ ],
  79417. "cpe_match" : [ {
  79418. "vulnerable" : true,
  79419. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:*",
  79420. "cpe_name" : [ ]
  79421. } ]
  79422. }, {
  79423. "operator" : "OR",
  79424. "children" : [ ],
  79425. "cpe_match" : [ {
  79426. "vulnerable" : false,
  79427. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*",
  79428. "cpe_name" : [ ]
  79429. } ]
  79430. } ],
  79431. "cpe_match" : [ ]
  79432. }, {
  79433. "operator" : "AND",
  79434. "children" : [ {
  79435. "operator" : "OR",
  79436. "children" : [ ],
  79437. "cpe_match" : [ {
  79438. "vulnerable" : true,
  79439. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
  79440. "cpe_name" : [ ]
  79441. } ]
  79442. }, {
  79443. "operator" : "OR",
  79444. "children" : [ ],
  79445. "cpe_match" : [ {
  79446. "vulnerable" : false,
  79447. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
  79448. "cpe_name" : [ ]
  79449. } ]
  79450. } ],
  79451. "cpe_match" : [ ]
  79452. }, {
  79453. "operator" : "AND",
  79454. "children" : [ {
  79455. "operator" : "OR",
  79456. "children" : [ ],
  79457. "cpe_match" : [ {
  79458. "vulnerable" : true,
  79459. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
  79460. "cpe_name" : [ ]
  79461. } ]
  79462. }, {
  79463. "operator" : "OR",
  79464. "children" : [ ],
  79465. "cpe_match" : [ {
  79466. "vulnerable" : false,
  79467. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
  79468. "cpe_name" : [ ]
  79469. } ]
  79470. } ],
  79471. "cpe_match" : [ ]
  79472. }, {
  79473. "operator" : "AND",
  79474. "children" : [ {
  79475. "operator" : "OR",
  79476. "children" : [ ],
  79477. "cpe_match" : [ {
  79478. "vulnerable" : true,
  79479. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
  79480. "cpe_name" : [ ]
  79481. } ]
  79482. }, {
  79483. "operator" : "OR",
  79484. "children" : [ ],
  79485. "cpe_match" : [ {
  79486. "vulnerable" : false,
  79487. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
  79488. "cpe_name" : [ ]
  79489. } ]
  79490. } ],
  79491. "cpe_match" : [ ]
  79492. }, {
  79493. "operator" : "AND",
  79494. "children" : [ {
  79495. "operator" : "OR",
  79496. "children" : [ ],
  79497. "cpe_match" : [ {
  79498. "vulnerable" : true,
  79499. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
  79500. "cpe_name" : [ ]
  79501. } ]
  79502. }, {
  79503. "operator" : "OR",
  79504. "children" : [ ],
  79505. "cpe_match" : [ {
  79506. "vulnerable" : false,
  79507. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
  79508. "cpe_name" : [ ]
  79509. } ]
  79510. } ],
  79511. "cpe_match" : [ ]
  79512. }, {
  79513. "operator" : "AND",
  79514. "children" : [ {
  79515. "operator" : "OR",
  79516. "children" : [ ],
  79517. "cpe_match" : [ {
  79518. "vulnerable" : true,
  79519. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
  79520. "cpe_name" : [ ]
  79521. } ]
  79522. }, {
  79523. "operator" : "OR",
  79524. "children" : [ ],
  79525. "cpe_match" : [ {
  79526. "vulnerable" : false,
  79527. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
  79528. "cpe_name" : [ ]
  79529. } ]
  79530. } ],
  79531. "cpe_match" : [ ]
  79532. }, {
  79533. "operator" : "AND",
  79534. "children" : [ {
  79535. "operator" : "OR",
  79536. "children" : [ ],
  79537. "cpe_match" : [ {
  79538. "vulnerable" : true,
  79539. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm4250_firmware:-:*:*:*:*:*:*:*",
  79540. "cpe_name" : [ ]
  79541. } ]
  79542. }, {
  79543. "operator" : "OR",
  79544. "children" : [ ],
  79545. "cpe_match" : [ {
  79546. "vulnerable" : false,
  79547. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm4250:-:*:*:*:*:*:*:*",
  79548. "cpe_name" : [ ]
  79549. } ]
  79550. } ],
  79551. "cpe_match" : [ ]
  79552. }, {
  79553. "operator" : "AND",
  79554. "children" : [ {
  79555. "operator" : "OR",
  79556. "children" : [ ],
  79557. "cpe_match" : [ {
  79558. "vulnerable" : true,
  79559. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm4250p_firmware:-:*:*:*:*:*:*:*",
  79560. "cpe_name" : [ ]
  79561. } ]
  79562. }, {
  79563. "operator" : "OR",
  79564. "children" : [ ],
  79565. "cpe_match" : [ {
  79566. "vulnerable" : false,
  79567. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm4250p:-:*:*:*:*:*:*:*",
  79568. "cpe_name" : [ ]
  79569. } ]
  79570. } ],
  79571. "cpe_match" : [ ]
  79572. }, {
  79573. "operator" : "AND",
  79574. "children" : [ {
  79575. "operator" : "OR",
  79576. "children" : [ ],
  79577. "cpe_match" : [ {
  79578. "vulnerable" : true,
  79579. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6115_firmware:-:*:*:*:*:*:*:*",
  79580. "cpe_name" : [ ]
  79581. } ]
  79582. }, {
  79583. "operator" : "OR",
  79584. "children" : [ ],
  79585. "cpe_match" : [ {
  79586. "vulnerable" : false,
  79587. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6115:-:*:*:*:*:*:*:*",
  79588. "cpe_name" : [ ]
  79589. } ]
  79590. } ],
  79591. "cpe_match" : [ ]
  79592. }, {
  79593. "operator" : "AND",
  79594. "children" : [ {
  79595. "operator" : "OR",
  79596. "children" : [ ],
  79597. "cpe_match" : [ {
  79598. "vulnerable" : true,
  79599. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6115p_firmware:-:*:*:*:*:*:*:*",
  79600. "cpe_name" : [ ]
  79601. } ]
  79602. }, {
  79603. "operator" : "OR",
  79604. "children" : [ ],
  79605. "cpe_match" : [ {
  79606. "vulnerable" : false,
  79607. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6115p:-:*:*:*:*:*:*:*",
  79608. "cpe_name" : [ ]
  79609. } ]
  79610. } ],
  79611. "cpe_match" : [ ]
  79612. }, {
  79613. "operator" : "AND",
  79614. "children" : [ {
  79615. "operator" : "OR",
  79616. "children" : [ ],
  79617. "cpe_match" : [ {
  79618. "vulnerable" : true,
  79619. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:*",
  79620. "cpe_name" : [ ]
  79621. } ]
  79622. }, {
  79623. "operator" : "OR",
  79624. "children" : [ ],
  79625. "cpe_match" : [ {
  79626. "vulnerable" : false,
  79627. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6125:-:*:*:*:*:*:*:*",
  79628. "cpe_name" : [ ]
  79629. } ]
  79630. } ],
  79631. "cpe_match" : [ ]
  79632. }, {
  79633. "operator" : "AND",
  79634. "children" : [ {
  79635. "operator" : "OR",
  79636. "children" : [ ],
  79637. "cpe_match" : [ {
  79638. "vulnerable" : true,
  79639. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
  79640. "cpe_name" : [ ]
  79641. } ]
  79642. }, {
  79643. "operator" : "OR",
  79644. "children" : [ ],
  79645. "cpe_match" : [ {
  79646. "vulnerable" : false,
  79647. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
  79648. "cpe_name" : [ ]
  79649. } ]
  79650. } ],
  79651. "cpe_match" : [ ]
  79652. }, {
  79653. "operator" : "AND",
  79654. "children" : [ {
  79655. "operator" : "OR",
  79656. "children" : [ ],
  79657. "cpe_match" : [ {
  79658. "vulnerable" : true,
  79659. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6150p_firmware:-:*:*:*:*:*:*:*",
  79660. "cpe_name" : [ ]
  79661. } ]
  79662. }, {
  79663. "operator" : "OR",
  79664. "children" : [ ],
  79665. "cpe_match" : [ {
  79666. "vulnerable" : false,
  79667. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6150p:-:*:*:*:*:*:*:*",
  79668. "cpe_name" : [ ]
  79669. } ]
  79670. } ],
  79671. "cpe_match" : [ ]
  79672. }, {
  79673. "operator" : "AND",
  79674. "children" : [ {
  79675. "operator" : "OR",
  79676. "children" : [ ],
  79677. "cpe_match" : [ {
  79678. "vulnerable" : true,
  79679. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
  79680. "cpe_name" : [ ]
  79681. } ]
  79682. }, {
  79683. "operator" : "OR",
  79684. "children" : [ ],
  79685. "cpe_match" : [ {
  79686. "vulnerable" : false,
  79687. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
  79688. "cpe_name" : [ ]
  79689. } ]
  79690. } ],
  79691. "cpe_match" : [ ]
  79692. }, {
  79693. "operator" : "AND",
  79694. "children" : [ {
  79695. "operator" : "OR",
  79696. "children" : [ ],
  79697. "cpe_match" : [ {
  79698. "vulnerable" : true,
  79699. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
  79700. "cpe_name" : [ ]
  79701. } ]
  79702. }, {
  79703. "operator" : "OR",
  79704. "children" : [ ],
  79705. "cpe_match" : [ {
  79706. "vulnerable" : false,
  79707. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
  79708. "cpe_name" : [ ]
  79709. } ]
  79710. } ],
  79711. "cpe_match" : [ ]
  79712. }, {
  79713. "operator" : "AND",
  79714. "children" : [ {
  79715. "operator" : "OR",
  79716. "children" : [ ],
  79717. "cpe_match" : [ {
  79718. "vulnerable" : true,
  79719. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6350_firmware:-:*:*:*:*:*:*:*",
  79720. "cpe_name" : [ ]
  79721. } ]
  79722. }, {
  79723. "operator" : "OR",
  79724. "children" : [ ],
  79725. "cpe_match" : [ {
  79726. "vulnerable" : false,
  79727. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6350:-:*:*:*:*:*:*:*",
  79728. "cpe_name" : [ ]
  79729. } ]
  79730. } ],
  79731. "cpe_match" : [ ]
  79732. }, {
  79733. "operator" : "AND",
  79734. "children" : [ {
  79735. "operator" : "OR",
  79736. "children" : [ ],
  79737. "cpe_match" : [ {
  79738. "vulnerable" : true,
  79739. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:*",
  79740. "cpe_name" : [ ]
  79741. } ]
  79742. }, {
  79743. "operator" : "OR",
  79744. "children" : [ ],
  79745. "cpe_match" : [ {
  79746. "vulnerable" : false,
  79747. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*",
  79748. "cpe_name" : [ ]
  79749. } ]
  79750. } ],
  79751. "cpe_match" : [ ]
  79752. }, {
  79753. "operator" : "AND",
  79754. "children" : [ {
  79755. "operator" : "OR",
  79756. "children" : [ ],
  79757. "cpe_match" : [ {
  79758. "vulnerable" : true,
  79759. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
  79760. "cpe_name" : [ ]
  79761. } ]
  79762. }, {
  79763. "operator" : "OR",
  79764. "children" : [ ],
  79765. "cpe_match" : [ {
  79766. "vulnerable" : false,
  79767. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
  79768. "cpe_name" : [ ]
  79769. } ]
  79770. } ],
  79771. "cpe_match" : [ ]
  79772. }, {
  79773. "operator" : "AND",
  79774. "children" : [ {
  79775. "operator" : "OR",
  79776. "children" : [ ],
  79777. "cpe_match" : [ {
  79778. "vulnerable" : true,
  79779. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7150p_firmware:-:*:*:*:*:*:*:*",
  79780. "cpe_name" : [ ]
  79781. } ]
  79782. }, {
  79783. "operator" : "OR",
  79784. "children" : [ ],
  79785. "cpe_match" : [ {
  79786. "vulnerable" : false,
  79787. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7150p:-:*:*:*:*:*:*:*",
  79788. "cpe_name" : [ ]
  79789. } ]
  79790. } ],
  79791. "cpe_match" : [ ]
  79792. }, {
  79793. "operator" : "AND",
  79794. "children" : [ {
  79795. "operator" : "OR",
  79796. "children" : [ ],
  79797. "cpe_match" : [ {
  79798. "vulnerable" : true,
  79799. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7225_firmware:-:*:*:*:*:*:*:*",
  79800. "cpe_name" : [ ]
  79801. } ]
  79802. }, {
  79803. "operator" : "OR",
  79804. "children" : [ ],
  79805. "cpe_match" : [ {
  79806. "vulnerable" : false,
  79807. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7225:-:*:*:*:*:*:*:*",
  79808. "cpe_name" : [ ]
  79809. } ]
  79810. } ],
  79811. "cpe_match" : [ ]
  79812. }, {
  79813. "operator" : "AND",
  79814. "children" : [ {
  79815. "operator" : "OR",
  79816. "children" : [ ],
  79817. "cpe_match" : [ {
  79818. "vulnerable" : true,
  79819. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:*",
  79820. "cpe_name" : [ ]
  79821. } ]
  79822. }, {
  79823. "operator" : "OR",
  79824. "children" : [ ],
  79825. "cpe_match" : [ {
  79826. "vulnerable" : false,
  79827. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*",
  79828. "cpe_name" : [ ]
  79829. } ]
  79830. } ],
  79831. "cpe_match" : [ ]
  79832. }, {
  79833. "operator" : "AND",
  79834. "children" : [ {
  79835. "operator" : "OR",
  79836. "children" : [ ],
  79837. "cpe_match" : [ {
  79838. "vulnerable" : true,
  79839. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
  79840. "cpe_name" : [ ]
  79841. } ]
  79842. }, {
  79843. "operator" : "OR",
  79844. "children" : [ ],
  79845. "cpe_match" : [ {
  79846. "vulnerable" : false,
  79847. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
  79848. "cpe_name" : [ ]
  79849. } ]
  79850. } ],
  79851. "cpe_match" : [ ]
  79852. }, {
  79853. "operator" : "AND",
  79854. "children" : [ {
  79855. "operator" : "OR",
  79856. "children" : [ ],
  79857. "cpe_match" : [ {
  79858. "vulnerable" : true,
  79859. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
  79860. "cpe_name" : [ ]
  79861. } ]
  79862. }, {
  79863. "operator" : "OR",
  79864. "children" : [ ],
  79865. "cpe_match" : [ {
  79866. "vulnerable" : false,
  79867. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
  79868. "cpe_name" : [ ]
  79869. } ]
  79870. } ],
  79871. "cpe_match" : [ ]
  79872. }, {
  79873. "operator" : "AND",
  79874. "children" : [ {
  79875. "operator" : "OR",
  79876. "children" : [ ],
  79877. "cpe_match" : [ {
  79878. "vulnerable" : true,
  79879. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8150p_firmware:-:*:*:*:*:*:*:*",
  79880. "cpe_name" : [ ]
  79881. } ]
  79882. }, {
  79883. "operator" : "OR",
  79884. "children" : [ ],
  79885. "cpe_match" : [ {
  79886. "vulnerable" : false,
  79887. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8150p:-:*:*:*:*:*:*:*",
  79888. "cpe_name" : [ ]
  79889. } ]
  79890. } ],
  79891. "cpe_match" : [ ]
  79892. }, {
  79893. "operator" : "AND",
  79894. "children" : [ {
  79895. "operator" : "OR",
  79896. "children" : [ ],
  79897. "cpe_match" : [ {
  79898. "vulnerable" : true,
  79899. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
  79900. "cpe_name" : [ ]
  79901. } ]
  79902. }, {
  79903. "operator" : "OR",
  79904. "children" : [ ],
  79905. "cpe_match" : [ {
  79906. "vulnerable" : false,
  79907. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
  79908. "cpe_name" : [ ]
  79909. } ]
  79910. } ],
  79911. "cpe_match" : [ ]
  79912. }, {
  79913. "operator" : "AND",
  79914. "children" : [ {
  79915. "operator" : "OR",
  79916. "children" : [ ],
  79917. "cpe_match" : [ {
  79918. "vulnerable" : true,
  79919. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8350_firmware:-:*:*:*:*:*:*:*",
  79920. "cpe_name" : [ ]
  79921. } ]
  79922. }, {
  79923. "operator" : "OR",
  79924. "children" : [ ],
  79925. "cpe_match" : [ {
  79926. "vulnerable" : false,
  79927. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8350:-:*:*:*:*:*:*:*",
  79928. "cpe_name" : [ ]
  79929. } ]
  79930. } ],
  79931. "cpe_match" : [ ]
  79932. }, {
  79933. "operator" : "AND",
  79934. "children" : [ {
  79935. "operator" : "OR",
  79936. "children" : [ ],
  79937. "cpe_match" : [ {
  79938. "vulnerable" : true,
  79939. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8350p_firmware:-:*:*:*:*:*:*:*",
  79940. "cpe_name" : [ ]
  79941. } ]
  79942. }, {
  79943. "operator" : "OR",
  79944. "children" : [ ],
  79945. "cpe_match" : [ {
  79946. "vulnerable" : false,
  79947. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8350p:-:*:*:*:*:*:*:*",
  79948. "cpe_name" : [ ]
  79949. } ]
  79950. } ],
  79951. "cpe_match" : [ ]
  79952. }, {
  79953. "operator" : "AND",
  79954. "children" : [ {
  79955. "operator" : "OR",
  79956. "children" : [ ],
  79957. "cpe_match" : [ {
  79958. "vulnerable" : true,
  79959. "cpe23Uri" : "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
  79960. "cpe_name" : [ ]
  79961. } ]
  79962. }, {
  79963. "operator" : "OR",
  79964. "children" : [ ],
  79965. "cpe_match" : [ {
  79966. "vulnerable" : false,
  79967. "cpe23Uri" : "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
  79968. "cpe_name" : [ ]
  79969. } ]
  79970. } ],
  79971. "cpe_match" : [ ]
  79972. }, {
  79973. "operator" : "AND",
  79974. "children" : [ {
  79975. "operator" : "OR",
  79976. "children" : [ ],
  79977. "cpe_match" : [ {
  79978. "vulnerable" : true,
  79979. "cpe23Uri" : "cpe:2.3:o:qualcomm:sxr2130p_firmware:-:*:*:*:*:*:*:*",
  79980. "cpe_name" : [ ]
  79981. } ]
  79982. }, {
  79983. "operator" : "OR",
  79984. "children" : [ ],
  79985. "cpe_match" : [ {
  79986. "vulnerable" : false,
  79987. "cpe23Uri" : "cpe:2.3:h:qualcomm:sxr2130p:-:*:*:*:*:*:*:*",
  79988. "cpe_name" : [ ]
  79989. } ]
  79990. } ],
  79991. "cpe_match" : [ ]
  79992. } ]
  79993. },
  79994. "impact" : {
  79995. "baseMetricV3" : {
  79996. "cvssV3" : {
  79997. "version" : "3.1",
  79998. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  79999. "attackVector" : "LOCAL",
  80000. "attackComplexity" : "LOW",
  80001. "privilegesRequired" : "LOW",
  80002. "userInteraction" : "NONE",
  80003. "scope" : "UNCHANGED",
  80004. "confidentialityImpact" : "HIGH",
  80005. "integrityImpact" : "HIGH",
  80006. "availabilityImpact" : "HIGH",
  80007. "baseScore" : 7.8,
  80008. "baseSeverity" : "HIGH"
  80009. },
  80010. "exploitabilityScore" : 1.8,
  80011. "impactScore" : 5.9
  80012. },
  80013. "baseMetricV2" : {
  80014. "cvssV2" : {
  80015. "version" : "2.0",
  80016. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  80017. "accessVector" : "LOCAL",
  80018. "accessComplexity" : "LOW",
  80019. "authentication" : "NONE",
  80020. "confidentialityImpact" : "COMPLETE",
  80021. "integrityImpact" : "COMPLETE",
  80022. "availabilityImpact" : "COMPLETE",
  80023. "baseScore" : 7.2
  80024. },
  80025. "severity" : "HIGH",
  80026. "exploitabilityScore" : 3.9,
  80027. "impactScore" : 10.0,
  80028. "acInsufInfo" : false,
  80029. "obtainAllPrivilege" : false,
  80030. "obtainUserPrivilege" : false,
  80031. "obtainOtherPrivilege" : false,
  80032. "userInteractionRequired" : false
  80033. }
  80034. },
  80035. "publishedDate" : "2020-11-12T10:15Z",
  80036. "lastModifiedDate" : "2021-05-10T13:15Z"
  80037. }, {
  80038. "cve" : {
  80039. "data_type" : "CVE",
  80040. "data_format" : "MITRE",
  80041. "data_version" : "4.0",
  80042. "CVE_data_meta" : {
  80043. "ID" : "CVE-2020-11202",
  80044. "ASSIGNER" : "product-security@qualcomm.com"
  80045. },
  80046. "problemtype" : {
  80047. "problemtype_data" : [ {
  80048. "description" : [ {
  80049. "lang" : "en",
  80050. "value" : "CWE-20"
  80051. } ]
  80052. } ]
  80053. },
  80054. "references" : {
  80055. "reference_data" : [ {
  80056. "url" : "https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin",
  80057. "name" : "https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin",
  80058. "refsource" : "CONFIRM",
  80059. "tags" : [ "Vendor Advisory" ]
  80060. }, {
  80061. "url" : "https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/",
  80062. "name" : "https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/",
  80063. "refsource" : "MISC",
  80064. "tags" : [ ]
  80065. }, {
  80066. "url" : "https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/",
  80067. "name" : "https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/",
  80068. "refsource" : "MISC",
  80069. "tags" : [ ]
  80070. } ]
  80071. },
  80072. "description" : {
  80073. "description_data" : [ {
  80074. "lang" : "en",
  80075. "value" : "Buffer overflow/underflow occurs when typecasting the buffer passed by CPU internally in the library which is not aligned with the actual size of the structure' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA670, SDA845, SDM640, SDM670, SDM710, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P"
  80076. } ]
  80077. }
  80078. },
  80079. "configurations" : {
  80080. "CVE_data_version" : "4.0",
  80081. "nodes" : [ {
  80082. "operator" : "AND",
  80083. "children" : [ {
  80084. "operator" : "OR",
  80085. "children" : [ ],
  80086. "cpe_match" : [ {
  80087. "vulnerable" : true,
  80088. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
  80089. "cpe_name" : [ ]
  80090. } ]
  80091. }, {
  80092. "operator" : "OR",
  80093. "children" : [ ],
  80094. "cpe_match" : [ {
  80095. "vulnerable" : false,
  80096. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
  80097. "cpe_name" : [ ]
  80098. } ]
  80099. } ],
  80100. "cpe_match" : [ ]
  80101. }, {
  80102. "operator" : "AND",
  80103. "children" : [ {
  80104. "operator" : "OR",
  80105. "children" : [ ],
  80106. "cpe_match" : [ {
  80107. "vulnerable" : true,
  80108. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
  80109. "cpe_name" : [ ]
  80110. } ]
  80111. }, {
  80112. "operator" : "OR",
  80113. "children" : [ ],
  80114. "cpe_match" : [ {
  80115. "vulnerable" : false,
  80116. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
  80117. "cpe_name" : [ ]
  80118. } ]
  80119. } ],
  80120. "cpe_match" : [ ]
  80121. }, {
  80122. "operator" : "AND",
  80123. "children" : [ {
  80124. "operator" : "OR",
  80125. "children" : [ ],
  80126. "cpe_match" : [ {
  80127. "vulnerable" : true,
  80128. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*",
  80129. "cpe_name" : [ ]
  80130. } ]
  80131. }, {
  80132. "operator" : "OR",
  80133. "children" : [ ],
  80134. "cpe_match" : [ {
  80135. "vulnerable" : false,
  80136. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
  80137. "cpe_name" : [ ]
  80138. } ]
  80139. } ],
  80140. "cpe_match" : [ ]
  80141. }, {
  80142. "operator" : "AND",
  80143. "children" : [ {
  80144. "operator" : "OR",
  80145. "children" : [ ],
  80146. "cpe_match" : [ {
  80147. "vulnerable" : true,
  80148. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
  80149. "cpe_name" : [ ]
  80150. } ]
  80151. }, {
  80152. "operator" : "OR",
  80153. "children" : [ ],
  80154. "cpe_match" : [ {
  80155. "vulnerable" : false,
  80156. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
  80157. "cpe_name" : [ ]
  80158. } ]
  80159. } ],
  80160. "cpe_match" : [ ]
  80161. }, {
  80162. "operator" : "AND",
  80163. "children" : [ {
  80164. "operator" : "OR",
  80165. "children" : [ ],
  80166. "cpe_match" : [ {
  80167. "vulnerable" : true,
  80168. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
  80169. "cpe_name" : [ ]
  80170. } ]
  80171. }, {
  80172. "operator" : "OR",
  80173. "children" : [ ],
  80174. "cpe_match" : [ {
  80175. "vulnerable" : false,
  80176. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
  80177. "cpe_name" : [ ]
  80178. } ]
  80179. } ],
  80180. "cpe_match" : [ ]
  80181. }, {
  80182. "operator" : "AND",
  80183. "children" : [ {
  80184. "operator" : "OR",
  80185. "children" : [ ],
  80186. "cpe_match" : [ {
  80187. "vulnerable" : true,
  80188. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
  80189. "cpe_name" : [ ]
  80190. } ]
  80191. }, {
  80192. "operator" : "OR",
  80193. "children" : [ ],
  80194. "cpe_match" : [ {
  80195. "vulnerable" : false,
  80196. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
  80197. "cpe_name" : [ ]
  80198. } ]
  80199. } ],
  80200. "cpe_match" : [ ]
  80201. }, {
  80202. "operator" : "AND",
  80203. "children" : [ {
  80204. "operator" : "OR",
  80205. "children" : [ ],
  80206. "cpe_match" : [ {
  80207. "vulnerable" : true,
  80208. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
  80209. "cpe_name" : [ ]
  80210. } ]
  80211. }, {
  80212. "operator" : "OR",
  80213. "children" : [ ],
  80214. "cpe_match" : [ {
  80215. "vulnerable" : false,
  80216. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
  80217. "cpe_name" : [ ]
  80218. } ]
  80219. } ],
  80220. "cpe_match" : [ ]
  80221. }, {
  80222. "operator" : "AND",
  80223. "children" : [ {
  80224. "operator" : "OR",
  80225. "children" : [ ],
  80226. "cpe_match" : [ {
  80227. "vulnerable" : true,
  80228. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
  80229. "cpe_name" : [ ]
  80230. } ]
  80231. }, {
  80232. "operator" : "OR",
  80233. "children" : [ ],
  80234. "cpe_match" : [ {
  80235. "vulnerable" : false,
  80236. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
  80237. "cpe_name" : [ ]
  80238. } ]
  80239. } ],
  80240. "cpe_match" : [ ]
  80241. }, {
  80242. "operator" : "AND",
  80243. "children" : [ {
  80244. "operator" : "OR",
  80245. "children" : [ ],
  80246. "cpe_match" : [ {
  80247. "vulnerable" : true,
  80248. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
  80249. "cpe_name" : [ ]
  80250. } ]
  80251. }, {
  80252. "operator" : "OR",
  80253. "children" : [ ],
  80254. "cpe_match" : [ {
  80255. "vulnerable" : false,
  80256. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
  80257. "cpe_name" : [ ]
  80258. } ]
  80259. } ],
  80260. "cpe_match" : [ ]
  80261. }, {
  80262. "operator" : "AND",
  80263. "children" : [ {
  80264. "operator" : "OR",
  80265. "children" : [ ],
  80266. "cpe_match" : [ {
  80267. "vulnerable" : true,
  80268. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
  80269. "cpe_name" : [ ]
  80270. } ]
  80271. }, {
  80272. "operator" : "OR",
  80273. "children" : [ ],
  80274. "cpe_match" : [ {
  80275. "vulnerable" : false,
  80276. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
  80277. "cpe_name" : [ ]
  80278. } ]
  80279. } ],
  80280. "cpe_match" : [ ]
  80281. }, {
  80282. "operator" : "AND",
  80283. "children" : [ {
  80284. "operator" : "OR",
  80285. "children" : [ ],
  80286. "cpe_match" : [ {
  80287. "vulnerable" : true,
  80288. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
  80289. "cpe_name" : [ ]
  80290. } ]
  80291. }, {
  80292. "operator" : "OR",
  80293. "children" : [ ],
  80294. "cpe_match" : [ {
  80295. "vulnerable" : false,
  80296. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
  80297. "cpe_name" : [ ]
  80298. } ]
  80299. } ],
  80300. "cpe_match" : [ ]
  80301. }, {
  80302. "operator" : "AND",
  80303. "children" : [ {
  80304. "operator" : "OR",
  80305. "children" : [ ],
  80306. "cpe_match" : [ {
  80307. "vulnerable" : true,
  80308. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda640_firmware:-:*:*:*:*:*:*:*",
  80309. "cpe_name" : [ ]
  80310. } ]
  80311. }, {
  80312. "operator" : "OR",
  80313. "children" : [ ],
  80314. "cpe_match" : [ {
  80315. "vulnerable" : false,
  80316. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda640:-:*:*:*:*:*:*:*",
  80317. "cpe_name" : [ ]
  80318. } ]
  80319. } ],
  80320. "cpe_match" : [ ]
  80321. }, {
  80322. "operator" : "AND",
  80323. "children" : [ {
  80324. "operator" : "OR",
  80325. "children" : [ ],
  80326. "cpe_match" : [ {
  80327. "vulnerable" : true,
  80328. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda670_firmware:-:*:*:*:*:*:*:*",
  80329. "cpe_name" : [ ]
  80330. } ]
  80331. }, {
  80332. "operator" : "OR",
  80333. "children" : [ ],
  80334. "cpe_match" : [ {
  80335. "vulnerable" : false,
  80336. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda670:-:*:*:*:*:*:*:*",
  80337. "cpe_name" : [ ]
  80338. } ]
  80339. } ],
  80340. "cpe_match" : [ ]
  80341. }, {
  80342. "operator" : "AND",
  80343. "children" : [ {
  80344. "operator" : "OR",
  80345. "children" : [ ],
  80346. "cpe_match" : [ {
  80347. "vulnerable" : true,
  80348. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
  80349. "cpe_name" : [ ]
  80350. } ]
  80351. }, {
  80352. "operator" : "OR",
  80353. "children" : [ ],
  80354. "cpe_match" : [ {
  80355. "vulnerable" : false,
  80356. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
  80357. "cpe_name" : [ ]
  80358. } ]
  80359. } ],
  80360. "cpe_match" : [ ]
  80361. }, {
  80362. "operator" : "AND",
  80363. "children" : [ {
  80364. "operator" : "OR",
  80365. "children" : [ ],
  80366. "cpe_match" : [ {
  80367. "vulnerable" : true,
  80368. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm640_firmware:-:*:*:*:*:*:*:*",
  80369. "cpe_name" : [ ]
  80370. } ]
  80371. }, {
  80372. "operator" : "OR",
  80373. "children" : [ ],
  80374. "cpe_match" : [ {
  80375. "vulnerable" : false,
  80376. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm640:-:*:*:*:*:*:*:*",
  80377. "cpe_name" : [ ]
  80378. } ]
  80379. } ],
  80380. "cpe_match" : [ ]
  80381. }, {
  80382. "operator" : "AND",
  80383. "children" : [ {
  80384. "operator" : "OR",
  80385. "children" : [ ],
  80386. "cpe_match" : [ {
  80387. "vulnerable" : true,
  80388. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
  80389. "cpe_name" : [ ]
  80390. } ]
  80391. }, {
  80392. "operator" : "OR",
  80393. "children" : [ ],
  80394. "cpe_match" : [ {
  80395. "vulnerable" : false,
  80396. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
  80397. "cpe_name" : [ ]
  80398. } ]
  80399. } ],
  80400. "cpe_match" : [ ]
  80401. }, {
  80402. "operator" : "AND",
  80403. "children" : [ {
  80404. "operator" : "OR",
  80405. "children" : [ ],
  80406. "cpe_match" : [ {
  80407. "vulnerable" : true,
  80408. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
  80409. "cpe_name" : [ ]
  80410. } ]
  80411. }, {
  80412. "operator" : "OR",
  80413. "children" : [ ],
  80414. "cpe_match" : [ {
  80415. "vulnerable" : false,
  80416. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
  80417. "cpe_name" : [ ]
  80418. } ]
  80419. } ],
  80420. "cpe_match" : [ ]
  80421. }, {
  80422. "operator" : "AND",
  80423. "children" : [ {
  80424. "operator" : "OR",
  80425. "children" : [ ],
  80426. "cpe_match" : [ {
  80427. "vulnerable" : true,
  80428. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:*",
  80429. "cpe_name" : [ ]
  80430. } ]
  80431. }, {
  80432. "operator" : "OR",
  80433. "children" : [ ],
  80434. "cpe_match" : [ {
  80435. "vulnerable" : false,
  80436. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*",
  80437. "cpe_name" : [ ]
  80438. } ]
  80439. } ],
  80440. "cpe_match" : [ ]
  80441. }, {
  80442. "operator" : "AND",
  80443. "children" : [ {
  80444. "operator" : "OR",
  80445. "children" : [ ],
  80446. "cpe_match" : [ {
  80447. "vulnerable" : true,
  80448. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
  80449. "cpe_name" : [ ]
  80450. } ]
  80451. }, {
  80452. "operator" : "OR",
  80453. "children" : [ ],
  80454. "cpe_match" : [ {
  80455. "vulnerable" : false,
  80456. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
  80457. "cpe_name" : [ ]
  80458. } ]
  80459. } ],
  80460. "cpe_match" : [ ]
  80461. }, {
  80462. "operator" : "AND",
  80463. "children" : [ {
  80464. "operator" : "OR",
  80465. "children" : [ ],
  80466. "cpe_match" : [ {
  80467. "vulnerable" : true,
  80468. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
  80469. "cpe_name" : [ ]
  80470. } ]
  80471. }, {
  80472. "operator" : "OR",
  80473. "children" : [ ],
  80474. "cpe_match" : [ {
  80475. "vulnerable" : false,
  80476. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
  80477. "cpe_name" : [ ]
  80478. } ]
  80479. } ],
  80480. "cpe_match" : [ ]
  80481. }, {
  80482. "operator" : "AND",
  80483. "children" : [ {
  80484. "operator" : "OR",
  80485. "children" : [ ],
  80486. "cpe_match" : [ {
  80487. "vulnerable" : true,
  80488. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
  80489. "cpe_name" : [ ]
  80490. } ]
  80491. }, {
  80492. "operator" : "OR",
  80493. "children" : [ ],
  80494. "cpe_match" : [ {
  80495. "vulnerable" : false,
  80496. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
  80497. "cpe_name" : [ ]
  80498. } ]
  80499. } ],
  80500. "cpe_match" : [ ]
  80501. }, {
  80502. "operator" : "AND",
  80503. "children" : [ {
  80504. "operator" : "OR",
  80505. "children" : [ ],
  80506. "cpe_match" : [ {
  80507. "vulnerable" : true,
  80508. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
  80509. "cpe_name" : [ ]
  80510. } ]
  80511. }, {
  80512. "operator" : "OR",
  80513. "children" : [ ],
  80514. "cpe_match" : [ {
  80515. "vulnerable" : false,
  80516. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
  80517. "cpe_name" : [ ]
  80518. } ]
  80519. } ],
  80520. "cpe_match" : [ ]
  80521. }, {
  80522. "operator" : "AND",
  80523. "children" : [ {
  80524. "operator" : "OR",
  80525. "children" : [ ],
  80526. "cpe_match" : [ {
  80527. "vulnerable" : true,
  80528. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:*",
  80529. "cpe_name" : [ ]
  80530. } ]
  80531. }, {
  80532. "operator" : "OR",
  80533. "children" : [ ],
  80534. "cpe_match" : [ {
  80535. "vulnerable" : false,
  80536. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6125:-:*:*:*:*:*:*:*",
  80537. "cpe_name" : [ ]
  80538. } ]
  80539. } ],
  80540. "cpe_match" : [ ]
  80541. }, {
  80542. "operator" : "AND",
  80543. "children" : [ {
  80544. "operator" : "OR",
  80545. "children" : [ ],
  80546. "cpe_match" : [ {
  80547. "vulnerable" : true,
  80548. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
  80549. "cpe_name" : [ ]
  80550. } ]
  80551. }, {
  80552. "operator" : "OR",
  80553. "children" : [ ],
  80554. "cpe_match" : [ {
  80555. "vulnerable" : false,
  80556. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
  80557. "cpe_name" : [ ]
  80558. } ]
  80559. } ],
  80560. "cpe_match" : [ ]
  80561. }, {
  80562. "operator" : "AND",
  80563. "children" : [ {
  80564. "operator" : "OR",
  80565. "children" : [ ],
  80566. "cpe_match" : [ {
  80567. "vulnerable" : true,
  80568. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6150p_firmware:-:*:*:*:*:*:*:*",
  80569. "cpe_name" : [ ]
  80570. } ]
  80571. }, {
  80572. "operator" : "OR",
  80573. "children" : [ ],
  80574. "cpe_match" : [ {
  80575. "vulnerable" : false,
  80576. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6150p:-:*:*:*:*:*:*:*",
  80577. "cpe_name" : [ ]
  80578. } ]
  80579. } ],
  80580. "cpe_match" : [ ]
  80581. }, {
  80582. "operator" : "AND",
  80583. "children" : [ {
  80584. "operator" : "OR",
  80585. "children" : [ ],
  80586. "cpe_match" : [ {
  80587. "vulnerable" : true,
  80588. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
  80589. "cpe_name" : [ ]
  80590. } ]
  80591. }, {
  80592. "operator" : "OR",
  80593. "children" : [ ],
  80594. "cpe_match" : [ {
  80595. "vulnerable" : false,
  80596. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
  80597. "cpe_name" : [ ]
  80598. } ]
  80599. } ],
  80600. "cpe_match" : [ ]
  80601. }, {
  80602. "operator" : "AND",
  80603. "children" : [ {
  80604. "operator" : "OR",
  80605. "children" : [ ],
  80606. "cpe_match" : [ {
  80607. "vulnerable" : true,
  80608. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
  80609. "cpe_name" : [ ]
  80610. } ]
  80611. }, {
  80612. "operator" : "OR",
  80613. "children" : [ ],
  80614. "cpe_match" : [ {
  80615. "vulnerable" : false,
  80616. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
  80617. "cpe_name" : [ ]
  80618. } ]
  80619. } ],
  80620. "cpe_match" : [ ]
  80621. }, {
  80622. "operator" : "AND",
  80623. "children" : [ {
  80624. "operator" : "OR",
  80625. "children" : [ ],
  80626. "cpe_match" : [ {
  80627. "vulnerable" : true,
  80628. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:*",
  80629. "cpe_name" : [ ]
  80630. } ]
  80631. }, {
  80632. "operator" : "OR",
  80633. "children" : [ ],
  80634. "cpe_match" : [ {
  80635. "vulnerable" : false,
  80636. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*",
  80637. "cpe_name" : [ ]
  80638. } ]
  80639. } ],
  80640. "cpe_match" : [ ]
  80641. }, {
  80642. "operator" : "AND",
  80643. "children" : [ {
  80644. "operator" : "OR",
  80645. "children" : [ ],
  80646. "cpe_match" : [ {
  80647. "vulnerable" : true,
  80648. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
  80649. "cpe_name" : [ ]
  80650. } ]
  80651. }, {
  80652. "operator" : "OR",
  80653. "children" : [ ],
  80654. "cpe_match" : [ {
  80655. "vulnerable" : false,
  80656. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
  80657. "cpe_name" : [ ]
  80658. } ]
  80659. } ],
  80660. "cpe_match" : [ ]
  80661. }, {
  80662. "operator" : "AND",
  80663. "children" : [ {
  80664. "operator" : "OR",
  80665. "children" : [ ],
  80666. "cpe_match" : [ {
  80667. "vulnerable" : true,
  80668. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7150p_firmware:-:*:*:*:*:*:*:*",
  80669. "cpe_name" : [ ]
  80670. } ]
  80671. }, {
  80672. "operator" : "OR",
  80673. "children" : [ ],
  80674. "cpe_match" : [ {
  80675. "vulnerable" : false,
  80676. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7150p:-:*:*:*:*:*:*:*",
  80677. "cpe_name" : [ ]
  80678. } ]
  80679. } ],
  80680. "cpe_match" : [ ]
  80681. }, {
  80682. "operator" : "AND",
  80683. "children" : [ {
  80684. "operator" : "OR",
  80685. "children" : [ ],
  80686. "cpe_match" : [ {
  80687. "vulnerable" : true,
  80688. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
  80689. "cpe_name" : [ ]
  80690. } ]
  80691. }, {
  80692. "operator" : "OR",
  80693. "children" : [ ],
  80694. "cpe_match" : [ {
  80695. "vulnerable" : false,
  80696. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
  80697. "cpe_name" : [ ]
  80698. } ]
  80699. } ],
  80700. "cpe_match" : [ ]
  80701. }, {
  80702. "operator" : "AND",
  80703. "children" : [ {
  80704. "operator" : "OR",
  80705. "children" : [ ],
  80706. "cpe_match" : [ {
  80707. "vulnerable" : true,
  80708. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8150p_firmware:-:*:*:*:*:*:*:*",
  80709. "cpe_name" : [ ]
  80710. } ]
  80711. }, {
  80712. "operator" : "OR",
  80713. "children" : [ ],
  80714. "cpe_match" : [ {
  80715. "vulnerable" : false,
  80716. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8150p:-:*:*:*:*:*:*:*",
  80717. "cpe_name" : [ ]
  80718. } ]
  80719. } ],
  80720. "cpe_match" : [ ]
  80721. } ]
  80722. },
  80723. "impact" : {
  80724. "baseMetricV3" : {
  80725. "cvssV3" : {
  80726. "version" : "3.1",
  80727. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  80728. "attackVector" : "LOCAL",
  80729. "attackComplexity" : "LOW",
  80730. "privilegesRequired" : "LOW",
  80731. "userInteraction" : "NONE",
  80732. "scope" : "UNCHANGED",
  80733. "confidentialityImpact" : "HIGH",
  80734. "integrityImpact" : "HIGH",
  80735. "availabilityImpact" : "HIGH",
  80736. "baseScore" : 7.8,
  80737. "baseSeverity" : "HIGH"
  80738. },
  80739. "exploitabilityScore" : 1.8,
  80740. "impactScore" : 5.9
  80741. },
  80742. "baseMetricV2" : {
  80743. "cvssV2" : {
  80744. "version" : "2.0",
  80745. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  80746. "accessVector" : "LOCAL",
  80747. "accessComplexity" : "LOW",
  80748. "authentication" : "NONE",
  80749. "confidentialityImpact" : "COMPLETE",
  80750. "integrityImpact" : "COMPLETE",
  80751. "availabilityImpact" : "COMPLETE",
  80752. "baseScore" : 7.2
  80753. },
  80754. "severity" : "HIGH",
  80755. "exploitabilityScore" : 3.9,
  80756. "impactScore" : 10.0,
  80757. "acInsufInfo" : false,
  80758. "obtainAllPrivilege" : false,
  80759. "obtainUserPrivilege" : false,
  80760. "obtainOtherPrivilege" : false,
  80761. "userInteractionRequired" : false
  80762. }
  80763. },
  80764. "publishedDate" : "2020-11-12T10:15Z",
  80765. "lastModifiedDate" : "2021-05-10T13:15Z"
  80766. }, {
  80767. "cve" : {
  80768. "data_type" : "CVE",
  80769. "data_format" : "MITRE",
  80770. "data_version" : "4.0",
  80771. "CVE_data_meta" : {
  80772. "ID" : "CVE-2020-11201",
  80773. "ASSIGNER" : "product-security@qualcomm.com"
  80774. },
  80775. "problemtype" : {
  80776. "problemtype_data" : [ {
  80777. "description" : [ {
  80778. "lang" : "en",
  80779. "value" : "CWE-20"
  80780. } ]
  80781. } ]
  80782. },
  80783. "references" : {
  80784. "reference_data" : [ {
  80785. "url" : "https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin",
  80786. "name" : "https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin",
  80787. "refsource" : "CONFIRM",
  80788. "tags" : [ "Vendor Advisory" ]
  80789. }, {
  80790. "url" : "https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/",
  80791. "name" : "https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/",
  80792. "refsource" : "MISC",
  80793. "tags" : [ ]
  80794. }, {
  80795. "url" : "https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/",
  80796. "name" : "https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/",
  80797. "refsource" : "MISC",
  80798. "tags" : [ ]
  80799. } ]
  80800. },
  80801. "description" : {
  80802. "description_data" : [ {
  80803. "lang" : "en",
  80804. "value" : "Arbitrary access to DSP memory due to improper check in loaded library for data received from CPU side' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA845, SDM640, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P"
  80805. } ]
  80806. }
  80807. },
  80808. "configurations" : {
  80809. "CVE_data_version" : "4.0",
  80810. "nodes" : [ {
  80811. "operator" : "AND",
  80812. "children" : [ {
  80813. "operator" : "OR",
  80814. "children" : [ ],
  80815. "cpe_match" : [ {
  80816. "vulnerable" : true,
  80817. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
  80818. "cpe_name" : [ ]
  80819. } ]
  80820. }, {
  80821. "operator" : "OR",
  80822. "children" : [ ],
  80823. "cpe_match" : [ {
  80824. "vulnerable" : false,
  80825. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
  80826. "cpe_name" : [ ]
  80827. } ]
  80828. } ],
  80829. "cpe_match" : [ ]
  80830. }, {
  80831. "operator" : "AND",
  80832. "children" : [ {
  80833. "operator" : "OR",
  80834. "children" : [ ],
  80835. "cpe_match" : [ {
  80836. "vulnerable" : true,
  80837. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
  80838. "cpe_name" : [ ]
  80839. } ]
  80840. }, {
  80841. "operator" : "OR",
  80842. "children" : [ ],
  80843. "cpe_match" : [ {
  80844. "vulnerable" : false,
  80845. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
  80846. "cpe_name" : [ ]
  80847. } ]
  80848. } ],
  80849. "cpe_match" : [ ]
  80850. }, {
  80851. "operator" : "AND",
  80852. "children" : [ {
  80853. "operator" : "OR",
  80854. "children" : [ ],
  80855. "cpe_match" : [ {
  80856. "vulnerable" : true,
  80857. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*",
  80858. "cpe_name" : [ ]
  80859. } ]
  80860. }, {
  80861. "operator" : "OR",
  80862. "children" : [ ],
  80863. "cpe_match" : [ {
  80864. "vulnerable" : false,
  80865. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
  80866. "cpe_name" : [ ]
  80867. } ]
  80868. } ],
  80869. "cpe_match" : [ ]
  80870. }, {
  80871. "operator" : "AND",
  80872. "children" : [ {
  80873. "operator" : "OR",
  80874. "children" : [ ],
  80875. "cpe_match" : [ {
  80876. "vulnerable" : true,
  80877. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
  80878. "cpe_name" : [ ]
  80879. } ]
  80880. }, {
  80881. "operator" : "OR",
  80882. "children" : [ ],
  80883. "cpe_match" : [ {
  80884. "vulnerable" : false,
  80885. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
  80886. "cpe_name" : [ ]
  80887. } ]
  80888. } ],
  80889. "cpe_match" : [ ]
  80890. }, {
  80891. "operator" : "AND",
  80892. "children" : [ {
  80893. "operator" : "OR",
  80894. "children" : [ ],
  80895. "cpe_match" : [ {
  80896. "vulnerable" : true,
  80897. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
  80898. "cpe_name" : [ ]
  80899. } ]
  80900. }, {
  80901. "operator" : "OR",
  80902. "children" : [ ],
  80903. "cpe_match" : [ {
  80904. "vulnerable" : false,
  80905. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
  80906. "cpe_name" : [ ]
  80907. } ]
  80908. } ],
  80909. "cpe_match" : [ ]
  80910. }, {
  80911. "operator" : "AND",
  80912. "children" : [ {
  80913. "operator" : "OR",
  80914. "children" : [ ],
  80915. "cpe_match" : [ {
  80916. "vulnerable" : true,
  80917. "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
  80918. "cpe_name" : [ ]
  80919. } ]
  80920. }, {
  80921. "operator" : "OR",
  80922. "children" : [ ],
  80923. "cpe_match" : [ {
  80924. "vulnerable" : false,
  80925. "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
  80926. "cpe_name" : [ ]
  80927. } ]
  80928. } ],
  80929. "cpe_match" : [ ]
  80930. }, {
  80931. "operator" : "AND",
  80932. "children" : [ {
  80933. "operator" : "OR",
  80934. "children" : [ ],
  80935. "cpe_match" : [ {
  80936. "vulnerable" : true,
  80937. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
  80938. "cpe_name" : [ ]
  80939. } ]
  80940. }, {
  80941. "operator" : "OR",
  80942. "children" : [ ],
  80943. "cpe_match" : [ {
  80944. "vulnerable" : false,
  80945. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
  80946. "cpe_name" : [ ]
  80947. } ]
  80948. } ],
  80949. "cpe_match" : [ ]
  80950. }, {
  80951. "operator" : "AND",
  80952. "children" : [ {
  80953. "operator" : "OR",
  80954. "children" : [ ],
  80955. "cpe_match" : [ {
  80956. "vulnerable" : true,
  80957. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
  80958. "cpe_name" : [ ]
  80959. } ]
  80960. }, {
  80961. "operator" : "OR",
  80962. "children" : [ ],
  80963. "cpe_match" : [ {
  80964. "vulnerable" : false,
  80965. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
  80966. "cpe_name" : [ ]
  80967. } ]
  80968. } ],
  80969. "cpe_match" : [ ]
  80970. }, {
  80971. "operator" : "AND",
  80972. "children" : [ {
  80973. "operator" : "OR",
  80974. "children" : [ ],
  80975. "cpe_match" : [ {
  80976. "vulnerable" : true,
  80977. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
  80978. "cpe_name" : [ ]
  80979. } ]
  80980. }, {
  80981. "operator" : "OR",
  80982. "children" : [ ],
  80983. "cpe_match" : [ {
  80984. "vulnerable" : false,
  80985. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
  80986. "cpe_name" : [ ]
  80987. } ]
  80988. } ],
  80989. "cpe_match" : [ ]
  80990. }, {
  80991. "operator" : "AND",
  80992. "children" : [ {
  80993. "operator" : "OR",
  80994. "children" : [ ],
  80995. "cpe_match" : [ {
  80996. "vulnerable" : true,
  80997. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
  80998. "cpe_name" : [ ]
  80999. } ]
  81000. }, {
  81001. "operator" : "OR",
  81002. "children" : [ ],
  81003. "cpe_match" : [ {
  81004. "vulnerable" : false,
  81005. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
  81006. "cpe_name" : [ ]
  81007. } ]
  81008. } ],
  81009. "cpe_match" : [ ]
  81010. }, {
  81011. "operator" : "AND",
  81012. "children" : [ {
  81013. "operator" : "OR",
  81014. "children" : [ ],
  81015. "cpe_match" : [ {
  81016. "vulnerable" : true,
  81017. "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
  81018. "cpe_name" : [ ]
  81019. } ]
  81020. }, {
  81021. "operator" : "OR",
  81022. "children" : [ ],
  81023. "cpe_match" : [ {
  81024. "vulnerable" : false,
  81025. "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
  81026. "cpe_name" : [ ]
  81027. } ]
  81028. } ],
  81029. "cpe_match" : [ ]
  81030. }, {
  81031. "operator" : "AND",
  81032. "children" : [ {
  81033. "operator" : "OR",
  81034. "children" : [ ],
  81035. "cpe_match" : [ {
  81036. "vulnerable" : true,
  81037. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda640_firmware:-:*:*:*:*:*:*:*",
  81038. "cpe_name" : [ ]
  81039. } ]
  81040. }, {
  81041. "operator" : "OR",
  81042. "children" : [ ],
  81043. "cpe_match" : [ {
  81044. "vulnerable" : false,
  81045. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda640:-:*:*:*:*:*:*:*",
  81046. "cpe_name" : [ ]
  81047. } ]
  81048. } ],
  81049. "cpe_match" : [ ]
  81050. }, {
  81051. "operator" : "AND",
  81052. "children" : [ {
  81053. "operator" : "OR",
  81054. "children" : [ ],
  81055. "cpe_match" : [ {
  81056. "vulnerable" : true,
  81057. "cpe23Uri" : "cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
  81058. "cpe_name" : [ ]
  81059. } ]
  81060. }, {
  81061. "operator" : "OR",
  81062. "children" : [ ],
  81063. "cpe_match" : [ {
  81064. "vulnerable" : false,
  81065. "cpe23Uri" : "cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
  81066. "cpe_name" : [ ]
  81067. } ]
  81068. } ],
  81069. "cpe_match" : [ ]
  81070. }, {
  81071. "operator" : "AND",
  81072. "children" : [ {
  81073. "operator" : "OR",
  81074. "children" : [ ],
  81075. "cpe_match" : [ {
  81076. "vulnerable" : true,
  81077. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm640_firmware:-:*:*:*:*:*:*:*",
  81078. "cpe_name" : [ ]
  81079. } ]
  81080. }, {
  81081. "operator" : "OR",
  81082. "children" : [ ],
  81083. "cpe_match" : [ {
  81084. "vulnerable" : false,
  81085. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm640:-:*:*:*:*:*:*:*",
  81086. "cpe_name" : [ ]
  81087. } ]
  81088. } ],
  81089. "cpe_match" : [ ]
  81090. }, {
  81091. "operator" : "AND",
  81092. "children" : [ {
  81093. "operator" : "OR",
  81094. "children" : [ ],
  81095. "cpe_match" : [ {
  81096. "vulnerable" : true,
  81097. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:*",
  81098. "cpe_name" : [ ]
  81099. } ]
  81100. }, {
  81101. "operator" : "OR",
  81102. "children" : [ ],
  81103. "cpe_match" : [ {
  81104. "vulnerable" : false,
  81105. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*",
  81106. "cpe_name" : [ ]
  81107. } ]
  81108. } ],
  81109. "cpe_match" : [ ]
  81110. }, {
  81111. "operator" : "AND",
  81112. "children" : [ {
  81113. "operator" : "OR",
  81114. "children" : [ ],
  81115. "cpe_match" : [ {
  81116. "vulnerable" : true,
  81117. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
  81118. "cpe_name" : [ ]
  81119. } ]
  81120. }, {
  81121. "operator" : "OR",
  81122. "children" : [ ],
  81123. "cpe_match" : [ {
  81124. "vulnerable" : false,
  81125. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
  81126. "cpe_name" : [ ]
  81127. } ]
  81128. } ],
  81129. "cpe_match" : [ ]
  81130. }, {
  81131. "operator" : "AND",
  81132. "children" : [ {
  81133. "operator" : "OR",
  81134. "children" : [ ],
  81135. "cpe_match" : [ {
  81136. "vulnerable" : true,
  81137. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
  81138. "cpe_name" : [ ]
  81139. } ]
  81140. }, {
  81141. "operator" : "OR",
  81142. "children" : [ ],
  81143. "cpe_match" : [ {
  81144. "vulnerable" : false,
  81145. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
  81146. "cpe_name" : [ ]
  81147. } ]
  81148. } ],
  81149. "cpe_match" : [ ]
  81150. }, {
  81151. "operator" : "AND",
  81152. "children" : [ {
  81153. "operator" : "OR",
  81154. "children" : [ ],
  81155. "cpe_match" : [ {
  81156. "vulnerable" : true,
  81157. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
  81158. "cpe_name" : [ ]
  81159. } ]
  81160. }, {
  81161. "operator" : "OR",
  81162. "children" : [ ],
  81163. "cpe_match" : [ {
  81164. "vulnerable" : false,
  81165. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
  81166. "cpe_name" : [ ]
  81167. } ]
  81168. } ],
  81169. "cpe_match" : [ ]
  81170. }, {
  81171. "operator" : "AND",
  81172. "children" : [ {
  81173. "operator" : "OR",
  81174. "children" : [ ],
  81175. "cpe_match" : [ {
  81176. "vulnerable" : true,
  81177. "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
  81178. "cpe_name" : [ ]
  81179. } ]
  81180. }, {
  81181. "operator" : "OR",
  81182. "children" : [ ],
  81183. "cpe_match" : [ {
  81184. "vulnerable" : false,
  81185. "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
  81186. "cpe_name" : [ ]
  81187. } ]
  81188. } ],
  81189. "cpe_match" : [ ]
  81190. }, {
  81191. "operator" : "AND",
  81192. "children" : [ {
  81193. "operator" : "OR",
  81194. "children" : [ ],
  81195. "cpe_match" : [ {
  81196. "vulnerable" : true,
  81197. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:*",
  81198. "cpe_name" : [ ]
  81199. } ]
  81200. }, {
  81201. "operator" : "OR",
  81202. "children" : [ ],
  81203. "cpe_match" : [ {
  81204. "vulnerable" : false,
  81205. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6125:-:*:*:*:*:*:*:*",
  81206. "cpe_name" : [ ]
  81207. } ]
  81208. } ],
  81209. "cpe_match" : [ ]
  81210. }, {
  81211. "operator" : "AND",
  81212. "children" : [ {
  81213. "operator" : "OR",
  81214. "children" : [ ],
  81215. "cpe_match" : [ {
  81216. "vulnerable" : true,
  81217. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
  81218. "cpe_name" : [ ]
  81219. } ]
  81220. }, {
  81221. "operator" : "OR",
  81222. "children" : [ ],
  81223. "cpe_match" : [ {
  81224. "vulnerable" : false,
  81225. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
  81226. "cpe_name" : [ ]
  81227. } ]
  81228. } ],
  81229. "cpe_match" : [ ]
  81230. }, {
  81231. "operator" : "AND",
  81232. "children" : [ {
  81233. "operator" : "OR",
  81234. "children" : [ ],
  81235. "cpe_match" : [ {
  81236. "vulnerable" : true,
  81237. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
  81238. "cpe_name" : [ ]
  81239. } ]
  81240. }, {
  81241. "operator" : "OR",
  81242. "children" : [ ],
  81243. "cpe_match" : [ {
  81244. "vulnerable" : false,
  81245. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
  81246. "cpe_name" : [ ]
  81247. } ]
  81248. } ],
  81249. "cpe_match" : [ ]
  81250. }, {
  81251. "operator" : "AND",
  81252. "children" : [ {
  81253. "operator" : "OR",
  81254. "children" : [ ],
  81255. "cpe_match" : [ {
  81256. "vulnerable" : true,
  81257. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
  81258. "cpe_name" : [ ]
  81259. } ]
  81260. }, {
  81261. "operator" : "OR",
  81262. "children" : [ ],
  81263. "cpe_match" : [ {
  81264. "vulnerable" : false,
  81265. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
  81266. "cpe_name" : [ ]
  81267. } ]
  81268. } ],
  81269. "cpe_match" : [ ]
  81270. }, {
  81271. "operator" : "AND",
  81272. "children" : [ {
  81273. "operator" : "OR",
  81274. "children" : [ ],
  81275. "cpe_match" : [ {
  81276. "vulnerable" : true,
  81277. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:*",
  81278. "cpe_name" : [ ]
  81279. } ]
  81280. }, {
  81281. "operator" : "OR",
  81282. "children" : [ ],
  81283. "cpe_match" : [ {
  81284. "vulnerable" : false,
  81285. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*",
  81286. "cpe_name" : [ ]
  81287. } ]
  81288. } ],
  81289. "cpe_match" : [ ]
  81290. }, {
  81291. "operator" : "AND",
  81292. "children" : [ {
  81293. "operator" : "OR",
  81294. "children" : [ ],
  81295. "cpe_match" : [ {
  81296. "vulnerable" : true,
  81297. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
  81298. "cpe_name" : [ ]
  81299. } ]
  81300. }, {
  81301. "operator" : "OR",
  81302. "children" : [ ],
  81303. "cpe_match" : [ {
  81304. "vulnerable" : false,
  81305. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
  81306. "cpe_name" : [ ]
  81307. } ]
  81308. } ],
  81309. "cpe_match" : [ ]
  81310. }, {
  81311. "operator" : "AND",
  81312. "children" : [ {
  81313. "operator" : "OR",
  81314. "children" : [ ],
  81315. "cpe_match" : [ {
  81316. "vulnerable" : true,
  81317. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7150p_firmware:-:*:*:*:*:*:*:*",
  81318. "cpe_name" : [ ]
  81319. } ]
  81320. }, {
  81321. "operator" : "OR",
  81322. "children" : [ ],
  81323. "cpe_match" : [ {
  81324. "vulnerable" : false,
  81325. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7150p:-:*:*:*:*:*:*:*",
  81326. "cpe_name" : [ ]
  81327. } ]
  81328. } ],
  81329. "cpe_match" : [ ]
  81330. }, {
  81331. "operator" : "AND",
  81332. "children" : [ {
  81333. "operator" : "OR",
  81334. "children" : [ ],
  81335. "cpe_match" : [ {
  81336. "vulnerable" : true,
  81337. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
  81338. "cpe_name" : [ ]
  81339. } ]
  81340. }, {
  81341. "operator" : "OR",
  81342. "children" : [ ],
  81343. "cpe_match" : [ {
  81344. "vulnerable" : false,
  81345. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
  81346. "cpe_name" : [ ]
  81347. } ]
  81348. } ],
  81349. "cpe_match" : [ ]
  81350. }, {
  81351. "operator" : "AND",
  81352. "children" : [ {
  81353. "operator" : "OR",
  81354. "children" : [ ],
  81355. "cpe_match" : [ {
  81356. "vulnerable" : true,
  81357. "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8150p_firmware:-:*:*:*:*:*:*:*",
  81358. "cpe_name" : [ ]
  81359. } ]
  81360. }, {
  81361. "operator" : "OR",
  81362. "children" : [ ],
  81363. "cpe_match" : [ {
  81364. "vulnerable" : false,
  81365. "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8150p:-:*:*:*:*:*:*:*",
  81366. "cpe_name" : [ ]
  81367. } ]
  81368. } ],
  81369. "cpe_match" : [ ]
  81370. } ]
  81371. },
  81372. "impact" : {
  81373. "baseMetricV3" : {
  81374. "cvssV3" : {
  81375. "version" : "3.1",
  81376. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  81377. "attackVector" : "LOCAL",
  81378. "attackComplexity" : "LOW",
  81379. "privilegesRequired" : "LOW",
  81380. "userInteraction" : "NONE",
  81381. "scope" : "UNCHANGED",
  81382. "confidentialityImpact" : "HIGH",
  81383. "integrityImpact" : "HIGH",
  81384. "availabilityImpact" : "HIGH",
  81385. "baseScore" : 7.8,
  81386. "baseSeverity" : "HIGH"
  81387. },
  81388. "exploitabilityScore" : 1.8,
  81389. "impactScore" : 5.9
  81390. },
  81391. "baseMetricV2" : {
  81392. "cvssV2" : {
  81393. "version" : "2.0",
  81394. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  81395. "accessVector" : "LOCAL",
  81396. "accessComplexity" : "LOW",
  81397. "authentication" : "NONE",
  81398. "confidentialityImpact" : "COMPLETE",
  81399. "integrityImpact" : "COMPLETE",
  81400. "availabilityImpact" : "COMPLETE",
  81401. "baseScore" : 7.2
  81402. },
  81403. "severity" : "HIGH",
  81404. "exploitabilityScore" : 3.9,
  81405. "impactScore" : 10.0,
  81406. "acInsufInfo" : false,
  81407. "obtainAllPrivilege" : false,
  81408. "obtainUserPrivilege" : false,
  81409. "obtainOtherPrivilege" : false,
  81410. "userInteractionRequired" : false
  81411. }
  81412. },
  81413. "publishedDate" : "2020-11-12T10:15Z",
  81414. "lastModifiedDate" : "2021-05-10T13:15Z"
  81415. }, {
  81416. "cve" : {
  81417. "data_type" : "CVE",
  81418. "data_format" : "MITRE",
  81419. "data_version" : "4.0",
  81420. "CVE_data_meta" : {
  81421. "ID" : "CVE-2020-0454",
  81422. "ASSIGNER" : "security@android.com"
  81423. },
  81424. "problemtype" : {
  81425. "problemtype_data" : [ {
  81426. "description" : [ {
  81427. "lang" : "en",
  81428. "value" : "CWE-732"
  81429. } ]
  81430. } ]
  81431. },
  81432. "references" : {
  81433. "reference_data" : [ {
  81434. "url" : "https://source.android.com/security/bulletin/2020-11-01",
  81435. "name" : "https://source.android.com/security/bulletin/2020-11-01",
  81436. "refsource" : "MISC",
  81437. "tags" : [ "Vendor Advisory" ]
  81438. }, {
  81439. "url" : "https://www.usenix.org/conference/usenixsecurity19/presentation/reardon",
  81440. "name" : "https://www.usenix.org/conference/usenixsecurity19/presentation/reardon",
  81441. "refsource" : "MISC",
  81442. "tags" : [ ]
  81443. }, {
  81444. "url" : "https://www.usenix.org/system/files/sec19-reardon.pdf",
  81445. "name" : "https://www.usenix.org/system/files/sec19-reardon.pdf",
  81446. "refsource" : "MISC",
  81447. "tags" : [ ]
  81448. } ]
  81449. },
  81450. "description" : {
  81451. "description_data" : [ {
  81452. "lang" : "en",
  81453. "value" : "In callCallbackForRequest of ConnectivityService.java, there is a possible permission bypass due to a missing permission check. This could lead to local information disclosure of the current SSID with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9Android ID: A-161370134"
  81454. } ]
  81455. }
  81456. },
  81457. "configurations" : {
  81458. "CVE_data_version" : "4.0",
  81459. "nodes" : [ {
  81460. "operator" : "OR",
  81461. "children" : [ ],
  81462. "cpe_match" : [ {
  81463. "vulnerable" : true,
  81464. "cpe23Uri" : "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
  81465. "cpe_name" : [ ]
  81466. } ]
  81467. } ]
  81468. },
  81469. "impact" : {
  81470. "baseMetricV3" : {
  81471. "cvssV3" : {
  81472. "version" : "3.1",
  81473. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  81474. "attackVector" : "LOCAL",
  81475. "attackComplexity" : "LOW",
  81476. "privilegesRequired" : "LOW",
  81477. "userInteraction" : "NONE",
  81478. "scope" : "UNCHANGED",
  81479. "confidentialityImpact" : "HIGH",
  81480. "integrityImpact" : "NONE",
  81481. "availabilityImpact" : "NONE",
  81482. "baseScore" : 5.5,
  81483. "baseSeverity" : "MEDIUM"
  81484. },
  81485. "exploitabilityScore" : 1.8,
  81486. "impactScore" : 3.6
  81487. },
  81488. "baseMetricV2" : {
  81489. "cvssV2" : {
  81490. "version" : "2.0",
  81491. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  81492. "accessVector" : "LOCAL",
  81493. "accessComplexity" : "LOW",
  81494. "authentication" : "NONE",
  81495. "confidentialityImpact" : "PARTIAL",
  81496. "integrityImpact" : "NONE",
  81497. "availabilityImpact" : "NONE",
  81498. "baseScore" : 2.1
  81499. },
  81500. "severity" : "LOW",
  81501. "exploitabilityScore" : 3.9,
  81502. "impactScore" : 2.9,
  81503. "acInsufInfo" : false,
  81504. "obtainAllPrivilege" : false,
  81505. "obtainUserPrivilege" : false,
  81506. "obtainOtherPrivilege" : false,
  81507. "userInteractionRequired" : false
  81508. }
  81509. },
  81510. "publishedDate" : "2020-11-10T13:15Z",
  81511. "lastModifiedDate" : "2021-05-05T12:15Z"
  81512. }, {
  81513. "cve" : {
  81514. "data_type" : "CVE",
  81515. "data_format" : "MITRE",
  81516. "data_version" : "4.0",
  81517. "CVE_data_meta" : {
  81518. "ID" : "CVE-2020-17510",
  81519. "ASSIGNER" : "security@apache.org"
  81520. },
  81521. "problemtype" : {
  81522. "problemtype_data" : [ {
  81523. "description" : [ {
  81524. "lang" : "en",
  81525. "value" : "CWE-306"
  81526. } ]
  81527. } ]
  81528. },
  81529. "references" : {
  81530. "reference_data" : [ {
  81531. "url" : "https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E",
  81532. "name" : "https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E",
  81533. "refsource" : "MISC",
  81534. "tags" : [ "Mailing List", "Vendor Advisory" ]
  81535. }, {
  81536. "url" : "https://lists.apache.org/thread.html/r95bdf3703858b5f958b5e190d747421771b430d97095880db91980d6@%3Cannounce.apache.org%3E",
  81537. "name" : "[announce] 20201105 [CVE-2020-17510] Apache Shiro 1.7.0 released",
  81538. "refsource" : "MLIST",
  81539. "tags" : [ "Mailing List", "Vendor Advisory" ]
  81540. }, {
  81541. "url" : "https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E",
  81542. "name" : "[shiro-dev] 20201221 Re: Request for assistance to backport CVE-2020-13933 fix",
  81543. "refsource" : "MLIST",
  81544. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  81545. }, {
  81546. "url" : "https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E",
  81547. "name" : "[shiro-dev] 20201222 Re: Request for assistance to backport CVE-2020-13933 fix",
  81548. "refsource" : "MLIST",
  81549. "tags" : [ "Mailing List", "Vendor Advisory" ]
  81550. }, {
  81551. "url" : "https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E",
  81552. "name" : "[shiro-dev] 20210130 Re: Request for assistance to backport CVE-2020-13933 fix",
  81553. "refsource" : "MLIST",
  81554. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  81555. }, {
  81556. "url" : "https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E",
  81557. "name" : "[shiro-dev] 20210316 Re: Request for assistance to backport CVE-2020-13933 fix",
  81558. "refsource" : "MLIST",
  81559. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  81560. }, {
  81561. "url" : "https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E",
  81562. "name" : "[shiro-dev] 20210331 Re: Request for assistance to backport CVE-2020-13933 fix",
  81563. "refsource" : "MLIST",
  81564. "tags" : [ "Mailing List", "Vendor Advisory" ]
  81565. }, {
  81566. "url" : "https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E",
  81567. "name" : "[shiro-dev] 20210407 Re: Request for assistance to backport CVE-2020-13933 fix",
  81568. "refsource" : "MLIST",
  81569. "tags" : [ "Mailing List", "Vendor Advisory" ]
  81570. }, {
  81571. "url" : "https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E",
  81572. "name" : "[shiro-dev] 20210504 Re: Request for assistance to backport CVE-2020-13933 fix",
  81573. "refsource" : "MLIST",
  81574. "tags" : [ ]
  81575. } ]
  81576. },
  81577. "description" : {
  81578. "description_data" : [ {
  81579. "lang" : "en",
  81580. "value" : "Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass."
  81581. } ]
  81582. }
  81583. },
  81584. "configurations" : {
  81585. "CVE_data_version" : "4.0",
  81586. "nodes" : [ {
  81587. "operator" : "OR",
  81588. "children" : [ ],
  81589. "cpe_match" : [ {
  81590. "vulnerable" : true,
  81591. "cpe23Uri" : "cpe:2.3:a:apache:shiro:*:*:*:*:*:*:*:*",
  81592. "versionEndExcluding" : "1.7.0",
  81593. "cpe_name" : [ ]
  81594. } ]
  81595. } ]
  81596. },
  81597. "impact" : {
  81598. "baseMetricV3" : {
  81599. "cvssV3" : {
  81600. "version" : "3.1",
  81601. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  81602. "attackVector" : "NETWORK",
  81603. "attackComplexity" : "LOW",
  81604. "privilegesRequired" : "NONE",
  81605. "userInteraction" : "NONE",
  81606. "scope" : "UNCHANGED",
  81607. "confidentialityImpact" : "HIGH",
  81608. "integrityImpact" : "HIGH",
  81609. "availabilityImpact" : "HIGH",
  81610. "baseScore" : 9.8,
  81611. "baseSeverity" : "CRITICAL"
  81612. },
  81613. "exploitabilityScore" : 3.9,
  81614. "impactScore" : 5.9
  81615. },
  81616. "baseMetricV2" : {
  81617. "cvssV2" : {
  81618. "version" : "2.0",
  81619. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  81620. "accessVector" : "NETWORK",
  81621. "accessComplexity" : "LOW",
  81622. "authentication" : "NONE",
  81623. "confidentialityImpact" : "PARTIAL",
  81624. "integrityImpact" : "PARTIAL",
  81625. "availabilityImpact" : "PARTIAL",
  81626. "baseScore" : 7.5
  81627. },
  81628. "severity" : "HIGH",
  81629. "exploitabilityScore" : 10.0,
  81630. "impactScore" : 6.4,
  81631. "acInsufInfo" : false,
  81632. "obtainAllPrivilege" : false,
  81633. "obtainUserPrivilege" : false,
  81634. "obtainOtherPrivilege" : false,
  81635. "userInteractionRequired" : false
  81636. }
  81637. },
  81638. "publishedDate" : "2020-11-05T21:15Z",
  81639. "lastModifiedDate" : "2021-05-05T03:15Z"
  81640. }, {
  81641. "cve" : {
  81642. "data_type" : "CVE",
  81643. "data_format" : "MITRE",
  81644. "data_version" : "4.0",
  81645. "CVE_data_meta" : {
  81646. "ID" : "CVE-2020-8037",
  81647. "ASSIGNER" : "security@tcpdump.org"
  81648. },
  81649. "problemtype" : {
  81650. "problemtype_data" : [ {
  81651. "description" : [ {
  81652. "lang" : "en",
  81653. "value" : "CWE-770"
  81654. } ]
  81655. } ]
  81656. },
  81657. "references" : {
  81658. "reference_data" : [ {
  81659. "url" : "https://github.com/the-tcpdump-group/tcpdump/commit/32027e199368dad9508965aae8cd8de5b6ab5231",
  81660. "name" : "https://github.com/the-tcpdump-group/tcpdump/commit/32027e199368dad9508965aae8cd8de5b6ab5231",
  81661. "refsource" : "MISC",
  81662. "tags" : [ "Patch", "Third Party Advisory" ]
  81663. }, {
  81664. "url" : "https://lists.debian.org/debian-lts-announce/2020/11/msg00018.html",
  81665. "name" : "[debian-lts-announce] 20201110 [SECURITY] [DLA 2444-1] tcpdump security update",
  81666. "refsource" : "MLIST",
  81667. "tags" : [ "Mailing List", "Third Party Advisory" ]
  81668. }, {
  81669. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LWDBONZVLC6BAOR2KM376DJCM4H3FERV/",
  81670. "name" : "FEDORA-2020-fae2e1f2bc",
  81671. "refsource" : "FEDORA",
  81672. "tags" : [ "Mailing List", "Third Party Advisory" ]
  81673. }, {
  81674. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2MX34MJIUJQGL6CMEPLTKFOOOC3CJ4Z/",
  81675. "name" : "FEDORA-2020-c5e78886d6",
  81676. "refsource" : "FEDORA",
  81677. "tags" : [ "Mailing List", "Third Party Advisory" ]
  81678. }, {
  81679. "url" : "https://support.apple.com/kb/HT212327",
  81680. "name" : "https://support.apple.com/kb/HT212327",
  81681. "refsource" : "CONFIRM",
  81682. "tags" : [ "Third Party Advisory" ]
  81683. }, {
  81684. "url" : "https://support.apple.com/kb/HT212326",
  81685. "name" : "https://support.apple.com/kb/HT212326",
  81686. "refsource" : "CONFIRM",
  81687. "tags" : [ "Third Party Advisory" ]
  81688. }, {
  81689. "url" : "https://support.apple.com/kb/HT212325",
  81690. "name" : "https://support.apple.com/kb/HT212325",
  81691. "refsource" : "CONFIRM",
  81692. "tags" : [ "Third Party Advisory" ]
  81693. }, {
  81694. "url" : "http://seclists.org/fulldisclosure/2021/Apr/51",
  81695. "name" : "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
  81696. "refsource" : "FULLDISC",
  81697. "tags" : [ "Mailing List", "Third Party Advisory" ]
  81698. } ]
  81699. },
  81700. "description" : {
  81701. "description_data" : [ {
  81702. "lang" : "en",
  81703. "value" : "The ppp decapsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory."
  81704. } ]
  81705. }
  81706. },
  81707. "configurations" : {
  81708. "CVE_data_version" : "4.0",
  81709. "nodes" : [ {
  81710. "operator" : "OR",
  81711. "children" : [ ],
  81712. "cpe_match" : [ {
  81713. "vulnerable" : true,
  81714. "cpe23Uri" : "cpe:2.3:a:tcpdump:tcpdump:4.9.3:*:*:*:*:*:*:*",
  81715. "cpe_name" : [ ]
  81716. } ]
  81717. }, {
  81718. "operator" : "OR",
  81719. "children" : [ ],
  81720. "cpe_match" : [ {
  81721. "vulnerable" : true,
  81722. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  81723. "cpe_name" : [ ]
  81724. } ]
  81725. }, {
  81726. "operator" : "OR",
  81727. "children" : [ ],
  81728. "cpe_match" : [ {
  81729. "vulnerable" : true,
  81730. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  81731. "cpe_name" : [ ]
  81732. }, {
  81733. "vulnerable" : true,
  81734. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  81735. "cpe_name" : [ ]
  81736. } ]
  81737. }, {
  81738. "operator" : "OR",
  81739. "children" : [ ],
  81740. "cpe_match" : [ {
  81741. "vulnerable" : true,
  81742. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  81743. "versionEndExcluding" : "10.14.6",
  81744. "cpe_name" : [ ]
  81745. }, {
  81746. "vulnerable" : true,
  81747. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
  81748. "cpe_name" : [ ]
  81749. }, {
  81750. "vulnerable" : true,
  81751. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
  81752. "cpe_name" : [ ]
  81753. }, {
  81754. "vulnerable" : true,
  81755. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
  81756. "cpe_name" : [ ]
  81757. }, {
  81758. "vulnerable" : true,
  81759. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
  81760. "cpe_name" : [ ]
  81761. }, {
  81762. "vulnerable" : true,
  81763. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
  81764. "cpe_name" : [ ]
  81765. }, {
  81766. "vulnerable" : true,
  81767. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
  81768. "cpe_name" : [ ]
  81769. }, {
  81770. "vulnerable" : true,
  81771. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
  81772. "cpe_name" : [ ]
  81773. }, {
  81774. "vulnerable" : true,
  81775. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
  81776. "cpe_name" : [ ]
  81777. }, {
  81778. "vulnerable" : true,
  81779. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
  81780. "cpe_name" : [ ]
  81781. }, {
  81782. "vulnerable" : true,
  81783. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
  81784. "cpe_name" : [ ]
  81785. }, {
  81786. "vulnerable" : true,
  81787. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
  81788. "cpe_name" : [ ]
  81789. }, {
  81790. "vulnerable" : true,
  81791. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  81792. "versionStartIncluding" : "10.15",
  81793. "versionEndExcluding" : "10.15.7",
  81794. "cpe_name" : [ ]
  81795. }, {
  81796. "vulnerable" : true,
  81797. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
  81798. "cpe_name" : [ ]
  81799. }, {
  81800. "vulnerable" : true,
  81801. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
  81802. "cpe_name" : [ ]
  81803. }, {
  81804. "vulnerable" : true,
  81805. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
  81806. "cpe_name" : [ ]
  81807. }, {
  81808. "vulnerable" : true,
  81809. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
  81810. "cpe_name" : [ ]
  81811. }, {
  81812. "vulnerable" : true,
  81813. "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
  81814. "versionStartIncluding" : "11.0",
  81815. "versionEndExcluding" : "11.3",
  81816. "cpe_name" : [ ]
  81817. } ]
  81818. } ]
  81819. },
  81820. "impact" : {
  81821. "baseMetricV3" : {
  81822. "cvssV3" : {
  81823. "version" : "3.1",
  81824. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  81825. "attackVector" : "NETWORK",
  81826. "attackComplexity" : "LOW",
  81827. "privilegesRequired" : "NONE",
  81828. "userInteraction" : "NONE",
  81829. "scope" : "UNCHANGED",
  81830. "confidentialityImpact" : "NONE",
  81831. "integrityImpact" : "NONE",
  81832. "availabilityImpact" : "HIGH",
  81833. "baseScore" : 7.5,
  81834. "baseSeverity" : "HIGH"
  81835. },
  81836. "exploitabilityScore" : 3.9,
  81837. "impactScore" : 3.6
  81838. },
  81839. "baseMetricV2" : {
  81840. "cvssV2" : {
  81841. "version" : "2.0",
  81842. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  81843. "accessVector" : "NETWORK",
  81844. "accessComplexity" : "LOW",
  81845. "authentication" : "NONE",
  81846. "confidentialityImpact" : "NONE",
  81847. "integrityImpact" : "NONE",
  81848. "availabilityImpact" : "PARTIAL",
  81849. "baseScore" : 5.0
  81850. },
  81851. "severity" : "MEDIUM",
  81852. "exploitabilityScore" : 10.0,
  81853. "impactScore" : 2.9,
  81854. "acInsufInfo" : false,
  81855. "obtainAllPrivilege" : false,
  81856. "obtainUserPrivilege" : false,
  81857. "obtainOtherPrivilege" : false,
  81858. "userInteractionRequired" : false
  81859. }
  81860. },
  81861. "publishedDate" : "2020-11-04T18:15Z",
  81862. "lastModifiedDate" : "2021-05-05T13:12Z"
  81863. }, {
  81864. "cve" : {
  81865. "data_type" : "CVE",
  81866. "data_format" : "MITRE",
  81867. "data_version" : "4.0",
  81868. "CVE_data_meta" : {
  81869. "ID" : "CVE-2020-10746",
  81870. "ASSIGNER" : "secalert@redhat.com"
  81871. },
  81872. "problemtype" : {
  81873. "problemtype_data" : [ {
  81874. "description" : [ {
  81875. "lang" : "en",
  81876. "value" : "CWE-862"
  81877. } ]
  81878. } ]
  81879. },
  81880. "references" : {
  81881. "reference_data" : [ {
  81882. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1835922",
  81883. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1835922",
  81884. "refsource" : "MISC",
  81885. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  81886. } ]
  81887. },
  81888. "description" : {
  81889. "description_data" : [ {
  81890. "lang" : "en",
  81891. "value" : "A flaw was found in Infinispan (org.infinispan:infinispan-server-runtime) version 10, where it permits local access to controls via both REST and HotRod APIs. This flaw allows a user authenticated to the local machine to perform all operations on the caches, including the creation, update, deletion, and shutdown of the entire server."
  81892. } ]
  81893. }
  81894. },
  81895. "configurations" : {
  81896. "CVE_data_version" : "4.0",
  81897. "nodes" : [ {
  81898. "operator" : "OR",
  81899. "children" : [ ],
  81900. "cpe_match" : [ {
  81901. "vulnerable" : true,
  81902. "cpe23Uri" : "cpe:2.3:a:infinispan:infinispan:10.0.0:*:*:*:*:*:*:*",
  81903. "cpe_name" : [ ]
  81904. } ]
  81905. } ]
  81906. },
  81907. "impact" : {
  81908. "baseMetricV3" : {
  81909. "cvssV3" : {
  81910. "version" : "3.1",
  81911. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
  81912. "attackVector" : "LOCAL",
  81913. "attackComplexity" : "LOW",
  81914. "privilegesRequired" : "LOW",
  81915. "userInteraction" : "NONE",
  81916. "scope" : "UNCHANGED",
  81917. "confidentialityImpact" : "NONE",
  81918. "integrityImpact" : "LOW",
  81919. "availabilityImpact" : "HIGH",
  81920. "baseScore" : 6.1,
  81921. "baseSeverity" : "MEDIUM"
  81922. },
  81923. "exploitabilityScore" : 1.8,
  81924. "impactScore" : 4.2
  81925. },
  81926. "baseMetricV2" : {
  81927. "cvssV2" : {
  81928. "version" : "2.0",
  81929. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:P/A:C",
  81930. "accessVector" : "LOCAL",
  81931. "accessComplexity" : "LOW",
  81932. "authentication" : "NONE",
  81933. "confidentialityImpact" : "NONE",
  81934. "integrityImpact" : "PARTIAL",
  81935. "availabilityImpact" : "COMPLETE",
  81936. "baseScore" : 5.6
  81937. },
  81938. "severity" : "MEDIUM",
  81939. "exploitabilityScore" : 3.9,
  81940. "impactScore" : 7.8,
  81941. "acInsufInfo" : false,
  81942. "obtainAllPrivilege" : false,
  81943. "obtainUserPrivilege" : false,
  81944. "obtainOtherPrivilege" : false,
  81945. "userInteractionRequired" : false
  81946. }
  81947. },
  81948. "publishedDate" : "2020-10-19T21:15Z",
  81949. "lastModifiedDate" : "2021-05-04T20:15Z"
  81950. }, {
  81951. "cve" : {
  81952. "data_type" : "CVE",
  81953. "data_format" : "MITRE",
  81954. "data_version" : "4.0",
  81955. "CVE_data_meta" : {
  81956. "ID" : "CVE-2020-15251",
  81957. "ASSIGNER" : "security-advisories@github.com"
  81958. },
  81959. "problemtype" : {
  81960. "problemtype_data" : [ {
  81961. "description" : [ {
  81962. "lang" : "en",
  81963. "value" : "CWE-863"
  81964. } ]
  81965. } ]
  81966. },
  81967. "references" : {
  81968. "reference_data" : [ {
  81969. "url" : "https://pypi.org/project/sopel-plugins.channelmgnt/",
  81970. "name" : "https://pypi.org/project/sopel-plugins.channelmgnt/",
  81971. "refsource" : "MISC",
  81972. "tags" : [ "Product", "Third Party Advisory" ]
  81973. }, {
  81974. "url" : "https://phab.bots.miraheze.wiki/T117",
  81975. "name" : "https://phab.bots.miraheze.wiki/T117",
  81976. "refsource" : "MISC",
  81977. "tags" : [ "Issue Tracking", "Patch", "Vendor Advisory" ]
  81978. }, {
  81979. "url" : "https://github.com/MirahezeBots/sopel-channelmgnt/pull/3",
  81980. "name" : "https://github.com/MirahezeBots/sopel-channelmgnt/pull/3",
  81981. "refsource" : "MISC",
  81982. "tags" : [ "Patch", "Third Party Advisory" ]
  81983. }, {
  81984. "url" : "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5",
  81985. "name" : "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5",
  81986. "refsource" : "CONFIRM",
  81987. "tags" : [ "Third Party Advisory" ]
  81988. }, {
  81989. "url" : "https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg",
  81990. "name" : "https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg",
  81991. "refsource" : "MISC",
  81992. "tags" : [ "Third Party Advisory" ]
  81993. }, {
  81994. "url" : "https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/",
  81995. "name" : "https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/",
  81996. "refsource" : "MISC",
  81997. "tags" : [ "Broken Link", "Vendor Advisory" ]
  81998. } ]
  81999. },
  82000. "description" : {
  82001. "description_data" : [ {
  82002. "lang" : "en",
  82003. "value" : "In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg."
  82004. } ]
  82005. }
  82006. },
  82007. "configurations" : {
  82008. "CVE_data_version" : "4.0",
  82009. "nodes" : [ {
  82010. "operator" : "OR",
  82011. "children" : [ ],
  82012. "cpe_match" : [ {
  82013. "vulnerable" : true,
  82014. "cpe23Uri" : "cpe:2.3:a:mirahezebots:channelmgnt:*:*:*:*:*:sopel:*:*",
  82015. "versionEndExcluding" : "1.0.3",
  82016. "cpe_name" : [ ]
  82017. } ]
  82018. } ]
  82019. },
  82020. "impact" : {
  82021. "baseMetricV3" : {
  82022. "cvssV3" : {
  82023. "version" : "3.1",
  82024. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
  82025. "attackVector" : "NETWORK",
  82026. "attackComplexity" : "LOW",
  82027. "privilegesRequired" : "LOW",
  82028. "userInteraction" : "NONE",
  82029. "scope" : "UNCHANGED",
  82030. "confidentialityImpact" : "NONE",
  82031. "integrityImpact" : "HIGH",
  82032. "availabilityImpact" : "NONE",
  82033. "baseScore" : 6.5,
  82034. "baseSeverity" : "MEDIUM"
  82035. },
  82036. "exploitabilityScore" : 2.8,
  82037. "impactScore" : 3.6
  82038. },
  82039. "baseMetricV2" : {
  82040. "cvssV2" : {
  82041. "version" : "2.0",
  82042. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:N",
  82043. "accessVector" : "NETWORK",
  82044. "accessComplexity" : "LOW",
  82045. "authentication" : "SINGLE",
  82046. "confidentialityImpact" : "NONE",
  82047. "integrityImpact" : "PARTIAL",
  82048. "availabilityImpact" : "NONE",
  82049. "baseScore" : 4.0
  82050. },
  82051. "severity" : "MEDIUM",
  82052. "exploitabilityScore" : 8.0,
  82053. "impactScore" : 2.9,
  82054. "acInsufInfo" : false,
  82055. "obtainAllPrivilege" : false,
  82056. "obtainUserPrivilege" : false,
  82057. "obtainOtherPrivilege" : false,
  82058. "userInteractionRequired" : false
  82059. }
  82060. },
  82061. "publishedDate" : "2020-10-13T18:15Z",
  82062. "lastModifiedDate" : "2021-05-04T14:02Z"
  82063. }, {
  82064. "cve" : {
  82065. "data_type" : "CVE",
  82066. "data_format" : "MITRE",
  82067. "data_version" : "4.0",
  82068. "CVE_data_meta" : {
  82069. "ID" : "CVE-2020-26880",
  82070. "ASSIGNER" : "cve@mitre.org"
  82071. },
  82072. "problemtype" : {
  82073. "problemtype_data" : [ {
  82074. "description" : [ {
  82075. "lang" : "en",
  82076. "value" : "CWE-269"
  82077. } ]
  82078. } ]
  82079. },
  82080. "references" : {
  82081. "reference_data" : [ {
  82082. "url" : "https://github.com/sympa-community/sympa/issues/943#issuecomment-704779420",
  82083. "name" : "https://github.com/sympa-community/sympa/issues/943#issuecomment-704779420",
  82084. "refsource" : "MISC",
  82085. "tags" : [ "Third Party Advisory" ]
  82086. }, {
  82087. "url" : "https://github.com/sympa-community/sympa/issues/943#issuecomment-704842235",
  82088. "name" : "https://github.com/sympa-community/sympa/issues/943#issuecomment-704842235",
  82089. "refsource" : "MISC",
  82090. "tags" : [ "Third Party Advisory" ]
  82091. }, {
  82092. "url" : "https://github.com/sympa-community/sympa/issues/1009",
  82093. "name" : "https://github.com/sympa-community/sympa/issues/1009",
  82094. "refsource" : "MISC",
  82095. "tags" : [ "Third Party Advisory" ]
  82096. }, {
  82097. "url" : "https://lists.debian.org/debian-lts-announce/2020/11/msg00015.html",
  82098. "name" : "[debian-lts-announce] 20201109 [SECURITY] [DLA 2441-1] sympa security update",
  82099. "refsource" : "MLIST",
  82100. "tags" : [ ]
  82101. }, {
  82102. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2TKOL454ZKKLQCUSUPNEZ52WELN4OAH/",
  82103. "name" : "FEDORA-2021-a309986711",
  82104. "refsource" : "FEDORA",
  82105. "tags" : [ ]
  82106. }, {
  82107. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5MFWWYY4TSQAXBWZ6SBFX43BLUL3WWI/",
  82108. "name" : "FEDORA-2021-aa993dd633",
  82109. "refsource" : "FEDORA",
  82110. "tags" : [ ]
  82111. }, {
  82112. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5CUVLHGWCDA6B2NH467ZMKL6O2NGLQZN/",
  82113. "name" : "FEDORA-2021-af8fa074ad",
  82114. "refsource" : "FEDORA",
  82115. "tags" : [ ]
  82116. } ]
  82117. },
  82118. "description" : {
  82119. "description_data" : [ {
  82120. "lang" : "en",
  82121. "value" : "Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable."
  82122. } ]
  82123. }
  82124. },
  82125. "configurations" : {
  82126. "CVE_data_version" : "4.0",
  82127. "nodes" : [ {
  82128. "operator" : "OR",
  82129. "children" : [ ],
  82130. "cpe_match" : [ {
  82131. "vulnerable" : true,
  82132. "cpe23Uri" : "cpe:2.3:a:sympa:sympa:*:*:*:*:*:*:*:*",
  82133. "versionEndIncluding" : "6.2.56",
  82134. "cpe_name" : [ ]
  82135. }, {
  82136. "vulnerable" : true,
  82137. "cpe23Uri" : "cpe:2.3:a:sympa:sympa:6.2.57:beta1:*:*:*:*:*:*",
  82138. "cpe_name" : [ ]
  82139. }, {
  82140. "vulnerable" : true,
  82141. "cpe23Uri" : "cpe:2.3:a:sympa:sympa:6.2.57:beta2:*:*:*:*:*:*",
  82142. "cpe_name" : [ ]
  82143. } ]
  82144. } ]
  82145. },
  82146. "impact" : {
  82147. "baseMetricV3" : {
  82148. "cvssV3" : {
  82149. "version" : "3.1",
  82150. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  82151. "attackVector" : "LOCAL",
  82152. "attackComplexity" : "LOW",
  82153. "privilegesRequired" : "LOW",
  82154. "userInteraction" : "NONE",
  82155. "scope" : "UNCHANGED",
  82156. "confidentialityImpact" : "HIGH",
  82157. "integrityImpact" : "HIGH",
  82158. "availabilityImpact" : "HIGH",
  82159. "baseScore" : 7.8,
  82160. "baseSeverity" : "HIGH"
  82161. },
  82162. "exploitabilityScore" : 1.8,
  82163. "impactScore" : 5.9
  82164. },
  82165. "baseMetricV2" : {
  82166. "cvssV2" : {
  82167. "version" : "2.0",
  82168. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  82169. "accessVector" : "LOCAL",
  82170. "accessComplexity" : "LOW",
  82171. "authentication" : "NONE",
  82172. "confidentialityImpact" : "COMPLETE",
  82173. "integrityImpact" : "COMPLETE",
  82174. "availabilityImpact" : "COMPLETE",
  82175. "baseScore" : 7.2
  82176. },
  82177. "severity" : "HIGH",
  82178. "exploitabilityScore" : 3.9,
  82179. "impactScore" : 10.0,
  82180. "acInsufInfo" : false,
  82181. "obtainAllPrivilege" : false,
  82182. "obtainUserPrivilege" : false,
  82183. "obtainOtherPrivilege" : false,
  82184. "userInteractionRequired" : false
  82185. }
  82186. },
  82187. "publishedDate" : "2020-10-07T18:15Z",
  82188. "lastModifiedDate" : "2021-05-09T03:15Z"
  82189. }, {
  82190. "cve" : {
  82191. "data_type" : "CVE",
  82192. "data_format" : "MITRE",
  82193. "data_version" : "4.0",
  82194. "CVE_data_meta" : {
  82195. "ID" : "CVE-2020-14375",
  82196. "ASSIGNER" : "secalert@redhat.com"
  82197. },
  82198. "problemtype" : {
  82199. "problemtype_data" : [ {
  82200. "description" : [ {
  82201. "lang" : "en",
  82202. "value" : "CWE-367"
  82203. } ]
  82204. } ]
  82205. },
  82206. "references" : {
  82207. "reference_data" : [ {
  82208. "url" : "https://www.openwall.com/lists/oss-security/2020/09/28/3",
  82209. "name" : "https://www.openwall.com/lists/oss-security/2020/09/28/3",
  82210. "refsource" : "MISC",
  82211. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  82212. }, {
  82213. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1879468",
  82214. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1879468",
  82215. "refsource" : "MISC",
  82216. "tags" : [ "Issue Tracking" ]
  82217. }, {
  82218. "url" : "https://usn.ubuntu.com/4550-1/",
  82219. "name" : "USN-4550-1",
  82220. "refsource" : "UBUNTU",
  82221. "tags" : [ "Third Party Advisory" ]
  82222. }, {
  82223. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html",
  82224. "name" : "openSUSE-SU-2020:1593",
  82225. "refsource" : "SUSE",
  82226. "tags" : [ "Third Party Advisory" ]
  82227. }, {
  82228. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html",
  82229. "name" : "openSUSE-SU-2020:1599",
  82230. "refsource" : "SUSE",
  82231. "tags" : [ "Third Party Advisory" ]
  82232. }, {
  82233. "url" : "http://www.openwall.com/lists/oss-security/2021/01/04/5",
  82234. "name" : "[oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues",
  82235. "refsource" : "MLIST",
  82236. "tags" : [ "Mailing List" ]
  82237. }, {
  82238. "url" : "http://www.openwall.com/lists/oss-security/2021/01/04/2",
  82239. "name" : "[oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues",
  82240. "refsource" : "MLIST",
  82241. "tags" : [ "Mailing List" ]
  82242. }, {
  82243. "url" : "http://www.openwall.com/lists/oss-security/2021/01/04/1",
  82244. "name" : "[oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues",
  82245. "refsource" : "MLIST",
  82246. "tags" : [ "Mailing List" ]
  82247. } ]
  82248. },
  82249. "description" : {
  82250. "description_data" : [ {
  82251. "lang" : "en",
  82252. "value" : "A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. Virtio ring descriptors, and the data they describe are in a region of memory accessible by from both the virtual machine and the host. An attacker in a VM can change the contents of the memory after vhost_crypto has validated it. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
  82253. } ]
  82254. }
  82255. },
  82256. "configurations" : {
  82257. "CVE_data_version" : "4.0",
  82258. "nodes" : [ {
  82259. "operator" : "OR",
  82260. "children" : [ ],
  82261. "cpe_match" : [ {
  82262. "vulnerable" : true,
  82263. "cpe23Uri" : "cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*",
  82264. "versionStartIncluding" : "18.02.1",
  82265. "versionEndExcluding" : "18.11.10",
  82266. "cpe_name" : [ ]
  82267. }, {
  82268. "vulnerable" : true,
  82269. "cpe23Uri" : "cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*",
  82270. "versionStartIncluding" : "19.02",
  82271. "versionEndExcluding" : "19.11.5",
  82272. "cpe_name" : [ ]
  82273. } ]
  82274. }, {
  82275. "operator" : "OR",
  82276. "children" : [ ],
  82277. "cpe_match" : [ {
  82278. "vulnerable" : true,
  82279. "cpe23Uri" : "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
  82280. "cpe_name" : [ ]
  82281. }, {
  82282. "vulnerable" : true,
  82283. "cpe23Uri" : "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
  82284. "cpe_name" : [ ]
  82285. }, {
  82286. "vulnerable" : true,
  82287. "cpe23Uri" : "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
  82288. "cpe_name" : [ ]
  82289. } ]
  82290. } ]
  82291. },
  82292. "impact" : {
  82293. "baseMetricV3" : {
  82294. "cvssV3" : {
  82295. "version" : "3.1",
  82296. "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
  82297. "attackVector" : "LOCAL",
  82298. "attackComplexity" : "HIGH",
  82299. "privilegesRequired" : "LOW",
  82300. "userInteraction" : "NONE",
  82301. "scope" : "CHANGED",
  82302. "confidentialityImpact" : "HIGH",
  82303. "integrityImpact" : "HIGH",
  82304. "availabilityImpact" : "HIGH",
  82305. "baseScore" : 7.8,
  82306. "baseSeverity" : "HIGH"
  82307. },
  82308. "exploitabilityScore" : 1.1,
  82309. "impactScore" : 6.0
  82310. },
  82311. "baseMetricV2" : {
  82312. "cvssV2" : {
  82313. "version" : "2.0",
  82314. "vectorString" : "AV:L/AC:M/Au:N/C:P/I:P/A:P",
  82315. "accessVector" : "LOCAL",
  82316. "accessComplexity" : "MEDIUM",
  82317. "authentication" : "NONE",
  82318. "confidentialityImpact" : "PARTIAL",
  82319. "integrityImpact" : "PARTIAL",
  82320. "availabilityImpact" : "PARTIAL",
  82321. "baseScore" : 4.4
  82322. },
  82323. "severity" : "MEDIUM",
  82324. "exploitabilityScore" : 3.4,
  82325. "impactScore" : 6.4,
  82326. "acInsufInfo" : false,
  82327. "obtainAllPrivilege" : false,
  82328. "obtainUserPrivilege" : false,
  82329. "obtainOtherPrivilege" : false,
  82330. "userInteractionRequired" : false
  82331. }
  82332. },
  82333. "publishedDate" : "2020-09-30T19:15Z",
  82334. "lastModifiedDate" : "2021-05-05T13:15Z"
  82335. }, {
  82336. "cve" : {
  82337. "data_type" : "CVE",
  82338. "data_format" : "MITRE",
  82339. "data_version" : "4.0",
  82340. "CVE_data_meta" : {
  82341. "ID" : "CVE-2020-13953",
  82342. "ASSIGNER" : "security@apache.org"
  82343. },
  82344. "problemtype" : {
  82345. "problemtype_data" : [ {
  82346. "description" : [ {
  82347. "lang" : "en",
  82348. "value" : "CWE-552"
  82349. } ]
  82350. } ]
  82351. },
  82352. "references" : {
  82353. "reference_data" : [ {
  82354. "url" : "https://lists.apache.org/thread.html/r50eb12e8a12074a9b7ed63cbab91d180d19cc23dc1da3ed5b6e1280f%40%3Cusers.tapestry.apache.org%3E",
  82355. "name" : "https://lists.apache.org/thread.html/r50eb12e8a12074a9b7ed63cbab91d180d19cc23dc1da3ed5b6e1280f%40%3Cusers.tapestry.apache.org%3E",
  82356. "refsource" : "MISC",
  82357. "tags" : [ "Mailing List", "Vendor Advisory" ]
  82358. }, {
  82359. "url" : "https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb@%3Cusers.tapestry.apache.org%3E",
  82360. "name" : "[tapestry-users] 20210427 CVE-2021-30638: An Information Disclosure due to insufficient input validation exists in Apache Tapestry 5.4.0 and later",
  82361. "refsource" : "MLIST",
  82362. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  82363. } ]
  82364. },
  82365. "description" : {
  82366. "description_data" : [ {
  82367. "lang" : "en",
  82368. "value" : "In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run."
  82369. } ]
  82370. }
  82371. },
  82372. "configurations" : {
  82373. "CVE_data_version" : "4.0",
  82374. "nodes" : [ {
  82375. "operator" : "OR",
  82376. "children" : [ ],
  82377. "cpe_match" : [ {
  82378. "vulnerable" : true,
  82379. "cpe23Uri" : "cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*",
  82380. "versionStartIncluding" : "5.4.0",
  82381. "versionEndExcluding" : "5.6.4",
  82382. "cpe_name" : [ ]
  82383. }, {
  82384. "vulnerable" : true,
  82385. "cpe23Uri" : "cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*",
  82386. "versionStartIncluding" : "5.7.0",
  82387. "versionEndExcluding" : "5.7.2",
  82388. "cpe_name" : [ ]
  82389. } ]
  82390. } ]
  82391. },
  82392. "impact" : {
  82393. "baseMetricV3" : {
  82394. "cvssV3" : {
  82395. "version" : "3.1",
  82396. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  82397. "attackVector" : "NETWORK",
  82398. "attackComplexity" : "LOW",
  82399. "privilegesRequired" : "NONE",
  82400. "userInteraction" : "NONE",
  82401. "scope" : "UNCHANGED",
  82402. "confidentialityImpact" : "LOW",
  82403. "integrityImpact" : "NONE",
  82404. "availabilityImpact" : "NONE",
  82405. "baseScore" : 5.3,
  82406. "baseSeverity" : "MEDIUM"
  82407. },
  82408. "exploitabilityScore" : 3.9,
  82409. "impactScore" : 1.4
  82410. },
  82411. "baseMetricV2" : {
  82412. "cvssV2" : {
  82413. "version" : "2.0",
  82414. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  82415. "accessVector" : "NETWORK",
  82416. "accessComplexity" : "LOW",
  82417. "authentication" : "NONE",
  82418. "confidentialityImpact" : "PARTIAL",
  82419. "integrityImpact" : "NONE",
  82420. "availabilityImpact" : "NONE",
  82421. "baseScore" : 5.0
  82422. },
  82423. "severity" : "MEDIUM",
  82424. "exploitabilityScore" : 10.0,
  82425. "impactScore" : 2.9,
  82426. "acInsufInfo" : false,
  82427. "obtainAllPrivilege" : false,
  82428. "obtainUserPrivilege" : false,
  82429. "obtainOtherPrivilege" : false,
  82430. "userInteractionRequired" : false
  82431. }
  82432. },
  82433. "publishedDate" : "2020-09-30T18:15Z",
  82434. "lastModifiedDate" : "2021-05-05T13:18Z"
  82435. }, {
  82436. "cve" : {
  82437. "data_type" : "CVE",
  82438. "data_format" : "MITRE",
  82439. "data_version" : "4.0",
  82440. "CVE_data_meta" : {
  82441. "ID" : "CVE-2020-15216",
  82442. "ASSIGNER" : "security-advisories@github.com"
  82443. },
  82444. "problemtype" : {
  82445. "problemtype_data" : [ {
  82446. "description" : [ {
  82447. "lang" : "en",
  82448. "value" : "CWE-347"
  82449. } ]
  82450. } ]
  82451. },
  82452. "references" : {
  82453. "reference_data" : [ {
  82454. "url" : "https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7",
  82455. "name" : "https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7",
  82456. "refsource" : "CONFIRM",
  82457. "tags" : [ "Third Party Advisory" ]
  82458. }, {
  82459. "url" : "https://pkg.go.dev/github.com/russellhaering/goxmldsig?tab=overview",
  82460. "name" : "https://pkg.go.dev/github.com/russellhaering/goxmldsig?tab=overview",
  82461. "refsource" : "MISC",
  82462. "tags" : [ "Third Party Advisory" ]
  82463. }, {
  82464. "url" : "https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64",
  82465. "name" : "https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64",
  82466. "refsource" : "MISC",
  82467. "tags" : [ "Patch", "Third Party Advisory" ]
  82468. }, {
  82469. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZECBFD4M4PHBMBOCMSQ537NOU37QOVWP/",
  82470. "name" : "FEDORA-2021-a2a7673da2",
  82471. "refsource" : "FEDORA",
  82472. "tags" : [ "Third Party Advisory" ]
  82473. }, {
  82474. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GUH33FPUXED3FHYL25BJOQPRKFGPOMS2/",
  82475. "name" : "FEDORA-2021-9316ee2948",
  82476. "refsource" : "FEDORA",
  82477. "tags" : [ "Third Party Advisory" ]
  82478. } ]
  82479. },
  82480. "description" : {
  82481. "description_data" : [ {
  82482. "lang" : "en",
  82483. "value" : "In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0"
  82484. } ]
  82485. }
  82486. },
  82487. "configurations" : {
  82488. "CVE_data_version" : "4.0",
  82489. "nodes" : [ {
  82490. "operator" : "OR",
  82491. "children" : [ ],
  82492. "cpe_match" : [ {
  82493. "vulnerable" : true,
  82494. "cpe23Uri" : "cpe:2.3:a:goxmldsig_project:goxmldsig:*:*:*:*:*:*:*:*",
  82495. "versionEndExcluding" : "1.1.0",
  82496. "cpe_name" : [ ]
  82497. } ]
  82498. }, {
  82499. "operator" : "OR",
  82500. "children" : [ ],
  82501. "cpe_match" : [ {
  82502. "vulnerable" : true,
  82503. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  82504. "cpe_name" : [ ]
  82505. }, {
  82506. "vulnerable" : true,
  82507. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  82508. "cpe_name" : [ ]
  82509. } ]
  82510. } ]
  82511. },
  82512. "impact" : {
  82513. "baseMetricV3" : {
  82514. "cvssV3" : {
  82515. "version" : "3.1",
  82516. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
  82517. "attackVector" : "NETWORK",
  82518. "attackComplexity" : "LOW",
  82519. "privilegesRequired" : "NONE",
  82520. "userInteraction" : "REQUIRED",
  82521. "scope" : "UNCHANGED",
  82522. "confidentialityImpact" : "NONE",
  82523. "integrityImpact" : "HIGH",
  82524. "availabilityImpact" : "NONE",
  82525. "baseScore" : 6.5,
  82526. "baseSeverity" : "MEDIUM"
  82527. },
  82528. "exploitabilityScore" : 2.8,
  82529. "impactScore" : 3.6
  82530. },
  82531. "baseMetricV2" : {
  82532. "cvssV2" : {
  82533. "version" : "2.0",
  82534. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  82535. "accessVector" : "NETWORK",
  82536. "accessComplexity" : "MEDIUM",
  82537. "authentication" : "NONE",
  82538. "confidentialityImpact" : "NONE",
  82539. "integrityImpact" : "PARTIAL",
  82540. "availabilityImpact" : "NONE",
  82541. "baseScore" : 4.3
  82542. },
  82543. "severity" : "MEDIUM",
  82544. "exploitabilityScore" : 8.6,
  82545. "impactScore" : 2.9,
  82546. "acInsufInfo" : false,
  82547. "obtainAllPrivilege" : false,
  82548. "obtainUserPrivilege" : false,
  82549. "obtainOtherPrivilege" : false,
  82550. "userInteractionRequired" : true
  82551. }
  82552. },
  82553. "publishedDate" : "2020-09-29T16:15Z",
  82554. "lastModifiedDate" : "2021-05-05T13:18Z"
  82555. }, {
  82556. "cve" : {
  82557. "data_type" : "CVE",
  82558. "data_format" : "MITRE",
  82559. "data_version" : "4.0",
  82560. "CVE_data_meta" : {
  82561. "ID" : "CVE-2020-15160",
  82562. "ASSIGNER" : "security-advisories@github.com"
  82563. },
  82564. "problemtype" : {
  82565. "problemtype_data" : [ {
  82566. "description" : [ {
  82567. "lang" : "en",
  82568. "value" : "CWE-89"
  82569. } ]
  82570. } ]
  82571. },
  82572. "references" : {
  82573. "reference_data" : [ {
  82574. "url" : "https://github.com/PrestaShop/PrestaShop/commit/3fa0dfa5a8f4b149c7c90b948a12b4f5999a5ef8",
  82575. "name" : "https://github.com/PrestaShop/PrestaShop/commit/3fa0dfa5a8f4b149c7c90b948a12b4f5999a5ef8",
  82576. "refsource" : "MISC",
  82577. "tags" : [ "Patch", "Third Party Advisory" ]
  82578. }, {
  82579. "url" : "https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.6.8",
  82580. "name" : "https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.6.8",
  82581. "refsource" : "MISC",
  82582. "tags" : [ "Third Party Advisory" ]
  82583. }, {
  82584. "url" : "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-fghq-8h87-826g",
  82585. "name" : "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-fghq-8h87-826g",
  82586. "refsource" : "CONFIRM",
  82587. "tags" : [ "Third Party Advisory" ]
  82588. }, {
  82589. "url" : "http://packetstormsecurity.com/files/162140/PrestaShop-1.7.6.7-SQL-Injection.html",
  82590. "name" : "http://packetstormsecurity.com/files/162140/PrestaShop-1.7.6.7-SQL-Injection.html",
  82591. "refsource" : "MISC",
  82592. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  82593. } ]
  82594. },
  82595. "description" : {
  82596. "description_data" : [ {
  82597. "lang" : "en",
  82598. "value" : "PrestaShop from version 1.7.5.0 and before version 1.7.6.8 is vulnerable to a blind SQL Injection attack in the Catalog Product edition page with location parameter. The problem is fixed in 1.7.6.8"
  82599. } ]
  82600. }
  82601. },
  82602. "configurations" : {
  82603. "CVE_data_version" : "4.0",
  82604. "nodes" : [ {
  82605. "operator" : "OR",
  82606. "children" : [ ],
  82607. "cpe_match" : [ {
  82608. "vulnerable" : true,
  82609. "cpe23Uri" : "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*",
  82610. "versionStartIncluding" : "1.7.5.0",
  82611. "versionEndExcluding" : "1.7.6.8",
  82612. "cpe_name" : [ ]
  82613. } ]
  82614. } ]
  82615. },
  82616. "impact" : {
  82617. "baseMetricV3" : {
  82618. "cvssV3" : {
  82619. "version" : "3.1",
  82620. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  82621. "attackVector" : "NETWORK",
  82622. "attackComplexity" : "LOW",
  82623. "privilegesRequired" : "NONE",
  82624. "userInteraction" : "NONE",
  82625. "scope" : "UNCHANGED",
  82626. "confidentialityImpact" : "HIGH",
  82627. "integrityImpact" : "HIGH",
  82628. "availabilityImpact" : "HIGH",
  82629. "baseScore" : 9.8,
  82630. "baseSeverity" : "CRITICAL"
  82631. },
  82632. "exploitabilityScore" : 3.9,
  82633. "impactScore" : 5.9
  82634. },
  82635. "baseMetricV2" : {
  82636. "cvssV2" : {
  82637. "version" : "2.0",
  82638. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  82639. "accessVector" : "NETWORK",
  82640. "accessComplexity" : "LOW",
  82641. "authentication" : "NONE",
  82642. "confidentialityImpact" : "PARTIAL",
  82643. "integrityImpact" : "PARTIAL",
  82644. "availabilityImpact" : "PARTIAL",
  82645. "baseScore" : 7.5
  82646. },
  82647. "severity" : "HIGH",
  82648. "exploitabilityScore" : 10.0,
  82649. "impactScore" : 6.4,
  82650. "acInsufInfo" : false,
  82651. "obtainAllPrivilege" : false,
  82652. "obtainUserPrivilege" : false,
  82653. "obtainOtherPrivilege" : false,
  82654. "userInteractionRequired" : false
  82655. }
  82656. },
  82657. "publishedDate" : "2020-09-24T23:15Z",
  82658. "lastModifiedDate" : "2021-05-05T13:19Z"
  82659. }, {
  82660. "cve" : {
  82661. "data_type" : "CVE",
  82662. "data_format" : "MITRE",
  82663. "data_version" : "4.0",
  82664. "CVE_data_meta" : {
  82665. "ID" : "CVE-2020-13944",
  82666. "ASSIGNER" : "security@apache.org"
  82667. },
  82668. "problemtype" : {
  82669. "problemtype_data" : [ {
  82670. "description" : [ {
  82671. "lang" : "en",
  82672. "value" : "CWE-79"
  82673. } ]
  82674. } ]
  82675. },
  82676. "references" : {
  82677. "reference_data" : [ {
  82678. "url" : "https://lists.apache.org/thread.html/r97e1b60ca508a86be58c43f405c0c8ff00ba467ba0bee68704ae7e3e%40%3Cdev.airflow.apache.org%3E",
  82679. "name" : "https://lists.apache.org/thread.html/r97e1b60ca508a86be58c43f405c0c8ff00ba467ba0bee68704ae7e3e%40%3Cdev.airflow.apache.org%3E",
  82680. "refsource" : "MISC",
  82681. "tags" : [ "Mailing List", "Vendor Advisory" ]
  82682. }, {
  82683. "url" : "https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cusers.airflow.apache.org%3E",
  82684. "name" : "[airflow-users] 20201211 Apache Airflow Security Vulnerabilities fixed in v1.10.13: CVE-2020-17515",
  82685. "refsource" : "MLIST",
  82686. "tags" : [ ]
  82687. }, {
  82688. "url" : "https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e@%3Cusers.airflow.apache.org%3E",
  82689. "name" : "[airflow-users] 20201211 CVE-2020-17515: Apache Airflow Reflected XSS via Origin Parameter",
  82690. "refsource" : "MLIST",
  82691. "tags" : [ ]
  82692. }, {
  82693. "url" : "https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cdev.airflow.apache.org%3E",
  82694. "name" : "[airflow-dev] 20201211 Apache Airflow Security Vulnerabilities fixed in v1.10.13: CVE-2020-17515",
  82695. "refsource" : "MLIST",
  82696. "tags" : [ ]
  82697. }, {
  82698. "url" : "http://www.openwall.com/lists/oss-security/2020/12/11/2",
  82699. "name" : "[oss-security] 20201211 CVE-2020-17515: Apache Airflow Reflected XSS via Origin Parameter",
  82700. "refsource" : "MLIST",
  82701. "tags" : [ ]
  82702. }, {
  82703. "url" : "https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E",
  82704. "name" : "[announce] 20201211 Apache Airflow Security Vulnerabilities fixed in v1.10.13: CVE-2020-17515",
  82705. "refsource" : "MLIST",
  82706. "tags" : [ ]
  82707. }, {
  82708. "url" : "https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E",
  82709. "name" : "[airflow-users] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
  82710. "refsource" : "MLIST",
  82711. "tags" : [ ]
  82712. }, {
  82713. "url" : "http://www.openwall.com/lists/oss-security/2021/05/01/2",
  82714. "name" : "[oss-security] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
  82715. "refsource" : "MLIST",
  82716. "tags" : [ ]
  82717. }, {
  82718. "url" : "https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E",
  82719. "name" : "[announce] 20210501 Apache Airflow CVE: CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL",
  82720. "refsource" : "MLIST",
  82721. "tags" : [ ]
  82722. } ]
  82723. },
  82724. "description" : {
  82725. "description_data" : [ {
  82726. "lang" : "en",
  82727. "value" : "In Apache Airflow < 1.10.12, the \"origin\" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit."
  82728. } ]
  82729. }
  82730. },
  82731. "configurations" : {
  82732. "CVE_data_version" : "4.0",
  82733. "nodes" : [ {
  82734. "operator" : "OR",
  82735. "children" : [ ],
  82736. "cpe_match" : [ {
  82737. "vulnerable" : true,
  82738. "cpe23Uri" : "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*",
  82739. "versionEndExcluding" : "1.10.12",
  82740. "cpe_name" : [ ]
  82741. } ]
  82742. } ]
  82743. },
  82744. "impact" : {
  82745. "baseMetricV3" : {
  82746. "cvssV3" : {
  82747. "version" : "3.1",
  82748. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  82749. "attackVector" : "NETWORK",
  82750. "attackComplexity" : "LOW",
  82751. "privilegesRequired" : "NONE",
  82752. "userInteraction" : "REQUIRED",
  82753. "scope" : "CHANGED",
  82754. "confidentialityImpact" : "LOW",
  82755. "integrityImpact" : "LOW",
  82756. "availabilityImpact" : "NONE",
  82757. "baseScore" : 6.1,
  82758. "baseSeverity" : "MEDIUM"
  82759. },
  82760. "exploitabilityScore" : 2.8,
  82761. "impactScore" : 2.7
  82762. },
  82763. "baseMetricV2" : {
  82764. "cvssV2" : {
  82765. "version" : "2.0",
  82766. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  82767. "accessVector" : "NETWORK",
  82768. "accessComplexity" : "MEDIUM",
  82769. "authentication" : "NONE",
  82770. "confidentialityImpact" : "NONE",
  82771. "integrityImpact" : "PARTIAL",
  82772. "availabilityImpact" : "NONE",
  82773. "baseScore" : 4.3
  82774. },
  82775. "severity" : "MEDIUM",
  82776. "exploitabilityScore" : 8.6,
  82777. "impactScore" : 2.9,
  82778. "acInsufInfo" : false,
  82779. "obtainAllPrivilege" : false,
  82780. "obtainUserPrivilege" : false,
  82781. "obtainOtherPrivilege" : false,
  82782. "userInteractionRequired" : true
  82783. }
  82784. },
  82785. "publishedDate" : "2020-09-17T14:15Z",
  82786. "lastModifiedDate" : "2021-05-04T00:15Z"
  82787. }, {
  82788. "cve" : {
  82789. "data_type" : "CVE",
  82790. "data_format" : "MITRE",
  82791. "data_version" : "4.0",
  82792. "CVE_data_meta" : {
  82793. "ID" : "CVE-2020-25453",
  82794. "ASSIGNER" : "cve@mitre.org"
  82795. },
  82796. "problemtype" : {
  82797. "problemtype_data" : [ {
  82798. "description" : [ {
  82799. "lang" : "en",
  82800. "value" : "CWE-352"
  82801. } ]
  82802. } ]
  82803. },
  82804. "references" : {
  82805. "reference_data" : [ {
  82806. "url" : "https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389",
  82807. "name" : "https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389",
  82808. "refsource" : "MISC",
  82809. "tags" : [ "Exploit", "Third Party Advisory" ]
  82810. }, {
  82811. "url" : "http://packetstormsecurity.com/files/159237/BlackCat-CMS-1.3.6-Cross-Site-Request-Forgery.html",
  82812. "name" : "http://packetstormsecurity.com/files/159237/BlackCat-CMS-1.3.6-Cross-Site-Request-Forgery.html",
  82813. "refsource" : "MISC",
  82814. "tags" : [ ]
  82815. } ]
  82816. },
  82817. "description" : {
  82818. "description_data" : [ {
  82819. "lang" : "en",
  82820. "value" : "An issue was discovered in BlackCat CMS before 1.4. There is a CSRF vulnerability (bypass csrf_token) that allows remote arbitrary code execution."
  82821. } ]
  82822. }
  82823. },
  82824. "configurations" : {
  82825. "CVE_data_version" : "4.0",
  82826. "nodes" : [ {
  82827. "operator" : "OR",
  82828. "children" : [ ],
  82829. "cpe_match" : [ {
  82830. "vulnerable" : true,
  82831. "cpe23Uri" : "cpe:2.3:a:blackcat-cms:blackcat_cms:1.3.6:*:*:*:*:*:*:*",
  82832. "cpe_name" : [ ]
  82833. } ]
  82834. } ]
  82835. },
  82836. "impact" : {
  82837. "baseMetricV3" : {
  82838. "cvssV3" : {
  82839. "version" : "3.1",
  82840. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  82841. "attackVector" : "NETWORK",
  82842. "attackComplexity" : "LOW",
  82843. "privilegesRequired" : "NONE",
  82844. "userInteraction" : "REQUIRED",
  82845. "scope" : "UNCHANGED",
  82846. "confidentialityImpact" : "HIGH",
  82847. "integrityImpact" : "HIGH",
  82848. "availabilityImpact" : "HIGH",
  82849. "baseScore" : 8.8,
  82850. "baseSeverity" : "HIGH"
  82851. },
  82852. "exploitabilityScore" : 2.8,
  82853. "impactScore" : 5.9
  82854. },
  82855. "baseMetricV2" : {
  82856. "cvssV2" : {
  82857. "version" : "2.0",
  82858. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  82859. "accessVector" : "NETWORK",
  82860. "accessComplexity" : "MEDIUM",
  82861. "authentication" : "NONE",
  82862. "confidentialityImpact" : "PARTIAL",
  82863. "integrityImpact" : "PARTIAL",
  82864. "availabilityImpact" : "PARTIAL",
  82865. "baseScore" : 6.8
  82866. },
  82867. "severity" : "MEDIUM",
  82868. "exploitabilityScore" : 8.6,
  82869. "impactScore" : 6.4,
  82870. "acInsufInfo" : false,
  82871. "obtainAllPrivilege" : false,
  82872. "obtainUserPrivilege" : false,
  82873. "obtainOtherPrivilege" : false,
  82874. "userInteractionRequired" : true
  82875. }
  82876. },
  82877. "publishedDate" : "2020-09-15T22:15Z",
  82878. "lastModifiedDate" : "2021-05-06T19:15Z"
  82879. }, {
  82880. "cve" : {
  82881. "data_type" : "CVE",
  82882. "data_format" : "MITRE",
  82883. "data_version" : "4.0",
  82884. "CVE_data_meta" : {
  82885. "ID" : "CVE-2020-24616",
  82886. "ASSIGNER" : "cve@mitre.org"
  82887. },
  82888. "problemtype" : {
  82889. "problemtype_data" : [ {
  82890. "description" : [ {
  82891. "lang" : "en",
  82892. "value" : "CWE-94"
  82893. } ]
  82894. } ]
  82895. },
  82896. "references" : {
  82897. "reference_data" : [ {
  82898. "url" : "https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
  82899. "name" : "https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
  82900. "refsource" : "MISC",
  82901. "tags" : [ "Exploit", "Third Party Advisory" ]
  82902. }, {
  82903. "url" : "https://github.com/FasterXML/jackson-databind/issues/2814",
  82904. "name" : "https://github.com/FasterXML/jackson-databind/issues/2814",
  82905. "refsource" : "MISC",
  82906. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  82907. }, {
  82908. "url" : "https://security.netapp.com/advisory/ntap-20200904-0006/",
  82909. "name" : "https://security.netapp.com/advisory/ntap-20200904-0006/",
  82910. "refsource" : "CONFIRM",
  82911. "tags" : [ "Third Party Advisory" ]
  82912. }, {
  82913. "url" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  82914. "name" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  82915. "refsource" : "MISC",
  82916. "tags" : [ "Third Party Advisory" ]
  82917. }, {
  82918. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html",
  82919. "name" : "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
  82920. "refsource" : "MLIST",
  82921. "tags" : [ "Mailing List", "Third Party Advisory" ]
  82922. } ]
  82923. },
  82924. "description" : {
  82925. "description_data" : [ {
  82926. "lang" : "en",
  82927. "value" : "FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP)."
  82928. } ]
  82929. }
  82930. },
  82931. "configurations" : {
  82932. "CVE_data_version" : "4.0",
  82933. "nodes" : [ {
  82934. "operator" : "OR",
  82935. "children" : [ ],
  82936. "cpe_match" : [ {
  82937. "vulnerable" : true,
  82938. "cpe23Uri" : "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
  82939. "versionStartIncluding" : "2.9.0",
  82940. "versionEndExcluding" : "2.9.10.6",
  82941. "cpe_name" : [ ]
  82942. } ]
  82943. }, {
  82944. "operator" : "OR",
  82945. "children" : [ ],
  82946. "cpe_match" : [ {
  82947. "vulnerable" : true,
  82948. "cpe23Uri" : "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*",
  82949. "cpe_name" : [ ]
  82950. }, {
  82951. "vulnerable" : true,
  82952. "cpe23Uri" : "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
  82953. "cpe_name" : [ ]
  82954. }, {
  82955. "vulnerable" : true,
  82956. "cpe23Uri" : "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
  82957. "cpe_name" : [ ]
  82958. } ]
  82959. }, {
  82960. "operator" : "OR",
  82961. "children" : [ ],
  82962. "cpe_match" : [ {
  82963. "vulnerable" : true,
  82964. "cpe23Uri" : "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*",
  82965. "cpe_name" : [ ]
  82966. }, {
  82967. "vulnerable" : true,
  82968. "cpe23Uri" : "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*",
  82969. "cpe_name" : [ ]
  82970. }, {
  82971. "vulnerable" : true,
  82972. "cpe23Uri" : "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*",
  82973. "cpe_name" : [ ]
  82974. }, {
  82975. "vulnerable" : true,
  82976. "cpe23Uri" : "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
  82977. "versionStartIncluding" : "8.0.0",
  82978. "versionEndIncluding" : "8.2.2",
  82979. "cpe_name" : [ ]
  82980. } ]
  82981. }, {
  82982. "operator" : "OR",
  82983. "children" : [ ],
  82984. "cpe_match" : [ {
  82985. "vulnerable" : true,
  82986. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  82987. "cpe_name" : [ ]
  82988. } ]
  82989. } ]
  82990. },
  82991. "impact" : {
  82992. "baseMetricV3" : {
  82993. "cvssV3" : {
  82994. "version" : "3.1",
  82995. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
  82996. "attackVector" : "NETWORK",
  82997. "attackComplexity" : "HIGH",
  82998. "privilegesRequired" : "NONE",
  82999. "userInteraction" : "NONE",
  83000. "scope" : "UNCHANGED",
  83001. "confidentialityImpact" : "HIGH",
  83002. "integrityImpact" : "HIGH",
  83003. "availabilityImpact" : "HIGH",
  83004. "baseScore" : 8.1,
  83005. "baseSeverity" : "HIGH"
  83006. },
  83007. "exploitabilityScore" : 2.2,
  83008. "impactScore" : 5.9
  83009. },
  83010. "baseMetricV2" : {
  83011. "cvssV2" : {
  83012. "version" : "2.0",
  83013. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  83014. "accessVector" : "NETWORK",
  83015. "accessComplexity" : "MEDIUM",
  83016. "authentication" : "NONE",
  83017. "confidentialityImpact" : "PARTIAL",
  83018. "integrityImpact" : "PARTIAL",
  83019. "availabilityImpact" : "PARTIAL",
  83020. "baseScore" : 6.8
  83021. },
  83022. "severity" : "MEDIUM",
  83023. "exploitabilityScore" : 8.6,
  83024. "impactScore" : 6.4,
  83025. "acInsufInfo" : false,
  83026. "obtainAllPrivilege" : false,
  83027. "obtainUserPrivilege" : false,
  83028. "obtainOtherPrivilege" : false,
  83029. "userInteractionRequired" : false
  83030. }
  83031. },
  83032. "publishedDate" : "2020-08-25T18:15Z",
  83033. "lastModifiedDate" : "2021-05-05T13:22Z"
  83034. }, {
  83035. "cve" : {
  83036. "data_type" : "CVE",
  83037. "data_format" : "MITRE",
  83038. "data_version" : "4.0",
  83039. "CVE_data_meta" : {
  83040. "ID" : "CVE-2020-15152",
  83041. "ASSIGNER" : "security-advisories@github.com"
  83042. },
  83043. "problemtype" : {
  83044. "problemtype_data" : [ {
  83045. "description" : [ {
  83046. "lang" : "en",
  83047. "value" : "CWE-918"
  83048. } ]
  83049. } ]
  83050. },
  83051. "references" : {
  83052. "reference_data" : [ {
  83053. "url" : "https://www.npmjs.com/package/ftp-srv",
  83054. "name" : "https://www.npmjs.com/package/ftp-srv",
  83055. "refsource" : "MISC",
  83056. "tags" : [ "Product", "Third Party Advisory" ]
  83057. }, {
  83058. "url" : "https://github.com/autovance/ftp-srv/commit/e449e75219d918c400dec65b4b0759f60476abca",
  83059. "name" : "https://github.com/autovance/ftp-srv/commit/e449e75219d918c400dec65b4b0759f60476abca",
  83060. "refsource" : "MISC",
  83061. "tags" : [ "Patch", "Third Party Advisory" ]
  83062. }, {
  83063. "url" : "https://github.com/autovance/ftp-srv/security/advisories/GHSA-jw37-5gqr-cf9j",
  83064. "name" : "https://github.com/autovance/ftp-srv/security/advisories/GHSA-jw37-5gqr-cf9j",
  83065. "refsource" : "CONFIRM",
  83066. "tags" : [ "Mitigation", "Patch", "Third Party Advisory" ]
  83067. } ]
  83068. },
  83069. "description" : {
  83070. "description_data" : [ {
  83071. "lang" : "en",
  83072. "value" : "ftp-srv is an npm package which is a modern and extensible FTP server designed to be simple yet configurable. In ftp-srv before versions 2.19.6, 3.1.2, and 4.3.4 are vulnerable to Server-Side Request Forgery. The PORT command allows arbitrary IPs which can be used to cause the server to make a connection elsewhere. A possible workaround is blocking the PORT through the configuration. This issue is fixed in version2 2.19.6, 3.1.2, and 4.3.4. More information can be found on the linked advisory."
  83073. } ]
  83074. }
  83075. },
  83076. "configurations" : {
  83077. "CVE_data_version" : "4.0",
  83078. "nodes" : [ {
  83079. "operator" : "OR",
  83080. "children" : [ ],
  83081. "cpe_match" : [ {
  83082. "vulnerable" : true,
  83083. "cpe23Uri" : "cpe:2.3:a:ftp-srv_project:ftp-srv:*:*:*:*:*:node.js:*:*",
  83084. "versionEndExcluding" : "2.19.6",
  83085. "cpe_name" : [ ]
  83086. }, {
  83087. "vulnerable" : true,
  83088. "cpe23Uri" : "cpe:2.3:a:ftp-srv_project:ftp-srv:*:*:*:*:*:node.js:*:*",
  83089. "versionStartIncluding" : "3.0.0",
  83090. "versionEndExcluding" : "3.1.2",
  83091. "cpe_name" : [ ]
  83092. }, {
  83093. "vulnerable" : true,
  83094. "cpe23Uri" : "cpe:2.3:a:ftp-srv_project:ftp-srv:*:*:*:*:*:node.js:*:*",
  83095. "versionStartIncluding" : "4.0.0",
  83096. "versionEndExcluding" : "4.3.4",
  83097. "cpe_name" : [ ]
  83098. } ]
  83099. } ]
  83100. },
  83101. "impact" : {
  83102. "baseMetricV3" : {
  83103. "cvssV3" : {
  83104. "version" : "3.1",
  83105. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
  83106. "attackVector" : "NETWORK",
  83107. "attackComplexity" : "LOW",
  83108. "privilegesRequired" : "NONE",
  83109. "userInteraction" : "NONE",
  83110. "scope" : "UNCHANGED",
  83111. "confidentialityImpact" : "HIGH",
  83112. "integrityImpact" : "HIGH",
  83113. "availabilityImpact" : "NONE",
  83114. "baseScore" : 9.1,
  83115. "baseSeverity" : "CRITICAL"
  83116. },
  83117. "exploitabilityScore" : 3.9,
  83118. "impactScore" : 5.2
  83119. },
  83120. "baseMetricV2" : {
  83121. "cvssV2" : {
  83122. "version" : "2.0",
  83123. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  83124. "accessVector" : "NETWORK",
  83125. "accessComplexity" : "LOW",
  83126. "authentication" : "NONE",
  83127. "confidentialityImpact" : "NONE",
  83128. "integrityImpact" : "PARTIAL",
  83129. "availabilityImpact" : "NONE",
  83130. "baseScore" : 5.0
  83131. },
  83132. "severity" : "MEDIUM",
  83133. "exploitabilityScore" : 10.0,
  83134. "impactScore" : 2.9,
  83135. "acInsufInfo" : false,
  83136. "obtainAllPrivilege" : false,
  83137. "obtainUserPrivilege" : false,
  83138. "obtainOtherPrivilege" : false,
  83139. "userInteractionRequired" : false
  83140. }
  83141. },
  83142. "publishedDate" : "2020-08-17T22:15Z",
  83143. "lastModifiedDate" : "2021-05-05T14:02Z"
  83144. }, {
  83145. "cve" : {
  83146. "data_type" : "CVE",
  83147. "data_format" : "MITRE",
  83148. "data_version" : "4.0",
  83149. "CVE_data_meta" : {
  83150. "ID" : "CVE-2020-13933",
  83151. "ASSIGNER" : "security@apache.org"
  83152. },
  83153. "problemtype" : {
  83154. "problemtype_data" : [ {
  83155. "description" : [ {
  83156. "lang" : "en",
  83157. "value" : "CWE-287"
  83158. } ]
  83159. } ]
  83160. },
  83161. "references" : {
  83162. "reference_data" : [ {
  83163. "url" : "https://lists.apache.org/thread.html/r539f87706094e79c5da0826030384373f0041068936912876856835f%40%3Cdev.shiro.apache.org%3E",
  83164. "name" : "https://lists.apache.org/thread.html/r539f87706094e79c5da0826030384373f0041068936912876856835f%40%3Cdev.shiro.apache.org%3E",
  83165. "refsource" : "MISC",
  83166. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83167. }, {
  83168. "url" : "https://lists.apache.org/thread.html/r18b45d560d76c4260813c802771cc9678aa651fb8340e09366bfa198@%3Cdev.geode.apache.org%3E",
  83169. "name" : "[geode-dev] 20200831 Proposal to bring GEODE-8456 (shiro upgrade) to support branches",
  83170. "refsource" : "MLIST",
  83171. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83172. }, {
  83173. "url" : "https://lists.apache.org/thread.html/r9ea6d8560d6354d41433ad006069904f0ed083527aa348b5999261a7@%3Cdev.geode.apache.org%3E",
  83174. "name" : "[geode-dev] 20200901 Re: Proposal to bring GEODE-8456 (shiro upgrade) to support branches",
  83175. "refsource" : "MLIST",
  83176. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83177. }, {
  83178. "url" : "https://lists.apache.org/thread.html/r6ea0224c1971a91dc6ade1f22508119a9c3bd56cef656f0c44bbfabb@%3Cdev.shiro.apache.org%3E",
  83179. "name" : "[shiro-dev] 20200924 Request for assistance to backport CVE-2020-13933 fix",
  83180. "refsource" : "MLIST",
  83181. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  83182. }, {
  83183. "url" : "https://lists.apache.org/thread.html/r4c1e1249e9e1acb868db0c80728c13f448d07333da06a0f1603c0a33@%3Cdev.shiro.apache.org%3E",
  83184. "name" : "[shiro-dev] 20201004 Re: Request for assistance to backport CVE-2020-13933 fix",
  83185. "refsource" : "MLIST",
  83186. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83187. }, {
  83188. "url" : "https://lists.apache.org/thread.html/r8097b81905f2a113ebdf925bcbc6d8c9d6863c807c9ee42e1e7c9293@%3Cdev.shiro.apache.org%3E",
  83189. "name" : "[shiro-dev] 20201217 Re: Request for assistance to backport CVE-2020-13933 fix",
  83190. "refsource" : "MLIST",
  83191. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83192. }, {
  83193. "url" : "https://lists.apache.org/thread.html/rb5edf49cd1451475dbcf53826ba6ef1bb7872dd6493d6112eb0c2bad@%3Cdev.shiro.apache.org%3E",
  83194. "name" : "[shiro-dev] 20201219 Re: Request for assistance to backport CVE-2020-13933 fix",
  83195. "refsource" : "MLIST",
  83196. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  83197. }, {
  83198. "url" : "https://lists.apache.org/thread.html/r4506cedc401d6b8de83787f8436aac83956e411d66848c84785db46d@%3Cdev.shiro.apache.org%3E",
  83199. "name" : "[shiro-dev] 20201220 Re: Request for assistance to backport CVE-2020-13933 fix",
  83200. "refsource" : "MLIST",
  83201. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  83202. }, {
  83203. "url" : "https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E",
  83204. "name" : "[shiro-dev] 20201221 Re: Request for assistance to backport CVE-2020-13933 fix",
  83205. "refsource" : "MLIST",
  83206. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  83207. }, {
  83208. "url" : "https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E",
  83209. "name" : "[shiro-dev] 20201222 Re: Request for assistance to backport CVE-2020-13933 fix",
  83210. "refsource" : "MLIST",
  83211. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83212. }, {
  83213. "url" : "https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E",
  83214. "name" : "[shiro-dev] 20210130 Re: Request for assistance to backport CVE-2020-13933 fix",
  83215. "refsource" : "MLIST",
  83216. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83217. }, {
  83218. "url" : "https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E",
  83219. "name" : "[shiro-dev] 20210316 Re: Request for assistance to backport CVE-2020-13933 fix",
  83220. "refsource" : "MLIST",
  83221. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  83222. }, {
  83223. "url" : "https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E",
  83224. "name" : "[shiro-dev] 20210331 Re: Request for assistance to backport CVE-2020-13933 fix",
  83225. "refsource" : "MLIST",
  83226. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83227. }, {
  83228. "url" : "https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E",
  83229. "name" : "[shiro-dev] 20210407 Re: Request for assistance to backport CVE-2020-13933 fix",
  83230. "refsource" : "MLIST",
  83231. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83232. }, {
  83233. "url" : "https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E",
  83234. "name" : "[shiro-dev] 20210504 Re: Request for assistance to backport CVE-2020-13933 fix",
  83235. "refsource" : "MLIST",
  83236. "tags" : [ ]
  83237. } ]
  83238. },
  83239. "description" : {
  83240. "description_data" : [ {
  83241. "lang" : "en",
  83242. "value" : "Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass."
  83243. } ]
  83244. }
  83245. },
  83246. "configurations" : {
  83247. "CVE_data_version" : "4.0",
  83248. "nodes" : [ {
  83249. "operator" : "OR",
  83250. "children" : [ ],
  83251. "cpe_match" : [ {
  83252. "vulnerable" : true,
  83253. "cpe23Uri" : "cpe:2.3:a:apache:shiro:*:*:*:*:*:*:*:*",
  83254. "versionEndExcluding" : "1.6.0",
  83255. "cpe_name" : [ ]
  83256. } ]
  83257. } ]
  83258. },
  83259. "impact" : {
  83260. "baseMetricV3" : {
  83261. "cvssV3" : {
  83262. "version" : "3.1",
  83263. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  83264. "attackVector" : "NETWORK",
  83265. "attackComplexity" : "LOW",
  83266. "privilegesRequired" : "NONE",
  83267. "userInteraction" : "NONE",
  83268. "scope" : "UNCHANGED",
  83269. "confidentialityImpact" : "HIGH",
  83270. "integrityImpact" : "NONE",
  83271. "availabilityImpact" : "NONE",
  83272. "baseScore" : 7.5,
  83273. "baseSeverity" : "HIGH"
  83274. },
  83275. "exploitabilityScore" : 3.9,
  83276. "impactScore" : 3.6
  83277. },
  83278. "baseMetricV2" : {
  83279. "cvssV2" : {
  83280. "version" : "2.0",
  83281. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  83282. "accessVector" : "NETWORK",
  83283. "accessComplexity" : "LOW",
  83284. "authentication" : "NONE",
  83285. "confidentialityImpact" : "PARTIAL",
  83286. "integrityImpact" : "NONE",
  83287. "availabilityImpact" : "NONE",
  83288. "baseScore" : 5.0
  83289. },
  83290. "severity" : "MEDIUM",
  83291. "exploitabilityScore" : 10.0,
  83292. "impactScore" : 2.9,
  83293. "acInsufInfo" : false,
  83294. "obtainAllPrivilege" : false,
  83295. "obtainUserPrivilege" : false,
  83296. "obtainOtherPrivilege" : false,
  83297. "userInteractionRequired" : false
  83298. }
  83299. },
  83300. "publishedDate" : "2020-08-17T21:15Z",
  83301. "lastModifiedDate" : "2021-05-05T03:15Z"
  83302. }, {
  83303. "cve" : {
  83304. "data_type" : "CVE",
  83305. "data_format" : "MITRE",
  83306. "data_version" : "4.0",
  83307. "CVE_data_meta" : {
  83308. "ID" : "CVE-2020-13285",
  83309. "ASSIGNER" : "cve@gitlab.com"
  83310. },
  83311. "problemtype" : {
  83312. "problemtype_data" : [ {
  83313. "description" : [ {
  83314. "lang" : "en",
  83315. "value" : "CWE-79"
  83316. } ]
  83317. } ]
  83318. },
  83319. "references" : {
  83320. "reference_data" : [ {
  83321. "url" : "https://hackerone.com/reports/831962",
  83322. "name" : "https://hackerone.com/reports/831962",
  83323. "refsource" : "MISC",
  83324. "tags" : [ "Permissions Required", "Third Party Advisory" ]
  83325. }, {
  83326. "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/212626",
  83327. "name" : "https://gitlab.com/gitlab-org/gitlab/-/issues/212626",
  83328. "refsource" : "MISC",
  83329. "tags" : [ "Broken Link" ]
  83330. }, {
  83331. "url" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13285.json",
  83332. "name" : "https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13285.json",
  83333. "refsource" : "CONFIRM",
  83334. "tags" : [ "Third Party Advisory" ]
  83335. } ]
  83336. },
  83337. "description" : {
  83338. "description_data" : [ {
  83339. "lang" : "en",
  83340. "value" : "For GitLab before 13.0.12, 13.1.6, 13.2.3 a cross-site scripting (XSS) vulnerability exists in the issue reference number tooltip."
  83341. } ]
  83342. }
  83343. },
  83344. "configurations" : {
  83345. "CVE_data_version" : "4.0",
  83346. "nodes" : [ {
  83347. "operator" : "OR",
  83348. "children" : [ ],
  83349. "cpe_match" : [ {
  83350. "vulnerable" : true,
  83351. "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
  83352. "versionStartIncluding" : "12.9.0",
  83353. "versionEndExcluding" : "13.0.12",
  83354. "cpe_name" : [ ]
  83355. }, {
  83356. "vulnerable" : true,
  83357. "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
  83358. "versionStartIncluding" : "12.9.0",
  83359. "versionEndExcluding" : "13.0.12",
  83360. "cpe_name" : [ ]
  83361. }, {
  83362. "vulnerable" : true,
  83363. "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
  83364. "versionStartIncluding" : "13.1.0",
  83365. "versionEndExcluding" : "13.1.6",
  83366. "cpe_name" : [ ]
  83367. }, {
  83368. "vulnerable" : true,
  83369. "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
  83370. "versionStartIncluding" : "13.1.0",
  83371. "versionEndExcluding" : "13.1.6",
  83372. "cpe_name" : [ ]
  83373. }, {
  83374. "vulnerable" : true,
  83375. "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
  83376. "versionStartIncluding" : "13.2.0",
  83377. "versionEndExcluding" : "13.2.3",
  83378. "cpe_name" : [ ]
  83379. }, {
  83380. "vulnerable" : true,
  83381. "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
  83382. "versionStartIncluding" : "13.2.0",
  83383. "versionEndExcluding" : "13.2.3",
  83384. "cpe_name" : [ ]
  83385. } ]
  83386. } ]
  83387. },
  83388. "impact" : {
  83389. "baseMetricV3" : {
  83390. "cvssV3" : {
  83391. "version" : "3.1",
  83392. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  83393. "attackVector" : "NETWORK",
  83394. "attackComplexity" : "LOW",
  83395. "privilegesRequired" : "LOW",
  83396. "userInteraction" : "REQUIRED",
  83397. "scope" : "CHANGED",
  83398. "confidentialityImpact" : "LOW",
  83399. "integrityImpact" : "LOW",
  83400. "availabilityImpact" : "NONE",
  83401. "baseScore" : 5.4,
  83402. "baseSeverity" : "MEDIUM"
  83403. },
  83404. "exploitabilityScore" : 2.3,
  83405. "impactScore" : 2.7
  83406. },
  83407. "baseMetricV2" : {
  83408. "cvssV2" : {
  83409. "version" : "2.0",
  83410. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  83411. "accessVector" : "NETWORK",
  83412. "accessComplexity" : "MEDIUM",
  83413. "authentication" : "SINGLE",
  83414. "confidentialityImpact" : "NONE",
  83415. "integrityImpact" : "PARTIAL",
  83416. "availabilityImpact" : "NONE",
  83417. "baseScore" : 3.5
  83418. },
  83419. "severity" : "LOW",
  83420. "exploitabilityScore" : 6.8,
  83421. "impactScore" : 2.9,
  83422. "acInsufInfo" : false,
  83423. "obtainAllPrivilege" : false,
  83424. "obtainUserPrivilege" : false,
  83425. "obtainOtherPrivilege" : false,
  83426. "userInteractionRequired" : true
  83427. }
  83428. },
  83429. "publishedDate" : "2020-08-13T13:15Z",
  83430. "lastModifiedDate" : "2021-05-03T19:15Z"
  83431. }, {
  83432. "cve" : {
  83433. "data_type" : "CVE",
  83434. "data_format" : "MITRE",
  83435. "data_version" : "4.0",
  83436. "CVE_data_meta" : {
  83437. "ID" : "CVE-2020-12460",
  83438. "ASSIGNER" : "cve@mitre.org"
  83439. },
  83440. "problemtype" : {
  83441. "problemtype_data" : [ {
  83442. "description" : [ {
  83443. "lang" : "en",
  83444. "value" : "CWE-787"
  83445. } ]
  83446. } ]
  83447. },
  83448. "references" : {
  83449. "reference_data" : [ {
  83450. "url" : "https://sourceforge.net/projects/opendmarc/",
  83451. "name" : "https://sourceforge.net/projects/opendmarc/",
  83452. "refsource" : "MISC",
  83453. "tags" : [ "Product", "Third Party Advisory" ]
  83454. }, {
  83455. "url" : "https://github.com/trusteddomainproject/OpenDMARC/issues/64",
  83456. "name" : "https://github.com/trusteddomainproject/OpenDMARC/issues/64",
  83457. "refsource" : "MISC",
  83458. "tags" : [ "Exploit", "Third Party Advisory" ]
  83459. }, {
  83460. "url" : "https://security.gentoo.org/glsa/202011-02",
  83461. "name" : "GLSA-202011-02",
  83462. "refsource" : "GENTOO",
  83463. "tags" : [ "Third Party Advisory" ]
  83464. }, {
  83465. "url" : "https://lists.debian.org/debian-lts-announce/2021/04/msg00026.html",
  83466. "name" : "[debian-lts-announce] 20210425 [SECURITY] [DLA 2639-1] opendmarc security update",
  83467. "refsource" : "MLIST",
  83468. "tags" : [ ]
  83469. }, {
  83470. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHDKMCZGE3W4XBP76NLI2Q7IOZHXLD4A/",
  83471. "name" : "FEDORA-2021-c1b846164e",
  83472. "refsource" : "FEDORA",
  83473. "tags" : [ ]
  83474. } ]
  83475. },
  83476. "description" : {
  83477. "description_data" : [ {
  83478. "lang" : "en",
  83479. "value" : "OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\\0' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag."
  83480. } ]
  83481. }
  83482. },
  83483. "configurations" : {
  83484. "CVE_data_version" : "4.0",
  83485. "nodes" : [ {
  83486. "operator" : "OR",
  83487. "children" : [ ],
  83488. "cpe_match" : [ {
  83489. "vulnerable" : true,
  83490. "cpe23Uri" : "cpe:2.3:a:trusteddomain:opendmarc:*:*:*:*:*:*:*:*",
  83491. "versionEndIncluding" : "1.3.2",
  83492. "cpe_name" : [ ]
  83493. }, {
  83494. "vulnerable" : true,
  83495. "cpe23Uri" : "cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta0:*:*:*:*:*:*",
  83496. "cpe_name" : [ ]
  83497. }, {
  83498. "vulnerable" : true,
  83499. "cpe23Uri" : "cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta1:*:*:*:*:*:*",
  83500. "cpe_name" : [ ]
  83501. } ]
  83502. } ]
  83503. },
  83504. "impact" : {
  83505. "baseMetricV3" : {
  83506. "cvssV3" : {
  83507. "version" : "3.1",
  83508. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  83509. "attackVector" : "NETWORK",
  83510. "attackComplexity" : "LOW",
  83511. "privilegesRequired" : "NONE",
  83512. "userInteraction" : "NONE",
  83513. "scope" : "UNCHANGED",
  83514. "confidentialityImpact" : "HIGH",
  83515. "integrityImpact" : "HIGH",
  83516. "availabilityImpact" : "HIGH",
  83517. "baseScore" : 9.8,
  83518. "baseSeverity" : "CRITICAL"
  83519. },
  83520. "exploitabilityScore" : 3.9,
  83521. "impactScore" : 5.9
  83522. },
  83523. "baseMetricV2" : {
  83524. "cvssV2" : {
  83525. "version" : "2.0",
  83526. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  83527. "accessVector" : "NETWORK",
  83528. "accessComplexity" : "LOW",
  83529. "authentication" : "NONE",
  83530. "confidentialityImpact" : "PARTIAL",
  83531. "integrityImpact" : "PARTIAL",
  83532. "availabilityImpact" : "PARTIAL",
  83533. "baseScore" : 7.5
  83534. },
  83535. "severity" : "HIGH",
  83536. "exploitabilityScore" : 10.0,
  83537. "impactScore" : 6.4,
  83538. "acInsufInfo" : false,
  83539. "obtainAllPrivilege" : false,
  83540. "obtainUserPrivilege" : false,
  83541. "obtainOtherPrivilege" : false,
  83542. "userInteractionRequired" : false
  83543. }
  83544. },
  83545. "publishedDate" : "2020-07-27T23:15Z",
  83546. "lastModifiedDate" : "2021-05-08T03:15Z"
  83547. }, {
  83548. "cve" : {
  83549. "data_type" : "CVE",
  83550. "data_format" : "MITRE",
  83551. "data_version" : "4.0",
  83552. "CVE_data_meta" : {
  83553. "ID" : "CVE-2020-9496",
  83554. "ASSIGNER" : "security@apache.org"
  83555. },
  83556. "problemtype" : {
  83557. "problemtype_data" : [ {
  83558. "description" : [ {
  83559. "lang" : "en",
  83560. "value" : "CWE-79"
  83561. } ]
  83562. } ]
  83563. },
  83564. "references" : {
  83565. "reference_data" : [ {
  83566. "url" : "https://s.apache.org/l0994",
  83567. "name" : "https://s.apache.org/l0994",
  83568. "refsource" : "MISC",
  83569. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83570. }, {
  83571. "url" : "https://lists.apache.org/thread.html/raf6020f765f12711e817ce13df63ecd7d677eebea8001e0473ee7c84@%3Cannounce.apache.org%3E",
  83572. "name" : "[announce] 20200715 [CVE-2020-9496] Apache OFBiz XML-RPC requests vulnerable without authentication",
  83573. "refsource" : "MLIST",
  83574. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83575. }, {
  83576. "url" : "https://lists.apache.org/thread.html/rde93e1c91620335b72b798f78ab4459d3f7b06f96031d8ce86a18825@%3Cnotifications.ofbiz.apache.org%3E",
  83577. "name" : "[ofbiz-notifications] 20200716 [jira] [Updated] (OFBIZ-11716) Apache OFBiz unsafe deserialization of XMLRPC arguments (CVE-2020-9496)",
  83578. "refsource" : "MLIST",
  83579. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83580. }, {
  83581. "url" : "http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html",
  83582. "name" : "http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html",
  83583. "refsource" : "MISC",
  83584. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  83585. }, {
  83586. "url" : "https://lists.apache.org/thread.html/r8fb319dc1f196563955fbf5e9cf454fb9d6c27c2058066445af7f8cb@%3Cuser.ofbiz.apache.org%3E",
  83587. "name" : "[ofbiz-user] 20201116 [CVE-2020-9496] Apache OFBiz unsafe deserialization of XMLRPC arguments",
  83588. "refsource" : "MLIST",
  83589. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83590. }, {
  83591. "url" : "https://lists.apache.org/thread.html/ra43cfe80226c3b23cd775f3543da10c035ad9c9943cfe8a680490730@%3Cuser.ofbiz.apache.org%3E",
  83592. "name" : "[ofbiz-user] 20201117 Re: [CVE-2020-9496] Apache OFBiz unsafe deserialization of XMLRPC arguments",
  83593. "refsource" : "MLIST",
  83594. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83595. }, {
  83596. "url" : "http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html",
  83597. "name" : "http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html",
  83598. "refsource" : "MISC",
  83599. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  83600. }, {
  83601. "url" : "https://lists.apache.org/thread.html/r0a0a701610b3bcdf14634047313adab3f1628bb9aa55cf29cd262ef5@%3Ccommits.ofbiz.apache.org%3E",
  83602. "name" : "[ofbiz-commits] 20210321 [ofbiz-site] branch master updated: Updates security page for CVE-2021-26295 fixed in 17.12.06",
  83603. "refsource" : "MLIST",
  83604. "tags" : [ "Mailing List", "Third Party Advisory" ]
  83605. }, {
  83606. "url" : "https://lists.apache.org/thread.html/r108a964764b8bd21ebd32ccd4f51c183ee80a251c105b849154a8e9d@%3Ccommits.ofbiz.apache.org%3E",
  83607. "name" : "[ofbiz-commits] 20210427 [ofbiz-site] branch master updated: Updates security page for CVE-2021-29200 and 30128 fixed in 17.12.07",
  83608. "refsource" : "MLIST",
  83609. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  83610. } ]
  83611. },
  83612. "description" : {
  83613. "description_data" : [ {
  83614. "lang" : "en",
  83615. "value" : "XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03"
  83616. } ]
  83617. }
  83618. },
  83619. "configurations" : {
  83620. "CVE_data_version" : "4.0",
  83621. "nodes" : [ {
  83622. "operator" : "OR",
  83623. "children" : [ ],
  83624. "cpe_match" : [ {
  83625. "vulnerable" : true,
  83626. "cpe23Uri" : "cpe:2.3:a:apache:ofbiz:17.12.03:*:*:*:*:*:*:*",
  83627. "cpe_name" : [ ]
  83628. } ]
  83629. } ]
  83630. },
  83631. "impact" : {
  83632. "baseMetricV3" : {
  83633. "cvssV3" : {
  83634. "version" : "3.1",
  83635. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  83636. "attackVector" : "NETWORK",
  83637. "attackComplexity" : "LOW",
  83638. "privilegesRequired" : "NONE",
  83639. "userInteraction" : "REQUIRED",
  83640. "scope" : "CHANGED",
  83641. "confidentialityImpact" : "LOW",
  83642. "integrityImpact" : "LOW",
  83643. "availabilityImpact" : "NONE",
  83644. "baseScore" : 6.1,
  83645. "baseSeverity" : "MEDIUM"
  83646. },
  83647. "exploitabilityScore" : 2.8,
  83648. "impactScore" : 2.7
  83649. },
  83650. "baseMetricV2" : {
  83651. "cvssV2" : {
  83652. "version" : "2.0",
  83653. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  83654. "accessVector" : "NETWORK",
  83655. "accessComplexity" : "MEDIUM",
  83656. "authentication" : "NONE",
  83657. "confidentialityImpact" : "NONE",
  83658. "integrityImpact" : "PARTIAL",
  83659. "availabilityImpact" : "NONE",
  83660. "baseScore" : 4.3
  83661. },
  83662. "severity" : "MEDIUM",
  83663. "exploitabilityScore" : 8.6,
  83664. "impactScore" : 2.9,
  83665. "acInsufInfo" : false,
  83666. "obtainAllPrivilege" : false,
  83667. "obtainUserPrivilege" : false,
  83668. "obtainOtherPrivilege" : false,
  83669. "userInteractionRequired" : true
  83670. }
  83671. },
  83672. "publishedDate" : "2020-07-15T16:15Z",
  83673. "lastModifiedDate" : "2021-05-05T14:01Z"
  83674. }, {
  83675. "cve" : {
  83676. "data_type" : "CVE",
  83677. "data_format" : "MITRE",
  83678. "data_version" : "4.0",
  83679. "CVE_data_meta" : {
  83680. "ID" : "CVE-2020-13923",
  83681. "ASSIGNER" : "security@apache.org"
  83682. },
  83683. "problemtype" : {
  83684. "problemtype_data" : [ {
  83685. "description" : [ {
  83686. "lang" : "en",
  83687. "value" : "CWE-20"
  83688. } ]
  83689. } ]
  83690. },
  83691. "references" : {
  83692. "reference_data" : [ {
  83693. "url" : "https://s.apache.org/chokl",
  83694. "name" : "https://s.apache.org/chokl",
  83695. "refsource" : "MISC",
  83696. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83697. }, {
  83698. "url" : "https://lists.apache.org/thread.html/r2e669797c1ea08562253239d2dc4192d951945e0c36cb0754f5394a6@%3Cannounce.apache.org%3E",
  83699. "name" : "[announce] 20200715 [CVE-2020-13923] IDOR in Apache OFBiz",
  83700. "refsource" : "MLIST",
  83701. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83702. }, {
  83703. "url" : "https://lists.apache.org/thread.html/rac7e36c3daa60dd4b813f72942921b4fad71da821480ebcea96ecea1@%3Cnotifications.ofbiz.apache.org%3E",
  83704. "name" : "[ofbiz-notifications] 20200716 [jira] [Updated] (OFBIZ-11836) IDOR vulnerability in the order processing feature in ecommerce component (CVE-2020-13923)",
  83705. "refsource" : "MLIST",
  83706. "tags" : [ "Mailing List", "Vendor Advisory" ]
  83707. }, {
  83708. "url" : "https://lists.apache.org/thread.html/r0a0a701610b3bcdf14634047313adab3f1628bb9aa55cf29cd262ef5@%3Ccommits.ofbiz.apache.org%3E",
  83709. "name" : "[ofbiz-commits] 20210321 [ofbiz-site] branch master updated: Updates security page for CVE-2021-26295 fixed in 17.12.06",
  83710. "refsource" : "MLIST",
  83711. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  83712. }, {
  83713. "url" : "https://lists.apache.org/thread.html/r108a964764b8bd21ebd32ccd4f51c183ee80a251c105b849154a8e9d@%3Ccommits.ofbiz.apache.org%3E",
  83714. "name" : "[ofbiz-commits] 20210427 [ofbiz-site] branch master updated: Updates security page for CVE-2021-29200 and 30128 fixed in 17.12.07",
  83715. "refsource" : "MLIST",
  83716. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  83717. } ]
  83718. },
  83719. "description" : {
  83720. "description_data" : [ {
  83721. "lang" : "en",
  83722. "value" : "IDOR vulnerability in the order processing feature from ecommerce component of Apache OFBiz before 17.12.04"
  83723. } ]
  83724. }
  83725. },
  83726. "configurations" : {
  83727. "CVE_data_version" : "4.0",
  83728. "nodes" : [ {
  83729. "operator" : "OR",
  83730. "children" : [ ],
  83731. "cpe_match" : [ {
  83732. "vulnerable" : true,
  83733. "cpe23Uri" : "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*",
  83734. "versionEndExcluding" : "17.12.04",
  83735. "cpe_name" : [ ]
  83736. } ]
  83737. } ]
  83738. },
  83739. "impact" : {
  83740. "baseMetricV3" : {
  83741. "cvssV3" : {
  83742. "version" : "3.1",
  83743. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
  83744. "attackVector" : "NETWORK",
  83745. "attackComplexity" : "LOW",
  83746. "privilegesRequired" : "NONE",
  83747. "userInteraction" : "NONE",
  83748. "scope" : "UNCHANGED",
  83749. "confidentialityImpact" : "NONE",
  83750. "integrityImpact" : "LOW",
  83751. "availabilityImpact" : "NONE",
  83752. "baseScore" : 5.3,
  83753. "baseSeverity" : "MEDIUM"
  83754. },
  83755. "exploitabilityScore" : 3.9,
  83756. "impactScore" : 1.4
  83757. },
  83758. "baseMetricV2" : {
  83759. "cvssV2" : {
  83760. "version" : "2.0",
  83761. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  83762. "accessVector" : "NETWORK",
  83763. "accessComplexity" : "LOW",
  83764. "authentication" : "NONE",
  83765. "confidentialityImpact" : "NONE",
  83766. "integrityImpact" : "PARTIAL",
  83767. "availabilityImpact" : "NONE",
  83768. "baseScore" : 5.0
  83769. },
  83770. "severity" : "MEDIUM",
  83771. "exploitabilityScore" : 10.0,
  83772. "impactScore" : 2.9,
  83773. "acInsufInfo" : false,
  83774. "obtainAllPrivilege" : false,
  83775. "obtainUserPrivilege" : false,
  83776. "obtainOtherPrivilege" : false,
  83777. "userInteractionRequired" : false
  83778. }
  83779. },
  83780. "publishedDate" : "2020-07-15T16:15Z",
  83781. "lastModifiedDate" : "2021-05-03T20:37Z"
  83782. }, {
  83783. "cve" : {
  83784. "data_type" : "CVE",
  83785. "data_format" : "MITRE",
  83786. "data_version" : "4.0",
  83787. "CVE_data_meta" : {
  83788. "ID" : "CVE-2020-14295",
  83789. "ASSIGNER" : "cve@mitre.org"
  83790. },
  83791. "problemtype" : {
  83792. "problemtype_data" : [ {
  83793. "description" : [ {
  83794. "lang" : "en",
  83795. "value" : "CWE-89"
  83796. } ]
  83797. } ]
  83798. },
  83799. "references" : {
  83800. "reference_data" : [ {
  83801. "url" : "https://github.com/Cacti/cacti/issues/3622",
  83802. "name" : "https://github.com/Cacti/cacti/issues/3622",
  83803. "refsource" : "MISC",
  83804. "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
  83805. }, {
  83806. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W64CIB6L4HZRVQSWKPDDKXJO4J2XTOXD/",
  83807. "name" : "FEDORA-2020-7dddce530c",
  83808. "refsource" : "FEDORA",
  83809. "tags" : [ "Third Party Advisory" ]
  83810. }, {
  83811. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKM5G3YNSZDHDZMPCMAHG5B5M2V4XYSE/",
  83812. "name" : "FEDORA-2020-8a15713da2",
  83813. "refsource" : "FEDORA",
  83814. "tags" : [ "Third Party Advisory" ]
  83815. }, {
  83816. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html",
  83817. "name" : "openSUSE-SU-2020:1060",
  83818. "refsource" : "SUSE",
  83819. "tags" : [ "Broken Link" ]
  83820. }, {
  83821. "url" : "https://security.gentoo.org/glsa/202007-03",
  83822. "name" : "GLSA-202007-03",
  83823. "refsource" : "GENTOO",
  83824. "tags" : [ "Third Party Advisory" ]
  83825. }, {
  83826. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html",
  83827. "name" : "openSUSE-SU-2020:1106",
  83828. "refsource" : "SUSE",
  83829. "tags" : [ "Broken Link" ]
  83830. }, {
  83831. "url" : "http://packetstormsecurity.com/files/162384/Cacti-1.2.12-SQL-Injection-Remote-Code-Execution.html",
  83832. "name" : "http://packetstormsecurity.com/files/162384/Cacti-1.2.12-SQL-Injection-Remote-Code-Execution.html",
  83833. "refsource" : "MISC",
  83834. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  83835. } ]
  83836. },
  83837. "description" : {
  83838. "description_data" : [ {
  83839. "lang" : "en",
  83840. "value" : "A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries."
  83841. } ]
  83842. }
  83843. },
  83844. "configurations" : {
  83845. "CVE_data_version" : "4.0",
  83846. "nodes" : [ {
  83847. "operator" : "OR",
  83848. "children" : [ ],
  83849. "cpe_match" : [ {
  83850. "vulnerable" : true,
  83851. "cpe23Uri" : "cpe:2.3:a:cacti:cacti:1.2.12:*:*:*:*:*:*:*",
  83852. "cpe_name" : [ ]
  83853. } ]
  83854. }, {
  83855. "operator" : "OR",
  83856. "children" : [ ],
  83857. "cpe_match" : [ {
  83858. "vulnerable" : true,
  83859. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
  83860. "cpe_name" : [ ]
  83861. }, {
  83862. "vulnerable" : true,
  83863. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  83864. "cpe_name" : [ ]
  83865. } ]
  83866. } ]
  83867. },
  83868. "impact" : {
  83869. "baseMetricV3" : {
  83870. "cvssV3" : {
  83871. "version" : "3.1",
  83872. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  83873. "attackVector" : "NETWORK",
  83874. "attackComplexity" : "LOW",
  83875. "privilegesRequired" : "HIGH",
  83876. "userInteraction" : "NONE",
  83877. "scope" : "UNCHANGED",
  83878. "confidentialityImpact" : "HIGH",
  83879. "integrityImpact" : "HIGH",
  83880. "availabilityImpact" : "HIGH",
  83881. "baseScore" : 7.2,
  83882. "baseSeverity" : "HIGH"
  83883. },
  83884. "exploitabilityScore" : 1.2,
  83885. "impactScore" : 5.9
  83886. },
  83887. "baseMetricV2" : {
  83888. "cvssV2" : {
  83889. "version" : "2.0",
  83890. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  83891. "accessVector" : "NETWORK",
  83892. "accessComplexity" : "LOW",
  83893. "authentication" : "SINGLE",
  83894. "confidentialityImpact" : "PARTIAL",
  83895. "integrityImpact" : "PARTIAL",
  83896. "availabilityImpact" : "PARTIAL",
  83897. "baseScore" : 6.5
  83898. },
  83899. "severity" : "MEDIUM",
  83900. "exploitabilityScore" : 8.0,
  83901. "impactScore" : 6.4,
  83902. "acInsufInfo" : false,
  83903. "obtainAllPrivilege" : false,
  83904. "obtainUserPrivilege" : false,
  83905. "obtainOtherPrivilege" : false,
  83906. "userInteractionRequired" : false
  83907. }
  83908. },
  83909. "publishedDate" : "2020-06-17T14:15Z",
  83910. "lastModifiedDate" : "2021-05-04T14:04Z"
  83911. }, {
  83912. "cve" : {
  83913. "data_type" : "CVE",
  83914. "data_format" : "MITRE",
  83915. "data_version" : "4.0",
  83916. "CVE_data_meta" : {
  83917. "ID" : "CVE-2020-9817",
  83918. "ASSIGNER" : "product-security@apple.com"
  83919. },
  83920. "problemtype" : {
  83921. "problemtype_data" : [ {
  83922. "description" : [ {
  83923. "lang" : "en",
  83924. "value" : "CWE-276"
  83925. } ]
  83926. } ]
  83927. },
  83928. "references" : {
  83929. "reference_data" : [ {
  83930. "url" : "https://support.apple.com/HT211170",
  83931. "name" : "https://support.apple.com/HT211170",
  83932. "refsource" : "MISC",
  83933. "tags" : [ "Release Notes", "Vendor Advisory" ]
  83934. }, {
  83935. "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-mac-priv-esc-VqST2nrT",
  83936. "name" : "20210505 MacOS Local Privilege Escalation Exploitable through Cisco AnyConnect Secure Mobility Client",
  83937. "refsource" : "CISCO",
  83938. "tags" : [ ]
  83939. } ]
  83940. },
  83941. "description" : {
  83942. "description_data" : [ {
  83943. "lang" : "en",
  83944. "value" : "A permissions issue existed. This issue was addressed with improved permission validation. This issue is fixed in macOS Catalina 10.15.5. A malicious application may be able to gain root privileges."
  83945. } ]
  83946. }
  83947. },
  83948. "configurations" : {
  83949. "CVE_data_version" : "4.0",
  83950. "nodes" : [ {
  83951. "operator" : "OR",
  83952. "children" : [ ],
  83953. "cpe_match" : [ {
  83954. "vulnerable" : true,
  83955. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  83956. "versionEndExcluding" : "10.15.5",
  83957. "cpe_name" : [ ]
  83958. } ]
  83959. } ]
  83960. },
  83961. "impact" : {
  83962. "baseMetricV3" : {
  83963. "cvssV3" : {
  83964. "version" : "3.1",
  83965. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  83966. "attackVector" : "LOCAL",
  83967. "attackComplexity" : "LOW",
  83968. "privilegesRequired" : "NONE",
  83969. "userInteraction" : "REQUIRED",
  83970. "scope" : "UNCHANGED",
  83971. "confidentialityImpact" : "HIGH",
  83972. "integrityImpact" : "HIGH",
  83973. "availabilityImpact" : "HIGH",
  83974. "baseScore" : 7.8,
  83975. "baseSeverity" : "HIGH"
  83976. },
  83977. "exploitabilityScore" : 1.8,
  83978. "impactScore" : 5.9
  83979. },
  83980. "baseMetricV2" : {
  83981. "cvssV2" : {
  83982. "version" : "2.0",
  83983. "vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C",
  83984. "accessVector" : "NETWORK",
  83985. "accessComplexity" : "MEDIUM",
  83986. "authentication" : "NONE",
  83987. "confidentialityImpact" : "COMPLETE",
  83988. "integrityImpact" : "COMPLETE",
  83989. "availabilityImpact" : "COMPLETE",
  83990. "baseScore" : 9.3
  83991. },
  83992. "severity" : "HIGH",
  83993. "exploitabilityScore" : 8.6,
  83994. "impactScore" : 10.0,
  83995. "acInsufInfo" : false,
  83996. "obtainAllPrivilege" : false,
  83997. "obtainUserPrivilege" : false,
  83998. "obtainOtherPrivilege" : false,
  83999. "userInteractionRequired" : true
  84000. }
  84001. },
  84002. "publishedDate" : "2020-06-09T17:15Z",
  84003. "lastModifiedDate" : "2021-05-05T18:15Z"
  84004. }, {
  84005. "cve" : {
  84006. "data_type" : "CVE",
  84007. "data_format" : "MITRE",
  84008. "data_version" : "4.0",
  84009. "CVE_data_meta" : {
  84010. "ID" : "CVE-2020-8555",
  84011. "ASSIGNER" : "security@kubernetes.io"
  84012. },
  84013. "problemtype" : {
  84014. "problemtype_data" : [ {
  84015. "description" : [ {
  84016. "lang" : "en",
  84017. "value" : "CWE-918"
  84018. } ]
  84019. } ]
  84020. },
  84021. "references" : {
  84022. "reference_data" : [ {
  84023. "url" : "https://groups.google.com/d/topic/kubernetes-security-announce/kEK27tqqs30/discussion",
  84024. "name" : "N/A",
  84025. "refsource" : "MLIST",
  84026. "tags" : [ "Mailing List", "Third Party Advisory" ]
  84027. }, {
  84028. "url" : "https://github.com/kubernetes/kubernetes/issues/91542",
  84029. "name" : "https://github.com/kubernetes/kubernetes/issues/91542",
  84030. "refsource" : "CONFIRM",
  84031. "tags" : [ "Third Party Advisory" ]
  84032. }, {
  84033. "url" : "http://www.openwall.com/lists/oss-security/2020/06/01/4",
  84034. "name" : "[oss-security] 20200601 CVE-2020-8555: Kubernetes: Half-Blind SSRF in kube-controller-manager",
  84035. "refsource" : "MLIST",
  84036. "tags" : [ ]
  84037. }, {
  84038. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/",
  84039. "name" : "FEDORA-2020-aeea04cd13",
  84040. "refsource" : "FEDORA",
  84041. "tags" : [ ]
  84042. }, {
  84043. "url" : "https://security.netapp.com/advisory/ntap-20200724-0005/",
  84044. "name" : "https://security.netapp.com/advisory/ntap-20200724-0005/",
  84045. "refsource" : "CONFIRM",
  84046. "tags" : [ ]
  84047. }, {
  84048. "url" : "http://www.openwall.com/lists/oss-security/2021/05/04/8",
  84049. "name" : "[oss-security] 20210504 [kubernetes] CVE-2020-8562: Bypass of Kubernetes API Server proxy TOCTOU",
  84050. "refsource" : "MLIST",
  84051. "tags" : [ ]
  84052. } ]
  84053. },
  84054. "description" : {
  84055. "description_data" : [ {
  84056. "lang" : "en",
  84057. "value" : "The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services)."
  84058. } ]
  84059. }
  84060. },
  84061. "configurations" : {
  84062. "CVE_data_version" : "4.0",
  84063. "nodes" : [ {
  84064. "operator" : "OR",
  84065. "children" : [ ],
  84066. "cpe_match" : [ {
  84067. "vulnerable" : true,
  84068. "cpe23Uri" : "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
  84069. "versionEndExcluding" : "1.15.11",
  84070. "cpe_name" : [ ]
  84071. }, {
  84072. "vulnerable" : true,
  84073. "cpe23Uri" : "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
  84074. "versionStartIncluding" : "1.16.0",
  84075. "versionEndExcluding" : "1.16.9",
  84076. "cpe_name" : [ ]
  84077. }, {
  84078. "vulnerable" : true,
  84079. "cpe23Uri" : "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
  84080. "versionStartIncluding" : "1.17.0",
  84081. "versionEndExcluding" : "1.17.5",
  84082. "cpe_name" : [ ]
  84083. }, {
  84084. "vulnerable" : true,
  84085. "cpe23Uri" : "cpe:2.3:a:kubernetes:kubernetes:1.18.0:-:*:*:*:*:*:*",
  84086. "cpe_name" : [ ]
  84087. } ]
  84088. } ]
  84089. },
  84090. "impact" : {
  84091. "baseMetricV3" : {
  84092. "cvssV3" : {
  84093. "version" : "3.1",
  84094. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
  84095. "attackVector" : "NETWORK",
  84096. "attackComplexity" : "HIGH",
  84097. "privilegesRequired" : "LOW",
  84098. "userInteraction" : "NONE",
  84099. "scope" : "CHANGED",
  84100. "confidentialityImpact" : "HIGH",
  84101. "integrityImpact" : "NONE",
  84102. "availabilityImpact" : "NONE",
  84103. "baseScore" : 6.3,
  84104. "baseSeverity" : "MEDIUM"
  84105. },
  84106. "exploitabilityScore" : 1.8,
  84107. "impactScore" : 4.0
  84108. },
  84109. "baseMetricV2" : {
  84110. "cvssV2" : {
  84111. "version" : "2.0",
  84112. "vectorString" : "AV:N/AC:M/Au:S/C:P/I:N/A:N",
  84113. "accessVector" : "NETWORK",
  84114. "accessComplexity" : "MEDIUM",
  84115. "authentication" : "SINGLE",
  84116. "confidentialityImpact" : "PARTIAL",
  84117. "integrityImpact" : "NONE",
  84118. "availabilityImpact" : "NONE",
  84119. "baseScore" : 3.5
  84120. },
  84121. "severity" : "LOW",
  84122. "exploitabilityScore" : 6.8,
  84123. "impactScore" : 2.9,
  84124. "acInsufInfo" : false,
  84125. "obtainAllPrivilege" : false,
  84126. "obtainUserPrivilege" : false,
  84127. "obtainOtherPrivilege" : false,
  84128. "userInteractionRequired" : false
  84129. }
  84130. },
  84131. "publishedDate" : "2020-06-05T17:15Z",
  84132. "lastModifiedDate" : "2021-05-04T21:15Z"
  84133. }, {
  84134. "cve" : {
  84135. "data_type" : "CVE",
  84136. "data_format" : "MITRE",
  84137. "data_version" : "4.0",
  84138. "CVE_data_meta" : {
  84139. "ID" : "CVE-2020-11975",
  84140. "ASSIGNER" : "security@apache.org"
  84141. },
  84142. "problemtype" : {
  84143. "problemtype_data" : [ {
  84144. "description" : [ {
  84145. "lang" : "en",
  84146. "value" : "CWE-20"
  84147. } ]
  84148. } ]
  84149. },
  84150. "references" : {
  84151. "reference_data" : [ {
  84152. "url" : "http://unomi.apache.org/security/cve-2020-11975.txt",
  84153. "name" : "http://unomi.apache.org/security/cve-2020-11975.txt",
  84154. "refsource" : "MISC",
  84155. "tags" : [ "Patch", "Vendor Advisory" ]
  84156. }, {
  84157. "url" : "https://lists.apache.org/thread.html/r01021bc4b25c1e98812efca0b07f0e078a6281bd52f7c3817a429d95@%3Ccommits.unomi.apache.org%3E",
  84158. "name" : "[unomi-commits] 20201113 svn commit: r1883398 - in /unomi/website: contribute-release-guide.html documentation.html download.html index.html security/cve-2020-13942.txt",
  84159. "refsource" : "MLIST",
  84160. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  84161. }, {
  84162. "url" : "https://lists.apache.org/thread.html/r79672c25e0ef9bb4b9148376281200a8e61c6d5ef5bb705e9a363460@%3Ccommits.unomi.apache.org%3E",
  84163. "name" : "[unomi-commits] 20210428 svn commit: r1889256 - in /unomi/website: contribute-release-guide.html documentation.html download.html index.html security/cve-2021-31164.txt",
  84164. "refsource" : "MLIST",
  84165. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  84166. } ]
  84167. },
  84168. "description" : {
  84169. "description_data" : [ {
  84170. "lang" : "en",
  84171. "value" : "Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process."
  84172. } ]
  84173. }
  84174. },
  84175. "configurations" : {
  84176. "CVE_data_version" : "4.0",
  84177. "nodes" : [ {
  84178. "operator" : "OR",
  84179. "children" : [ ],
  84180. "cpe_match" : [ {
  84181. "vulnerable" : true,
  84182. "cpe23Uri" : "cpe:2.3:a:apache:unomi:*:*:*:*:*:*:*:*",
  84183. "versionEndExcluding" : "1.5.1",
  84184. "cpe_name" : [ ]
  84185. } ]
  84186. } ]
  84187. },
  84188. "impact" : {
  84189. "baseMetricV3" : {
  84190. "cvssV3" : {
  84191. "version" : "3.1",
  84192. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  84193. "attackVector" : "NETWORK",
  84194. "attackComplexity" : "LOW",
  84195. "privilegesRequired" : "NONE",
  84196. "userInteraction" : "NONE",
  84197. "scope" : "UNCHANGED",
  84198. "confidentialityImpact" : "HIGH",
  84199. "integrityImpact" : "HIGH",
  84200. "availabilityImpact" : "HIGH",
  84201. "baseScore" : 9.8,
  84202. "baseSeverity" : "CRITICAL"
  84203. },
  84204. "exploitabilityScore" : 3.9,
  84205. "impactScore" : 5.9
  84206. },
  84207. "baseMetricV2" : {
  84208. "cvssV2" : {
  84209. "version" : "2.0",
  84210. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  84211. "accessVector" : "NETWORK",
  84212. "accessComplexity" : "LOW",
  84213. "authentication" : "NONE",
  84214. "confidentialityImpact" : "COMPLETE",
  84215. "integrityImpact" : "COMPLETE",
  84216. "availabilityImpact" : "COMPLETE",
  84217. "baseScore" : 10.0
  84218. },
  84219. "severity" : "HIGH",
  84220. "exploitabilityScore" : 10.0,
  84221. "impactScore" : 10.0,
  84222. "acInsufInfo" : false,
  84223. "obtainAllPrivilege" : false,
  84224. "obtainUserPrivilege" : false,
  84225. "obtainOtherPrivilege" : false,
  84226. "userInteractionRequired" : false
  84227. }
  84228. },
  84229. "publishedDate" : "2020-06-05T15:15Z",
  84230. "lastModifiedDate" : "2021-05-03T20:37Z"
  84231. }, {
  84232. "cve" : {
  84233. "data_type" : "CVE",
  84234. "data_format" : "MITRE",
  84235. "data_version" : "4.0",
  84236. "CVE_data_meta" : {
  84237. "ID" : "CVE-2020-10749",
  84238. "ASSIGNER" : "secalert@redhat.com"
  84239. },
  84240. "problemtype" : {
  84241. "problemtype_data" : [ {
  84242. "description" : [ {
  84243. "lang" : "en",
  84244. "value" : "NVD-CWE-Other"
  84245. } ]
  84246. } ]
  84247. },
  84248. "references" : {
  84249. "reference_data" : [ {
  84250. "url" : "https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8",
  84251. "name" : "https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8",
  84252. "refsource" : "MISC",
  84253. "tags" : [ "Mailing List", "Third Party Advisory" ]
  84254. }, {
  84255. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10749",
  84256. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10749",
  84257. "refsource" : "CONFIRM",
  84258. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  84259. }, {
  84260. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00063.html",
  84261. "name" : "openSUSE-SU-2020:1049",
  84262. "refsource" : "SUSE",
  84263. "tags" : [ "Broken Link", "Third Party Advisory" ]
  84264. }, {
  84265. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00065.html",
  84266. "name" : "openSUSE-SU-2020:1050",
  84267. "refsource" : "SUSE",
  84268. "tags" : [ "Broken Link", "Third Party Advisory" ]
  84269. }, {
  84270. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DV3HCDZYUTPPVDUMTZXDKK6IUO3JMGJC/",
  84271. "name" : "FEDORA-2021-ccb8a9c403",
  84272. "refsource" : "FEDORA",
  84273. "tags" : [ "Third Party Advisory" ]
  84274. } ]
  84275. },
  84276. "description" : {
  84277. "description_data" : [ {
  84278. "lang" : "en",
  84279. "value" : "A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending rogue IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container."
  84280. } ]
  84281. }
  84282. },
  84283. "configurations" : {
  84284. "CVE_data_version" : "4.0",
  84285. "nodes" : [ {
  84286. "operator" : "OR",
  84287. "children" : [ ],
  84288. "cpe_match" : [ {
  84289. "vulnerable" : true,
  84290. "cpe23Uri" : "cpe:2.3:a:cncf:cni_network_plugins:*:*:*:*:*:*:*:*",
  84291. "versionEndExcluding" : "0.8.6",
  84292. "cpe_name" : [ ]
  84293. } ]
  84294. }, {
  84295. "operator" : "OR",
  84296. "children" : [ ],
  84297. "cpe_match" : [ {
  84298. "vulnerable" : true,
  84299. "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
  84300. "cpe_name" : [ ]
  84301. }, {
  84302. "vulnerable" : true,
  84303. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  84304. "cpe_name" : [ ]
  84305. }, {
  84306. "vulnerable" : true,
  84307. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
  84308. "cpe_name" : [ ]
  84309. }, {
  84310. "vulnerable" : true,
  84311. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
  84312. "cpe_name" : [ ]
  84313. } ]
  84314. } ]
  84315. },
  84316. "impact" : {
  84317. "baseMetricV3" : {
  84318. "cvssV3" : {
  84319. "version" : "3.1",
  84320. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
  84321. "attackVector" : "NETWORK",
  84322. "attackComplexity" : "HIGH",
  84323. "privilegesRequired" : "LOW",
  84324. "userInteraction" : "NONE",
  84325. "scope" : "CHANGED",
  84326. "confidentialityImpact" : "LOW",
  84327. "integrityImpact" : "LOW",
  84328. "availabilityImpact" : "LOW",
  84329. "baseScore" : 6.0,
  84330. "baseSeverity" : "MEDIUM"
  84331. },
  84332. "exploitabilityScore" : 1.8,
  84333. "impactScore" : 3.7
  84334. },
  84335. "baseMetricV2" : {
  84336. "cvssV2" : {
  84337. "version" : "2.0",
  84338. "vectorString" : "AV:N/AC:M/Au:S/C:P/I:P/A:P",
  84339. "accessVector" : "NETWORK",
  84340. "accessComplexity" : "MEDIUM",
  84341. "authentication" : "SINGLE",
  84342. "confidentialityImpact" : "PARTIAL",
  84343. "integrityImpact" : "PARTIAL",
  84344. "availabilityImpact" : "PARTIAL",
  84345. "baseScore" : 6.0
  84346. },
  84347. "severity" : "MEDIUM",
  84348. "exploitabilityScore" : 6.8,
  84349. "impactScore" : 6.4,
  84350. "acInsufInfo" : false,
  84351. "obtainAllPrivilege" : false,
  84352. "obtainUserPrivilege" : false,
  84353. "obtainOtherPrivilege" : false,
  84354. "userInteractionRequired" : false
  84355. }
  84356. },
  84357. "publishedDate" : "2020-06-03T14:15Z",
  84358. "lastModifiedDate" : "2021-05-05T13:57Z"
  84359. }, {
  84360. "cve" : {
  84361. "data_type" : "CVE",
  84362. "data_format" : "MITRE",
  84363. "data_version" : "4.0",
  84364. "CVE_data_meta" : {
  84365. "ID" : "CVE-2020-13614",
  84366. "ASSIGNER" : "cve@mitre.org"
  84367. },
  84368. "problemtype" : {
  84369. "problemtype_data" : [ {
  84370. "description" : [ {
  84371. "lang" : "en",
  84372. "value" : "CWE-295"
  84373. } ]
  84374. } ]
  84375. },
  84376. "references" : {
  84377. "reference_data" : [ {
  84378. "url" : "https://github.com/axel-download-accelerator/axel/issues/262",
  84379. "name" : "https://github.com/axel-download-accelerator/axel/issues/262",
  84380. "refsource" : "MISC",
  84381. "tags" : [ "Exploit", "Third Party Advisory" ]
  84382. }, {
  84383. "url" : "https://github.com/axel-download-accelerator/axel/releases/tag/v2.17.8",
  84384. "name" : "https://github.com/axel-download-accelerator/axel/releases/tag/v2.17.8",
  84385. "refsource" : "MISC",
  84386. "tags" : [ "Release Notes", "Third Party Advisory" ]
  84387. }, {
  84388. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00006.html",
  84389. "name" : "openSUSE-SU-2020:0778",
  84390. "refsource" : "SUSE",
  84391. "tags" : [ ]
  84392. }, {
  84393. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00010.html",
  84394. "name" : "openSUSE-SU-2020:0785",
  84395. "refsource" : "SUSE",
  84396. "tags" : [ ]
  84397. }, {
  84398. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3ECAKIZA2TGBYLUQTLGRMXUFIOGRHG3/",
  84399. "name" : "FEDORA-2021-90b4716992",
  84400. "refsource" : "FEDORA",
  84401. "tags" : [ ]
  84402. }, {
  84403. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPZUQSDGV5XDBJGHBWBHWJIBE47Q4QIB/",
  84404. "name" : "FEDORA-2021-5214bd8f14",
  84405. "refsource" : "FEDORA",
  84406. "tags" : [ ]
  84407. } ]
  84408. },
  84409. "description" : {
  84410. "description_data" : [ {
  84411. "lang" : "en",
  84412. "value" : "An issue was discovered in ssl.c in Axel before 2.17.8. The TLS implementation lacks hostname verification."
  84413. } ]
  84414. }
  84415. },
  84416. "configurations" : {
  84417. "CVE_data_version" : "4.0",
  84418. "nodes" : [ {
  84419. "operator" : "OR",
  84420. "children" : [ ],
  84421. "cpe_match" : [ {
  84422. "vulnerable" : true,
  84423. "cpe23Uri" : "cpe:2.3:a:axel_project:axel:*:*:*:*:*:*:*:*",
  84424. "versionEndExcluding" : "2.17.8",
  84425. "cpe_name" : [ ]
  84426. } ]
  84427. } ]
  84428. },
  84429. "impact" : {
  84430. "baseMetricV3" : {
  84431. "cvssV3" : {
  84432. "version" : "3.1",
  84433. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
  84434. "attackVector" : "NETWORK",
  84435. "attackComplexity" : "HIGH",
  84436. "privilegesRequired" : "NONE",
  84437. "userInteraction" : "NONE",
  84438. "scope" : "UNCHANGED",
  84439. "confidentialityImpact" : "HIGH",
  84440. "integrityImpact" : "NONE",
  84441. "availabilityImpact" : "NONE",
  84442. "baseScore" : 5.9,
  84443. "baseSeverity" : "MEDIUM"
  84444. },
  84445. "exploitabilityScore" : 2.2,
  84446. "impactScore" : 3.6
  84447. },
  84448. "baseMetricV2" : {
  84449. "cvssV2" : {
  84450. "version" : "2.0",
  84451. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:N/A:N",
  84452. "accessVector" : "NETWORK",
  84453. "accessComplexity" : "MEDIUM",
  84454. "authentication" : "NONE",
  84455. "confidentialityImpact" : "PARTIAL",
  84456. "integrityImpact" : "NONE",
  84457. "availabilityImpact" : "NONE",
  84458. "baseScore" : 4.3
  84459. },
  84460. "severity" : "MEDIUM",
  84461. "exploitabilityScore" : 8.6,
  84462. "impactScore" : 2.9,
  84463. "acInsufInfo" : false,
  84464. "obtainAllPrivilege" : false,
  84465. "obtainUserPrivilege" : false,
  84466. "obtainOtherPrivilege" : false,
  84467. "userInteractionRequired" : false
  84468. }
  84469. },
  84470. "publishedDate" : "2020-05-26T23:15Z",
  84471. "lastModifiedDate" : "2021-05-05T03:15Z"
  84472. }, {
  84473. "cve" : {
  84474. "data_type" : "CVE",
  84475. "data_format" : "MITRE",
  84476. "data_version" : "4.0",
  84477. "CVE_data_meta" : {
  84478. "ID" : "CVE-2020-10724",
  84479. "ASSIGNER" : "secalert@redhat.com"
  84480. },
  84481. "problemtype" : {
  84482. "problemtype_data" : [ {
  84483. "description" : [ {
  84484. "lang" : "en",
  84485. "value" : "CWE-190"
  84486. } ]
  84487. } ]
  84488. },
  84489. "references" : {
  84490. "reference_data" : [ {
  84491. "url" : "https://bugs.dpdk.org/show_bug.cgi?id=269",
  84492. "name" : "https://bugs.dpdk.org/show_bug.cgi?id=269",
  84493. "refsource" : "MISC",
  84494. "tags" : [ "Issue Tracking", "Patch", "Vendor Advisory" ]
  84495. }, {
  84496. "url" : "https://www.openwall.com/lists/oss-security/2020/05/18/2",
  84497. "name" : "https://www.openwall.com/lists/oss-security/2020/05/18/2",
  84498. "refsource" : "MISC",
  84499. "tags" : [ "Mailing List", "Third Party Advisory" ]
  84500. }, {
  84501. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10724",
  84502. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10724",
  84503. "refsource" : "CONFIRM",
  84504. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  84505. }, {
  84506. "url" : "https://usn.ubuntu.com/4362-1/",
  84507. "name" : "USN-4362-1",
  84508. "refsource" : "UBUNTU",
  84509. "tags" : [ "Third Party Advisory" ]
  84510. }, {
  84511. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html",
  84512. "name" : "openSUSE-SU-2020:0693",
  84513. "refsource" : "SUSE",
  84514. "tags" : [ "Broken Link", "Third Party Advisory" ]
  84515. }, {
  84516. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/",
  84517. "name" : "FEDORA-2020-04e3d34451",
  84518. "refsource" : "FEDORA",
  84519. "tags" : [ "Third Party Advisory" ]
  84520. }, {
  84521. "url" : "https://www.oracle.com/security-alerts/cpuoct2020.html",
  84522. "name" : "https://www.oracle.com/security-alerts/cpuoct2020.html",
  84523. "refsource" : "MISC",
  84524. "tags" : [ "Third Party Advisory" ]
  84525. }, {
  84526. "url" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  84527. "name" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  84528. "refsource" : "MISC",
  84529. "tags" : [ "Third Party Advisory" ]
  84530. } ]
  84531. },
  84532. "description" : {
  84533. "description_data" : [ {
  84534. "lang" : "en",
  84535. "value" : "A vulnerability was found in DPDK versions 18.11 and above. The vhost-crypto library code is missing validations for user-supplied values, potentially allowing an information leak through an out-of-bounds memory read."
  84536. } ]
  84537. }
  84538. },
  84539. "configurations" : {
  84540. "CVE_data_version" : "4.0",
  84541. "nodes" : [ {
  84542. "operator" : "OR",
  84543. "children" : [ ],
  84544. "cpe_match" : [ {
  84545. "vulnerable" : true,
  84546. "cpe23Uri" : "cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*",
  84547. "versionEndIncluding" : "18.11",
  84548. "cpe_name" : [ ]
  84549. } ]
  84550. }, {
  84551. "operator" : "OR",
  84552. "children" : [ ],
  84553. "cpe_match" : [ {
  84554. "vulnerable" : true,
  84555. "cpe23Uri" : "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
  84556. "cpe_name" : [ ]
  84557. }, {
  84558. "vulnerable" : true,
  84559. "cpe23Uri" : "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
  84560. "cpe_name" : [ ]
  84561. }, {
  84562. "vulnerable" : true,
  84563. "cpe23Uri" : "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
  84564. "cpe_name" : [ ]
  84565. }, {
  84566. "vulnerable" : true,
  84567. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  84568. "cpe_name" : [ ]
  84569. } ]
  84570. } ]
  84571. },
  84572. "impact" : {
  84573. "baseMetricV3" : {
  84574. "cvssV3" : {
  84575. "version" : "3.1",
  84576. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
  84577. "attackVector" : "LOCAL",
  84578. "attackComplexity" : "LOW",
  84579. "privilegesRequired" : "HIGH",
  84580. "userInteraction" : "NONE",
  84581. "scope" : "UNCHANGED",
  84582. "confidentialityImpact" : "HIGH",
  84583. "integrityImpact" : "NONE",
  84584. "availabilityImpact" : "NONE",
  84585. "baseScore" : 4.4,
  84586. "baseSeverity" : "MEDIUM"
  84587. },
  84588. "exploitabilityScore" : 0.8,
  84589. "impactScore" : 3.6
  84590. },
  84591. "baseMetricV2" : {
  84592. "cvssV2" : {
  84593. "version" : "2.0",
  84594. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
  84595. "accessVector" : "LOCAL",
  84596. "accessComplexity" : "LOW",
  84597. "authentication" : "NONE",
  84598. "confidentialityImpact" : "PARTIAL",
  84599. "integrityImpact" : "NONE",
  84600. "availabilityImpact" : "NONE",
  84601. "baseScore" : 2.1
  84602. },
  84603. "severity" : "LOW",
  84604. "exploitabilityScore" : 3.9,
  84605. "impactScore" : 2.9,
  84606. "acInsufInfo" : false,
  84607. "obtainAllPrivilege" : false,
  84608. "obtainUserPrivilege" : false,
  84609. "obtainOtherPrivilege" : false,
  84610. "userInteractionRequired" : false
  84611. }
  84612. },
  84613. "publishedDate" : "2020-05-19T19:15Z",
  84614. "lastModifiedDate" : "2021-05-05T13:56Z"
  84615. }, {
  84616. "cve" : {
  84617. "data_type" : "CVE",
  84618. "data_format" : "MITRE",
  84619. "data_version" : "4.0",
  84620. "CVE_data_meta" : {
  84621. "ID" : "CVE-2020-1763",
  84622. "ASSIGNER" : "secalert@redhat.com"
  84623. },
  84624. "problemtype" : {
  84625. "problemtype_data" : [ {
  84626. "description" : [ {
  84627. "lang" : "en",
  84628. "value" : "CWE-125"
  84629. } ]
  84630. } ]
  84631. },
  84632. "references" : {
  84633. "reference_data" : [ {
  84634. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1763",
  84635. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1763",
  84636. "refsource" : "CONFIRM",
  84637. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  84638. }, {
  84639. "url" : "https://github.com/libreswan/libreswan/commit/471a3e41a449d7c753bc4edbba4239501bb62ba8",
  84640. "name" : "https://github.com/libreswan/libreswan/commit/471a3e41a449d7c753bc4edbba4239501bb62ba8",
  84641. "refsource" : "CONFIRM",
  84642. "tags" : [ "Patch", "Third Party Advisory" ]
  84643. }, {
  84644. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1813329",
  84645. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1813329",
  84646. "refsource" : "MISC",
  84647. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  84648. }, {
  84649. "url" : "https://libreswan.org/security/CVE-2020-1763/CVE-2020-1763.txt",
  84650. "name" : "https://libreswan.org/security/CVE-2020-1763/CVE-2020-1763.txt",
  84651. "refsource" : "CONFIRM",
  84652. "tags" : [ "Patch", "Vendor Advisory" ]
  84653. }, {
  84654. "url" : "https://www.debian.org/security/2020/dsa-4684",
  84655. "name" : "DSA-4684",
  84656. "refsource" : "DEBIAN",
  84657. "tags" : [ "Third Party Advisory" ]
  84658. }, {
  84659. "url" : "https://security.gentoo.org/glsa/202007-21",
  84660. "name" : "GLSA-202007-21",
  84661. "refsource" : "GENTOO",
  84662. "tags" : [ "Third Party Advisory" ]
  84663. }, {
  84664. "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf",
  84665. "name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf",
  84666. "refsource" : "CONFIRM",
  84667. "tags" : [ "Third Party Advisory" ]
  84668. }, {
  84669. "url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04",
  84670. "name" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04",
  84671. "refsource" : "MISC",
  84672. "tags" : [ "Third Party Advisory", "US Government Resource" ]
  84673. } ]
  84674. },
  84675. "description" : {
  84676. "description_data" : [ {
  84677. "lang" : "en",
  84678. "value" : "An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash."
  84679. } ]
  84680. }
  84681. },
  84682. "configurations" : {
  84683. "CVE_data_version" : "4.0",
  84684. "nodes" : [ {
  84685. "operator" : "OR",
  84686. "children" : [ ],
  84687. "cpe_match" : [ {
  84688. "vulnerable" : true,
  84689. "cpe23Uri" : "cpe:2.3:a:libreswan:libreswan:3.5:*:*:*:*:*:*:*",
  84690. "cpe_name" : [ ]
  84691. }, {
  84692. "vulnerable" : true,
  84693. "cpe23Uri" : "cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*",
  84694. "versionStartIncluding" : "3.27",
  84695. "versionEndIncluding" : "3.31",
  84696. "cpe_name" : [ ]
  84697. } ]
  84698. } ]
  84699. },
  84700. "impact" : {
  84701. "baseMetricV3" : {
  84702. "cvssV3" : {
  84703. "version" : "3.1",
  84704. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  84705. "attackVector" : "NETWORK",
  84706. "attackComplexity" : "LOW",
  84707. "privilegesRequired" : "NONE",
  84708. "userInteraction" : "NONE",
  84709. "scope" : "UNCHANGED",
  84710. "confidentialityImpact" : "NONE",
  84711. "integrityImpact" : "NONE",
  84712. "availabilityImpact" : "HIGH",
  84713. "baseScore" : 7.5,
  84714. "baseSeverity" : "HIGH"
  84715. },
  84716. "exploitabilityScore" : 3.9,
  84717. "impactScore" : 3.6
  84718. },
  84719. "baseMetricV2" : {
  84720. "cvssV2" : {
  84721. "version" : "2.0",
  84722. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  84723. "accessVector" : "NETWORK",
  84724. "accessComplexity" : "LOW",
  84725. "authentication" : "NONE",
  84726. "confidentialityImpact" : "NONE",
  84727. "integrityImpact" : "NONE",
  84728. "availabilityImpact" : "PARTIAL",
  84729. "baseScore" : 5.0
  84730. },
  84731. "severity" : "MEDIUM",
  84732. "exploitabilityScore" : 10.0,
  84733. "impactScore" : 2.9,
  84734. "acInsufInfo" : false,
  84735. "obtainAllPrivilege" : false,
  84736. "obtainUserPrivilege" : false,
  84737. "obtainOtherPrivilege" : false,
  84738. "userInteractionRequired" : false
  84739. }
  84740. },
  84741. "publishedDate" : "2020-05-12T14:15Z",
  84742. "lastModifiedDate" : "2021-05-05T13:41Z"
  84743. }, {
  84744. "cve" : {
  84745. "data_type" : "CVE",
  84746. "data_format" : "MITRE",
  84747. "data_version" : "4.0",
  84748. "CVE_data_meta" : {
  84749. "ID" : "CVE-2020-12783",
  84750. "ASSIGNER" : "cve@mitre.org"
  84751. },
  84752. "problemtype" : {
  84753. "problemtype_data" : [ {
  84754. "description" : [ {
  84755. "lang" : "en",
  84756. "value" : "CWE-125"
  84757. } ]
  84758. } ]
  84759. },
  84760. "references" : {
  84761. "reference_data" : [ {
  84762. "url" : "https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86",
  84763. "name" : "https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86",
  84764. "refsource" : "CONFIRM",
  84765. "tags" : [ "Patch", "Third Party Advisory" ]
  84766. }, {
  84767. "url" : "https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0",
  84768. "name" : "https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0",
  84769. "refsource" : "CONFIRM",
  84770. "tags" : [ "Patch", "Third Party Advisory" ]
  84771. }, {
  84772. "url" : "https://bugs.exim.org/show_bug.cgi?id=2571",
  84773. "name" : "https://bugs.exim.org/show_bug.cgi?id=2571",
  84774. "refsource" : "CONFIRM",
  84775. "tags" : [ "Third Party Advisory" ]
  84776. }, {
  84777. "url" : "https://www.debian.org/security/2020/dsa-4687",
  84778. "name" : "DSA-4687",
  84779. "refsource" : "DEBIAN",
  84780. "tags" : [ ]
  84781. }, {
  84782. "url" : "https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html",
  84783. "name" : "[debian-lts-announce] 20200518 [SECURITY] [DLA 2213-1] exim4 security update",
  84784. "refsource" : "MLIST",
  84785. "tags" : [ ]
  84786. }, {
  84787. "url" : "https://usn.ubuntu.com/4366-1/",
  84788. "name" : "USN-4366-1",
  84789. "refsource" : "UBUNTU",
  84790. "tags" : [ ]
  84791. }, {
  84792. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7Z5UG6ZIG32V7M4PP3BCC65C27EWK7G/",
  84793. "name" : "FEDORA-2020-2e084c987d",
  84794. "refsource" : "FEDORA",
  84795. "tags" : [ ]
  84796. }, {
  84797. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y/",
  84798. "name" : "FEDORA-2020-93d7305d71",
  84799. "refsource" : "FEDORA",
  84800. "tags" : [ ]
  84801. }, {
  84802. "url" : "http://www.openwall.com/lists/oss-security/2021/05/04/7",
  84803. "name" : "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
  84804. "refsource" : "MLIST",
  84805. "tags" : [ ]
  84806. } ]
  84807. },
  84808. "description" : {
  84809. "description_data" : [ {
  84810. "lang" : "en",
  84811. "value" : "Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c."
  84812. } ]
  84813. }
  84814. },
  84815. "configurations" : {
  84816. "CVE_data_version" : "4.0",
  84817. "nodes" : [ {
  84818. "operator" : "OR",
  84819. "children" : [ ],
  84820. "cpe_match" : [ {
  84821. "vulnerable" : true,
  84822. "cpe23Uri" : "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*",
  84823. "versionEndIncluding" : "4.93",
  84824. "cpe_name" : [ ]
  84825. } ]
  84826. } ]
  84827. },
  84828. "impact" : {
  84829. "baseMetricV3" : {
  84830. "cvssV3" : {
  84831. "version" : "3.1",
  84832. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  84833. "attackVector" : "NETWORK",
  84834. "attackComplexity" : "LOW",
  84835. "privilegesRequired" : "NONE",
  84836. "userInteraction" : "NONE",
  84837. "scope" : "UNCHANGED",
  84838. "confidentialityImpact" : "HIGH",
  84839. "integrityImpact" : "NONE",
  84840. "availabilityImpact" : "NONE",
  84841. "baseScore" : 7.5,
  84842. "baseSeverity" : "HIGH"
  84843. },
  84844. "exploitabilityScore" : 3.9,
  84845. "impactScore" : 3.6
  84846. },
  84847. "baseMetricV2" : {
  84848. "cvssV2" : {
  84849. "version" : "2.0",
  84850. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  84851. "accessVector" : "NETWORK",
  84852. "accessComplexity" : "LOW",
  84853. "authentication" : "NONE",
  84854. "confidentialityImpact" : "PARTIAL",
  84855. "integrityImpact" : "NONE",
  84856. "availabilityImpact" : "NONE",
  84857. "baseScore" : 5.0
  84858. },
  84859. "severity" : "MEDIUM",
  84860. "exploitabilityScore" : 10.0,
  84861. "impactScore" : 2.9,
  84862. "acInsufInfo" : false,
  84863. "obtainAllPrivilege" : false,
  84864. "obtainUserPrivilege" : false,
  84865. "obtainOtherPrivilege" : false,
  84866. "userInteractionRequired" : false
  84867. }
  84868. },
  84869. "publishedDate" : "2020-05-11T14:15Z",
  84870. "lastModifiedDate" : "2021-05-04T18:15Z"
  84871. }, {
  84872. "cve" : {
  84873. "data_type" : "CVE",
  84874. "data_format" : "MITRE",
  84875. "data_version" : "4.0",
  84876. "CVE_data_meta" : {
  84877. "ID" : "CVE-2019-12425",
  84878. "ASSIGNER" : "security@apache.org"
  84879. },
  84880. "problemtype" : {
  84881. "problemtype_data" : [ {
  84882. "description" : [ {
  84883. "lang" : "en",
  84884. "value" : "CWE-74"
  84885. } ]
  84886. } ]
  84887. },
  84888. "references" : {
  84889. "reference_data" : [ {
  84890. "url" : "https://s.apache.org/7sr1x",
  84891. "name" : "https://s.apache.org/7sr1x",
  84892. "refsource" : "CONFIRM",
  84893. "tags" : [ "Mailing List", "Vendor Advisory" ]
  84894. }, {
  84895. "url" : "https://lists.apache.org/thread.html/r5181b36218225447d3ce70891eeccfb6d6885309dffd7e0e59091817@%3Cuser.ofbiz.apache.org%3E",
  84896. "name" : "[ofbiz-user] 20200503 Re: [CVE-2019-12425] Apache OFBiz Host Header Injection",
  84897. "refsource" : "MLIST",
  84898. "tags" : [ "Mailing List", "Vendor Advisory" ]
  84899. }, {
  84900. "url" : "https://lists.apache.org/thread.html/r907ce90745b52d2d5b6a815de03fd1d5f3831ab579a81d70cfda6f3d@%3Cuser.ofbiz.apache.org%3E",
  84901. "name" : "[ofbiz-user] 20200504 Re: [CVE-2019-12425] Apache OFBiz Host Header Injection",
  84902. "refsource" : "MLIST",
  84903. "tags" : [ "Mailing List", "Vendor Advisory" ]
  84904. }, {
  84905. "url" : "https://lists.apache.org/thread.html/r0a0a701610b3bcdf14634047313adab3f1628bb9aa55cf29cd262ef5@%3Ccommits.ofbiz.apache.org%3E",
  84906. "name" : "[ofbiz-commits] 20210321 [ofbiz-site] branch master updated: Updates security page for CVE-2021-26295 fixed in 17.12.06",
  84907. "refsource" : "MLIST",
  84908. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  84909. }, {
  84910. "url" : "https://lists.apache.org/thread.html/r108a964764b8bd21ebd32ccd4f51c183ee80a251c105b849154a8e9d@%3Ccommits.ofbiz.apache.org%3E",
  84911. "name" : "[ofbiz-commits] 20210427 [ofbiz-site] branch master updated: Updates security page for CVE-2021-29200 and 30128 fixed in 17.12.07",
  84912. "refsource" : "MLIST",
  84913. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  84914. } ]
  84915. },
  84916. "description" : {
  84917. "description_data" : [ {
  84918. "lang" : "en",
  84919. "value" : "Apache OFBiz 17.12.01 is vulnerable to Host header injection by accepting arbitrary host"
  84920. } ]
  84921. }
  84922. },
  84923. "configurations" : {
  84924. "CVE_data_version" : "4.0",
  84925. "nodes" : [ {
  84926. "operator" : "OR",
  84927. "children" : [ ],
  84928. "cpe_match" : [ {
  84929. "vulnerable" : true,
  84930. "cpe23Uri" : "cpe:2.3:a:apache:ofbiz:17.12.01:*:*:*:*:*:*:*",
  84931. "cpe_name" : [ ]
  84932. } ]
  84933. } ]
  84934. },
  84935. "impact" : {
  84936. "baseMetricV3" : {
  84937. "cvssV3" : {
  84938. "version" : "3.1",
  84939. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
  84940. "attackVector" : "NETWORK",
  84941. "attackComplexity" : "LOW",
  84942. "privilegesRequired" : "NONE",
  84943. "userInteraction" : "NONE",
  84944. "scope" : "UNCHANGED",
  84945. "confidentialityImpact" : "NONE",
  84946. "integrityImpact" : "HIGH",
  84947. "availabilityImpact" : "NONE",
  84948. "baseScore" : 7.5,
  84949. "baseSeverity" : "HIGH"
  84950. },
  84951. "exploitabilityScore" : 3.9,
  84952. "impactScore" : 3.6
  84953. },
  84954. "baseMetricV2" : {
  84955. "cvssV2" : {
  84956. "version" : "2.0",
  84957. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N",
  84958. "accessVector" : "NETWORK",
  84959. "accessComplexity" : "LOW",
  84960. "authentication" : "NONE",
  84961. "confidentialityImpact" : "NONE",
  84962. "integrityImpact" : "PARTIAL",
  84963. "availabilityImpact" : "NONE",
  84964. "baseScore" : 5.0
  84965. },
  84966. "severity" : "MEDIUM",
  84967. "exploitabilityScore" : 10.0,
  84968. "impactScore" : 2.9,
  84969. "acInsufInfo" : false,
  84970. "obtainAllPrivilege" : false,
  84971. "obtainUserPrivilege" : false,
  84972. "obtainOtherPrivilege" : false,
  84973. "userInteractionRequired" : false
  84974. }
  84975. },
  84976. "publishedDate" : "2020-04-30T20:15Z",
  84977. "lastModifiedDate" : "2021-05-03T20:40Z"
  84978. }, {
  84979. "cve" : {
  84980. "data_type" : "CVE",
  84981. "data_format" : "MITRE",
  84982. "data_version" : "4.0",
  84983. "CVE_data_meta" : {
  84984. "ID" : "CVE-2020-11022",
  84985. "ASSIGNER" : "security-advisories@github.com"
  84986. },
  84987. "problemtype" : {
  84988. "problemtype_data" : [ {
  84989. "description" : [ {
  84990. "lang" : "en",
  84991. "value" : "CWE-79"
  84992. } ]
  84993. } ]
  84994. },
  84995. "references" : {
  84996. "reference_data" : [ {
  84997. "url" : "https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2",
  84998. "name" : "https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2",
  84999. "refsource" : "CONFIRM",
  85000. "tags" : [ "Mitigation", "Third Party Advisory" ]
  85001. }, {
  85002. "url" : "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/",
  85003. "name" : "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/",
  85004. "refsource" : "MISC",
  85005. "tags" : [ "Release Notes", "Vendor Advisory" ]
  85006. }, {
  85007. "url" : "https://jquery.com/upgrade-guide/3.5/",
  85008. "name" : "https://jquery.com/upgrade-guide/3.5/",
  85009. "refsource" : "MISC",
  85010. "tags" : [ "Mitigation", "Vendor Advisory" ]
  85011. }, {
  85012. "url" : "https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77",
  85013. "name" : "https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77",
  85014. "refsource" : "MISC",
  85015. "tags" : [ "Patch", "Third Party Advisory" ]
  85016. }, {
  85017. "url" : "https://security.netapp.com/advisory/ntap-20200511-0006/",
  85018. "name" : "https://security.netapp.com/advisory/ntap-20200511-0006/",
  85019. "refsource" : "CONFIRM",
  85020. "tags" : [ "Third Party Advisory" ]
  85021. }, {
  85022. "url" : "https://www.drupal.org/sa-core-2020-002",
  85023. "name" : "https://www.drupal.org/sa-core-2020-002",
  85024. "refsource" : "CONFIRM",
  85025. "tags" : [ "Third Party Advisory" ]
  85026. }, {
  85027. "url" : "https://www.debian.org/security/2020/dsa-4693",
  85028. "name" : "DSA-4693",
  85029. "refsource" : "DEBIAN",
  85030. "tags" : [ "Third Party Advisory" ]
  85031. }, {
  85032. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/",
  85033. "name" : "FEDORA-2020-11be4b36d4",
  85034. "refsource" : "FEDORA",
  85035. "tags" : [ "Third Party Advisory" ]
  85036. }, {
  85037. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/",
  85038. "name" : "FEDORA-2020-36d2db5f51",
  85039. "refsource" : "FEDORA",
  85040. "tags" : [ "Third Party Advisory" ]
  85041. }, {
  85042. "url" : "https://www.oracle.com/security-alerts/cpujul2020.html",
  85043. "name" : "https://www.oracle.com/security-alerts/cpujul2020.html",
  85044. "refsource" : "MISC",
  85045. "tags" : [ "Third Party Advisory" ]
  85046. }, {
  85047. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html",
  85048. "name" : "openSUSE-SU-2020:1060",
  85049. "refsource" : "SUSE",
  85050. "tags" : [ "Broken Link" ]
  85051. }, {
  85052. "url" : "https://security.gentoo.org/glsa/202007-03",
  85053. "name" : "GLSA-202007-03",
  85054. "refsource" : "GENTOO",
  85055. "tags" : [ "Third Party Advisory" ]
  85056. }, {
  85057. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html",
  85058. "name" : "openSUSE-SU-2020:1106",
  85059. "refsource" : "SUSE",
  85060. "tags" : [ "Broken Link" ]
  85061. }, {
  85062. "url" : "https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E",
  85063. "name" : "[airflow-commits] 20200820 [GitHub] [airflow] breser opened a new issue #10429: jquery dependency needs to be updated to 3.5.0 or newer",
  85064. "refsource" : "MLIST",
  85065. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85066. }, {
  85067. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/",
  85068. "name" : "FEDORA-2020-0b32a59b54",
  85069. "refsource" : "FEDORA",
  85070. "tags" : [ "Third Party Advisory" ]
  85071. }, {
  85072. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/",
  85073. "name" : "FEDORA-2020-fbb94073a1",
  85074. "refsource" : "FEDORA",
  85075. "tags" : [ "Third Party Advisory" ]
  85076. }, {
  85077. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/",
  85078. "name" : "FEDORA-2020-fe94df8c34",
  85079. "refsource" : "FEDORA",
  85080. "tags" : [ "Third Party Advisory" ]
  85081. }, {
  85082. "url" : "https://www.oracle.com/security-alerts/cpuoct2020.html",
  85083. "name" : "https://www.oracle.com/security-alerts/cpuoct2020.html",
  85084. "refsource" : "MISC",
  85085. "tags" : [ "Third Party Advisory" ]
  85086. }, {
  85087. "url" : "https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E",
  85088. "name" : "[flink-dev] 20201105 [jira] [Created] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  85089. "refsource" : "MLIST",
  85090. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85091. }, {
  85092. "url" : "https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E",
  85093. "name" : "[flink-issues] 20201105 [jira] [Created] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  85094. "refsource" : "MLIST",
  85095. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85096. }, {
  85097. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html",
  85098. "name" : "openSUSE-SU-2020:1888",
  85099. "refsource" : "SUSE",
  85100. "tags" : [ "Broken Link" ]
  85101. }, {
  85102. "url" : "https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E",
  85103. "name" : "[flink-issues] 20201129 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  85104. "refsource" : "MLIST",
  85105. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85106. }, {
  85107. "url" : "https://www.tenable.com/security/tns-2020-10",
  85108. "name" : "https://www.tenable.com/security/tns-2020-10",
  85109. "refsource" : "CONFIRM",
  85110. "tags" : [ "Third Party Advisory" ]
  85111. }, {
  85112. "url" : "https://www.tenable.com/security/tns-2020-11",
  85113. "name" : "https://www.tenable.com/security/tns-2020-11",
  85114. "refsource" : "CONFIRM",
  85115. "tags" : [ "Third Party Advisory" ]
  85116. }, {
  85117. "url" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  85118. "name" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  85119. "refsource" : "MISC",
  85120. "tags" : [ "Third Party Advisory" ]
  85121. }, {
  85122. "url" : "https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E",
  85123. "name" : "[flink-issues] 20210209 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  85124. "refsource" : "MLIST",
  85125. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85126. }, {
  85127. "url" : "https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E",
  85128. "name" : "[flink-issues] 20210209 [jira] [Comment Edited] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  85129. "refsource" : "MLIST",
  85130. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85131. }, {
  85132. "url" : "https://www.tenable.com/security/tns-2021-02",
  85133. "name" : "https://www.tenable.com/security/tns-2021-02",
  85134. "refsource" : "CONFIRM",
  85135. "tags" : [ "Third Party Advisory" ]
  85136. }, {
  85137. "url" : "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html",
  85138. "name" : "[debian-lts-announce] 20210326 [SECURITY] [DLA 2608-1] jquery security update",
  85139. "refsource" : "MLIST",
  85140. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85141. }, {
  85142. "url" : "http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html",
  85143. "name" : "http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html",
  85144. "refsource" : "MISC",
  85145. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  85146. }, {
  85147. "url" : "https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E",
  85148. "name" : "[flink-issues] 20210422 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  85149. "refsource" : "MLIST",
  85150. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85151. }, {
  85152. "url" : "https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E",
  85153. "name" : "[flink-issues] 20210422 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  85154. "refsource" : "MLIST",
  85155. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85156. }, {
  85157. "url" : "https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E",
  85158. "name" : "[flink-issues] 20210429 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  85159. "refsource" : "MLIST",
  85160. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85161. }, {
  85162. "url" : "https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E",
  85163. "name" : "[flink-issues] 20210429 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  85164. "refsource" : "MLIST",
  85165. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85166. } ]
  85167. },
  85168. "description" : {
  85169. "description_data" : [ {
  85170. "lang" : "en",
  85171. "value" : "In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0."
  85172. } ]
  85173. }
  85174. },
  85175. "configurations" : {
  85176. "CVE_data_version" : "4.0",
  85177. "nodes" : [ {
  85178. "operator" : "OR",
  85179. "children" : [ ],
  85180. "cpe_match" : [ {
  85181. "vulnerable" : true,
  85182. "cpe23Uri" : "cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:*",
  85183. "versionStartIncluding" : "1.2",
  85184. "versionEndExcluding" : "3.5.0",
  85185. "cpe_name" : [ ]
  85186. } ]
  85187. }, {
  85188. "operator" : "OR",
  85189. "children" : [ ],
  85190. "cpe_match" : [ {
  85191. "vulnerable" : true,
  85192. "cpe23Uri" : "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
  85193. "versionStartIncluding" : "7.0",
  85194. "versionEndExcluding" : "7.70",
  85195. "cpe_name" : [ ]
  85196. }, {
  85197. "vulnerable" : true,
  85198. "cpe23Uri" : "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
  85199. "versionStartIncluding" : "8.7.0",
  85200. "versionEndExcluding" : "8.7.14",
  85201. "cpe_name" : [ ]
  85202. }, {
  85203. "vulnerable" : true,
  85204. "cpe23Uri" : "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
  85205. "versionStartIncluding" : "8.8.0",
  85206. "versionEndExcluding" : "8.8.6",
  85207. "cpe_name" : [ ]
  85208. } ]
  85209. }, {
  85210. "operator" : "OR",
  85211. "children" : [ ],
  85212. "cpe_match" : [ {
  85213. "vulnerable" : true,
  85214. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  85215. "cpe_name" : [ ]
  85216. } ]
  85217. }, {
  85218. "operator" : "OR",
  85219. "children" : [ ],
  85220. "cpe_match" : [ {
  85221. "vulnerable" : true,
  85222. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
  85223. "cpe_name" : [ ]
  85224. }, {
  85225. "vulnerable" : true,
  85226. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  85227. "cpe_name" : [ ]
  85228. }, {
  85229. "vulnerable" : true,
  85230. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  85231. "cpe_name" : [ ]
  85232. } ]
  85233. }, {
  85234. "operator" : "OR",
  85235. "children" : [ ],
  85236. "cpe_match" : [ {
  85237. "vulnerable" : true,
  85238. "cpe23Uri" : "cpe:2.3:a:oracle:agile_product_supplier_collaboration_for_process:6.2.0.0:*:*:*:*:*:*:*",
  85239. "cpe_name" : [ ]
  85240. }, {
  85241. "vulnerable" : true,
  85242. "cpe23Uri" : "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*",
  85243. "cpe_name" : [ ]
  85244. }, {
  85245. "vulnerable" : true,
  85246. "cpe23Uri" : "cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*",
  85247. "cpe_name" : [ ]
  85248. }, {
  85249. "vulnerable" : true,
  85250. "cpe23Uri" : "cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*",
  85251. "cpe_name" : [ ]
  85252. }, {
  85253. "vulnerable" : true,
  85254. "cpe23Uri" : "cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*",
  85255. "cpe_name" : [ ]
  85256. }, {
  85257. "vulnerable" : true,
  85258. "cpe23Uri" : "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*",
  85259. "cpe_name" : [ ]
  85260. }, {
  85261. "vulnerable" : true,
  85262. "cpe23Uri" : "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*",
  85263. "cpe_name" : [ ]
  85264. }, {
  85265. "vulnerable" : true,
  85266. "cpe23Uri" : "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*",
  85267. "cpe_name" : [ ]
  85268. }, {
  85269. "vulnerable" : true,
  85270. "cpe23Uri" : "cpe:2.3:a:oracle:communications_application_session_controller:3.8m0:*:*:*:*:*:*:*",
  85271. "cpe_name" : [ ]
  85272. }, {
  85273. "vulnerable" : true,
  85274. "cpe23Uri" : "cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5.0.23.0:*:*:*:*:*:*:*",
  85275. "cpe_name" : [ ]
  85276. }, {
  85277. "vulnerable" : true,
  85278. "cpe23Uri" : "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*",
  85279. "cpe_name" : [ ]
  85280. }, {
  85281. "vulnerable" : true,
  85282. "cpe23Uri" : "cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\\::*:*:*:*:*:*:*:*",
  85283. "versionStartIncluding" : "8.0.0",
  85284. "versionEndIncluding" : "8.2.2",
  85285. "cpe_name" : [ ]
  85286. }, {
  85287. "vulnerable" : true,
  85288. "cpe23Uri" : "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:*",
  85289. "cpe_name" : [ ]
  85290. }, {
  85291. "vulnerable" : true,
  85292. "cpe23Uri" : "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
  85293. "cpe_name" : [ ]
  85294. }, {
  85295. "vulnerable" : true,
  85296. "cpe23Uri" : "cpe:2.3:a:oracle:enterprise_session_border_controller:8.4:*:*:*:*:*:*:*",
  85297. "cpe_name" : [ ]
  85298. }, {
  85299. "vulnerable" : true,
  85300. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*",
  85301. "versionStartIncluding" : "8.0.6.0.0",
  85302. "versionEndIncluding" : "8.1.0.0.0",
  85303. "cpe_name" : [ ]
  85304. }, {
  85305. "vulnerable" : true,
  85306. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:*:*:*:*:*:*:*:*",
  85307. "versionStartIncluding" : "8.0.6",
  85308. "versionEndIncluding" : "8.0.8",
  85309. "cpe_name" : [ ]
  85310. }, {
  85311. "vulnerable" : true,
  85312. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:8.1.0:*:*:*:*:*:*:*",
  85313. "cpe_name" : [ ]
  85314. }, {
  85315. "vulnerable" : true,
  85316. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_asset_liability_management:8.0.6:*:*:*:*:*:*:*",
  85317. "cpe_name" : [ ]
  85318. }, {
  85319. "vulnerable" : true,
  85320. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_asset_liability_management:8.0.7:*:*:*:*:*:*:*",
  85321. "cpe_name" : [ ]
  85322. }, {
  85323. "vulnerable" : true,
  85324. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_asset_liability_management:8.1.0:*:*:*:*:*:*:*",
  85325. "cpe_name" : [ ]
  85326. }, {
  85327. "vulnerable" : true,
  85328. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_balance_sheet_planning:8.0.8:*:*:*:*:*:*:*",
  85329. "cpe_name" : [ ]
  85330. }, {
  85331. "vulnerable" : true,
  85332. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:*:*:*:*:*:*:*:*",
  85333. "versionStartIncluding" : "8.0.6",
  85334. "versionEndIncluding" : "8.0.8",
  85335. "cpe_name" : [ ]
  85336. }, {
  85337. "vulnerable" : true,
  85338. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.1.0:*:*:*:*:*:*:*",
  85339. "cpe_name" : [ ]
  85340. }, {
  85341. "vulnerable" : true,
  85342. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:*:*:*:*:*:*:*:*",
  85343. "versionStartIncluding" : "8.0.6",
  85344. "versionEndIncluding" : "8.0.8",
  85345. "cpe_name" : [ ]
  85346. }, {
  85347. "vulnerable" : true,
  85348. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:8.1.0:*:*:*:*:*:*:*",
  85349. "cpe_name" : [ ]
  85350. }, {
  85351. "vulnerable" : true,
  85352. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_data_foundation:*:*:*:*:*:*:*:*",
  85353. "versionStartIncluding" : "8.0.6",
  85354. "versionEndIncluding" : "8.1.0",
  85355. "cpe_name" : [ ]
  85356. }, {
  85357. "vulnerable" : true,
  85358. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_data_governance_for_us_regulatory_reporting:*:*:*:*:*:*:*:*",
  85359. "versionStartIncluding" : "8.0.6",
  85360. "versionEndIncluding" : "8.0.9",
  85361. "cpe_name" : [ ]
  85362. }, {
  85363. "vulnerable" : true,
  85364. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.6:*:*:*:*:*:*:*",
  85365. "cpe_name" : [ ]
  85366. }, {
  85367. "vulnerable" : true,
  85368. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.7:*:*:*:*:*:*:*",
  85369. "cpe_name" : [ ]
  85370. }, {
  85371. "vulnerable" : true,
  85372. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.1.0:*:*:*:*:*:*:*",
  85373. "cpe_name" : [ ]
  85374. }, {
  85375. "vulnerable" : true,
  85376. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.0.6:*:*:*:*:*:*:*",
  85377. "cpe_name" : [ ]
  85378. }, {
  85379. "vulnerable" : true,
  85380. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.0.7:*:*:*:*:*:*:*",
  85381. "cpe_name" : [ ]
  85382. }, {
  85383. "vulnerable" : true,
  85384. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.1.0:*:*:*:*:*:*:*",
  85385. "cpe_name" : [ ]
  85386. }, {
  85387. "vulnerable" : true,
  85388. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:*:*:*:*:*:*:*:*",
  85389. "versionStartIncluding" : "8.0.6",
  85390. "versionEndIncluding" : "8.0.8",
  85391. "cpe_name" : [ ]
  85392. }, {
  85393. "vulnerable" : true,
  85394. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.1.0:*:*:*:*:*:*:*",
  85395. "cpe_name" : [ ]
  85396. }, {
  85397. "vulnerable" : true,
  85398. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.6:*:*:*:*:*:*:*",
  85399. "cpe_name" : [ ]
  85400. }, {
  85401. "vulnerable" : true,
  85402. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.7:*:*:*:*:*:*:*",
  85403. "cpe_name" : [ ]
  85404. }, {
  85405. "vulnerable" : true,
  85406. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:*",
  85407. "cpe_name" : [ ]
  85408. }, {
  85409. "vulnerable" : true,
  85410. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_liquidity_risk_management:8.0.6:*:*:*:*:*:*:*",
  85411. "cpe_name" : [ ]
  85412. }, {
  85413. "vulnerable" : true,
  85414. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.7:*:*:*:*:*:*:*",
  85415. "cpe_name" : [ ]
  85416. }, {
  85417. "vulnerable" : true,
  85418. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:*",
  85419. "cpe_name" : [ ]
  85420. }, {
  85421. "vulnerable" : true,
  85422. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.1.0:*:*:*:*:*:*:*",
  85423. "cpe_name" : [ ]
  85424. }, {
  85425. "vulnerable" : true,
  85426. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:*:*:*:*:*:*:*:*",
  85427. "versionStartIncluding" : "8.0.6",
  85428. "versionEndIncluding" : "8.0.8",
  85429. "cpe_name" : [ ]
  85430. }, {
  85431. "vulnerable" : true,
  85432. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:8.1.0:*:*:*:*:*:*:*",
  85433. "cpe_name" : [ ]
  85434. }, {
  85435. "vulnerable" : true,
  85436. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*",
  85437. "cpe_name" : [ ]
  85438. }, {
  85439. "vulnerable" : true,
  85440. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:*",
  85441. "cpe_name" : [ ]
  85442. }, {
  85443. "vulnerable" : true,
  85444. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.6:*:*:*:*:*:*:*",
  85445. "cpe_name" : [ ]
  85446. }, {
  85447. "vulnerable" : true,
  85448. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:*",
  85449. "cpe_name" : [ ]
  85450. }, {
  85451. "vulnerable" : true,
  85452. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_profitability_management:8.0.6:*:*:*:*:*:*:*",
  85453. "cpe_name" : [ ]
  85454. }, {
  85455. "vulnerable" : true,
  85456. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_profitability_management:8.0.7:*:*:*:*:*:*:*",
  85457. "cpe_name" : [ ]
  85458. }, {
  85459. "vulnerable" : true,
  85460. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_profitability_management:8.1.0:*:*:*:*:*:*:*",
  85461. "cpe_name" : [ ]
  85462. }, {
  85463. "vulnerable" : true,
  85464. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_european_banking_authority:*:*:*:*:*:*:*:*",
  85465. "versionStartIncluding" : "8.0.6",
  85466. "versionEndIncluding" : "8.1.0",
  85467. "cpe_name" : [ ]
  85468. }, {
  85469. "vulnerable" : true,
  85470. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_us_federal_reserve:*:*:*:*:*:*:*:*",
  85471. "versionStartIncluding" : "8.0.6",
  85472. "versionEndIncluding" : "8.0.9",
  85473. "cpe_name" : [ ]
  85474. }, {
  85475. "vulnerable" : true,
  85476. "cpe23Uri" : "cpe:2.3:a:oracle:healthcare_foundation:7.1.1:*:*:*:*:*:*:*",
  85477. "cpe_name" : [ ]
  85478. }, {
  85479. "vulnerable" : true,
  85480. "cpe23Uri" : "cpe:2.3:a:oracle:healthcare_foundation:7.2.0:*:*:*:*:*:*:*",
  85481. "cpe_name" : [ ]
  85482. }, {
  85483. "vulnerable" : true,
  85484. "cpe23Uri" : "cpe:2.3:a:oracle:healthcare_foundation:7.2.1:*:*:*:*:*:*:*",
  85485. "cpe_name" : [ ]
  85486. }, {
  85487. "vulnerable" : true,
  85488. "cpe23Uri" : "cpe:2.3:a:oracle:healthcare_foundation:7.3.0:*:*:*:*:*:*:*",
  85489. "cpe_name" : [ ]
  85490. }, {
  85491. "vulnerable" : true,
  85492. "cpe23Uri" : "cpe:2.3:a:oracle:hospitality_materials_control:18.1:*:*:*:*:*:*:*",
  85493. "cpe_name" : [ ]
  85494. }, {
  85495. "vulnerable" : true,
  85496. "cpe23Uri" : "cpe:2.3:a:oracle:hospitality_simphony:18.1:*:*:*:*:*:*:*",
  85497. "cpe_name" : [ ]
  85498. }, {
  85499. "vulnerable" : true,
  85500. "cpe23Uri" : "cpe:2.3:a:oracle:hospitality_simphony:18.2:*:*:*:*:*:*:*",
  85501. "cpe_name" : [ ]
  85502. }, {
  85503. "vulnerable" : true,
  85504. "cpe23Uri" : "cpe:2.3:a:oracle:hospitality_simphony:*:*:*:*:*:*:*:*",
  85505. "versionStartIncluding" : "19.1.0",
  85506. "versionEndIncluding" : "19.1.2",
  85507. "cpe_name" : [ ]
  85508. }, {
  85509. "vulnerable" : true,
  85510. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_accounting_analyzer:8.0.9:*:*:*:*:*:*:*",
  85511. "cpe_name" : [ ]
  85512. }, {
  85513. "vulnerable" : true,
  85514. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_allocation_manager_for_enterprise_profitability:8.0.8:*:*:*:*:*:*:*",
  85515. "cpe_name" : [ ]
  85516. }, {
  85517. "vulnerable" : true,
  85518. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_allocation_manager_for_enterprise_profitability:8.1.0:*:*:*:*:*:*:*",
  85519. "cpe_name" : [ ]
  85520. }, {
  85521. "vulnerable" : true,
  85522. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_data_foundation:*:*:*:*:*:*:*:*",
  85523. "versionStartIncluding" : "8.0.6",
  85524. "versionEndIncluding" : "8.1.0",
  85525. "cpe_name" : [ ]
  85526. }, {
  85527. "vulnerable" : true,
  85528. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:*:*:*:*:*:*:*:*",
  85529. "versionStartIncluding" : "5.0.0.0",
  85530. "versionEndIncluding" : "5.6.0.0",
  85531. "cpe_name" : [ ]
  85532. }, {
  85533. "vulnerable" : true,
  85534. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.6.1.0:*:*:*:*:*:*:*",
  85535. "cpe_name" : [ ]
  85536. }, {
  85537. "vulnerable" : true,
  85538. "cpe23Uri" : "cpe:2.3:a:oracle:jdeveloper:11.1.1.9.0:*:*:*:*:*:*:*",
  85539. "cpe_name" : [ ]
  85540. }, {
  85541. "vulnerable" : true,
  85542. "cpe23Uri" : "cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*",
  85543. "cpe_name" : [ ]
  85544. }, {
  85545. "vulnerable" : true,
  85546. "cpe23Uri" : "cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:*",
  85547. "cpe_name" : [ ]
  85548. }, {
  85549. "vulnerable" : true,
  85550. "cpe23Uri" : "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
  85551. "cpe_name" : [ ]
  85552. }, {
  85553. "vulnerable" : true,
  85554. "cpe23Uri" : "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
  85555. "cpe_name" : [ ]
  85556. }, {
  85557. "vulnerable" : true,
  85558. "cpe23Uri" : "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
  85559. "cpe_name" : [ ]
  85560. }, {
  85561. "vulnerable" : true,
  85562. "cpe23Uri" : "cpe:2.3:a:oracle:policy_automation:*:*:*:*:*:*:*:*",
  85563. "versionStartIncluding" : "12.2.0",
  85564. "versionEndIncluding" : "12.2.20",
  85565. "cpe_name" : [ ]
  85566. }, {
  85567. "vulnerable" : true,
  85568. "cpe23Uri" : "cpe:2.3:a:oracle:policy_automation_connector_for_siebel:10.4.6:*:*:*:*:*:*:*",
  85569. "cpe_name" : [ ]
  85570. }, {
  85571. "vulnerable" : true,
  85572. "cpe23Uri" : "cpe:2.3:a:oracle:policy_automation_for_mobile_devices:*:*:*:*:*:*:*:*",
  85573. "versionStartIncluding" : "12.2.0",
  85574. "versionEndIncluding" : "12.2.20",
  85575. "cpe_name" : [ ]
  85576. }, {
  85577. "vulnerable" : true,
  85578. "cpe23Uri" : "cpe:2.3:a:oracle:retail_back_office:14.0:*:*:*:*:*:*:*",
  85579. "cpe_name" : [ ]
  85580. }, {
  85581. "vulnerable" : true,
  85582. "cpe23Uri" : "cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:*",
  85583. "cpe_name" : [ ]
  85584. }, {
  85585. "vulnerable" : true,
  85586. "cpe23Uri" : "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:*",
  85587. "cpe_name" : [ ]
  85588. }, {
  85589. "vulnerable" : true,
  85590. "cpe23Uri" : "cpe:2.3:a:oracle:retail_returns_management:14.0:*:*:*:*:*:*:*",
  85591. "cpe_name" : [ ]
  85592. }, {
  85593. "vulnerable" : true,
  85594. "cpe23Uri" : "cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*",
  85595. "cpe_name" : [ ]
  85596. }, {
  85597. "vulnerable" : true,
  85598. "cpe23Uri" : "cpe:2.3:a:oracle:siebel_ui_framework:20.8:*:*:*:*:*:*:*",
  85599. "cpe_name" : [ ]
  85600. }, {
  85601. "vulnerable" : true,
  85602. "cpe23Uri" : "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
  85603. "cpe_name" : [ ]
  85604. }, {
  85605. "vulnerable" : true,
  85606. "cpe23Uri" : "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
  85607. "cpe_name" : [ ]
  85608. }, {
  85609. "vulnerable" : true,
  85610. "cpe23Uri" : "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
  85611. "cpe_name" : [ ]
  85612. }, {
  85613. "vulnerable" : true,
  85614. "cpe23Uri" : "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
  85615. "cpe_name" : [ ]
  85616. }, {
  85617. "vulnerable" : true,
  85618. "cpe23Uri" : "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
  85619. "cpe_name" : [ ]
  85620. } ]
  85621. }, {
  85622. "operator" : "OR",
  85623. "children" : [ ],
  85624. "cpe_match" : [ {
  85625. "vulnerable" : true,
  85626. "cpe23Uri" : "cpe:2.3:a:netapp:max_data:-:*:*:*:*:*:*:*",
  85627. "cpe_name" : [ ]
  85628. }, {
  85629. "vulnerable" : true,
  85630. "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
  85631. "cpe_name" : [ ]
  85632. }, {
  85633. "vulnerable" : true,
  85634. "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*",
  85635. "versionStartIncluding" : "3.0",
  85636. "versionEndIncluding" : "3.1.3",
  85637. "cpe_name" : [ ]
  85638. }, {
  85639. "vulnerable" : true,
  85640. "cpe23Uri" : "cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*",
  85641. "cpe_name" : [ ]
  85642. }, {
  85643. "vulnerable" : true,
  85644. "cpe23Uri" : "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
  85645. "cpe_name" : [ ]
  85646. } ]
  85647. }, {
  85648. "operator" : "AND",
  85649. "children" : [ {
  85650. "operator" : "OR",
  85651. "children" : [ ],
  85652. "cpe_match" : [ {
  85653. "vulnerable" : true,
  85654. "cpe23Uri" : "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
  85655. "cpe_name" : [ ]
  85656. } ]
  85657. }, {
  85658. "operator" : "OR",
  85659. "children" : [ ],
  85660. "cpe_match" : [ {
  85661. "vulnerable" : false,
  85662. "cpe23Uri" : "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
  85663. "cpe_name" : [ ]
  85664. } ]
  85665. } ],
  85666. "cpe_match" : [ ]
  85667. }, {
  85668. "operator" : "AND",
  85669. "children" : [ {
  85670. "operator" : "OR",
  85671. "children" : [ ],
  85672. "cpe_match" : [ {
  85673. "vulnerable" : true,
  85674. "cpe23Uri" : "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
  85675. "cpe_name" : [ ]
  85676. } ]
  85677. }, {
  85678. "operator" : "OR",
  85679. "children" : [ ],
  85680. "cpe_match" : [ {
  85681. "vulnerable" : false,
  85682. "cpe23Uri" : "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
  85683. "cpe_name" : [ ]
  85684. } ]
  85685. } ],
  85686. "cpe_match" : [ ]
  85687. }, {
  85688. "operator" : "AND",
  85689. "children" : [ {
  85690. "operator" : "OR",
  85691. "children" : [ ],
  85692. "cpe_match" : [ {
  85693. "vulnerable" : true,
  85694. "cpe23Uri" : "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
  85695. "cpe_name" : [ ]
  85696. } ]
  85697. }, {
  85698. "operator" : "OR",
  85699. "children" : [ ],
  85700. "cpe_match" : [ {
  85701. "vulnerable" : false,
  85702. "cpe23Uri" : "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
  85703. "cpe_name" : [ ]
  85704. } ]
  85705. } ],
  85706. "cpe_match" : [ ]
  85707. }, {
  85708. "operator" : "AND",
  85709. "children" : [ {
  85710. "operator" : "OR",
  85711. "children" : [ ],
  85712. "cpe_match" : [ {
  85713. "vulnerable" : true,
  85714. "cpe23Uri" : "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
  85715. "cpe_name" : [ ]
  85716. } ]
  85717. }, {
  85718. "operator" : "OR",
  85719. "children" : [ ],
  85720. "cpe_match" : [ {
  85721. "vulnerable" : false,
  85722. "cpe23Uri" : "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
  85723. "cpe_name" : [ ]
  85724. } ]
  85725. } ],
  85726. "cpe_match" : [ ]
  85727. }, {
  85728. "operator" : "AND",
  85729. "children" : [ {
  85730. "operator" : "OR",
  85731. "children" : [ ],
  85732. "cpe_match" : [ {
  85733. "vulnerable" : true,
  85734. "cpe23Uri" : "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
  85735. "cpe_name" : [ ]
  85736. } ]
  85737. }, {
  85738. "operator" : "OR",
  85739. "children" : [ ],
  85740. "cpe_match" : [ {
  85741. "vulnerable" : false,
  85742. "cpe23Uri" : "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
  85743. "cpe_name" : [ ]
  85744. } ]
  85745. } ],
  85746. "cpe_match" : [ ]
  85747. }, {
  85748. "operator" : "AND",
  85749. "children" : [ {
  85750. "operator" : "OR",
  85751. "children" : [ ],
  85752. "cpe_match" : [ {
  85753. "vulnerable" : true,
  85754. "cpe23Uri" : "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
  85755. "cpe_name" : [ ]
  85756. } ]
  85757. }, {
  85758. "operator" : "OR",
  85759. "children" : [ ],
  85760. "cpe_match" : [ {
  85761. "vulnerable" : false,
  85762. "cpe23Uri" : "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
  85763. "cpe_name" : [ ]
  85764. } ]
  85765. } ],
  85766. "cpe_match" : [ ]
  85767. }, {
  85768. "operator" : "AND",
  85769. "children" : [ {
  85770. "operator" : "OR",
  85771. "children" : [ ],
  85772. "cpe_match" : [ {
  85773. "vulnerable" : true,
  85774. "cpe23Uri" : "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
  85775. "cpe_name" : [ ]
  85776. } ]
  85777. }, {
  85778. "operator" : "OR",
  85779. "children" : [ ],
  85780. "cpe_match" : [ {
  85781. "vulnerable" : false,
  85782. "cpe23Uri" : "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
  85783. "cpe_name" : [ ]
  85784. } ]
  85785. } ],
  85786. "cpe_match" : [ ]
  85787. }, {
  85788. "operator" : "AND",
  85789. "children" : [ {
  85790. "operator" : "OR",
  85791. "children" : [ ],
  85792. "cpe_match" : [ {
  85793. "vulnerable" : true,
  85794. "cpe23Uri" : "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
  85795. "cpe_name" : [ ]
  85796. } ]
  85797. }, {
  85798. "operator" : "OR",
  85799. "children" : [ ],
  85800. "cpe_match" : [ {
  85801. "vulnerable" : false,
  85802. "cpe23Uri" : "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
  85803. "cpe_name" : [ ]
  85804. } ]
  85805. } ],
  85806. "cpe_match" : [ ]
  85807. }, {
  85808. "operator" : "OR",
  85809. "children" : [ ],
  85810. "cpe_match" : [ {
  85811. "vulnerable" : true,
  85812. "cpe23Uri" : "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
  85813. "cpe_name" : [ ]
  85814. }, {
  85815. "vulnerable" : true,
  85816. "cpe23Uri" : "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
  85817. "cpe_name" : [ ]
  85818. } ]
  85819. } ]
  85820. },
  85821. "impact" : {
  85822. "baseMetricV3" : {
  85823. "cvssV3" : {
  85824. "version" : "3.1",
  85825. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  85826. "attackVector" : "NETWORK",
  85827. "attackComplexity" : "LOW",
  85828. "privilegesRequired" : "NONE",
  85829. "userInteraction" : "REQUIRED",
  85830. "scope" : "CHANGED",
  85831. "confidentialityImpact" : "LOW",
  85832. "integrityImpact" : "LOW",
  85833. "availabilityImpact" : "NONE",
  85834. "baseScore" : 6.1,
  85835. "baseSeverity" : "MEDIUM"
  85836. },
  85837. "exploitabilityScore" : 2.8,
  85838. "impactScore" : 2.7
  85839. },
  85840. "baseMetricV2" : {
  85841. "cvssV2" : {
  85842. "version" : "2.0",
  85843. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  85844. "accessVector" : "NETWORK",
  85845. "accessComplexity" : "MEDIUM",
  85846. "authentication" : "NONE",
  85847. "confidentialityImpact" : "NONE",
  85848. "integrityImpact" : "PARTIAL",
  85849. "availabilityImpact" : "NONE",
  85850. "baseScore" : 4.3
  85851. },
  85852. "severity" : "MEDIUM",
  85853. "exploitabilityScore" : 8.6,
  85854. "impactScore" : 2.9,
  85855. "acInsufInfo" : false,
  85856. "obtainAllPrivilege" : false,
  85857. "obtainUserPrivilege" : false,
  85858. "obtainOtherPrivilege" : false,
  85859. "userInteractionRequired" : true
  85860. }
  85861. },
  85862. "publishedDate" : "2020-04-29T22:15Z",
  85863. "lastModifiedDate" : "2021-05-05T13:40Z"
  85864. }, {
  85865. "cve" : {
  85866. "data_type" : "CVE",
  85867. "data_format" : "MITRE",
  85868. "data_version" : "4.0",
  85869. "CVE_data_meta" : {
  85870. "ID" : "CVE-2020-11023",
  85871. "ASSIGNER" : "security-advisories@github.com"
  85872. },
  85873. "problemtype" : {
  85874. "problemtype_data" : [ {
  85875. "description" : [ {
  85876. "lang" : "en",
  85877. "value" : "CWE-79"
  85878. } ]
  85879. } ]
  85880. },
  85881. "references" : {
  85882. "reference_data" : [ {
  85883. "url" : "https://jquery.com/upgrade-guide/3.5/",
  85884. "name" : "https://jquery.com/upgrade-guide/3.5/",
  85885. "refsource" : "MISC",
  85886. "tags" : [ "Release Notes", "Vendor Advisory" ]
  85887. }, {
  85888. "url" : "https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6",
  85889. "name" : "https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6",
  85890. "refsource" : "CONFIRM",
  85891. "tags" : [ "Third Party Advisory" ]
  85892. }, {
  85893. "url" : "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released",
  85894. "name" : "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released",
  85895. "refsource" : "MISC",
  85896. "tags" : [ "Release Notes", "Vendor Advisory" ]
  85897. }, {
  85898. "url" : "https://security.netapp.com/advisory/ntap-20200511-0006/",
  85899. "name" : "https://security.netapp.com/advisory/ntap-20200511-0006/",
  85900. "refsource" : "CONFIRM",
  85901. "tags" : [ "Third Party Advisory" ]
  85902. }, {
  85903. "url" : "https://www.drupal.org/sa-core-2020-002",
  85904. "name" : "https://www.drupal.org/sa-core-2020-002",
  85905. "refsource" : "CONFIRM",
  85906. "tags" : [ "Third Party Advisory" ]
  85907. }, {
  85908. "url" : "https://www.debian.org/security/2020/dsa-4693",
  85909. "name" : "DSA-4693",
  85910. "refsource" : "DEBIAN",
  85911. "tags" : [ "Third Party Advisory" ]
  85912. }, {
  85913. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/",
  85914. "name" : "FEDORA-2020-36d2db5f51",
  85915. "refsource" : "FEDORA",
  85916. "tags" : [ "Third Party Advisory" ]
  85917. }, {
  85918. "url" : "https://www.oracle.com/security-alerts/cpujul2020.html",
  85919. "name" : "https://www.oracle.com/security-alerts/cpujul2020.html",
  85920. "refsource" : "MISC",
  85921. "tags" : [ "Third Party Advisory" ]
  85922. }, {
  85923. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html",
  85924. "name" : "openSUSE-SU-2020:1060",
  85925. "refsource" : "SUSE",
  85926. "tags" : [ "Broken Link" ]
  85927. }, {
  85928. "url" : "https://security.gentoo.org/glsa/202007-03",
  85929. "name" : "GLSA-202007-03",
  85930. "refsource" : "GENTOO",
  85931. "tags" : [ "Third Party Advisory" ]
  85932. }, {
  85933. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html",
  85934. "name" : "openSUSE-SU-2020:1106",
  85935. "refsource" : "SUSE",
  85936. "tags" : [ "Broken Link" ]
  85937. }, {
  85938. "url" : "https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E",
  85939. "name" : "[hive-gitbox] 20200813 [GitHub] [hive] rajkrrsingh opened a new pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023",
  85940. "refsource" : "MLIST",
  85941. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85942. }, {
  85943. "url" : "https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E",
  85944. "name" : "[hive-issues] 20200813 [jira] [Assigned] (HIVE-24039) update jquery version to mitigate CVE-2020-11023",
  85945. "refsource" : "MLIST",
  85946. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85947. }, {
  85948. "url" : "https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E",
  85949. "name" : "[hive-issues] 20200813 [jira] [Updated] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023",
  85950. "refsource" : "MLIST",
  85951. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85952. }, {
  85953. "url" : "https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E",
  85954. "name" : "[hive-dev] 20200813 [jira] [Created] (HIVE-24039) update jquery version to mitigate CVE-2020-11023",
  85955. "refsource" : "MLIST",
  85956. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85957. }, {
  85958. "url" : "https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E",
  85959. "name" : "[hive-issues] 20200902 [jira] [Work started] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023",
  85960. "refsource" : "MLIST",
  85961. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85962. }, {
  85963. "url" : "https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E",
  85964. "name" : "[hive-issues] 20200902 [jira] [Commented] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023",
  85965. "refsource" : "MLIST",
  85966. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85967. }, {
  85968. "url" : "https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E",
  85969. "name" : "[hive-issues] 20200902 [jira] [Assigned] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023",
  85970. "refsource" : "MLIST",
  85971. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85972. }, {
  85973. "url" : "https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E",
  85974. "name" : "[hive-issues] 20200902 [jira] [Comment Edited] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023",
  85975. "refsource" : "MLIST",
  85976. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85977. }, {
  85978. "url" : "https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E",
  85979. "name" : "[hive-issues] 20200904 [jira] [Assigned] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023",
  85980. "refsource" : "MLIST",
  85981. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85982. }, {
  85983. "url" : "https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E",
  85984. "name" : "[hive-gitbox] 20200911 [GitHub] [hive] rajkrrsingh closed pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023",
  85985. "refsource" : "MLIST",
  85986. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85987. }, {
  85988. "url" : "https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E",
  85989. "name" : "[hive-gitbox] 20200911 [GitHub] [hive] rajkrrsingh opened a new pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023",
  85990. "refsource" : "MLIST",
  85991. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85992. }, {
  85993. "url" : "https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E",
  85994. "name" : "[hive-gitbox] 20200912 [GitHub] [hive] rajkrrsingh opened a new pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023",
  85995. "refsource" : "MLIST",
  85996. "tags" : [ "Mailing List", "Third Party Advisory" ]
  85997. }, {
  85998. "url" : "https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E",
  85999. "name" : "[hive-gitbox] 20200912 [GitHub] [hive] rajkrrsingh closed pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023",
  86000. "refsource" : "MLIST",
  86001. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86002. }, {
  86003. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/",
  86004. "name" : "FEDORA-2020-0b32a59b54",
  86005. "refsource" : "FEDORA",
  86006. "tags" : [ "Third Party Advisory" ]
  86007. }, {
  86008. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/",
  86009. "name" : "FEDORA-2020-fbb94073a1",
  86010. "refsource" : "FEDORA",
  86011. "tags" : [ "Third Party Advisory" ]
  86012. }, {
  86013. "url" : "https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E",
  86014. "name" : "[hive-commits] 20200915 [hive] branch master updated: HIVE-24039 : Update jquery version to mitigate CVE-2020-11023 (#1403)",
  86015. "refsource" : "MLIST",
  86016. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  86017. }, {
  86018. "url" : "https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E",
  86019. "name" : "[hive-issues] 20200915 [jira] [Resolved] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023",
  86020. "refsource" : "MLIST",
  86021. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86022. }, {
  86023. "url" : "https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E",
  86024. "name" : "[hive-issues] 20200915 [jira] [Work logged] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023",
  86025. "refsource" : "MLIST",
  86026. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86027. }, {
  86028. "url" : "https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E",
  86029. "name" : "[hive-gitbox] 20200915 [GitHub] [hive] kgyrtkirk merged pull request #1403: HIVE-24039 : Update jquery version to mitigate CVE-2020-11023",
  86030. "refsource" : "MLIST",
  86031. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86032. }, {
  86033. "url" : "https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E",
  86034. "name" : "[hive-issues] 20200915 [jira] [Updated] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023",
  86035. "refsource" : "MLIST",
  86036. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86037. }, {
  86038. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/",
  86039. "name" : "FEDORA-2020-fe94df8c34",
  86040. "refsource" : "FEDORA",
  86041. "tags" : [ "Third Party Advisory" ]
  86042. }, {
  86043. "url" : "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E",
  86044. "name" : "[nifi-commits] 20200930 svn commit: r1882168 - /nifi/site/trunk/security.html",
  86045. "refsource" : "MLIST",
  86046. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86047. }, {
  86048. "url" : "https://www.oracle.com/security-alerts/cpuoct2020.html",
  86049. "name" : "https://www.oracle.com/security-alerts/cpuoct2020.html",
  86050. "refsource" : "MISC",
  86051. "tags" : [ "Third Party Advisory" ]
  86052. }, {
  86053. "url" : "https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E",
  86054. "name" : "[flink-dev] 20201105 [jira] [Created] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  86055. "refsource" : "MLIST",
  86056. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86057. }, {
  86058. "url" : "https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E",
  86059. "name" : "[flink-issues] 20201105 [jira] [Created] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  86060. "refsource" : "MLIST",
  86061. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86062. }, {
  86063. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html",
  86064. "name" : "openSUSE-SU-2020:1888",
  86065. "refsource" : "SUSE",
  86066. "tags" : [ "Broken Link", "Mailing List", "Third Party Advisory" ]
  86067. }, {
  86068. "url" : "https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E",
  86069. "name" : "[flink-issues] 20201129 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  86070. "refsource" : "MLIST",
  86071. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86072. }, {
  86073. "url" : "https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E",
  86074. "name" : "[felix-dev] 20201208 [jira] [Created] (FELIX-6366) 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023",
  86075. "refsource" : "MLIST",
  86076. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86077. }, {
  86078. "url" : "https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E",
  86079. "name" : "[felix-dev] 20201208 [GitHub] [felix-dev] cziegeler merged pull request #64: FELIX-6366 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023",
  86080. "refsource" : "MLIST",
  86081. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86082. }, {
  86083. "url" : "https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E",
  86084. "name" : "[felix-dev] 20201208 [jira] [Commented] (FELIX-6366) 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023",
  86085. "refsource" : "MLIST",
  86086. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86087. }, {
  86088. "url" : "https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E",
  86089. "name" : "[felix-dev] 20201208 [jira] [Assigned] (FELIX-6366) 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023",
  86090. "refsource" : "MLIST",
  86091. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86092. }, {
  86093. "url" : "https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E",
  86094. "name" : "[felix-dev] 20201208 [GitHub] [felix-dev] abhishekgarg18 opened a new pull request #64: FELIX-6366 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023",
  86095. "refsource" : "MLIST",
  86096. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86097. }, {
  86098. "url" : "https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E",
  86099. "name" : "[felix-dev] 20201208 [jira] [Updated] (FELIX-6366) 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023",
  86100. "refsource" : "MLIST",
  86101. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86102. }, {
  86103. "url" : "https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E",
  86104. "name" : "[felix-commits] 20201208 [felix-dev] branch master updated: FELIX-6366 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023 (#64)",
  86105. "refsource" : "MLIST",
  86106. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  86107. }, {
  86108. "url" : "https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E",
  86109. "name" : "[felix-dev] 20201208 [jira] [Updated] (FELIX-6366) 1.0.3 < jQuery <3.5.0 is vulnerable to CVE-2020-11023",
  86110. "refsource" : "MLIST",
  86111. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86112. }, {
  86113. "url" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  86114. "name" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  86115. "refsource" : "MISC",
  86116. "tags" : [ "Third Party Advisory" ]
  86117. }, {
  86118. "url" : "https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E",
  86119. "name" : "[flink-issues] 20210209 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  86120. "refsource" : "MLIST",
  86121. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86122. }, {
  86123. "url" : "https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E",
  86124. "name" : "[flink-issues] 20210209 [jira] [Comment Edited] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  86125. "refsource" : "MLIST",
  86126. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86127. }, {
  86128. "url" : "https://www.tenable.com/security/tns-2021-02",
  86129. "name" : "https://www.tenable.com/security/tns-2021-02",
  86130. "refsource" : "CONFIRM",
  86131. "tags" : [ "Third Party Advisory" ]
  86132. }, {
  86133. "url" : "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html",
  86134. "name" : "[debian-lts-announce] 20210326 [SECURITY] [DLA 2608-1] jquery security update",
  86135. "refsource" : "MLIST",
  86136. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86137. }, {
  86138. "url" : "http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html",
  86139. "name" : "http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html",
  86140. "refsource" : "MISC",
  86141. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  86142. }, {
  86143. "url" : "https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E",
  86144. "name" : "[flink-issues] 20210422 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  86145. "refsource" : "MLIST",
  86146. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86147. }, {
  86148. "url" : "https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E",
  86149. "name" : "[flink-issues] 20210422 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  86150. "refsource" : "MLIST",
  86151. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86152. }, {
  86153. "url" : "https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E",
  86154. "name" : "[flink-issues] 20210429 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  86155. "refsource" : "MLIST",
  86156. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86157. }, {
  86158. "url" : "https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E",
  86159. "name" : "[flink-issues] 20210429 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler",
  86160. "refsource" : "MLIST",
  86161. "tags" : [ "Mailing List", "Third Party Advisory" ]
  86162. } ]
  86163. },
  86164. "description" : {
  86165. "description_data" : [ {
  86166. "lang" : "en",
  86167. "value" : "In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0."
  86168. } ]
  86169. }
  86170. },
  86171. "configurations" : {
  86172. "CVE_data_version" : "4.0",
  86173. "nodes" : [ {
  86174. "operator" : "OR",
  86175. "children" : [ ],
  86176. "cpe_match" : [ {
  86177. "vulnerable" : true,
  86178. "cpe23Uri" : "cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:*",
  86179. "versionStartIncluding" : "1.0.3",
  86180. "versionEndExcluding" : "3.5.0",
  86181. "cpe_name" : [ ]
  86182. } ]
  86183. }, {
  86184. "operator" : "OR",
  86185. "children" : [ ],
  86186. "cpe_match" : [ {
  86187. "vulnerable" : true,
  86188. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  86189. "cpe_name" : [ ]
  86190. } ]
  86191. }, {
  86192. "operator" : "OR",
  86193. "children" : [ ],
  86194. "cpe_match" : [ {
  86195. "vulnerable" : true,
  86196. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
  86197. "cpe_name" : [ ]
  86198. }, {
  86199. "vulnerable" : true,
  86200. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
  86201. "cpe_name" : [ ]
  86202. }, {
  86203. "vulnerable" : true,
  86204. "cpe23Uri" : "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
  86205. "cpe_name" : [ ]
  86206. } ]
  86207. }, {
  86208. "operator" : "OR",
  86209. "children" : [ ],
  86210. "cpe_match" : [ {
  86211. "vulnerable" : true,
  86212. "cpe23Uri" : "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
  86213. "versionStartIncluding" : "7.0",
  86214. "versionEndExcluding" : "7.70",
  86215. "cpe_name" : [ ]
  86216. }, {
  86217. "vulnerable" : true,
  86218. "cpe23Uri" : "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
  86219. "versionStartIncluding" : "8.7.0",
  86220. "versionEndExcluding" : "8.7.14",
  86221. "cpe_name" : [ ]
  86222. }, {
  86223. "vulnerable" : true,
  86224. "cpe23Uri" : "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
  86225. "versionStartIncluding" : "8.8.0",
  86226. "versionEndExcluding" : "8.8.6",
  86227. "cpe_name" : [ ]
  86228. } ]
  86229. }, {
  86230. "operator" : "OR",
  86231. "children" : [ ],
  86232. "cpe_match" : [ {
  86233. "vulnerable" : true,
  86234. "cpe23Uri" : "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*",
  86235. "versionEndExcluding" : "20.2",
  86236. "cpe_name" : [ ]
  86237. }, {
  86238. "vulnerable" : true,
  86239. "cpe23Uri" : "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*",
  86240. "cpe_name" : [ ]
  86241. }, {
  86242. "vulnerable" : true,
  86243. "cpe23Uri" : "cpe:2.3:a:oracle:banking_enterprise_collections:*:*:*:*:*:*:*:*",
  86244. "versionStartIncluding" : "2.7.0",
  86245. "versionEndIncluding" : "2.8.0",
  86246. "cpe_name" : [ ]
  86247. }, {
  86248. "vulnerable" : true,
  86249. "cpe23Uri" : "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*",
  86250. "versionStartIncluding" : "2.4.0",
  86251. "versionEndIncluding" : "2.10.0",
  86252. "cpe_name" : [ ]
  86253. }, {
  86254. "vulnerable" : true,
  86255. "cpe23Uri" : "cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:*",
  86256. "cpe_name" : [ ]
  86257. }, {
  86258. "vulnerable" : true,
  86259. "cpe23Uri" : "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*",
  86260. "cpe_name" : [ ]
  86261. }, {
  86262. "vulnerable" : true,
  86263. "cpe23Uri" : "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*",
  86264. "cpe_name" : [ ]
  86265. }, {
  86266. "vulnerable" : true,
  86267. "cpe23Uri" : "cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*",
  86268. "cpe_name" : [ ]
  86269. }, {
  86270. "vulnerable" : true,
  86271. "cpe23Uri" : "cpe:2.3:a:oracle:communications_interactive_session_recorder:*:*:*:*:*:*:*:*",
  86272. "versionStartIncluding" : "6.1",
  86273. "versionEndIncluding" : "6.4",
  86274. "cpe_name" : [ ]
  86275. }, {
  86276. "vulnerable" : true,
  86277. "cpe23Uri" : "cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
  86278. "cpe_name" : [ ]
  86279. }, {
  86280. "vulnerable" : true,
  86281. "cpe23Uri" : "cpe:2.3:a:oracle:communications_operations_monitor:*:*:*:*:*:*:*:*",
  86282. "versionStartIncluding" : "4.1",
  86283. "versionEndIncluding" : "4.3",
  86284. "cpe_name" : [ ]
  86285. }, {
  86286. "vulnerable" : true,
  86287. "cpe23Uri" : "cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*",
  86288. "cpe_name" : [ ]
  86289. }, {
  86290. "vulnerable" : true,
  86291. "cpe23Uri" : "cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*",
  86292. "cpe_name" : [ ]
  86293. }, {
  86294. "vulnerable" : true,
  86295. "cpe23Uri" : "cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*",
  86296. "cpe_name" : [ ]
  86297. }, {
  86298. "vulnerable" : true,
  86299. "cpe23Uri" : "cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*",
  86300. "cpe_name" : [ ]
  86301. }, {
  86302. "vulnerable" : true,
  86303. "cpe23Uri" : "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*",
  86304. "cpe_name" : [ ]
  86305. }, {
  86306. "vulnerable" : true,
  86307. "cpe23Uri" : "cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*",
  86308. "cpe_name" : [ ]
  86309. }, {
  86310. "vulnerable" : true,
  86311. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_regulatory_reporting_for_de_nederlandsche_bank:8.0.4:*:*:*:*:*:*:*",
  86312. "cpe_name" : [ ]
  86313. }, {
  86314. "vulnerable" : true,
  86315. "cpe23Uri" : "cpe:2.3:a:oracle:healthcare_translational_research:3.2.1:*:*:*:*:*:*:*",
  86316. "cpe_name" : [ ]
  86317. }, {
  86318. "vulnerable" : true,
  86319. "cpe23Uri" : "cpe:2.3:a:oracle:healthcare_translational_research:3.3.1:*:*:*:*:*:*:*",
  86320. "cpe_name" : [ ]
  86321. }, {
  86322. "vulnerable" : true,
  86323. "cpe23Uri" : "cpe:2.3:a:oracle:healthcare_translational_research:3.3.2:*:*:*:*:*:*:*",
  86324. "cpe_name" : [ ]
  86325. }, {
  86326. "vulnerable" : true,
  86327. "cpe23Uri" : "cpe:2.3:a:oracle:healthcare_translational_research:3.4.0:*:*:*:*:*:*:*",
  86328. "cpe_name" : [ ]
  86329. }, {
  86330. "vulnerable" : true,
  86331. "cpe23Uri" : "cpe:2.3:a:oracle:hyperion_financial_reporting:11.1.2.4:*:*:*:*:*:*:*",
  86332. "cpe_name" : [ ]
  86333. }, {
  86334. "vulnerable" : true,
  86335. "cpe23Uri" : "cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:*",
  86336. "versionEndExcluding" : "9.2.5.0",
  86337. "cpe_name" : [ ]
  86338. }, {
  86339. "vulnerable" : true,
  86340. "cpe23Uri" : "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*",
  86341. "versionEndExcluding" : "9.2.5.0",
  86342. "cpe_name" : [ ]
  86343. }, {
  86344. "vulnerable" : true,
  86345. "cpe23Uri" : "cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management_resources:9.2:*:*:*:*:*:*:*",
  86346. "cpe_name" : [ ]
  86347. }, {
  86348. "vulnerable" : true,
  86349. "cpe23Uri" : "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
  86350. "versionStartIncluding" : "16.2",
  86351. "versionEndIncluding" : "16.2.11",
  86352. "cpe_name" : [ ]
  86353. }, {
  86354. "vulnerable" : true,
  86355. "cpe23Uri" : "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
  86356. "versionStartIncluding" : "17.12.0",
  86357. "versionEndIncluding" : "17.12.7",
  86358. "cpe_name" : [ ]
  86359. }, {
  86360. "vulnerable" : true,
  86361. "cpe23Uri" : "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
  86362. "versionStartIncluding" : "18.8.0",
  86363. "versionEndIncluding" : "18.8.9",
  86364. "cpe_name" : [ ]
  86365. }, {
  86366. "vulnerable" : true,
  86367. "cpe23Uri" : "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
  86368. "versionStartIncluding" : "19.12.0",
  86369. "versionEndIncluding" : "19.12.4",
  86370. "cpe_name" : [ ]
  86371. }, {
  86372. "vulnerable" : true,
  86373. "cpe23Uri" : "cpe:2.3:a:oracle:rest_data_services:11.2.0.4:*:*:*:-:*:*:*",
  86374. "cpe_name" : [ ]
  86375. }, {
  86376. "vulnerable" : true,
  86377. "cpe23Uri" : "cpe:2.3:a:oracle:rest_data_services:12.1.0.2:*:*:*:-:*:*:*",
  86378. "cpe_name" : [ ]
  86379. }, {
  86380. "vulnerable" : true,
  86381. "cpe23Uri" : "cpe:2.3:a:oracle:rest_data_services:12.2.0.1:*:*:*:-:*:*:*",
  86382. "cpe_name" : [ ]
  86383. }, {
  86384. "vulnerable" : true,
  86385. "cpe23Uri" : "cpe:2.3:a:oracle:rest_data_services:18c:*:*:*:-:*:*:*",
  86386. "cpe_name" : [ ]
  86387. }, {
  86388. "vulnerable" : true,
  86389. "cpe23Uri" : "cpe:2.3:a:oracle:rest_data_services:19c:*:*:*:-:*:*:*",
  86390. "cpe_name" : [ ]
  86391. }, {
  86392. "vulnerable" : true,
  86393. "cpe23Uri" : "cpe:2.3:a:oracle:siebel_mobile:*:*:*:*:*:*:*:*",
  86394. "versionEndIncluding" : "20.12",
  86395. "cpe_name" : [ ]
  86396. }, {
  86397. "vulnerable" : true,
  86398. "cpe23Uri" : "cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3.1:*:*:*:*:*:*:*",
  86399. "cpe_name" : [ ]
  86400. }, {
  86401. "vulnerable" : true,
  86402. "cpe23Uri" : "cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*",
  86403. "cpe_name" : [ ]
  86404. }, {
  86405. "vulnerable" : true,
  86406. "cpe23Uri" : "cpe:2.3:a:oracle:webcenter_sites:12.2.1.4.0:*:*:*:*:*:*:*",
  86407. "cpe_name" : [ ]
  86408. }, {
  86409. "vulnerable" : true,
  86410. "cpe23Uri" : "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
  86411. "cpe_name" : [ ]
  86412. }, {
  86413. "vulnerable" : true,
  86414. "cpe23Uri" : "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
  86415. "cpe_name" : [ ]
  86416. }, {
  86417. "vulnerable" : true,
  86418. "cpe23Uri" : "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
  86419. "cpe_name" : [ ]
  86420. }, {
  86421. "vulnerable" : true,
  86422. "cpe23Uri" : "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
  86423. "cpe_name" : [ ]
  86424. } ]
  86425. }, {
  86426. "operator" : "AND",
  86427. "children" : [ {
  86428. "operator" : "OR",
  86429. "children" : [ ],
  86430. "cpe_match" : [ {
  86431. "vulnerable" : true,
  86432. "cpe23Uri" : "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
  86433. "cpe_name" : [ ]
  86434. } ]
  86435. }, {
  86436. "operator" : "OR",
  86437. "children" : [ ],
  86438. "cpe_match" : [ {
  86439. "vulnerable" : false,
  86440. "cpe23Uri" : "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
  86441. "cpe_name" : [ ]
  86442. } ]
  86443. } ],
  86444. "cpe_match" : [ ]
  86445. }, {
  86446. "operator" : "AND",
  86447. "children" : [ {
  86448. "operator" : "OR",
  86449. "children" : [ ],
  86450. "cpe_match" : [ {
  86451. "vulnerable" : true,
  86452. "cpe23Uri" : "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
  86453. "cpe_name" : [ ]
  86454. } ]
  86455. }, {
  86456. "operator" : "OR",
  86457. "children" : [ ],
  86458. "cpe_match" : [ {
  86459. "vulnerable" : false,
  86460. "cpe23Uri" : "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
  86461. "cpe_name" : [ ]
  86462. } ]
  86463. } ],
  86464. "cpe_match" : [ ]
  86465. }, {
  86466. "operator" : "AND",
  86467. "children" : [ {
  86468. "operator" : "OR",
  86469. "children" : [ ],
  86470. "cpe_match" : [ {
  86471. "vulnerable" : true,
  86472. "cpe23Uri" : "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
  86473. "cpe_name" : [ ]
  86474. } ]
  86475. }, {
  86476. "operator" : "OR",
  86477. "children" : [ ],
  86478. "cpe_match" : [ {
  86479. "vulnerable" : false,
  86480. "cpe23Uri" : "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
  86481. "cpe_name" : [ ]
  86482. } ]
  86483. } ],
  86484. "cpe_match" : [ ]
  86485. }, {
  86486. "operator" : "AND",
  86487. "children" : [ {
  86488. "operator" : "OR",
  86489. "children" : [ ],
  86490. "cpe_match" : [ {
  86491. "vulnerable" : true,
  86492. "cpe23Uri" : "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
  86493. "cpe_name" : [ ]
  86494. } ]
  86495. }, {
  86496. "operator" : "OR",
  86497. "children" : [ ],
  86498. "cpe_match" : [ {
  86499. "vulnerable" : false,
  86500. "cpe23Uri" : "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
  86501. "cpe_name" : [ ]
  86502. } ]
  86503. } ],
  86504. "cpe_match" : [ ]
  86505. }, {
  86506. "operator" : "AND",
  86507. "children" : [ {
  86508. "operator" : "OR",
  86509. "children" : [ ],
  86510. "cpe_match" : [ {
  86511. "vulnerable" : true,
  86512. "cpe23Uri" : "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
  86513. "cpe_name" : [ ]
  86514. } ]
  86515. }, {
  86516. "operator" : "OR",
  86517. "children" : [ ],
  86518. "cpe_match" : [ {
  86519. "vulnerable" : false,
  86520. "cpe23Uri" : "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
  86521. "cpe_name" : [ ]
  86522. } ]
  86523. } ],
  86524. "cpe_match" : [ ]
  86525. }, {
  86526. "operator" : "AND",
  86527. "children" : [ {
  86528. "operator" : "OR",
  86529. "children" : [ ],
  86530. "cpe_match" : [ {
  86531. "vulnerable" : true,
  86532. "cpe23Uri" : "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
  86533. "cpe_name" : [ ]
  86534. } ]
  86535. }, {
  86536. "operator" : "OR",
  86537. "children" : [ ],
  86538. "cpe_match" : [ {
  86539. "vulnerable" : false,
  86540. "cpe23Uri" : "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
  86541. "cpe_name" : [ ]
  86542. } ]
  86543. } ],
  86544. "cpe_match" : [ ]
  86545. }, {
  86546. "operator" : "AND",
  86547. "children" : [ {
  86548. "operator" : "OR",
  86549. "children" : [ ],
  86550. "cpe_match" : [ {
  86551. "vulnerable" : true,
  86552. "cpe23Uri" : "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
  86553. "cpe_name" : [ ]
  86554. } ]
  86555. }, {
  86556. "operator" : "OR",
  86557. "children" : [ ],
  86558. "cpe_match" : [ {
  86559. "vulnerable" : false,
  86560. "cpe23Uri" : "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
  86561. "cpe_name" : [ ]
  86562. } ]
  86563. } ],
  86564. "cpe_match" : [ ]
  86565. }, {
  86566. "operator" : "AND",
  86567. "children" : [ {
  86568. "operator" : "OR",
  86569. "children" : [ ],
  86570. "cpe_match" : [ {
  86571. "vulnerable" : true,
  86572. "cpe23Uri" : "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
  86573. "cpe_name" : [ ]
  86574. } ]
  86575. }, {
  86576. "operator" : "OR",
  86577. "children" : [ ],
  86578. "cpe_match" : [ {
  86579. "vulnerable" : false,
  86580. "cpe23Uri" : "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
  86581. "cpe_name" : [ ]
  86582. } ]
  86583. } ],
  86584. "cpe_match" : [ ]
  86585. }, {
  86586. "operator" : "OR",
  86587. "children" : [ ],
  86588. "cpe_match" : [ {
  86589. "vulnerable" : true,
  86590. "cpe23Uri" : "cpe:2.3:a:netapp:max_data:-:*:*:*:*:*:*:*",
  86591. "cpe_name" : [ ]
  86592. }, {
  86593. "vulnerable" : true,
  86594. "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
  86595. "cpe_name" : [ ]
  86596. }, {
  86597. "vulnerable" : true,
  86598. "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*",
  86599. "versionStartIncluding" : "3.0",
  86600. "versionEndIncluding" : "3.1.3",
  86601. "cpe_name" : [ ]
  86602. }, {
  86603. "vulnerable" : true,
  86604. "cpe23Uri" : "cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*",
  86605. "cpe_name" : [ ]
  86606. }, {
  86607. "vulnerable" : true,
  86608. "cpe23Uri" : "cpe:2.3:a:netapp:snapcenter_server:-:*:*:*:*:*:*:*",
  86609. "cpe_name" : [ ]
  86610. } ]
  86611. } ]
  86612. },
  86613. "impact" : {
  86614. "baseMetricV3" : {
  86615. "cvssV3" : {
  86616. "version" : "3.1",
  86617. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  86618. "attackVector" : "NETWORK",
  86619. "attackComplexity" : "LOW",
  86620. "privilegesRequired" : "NONE",
  86621. "userInteraction" : "REQUIRED",
  86622. "scope" : "CHANGED",
  86623. "confidentialityImpact" : "LOW",
  86624. "integrityImpact" : "LOW",
  86625. "availabilityImpact" : "NONE",
  86626. "baseScore" : 6.1,
  86627. "baseSeverity" : "MEDIUM"
  86628. },
  86629. "exploitabilityScore" : 2.8,
  86630. "impactScore" : 2.7
  86631. },
  86632. "baseMetricV2" : {
  86633. "cvssV2" : {
  86634. "version" : "2.0",
  86635. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  86636. "accessVector" : "NETWORK",
  86637. "accessComplexity" : "MEDIUM",
  86638. "authentication" : "NONE",
  86639. "confidentialityImpact" : "NONE",
  86640. "integrityImpact" : "PARTIAL",
  86641. "availabilityImpact" : "NONE",
  86642. "baseScore" : 4.3
  86643. },
  86644. "severity" : "MEDIUM",
  86645. "exploitabilityScore" : 8.6,
  86646. "impactScore" : 2.9,
  86647. "acInsufInfo" : false,
  86648. "obtainAllPrivilege" : false,
  86649. "obtainUserPrivilege" : false,
  86650. "obtainOtherPrivilege" : false,
  86651. "userInteractionRequired" : true
  86652. }
  86653. },
  86654. "publishedDate" : "2020-04-29T21:15Z",
  86655. "lastModifiedDate" : "2021-05-05T13:39Z"
  86656. }, {
  86657. "cve" : {
  86658. "data_type" : "CVE",
  86659. "data_format" : "MITRE",
  86660. "data_version" : "4.0",
  86661. "CVE_data_meta" : {
  86662. "ID" : "CVE-2020-9488",
  86663. "ASSIGNER" : "security@apache.org"
  86664. },
  86665. "problemtype" : {
  86666. "problemtype_data" : [ {
  86667. "description" : [ {
  86668. "lang" : "en",
  86669. "value" : "CWE-295"
  86670. } ]
  86671. } ]
  86672. },
  86673. "references" : {
  86674. "reference_data" : [ {
  86675. "url" : "https://issues.apache.org/jira/browse/LOG4J2-2819",
  86676. "name" : "https://issues.apache.org/jira/browse/LOG4J2-2819",
  86677. "refsource" : "CONFIRM",
  86678. "tags" : [ "Issue Tracking", "Mitigation", "Patch", "Vendor Advisory" ]
  86679. }, {
  86680. "url" : "https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846@%3Cissues.zookeeper.apache.org%3E",
  86681. "name" : "[zookeeper-issues] 20200504 [jira] [Created] (ZOOKEEPER-3817) owasp failing due to CVE-2020-9488",
  86682. "refsource" : "MLIST",
  86683. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86684. }, {
  86685. "url" : "https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6@%3Cdev.zookeeper.apache.org%3E",
  86686. "name" : "[zookeeper-dev] 20200504 [jira] [Created] (ZOOKEEPER-3817) owasp failing due to CVE-2020-9488",
  86687. "refsource" : "MLIST",
  86688. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86689. }, {
  86690. "url" : "https://security.netapp.com/advisory/ntap-20200504-0003/",
  86691. "name" : "https://security.netapp.com/advisory/ntap-20200504-0003/",
  86692. "refsource" : "CONFIRM",
  86693. "tags" : [ "Third Party Advisory" ]
  86694. }, {
  86695. "url" : "https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E",
  86696. "name" : "[zookeeper-notifications] 20200504 Build failed in Jenkins: zookeeper-master-maven-owasp #489",
  86697. "refsource" : "MLIST",
  86698. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86699. }, {
  86700. "url" : "https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98@%3Cissues.zookeeper.apache.org%3E",
  86701. "name" : "[zookeeper-issues] 20200504 [jira] [Commented] (ZOOKEEPER-3817) owasp failing due to CVE-2020-9488",
  86702. "refsource" : "MLIST",
  86703. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86704. }, {
  86705. "url" : "https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05@%3Cdev.zookeeper.apache.org%3E",
  86706. "name" : "[zookeeper-dev] 20200504 log4j SmtpAppender related CVE",
  86707. "refsource" : "MLIST",
  86708. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86709. }, {
  86710. "url" : "https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac@%3Cissues.zookeeper.apache.org%3E",
  86711. "name" : "[zookeeper-issues] 20200504 [jira] [Assigned] (ZOOKEEPER-3817) owasp failing due to CVE-2020-9488",
  86712. "refsource" : "MLIST",
  86713. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86714. }, {
  86715. "url" : "https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5@%3Cnotifications.zookeeper.apache.org%3E",
  86716. "name" : "[zookeeper-notifications] 20200504 [GitHub] [zookeeper] symat opened a new pull request #1346: ZOOKEEPER-3817: suppress log4j SmtpAppender related CVE-2020-9488",
  86717. "refsource" : "MLIST",
  86718. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86719. }, {
  86720. "url" : "https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd@%3Cissues.zookeeper.apache.org%3E",
  86721. "name" : "[zookeeper-issues] 20200504 [jira] [Updated] (ZOOKEEPER-3817) owasp failing due to CVE-2020-9488",
  86722. "refsource" : "MLIST",
  86723. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86724. }, {
  86725. "url" : "https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E",
  86726. "name" : "[zookeeper-commits] 20200504 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-3817: suppress log4j SmtpAppender related CVE-2020-9488",
  86727. "refsource" : "MLIST",
  86728. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  86729. }, {
  86730. "url" : "https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701@%3Cnotifications.zookeeper.apache.org%3E",
  86731. "name" : "[zookeeper-notifications] 20200504 [GitHub] [zookeeper] symat commented on pull request #1346: ZOOKEEPER-3817: suppress log4j SmtpAppender related CVE-2020-9488",
  86732. "refsource" : "MLIST",
  86733. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86734. }, {
  86735. "url" : "https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E",
  86736. "name" : "[zookeeper-commits] 20200504 [zookeeper] branch master updated: ZOOKEEPER-3817: suppress log4j SmtpAppender related CVE-2020-9488",
  86737. "refsource" : "MLIST",
  86738. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  86739. }, {
  86740. "url" : "https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E",
  86741. "name" : "[zookeeper-commits] 20200504 [zookeeper] branch branch-3.5 updated: ZOOKEEPER-3817: suppress log4j SmtpAppender related CVE-2020-9488",
  86742. "refsource" : "MLIST",
  86743. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  86744. }, {
  86745. "url" : "https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc@%3Cissues.zookeeper.apache.org%3E",
  86746. "name" : "[zookeeper-issues] 20200504 [jira] [Resolved] (ZOOKEEPER-3817) owasp failing due to CVE-2020-9488",
  86747. "refsource" : "MLIST",
  86748. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86749. }, {
  86750. "url" : "https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E",
  86751. "name" : "[kafka-dev] 20200514 [jira] [Created] (KAFKA-9996) upgrade zookeeper to 3.5.8 to address security vulnerabilities",
  86752. "refsource" : "MLIST",
  86753. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86754. }, {
  86755. "url" : "https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E",
  86756. "name" : "[kafka-jira] 20200514 [jira] [Created] (KAFKA-9996) upgrade zookeeper to 3.5.8 to address security vulnerabilities",
  86757. "refsource" : "MLIST",
  86758. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86759. }, {
  86760. "url" : "https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20@%3Cdev.kafka.apache.org%3E",
  86761. "name" : "[kafka-dev] 20200514 [jira] [Created] (KAFKA-9997) upgrade log4j lib to address CVE-2020-9488",
  86762. "refsource" : "MLIST",
  86763. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86764. }, {
  86765. "url" : "https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a@%3Cjira.kafka.apache.org%3E",
  86766. "name" : "[kafka-jira] 20200514 [jira] [Created] (KAFKA-9997) upgrade log4j lib to address CVE-2020-9488",
  86767. "refsource" : "MLIST",
  86768. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86769. }, {
  86770. "url" : "https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E",
  86771. "name" : "[kafka-jira] 20200515 [jira] [Commented] (KAFKA-9997) upgrade log4j lib to address CVE-2020-9488",
  86772. "refsource" : "MLIST",
  86773. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86774. }, {
  86775. "url" : "https://www.oracle.com/security-alerts/cpujul2020.html",
  86776. "name" : "https://www.oracle.com/security-alerts/cpujul2020.html",
  86777. "refsource" : "MISC",
  86778. "tags" : [ "Third Party Advisory" ]
  86779. }, {
  86780. "url" : "https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E",
  86781. "name" : "[db-torque-dev] 20200715 Build failed in Jenkins: Torque4-trunk #685",
  86782. "refsource" : "MLIST",
  86783. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86784. }, {
  86785. "url" : "https://www.oracle.com/security-alerts/cpuoct2020.html",
  86786. "name" : "https://www.oracle.com/security-alerts/cpuoct2020.html",
  86787. "refsource" : "MISC",
  86788. "tags" : [ "Third Party Advisory" ]
  86789. }, {
  86790. "url" : "https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f@%3Cissues.hive.apache.org%3E",
  86791. "name" : "[hive-issues] 20201207 [jira] [Updated] (HIVE-24500) Hive - upgrade log4j 2.12.1 to 2.13.2+ due to CVE-2020-9488",
  86792. "refsource" : "MLIST",
  86793. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86794. }, {
  86795. "url" : "https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f@%3Cdev.hive.apache.org%3E",
  86796. "name" : "[hive-dev] 20201207 [jira] [Created] (HIVE-24500) Hive - upgrade log4j 2.12.1 to 2.13.2+ due to CVE-2020-9488",
  86797. "refsource" : "MLIST",
  86798. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86799. }, {
  86800. "url" : "https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40@%3Cissues.hive.apache.org%3E",
  86801. "name" : "[hive-issues] 20201207 [jira] [Assigned] (HIVE-24500) Hive - upgrade log4j 2.12.1 to 2.13.2+ due to CVE-2020-9488",
  86802. "refsource" : "MLIST",
  86803. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86804. }, {
  86805. "url" : "https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881@%3Cissues.hive.apache.org%3E",
  86806. "name" : "[hive-issues] 20201207 [jira] [Work started] (HIVE-24500) Hive - upgrade log4j 2.12.1 to 2.13.2+ due to CVE-2020-9488",
  86807. "refsource" : "MLIST",
  86808. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86809. }, {
  86810. "url" : "https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c@%3Cissues.hive.apache.org%3E",
  86811. "name" : "[hive-issues] 20201208 [jira] [Work logged] (HIVE-24500) Hive - upgrade log4j 2.12.1 to 2.13.2+ due to CVE-2020-9488",
  86812. "refsource" : "MLIST",
  86813. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86814. }, {
  86815. "url" : "https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3@%3Cissues.hive.apache.org%3E",
  86816. "name" : "[hive-issues] 20201208 [jira] [Updated] (HIVE-24500) Hive - upgrade log4j 2.12.1 to 2.13.2+ due to CVE-2020-9488",
  86817. "refsource" : "MLIST",
  86818. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86819. }, {
  86820. "url" : "https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E",
  86821. "name" : "https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E",
  86822. "refsource" : "MISC",
  86823. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86824. }, {
  86825. "url" : "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
  86826. "name" : "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list",
  86827. "refsource" : "MLIST",
  86828. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86829. }, {
  86830. "url" : "https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E",
  86831. "name" : "https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E",
  86832. "refsource" : "MISC",
  86833. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86834. }, {
  86835. "url" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  86836. "name" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  86837. "refsource" : "MISC",
  86838. "tags" : [ "Third Party Advisory" ]
  86839. }, {
  86840. "url" : "https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3@%3Cissues.hive.apache.org%3E",
  86841. "name" : "[hive-issues] 20210125 [jira] [Work logged] (HIVE-24500) Hive - upgrade log4j 2.12.1 to 2.13.2+ due to CVE-2020-9488",
  86842. "refsource" : "MLIST",
  86843. "tags" : [ "Issue Tracking", "Mailing List", "Vendor Advisory" ]
  86844. }, {
  86845. "url" : "https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E",
  86846. "name" : "[db-torque-dev] 20210127 Re: Items for our (delayed) quarterly report to the board?",
  86847. "refsource" : "MLIST",
  86848. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86849. }, {
  86850. "url" : "https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E",
  86851. "name" : "[db-torque-dev] 20210128 Antwort: Re: Items for our (delayed) quarterly report to the board?",
  86852. "refsource" : "MLIST",
  86853. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86854. }, {
  86855. "url" : "https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04@%3Cissues.hive.apache.org%3E",
  86856. "name" : "[hive-issues] 20210209 [jira] [Resolved] (HIVE-24500) Hive - upgrade log4j 2.12.1 to 2.13.2+ due to CVE-2020-9488",
  86857. "refsource" : "MLIST",
  86858. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86859. }, {
  86860. "url" : "https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f@%3Cissues.hive.apache.org%3E",
  86861. "name" : "[hive-issues] 20210216 [jira] [Resolved] (HIVE-24787) Hive - upgrade log4j 2.12.1 to 2.13.2+ due to CVE-2020-9488",
  86862. "refsource" : "MLIST",
  86863. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86864. }, {
  86865. "url" : "https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b@%3Cdev.hive.apache.org%3E",
  86866. "name" : "[hive-dev] 20210216 [jira] [Created] (HIVE-24787) Hive - upgrade log4j 2.12.1 to 2.13.2+ due to CVE-2020-9488",
  86867. "refsource" : "MLIST",
  86868. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86869. }, {
  86870. "url" : "https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507@%3Cissues.hive.apache.org%3E",
  86871. "name" : "[hive-issues] 20210216 [jira] [Assigned] (HIVE-24787) Hive - upgrade log4j 2.12.1 to 2.13.2+ due to CVE-2020-9488",
  86872. "refsource" : "MLIST",
  86873. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86874. }, {
  86875. "url" : "https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75@%3Cissues.hive.apache.org%3E",
  86876. "name" : "[hive-issues] 20210218 [jira] [Updated] (HIVE-24787) Hive - upgrade log4j 2.12.1 to 2.13.2+ due to CVE-2020-9488",
  86877. "refsource" : "MLIST",
  86878. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86879. }, {
  86880. "url" : "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
  86881. "name" : "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
  86882. "refsource" : "MLIST",
  86883. "tags" : [ "Mailing List", "Vendor Advisory" ]
  86884. }, {
  86885. "url" : "https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E",
  86886. "name" : "[flink-issues] 20210510 [GitHub] [flink] zentol opened a new pull request #15879: [FLINK-22407][build] Bump log4j to 2.24.1",
  86887. "refsource" : "MLIST",
  86888. "tags" : [ ]
  86889. } ]
  86890. },
  86891. "description" : {
  86892. "description_data" : [ {
  86893. "lang" : "en",
  86894. "value" : "Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender."
  86895. } ]
  86896. }
  86897. },
  86898. "configurations" : {
  86899. "CVE_data_version" : "4.0",
  86900. "nodes" : [ {
  86901. "operator" : "OR",
  86902. "children" : [ ],
  86903. "cpe_match" : [ {
  86904. "vulnerable" : true,
  86905. "cpe23Uri" : "cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*",
  86906. "versionEndExcluding" : "2.13.2",
  86907. "cpe_name" : [ ]
  86908. } ]
  86909. }, {
  86910. "operator" : "OR",
  86911. "children" : [ ],
  86912. "cpe_match" : [ {
  86913. "vulnerable" : true,
  86914. "cpe23Uri" : "cpe:2.3:a:oracle:communications_application_session_controller:3.9m0p1:*:*:*:*:*:*:*",
  86915. "cpe_name" : [ ]
  86916. }, {
  86917. "vulnerable" : true,
  86918. "cpe23Uri" : "cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5.0.23.0:*:*:*:*:*:*:*",
  86919. "cpe_name" : [ ]
  86920. }, {
  86921. "vulnerable" : true,
  86922. "cpe23Uri" : "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*",
  86923. "cpe_name" : [ ]
  86924. }, {
  86925. "vulnerable" : true,
  86926. "cpe23Uri" : "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*",
  86927. "cpe_name" : [ ]
  86928. }, {
  86929. "vulnerable" : true,
  86930. "cpe23Uri" : "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*",
  86931. "cpe_name" : [ ]
  86932. }, {
  86933. "vulnerable" : true,
  86934. "cpe23Uri" : "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.0:*:*:*:*:*:*:*",
  86935. "cpe_name" : [ ]
  86936. }, {
  86937. "vulnerable" : true,
  86938. "cpe23Uri" : "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*",
  86939. "cpe_name" : [ ]
  86940. }, {
  86941. "vulnerable" : true,
  86942. "cpe23Uri" : "cpe:2.3:a:oracle:data_integrator:12.2.1.3.0:*:*:*:*:*:*:*",
  86943. "cpe_name" : [ ]
  86944. }, {
  86945. "vulnerable" : true,
  86946. "cpe23Uri" : "cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*",
  86947. "cpe_name" : [ ]
  86948. }, {
  86949. "vulnerable" : true,
  86950. "cpe23Uri" : "cpe:2.3:a:oracle:enterprise_manager_for_peoplesoft:13.4.1.1:*:*:*:*:*:*:*",
  86951. "cpe_name" : [ ]
  86952. }, {
  86953. "vulnerable" : true,
  86954. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*",
  86955. "versionStartIncluding" : "8.0.6.0.0",
  86956. "versionEndIncluding" : "8.1.0.0.0",
  86957. "cpe_name" : [ ]
  86958. }, {
  86959. "vulnerable" : true,
  86960. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.6:*:*:*:*:*:*:*",
  86961. "cpe_name" : [ ]
  86962. }, {
  86963. "vulnerable" : true,
  86964. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:*",
  86965. "cpe_name" : [ ]
  86966. }, {
  86967. "vulnerable" : true,
  86968. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.7.0:*:*:*:*:*:*:*",
  86969. "cpe_name" : [ ]
  86970. }, {
  86971. "vulnerable" : true,
  86972. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*",
  86973. "cpe_name" : [ ]
  86974. }, {
  86975. "vulnerable" : true,
  86976. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:*",
  86977. "cpe_name" : [ ]
  86978. }, {
  86979. "vulnerable" : true,
  86980. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.1.0:*:*:*:*:*:*:*",
  86981. "cpe_name" : [ ]
  86982. }, {
  86983. "vulnerable" : true,
  86984. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.6:*:*:*:*:*:*:*",
  86985. "cpe_name" : [ ]
  86986. }, {
  86987. "vulnerable" : true,
  86988. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:*",
  86989. "cpe_name" : [ ]
  86990. }, {
  86991. "vulnerable" : true,
  86992. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_retail_customer_analytics:8.0.6:*:*:*:*:*:*:*",
  86993. "cpe_name" : [ ]
  86994. }, {
  86995. "vulnerable" : true,
  86996. "cpe23Uri" : "cpe:2.3:a:oracle:flexcube_core_banking:5.2.0:*:*:*:*:*:*:*",
  86997. "cpe_name" : [ ]
  86998. }, {
  86999. "vulnerable" : true,
  87000. "cpe23Uri" : "cpe:2.3:a:oracle:flexcube_core_banking:*:*:*:*:*:*:*:*",
  87001. "versionStartIncluding" : "11.5.0",
  87002. "versionEndIncluding" : "11.7.0",
  87003. "cpe_name" : [ ]
  87004. }, {
  87005. "vulnerable" : true,
  87006. "cpe23Uri" : "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*",
  87007. "cpe_name" : [ ]
  87008. }, {
  87009. "vulnerable" : true,
  87010. "cpe23Uri" : "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*",
  87011. "cpe_name" : [ ]
  87012. }, {
  87013. "vulnerable" : true,
  87014. "cpe23Uri" : "cpe:2.3:a:oracle:health_sciences_information_manager:3.0.1:*:*:*:*:*:*:*",
  87015. "cpe_name" : [ ]
  87016. }, {
  87017. "vulnerable" : true,
  87018. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:*:*:*:*:*:*:*:*",
  87019. "versionStartIncluding" : "5.0.0.0",
  87020. "versionEndIncluding" : "5.6.0.0",
  87021. "cpe_name" : [ ]
  87022. }, {
  87023. "vulnerable" : true,
  87024. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.6.1.0:*:*:*:*:*:*:*",
  87025. "cpe_name" : [ ]
  87026. }, {
  87027. "vulnerable" : true,
  87028. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.2.0.37:*:*:*:*:*:*:*",
  87029. "cpe_name" : [ ]
  87030. }, {
  87031. "vulnerable" : true,
  87032. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.2.4.12:*:*:*:*:*:*:*",
  87033. "cpe_name" : [ ]
  87034. }, {
  87035. "vulnerable" : true,
  87036. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2.25:*:*:*:*:*:*:*",
  87037. "cpe_name" : [ ]
  87038. }, {
  87039. "vulnerable" : true,
  87040. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0.15:*:*:*:*:*:*:*",
  87041. "cpe_name" : [ ]
  87042. }, {
  87043. "vulnerable" : true,
  87044. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.2.0.26:*:*:*:*:*:*:*",
  87045. "cpe_name" : [ ]
  87046. }, {
  87047. "vulnerable" : true,
  87048. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_rules_palette:10.2.0.37:*:*:*:*:*:*:*",
  87049. "cpe_name" : [ ]
  87050. }, {
  87051. "vulnerable" : true,
  87052. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_rules_palette:10.2.4.12:*:*:*:*:*:*:*",
  87053. "cpe_name" : [ ]
  87054. }, {
  87055. "vulnerable" : true,
  87056. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_rules_palette:11.0.2.25:*:*:*:*:*:*:*",
  87057. "cpe_name" : [ ]
  87058. }, {
  87059. "vulnerable" : true,
  87060. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_rules_palette:11.1.0.15:*:*:*:*:*:*:*",
  87061. "cpe_name" : [ ]
  87062. }, {
  87063. "vulnerable" : true,
  87064. "cpe23Uri" : "cpe:2.3:a:oracle:insurance_rules_palette:11.2.0.26:*:*:*:*:*:*:*",
  87065. "cpe_name" : [ ]
  87066. }, {
  87067. "vulnerable" : true,
  87068. "cpe23Uri" : "cpe:2.3:a:oracle:oracle_goldengate_application_adapters:19.1.0.0.0:*:*:*:*:*:*:*",
  87069. "cpe_name" : [ ]
  87070. }, {
  87071. "vulnerable" : true,
  87072. "cpe23Uri" : "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
  87073. "cpe_name" : [ ]
  87074. }, {
  87075. "vulnerable" : true,
  87076. "cpe23Uri" : "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
  87077. "cpe_name" : [ ]
  87078. }, {
  87079. "vulnerable" : true,
  87080. "cpe23Uri" : "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
  87081. "cpe_name" : [ ]
  87082. }, {
  87083. "vulnerable" : true,
  87084. "cpe23Uri" : "cpe:2.3:a:oracle:policy_automation:*:*:*:*:*:*:*:*",
  87085. "versionStartIncluding" : "12.2.0",
  87086. "versionEndIncluding" : "12.2.20",
  87087. "cpe_name" : [ ]
  87088. }, {
  87089. "vulnerable" : true,
  87090. "cpe23Uri" : "cpe:2.3:a:oracle:policy_automation_connector_for_siebel:10.4.6:*:*:*:*:*:*:*",
  87091. "cpe_name" : [ ]
  87092. }, {
  87093. "vulnerable" : true,
  87094. "cpe23Uri" : "cpe:2.3:a:oracle:policy_automation_for_mobile_devices:*:*:*:*:*:*:*:*",
  87095. "versionStartIncluding" : "12.2.0",
  87096. "versionEndIncluding" : "12.2.20",
  87097. "cpe_name" : [ ]
  87098. }, {
  87099. "vulnerable" : true,
  87100. "cpe23Uri" : "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*",
  87101. "cpe_name" : [ ]
  87102. }, {
  87103. "vulnerable" : true,
  87104. "cpe23Uri" : "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*",
  87105. "cpe_name" : [ ]
  87106. }, {
  87107. "vulnerable" : true,
  87108. "cpe23Uri" : "cpe:2.3:a:oracle:retail_advanced_inventory_planning:14.1:*:*:*:*:*:*:*",
  87109. "cpe_name" : [ ]
  87110. }, {
  87111. "vulnerable" : true,
  87112. "cpe23Uri" : "cpe:2.3:a:oracle:retail_assortment_planning:15.0.3.0:*:*:*:*:*:*:*",
  87113. "cpe_name" : [ ]
  87114. }, {
  87115. "vulnerable" : true,
  87116. "cpe23Uri" : "cpe:2.3:a:oracle:retail_assortment_planning:16.0.3.0:*:*:*:*:*:*:*",
  87117. "cpe_name" : [ ]
  87118. }, {
  87119. "vulnerable" : true,
  87120. "cpe23Uri" : "cpe:2.3:a:oracle:retail_bulk_data_integration:15.0.3.0:*:*:*:*:*:*:*",
  87121. "cpe_name" : [ ]
  87122. }, {
  87123. "vulnerable" : true,
  87124. "cpe23Uri" : "cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3.0:*:*:*:*:*:*:*",
  87125. "cpe_name" : [ ]
  87126. }, {
  87127. "vulnerable" : true,
  87128. "cpe23Uri" : "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:16.0:*:*:*:*:*:*:*",
  87129. "cpe_name" : [ ]
  87130. }, {
  87131. "vulnerable" : true,
  87132. "cpe23Uri" : "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:17.0:*:*:*:*:*:*:*",
  87133. "cpe_name" : [ ]
  87134. }, {
  87135. "vulnerable" : true,
  87136. "cpe23Uri" : "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:*",
  87137. "cpe_name" : [ ]
  87138. }, {
  87139. "vulnerable" : true,
  87140. "cpe23Uri" : "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:*",
  87141. "cpe_name" : [ ]
  87142. }, {
  87143. "vulnerable" : true,
  87144. "cpe23Uri" : "cpe:2.3:a:oracle:retail_integration_bus:14.1:*:*:*:*:*:*:*",
  87145. "cpe_name" : [ ]
  87146. }, {
  87147. "vulnerable" : true,
  87148. "cpe23Uri" : "cpe:2.3:a:oracle:retail_integration_bus:15.0:*:*:*:*:*:*:*",
  87149. "cpe_name" : [ ]
  87150. }, {
  87151. "vulnerable" : true,
  87152. "cpe23Uri" : "cpe:2.3:a:oracle:retail_integration_bus:16.0:*:*:*:*:*:*:*",
  87153. "cpe_name" : [ ]
  87154. }, {
  87155. "vulnerable" : true,
  87156. "cpe23Uri" : "cpe:2.3:a:oracle:retail_order_broker_cloud_service:16.0:*:*:*:*:*:*:*",
  87157. "cpe_name" : [ ]
  87158. }, {
  87159. "vulnerable" : true,
  87160. "cpe23Uri" : "cpe:2.3:a:oracle:retail_order_broker_cloud_service:18.0:*:*:*:*:*:*:*",
  87161. "cpe_name" : [ ]
  87162. }, {
  87163. "vulnerable" : true,
  87164. "cpe23Uri" : "cpe:2.3:a:oracle:retail_order_broker_cloud_service:19.0:*:*:*:*:*:*:*",
  87165. "cpe_name" : [ ]
  87166. }, {
  87167. "vulnerable" : true,
  87168. "cpe23Uri" : "cpe:2.3:a:oracle:retail_order_broker_cloud_service:19.1:*:*:*:*:*:*:*",
  87169. "cpe_name" : [ ]
  87170. }, {
  87171. "vulnerable" : true,
  87172. "cpe23Uri" : "cpe:2.3:a:oracle:retail_order_broker_cloud_service:19.2:*:*:*:*:*:*:*",
  87173. "cpe_name" : [ ]
  87174. }, {
  87175. "vulnerable" : true,
  87176. "cpe23Uri" : "cpe:2.3:a:oracle:retail_order_broker_cloud_service:19.3:*:*:*:*:*:*:*",
  87177. "cpe_name" : [ ]
  87178. }, {
  87179. "vulnerable" : true,
  87180. "cpe23Uri" : "cpe:2.3:a:oracle:retail_predictive_application_server:14.1.3.0:*:*:*:*:*:*:*",
  87181. "cpe_name" : [ ]
  87182. }, {
  87183. "vulnerable" : true,
  87184. "cpe23Uri" : "cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3.0:*:*:*:*:*:*:*",
  87185. "cpe_name" : [ ]
  87186. }, {
  87187. "vulnerable" : true,
  87188. "cpe23Uri" : "cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3.0:*:*:*:*:*:*:*",
  87189. "cpe_name" : [ ]
  87190. }, {
  87191. "vulnerable" : true,
  87192. "cpe23Uri" : "cpe:2.3:a:oracle:spatial_and_graph:12.2.0.1:*:*:*:*:*:*:*",
  87193. "cpe_name" : [ ]
  87194. }, {
  87195. "vulnerable" : true,
  87196. "cpe23Uri" : "cpe:2.3:a:oracle:spatial_and_graph:18c:*:*:*:*:*:*:*",
  87197. "cpe_name" : [ ]
  87198. }, {
  87199. "vulnerable" : true,
  87200. "cpe23Uri" : "cpe:2.3:a:oracle:spatial_and_graph:19c:*:*:*:*:*:*:*",
  87201. "cpe_name" : [ ]
  87202. }, {
  87203. "vulnerable" : true,
  87204. "cpe23Uri" : "cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3.1:*:*:*:*:*:*:*",
  87205. "cpe_name" : [ ]
  87206. }, {
  87207. "vulnerable" : true,
  87208. "cpe23Uri" : "cpe:2.3:a:oracle:utilities_framework:2.2.0.0.0:*:*:*:*:*:*:*",
  87209. "cpe_name" : [ ]
  87210. }, {
  87211. "vulnerable" : true,
  87212. "cpe23Uri" : "cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*",
  87213. "cpe_name" : [ ]
  87214. }, {
  87215. "vulnerable" : true,
  87216. "cpe23Uri" : "cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
  87217. "cpe_name" : [ ]
  87218. }, {
  87219. "vulnerable" : true,
  87220. "cpe23Uri" : "cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:*",
  87221. "versionStartIncluding" : "4.3.0.1.0",
  87222. "versionEndIncluding" : "4.3.0.6.0",
  87223. "cpe_name" : [ ]
  87224. }, {
  87225. "vulnerable" : true,
  87226. "cpe23Uri" : "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
  87227. "cpe_name" : [ ]
  87228. }, {
  87229. "vulnerable" : true,
  87230. "cpe23Uri" : "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
  87231. "cpe_name" : [ ]
  87232. }, {
  87233. "vulnerable" : true,
  87234. "cpe23Uri" : "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
  87235. "cpe_name" : [ ]
  87236. } ]
  87237. } ]
  87238. },
  87239. "impact" : {
  87240. "baseMetricV3" : {
  87241. "cvssV3" : {
  87242. "version" : "3.1",
  87243. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
  87244. "attackVector" : "NETWORK",
  87245. "attackComplexity" : "HIGH",
  87246. "privilegesRequired" : "NONE",
  87247. "userInteraction" : "NONE",
  87248. "scope" : "UNCHANGED",
  87249. "confidentialityImpact" : "LOW",
  87250. "integrityImpact" : "NONE",
  87251. "availabilityImpact" : "NONE",
  87252. "baseScore" : 3.7,
  87253. "baseSeverity" : "LOW"
  87254. },
  87255. "exploitabilityScore" : 2.2,
  87256. "impactScore" : 1.4
  87257. },
  87258. "baseMetricV2" : {
  87259. "cvssV2" : {
  87260. "version" : "2.0",
  87261. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:N/A:N",
  87262. "accessVector" : "NETWORK",
  87263. "accessComplexity" : "MEDIUM",
  87264. "authentication" : "NONE",
  87265. "confidentialityImpact" : "PARTIAL",
  87266. "integrityImpact" : "NONE",
  87267. "availabilityImpact" : "NONE",
  87268. "baseScore" : 4.3
  87269. },
  87270. "severity" : "MEDIUM",
  87271. "exploitabilityScore" : 8.6,
  87272. "impactScore" : 2.9,
  87273. "acInsufInfo" : false,
  87274. "obtainAllPrivilege" : false,
  87275. "obtainUserPrivilege" : false,
  87276. "obtainOtherPrivilege" : false,
  87277. "userInteractionRequired" : false
  87278. }
  87279. },
  87280. "publishedDate" : "2020-04-27T16:15Z",
  87281. "lastModifiedDate" : "2021-05-10T11:15Z"
  87282. }, {
  87283. "cve" : {
  87284. "data_type" : "CVE",
  87285. "data_format" : "MITRE",
  87286. "data_version" : "4.0",
  87287. "CVE_data_meta" : {
  87288. "ID" : "CVE-2020-10947",
  87289. "ASSIGNER" : "cve@mitre.org"
  87290. },
  87291. "problemtype" : {
  87292. "problemtype_data" : [ {
  87293. "description" : [ {
  87294. "lang" : "en",
  87295. "value" : "CWE-269"
  87296. } ]
  87297. } ]
  87298. },
  87299. "references" : {
  87300. "reference_data" : [ {
  87301. "url" : "https://community.sophos.com/b/security-blog/posts/advisory-cve-2020-10947---sophos-anti-virus-for-macos-privilege-escalation",
  87302. "name" : "https://community.sophos.com/b/security-blog/posts/advisory-cve-2020-10947---sophos-anti-virus-for-macos-privilege-escalation",
  87303. "refsource" : "CONFIRM",
  87304. "tags" : [ "Vendor Advisory" ]
  87305. }, {
  87306. "url" : "https://www.sophos.com/en-us.aspx",
  87307. "name" : "https://www.sophos.com/en-us.aspx",
  87308. "refsource" : "MISC",
  87309. "tags" : [ "Vendor Advisory" ]
  87310. } ]
  87311. },
  87312. "description" : {
  87313. "description_data" : [ {
  87314. "lang" : "en",
  87315. "value" : "Mac Endpoint for Sophos Central before 9.9.6 and Mac Endpoint for Sophos Home before 2.2.6 allow Privilege Escalation."
  87316. } ]
  87317. }
  87318. },
  87319. "configurations" : {
  87320. "CVE_data_version" : "4.0",
  87321. "nodes" : [ {
  87322. "operator" : "OR",
  87323. "children" : [ ],
  87324. "cpe_match" : [ {
  87325. "vulnerable" : true,
  87326. "cpe23Uri" : "cpe:2.3:a:sophos:anti-virus_for_sophos_central:*:*:*:*:*:macos:*:*",
  87327. "versionEndExcluding" : "9.9.6:",
  87328. "cpe_name" : [ ]
  87329. }, {
  87330. "vulnerable" : true,
  87331. "cpe23Uri" : "cpe:2.3:a:sophos:anti-virus_for_sophos_home:*:*:*:*:*:macos:*:*",
  87332. "versionEndExcluding" : "2.2.6:",
  87333. "cpe_name" : [ ]
  87334. } ]
  87335. } ]
  87336. },
  87337. "impact" : {
  87338. "baseMetricV3" : {
  87339. "cvssV3" : {
  87340. "version" : "3.1",
  87341. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  87342. "attackVector" : "NETWORK",
  87343. "attackComplexity" : "LOW",
  87344. "privilegesRequired" : "LOW",
  87345. "userInteraction" : "NONE",
  87346. "scope" : "UNCHANGED",
  87347. "confidentialityImpact" : "HIGH",
  87348. "integrityImpact" : "HIGH",
  87349. "availabilityImpact" : "HIGH",
  87350. "baseScore" : 8.8,
  87351. "baseSeverity" : "HIGH"
  87352. },
  87353. "exploitabilityScore" : 2.8,
  87354. "impactScore" : 5.9
  87355. },
  87356. "baseMetricV2" : {
  87357. "cvssV2" : {
  87358. "version" : "2.0",
  87359. "vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
  87360. "accessVector" : "NETWORK",
  87361. "accessComplexity" : "LOW",
  87362. "authentication" : "SINGLE",
  87363. "confidentialityImpact" : "PARTIAL",
  87364. "integrityImpact" : "PARTIAL",
  87365. "availabilityImpact" : "PARTIAL",
  87366. "baseScore" : 6.5
  87367. },
  87368. "severity" : "MEDIUM",
  87369. "exploitabilityScore" : 8.0,
  87370. "impactScore" : 6.4,
  87371. "acInsufInfo" : false,
  87372. "obtainAllPrivilege" : false,
  87373. "obtainUserPrivilege" : false,
  87374. "obtainOtherPrivilege" : false,
  87375. "userInteractionRequired" : false
  87376. }
  87377. },
  87378. "publishedDate" : "2020-04-17T13:15Z",
  87379. "lastModifiedDate" : "2021-05-07T13:55Z"
  87380. }, {
  87381. "cve" : {
  87382. "data_type" : "CVE",
  87383. "data_format" : "MITRE",
  87384. "data_version" : "4.0",
  87385. "CVE_data_meta" : {
  87386. "ID" : "CVE-2020-8952",
  87387. "ASSIGNER" : "cve@mitre.org"
  87388. },
  87389. "problemtype" : {
  87390. "problemtype_data" : [ {
  87391. "description" : [ {
  87392. "lang" : "en",
  87393. "value" : "CWE-79"
  87394. } ]
  87395. } ]
  87396. },
  87397. "references" : {
  87398. "reference_data" : [ {
  87399. "url" : "https://github.com/eSecure-CVEs/CVEs/blob/master/CVE-2020-8952",
  87400. "name" : "https://github.com/eSecure-CVEs/CVEs/blob/master/CVE-2020-8952",
  87401. "refsource" : "MISC",
  87402. "tags" : [ "Exploit", "Third Party Advisory" ]
  87403. } ]
  87404. },
  87405. "description" : {
  87406. "description_data" : [ {
  87407. "lang" : "en",
  87408. "value" : "Fiserv Accurate Reconciliation 2.19.0, fixed in 3.0.0 or higher, allows XSS via the logout.jsp timeOut parameter."
  87409. } ]
  87410. }
  87411. },
  87412. "configurations" : {
  87413. "CVE_data_version" : "4.0",
  87414. "nodes" : [ {
  87415. "operator" : "OR",
  87416. "children" : [ ],
  87417. "cpe_match" : [ {
  87418. "vulnerable" : true,
  87419. "cpe23Uri" : "cpe:2.3:a:fiserv:accurate_reconciliation:2.19.0:*:*:*:*:*:*:*",
  87420. "cpe_name" : [ ]
  87421. } ]
  87422. } ]
  87423. },
  87424. "impact" : {
  87425. "baseMetricV3" : {
  87426. "cvssV3" : {
  87427. "version" : "3.1",
  87428. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  87429. "attackVector" : "NETWORK",
  87430. "attackComplexity" : "LOW",
  87431. "privilegesRequired" : "NONE",
  87432. "userInteraction" : "REQUIRED",
  87433. "scope" : "CHANGED",
  87434. "confidentialityImpact" : "LOW",
  87435. "integrityImpact" : "LOW",
  87436. "availabilityImpact" : "NONE",
  87437. "baseScore" : 6.1,
  87438. "baseSeverity" : "MEDIUM"
  87439. },
  87440. "exploitabilityScore" : 2.8,
  87441. "impactScore" : 2.7
  87442. },
  87443. "baseMetricV2" : {
  87444. "cvssV2" : {
  87445. "version" : "2.0",
  87446. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  87447. "accessVector" : "NETWORK",
  87448. "accessComplexity" : "MEDIUM",
  87449. "authentication" : "NONE",
  87450. "confidentialityImpact" : "NONE",
  87451. "integrityImpact" : "PARTIAL",
  87452. "availabilityImpact" : "NONE",
  87453. "baseScore" : 4.3
  87454. },
  87455. "severity" : "MEDIUM",
  87456. "exploitabilityScore" : 8.6,
  87457. "impactScore" : 2.9,
  87458. "acInsufInfo" : false,
  87459. "obtainAllPrivilege" : false,
  87460. "obtainUserPrivilege" : false,
  87461. "obtainOtherPrivilege" : false,
  87462. "userInteractionRequired" : true
  87463. }
  87464. },
  87465. "publishedDate" : "2020-02-26T16:15Z",
  87466. "lastModifiedDate" : "2021-05-05T12:15Z"
  87467. }, {
  87468. "cve" : {
  87469. "data_type" : "CVE",
  87470. "data_format" : "MITRE",
  87471. "data_version" : "4.0",
  87472. "CVE_data_meta" : {
  87473. "ID" : "CVE-2020-8951",
  87474. "ASSIGNER" : "cve@mitre.org"
  87475. },
  87476. "problemtype" : {
  87477. "problemtype_data" : [ {
  87478. "description" : [ {
  87479. "lang" : "en",
  87480. "value" : "CWE-79"
  87481. } ]
  87482. } ]
  87483. },
  87484. "references" : {
  87485. "reference_data" : [ {
  87486. "url" : "https://github.com/eSecure-CVEs/CVEs/blob/master/CVE-2020-8951",
  87487. "name" : "https://github.com/eSecure-CVEs/CVEs/blob/master/CVE-2020-8951",
  87488. "refsource" : "MISC",
  87489. "tags" : [ "Exploit", "Third Party Advisory" ]
  87490. } ]
  87491. },
  87492. "description" : {
  87493. "description_data" : [ {
  87494. "lang" : "en",
  87495. "value" : "Fiserv Accurate Reconciliation 2.19.0, fixed in 3.0.0 or higher, allows XSS via the Source or Destination field of the Configuration Manager (Configuration Parameter Translation) page."
  87496. } ]
  87497. }
  87498. },
  87499. "configurations" : {
  87500. "CVE_data_version" : "4.0",
  87501. "nodes" : [ {
  87502. "operator" : "OR",
  87503. "children" : [ ],
  87504. "cpe_match" : [ {
  87505. "vulnerable" : true,
  87506. "cpe23Uri" : "cpe:2.3:a:fiserv:accurate_reconciliation:2.19.0:*:*:*:*:*:*:*",
  87507. "cpe_name" : [ ]
  87508. } ]
  87509. } ]
  87510. },
  87511. "impact" : {
  87512. "baseMetricV3" : {
  87513. "cvssV3" : {
  87514. "version" : "3.1",
  87515. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  87516. "attackVector" : "NETWORK",
  87517. "attackComplexity" : "LOW",
  87518. "privilegesRequired" : "LOW",
  87519. "userInteraction" : "REQUIRED",
  87520. "scope" : "CHANGED",
  87521. "confidentialityImpact" : "LOW",
  87522. "integrityImpact" : "LOW",
  87523. "availabilityImpact" : "NONE",
  87524. "baseScore" : 5.4,
  87525. "baseSeverity" : "MEDIUM"
  87526. },
  87527. "exploitabilityScore" : 2.3,
  87528. "impactScore" : 2.7
  87529. },
  87530. "baseMetricV2" : {
  87531. "cvssV2" : {
  87532. "version" : "2.0",
  87533. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  87534. "accessVector" : "NETWORK",
  87535. "accessComplexity" : "MEDIUM",
  87536. "authentication" : "SINGLE",
  87537. "confidentialityImpact" : "NONE",
  87538. "integrityImpact" : "PARTIAL",
  87539. "availabilityImpact" : "NONE",
  87540. "baseScore" : 3.5
  87541. },
  87542. "severity" : "LOW",
  87543. "exploitabilityScore" : 6.8,
  87544. "impactScore" : 2.9,
  87545. "acInsufInfo" : false,
  87546. "obtainAllPrivilege" : false,
  87547. "obtainUserPrivilege" : false,
  87548. "obtainOtherPrivilege" : false,
  87549. "userInteractionRequired" : true
  87550. }
  87551. },
  87552. "publishedDate" : "2020-02-26T16:15Z",
  87553. "lastModifiedDate" : "2021-05-05T12:15Z"
  87554. }, {
  87555. "cve" : {
  87556. "data_type" : "CVE",
  87557. "data_format" : "MITRE",
  87558. "data_version" : "4.0",
  87559. "CVE_data_meta" : {
  87560. "ID" : "CVE-2020-8794",
  87561. "ASSIGNER" : "cve@mitre.org"
  87562. },
  87563. "problemtype" : {
  87564. "problemtype_data" : [ {
  87565. "description" : [ {
  87566. "lang" : "en",
  87567. "value" : "CWE-125"
  87568. } ]
  87569. } ]
  87570. },
  87571. "references" : {
  87572. "reference_data" : [ {
  87573. "url" : "https://www.openbsd.org/security.html",
  87574. "name" : "https://www.openbsd.org/security.html",
  87575. "refsource" : "MISC",
  87576. "tags" : [ "Third Party Advisory" ]
  87577. }, {
  87578. "url" : "https://www.openwall.com/lists/oss-security/2020/02/24/5",
  87579. "name" : "https://www.openwall.com/lists/oss-security/2020/02/24/5",
  87580. "refsource" : "MISC",
  87581. "tags" : [ "Exploit", "Mailing List", "Third Party Advisory" ]
  87582. }, {
  87583. "url" : "http://www.openwall.com/lists/oss-security/2020/02/26/1",
  87584. "name" : "[oss-security] 20200226 Re: LPE and RCE in OpenSMTPD's default install (CVE-2020-8794)",
  87585. "refsource" : "MLIST",
  87586. "tags" : [ ]
  87587. }, {
  87588. "url" : "https://www.debian.org/security/2020/dsa-4634",
  87589. "name" : "DSA-4634",
  87590. "refsource" : "DEBIAN",
  87591. "tags" : [ ]
  87592. }, {
  87593. "url" : "http://seclists.org/fulldisclosure/2020/Feb/32",
  87594. "name" : "20200227 LPE and RCE in OpenSMTPD's default install (CVE-2020-8794)",
  87595. "refsource" : "FULLDISC",
  87596. "tags" : [ ]
  87597. }, {
  87598. "url" : "http://www.openwall.com/lists/oss-security/2020/03/01/1",
  87599. "name" : "[oss-security] 20200301 Re: LPE and RCE in OpenSMTPD's default install (CVE-2020-8794)",
  87600. "refsource" : "MLIST",
  87601. "tags" : [ ]
  87602. }, {
  87603. "url" : "http://www.openwall.com/lists/oss-security/2020/03/01/2",
  87604. "name" : "[oss-security] 20200301 Re: LPE and RCE in OpenSMTPD's default install (CVE-2020-8794)",
  87605. "refsource" : "MLIST",
  87606. "tags" : [ ]
  87607. }, {
  87608. "url" : "http://packetstormsecurity.com/files/156633/OpenSMTPD-Out-Of-Bounds-Read-Local-Privilege-Escalation.html",
  87609. "name" : "http://packetstormsecurity.com/files/156633/OpenSMTPD-Out-Of-Bounds-Read-Local-Privilege-Escalation.html",
  87610. "refsource" : "MISC",
  87611. "tags" : [ ]
  87612. }, {
  87613. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPH4QU4DNVHA7ACFXMYFCEP5PSXXPN4E/",
  87614. "name" : "FEDORA-2020-b92d7083ca",
  87615. "refsource" : "FEDORA",
  87616. "tags" : [ ]
  87617. }, {
  87618. "url" : "https://usn.ubuntu.com/4294-1/",
  87619. "name" : "USN-4294-1",
  87620. "refsource" : "UBUNTU",
  87621. "tags" : [ ]
  87622. }, {
  87623. "url" : "http://www.openwall.com/lists/oss-security/2021/05/04/7",
  87624. "name" : "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
  87625. "refsource" : "MLIST",
  87626. "tags" : [ ]
  87627. } ]
  87628. },
  87629. "description" : {
  87630. "description_data" : [ {
  87631. "lang" : "en",
  87632. "value" : "OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling."
  87633. } ]
  87634. }
  87635. },
  87636. "configurations" : {
  87637. "CVE_data_version" : "4.0",
  87638. "nodes" : [ {
  87639. "operator" : "OR",
  87640. "children" : [ ],
  87641. "cpe_match" : [ {
  87642. "vulnerable" : true,
  87643. "cpe23Uri" : "cpe:2.3:a:opensmtpd:opensmtpd:*:*:*:*:*:*:*:*",
  87644. "versionEndExcluding" : "6.6.4",
  87645. "cpe_name" : [ ]
  87646. } ]
  87647. } ]
  87648. },
  87649. "impact" : {
  87650. "baseMetricV3" : {
  87651. "cvssV3" : {
  87652. "version" : "3.1",
  87653. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  87654. "attackVector" : "NETWORK",
  87655. "attackComplexity" : "LOW",
  87656. "privilegesRequired" : "NONE",
  87657. "userInteraction" : "NONE",
  87658. "scope" : "UNCHANGED",
  87659. "confidentialityImpact" : "HIGH",
  87660. "integrityImpact" : "HIGH",
  87661. "availabilityImpact" : "HIGH",
  87662. "baseScore" : 9.8,
  87663. "baseSeverity" : "CRITICAL"
  87664. },
  87665. "exploitabilityScore" : 3.9,
  87666. "impactScore" : 5.9
  87667. },
  87668. "baseMetricV2" : {
  87669. "cvssV2" : {
  87670. "version" : "2.0",
  87671. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  87672. "accessVector" : "NETWORK",
  87673. "accessComplexity" : "LOW",
  87674. "authentication" : "NONE",
  87675. "confidentialityImpact" : "COMPLETE",
  87676. "integrityImpact" : "COMPLETE",
  87677. "availabilityImpact" : "COMPLETE",
  87678. "baseScore" : 10.0
  87679. },
  87680. "severity" : "HIGH",
  87681. "exploitabilityScore" : 10.0,
  87682. "impactScore" : 10.0,
  87683. "acInsufInfo" : false,
  87684. "obtainAllPrivilege" : false,
  87685. "obtainUserPrivilege" : false,
  87686. "obtainOtherPrivilege" : false,
  87687. "userInteractionRequired" : false
  87688. }
  87689. },
  87690. "publishedDate" : "2020-02-25T17:15Z",
  87691. "lastModifiedDate" : "2021-05-04T18:15Z"
  87692. }, {
  87693. "cve" : {
  87694. "data_type" : "CVE",
  87695. "data_format" : "MITRE",
  87696. "data_version" : "4.0",
  87697. "CVE_data_meta" : {
  87698. "ID" : "CVE-2020-1935",
  87699. "ASSIGNER" : "security@apache.org"
  87700. },
  87701. "problemtype" : {
  87702. "problemtype_data" : [ {
  87703. "description" : [ {
  87704. "lang" : "en",
  87705. "value" : "CWE-444"
  87706. } ]
  87707. } ]
  87708. },
  87709. "references" : {
  87710. "reference_data" : [ {
  87711. "url" : "https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E",
  87712. "name" : "[tomcat-announce] 20200224 [SECURITY] CVE-2020-1935 HTTP Request Smuggling",
  87713. "refsource" : "MLIST",
  87714. "tags" : [ "Mailing List", "Vendor Advisory" ]
  87715. }, {
  87716. "url" : "https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html",
  87717. "name" : "[debian-lts-announce] 20200304 [SECURITY] [DLA 2133-1] tomcat7 security update",
  87718. "refsource" : "MLIST",
  87719. "tags" : [ "Mailing List", "Third Party Advisory" ]
  87720. }, {
  87721. "url" : "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html",
  87722. "name" : "openSUSE-SU-2020:0345",
  87723. "refsource" : "SUSE",
  87724. "tags" : [ "Broken Link", "Mailing List", "Third Party Advisory" ]
  87725. }, {
  87726. "url" : "https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E",
  87727. "name" : "[tomee-commits] 20200320 [jira] [Created] (TOMEE-2790) TomEE plus(7.0.7) is affected by CVE-2020-1935 & CVE-2019-17569 vulnerabilities",
  87728. "refsource" : "MLIST",
  87729. "tags" : [ "Mailing List", "Vendor Advisory" ]
  87730. }, {
  87731. "url" : "https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E",
  87732. "name" : "[tomee-commits] 20200323 [jira] [Commented] (TOMEE-2790) TomEE plus(7.0.7) is affected by CVE-2020-1935 & CVE-2019-17569 vulnerabilities",
  87733. "refsource" : "MLIST",
  87734. "tags" : [ "Mailing List", "Vendor Advisory" ]
  87735. }, {
  87736. "url" : "https://security.netapp.com/advisory/ntap-20200327-0005/",
  87737. "name" : "https://security.netapp.com/advisory/ntap-20200327-0005/",
  87738. "refsource" : "CONFIRM",
  87739. "tags" : [ "Third Party Advisory" ]
  87740. }, {
  87741. "url" : "https://www.debian.org/security/2020/dsa-4673",
  87742. "name" : "DSA-4673",
  87743. "refsource" : "DEBIAN",
  87744. "tags" : [ "Third Party Advisory" ]
  87745. }, {
  87746. "url" : "https://www.debian.org/security/2020/dsa-4680",
  87747. "name" : "DSA-4680",
  87748. "refsource" : "DEBIAN",
  87749. "tags" : [ "Third Party Advisory" ]
  87750. }, {
  87751. "url" : "https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html",
  87752. "name" : "[debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update",
  87753. "refsource" : "MLIST",
  87754. "tags" : [ "Mailing List", "Third Party Advisory" ]
  87755. }, {
  87756. "url" : "https://www.oracle.com/security-alerts/cpujul2020.html",
  87757. "name" : "https://www.oracle.com/security-alerts/cpujul2020.html",
  87758. "refsource" : "MISC",
  87759. "tags" : [ "Third Party Advisory" ]
  87760. }, {
  87761. "url" : "https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E",
  87762. "name" : "[tomcat-users] 20200724 CVE-2020-1935",
  87763. "refsource" : "MLIST",
  87764. "tags" : [ "Mailing List", "Vendor Advisory" ]
  87765. }, {
  87766. "url" : "https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E",
  87767. "name" : "[tomcat-users] 20200724 Re: CVE-2020-1935",
  87768. "refsource" : "MLIST",
  87769. "tags" : [ "Mailing List", "Vendor Advisory" ]
  87770. }, {
  87771. "url" : "https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E",
  87772. "name" : "[tomcat-users] 20200724 RE: CVE-2020-1935",
  87773. "refsource" : "MLIST",
  87774. "tags" : [ "Mailing List", "Vendor Advisory" ]
  87775. }, {
  87776. "url" : "https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E",
  87777. "name" : "[tomcat-users] 20200726 Re: CVE-2020-1935",
  87778. "refsource" : "MLIST",
  87779. "tags" : [ "Mailing List", "Vendor Advisory" ]
  87780. }, {
  87781. "url" : "https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E",
  87782. "name" : "[tomcat-users] 20200727 RE: CVE-2020-1935",
  87783. "refsource" : "MLIST",
  87784. "tags" : [ "Mailing List", "Vendor Advisory" ]
  87785. }, {
  87786. "url" : "https://usn.ubuntu.com/4448-1/",
  87787. "name" : "USN-4448-1",
  87788. "refsource" : "UBUNTU",
  87789. "tags" : [ "Third Party Advisory" ]
  87790. }, {
  87791. "url" : "https://www.oracle.com/security-alerts/cpuoct2020.html",
  87792. "name" : "https://www.oracle.com/security-alerts/cpuoct2020.html",
  87793. "refsource" : "MISC",
  87794. "tags" : [ "Third Party Advisory" ]
  87795. }, {
  87796. "url" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  87797. "name" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  87798. "refsource" : "MISC",
  87799. "tags" : [ "Third Party Advisory" ]
  87800. }, {
  87801. "url" : "https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E",
  87802. "name" : "[tomcat-dev] 20210428 [Bug 65272] Problems proccessing HTTP request without CR in last versions",
  87803. "refsource" : "MLIST",
  87804. "tags" : [ "Mailing List", "Vendor Advisory" ]
  87805. } ]
  87806. },
  87807. "description" : {
  87808. "description_data" : [ {
  87809. "lang" : "en",
  87810. "value" : "In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely."
  87811. } ]
  87812. }
  87813. },
  87814. "configurations" : {
  87815. "CVE_data_version" : "4.0",
  87816. "nodes" : [ {
  87817. "operator" : "OR",
  87818. "children" : [ ],
  87819. "cpe_match" : [ {
  87820. "vulnerable" : true,
  87821. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
  87822. "versionStartIncluding" : "7.0.0",
  87823. "versionEndIncluding" : "7.0.99",
  87824. "cpe_name" : [ ]
  87825. }, {
  87826. "vulnerable" : true,
  87827. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
  87828. "versionStartIncluding" : "8.5.0",
  87829. "versionEndIncluding" : "8.5.50",
  87830. "cpe_name" : [ ]
  87831. }, {
  87832. "vulnerable" : true,
  87833. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
  87834. "versionStartIncluding" : "9.0.0",
  87835. "versionEndIncluding" : "9.0.30",
  87836. "cpe_name" : [ ]
  87837. }, {
  87838. "vulnerable" : true,
  87839. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:-:*:*:*:*:*:*",
  87840. "cpe_name" : [ ]
  87841. }, {
  87842. "vulnerable" : true,
  87843. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*",
  87844. "cpe_name" : [ ]
  87845. }, {
  87846. "vulnerable" : true,
  87847. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*",
  87848. "cpe_name" : [ ]
  87849. }, {
  87850. "vulnerable" : true,
  87851. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*",
  87852. "cpe_name" : [ ]
  87853. }, {
  87854. "vulnerable" : true,
  87855. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*",
  87856. "cpe_name" : [ ]
  87857. }, {
  87858. "vulnerable" : true,
  87859. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*",
  87860. "cpe_name" : [ ]
  87861. }, {
  87862. "vulnerable" : true,
  87863. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*",
  87864. "cpe_name" : [ ]
  87865. }, {
  87866. "vulnerable" : true,
  87867. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*",
  87868. "cpe_name" : [ ]
  87869. }, {
  87870. "vulnerable" : true,
  87871. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*",
  87872. "cpe_name" : [ ]
  87873. }, {
  87874. "vulnerable" : true,
  87875. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*",
  87876. "cpe_name" : [ ]
  87877. }, {
  87878. "vulnerable" : true,
  87879. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*",
  87880. "cpe_name" : [ ]
  87881. }, {
  87882. "vulnerable" : true,
  87883. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*",
  87884. "cpe_name" : [ ]
  87885. }, {
  87886. "vulnerable" : true,
  87887. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*",
  87888. "cpe_name" : [ ]
  87889. }, {
  87890. "vulnerable" : true,
  87891. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*",
  87892. "cpe_name" : [ ]
  87893. }, {
  87894. "vulnerable" : true,
  87895. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*",
  87896. "cpe_name" : [ ]
  87897. }, {
  87898. "vulnerable" : true,
  87899. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*",
  87900. "cpe_name" : [ ]
  87901. }, {
  87902. "vulnerable" : true,
  87903. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*",
  87904. "cpe_name" : [ ]
  87905. }, {
  87906. "vulnerable" : true,
  87907. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*",
  87908. "cpe_name" : [ ]
  87909. }, {
  87910. "vulnerable" : true,
  87911. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*",
  87912. "cpe_name" : [ ]
  87913. }, {
  87914. "vulnerable" : true,
  87915. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*",
  87916. "cpe_name" : [ ]
  87917. }, {
  87918. "vulnerable" : true,
  87919. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*",
  87920. "cpe_name" : [ ]
  87921. }, {
  87922. "vulnerable" : true,
  87923. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*",
  87924. "cpe_name" : [ ]
  87925. }, {
  87926. "vulnerable" : true,
  87927. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*",
  87928. "cpe_name" : [ ]
  87929. }, {
  87930. "vulnerable" : true,
  87931. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*",
  87932. "cpe_name" : [ ]
  87933. }, {
  87934. "vulnerable" : true,
  87935. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*",
  87936. "cpe_name" : [ ]
  87937. }, {
  87938. "vulnerable" : true,
  87939. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*",
  87940. "cpe_name" : [ ]
  87941. }, {
  87942. "vulnerable" : true,
  87943. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*",
  87944. "cpe_name" : [ ]
  87945. }, {
  87946. "vulnerable" : true,
  87947. "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*",
  87948. "cpe_name" : [ ]
  87949. } ]
  87950. }, {
  87951. "operator" : "OR",
  87952. "children" : [ ],
  87953. "cpe_match" : [ {
  87954. "vulnerable" : true,
  87955. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
  87956. "cpe_name" : [ ]
  87957. }, {
  87958. "vulnerable" : true,
  87959. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  87960. "cpe_name" : [ ]
  87961. }, {
  87962. "vulnerable" : true,
  87963. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
  87964. "cpe_name" : [ ]
  87965. } ]
  87966. }, {
  87967. "operator" : "OR",
  87968. "children" : [ ],
  87969. "cpe_match" : [ {
  87970. "vulnerable" : true,
  87971. "cpe23Uri" : "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
  87972. "cpe_name" : [ ]
  87973. } ]
  87974. }, {
  87975. "operator" : "OR",
  87976. "children" : [ ],
  87977. "cpe_match" : [ {
  87978. "vulnerable" : true,
  87979. "cpe23Uri" : "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
  87980. "cpe_name" : [ ]
  87981. } ]
  87982. }, {
  87983. "operator" : "OR",
  87984. "children" : [ ],
  87985. "cpe_match" : [ {
  87986. "vulnerable" : true,
  87987. "cpe23Uri" : "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*",
  87988. "cpe_name" : [ ]
  87989. }, {
  87990. "vulnerable" : true,
  87991. "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*",
  87992. "versionStartIncluding" : "3.0.0",
  87993. "versionEndIncluding" : "3.1.3",
  87994. "cpe_name" : [ ]
  87995. } ]
  87996. }, {
  87997. "operator" : "OR",
  87998. "children" : [ ],
  87999. "cpe_match" : [ {
  88000. "vulnerable" : true,
  88001. "cpe23Uri" : "cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*",
  88002. "cpe_name" : [ ]
  88003. }, {
  88004. "vulnerable" : true,
  88005. "cpe23Uri" : "cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.3:*:*:*:*:*:*:*",
  88006. "cpe_name" : [ ]
  88007. }, {
  88008. "vulnerable" : true,
  88009. "cpe23Uri" : "cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.5:*:*:*:*:*:*:*",
  88010. "cpe_name" : [ ]
  88011. }, {
  88012. "vulnerable" : true,
  88013. "cpe23Uri" : "cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.6:*:*:*:*:*:*:*",
  88014. "cpe_name" : [ ]
  88015. }, {
  88016. "vulnerable" : true,
  88017. "cpe23Uri" : "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*",
  88018. "cpe_name" : [ ]
  88019. }, {
  88020. "vulnerable" : true,
  88021. "cpe23Uri" : "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*",
  88022. "cpe_name" : [ ]
  88023. }, {
  88024. "vulnerable" : true,
  88025. "cpe23Uri" : "cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*",
  88026. "cpe_name" : [ ]
  88027. }, {
  88028. "vulnerable" : true,
  88029. "cpe23Uri" : "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*",
  88030. "cpe_name" : [ ]
  88031. }, {
  88032. "vulnerable" : true,
  88033. "cpe23Uri" : "cpe:2.3:a:oracle:health_sciences_empirica_inspections:1.0.1.2:*:*:*:*:*:*:*",
  88034. "cpe_name" : [ ]
  88035. }, {
  88036. "vulnerable" : true,
  88037. "cpe23Uri" : "cpe:2.3:a:oracle:health_sciences_empirica_signal:7.3.3:*:*:*:*:*:*:*",
  88038. "cpe_name" : [ ]
  88039. }, {
  88040. "vulnerable" : true,
  88041. "cpe23Uri" : "cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*",
  88042. "cpe_name" : [ ]
  88043. }, {
  88044. "vulnerable" : true,
  88045. "cpe23Uri" : "cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*",
  88046. "cpe_name" : [ ]
  88047. }, {
  88048. "vulnerable" : true,
  88049. "cpe23Uri" : "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*",
  88050. "cpe_name" : [ ]
  88051. }, {
  88052. "vulnerable" : true,
  88053. "cpe23Uri" : "cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*",
  88054. "versionStartIncluding" : "17.1",
  88055. "versionEndIncluding" : "17.3",
  88056. "cpe_name" : [ ]
  88057. }, {
  88058. "vulnerable" : true,
  88059. "cpe23Uri" : "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
  88060. "versionStartIncluding" : "4.0.0",
  88061. "versionEndIncluding" : "4.0.12",
  88062. "cpe_name" : [ ]
  88063. }, {
  88064. "vulnerable" : true,
  88065. "cpe23Uri" : "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
  88066. "versionStartIncluding" : "8.0.0",
  88067. "versionEndIncluding" : "8.0.20",
  88068. "cpe_name" : [ ]
  88069. }, {
  88070. "vulnerable" : true,
  88071. "cpe23Uri" : "cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*",
  88072. "cpe_name" : [ ]
  88073. }, {
  88074. "vulnerable" : true,
  88075. "cpe23Uri" : "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*",
  88076. "versionEndIncluding" : "20.5",
  88077. "cpe_name" : [ ]
  88078. }, {
  88079. "vulnerable" : true,
  88080. "cpe23Uri" : "cpe:2.3:a:oracle:transportation_management:6.3.7:*:*:*:*:*:*:*",
  88081. "cpe_name" : [ ]
  88082. }, {
  88083. "vulnerable" : true,
  88084. "cpe23Uri" : "cpe:2.3:a:oracle:workload_manager:12.2.0.1:*:*:*:*:*:*:*",
  88085. "cpe_name" : [ ]
  88086. }, {
  88087. "vulnerable" : true,
  88088. "cpe23Uri" : "cpe:2.3:a:oracle:workload_manager:18c:*:*:*:*:*:*:*",
  88089. "cpe_name" : [ ]
  88090. }, {
  88091. "vulnerable" : true,
  88092. "cpe23Uri" : "cpe:2.3:a:oracle:workload_manager:19c:*:*:*:*:*:*:*",
  88093. "cpe_name" : [ ]
  88094. } ]
  88095. } ]
  88096. },
  88097. "impact" : {
  88098. "baseMetricV3" : {
  88099. "cvssV3" : {
  88100. "version" : "3.1",
  88101. "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
  88102. "attackVector" : "NETWORK",
  88103. "attackComplexity" : "HIGH",
  88104. "privilegesRequired" : "NONE",
  88105. "userInteraction" : "NONE",
  88106. "scope" : "UNCHANGED",
  88107. "confidentialityImpact" : "LOW",
  88108. "integrityImpact" : "LOW",
  88109. "availabilityImpact" : "NONE",
  88110. "baseScore" : 4.8,
  88111. "baseSeverity" : "MEDIUM"
  88112. },
  88113. "exploitabilityScore" : 2.2,
  88114. "impactScore" : 2.5
  88115. },
  88116. "baseMetricV2" : {
  88117. "cvssV2" : {
  88118. "version" : "2.0",
  88119. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:N",
  88120. "accessVector" : "NETWORK",
  88121. "accessComplexity" : "MEDIUM",
  88122. "authentication" : "NONE",
  88123. "confidentialityImpact" : "PARTIAL",
  88124. "integrityImpact" : "PARTIAL",
  88125. "availabilityImpact" : "NONE",
  88126. "baseScore" : 5.8
  88127. },
  88128. "severity" : "MEDIUM",
  88129. "exploitabilityScore" : 8.6,
  88130. "impactScore" : 4.9,
  88131. "acInsufInfo" : false,
  88132. "obtainAllPrivilege" : false,
  88133. "obtainUserPrivilege" : false,
  88134. "obtainOtherPrivilege" : false,
  88135. "userInteractionRequired" : false
  88136. }
  88137. },
  88138. "publishedDate" : "2020-02-24T22:15Z",
  88139. "lastModifiedDate" : "2021-05-04T19:19Z"
  88140. }, {
  88141. "cve" : {
  88142. "data_type" : "CVE",
  88143. "data_format" : "MITRE",
  88144. "data_version" : "4.0",
  88145. "CVE_data_meta" : {
  88146. "ID" : "CVE-2019-13926",
  88147. "ASSIGNER" : "productcert@siemens.com"
  88148. },
  88149. "problemtype" : {
  88150. "problemtype_data" : [ {
  88151. "description" : [ {
  88152. "lang" : "en",
  88153. "value" : "CWE-400"
  88154. } ]
  88155. } ]
  88156. },
  88157. "references" : {
  88158. "reference_data" : [ {
  88159. "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-591405.pdf",
  88160. "name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-591405.pdf",
  88161. "refsource" : "MISC",
  88162. "tags" : [ "Vendor Advisory" ]
  88163. }, {
  88164. "url" : "https://www.us-cert.gov/ics/advisories/icsa-20-042-10",
  88165. "name" : "https://www.us-cert.gov/ics/advisories/icsa-20-042-10",
  88166. "refsource" : "MISC",
  88167. "tags" : [ "Third Party Advisory", "US Government Resource" ]
  88168. } ]
  88169. },
  88170. "description" : {
  88171. "description_data" : [ {
  88172. "lang" : "en",
  88173. "value" : "A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device."
  88174. } ]
  88175. }
  88176. },
  88177. "configurations" : {
  88178. "CVE_data_version" : "4.0",
  88179. "nodes" : [ {
  88180. "operator" : "AND",
  88181. "children" : [ {
  88182. "operator" : "OR",
  88183. "children" : [ ],
  88184. "cpe_match" : [ {
  88185. "vulnerable" : true,
  88186. "cpe23Uri" : "cpe:2.3:o:siemens:scalance_s602_firmware:*:*:*:*:*:*:*:*",
  88187. "versionStartIncluding" : "3.0",
  88188. "versionEndExcluding" : "4.1",
  88189. "cpe_name" : [ ]
  88190. } ]
  88191. }, {
  88192. "operator" : "OR",
  88193. "children" : [ ],
  88194. "cpe_match" : [ {
  88195. "vulnerable" : false,
  88196. "cpe23Uri" : "cpe:2.3:h:siemens:scalance_s602:-:*:*:*:*:*:*:*",
  88197. "cpe_name" : [ ]
  88198. } ]
  88199. } ],
  88200. "cpe_match" : [ ]
  88201. }, {
  88202. "operator" : "AND",
  88203. "children" : [ {
  88204. "operator" : "OR",
  88205. "children" : [ ],
  88206. "cpe_match" : [ {
  88207. "vulnerable" : true,
  88208. "cpe23Uri" : "cpe:2.3:o:siemens:scalance_s612_firmware:*:*:*:*:*:*:*:*",
  88209. "versionStartIncluding" : "3.0",
  88210. "versionEndExcluding" : "4.1",
  88211. "cpe_name" : [ ]
  88212. } ]
  88213. }, {
  88214. "operator" : "OR",
  88215. "children" : [ ],
  88216. "cpe_match" : [ {
  88217. "vulnerable" : false,
  88218. "cpe23Uri" : "cpe:2.3:h:siemens:scalance_s612:-:*:*:*:*:*:*:*",
  88219. "cpe_name" : [ ]
  88220. } ]
  88221. } ],
  88222. "cpe_match" : [ ]
  88223. }, {
  88224. "operator" : "AND",
  88225. "children" : [ {
  88226. "operator" : "OR",
  88227. "children" : [ ],
  88228. "cpe_match" : [ {
  88229. "vulnerable" : true,
  88230. "cpe23Uri" : "cpe:2.3:o:siemens:scalance_s623_firmware:*:*:*:*:*:*:*:*",
  88231. "versionStartIncluding" : "3.0",
  88232. "versionEndExcluding" : "4.1",
  88233. "cpe_name" : [ ]
  88234. } ]
  88235. }, {
  88236. "operator" : "OR",
  88237. "children" : [ ],
  88238. "cpe_match" : [ {
  88239. "vulnerable" : false,
  88240. "cpe23Uri" : "cpe:2.3:h:siemens:scalance_s623:-:*:*:*:*:*:*:*",
  88241. "cpe_name" : [ ]
  88242. } ]
  88243. } ],
  88244. "cpe_match" : [ ]
  88245. }, {
  88246. "operator" : "AND",
  88247. "children" : [ {
  88248. "operator" : "OR",
  88249. "children" : [ ],
  88250. "cpe_match" : [ {
  88251. "vulnerable" : true,
  88252. "cpe23Uri" : "cpe:2.3:o:siemens:scalance_s627-2m_firmware:*:*:*:*:*:*:*:*",
  88253. "versionStartIncluding" : "3.0",
  88254. "versionEndExcluding" : "4.1",
  88255. "cpe_name" : [ ]
  88256. } ]
  88257. }, {
  88258. "operator" : "OR",
  88259. "children" : [ ],
  88260. "cpe_match" : [ {
  88261. "vulnerable" : false,
  88262. "cpe23Uri" : "cpe:2.3:h:siemens:scalance_s627-2m:-:*:*:*:*:*:*:*",
  88263. "cpe_name" : [ ]
  88264. } ]
  88265. } ],
  88266. "cpe_match" : [ ]
  88267. } ]
  88268. },
  88269. "impact" : {
  88270. "baseMetricV3" : {
  88271. "cvssV3" : {
  88272. "version" : "3.1",
  88273. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  88274. "attackVector" : "NETWORK",
  88275. "attackComplexity" : "LOW",
  88276. "privilegesRequired" : "NONE",
  88277. "userInteraction" : "NONE",
  88278. "scope" : "UNCHANGED",
  88279. "confidentialityImpact" : "NONE",
  88280. "integrityImpact" : "NONE",
  88281. "availabilityImpact" : "HIGH",
  88282. "baseScore" : 7.5,
  88283. "baseSeverity" : "HIGH"
  88284. },
  88285. "exploitabilityScore" : 3.9,
  88286. "impactScore" : 3.6
  88287. },
  88288. "baseMetricV2" : {
  88289. "cvssV2" : {
  88290. "version" : "2.0",
  88291. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C",
  88292. "accessVector" : "NETWORK",
  88293. "accessComplexity" : "LOW",
  88294. "authentication" : "NONE",
  88295. "confidentialityImpact" : "NONE",
  88296. "integrityImpact" : "NONE",
  88297. "availabilityImpact" : "COMPLETE",
  88298. "baseScore" : 7.8
  88299. },
  88300. "severity" : "HIGH",
  88301. "exploitabilityScore" : 10.0,
  88302. "impactScore" : 6.9,
  88303. "acInsufInfo" : false,
  88304. "obtainAllPrivilege" : false,
  88305. "obtainUserPrivilege" : false,
  88306. "obtainOtherPrivilege" : false,
  88307. "userInteractionRequired" : false
  88308. }
  88309. },
  88310. "publishedDate" : "2020-02-11T16:15Z",
  88311. "lastModifiedDate" : "2021-05-05T15:03Z"
  88312. }, {
  88313. "cve" : {
  88314. "data_type" : "CVE",
  88315. "data_format" : "MITRE",
  88316. "data_version" : "4.0",
  88317. "CVE_data_meta" : {
  88318. "ID" : "CVE-2020-7226",
  88319. "ASSIGNER" : "cve@mitre.org"
  88320. },
  88321. "problemtype" : {
  88322. "problemtype_data" : [ {
  88323. "description" : [ {
  88324. "lang" : "en",
  88325. "value" : "CWE-770"
  88326. } ]
  88327. } ]
  88328. },
  88329. "references" : {
  88330. "reference_data" : [ {
  88331. "url" : "https://github.com/vt-middleware/cryptacular/blob/master/src/main/java/org/cryptacular/CiphertextHeader.java#L153",
  88332. "name" : "https://github.com/vt-middleware/cryptacular/blob/master/src/main/java/org/cryptacular/CiphertextHeader.java#L153",
  88333. "refsource" : "MISC",
  88334. "tags" : [ "Exploit", "Third Party Advisory" ]
  88335. }, {
  88336. "url" : "https://github.com/vt-middleware/cryptacular/issues/52",
  88337. "name" : "https://github.com/vt-middleware/cryptacular/issues/52",
  88338. "refsource" : "MISC",
  88339. "tags" : [ "Exploit", "Third Party Advisory" ]
  88340. }, {
  88341. "url" : "https://lists.apache.org/thread.html/rc36b75cabb4d700b48035d15ad8b8c2712bb32123572a1bdaec2510a@%3Cdev.ws.apache.org%3E",
  88342. "name" : "[ws-dev] 20200219 [jira] [Created] (WSS-665) Add cryptacular dependency and upgrade to 1.2.4 to fix CVE-2020-7226",
  88343. "refsource" : "MLIST",
  88344. "tags" : [ "Mailing List", "Third Party Advisory" ]
  88345. }, {
  88346. "url" : "https://lists.apache.org/thread.html/re04e4f8f0d095387fb6b0ff9016a0af8c93f42e1de93b09298bfa547@%3Ccommits.ws.apache.org%3E",
  88347. "name" : "[ws-commits] 20200219 [ws-wss4j] branch 2_2_x-fixes updated: WSS-665 - Add cryptacular dependency and upgrade to 1.2.4 to fix CVE-2020-7226",
  88348. "refsource" : "MLIST",
  88349. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  88350. }, {
  88351. "url" : "https://lists.apache.org/thread.html/rfa4647c58e375996e62a9094bffff6dc350ec311ba955b430e738945@%3Cdev.ws.apache.org%3E",
  88352. "name" : "[ws-dev] 20200219 [jira] [Resolved] (WSS-665) Add cryptacular dependency and upgrade to 1.2.4 to fix CVE-2020-7226",
  88353. "refsource" : "MLIST",
  88354. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  88355. }, {
  88356. "url" : "https://lists.apache.org/thread.html/r380781f5b489cb3c818536cd3b3757e806bfe0bca188591e0051ac03@%3Ccommits.ws.apache.org%3E",
  88357. "name" : "[ws-commits] 20200219 [ws-wss4j] branch master updated: WSS-665 - Add cryptacular dependency and upgrade to 1.2.4 to fix CVE-2020-7226",
  88358. "refsource" : "MLIST",
  88359. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  88360. }, {
  88361. "url" : "https://github.com/vt-middleware/cryptacular/blob/fafccd07ab1214e3588a35afe3c361519129605f/src/main/java/org/cryptacular/CiphertextHeader.java#L153",
  88362. "name" : "https://github.com/vt-middleware/cryptacular/blob/fafccd07ab1214e3588a35afe3c361519129605f/src/main/java/org/cryptacular/CiphertextHeader.java#L153",
  88363. "refsource" : "MISC",
  88364. "tags" : [ "Exploit", "Third Party Advisory" ]
  88365. }, {
  88366. "url" : "https://lists.apache.org/thread.html/re7f46c4cc29a4616e0aa669c84a0eb34832e83a8eef05189e2e59b44@%3Cdev.ws.apache.org%3E",
  88367. "name" : "[ws-dev] 20200318 [jira] [Closed] (WSS-665) Add cryptacular dependency and upgrade to 1.2.4 to fix CVE-2020-7226",
  88368. "refsource" : "MLIST",
  88369. "tags" : [ "Mailing List", "Third Party Advisory" ]
  88370. }, {
  88371. "url" : "https://lists.apache.org/thread.html/r0847c7eb78c8f9e87d5b841fbd5da52b2ad4b4345e04b51c30621d88@%3Ccommits.tomee.apache.org%3E",
  88372. "name" : "[tomee-commits] 20201013 [jira] [Assigned] (TOMEE-2908) TomEE plus is affected by CVE-2020-7226 (BDSA-2020-2333) vulnerability",
  88373. "refsource" : "MLIST",
  88374. "tags" : [ "Mailing List", "Third Party Advisory" ]
  88375. }, {
  88376. "url" : "https://lists.apache.org/thread.html/r209de85beae4d257d27fc577e3a3e97039bdb4c2dc6f4a8e5a5a5811@%3Ccommits.tomee.apache.org%3E",
  88377. "name" : "[tomee-commits] 20201013 [jira] [Created] (TOMEE-2908) TomEE plus is affected by CVE-2020-7226 (BDSA-2020-2333) vulnerability",
  88378. "refsource" : "MLIST",
  88379. "tags" : [ "Mailing List", "Third Party Advisory" ]
  88380. }, {
  88381. "url" : "https://lists.apache.org/thread.html/r77c48cd851f60833df9a9c9c31f12243508e15d1b2a0961066d44fc6@%3Ccommits.tomee.apache.org%3E",
  88382. "name" : "[tomee-commits] 20210426 [jira] [Updated] (TOMEE-2908) TomEE plus is affected by CVE-2020-7226 (BDSA-2020-2333) vulnerability",
  88383. "refsource" : "MLIST",
  88384. "tags" : [ "Mailing List", "Third Party Advisory" ]
  88385. }, {
  88386. "url" : "https://lists.apache.org/thread.html/r4a62133ad01d5f963755021027a4cce23f76b8674a13860d2978c7c8@%3Ccommits.tomee.apache.org%3E",
  88387. "name" : "[tomee-commits] 20210426 [jira] [Comment Edited] (TOMEE-2908) TomEE plus is affected by CVE-2020-7226 (BDSA-2020-2333) vulnerability",
  88388. "refsource" : "MLIST",
  88389. "tags" : [ "Mailing List", "Third Party Advisory" ]
  88390. }, {
  88391. "url" : "https://lists.apache.org/thread.html/r2237a27040b57adc2fcc5570bd530ad2038e67fcb2a3ce65283d3143@%3Ccommits.tomee.apache.org%3E",
  88392. "name" : "[tomee-commits] 20210426 [jira] [Commented] (TOMEE-2908) TomEE plus is affected by CVE-2020-7226 (BDSA-2020-2333) vulnerability",
  88393. "refsource" : "MLIST",
  88394. "tags" : [ "Mailing List", "Third Party Advisory" ]
  88395. } ]
  88396. },
  88397. "description" : {
  88398. "description_data" : [ {
  88399. "lang" : "en",
  88400. "value" : "CiphertextHeader.java in Cryptacular 1.2.3, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with \"new byte\" may depend on untrusted input within the header of encoded data."
  88401. } ]
  88402. }
  88403. },
  88404. "configurations" : {
  88405. "CVE_data_version" : "4.0",
  88406. "nodes" : [ {
  88407. "operator" : "OR",
  88408. "children" : [ ],
  88409. "cpe_match" : [ {
  88410. "vulnerable" : true,
  88411. "cpe23Uri" : "cpe:2.3:a:vt:cryptacular:*:*:*:*:*:*:*:*",
  88412. "versionEndExcluding" : "1.1.4",
  88413. "cpe_name" : [ ]
  88414. }, {
  88415. "vulnerable" : true,
  88416. "cpe23Uri" : "cpe:2.3:a:vt:cryptacular:*:*:*:*:*:*:*:*",
  88417. "versionStartIncluding" : "1.2.0",
  88418. "versionEndExcluding" : "1.2.4",
  88419. "cpe_name" : [ ]
  88420. } ]
  88421. } ]
  88422. },
  88423. "impact" : {
  88424. "baseMetricV3" : {
  88425. "cvssV3" : {
  88426. "version" : "3.1",
  88427. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  88428. "attackVector" : "NETWORK",
  88429. "attackComplexity" : "LOW",
  88430. "privilegesRequired" : "NONE",
  88431. "userInteraction" : "NONE",
  88432. "scope" : "UNCHANGED",
  88433. "confidentialityImpact" : "NONE",
  88434. "integrityImpact" : "NONE",
  88435. "availabilityImpact" : "HIGH",
  88436. "baseScore" : 7.5,
  88437. "baseSeverity" : "HIGH"
  88438. },
  88439. "exploitabilityScore" : 3.9,
  88440. "impactScore" : 3.6
  88441. },
  88442. "baseMetricV2" : {
  88443. "cvssV2" : {
  88444. "version" : "2.0",
  88445. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  88446. "accessVector" : "NETWORK",
  88447. "accessComplexity" : "LOW",
  88448. "authentication" : "NONE",
  88449. "confidentialityImpact" : "NONE",
  88450. "integrityImpact" : "NONE",
  88451. "availabilityImpact" : "PARTIAL",
  88452. "baseScore" : 5.0
  88453. },
  88454. "severity" : "MEDIUM",
  88455. "exploitabilityScore" : 10.0,
  88456. "impactScore" : 2.9,
  88457. "acInsufInfo" : false,
  88458. "obtainAllPrivilege" : false,
  88459. "obtainUserPrivilege" : false,
  88460. "obtainOtherPrivilege" : false,
  88461. "userInteractionRequired" : false
  88462. }
  88463. },
  88464. "publishedDate" : "2020-01-24T15:15Z",
  88465. "lastModifiedDate" : "2021-05-05T13:39Z"
  88466. }, {
  88467. "cve" : {
  88468. "data_type" : "CVE",
  88469. "data_format" : "MITRE",
  88470. "data_version" : "4.0",
  88471. "CVE_data_meta" : {
  88472. "ID" : "CVE-2019-19648",
  88473. "ASSIGNER" : "cve@mitre.org"
  88474. },
  88475. "problemtype" : {
  88476. "problemtype_data" : [ {
  88477. "description" : [ {
  88478. "lang" : "en",
  88479. "value" : "CWE-125"
  88480. } ]
  88481. } ]
  88482. },
  88483. "references" : {
  88484. "reference_data" : [ {
  88485. "url" : "https://github.com/VirusTotal/yara/issues/1178",
  88486. "name" : "https://github.com/VirusTotal/yara/issues/1178",
  88487. "refsource" : "MISC",
  88488. "tags" : [ "Exploit", "Third Party Advisory" ]
  88489. }, {
  88490. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXM224OLGI6KAOROLDPPGGCZ2OQVQ6HH/",
  88491. "name" : "FEDORA-2021-f41d5fc954",
  88492. "refsource" : "FEDORA",
  88493. "tags" : [ ]
  88494. }, {
  88495. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKNXSH5ERG6NELTXCYVJLUPJJJ2TNEBD/",
  88496. "name" : "FEDORA-2021-dd62918333",
  88497. "refsource" : "FEDORA",
  88498. "tags" : [ ]
  88499. } ]
  88500. },
  88501. "description" : {
  88502. "description_data" : [ {
  88503. "lang" : "en",
  88504. "value" : "In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution."
  88505. } ]
  88506. }
  88507. },
  88508. "configurations" : {
  88509. "CVE_data_version" : "4.0",
  88510. "nodes" : [ {
  88511. "operator" : "OR",
  88512. "children" : [ ],
  88513. "cpe_match" : [ {
  88514. "vulnerable" : true,
  88515. "cpe23Uri" : "cpe:2.3:a:virustotal:yara:3.11.0:*:*:*:*:*:*:*",
  88516. "cpe_name" : [ ]
  88517. } ]
  88518. } ]
  88519. },
  88520. "impact" : {
  88521. "baseMetricV3" : {
  88522. "cvssV3" : {
  88523. "version" : "3.1",
  88524. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  88525. "attackVector" : "LOCAL",
  88526. "attackComplexity" : "LOW",
  88527. "privilegesRequired" : "NONE",
  88528. "userInteraction" : "REQUIRED",
  88529. "scope" : "UNCHANGED",
  88530. "confidentialityImpact" : "HIGH",
  88531. "integrityImpact" : "HIGH",
  88532. "availabilityImpact" : "HIGH",
  88533. "baseScore" : 7.8,
  88534. "baseSeverity" : "HIGH"
  88535. },
  88536. "exploitabilityScore" : 1.8,
  88537. "impactScore" : 5.9
  88538. },
  88539. "baseMetricV2" : {
  88540. "cvssV2" : {
  88541. "version" : "2.0",
  88542. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  88543. "accessVector" : "NETWORK",
  88544. "accessComplexity" : "MEDIUM",
  88545. "authentication" : "NONE",
  88546. "confidentialityImpact" : "PARTIAL",
  88547. "integrityImpact" : "PARTIAL",
  88548. "availabilityImpact" : "PARTIAL",
  88549. "baseScore" : 6.8
  88550. },
  88551. "severity" : "MEDIUM",
  88552. "exploitabilityScore" : 8.6,
  88553. "impactScore" : 6.4,
  88554. "acInsufInfo" : false,
  88555. "obtainAllPrivilege" : false,
  88556. "obtainUserPrivilege" : false,
  88557. "obtainOtherPrivilege" : false,
  88558. "userInteractionRequired" : true
  88559. }
  88560. },
  88561. "publishedDate" : "2019-12-09T01:15Z",
  88562. "lastModifiedDate" : "2021-05-06T14:15Z"
  88563. }, {
  88564. "cve" : {
  88565. "data_type" : "CVE",
  88566. "data_format" : "MITRE",
  88567. "data_version" : "4.0",
  88568. "CVE_data_meta" : {
  88569. "ID" : "CVE-2019-0150",
  88570. "ASSIGNER" : "secure@intel.com"
  88571. },
  88572. "problemtype" : {
  88573. "problemtype_data" : [ {
  88574. "description" : [ {
  88575. "lang" : "en",
  88576. "value" : "NVD-CWE-noinfo"
  88577. } ]
  88578. } ]
  88579. },
  88580. "references" : {
  88581. "reference_data" : [ {
  88582. "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  88583. "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  88584. "refsource" : "MISC",
  88585. "tags" : [ "Patch", "Vendor Advisory" ]
  88586. } ]
  88587. },
  88588. "description" : {
  88589. "description_data" : [ {
  88590. "lang" : "en",
  88591. "value" : "Insufficient access control in firmware Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow a privileged user to potentially enable a denial of service via local access."
  88592. } ]
  88593. }
  88594. },
  88595. "configurations" : {
  88596. "CVE_data_version" : "4.0",
  88597. "nodes" : [ {
  88598. "operator" : "AND",
  88599. "children" : [ {
  88600. "operator" : "OR",
  88601. "children" : [ ],
  88602. "cpe_match" : [ {
  88603. "vulnerable" : true,
  88604. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
  88605. "versionEndExcluding" : "7.0",
  88606. "cpe_name" : [ ]
  88607. } ]
  88608. }, {
  88609. "operator" : "OR",
  88610. "children" : [ ],
  88611. "cpe_match" : [ {
  88612. "vulnerable" : false,
  88613. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
  88614. "cpe_name" : [ ]
  88615. } ]
  88616. } ],
  88617. "cpe_match" : [ ]
  88618. }, {
  88619. "operator" : "AND",
  88620. "children" : [ {
  88621. "operator" : "OR",
  88622. "children" : [ ],
  88623. "cpe_match" : [ {
  88624. "vulnerable" : true,
  88625. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
  88626. "versionEndExcluding" : "7.0",
  88627. "cpe_name" : [ ]
  88628. } ]
  88629. }, {
  88630. "operator" : "OR",
  88631. "children" : [ ],
  88632. "cpe_match" : [ {
  88633. "vulnerable" : false,
  88634. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
  88635. "cpe_name" : [ ]
  88636. } ]
  88637. } ],
  88638. "cpe_match" : [ ]
  88639. }, {
  88640. "operator" : "AND",
  88641. "children" : [ {
  88642. "operator" : "OR",
  88643. "children" : [ ],
  88644. "cpe_match" : [ {
  88645. "vulnerable" : true,
  88646. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
  88647. "versionEndExcluding" : "7.0",
  88648. "cpe_name" : [ ]
  88649. } ]
  88650. }, {
  88651. "operator" : "OR",
  88652. "children" : [ ],
  88653. "cpe_match" : [ {
  88654. "vulnerable" : false,
  88655. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
  88656. "cpe_name" : [ ]
  88657. } ]
  88658. } ],
  88659. "cpe_match" : [ ]
  88660. }, {
  88661. "operator" : "AND",
  88662. "children" : [ {
  88663. "operator" : "OR",
  88664. "children" : [ ],
  88665. "cpe_match" : [ {
  88666. "vulnerable" : true,
  88667. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
  88668. "versionEndExcluding" : "7.0",
  88669. "cpe_name" : [ ]
  88670. } ]
  88671. }, {
  88672. "operator" : "OR",
  88673. "children" : [ ],
  88674. "cpe_match" : [ {
  88675. "vulnerable" : false,
  88676. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
  88677. "cpe_name" : [ ]
  88678. } ]
  88679. } ],
  88680. "cpe_match" : [ ]
  88681. }, {
  88682. "operator" : "AND",
  88683. "children" : [ {
  88684. "operator" : "OR",
  88685. "children" : [ ],
  88686. "cpe_match" : [ {
  88687. "vulnerable" : true,
  88688. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
  88689. "versionEndExcluding" : "7.0",
  88690. "cpe_name" : [ ]
  88691. } ]
  88692. }, {
  88693. "operator" : "OR",
  88694. "children" : [ ],
  88695. "cpe_match" : [ {
  88696. "vulnerable" : false,
  88697. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
  88698. "cpe_name" : [ ]
  88699. } ]
  88700. } ],
  88701. "cpe_match" : [ ]
  88702. }, {
  88703. "operator" : "AND",
  88704. "children" : [ {
  88705. "operator" : "OR",
  88706. "children" : [ ],
  88707. "cpe_match" : [ {
  88708. "vulnerable" : true,
  88709. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*",
  88710. "versionEndExcluding" : "7.0",
  88711. "cpe_name" : [ ]
  88712. } ]
  88713. }, {
  88714. "operator" : "OR",
  88715. "children" : [ ],
  88716. "cpe_match" : [ {
  88717. "vulnerable" : false,
  88718. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*",
  88719. "cpe_name" : [ ]
  88720. } ]
  88721. } ],
  88722. "cpe_match" : [ ]
  88723. }, {
  88724. "operator" : "OR",
  88725. "children" : [ ],
  88726. "cpe_match" : [ {
  88727. "vulnerable" : true,
  88728. "cpe23Uri" : "cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*",
  88729. "versionEndExcluding" : "24.0",
  88730. "cpe_name" : [ ]
  88731. } ]
  88732. } ]
  88733. },
  88734. "impact" : {
  88735. "baseMetricV3" : {
  88736. "cvssV3" : {
  88737. "version" : "3.1",
  88738. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
  88739. "attackVector" : "LOCAL",
  88740. "attackComplexity" : "LOW",
  88741. "privilegesRequired" : "HIGH",
  88742. "userInteraction" : "NONE",
  88743. "scope" : "UNCHANGED",
  88744. "confidentialityImpact" : "NONE",
  88745. "integrityImpact" : "LOW",
  88746. "availabilityImpact" : "HIGH",
  88747. "baseScore" : 5.1,
  88748. "baseSeverity" : "MEDIUM"
  88749. },
  88750. "exploitabilityScore" : 0.8,
  88751. "impactScore" : 4.2
  88752. },
  88753. "baseMetricV2" : {
  88754. "cvssV2" : {
  88755. "version" : "2.0",
  88756. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:P",
  88757. "accessVector" : "LOCAL",
  88758. "accessComplexity" : "LOW",
  88759. "authentication" : "NONE",
  88760. "confidentialityImpact" : "NONE",
  88761. "integrityImpact" : "NONE",
  88762. "availabilityImpact" : "PARTIAL",
  88763. "baseScore" : 2.1
  88764. },
  88765. "severity" : "LOW",
  88766. "exploitabilityScore" : 3.9,
  88767. "impactScore" : 2.9,
  88768. "acInsufInfo" : false,
  88769. "obtainAllPrivilege" : false,
  88770. "obtainUserPrivilege" : false,
  88771. "obtainOtherPrivilege" : false,
  88772. "userInteractionRequired" : false
  88773. }
  88774. },
  88775. "publishedDate" : "2019-11-14T19:15Z",
  88776. "lastModifiedDate" : "2021-05-03T15:22Z"
  88777. }, {
  88778. "cve" : {
  88779. "data_type" : "CVE",
  88780. "data_format" : "MITRE",
  88781. "data_version" : "4.0",
  88782. "CVE_data_meta" : {
  88783. "ID" : "CVE-2019-0149",
  88784. "ASSIGNER" : "secure@intel.com"
  88785. },
  88786. "problemtype" : {
  88787. "problemtype_data" : [ {
  88788. "description" : [ {
  88789. "lang" : "en",
  88790. "value" : "CWE-20"
  88791. } ]
  88792. } ]
  88793. },
  88794. "references" : {
  88795. "reference_data" : [ {
  88796. "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  88797. "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  88798. "refsource" : "MISC",
  88799. "tags" : [ "Patch", "Vendor Advisory" ]
  88800. } ]
  88801. },
  88802. "description" : {
  88803. "description_data" : [ {
  88804. "lang" : "en",
  88805. "value" : "Insufficient input validation in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 2.8.43 may allow an authenticated user to potentially enable a denial of service via local access."
  88806. } ]
  88807. }
  88808. },
  88809. "configurations" : {
  88810. "CVE_data_version" : "4.0",
  88811. "nodes" : [ {
  88812. "operator" : "AND",
  88813. "children" : [ {
  88814. "operator" : "OR",
  88815. "children" : [ ],
  88816. "cpe_match" : [ {
  88817. "vulnerable" : true,
  88818. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
  88819. "versionEndExcluding" : "2.8.43",
  88820. "cpe_name" : [ ]
  88821. } ]
  88822. }, {
  88823. "operator" : "OR",
  88824. "children" : [ ],
  88825. "cpe_match" : [ {
  88826. "vulnerable" : false,
  88827. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
  88828. "cpe_name" : [ ]
  88829. } ]
  88830. } ],
  88831. "cpe_match" : [ ]
  88832. }, {
  88833. "operator" : "AND",
  88834. "children" : [ {
  88835. "operator" : "OR",
  88836. "children" : [ ],
  88837. "cpe_match" : [ {
  88838. "vulnerable" : true,
  88839. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
  88840. "versionEndExcluding" : "2.8.43",
  88841. "cpe_name" : [ ]
  88842. } ]
  88843. }, {
  88844. "operator" : "OR",
  88845. "children" : [ ],
  88846. "cpe_match" : [ {
  88847. "vulnerable" : false,
  88848. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
  88849. "cpe_name" : [ ]
  88850. } ]
  88851. } ],
  88852. "cpe_match" : [ ]
  88853. }, {
  88854. "operator" : "AND",
  88855. "children" : [ {
  88856. "operator" : "OR",
  88857. "children" : [ ],
  88858. "cpe_match" : [ {
  88859. "vulnerable" : true,
  88860. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
  88861. "versionEndExcluding" : "2.8.43",
  88862. "cpe_name" : [ ]
  88863. } ]
  88864. }, {
  88865. "operator" : "OR",
  88866. "children" : [ ],
  88867. "cpe_match" : [ {
  88868. "vulnerable" : false,
  88869. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
  88870. "cpe_name" : [ ]
  88871. } ]
  88872. } ],
  88873. "cpe_match" : [ ]
  88874. }, {
  88875. "operator" : "AND",
  88876. "children" : [ {
  88877. "operator" : "OR",
  88878. "children" : [ ],
  88879. "cpe_match" : [ {
  88880. "vulnerable" : true,
  88881. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
  88882. "versionEndExcluding" : "2.8.43",
  88883. "cpe_name" : [ ]
  88884. } ]
  88885. }, {
  88886. "operator" : "OR",
  88887. "children" : [ ],
  88888. "cpe_match" : [ {
  88889. "vulnerable" : false,
  88890. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
  88891. "cpe_name" : [ ]
  88892. } ]
  88893. } ],
  88894. "cpe_match" : [ ]
  88895. }, {
  88896. "operator" : "AND",
  88897. "children" : [ {
  88898. "operator" : "OR",
  88899. "children" : [ ],
  88900. "cpe_match" : [ {
  88901. "vulnerable" : true,
  88902. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
  88903. "versionEndExcluding" : "2.8.43",
  88904. "cpe_name" : [ ]
  88905. } ]
  88906. }, {
  88907. "operator" : "OR",
  88908. "children" : [ ],
  88909. "cpe_match" : [ {
  88910. "vulnerable" : false,
  88911. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
  88912. "cpe_name" : [ ]
  88913. } ]
  88914. } ],
  88915. "cpe_match" : [ ]
  88916. }, {
  88917. "operator" : "AND",
  88918. "children" : [ {
  88919. "operator" : "OR",
  88920. "children" : [ ],
  88921. "cpe_match" : [ {
  88922. "vulnerable" : true,
  88923. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*",
  88924. "versionEndExcluding" : "2.8.43",
  88925. "cpe_name" : [ ]
  88926. } ]
  88927. }, {
  88928. "operator" : "OR",
  88929. "children" : [ ],
  88930. "cpe_match" : [ {
  88931. "vulnerable" : false,
  88932. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*",
  88933. "cpe_name" : [ ]
  88934. } ]
  88935. } ],
  88936. "cpe_match" : [ ]
  88937. }, {
  88938. "operator" : "OR",
  88939. "children" : [ ],
  88940. "cpe_match" : [ {
  88941. "vulnerable" : true,
  88942. "cpe23Uri" : "cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*",
  88943. "versionEndExcluding" : "24.0",
  88944. "cpe_name" : [ ]
  88945. } ]
  88946. } ]
  88947. },
  88948. "impact" : {
  88949. "baseMetricV3" : {
  88950. "cvssV3" : {
  88951. "version" : "3.1",
  88952. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  88953. "attackVector" : "LOCAL",
  88954. "attackComplexity" : "LOW",
  88955. "privilegesRequired" : "LOW",
  88956. "userInteraction" : "NONE",
  88957. "scope" : "UNCHANGED",
  88958. "confidentialityImpact" : "NONE",
  88959. "integrityImpact" : "NONE",
  88960. "availabilityImpact" : "HIGH",
  88961. "baseScore" : 5.5,
  88962. "baseSeverity" : "MEDIUM"
  88963. },
  88964. "exploitabilityScore" : 1.8,
  88965. "impactScore" : 3.6
  88966. },
  88967. "baseMetricV2" : {
  88968. "cvssV2" : {
  88969. "version" : "2.0",
  88970. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:P",
  88971. "accessVector" : "LOCAL",
  88972. "accessComplexity" : "LOW",
  88973. "authentication" : "NONE",
  88974. "confidentialityImpact" : "NONE",
  88975. "integrityImpact" : "NONE",
  88976. "availabilityImpact" : "PARTIAL",
  88977. "baseScore" : 2.1
  88978. },
  88979. "severity" : "LOW",
  88980. "exploitabilityScore" : 3.9,
  88981. "impactScore" : 2.9,
  88982. "acInsufInfo" : false,
  88983. "obtainAllPrivilege" : false,
  88984. "obtainUserPrivilege" : false,
  88985. "obtainOtherPrivilege" : false,
  88986. "userInteractionRequired" : false
  88987. }
  88988. },
  88989. "publishedDate" : "2019-11-14T19:15Z",
  88990. "lastModifiedDate" : "2021-05-03T17:22Z"
  88991. }, {
  88992. "cve" : {
  88993. "data_type" : "CVE",
  88994. "data_format" : "MITRE",
  88995. "data_version" : "4.0",
  88996. "CVE_data_meta" : {
  88997. "ID" : "CVE-2019-0148",
  88998. "ASSIGNER" : "secure@intel.com"
  88999. },
  89000. "problemtype" : {
  89001. "problemtype_data" : [ {
  89002. "description" : [ {
  89003. "lang" : "en",
  89004. "value" : "CWE-772"
  89005. } ]
  89006. } ]
  89007. },
  89008. "references" : {
  89009. "reference_data" : [ {
  89010. "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  89011. "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  89012. "refsource" : "MISC",
  89013. "tags" : [ "Patch", "Vendor Advisory" ]
  89014. } ]
  89015. },
  89016. "description" : {
  89017. "description_data" : [ {
  89018. "lang" : "en",
  89019. "value" : "Resource leak in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access."
  89020. } ]
  89021. }
  89022. },
  89023. "configurations" : {
  89024. "CVE_data_version" : "4.0",
  89025. "nodes" : [ {
  89026. "operator" : "AND",
  89027. "children" : [ {
  89028. "operator" : "OR",
  89029. "children" : [ ],
  89030. "cpe_match" : [ {
  89031. "vulnerable" : true,
  89032. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
  89033. "versionEndExcluding" : "7.0",
  89034. "cpe_name" : [ ]
  89035. } ]
  89036. }, {
  89037. "operator" : "OR",
  89038. "children" : [ ],
  89039. "cpe_match" : [ {
  89040. "vulnerable" : false,
  89041. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
  89042. "cpe_name" : [ ]
  89043. } ]
  89044. } ],
  89045. "cpe_match" : [ ]
  89046. }, {
  89047. "operator" : "AND",
  89048. "children" : [ {
  89049. "operator" : "OR",
  89050. "children" : [ ],
  89051. "cpe_match" : [ {
  89052. "vulnerable" : true,
  89053. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
  89054. "versionEndExcluding" : "7.0",
  89055. "cpe_name" : [ ]
  89056. } ]
  89057. }, {
  89058. "operator" : "OR",
  89059. "children" : [ ],
  89060. "cpe_match" : [ {
  89061. "vulnerable" : false,
  89062. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
  89063. "cpe_name" : [ ]
  89064. } ]
  89065. } ],
  89066. "cpe_match" : [ ]
  89067. }, {
  89068. "operator" : "AND",
  89069. "children" : [ {
  89070. "operator" : "OR",
  89071. "children" : [ ],
  89072. "cpe_match" : [ {
  89073. "vulnerable" : true,
  89074. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
  89075. "versionEndExcluding" : "7.0",
  89076. "cpe_name" : [ ]
  89077. } ]
  89078. }, {
  89079. "operator" : "OR",
  89080. "children" : [ ],
  89081. "cpe_match" : [ {
  89082. "vulnerable" : false,
  89083. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
  89084. "cpe_name" : [ ]
  89085. } ]
  89086. } ],
  89087. "cpe_match" : [ ]
  89088. }, {
  89089. "operator" : "AND",
  89090. "children" : [ {
  89091. "operator" : "OR",
  89092. "children" : [ ],
  89093. "cpe_match" : [ {
  89094. "vulnerable" : true,
  89095. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
  89096. "versionEndExcluding" : "7.0",
  89097. "cpe_name" : [ ]
  89098. } ]
  89099. }, {
  89100. "operator" : "OR",
  89101. "children" : [ ],
  89102. "cpe_match" : [ {
  89103. "vulnerable" : false,
  89104. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
  89105. "cpe_name" : [ ]
  89106. } ]
  89107. } ],
  89108. "cpe_match" : [ ]
  89109. }, {
  89110. "operator" : "AND",
  89111. "children" : [ {
  89112. "operator" : "OR",
  89113. "children" : [ ],
  89114. "cpe_match" : [ {
  89115. "vulnerable" : true,
  89116. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
  89117. "versionEndExcluding" : "7.0",
  89118. "cpe_name" : [ ]
  89119. } ]
  89120. }, {
  89121. "operator" : "OR",
  89122. "children" : [ ],
  89123. "cpe_match" : [ {
  89124. "vulnerable" : false,
  89125. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
  89126. "cpe_name" : [ ]
  89127. } ]
  89128. } ],
  89129. "cpe_match" : [ ]
  89130. }, {
  89131. "operator" : "AND",
  89132. "children" : [ {
  89133. "operator" : "OR",
  89134. "children" : [ ],
  89135. "cpe_match" : [ {
  89136. "vulnerable" : true,
  89137. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*",
  89138. "versionEndExcluding" : "7.0",
  89139. "cpe_name" : [ ]
  89140. } ]
  89141. }, {
  89142. "operator" : "OR",
  89143. "children" : [ ],
  89144. "cpe_match" : [ {
  89145. "vulnerable" : false,
  89146. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*",
  89147. "cpe_name" : [ ]
  89148. } ]
  89149. } ],
  89150. "cpe_match" : [ ]
  89151. }, {
  89152. "operator" : "OR",
  89153. "children" : [ ],
  89154. "cpe_match" : [ {
  89155. "vulnerable" : true,
  89156. "cpe23Uri" : "cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*",
  89157. "versionEndExcluding" : "24.0",
  89158. "cpe_name" : [ ]
  89159. } ]
  89160. } ]
  89161. },
  89162. "impact" : {
  89163. "baseMetricV3" : {
  89164. "cvssV3" : {
  89165. "version" : "3.1",
  89166. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  89167. "attackVector" : "LOCAL",
  89168. "attackComplexity" : "LOW",
  89169. "privilegesRequired" : "LOW",
  89170. "userInteraction" : "NONE",
  89171. "scope" : "UNCHANGED",
  89172. "confidentialityImpact" : "NONE",
  89173. "integrityImpact" : "NONE",
  89174. "availabilityImpact" : "HIGH",
  89175. "baseScore" : 5.5,
  89176. "baseSeverity" : "MEDIUM"
  89177. },
  89178. "exploitabilityScore" : 1.8,
  89179. "impactScore" : 3.6
  89180. },
  89181. "baseMetricV2" : {
  89182. "cvssV2" : {
  89183. "version" : "2.0",
  89184. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:P",
  89185. "accessVector" : "LOCAL",
  89186. "accessComplexity" : "LOW",
  89187. "authentication" : "NONE",
  89188. "confidentialityImpact" : "NONE",
  89189. "integrityImpact" : "NONE",
  89190. "availabilityImpact" : "PARTIAL",
  89191. "baseScore" : 2.1
  89192. },
  89193. "severity" : "LOW",
  89194. "exploitabilityScore" : 3.9,
  89195. "impactScore" : 2.9,
  89196. "acInsufInfo" : false,
  89197. "obtainAllPrivilege" : false,
  89198. "obtainUserPrivilege" : false,
  89199. "obtainOtherPrivilege" : false,
  89200. "userInteractionRequired" : false
  89201. }
  89202. },
  89203. "publishedDate" : "2019-11-14T19:15Z",
  89204. "lastModifiedDate" : "2021-05-03T17:35Z"
  89205. }, {
  89206. "cve" : {
  89207. "data_type" : "CVE",
  89208. "data_format" : "MITRE",
  89209. "data_version" : "4.0",
  89210. "CVE_data_meta" : {
  89211. "ID" : "CVE-2019-0147",
  89212. "ASSIGNER" : "secure@intel.com"
  89213. },
  89214. "problemtype" : {
  89215. "problemtype_data" : [ {
  89216. "description" : [ {
  89217. "lang" : "en",
  89218. "value" : "CWE-20"
  89219. } ]
  89220. } ]
  89221. },
  89222. "references" : {
  89223. "reference_data" : [ {
  89224. "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  89225. "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  89226. "refsource" : "MISC",
  89227. "tags" : [ "Patch", "Vendor Advisory" ]
  89228. } ]
  89229. },
  89230. "description" : {
  89231. "description_data" : [ {
  89232. "lang" : "en",
  89233. "value" : "Insufficient input validation in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access."
  89234. } ]
  89235. }
  89236. },
  89237. "configurations" : {
  89238. "CVE_data_version" : "4.0",
  89239. "nodes" : [ {
  89240. "operator" : "AND",
  89241. "children" : [ {
  89242. "operator" : "OR",
  89243. "children" : [ ],
  89244. "cpe_match" : [ {
  89245. "vulnerable" : true,
  89246. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
  89247. "versionEndExcluding" : "7.0",
  89248. "cpe_name" : [ ]
  89249. } ]
  89250. }, {
  89251. "operator" : "OR",
  89252. "children" : [ ],
  89253. "cpe_match" : [ {
  89254. "vulnerable" : false,
  89255. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
  89256. "cpe_name" : [ ]
  89257. } ]
  89258. } ],
  89259. "cpe_match" : [ ]
  89260. }, {
  89261. "operator" : "AND",
  89262. "children" : [ {
  89263. "operator" : "OR",
  89264. "children" : [ ],
  89265. "cpe_match" : [ {
  89266. "vulnerable" : true,
  89267. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
  89268. "versionEndExcluding" : "7.0",
  89269. "cpe_name" : [ ]
  89270. } ]
  89271. }, {
  89272. "operator" : "OR",
  89273. "children" : [ ],
  89274. "cpe_match" : [ {
  89275. "vulnerable" : false,
  89276. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
  89277. "cpe_name" : [ ]
  89278. } ]
  89279. } ],
  89280. "cpe_match" : [ ]
  89281. }, {
  89282. "operator" : "AND",
  89283. "children" : [ {
  89284. "operator" : "OR",
  89285. "children" : [ ],
  89286. "cpe_match" : [ {
  89287. "vulnerable" : true,
  89288. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
  89289. "versionEndExcluding" : "7.0",
  89290. "cpe_name" : [ ]
  89291. } ]
  89292. }, {
  89293. "operator" : "OR",
  89294. "children" : [ ],
  89295. "cpe_match" : [ {
  89296. "vulnerable" : false,
  89297. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
  89298. "cpe_name" : [ ]
  89299. } ]
  89300. } ],
  89301. "cpe_match" : [ ]
  89302. }, {
  89303. "operator" : "AND",
  89304. "children" : [ {
  89305. "operator" : "OR",
  89306. "children" : [ ],
  89307. "cpe_match" : [ {
  89308. "vulnerable" : true,
  89309. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
  89310. "versionEndExcluding" : "7.0",
  89311. "cpe_name" : [ ]
  89312. } ]
  89313. }, {
  89314. "operator" : "OR",
  89315. "children" : [ ],
  89316. "cpe_match" : [ {
  89317. "vulnerable" : false,
  89318. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
  89319. "cpe_name" : [ ]
  89320. } ]
  89321. } ],
  89322. "cpe_match" : [ ]
  89323. }, {
  89324. "operator" : "AND",
  89325. "children" : [ {
  89326. "operator" : "OR",
  89327. "children" : [ ],
  89328. "cpe_match" : [ {
  89329. "vulnerable" : true,
  89330. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
  89331. "versionEndExcluding" : "7.0",
  89332. "cpe_name" : [ ]
  89333. } ]
  89334. }, {
  89335. "operator" : "OR",
  89336. "children" : [ ],
  89337. "cpe_match" : [ {
  89338. "vulnerable" : false,
  89339. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
  89340. "cpe_name" : [ ]
  89341. } ]
  89342. } ],
  89343. "cpe_match" : [ ]
  89344. }, {
  89345. "operator" : "AND",
  89346. "children" : [ {
  89347. "operator" : "OR",
  89348. "children" : [ ],
  89349. "cpe_match" : [ {
  89350. "vulnerable" : true,
  89351. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*",
  89352. "versionEndExcluding" : "7.0",
  89353. "cpe_name" : [ ]
  89354. } ]
  89355. }, {
  89356. "operator" : "OR",
  89357. "children" : [ ],
  89358. "cpe_match" : [ {
  89359. "vulnerable" : false,
  89360. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*",
  89361. "cpe_name" : [ ]
  89362. } ]
  89363. } ],
  89364. "cpe_match" : [ ]
  89365. }, {
  89366. "operator" : "OR",
  89367. "children" : [ ],
  89368. "cpe_match" : [ {
  89369. "vulnerable" : true,
  89370. "cpe23Uri" : "cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*",
  89371. "versionEndExcluding" : "24.0",
  89372. "cpe_name" : [ ]
  89373. } ]
  89374. } ]
  89375. },
  89376. "impact" : {
  89377. "baseMetricV3" : {
  89378. "cvssV3" : {
  89379. "version" : "3.1",
  89380. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  89381. "attackVector" : "LOCAL",
  89382. "attackComplexity" : "LOW",
  89383. "privilegesRequired" : "LOW",
  89384. "userInteraction" : "NONE",
  89385. "scope" : "UNCHANGED",
  89386. "confidentialityImpact" : "NONE",
  89387. "integrityImpact" : "NONE",
  89388. "availabilityImpact" : "HIGH",
  89389. "baseScore" : 5.5,
  89390. "baseSeverity" : "MEDIUM"
  89391. },
  89392. "exploitabilityScore" : 1.8,
  89393. "impactScore" : 3.6
  89394. },
  89395. "baseMetricV2" : {
  89396. "cvssV2" : {
  89397. "version" : "2.0",
  89398. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:P",
  89399. "accessVector" : "LOCAL",
  89400. "accessComplexity" : "LOW",
  89401. "authentication" : "NONE",
  89402. "confidentialityImpact" : "NONE",
  89403. "integrityImpact" : "NONE",
  89404. "availabilityImpact" : "PARTIAL",
  89405. "baseScore" : 2.1
  89406. },
  89407. "severity" : "LOW",
  89408. "exploitabilityScore" : 3.9,
  89409. "impactScore" : 2.9,
  89410. "acInsufInfo" : false,
  89411. "obtainAllPrivilege" : false,
  89412. "obtainUserPrivilege" : false,
  89413. "obtainOtherPrivilege" : false,
  89414. "userInteractionRequired" : false
  89415. }
  89416. },
  89417. "publishedDate" : "2019-11-14T19:15Z",
  89418. "lastModifiedDate" : "2021-05-03T17:20Z"
  89419. }, {
  89420. "cve" : {
  89421. "data_type" : "CVE",
  89422. "data_format" : "MITRE",
  89423. "data_version" : "4.0",
  89424. "CVE_data_meta" : {
  89425. "ID" : "CVE-2019-0146",
  89426. "ASSIGNER" : "secure@intel.com"
  89427. },
  89428. "problemtype" : {
  89429. "problemtype_data" : [ {
  89430. "description" : [ {
  89431. "lang" : "en",
  89432. "value" : "CWE-772"
  89433. } ]
  89434. } ]
  89435. },
  89436. "references" : {
  89437. "reference_data" : [ {
  89438. "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  89439. "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  89440. "refsource" : "MISC",
  89441. "tags" : [ "Patch", "Vendor Advisory" ]
  89442. } ]
  89443. },
  89444. "description" : {
  89445. "description_data" : [ {
  89446. "lang" : "en",
  89447. "value" : "Resource leak in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 2.8.43 may allow an authenticated user to potentially enable a denial of service via local access."
  89448. } ]
  89449. }
  89450. },
  89451. "configurations" : {
  89452. "CVE_data_version" : "4.0",
  89453. "nodes" : [ {
  89454. "operator" : "AND",
  89455. "children" : [ {
  89456. "operator" : "OR",
  89457. "children" : [ ],
  89458. "cpe_match" : [ {
  89459. "vulnerable" : true,
  89460. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
  89461. "versionEndExcluding" : "2.8.43",
  89462. "cpe_name" : [ ]
  89463. } ]
  89464. }, {
  89465. "operator" : "OR",
  89466. "children" : [ ],
  89467. "cpe_match" : [ {
  89468. "vulnerable" : false,
  89469. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
  89470. "cpe_name" : [ ]
  89471. } ]
  89472. } ],
  89473. "cpe_match" : [ ]
  89474. }, {
  89475. "operator" : "AND",
  89476. "children" : [ {
  89477. "operator" : "OR",
  89478. "children" : [ ],
  89479. "cpe_match" : [ {
  89480. "vulnerable" : true,
  89481. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
  89482. "versionEndExcluding" : "2.8.43",
  89483. "cpe_name" : [ ]
  89484. } ]
  89485. }, {
  89486. "operator" : "OR",
  89487. "children" : [ ],
  89488. "cpe_match" : [ {
  89489. "vulnerable" : false,
  89490. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
  89491. "cpe_name" : [ ]
  89492. } ]
  89493. } ],
  89494. "cpe_match" : [ ]
  89495. }, {
  89496. "operator" : "AND",
  89497. "children" : [ {
  89498. "operator" : "OR",
  89499. "children" : [ ],
  89500. "cpe_match" : [ {
  89501. "vulnerable" : true,
  89502. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
  89503. "versionEndExcluding" : "2.8.43",
  89504. "cpe_name" : [ ]
  89505. } ]
  89506. }, {
  89507. "operator" : "OR",
  89508. "children" : [ ],
  89509. "cpe_match" : [ {
  89510. "vulnerable" : false,
  89511. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
  89512. "cpe_name" : [ ]
  89513. } ]
  89514. } ],
  89515. "cpe_match" : [ ]
  89516. }, {
  89517. "operator" : "AND",
  89518. "children" : [ {
  89519. "operator" : "OR",
  89520. "children" : [ ],
  89521. "cpe_match" : [ {
  89522. "vulnerable" : true,
  89523. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
  89524. "versionEndExcluding" : "2.8.43",
  89525. "cpe_name" : [ ]
  89526. } ]
  89527. }, {
  89528. "operator" : "OR",
  89529. "children" : [ ],
  89530. "cpe_match" : [ {
  89531. "vulnerable" : false,
  89532. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
  89533. "cpe_name" : [ ]
  89534. } ]
  89535. } ],
  89536. "cpe_match" : [ ]
  89537. }, {
  89538. "operator" : "AND",
  89539. "children" : [ {
  89540. "operator" : "OR",
  89541. "children" : [ ],
  89542. "cpe_match" : [ {
  89543. "vulnerable" : true,
  89544. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
  89545. "versionEndExcluding" : "2.8.43",
  89546. "cpe_name" : [ ]
  89547. } ]
  89548. }, {
  89549. "operator" : "OR",
  89550. "children" : [ ],
  89551. "cpe_match" : [ {
  89552. "vulnerable" : false,
  89553. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
  89554. "cpe_name" : [ ]
  89555. } ]
  89556. } ],
  89557. "cpe_match" : [ ]
  89558. }, {
  89559. "operator" : "AND",
  89560. "children" : [ {
  89561. "operator" : "OR",
  89562. "children" : [ ],
  89563. "cpe_match" : [ {
  89564. "vulnerable" : true,
  89565. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*",
  89566. "versionEndExcluding" : "2.8.43",
  89567. "cpe_name" : [ ]
  89568. } ]
  89569. }, {
  89570. "operator" : "OR",
  89571. "children" : [ ],
  89572. "cpe_match" : [ {
  89573. "vulnerable" : false,
  89574. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*",
  89575. "cpe_name" : [ ]
  89576. } ]
  89577. } ],
  89578. "cpe_match" : [ ]
  89579. }, {
  89580. "operator" : "OR",
  89581. "children" : [ ],
  89582. "cpe_match" : [ {
  89583. "vulnerable" : true,
  89584. "cpe23Uri" : "cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*",
  89585. "versionEndExcluding" : "24.0",
  89586. "cpe_name" : [ ]
  89587. } ]
  89588. } ]
  89589. },
  89590. "impact" : {
  89591. "baseMetricV3" : {
  89592. "cvssV3" : {
  89593. "version" : "3.1",
  89594. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  89595. "attackVector" : "LOCAL",
  89596. "attackComplexity" : "LOW",
  89597. "privilegesRequired" : "LOW",
  89598. "userInteraction" : "NONE",
  89599. "scope" : "UNCHANGED",
  89600. "confidentialityImpact" : "NONE",
  89601. "integrityImpact" : "NONE",
  89602. "availabilityImpact" : "HIGH",
  89603. "baseScore" : 5.5,
  89604. "baseSeverity" : "MEDIUM"
  89605. },
  89606. "exploitabilityScore" : 1.8,
  89607. "impactScore" : 3.6
  89608. },
  89609. "baseMetricV2" : {
  89610. "cvssV2" : {
  89611. "version" : "2.0",
  89612. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:P",
  89613. "accessVector" : "LOCAL",
  89614. "accessComplexity" : "LOW",
  89615. "authentication" : "NONE",
  89616. "confidentialityImpact" : "NONE",
  89617. "integrityImpact" : "NONE",
  89618. "availabilityImpact" : "PARTIAL",
  89619. "baseScore" : 2.1
  89620. },
  89621. "severity" : "LOW",
  89622. "exploitabilityScore" : 3.9,
  89623. "impactScore" : 2.9,
  89624. "acInsufInfo" : false,
  89625. "obtainAllPrivilege" : false,
  89626. "obtainUserPrivilege" : false,
  89627. "obtainOtherPrivilege" : false,
  89628. "userInteractionRequired" : false
  89629. }
  89630. },
  89631. "publishedDate" : "2019-11-14T19:15Z",
  89632. "lastModifiedDate" : "2021-05-03T17:35Z"
  89633. }, {
  89634. "cve" : {
  89635. "data_type" : "CVE",
  89636. "data_format" : "MITRE",
  89637. "data_version" : "4.0",
  89638. "CVE_data_meta" : {
  89639. "ID" : "CVE-2019-0145",
  89640. "ASSIGNER" : "secure@intel.com"
  89641. },
  89642. "problemtype" : {
  89643. "problemtype_data" : [ {
  89644. "description" : [ {
  89645. "lang" : "en",
  89646. "value" : "CWE-120"
  89647. } ]
  89648. } ]
  89649. },
  89650. "references" : {
  89651. "reference_data" : [ {
  89652. "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  89653. "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  89654. "refsource" : "MISC",
  89655. "tags" : [ "Patch", "Vendor Advisory" ]
  89656. } ]
  89657. },
  89658. "description" : {
  89659. "description_data" : [ {
  89660. "lang" : "en",
  89661. "value" : "Buffer overflow in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable an escalation of privilege via local access."
  89662. } ]
  89663. }
  89664. },
  89665. "configurations" : {
  89666. "CVE_data_version" : "4.0",
  89667. "nodes" : [ {
  89668. "operator" : "AND",
  89669. "children" : [ {
  89670. "operator" : "OR",
  89671. "children" : [ ],
  89672. "cpe_match" : [ {
  89673. "vulnerable" : true,
  89674. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
  89675. "versionEndExcluding" : "7.0",
  89676. "cpe_name" : [ ]
  89677. } ]
  89678. }, {
  89679. "operator" : "OR",
  89680. "children" : [ ],
  89681. "cpe_match" : [ {
  89682. "vulnerable" : false,
  89683. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
  89684. "cpe_name" : [ ]
  89685. } ]
  89686. } ],
  89687. "cpe_match" : [ ]
  89688. }, {
  89689. "operator" : "AND",
  89690. "children" : [ {
  89691. "operator" : "OR",
  89692. "children" : [ ],
  89693. "cpe_match" : [ {
  89694. "vulnerable" : true,
  89695. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
  89696. "versionEndExcluding" : "7.0",
  89697. "cpe_name" : [ ]
  89698. } ]
  89699. }, {
  89700. "operator" : "OR",
  89701. "children" : [ ],
  89702. "cpe_match" : [ {
  89703. "vulnerable" : false,
  89704. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
  89705. "cpe_name" : [ ]
  89706. } ]
  89707. } ],
  89708. "cpe_match" : [ ]
  89709. }, {
  89710. "operator" : "AND",
  89711. "children" : [ {
  89712. "operator" : "OR",
  89713. "children" : [ ],
  89714. "cpe_match" : [ {
  89715. "vulnerable" : true,
  89716. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
  89717. "versionEndExcluding" : "7.0",
  89718. "cpe_name" : [ ]
  89719. } ]
  89720. }, {
  89721. "operator" : "OR",
  89722. "children" : [ ],
  89723. "cpe_match" : [ {
  89724. "vulnerable" : false,
  89725. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
  89726. "cpe_name" : [ ]
  89727. } ]
  89728. } ],
  89729. "cpe_match" : [ ]
  89730. }, {
  89731. "operator" : "AND",
  89732. "children" : [ {
  89733. "operator" : "OR",
  89734. "children" : [ ],
  89735. "cpe_match" : [ {
  89736. "vulnerable" : true,
  89737. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
  89738. "versionEndExcluding" : "7.0",
  89739. "cpe_name" : [ ]
  89740. } ]
  89741. }, {
  89742. "operator" : "OR",
  89743. "children" : [ ],
  89744. "cpe_match" : [ {
  89745. "vulnerable" : false,
  89746. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
  89747. "cpe_name" : [ ]
  89748. } ]
  89749. } ],
  89750. "cpe_match" : [ ]
  89751. }, {
  89752. "operator" : "AND",
  89753. "children" : [ {
  89754. "operator" : "OR",
  89755. "children" : [ ],
  89756. "cpe_match" : [ {
  89757. "vulnerable" : true,
  89758. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
  89759. "versionEndExcluding" : "7.0",
  89760. "cpe_name" : [ ]
  89761. } ]
  89762. }, {
  89763. "operator" : "OR",
  89764. "children" : [ ],
  89765. "cpe_match" : [ {
  89766. "vulnerable" : false,
  89767. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
  89768. "cpe_name" : [ ]
  89769. } ]
  89770. } ],
  89771. "cpe_match" : [ ]
  89772. }, {
  89773. "operator" : "AND",
  89774. "children" : [ {
  89775. "operator" : "OR",
  89776. "children" : [ ],
  89777. "cpe_match" : [ {
  89778. "vulnerable" : true,
  89779. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*",
  89780. "versionEndExcluding" : "7.0",
  89781. "cpe_name" : [ ]
  89782. } ]
  89783. }, {
  89784. "operator" : "OR",
  89785. "children" : [ ],
  89786. "cpe_match" : [ {
  89787. "vulnerable" : false,
  89788. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*",
  89789. "cpe_name" : [ ]
  89790. } ]
  89791. } ],
  89792. "cpe_match" : [ ]
  89793. }, {
  89794. "operator" : "OR",
  89795. "children" : [ ],
  89796. "cpe_match" : [ {
  89797. "vulnerable" : true,
  89798. "cpe23Uri" : "cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*",
  89799. "versionEndExcluding" : "24.0",
  89800. "cpe_name" : [ ]
  89801. } ]
  89802. } ]
  89803. },
  89804. "impact" : {
  89805. "baseMetricV3" : {
  89806. "cvssV3" : {
  89807. "version" : "3.1",
  89808. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
  89809. "attackVector" : "LOCAL",
  89810. "attackComplexity" : "LOW",
  89811. "privilegesRequired" : "LOW",
  89812. "userInteraction" : "NONE",
  89813. "scope" : "UNCHANGED",
  89814. "confidentialityImpact" : "HIGH",
  89815. "integrityImpact" : "HIGH",
  89816. "availabilityImpact" : "HIGH",
  89817. "baseScore" : 7.8,
  89818. "baseSeverity" : "HIGH"
  89819. },
  89820. "exploitabilityScore" : 1.8,
  89821. "impactScore" : 5.9
  89822. },
  89823. "baseMetricV2" : {
  89824. "cvssV2" : {
  89825. "version" : "2.0",
  89826. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  89827. "accessVector" : "LOCAL",
  89828. "accessComplexity" : "LOW",
  89829. "authentication" : "NONE",
  89830. "confidentialityImpact" : "COMPLETE",
  89831. "integrityImpact" : "COMPLETE",
  89832. "availabilityImpact" : "COMPLETE",
  89833. "baseScore" : 7.2
  89834. },
  89835. "severity" : "HIGH",
  89836. "exploitabilityScore" : 3.9,
  89837. "impactScore" : 10.0,
  89838. "acInsufInfo" : false,
  89839. "obtainAllPrivilege" : false,
  89840. "obtainUserPrivilege" : false,
  89841. "obtainOtherPrivilege" : false,
  89842. "userInteractionRequired" : false
  89843. }
  89844. },
  89845. "publishedDate" : "2019-11-14T19:15Z",
  89846. "lastModifiedDate" : "2021-05-03T17:20Z"
  89847. }, {
  89848. "cve" : {
  89849. "data_type" : "CVE",
  89850. "data_format" : "MITRE",
  89851. "data_version" : "4.0",
  89852. "CVE_data_meta" : {
  89853. "ID" : "CVE-2019-0144",
  89854. "ASSIGNER" : "secure@intel.com"
  89855. },
  89856. "problemtype" : {
  89857. "problemtype_data" : [ {
  89858. "description" : [ {
  89859. "lang" : "en",
  89860. "value" : "CWE-755"
  89861. } ]
  89862. } ]
  89863. },
  89864. "references" : {
  89865. "reference_data" : [ {
  89866. "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  89867. "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  89868. "refsource" : "MISC",
  89869. "tags" : [ "Patch", "Vendor Advisory" ]
  89870. } ]
  89871. },
  89872. "description" : {
  89873. "description_data" : [ {
  89874. "lang" : "en",
  89875. "value" : "Unhandled exception in firmware for Intel(R) Ethernet 700 Series Controllers before version 7.0 may allow an authenticated user to potentially enable a denial of service via local access."
  89876. } ]
  89877. }
  89878. },
  89879. "configurations" : {
  89880. "CVE_data_version" : "4.0",
  89881. "nodes" : [ {
  89882. "operator" : "AND",
  89883. "children" : [ {
  89884. "operator" : "OR",
  89885. "children" : [ ],
  89886. "cpe_match" : [ {
  89887. "vulnerable" : true,
  89888. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
  89889. "versionEndExcluding" : "7.0",
  89890. "cpe_name" : [ ]
  89891. } ]
  89892. }, {
  89893. "operator" : "OR",
  89894. "children" : [ ],
  89895. "cpe_match" : [ {
  89896. "vulnerable" : false,
  89897. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
  89898. "cpe_name" : [ ]
  89899. } ]
  89900. } ],
  89901. "cpe_match" : [ ]
  89902. }, {
  89903. "operator" : "AND",
  89904. "children" : [ {
  89905. "operator" : "OR",
  89906. "children" : [ ],
  89907. "cpe_match" : [ {
  89908. "vulnerable" : true,
  89909. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
  89910. "versionEndExcluding" : "7.0",
  89911. "cpe_name" : [ ]
  89912. } ]
  89913. }, {
  89914. "operator" : "OR",
  89915. "children" : [ ],
  89916. "cpe_match" : [ {
  89917. "vulnerable" : false,
  89918. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
  89919. "cpe_name" : [ ]
  89920. } ]
  89921. } ],
  89922. "cpe_match" : [ ]
  89923. }, {
  89924. "operator" : "AND",
  89925. "children" : [ {
  89926. "operator" : "OR",
  89927. "children" : [ ],
  89928. "cpe_match" : [ {
  89929. "vulnerable" : true,
  89930. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
  89931. "versionEndExcluding" : "7.0",
  89932. "cpe_name" : [ ]
  89933. } ]
  89934. }, {
  89935. "operator" : "OR",
  89936. "children" : [ ],
  89937. "cpe_match" : [ {
  89938. "vulnerable" : false,
  89939. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
  89940. "cpe_name" : [ ]
  89941. } ]
  89942. } ],
  89943. "cpe_match" : [ ]
  89944. }, {
  89945. "operator" : "AND",
  89946. "children" : [ {
  89947. "operator" : "OR",
  89948. "children" : [ ],
  89949. "cpe_match" : [ {
  89950. "vulnerable" : true,
  89951. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
  89952. "versionEndExcluding" : "7.0",
  89953. "cpe_name" : [ ]
  89954. } ]
  89955. }, {
  89956. "operator" : "OR",
  89957. "children" : [ ],
  89958. "cpe_match" : [ {
  89959. "vulnerable" : false,
  89960. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
  89961. "cpe_name" : [ ]
  89962. } ]
  89963. } ],
  89964. "cpe_match" : [ ]
  89965. }, {
  89966. "operator" : "AND",
  89967. "children" : [ {
  89968. "operator" : "OR",
  89969. "children" : [ ],
  89970. "cpe_match" : [ {
  89971. "vulnerable" : true,
  89972. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
  89973. "versionEndExcluding" : "7.0",
  89974. "cpe_name" : [ ]
  89975. } ]
  89976. }, {
  89977. "operator" : "OR",
  89978. "children" : [ ],
  89979. "cpe_match" : [ {
  89980. "vulnerable" : false,
  89981. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
  89982. "cpe_name" : [ ]
  89983. } ]
  89984. } ],
  89985. "cpe_match" : [ ]
  89986. }, {
  89987. "operator" : "AND",
  89988. "children" : [ {
  89989. "operator" : "OR",
  89990. "children" : [ ],
  89991. "cpe_match" : [ {
  89992. "vulnerable" : true,
  89993. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*",
  89994. "versionEndExcluding" : "7.0",
  89995. "cpe_name" : [ ]
  89996. } ]
  89997. }, {
  89998. "operator" : "OR",
  89999. "children" : [ ],
  90000. "cpe_match" : [ {
  90001. "vulnerable" : false,
  90002. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*",
  90003. "cpe_name" : [ ]
  90004. } ]
  90005. } ],
  90006. "cpe_match" : [ ]
  90007. }, {
  90008. "operator" : "OR",
  90009. "children" : [ ],
  90010. "cpe_match" : [ {
  90011. "vulnerable" : true,
  90012. "cpe23Uri" : "cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*",
  90013. "versionEndExcluding" : "24.0",
  90014. "cpe_name" : [ ]
  90015. } ]
  90016. } ]
  90017. },
  90018. "impact" : {
  90019. "baseMetricV3" : {
  90020. "cvssV3" : {
  90021. "version" : "3.1",
  90022. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
  90023. "attackVector" : "LOCAL",
  90024. "attackComplexity" : "LOW",
  90025. "privilegesRequired" : "LOW",
  90026. "userInteraction" : "NONE",
  90027. "scope" : "CHANGED",
  90028. "confidentialityImpact" : "NONE",
  90029. "integrityImpact" : "NONE",
  90030. "availabilityImpact" : "HIGH",
  90031. "baseScore" : 6.5,
  90032. "baseSeverity" : "MEDIUM"
  90033. },
  90034. "exploitabilityScore" : 2.0,
  90035. "impactScore" : 4.0
  90036. },
  90037. "baseMetricV2" : {
  90038. "cvssV2" : {
  90039. "version" : "2.0",
  90040. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:C",
  90041. "accessVector" : "LOCAL",
  90042. "accessComplexity" : "LOW",
  90043. "authentication" : "NONE",
  90044. "confidentialityImpact" : "NONE",
  90045. "integrityImpact" : "NONE",
  90046. "availabilityImpact" : "COMPLETE",
  90047. "baseScore" : 4.9
  90048. },
  90049. "severity" : "MEDIUM",
  90050. "exploitabilityScore" : 3.9,
  90051. "impactScore" : 6.9,
  90052. "acInsufInfo" : false,
  90053. "obtainAllPrivilege" : false,
  90054. "obtainUserPrivilege" : false,
  90055. "obtainOtherPrivilege" : false,
  90056. "userInteractionRequired" : false
  90057. }
  90058. },
  90059. "publishedDate" : "2019-11-14T19:15Z",
  90060. "lastModifiedDate" : "2021-05-03T17:29Z"
  90061. }, {
  90062. "cve" : {
  90063. "data_type" : "CVE",
  90064. "data_format" : "MITRE",
  90065. "data_version" : "4.0",
  90066. "CVE_data_meta" : {
  90067. "ID" : "CVE-2019-0143",
  90068. "ASSIGNER" : "secure@intel.com"
  90069. },
  90070. "problemtype" : {
  90071. "problemtype_data" : [ {
  90072. "description" : [ {
  90073. "lang" : "en",
  90074. "value" : "CWE-755"
  90075. } ]
  90076. } ]
  90077. },
  90078. "references" : {
  90079. "reference_data" : [ {
  90080. "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  90081. "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  90082. "refsource" : "MISC",
  90083. "tags" : [ "Patch", "Vendor Advisory" ]
  90084. } ]
  90085. },
  90086. "description" : {
  90087. "description_data" : [ {
  90088. "lang" : "en",
  90089. "value" : "Unhandled exception in Kernel-mode drivers for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access."
  90090. } ]
  90091. }
  90092. },
  90093. "configurations" : {
  90094. "CVE_data_version" : "4.0",
  90095. "nodes" : [ {
  90096. "operator" : "AND",
  90097. "children" : [ {
  90098. "operator" : "OR",
  90099. "children" : [ ],
  90100. "cpe_match" : [ {
  90101. "vulnerable" : true,
  90102. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
  90103. "versionEndExcluding" : "7.0",
  90104. "cpe_name" : [ ]
  90105. } ]
  90106. }, {
  90107. "operator" : "OR",
  90108. "children" : [ ],
  90109. "cpe_match" : [ {
  90110. "vulnerable" : false,
  90111. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
  90112. "cpe_name" : [ ]
  90113. } ]
  90114. } ],
  90115. "cpe_match" : [ ]
  90116. }, {
  90117. "operator" : "AND",
  90118. "children" : [ {
  90119. "operator" : "OR",
  90120. "children" : [ ],
  90121. "cpe_match" : [ {
  90122. "vulnerable" : true,
  90123. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
  90124. "versionEndExcluding" : "7.0",
  90125. "cpe_name" : [ ]
  90126. } ]
  90127. }, {
  90128. "operator" : "OR",
  90129. "children" : [ ],
  90130. "cpe_match" : [ {
  90131. "vulnerable" : false,
  90132. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
  90133. "cpe_name" : [ ]
  90134. } ]
  90135. } ],
  90136. "cpe_match" : [ ]
  90137. }, {
  90138. "operator" : "AND",
  90139. "children" : [ {
  90140. "operator" : "OR",
  90141. "children" : [ ],
  90142. "cpe_match" : [ {
  90143. "vulnerable" : true,
  90144. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
  90145. "versionEndExcluding" : "7.0",
  90146. "cpe_name" : [ ]
  90147. } ]
  90148. }, {
  90149. "operator" : "OR",
  90150. "children" : [ ],
  90151. "cpe_match" : [ {
  90152. "vulnerable" : false,
  90153. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
  90154. "cpe_name" : [ ]
  90155. } ]
  90156. } ],
  90157. "cpe_match" : [ ]
  90158. }, {
  90159. "operator" : "AND",
  90160. "children" : [ {
  90161. "operator" : "OR",
  90162. "children" : [ ],
  90163. "cpe_match" : [ {
  90164. "vulnerable" : true,
  90165. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
  90166. "versionEndExcluding" : "7.0",
  90167. "cpe_name" : [ ]
  90168. } ]
  90169. }, {
  90170. "operator" : "OR",
  90171. "children" : [ ],
  90172. "cpe_match" : [ {
  90173. "vulnerable" : false,
  90174. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
  90175. "cpe_name" : [ ]
  90176. } ]
  90177. } ],
  90178. "cpe_match" : [ ]
  90179. }, {
  90180. "operator" : "AND",
  90181. "children" : [ {
  90182. "operator" : "OR",
  90183. "children" : [ ],
  90184. "cpe_match" : [ {
  90185. "vulnerable" : true,
  90186. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
  90187. "versionEndExcluding" : "7.0",
  90188. "cpe_name" : [ ]
  90189. } ]
  90190. }, {
  90191. "operator" : "OR",
  90192. "children" : [ ],
  90193. "cpe_match" : [ {
  90194. "vulnerable" : false,
  90195. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
  90196. "cpe_name" : [ ]
  90197. } ]
  90198. } ],
  90199. "cpe_match" : [ ]
  90200. }, {
  90201. "operator" : "AND",
  90202. "children" : [ {
  90203. "operator" : "OR",
  90204. "children" : [ ],
  90205. "cpe_match" : [ {
  90206. "vulnerable" : true,
  90207. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*",
  90208. "versionEndExcluding" : "7.0",
  90209. "cpe_name" : [ ]
  90210. } ]
  90211. }, {
  90212. "operator" : "OR",
  90213. "children" : [ ],
  90214. "cpe_match" : [ {
  90215. "vulnerable" : false,
  90216. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*",
  90217. "cpe_name" : [ ]
  90218. } ]
  90219. } ],
  90220. "cpe_match" : [ ]
  90221. }, {
  90222. "operator" : "OR",
  90223. "children" : [ ],
  90224. "cpe_match" : [ {
  90225. "vulnerable" : true,
  90226. "cpe23Uri" : "cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*",
  90227. "versionEndExcluding" : "24.0",
  90228. "cpe_name" : [ ]
  90229. } ]
  90230. } ]
  90231. },
  90232. "impact" : {
  90233. "baseMetricV3" : {
  90234. "cvssV3" : {
  90235. "version" : "3.1",
  90236. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  90237. "attackVector" : "LOCAL",
  90238. "attackComplexity" : "LOW",
  90239. "privilegesRequired" : "LOW",
  90240. "userInteraction" : "NONE",
  90241. "scope" : "UNCHANGED",
  90242. "confidentialityImpact" : "NONE",
  90243. "integrityImpact" : "NONE",
  90244. "availabilityImpact" : "HIGH",
  90245. "baseScore" : 5.5,
  90246. "baseSeverity" : "MEDIUM"
  90247. },
  90248. "exploitabilityScore" : 1.8,
  90249. "impactScore" : 3.6
  90250. },
  90251. "baseMetricV2" : {
  90252. "cvssV2" : {
  90253. "version" : "2.0",
  90254. "vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:C",
  90255. "accessVector" : "LOCAL",
  90256. "accessComplexity" : "LOW",
  90257. "authentication" : "NONE",
  90258. "confidentialityImpact" : "NONE",
  90259. "integrityImpact" : "NONE",
  90260. "availabilityImpact" : "COMPLETE",
  90261. "baseScore" : 4.9
  90262. },
  90263. "severity" : "MEDIUM",
  90264. "exploitabilityScore" : 3.9,
  90265. "impactScore" : 6.9,
  90266. "acInsufInfo" : false,
  90267. "obtainAllPrivilege" : false,
  90268. "obtainUserPrivilege" : false,
  90269. "obtainOtherPrivilege" : false,
  90270. "userInteractionRequired" : false
  90271. }
  90272. },
  90273. "publishedDate" : "2019-11-14T19:15Z",
  90274. "lastModifiedDate" : "2021-05-03T17:16Z"
  90275. }, {
  90276. "cve" : {
  90277. "data_type" : "CVE",
  90278. "data_format" : "MITRE",
  90279. "data_version" : "4.0",
  90280. "CVE_data_meta" : {
  90281. "ID" : "CVE-2019-0142",
  90282. "ASSIGNER" : "secure@intel.com"
  90283. },
  90284. "problemtype" : {
  90285. "problemtype_data" : [ {
  90286. "description" : [ {
  90287. "lang" : "en",
  90288. "value" : "CWE-269"
  90289. } ]
  90290. } ]
  90291. },
  90292. "references" : {
  90293. "reference_data" : [ {
  90294. "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  90295. "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  90296. "refsource" : "MISC",
  90297. "tags" : [ "Patch", "Vendor Advisory" ]
  90298. } ]
  90299. },
  90300. "description" : {
  90301. "description_data" : [ {
  90302. "lang" : "en",
  90303. "value" : "Insufficient access control in ilp60x64.sys driver for Intel(R) Ethernet 700 Series Controllers before version 1.33.0.0 may allow a privileged user to potentially enable escalation of privilege via local access."
  90304. } ]
  90305. }
  90306. },
  90307. "configurations" : {
  90308. "CVE_data_version" : "4.0",
  90309. "nodes" : [ {
  90310. "operator" : "AND",
  90311. "children" : [ {
  90312. "operator" : "OR",
  90313. "children" : [ ],
  90314. "cpe_match" : [ {
  90315. "vulnerable" : true,
  90316. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
  90317. "versionEndExcluding" : "1.33.0.0",
  90318. "cpe_name" : [ ]
  90319. } ]
  90320. }, {
  90321. "operator" : "OR",
  90322. "children" : [ ],
  90323. "cpe_match" : [ {
  90324. "vulnerable" : false,
  90325. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
  90326. "cpe_name" : [ ]
  90327. } ]
  90328. } ],
  90329. "cpe_match" : [ ]
  90330. }, {
  90331. "operator" : "AND",
  90332. "children" : [ {
  90333. "operator" : "OR",
  90334. "children" : [ ],
  90335. "cpe_match" : [ {
  90336. "vulnerable" : true,
  90337. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
  90338. "versionEndExcluding" : "1.33.0.0",
  90339. "cpe_name" : [ ]
  90340. } ]
  90341. }, {
  90342. "operator" : "OR",
  90343. "children" : [ ],
  90344. "cpe_match" : [ {
  90345. "vulnerable" : false,
  90346. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
  90347. "cpe_name" : [ ]
  90348. } ]
  90349. } ],
  90350. "cpe_match" : [ ]
  90351. }, {
  90352. "operator" : "AND",
  90353. "children" : [ {
  90354. "operator" : "OR",
  90355. "children" : [ ],
  90356. "cpe_match" : [ {
  90357. "vulnerable" : true,
  90358. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
  90359. "versionEndExcluding" : "1.33.0.0",
  90360. "cpe_name" : [ ]
  90361. } ]
  90362. }, {
  90363. "operator" : "OR",
  90364. "children" : [ ],
  90365. "cpe_match" : [ {
  90366. "vulnerable" : false,
  90367. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
  90368. "cpe_name" : [ ]
  90369. } ]
  90370. } ],
  90371. "cpe_match" : [ ]
  90372. }, {
  90373. "operator" : "AND",
  90374. "children" : [ {
  90375. "operator" : "OR",
  90376. "children" : [ ],
  90377. "cpe_match" : [ {
  90378. "vulnerable" : true,
  90379. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
  90380. "versionEndExcluding" : "1.33.0.0",
  90381. "cpe_name" : [ ]
  90382. } ]
  90383. }, {
  90384. "operator" : "OR",
  90385. "children" : [ ],
  90386. "cpe_match" : [ {
  90387. "vulnerable" : false,
  90388. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
  90389. "cpe_name" : [ ]
  90390. } ]
  90391. } ],
  90392. "cpe_match" : [ ]
  90393. }, {
  90394. "operator" : "AND",
  90395. "children" : [ {
  90396. "operator" : "OR",
  90397. "children" : [ ],
  90398. "cpe_match" : [ {
  90399. "vulnerable" : true,
  90400. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
  90401. "versionEndExcluding" : "1.33.0.0",
  90402. "cpe_name" : [ ]
  90403. } ]
  90404. }, {
  90405. "operator" : "OR",
  90406. "children" : [ ],
  90407. "cpe_match" : [ {
  90408. "vulnerable" : false,
  90409. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
  90410. "cpe_name" : [ ]
  90411. } ]
  90412. } ],
  90413. "cpe_match" : [ ]
  90414. }, {
  90415. "operator" : "AND",
  90416. "children" : [ {
  90417. "operator" : "OR",
  90418. "children" : [ ],
  90419. "cpe_match" : [ {
  90420. "vulnerable" : true,
  90421. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*",
  90422. "versionEndExcluding" : "1.33.0.0",
  90423. "cpe_name" : [ ]
  90424. } ]
  90425. }, {
  90426. "operator" : "OR",
  90427. "children" : [ ],
  90428. "cpe_match" : [ {
  90429. "vulnerable" : false,
  90430. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*",
  90431. "cpe_name" : [ ]
  90432. } ]
  90433. } ],
  90434. "cpe_match" : [ ]
  90435. }, {
  90436. "operator" : "OR",
  90437. "children" : [ ],
  90438. "cpe_match" : [ {
  90439. "vulnerable" : true,
  90440. "cpe23Uri" : "cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*",
  90441. "versionEndExcluding" : "24.0",
  90442. "cpe_name" : [ ]
  90443. } ]
  90444. } ]
  90445. },
  90446. "impact" : {
  90447. "baseMetricV3" : {
  90448. "cvssV3" : {
  90449. "version" : "3.1",
  90450. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
  90451. "attackVector" : "LOCAL",
  90452. "attackComplexity" : "LOW",
  90453. "privilegesRequired" : "HIGH",
  90454. "userInteraction" : "NONE",
  90455. "scope" : "CHANGED",
  90456. "confidentialityImpact" : "HIGH",
  90457. "integrityImpact" : "HIGH",
  90458. "availabilityImpact" : "HIGH",
  90459. "baseScore" : 8.2,
  90460. "baseSeverity" : "HIGH"
  90461. },
  90462. "exploitabilityScore" : 1.5,
  90463. "impactScore" : 6.0
  90464. },
  90465. "baseMetricV2" : {
  90466. "cvssV2" : {
  90467. "version" : "2.0",
  90468. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
  90469. "accessVector" : "LOCAL",
  90470. "accessComplexity" : "LOW",
  90471. "authentication" : "NONE",
  90472. "confidentialityImpact" : "COMPLETE",
  90473. "integrityImpact" : "COMPLETE",
  90474. "availabilityImpact" : "COMPLETE",
  90475. "baseScore" : 7.2
  90476. },
  90477. "severity" : "HIGH",
  90478. "exploitabilityScore" : 3.9,
  90479. "impactScore" : 10.0,
  90480. "acInsufInfo" : false,
  90481. "obtainAllPrivilege" : false,
  90482. "obtainUserPrivilege" : false,
  90483. "obtainOtherPrivilege" : false,
  90484. "userInteractionRequired" : false
  90485. }
  90486. },
  90487. "publishedDate" : "2019-11-14T19:15Z",
  90488. "lastModifiedDate" : "2021-05-03T17:26Z"
  90489. }, {
  90490. "cve" : {
  90491. "data_type" : "CVE",
  90492. "data_format" : "MITRE",
  90493. "data_version" : "4.0",
  90494. "CVE_data_meta" : {
  90495. "ID" : "CVE-2019-0140",
  90496. "ASSIGNER" : "secure@intel.com"
  90497. },
  90498. "problemtype" : {
  90499. "problemtype_data" : [ {
  90500. "description" : [ {
  90501. "lang" : "en",
  90502. "value" : "CWE-120"
  90503. } ]
  90504. } ]
  90505. },
  90506. "references" : {
  90507. "reference_data" : [ {
  90508. "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  90509. "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  90510. "refsource" : "MISC",
  90511. "tags" : [ "Patch", "Vendor Advisory" ]
  90512. } ]
  90513. },
  90514. "description" : {
  90515. "description_data" : [ {
  90516. "lang" : "en",
  90517. "value" : "Buffer overflow in firmware for Intel(R) Ethernet 700 Series Controllers before version 7.0 may allow an unauthenticated user to potentially enable an escalation of privilege via an adjacent access."
  90518. } ]
  90519. }
  90520. },
  90521. "configurations" : {
  90522. "CVE_data_version" : "4.0",
  90523. "nodes" : [ {
  90524. "operator" : "AND",
  90525. "children" : [ {
  90526. "operator" : "OR",
  90527. "children" : [ ],
  90528. "cpe_match" : [ {
  90529. "vulnerable" : true,
  90530. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
  90531. "versionEndExcluding" : "7.0",
  90532. "cpe_name" : [ ]
  90533. } ]
  90534. }, {
  90535. "operator" : "OR",
  90536. "children" : [ ],
  90537. "cpe_match" : [ {
  90538. "vulnerable" : false,
  90539. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
  90540. "cpe_name" : [ ]
  90541. } ]
  90542. } ],
  90543. "cpe_match" : [ ]
  90544. }, {
  90545. "operator" : "AND",
  90546. "children" : [ {
  90547. "operator" : "OR",
  90548. "children" : [ ],
  90549. "cpe_match" : [ {
  90550. "vulnerable" : true,
  90551. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
  90552. "versionEndExcluding" : "7.0",
  90553. "cpe_name" : [ ]
  90554. } ]
  90555. }, {
  90556. "operator" : "OR",
  90557. "children" : [ ],
  90558. "cpe_match" : [ {
  90559. "vulnerable" : false,
  90560. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
  90561. "cpe_name" : [ ]
  90562. } ]
  90563. } ],
  90564. "cpe_match" : [ ]
  90565. }, {
  90566. "operator" : "AND",
  90567. "children" : [ {
  90568. "operator" : "OR",
  90569. "children" : [ ],
  90570. "cpe_match" : [ {
  90571. "vulnerable" : true,
  90572. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
  90573. "versionEndExcluding" : "7.0",
  90574. "cpe_name" : [ ]
  90575. } ]
  90576. }, {
  90577. "operator" : "OR",
  90578. "children" : [ ],
  90579. "cpe_match" : [ {
  90580. "vulnerable" : false,
  90581. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
  90582. "cpe_name" : [ ]
  90583. } ]
  90584. } ],
  90585. "cpe_match" : [ ]
  90586. }, {
  90587. "operator" : "AND",
  90588. "children" : [ {
  90589. "operator" : "OR",
  90590. "children" : [ ],
  90591. "cpe_match" : [ {
  90592. "vulnerable" : true,
  90593. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
  90594. "versionEndExcluding" : "7.0",
  90595. "cpe_name" : [ ]
  90596. } ]
  90597. }, {
  90598. "operator" : "OR",
  90599. "children" : [ ],
  90600. "cpe_match" : [ {
  90601. "vulnerable" : false,
  90602. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
  90603. "cpe_name" : [ ]
  90604. } ]
  90605. } ],
  90606. "cpe_match" : [ ]
  90607. }, {
  90608. "operator" : "AND",
  90609. "children" : [ {
  90610. "operator" : "OR",
  90611. "children" : [ ],
  90612. "cpe_match" : [ {
  90613. "vulnerable" : true,
  90614. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
  90615. "versionEndExcluding" : "7.0",
  90616. "cpe_name" : [ ]
  90617. } ]
  90618. }, {
  90619. "operator" : "OR",
  90620. "children" : [ ],
  90621. "cpe_match" : [ {
  90622. "vulnerable" : false,
  90623. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
  90624. "cpe_name" : [ ]
  90625. } ]
  90626. } ],
  90627. "cpe_match" : [ ]
  90628. }, {
  90629. "operator" : "AND",
  90630. "children" : [ {
  90631. "operator" : "OR",
  90632. "children" : [ ],
  90633. "cpe_match" : [ {
  90634. "vulnerable" : true,
  90635. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*",
  90636. "versionEndExcluding" : "7.0",
  90637. "cpe_name" : [ ]
  90638. } ]
  90639. }, {
  90640. "operator" : "OR",
  90641. "children" : [ ],
  90642. "cpe_match" : [ {
  90643. "vulnerable" : false,
  90644. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*",
  90645. "cpe_name" : [ ]
  90646. } ]
  90647. } ],
  90648. "cpe_match" : [ ]
  90649. }, {
  90650. "operator" : "OR",
  90651. "children" : [ ],
  90652. "cpe_match" : [ {
  90653. "vulnerable" : true,
  90654. "cpe23Uri" : "cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*",
  90655. "versionEndExcluding" : "24.0",
  90656. "cpe_name" : [ ]
  90657. } ]
  90658. } ]
  90659. },
  90660. "impact" : {
  90661. "baseMetricV3" : {
  90662. "cvssV3" : {
  90663. "version" : "3.1",
  90664. "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  90665. "attackVector" : "ADJACENT_NETWORK",
  90666. "attackComplexity" : "LOW",
  90667. "privilegesRequired" : "NONE",
  90668. "userInteraction" : "NONE",
  90669. "scope" : "UNCHANGED",
  90670. "confidentialityImpact" : "HIGH",
  90671. "integrityImpact" : "HIGH",
  90672. "availabilityImpact" : "HIGH",
  90673. "baseScore" : 8.8,
  90674. "baseSeverity" : "HIGH"
  90675. },
  90676. "exploitabilityScore" : 2.8,
  90677. "impactScore" : 5.9
  90678. },
  90679. "baseMetricV2" : {
  90680. "cvssV2" : {
  90681. "version" : "2.0",
  90682. "vectorString" : "AV:A/AC:L/Au:N/C:P/I:P/A:P",
  90683. "accessVector" : "ADJACENT_NETWORK",
  90684. "accessComplexity" : "LOW",
  90685. "authentication" : "NONE",
  90686. "confidentialityImpact" : "PARTIAL",
  90687. "integrityImpact" : "PARTIAL",
  90688. "availabilityImpact" : "PARTIAL",
  90689. "baseScore" : 5.8
  90690. },
  90691. "severity" : "MEDIUM",
  90692. "exploitabilityScore" : 6.5,
  90693. "impactScore" : 6.4,
  90694. "acInsufInfo" : false,
  90695. "obtainAllPrivilege" : false,
  90696. "obtainUserPrivilege" : false,
  90697. "obtainOtherPrivilege" : false,
  90698. "userInteractionRequired" : false
  90699. }
  90700. },
  90701. "publishedDate" : "2019-11-14T19:15Z",
  90702. "lastModifiedDate" : "2021-05-03T17:16Z"
  90703. }, {
  90704. "cve" : {
  90705. "data_type" : "CVE",
  90706. "data_format" : "MITRE",
  90707. "data_version" : "4.0",
  90708. "CVE_data_meta" : {
  90709. "ID" : "CVE-2019-0139",
  90710. "ASSIGNER" : "secure@intel.com"
  90711. },
  90712. "problemtype" : {
  90713. "problemtype_data" : [ {
  90714. "description" : [ {
  90715. "lang" : "en",
  90716. "value" : "CWE-269"
  90717. } ]
  90718. } ]
  90719. },
  90720. "references" : {
  90721. "reference_data" : [ {
  90722. "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  90723. "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html",
  90724. "refsource" : "MISC",
  90725. "tags" : [ "Patch", "Vendor Advisory" ]
  90726. }, {
  90727. "url" : "https://support.f5.com/csp/article/K08441753?utm_source=f5support&amp;utm_medium=RSS",
  90728. "name" : "https://support.f5.com/csp/article/K08441753?utm_source=f5support&amp;utm_medium=RSS",
  90729. "refsource" : "CONFIRM",
  90730. "tags" : [ "Third Party Advisory" ]
  90731. } ]
  90732. },
  90733. "description" : {
  90734. "description_data" : [ {
  90735. "lang" : "en",
  90736. "value" : "Insufficient access control in firmware for Intel(R) Ethernet 700 Series Controllers before version 7.0 may allow a privileged user to potentially enable an escalation of privilege, denial of service, or information disclosure via local access."
  90737. } ]
  90738. }
  90739. },
  90740. "configurations" : {
  90741. "CVE_data_version" : "4.0",
  90742. "nodes" : [ {
  90743. "operator" : "AND",
  90744. "children" : [ {
  90745. "operator" : "OR",
  90746. "children" : [ ],
  90747. "cpe_match" : [ {
  90748. "vulnerable" : true,
  90749. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
  90750. "versionEndExcluding" : "7.0",
  90751. "cpe_name" : [ ]
  90752. } ]
  90753. }, {
  90754. "operator" : "OR",
  90755. "children" : [ ],
  90756. "cpe_match" : [ {
  90757. "vulnerable" : false,
  90758. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
  90759. "cpe_name" : [ ]
  90760. } ]
  90761. } ],
  90762. "cpe_match" : [ ]
  90763. }, {
  90764. "operator" : "AND",
  90765. "children" : [ {
  90766. "operator" : "OR",
  90767. "children" : [ ],
  90768. "cpe_match" : [ {
  90769. "vulnerable" : true,
  90770. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
  90771. "versionEndExcluding" : "7.0",
  90772. "cpe_name" : [ ]
  90773. } ]
  90774. }, {
  90775. "operator" : "OR",
  90776. "children" : [ ],
  90777. "cpe_match" : [ {
  90778. "vulnerable" : false,
  90779. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
  90780. "cpe_name" : [ ]
  90781. } ]
  90782. } ],
  90783. "cpe_match" : [ ]
  90784. }, {
  90785. "operator" : "AND",
  90786. "children" : [ {
  90787. "operator" : "OR",
  90788. "children" : [ ],
  90789. "cpe_match" : [ {
  90790. "vulnerable" : true,
  90791. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
  90792. "versionEndExcluding" : "7.0",
  90793. "cpe_name" : [ ]
  90794. } ]
  90795. }, {
  90796. "operator" : "OR",
  90797. "children" : [ ],
  90798. "cpe_match" : [ {
  90799. "vulnerable" : false,
  90800. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
  90801. "cpe_name" : [ ]
  90802. } ]
  90803. } ],
  90804. "cpe_match" : [ ]
  90805. }, {
  90806. "operator" : "AND",
  90807. "children" : [ {
  90808. "operator" : "OR",
  90809. "children" : [ ],
  90810. "cpe_match" : [ {
  90811. "vulnerable" : true,
  90812. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
  90813. "versionEndExcluding" : "7.0",
  90814. "cpe_name" : [ ]
  90815. } ]
  90816. }, {
  90817. "operator" : "OR",
  90818. "children" : [ ],
  90819. "cpe_match" : [ {
  90820. "vulnerable" : false,
  90821. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
  90822. "cpe_name" : [ ]
  90823. } ]
  90824. } ],
  90825. "cpe_match" : [ ]
  90826. }, {
  90827. "operator" : "AND",
  90828. "children" : [ {
  90829. "operator" : "OR",
  90830. "children" : [ ],
  90831. "cpe_match" : [ {
  90832. "vulnerable" : true,
  90833. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
  90834. "versionEndExcluding" : "7.0",
  90835. "cpe_name" : [ ]
  90836. } ]
  90837. }, {
  90838. "operator" : "OR",
  90839. "children" : [ ],
  90840. "cpe_match" : [ {
  90841. "vulnerable" : false,
  90842. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
  90843. "cpe_name" : [ ]
  90844. } ]
  90845. } ],
  90846. "cpe_match" : [ ]
  90847. }, {
  90848. "operator" : "AND",
  90849. "children" : [ {
  90850. "operator" : "OR",
  90851. "children" : [ ],
  90852. "cpe_match" : [ {
  90853. "vulnerable" : true,
  90854. "cpe23Uri" : "cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*",
  90855. "versionEndExcluding" : "7.0",
  90856. "cpe_name" : [ ]
  90857. } ]
  90858. }, {
  90859. "operator" : "OR",
  90860. "children" : [ ],
  90861. "cpe_match" : [ {
  90862. "vulnerable" : false,
  90863. "cpe23Uri" : "cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*",
  90864. "cpe_name" : [ ]
  90865. } ]
  90866. } ],
  90867. "cpe_match" : [ ]
  90868. }, {
  90869. "operator" : "OR",
  90870. "children" : [ ],
  90871. "cpe_match" : [ {
  90872. "vulnerable" : true,
  90873. "cpe23Uri" : "cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*",
  90874. "versionEndExcluding" : "24.0",
  90875. "cpe_name" : [ ]
  90876. } ]
  90877. } ]
  90878. },
  90879. "impact" : {
  90880. "baseMetricV3" : {
  90881. "cvssV3" : {
  90882. "version" : "3.1",
  90883. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
  90884. "attackVector" : "LOCAL",
  90885. "attackComplexity" : "LOW",
  90886. "privilegesRequired" : "HIGH",
  90887. "userInteraction" : "NONE",
  90888. "scope" : "UNCHANGED",
  90889. "confidentialityImpact" : "HIGH",
  90890. "integrityImpact" : "HIGH",
  90891. "availabilityImpact" : "HIGH",
  90892. "baseScore" : 6.7,
  90893. "baseSeverity" : "MEDIUM"
  90894. },
  90895. "exploitabilityScore" : 0.8,
  90896. "impactScore" : 5.9
  90897. },
  90898. "baseMetricV2" : {
  90899. "cvssV2" : {
  90900. "version" : "2.0",
  90901. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  90902. "accessVector" : "LOCAL",
  90903. "accessComplexity" : "LOW",
  90904. "authentication" : "NONE",
  90905. "confidentialityImpact" : "PARTIAL",
  90906. "integrityImpact" : "PARTIAL",
  90907. "availabilityImpact" : "PARTIAL",
  90908. "baseScore" : 4.6
  90909. },
  90910. "severity" : "MEDIUM",
  90911. "exploitabilityScore" : 3.9,
  90912. "impactScore" : 6.4,
  90913. "acInsufInfo" : false,
  90914. "obtainAllPrivilege" : false,
  90915. "obtainUserPrivilege" : false,
  90916. "obtainOtherPrivilege" : false,
  90917. "userInteractionRequired" : false
  90918. }
  90919. },
  90920. "publishedDate" : "2019-11-14T19:15Z",
  90921. "lastModifiedDate" : "2021-05-03T17:24Z"
  90922. }, {
  90923. "cve" : {
  90924. "data_type" : "CVE",
  90925. "data_format" : "MITRE",
  90926. "data_version" : "4.0",
  90927. "CVE_data_meta" : {
  90928. "ID" : "CVE-2019-2904",
  90929. "ASSIGNER" : "secalert_us@oracle.com"
  90930. },
  90931. "problemtype" : {
  90932. "problemtype_data" : [ {
  90933. "description" : [ {
  90934. "lang" : "en",
  90935. "value" : "NVD-CWE-noinfo"
  90936. } ]
  90937. } ]
  90938. },
  90939. "references" : {
  90940. "reference_data" : [ {
  90941. "url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
  90942. "name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
  90943. "refsource" : "MISC",
  90944. "tags" : [ "Patch", "Vendor Advisory" ]
  90945. }, {
  90946. "url" : "https://www.zerodayinitiative.com/advisories/ZDI-19-1024/",
  90947. "name" : "https://www.zerodayinitiative.com/advisories/ZDI-19-1024/",
  90948. "refsource" : "MISC",
  90949. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  90950. }, {
  90951. "url" : "https://www.oracle.com/security-alerts/cpujan2020.html",
  90952. "name" : "https://www.oracle.com/security-alerts/cpujan2020.html",
  90953. "refsource" : "MISC",
  90954. "tags" : [ "Vendor Advisory" ]
  90955. }, {
  90956. "url" : "https://www.oracle.com/security-alerts/cpuapr2020.html",
  90957. "name" : "https://www.oracle.com/security-alerts/cpuapr2020.html",
  90958. "refsource" : "MISC",
  90959. "tags" : [ "Vendor Advisory" ]
  90960. }, {
  90961. "url" : "https://www.oracle.com/security-alerts/cpujul2020.html",
  90962. "name" : "https://www.oracle.com/security-alerts/cpujul2020.html",
  90963. "refsource" : "MISC",
  90964. "tags" : [ "Vendor Advisory" ]
  90965. }, {
  90966. "url" : "https://www.oracle.com/security-alerts/cpuoct2020.html",
  90967. "name" : "N/A",
  90968. "refsource" : "N/A",
  90969. "tags" : [ "Vendor Advisory" ]
  90970. }, {
  90971. "url" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  90972. "name" : "https://www.oracle.com/security-alerts/cpuapr2021.html",
  90973. "refsource" : "MISC",
  90974. "tags" : [ "Vendor Advisory" ]
  90975. } ]
  90976. },
  90977. "description" : {
  90978. "description_data" : [ {
  90979. "lang" : "en",
  90980. "value" : "Vulnerability in the Oracle JDeveloper and ADF product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 11.1.1.9.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle JDeveloper and ADF. Successful attacks of this vulnerability can result in takeover of Oracle JDeveloper and ADF. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)."
  90981. } ]
  90982. }
  90983. },
  90984. "configurations" : {
  90985. "CVE_data_version" : "4.0",
  90986. "nodes" : [ {
  90987. "operator" : "OR",
  90988. "children" : [ ],
  90989. "cpe_match" : [ {
  90990. "vulnerable" : true,
  90991. "cpe23Uri" : "cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:*",
  90992. "cpe_name" : [ ]
  90993. }, {
  90994. "vulnerable" : true,
  90995. "cpe23Uri" : "cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:*",
  90996. "cpe_name" : [ ]
  90997. }, {
  90998. "vulnerable" : true,
  90999. "cpe23Uri" : "cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:*",
  91000. "cpe_name" : [ ]
  91001. }, {
  91002. "vulnerable" : true,
  91003. "cpe23Uri" : "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*",
  91004. "cpe_name" : [ ]
  91005. }, {
  91006. "vulnerable" : true,
  91007. "cpe23Uri" : "cpe:2.3:a:oracle:banking_enterprise_collections:2.7.0:*:*:*:*:*:*:*",
  91008. "cpe_name" : [ ]
  91009. }, {
  91010. "vulnerable" : true,
  91011. "cpe23Uri" : "cpe:2.3:a:oracle:banking_enterprise_collections:2.8.0:*:*:*:*:*:*:*",
  91012. "cpe_name" : [ ]
  91013. }, {
  91014. "vulnerable" : true,
  91015. "cpe23Uri" : "cpe:2.3:a:oracle:banking_enterprise_originations:2.7.0:*:*:*:*:*:*:*",
  91016. "cpe_name" : [ ]
  91017. }, {
  91018. "vulnerable" : true,
  91019. "cpe23Uri" : "cpe:2.3:a:oracle:banking_enterprise_originations:2.8.0:*:*:*:*:*:*:*",
  91020. "cpe_name" : [ ]
  91021. }, {
  91022. "vulnerable" : true,
  91023. "cpe23Uri" : "cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.7.0:*:*:*:*:*:*:*",
  91024. "cpe_name" : [ ]
  91025. }, {
  91026. "vulnerable" : true,
  91027. "cpe23Uri" : "cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.8.0:*:*:*:*:*:*:*",
  91028. "cpe_name" : [ ]
  91029. }, {
  91030. "vulnerable" : true,
  91031. "cpe23Uri" : "cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*",
  91032. "cpe_name" : [ ]
  91033. }, {
  91034. "vulnerable" : true,
  91035. "cpe23Uri" : "cpe:2.3:a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*",
  91036. "cpe_name" : [ ]
  91037. }, {
  91038. "vulnerable" : true,
  91039. "cpe23Uri" : "cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*",
  91040. "cpe_name" : [ ]
  91041. }, {
  91042. "vulnerable" : true,
  91043. "cpe23Uri" : "cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*",
  91044. "cpe_name" : [ ]
  91045. }, {
  91046. "vulnerable" : true,
  91047. "cpe23Uri" : "cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*",
  91048. "cpe_name" : [ ]
  91049. }, {
  91050. "vulnerable" : true,
  91051. "cpe23Uri" : "cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*",
  91052. "cpe_name" : [ ]
  91053. }, {
  91054. "vulnerable" : true,
  91055. "cpe23Uri" : "cpe:2.3:a:oracle:banking_platform:2.7.0:*:*:*:*:*:*:*",
  91056. "cpe_name" : [ ]
  91057. }, {
  91058. "vulnerable" : true,
  91059. "cpe23Uri" : "cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*",
  91060. "cpe_name" : [ ]
  91061. }, {
  91062. "vulnerable" : true,
  91063. "cpe23Uri" : "cpe:2.3:a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:*",
  91064. "cpe_name" : [ ]
  91065. }, {
  91066. "vulnerable" : true,
  91067. "cpe23Uri" : "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
  91068. "cpe_name" : [ ]
  91069. }, {
  91070. "vulnerable" : true,
  91071. "cpe23Uri" : "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*",
  91072. "cpe_name" : [ ]
  91073. }, {
  91074. "vulnerable" : true,
  91075. "cpe23Uri" : "cpe:2.3:a:oracle:clinical:5.2:*:*:*:*:*:*:*",
  91076. "cpe_name" : [ ]
  91077. }, {
  91078. "vulnerable" : true,
  91079. "cpe23Uri" : "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
  91080. "versionStartIncluding" : "8.0.0.0",
  91081. "versionEndIncluding" : "8.4.0.5",
  91082. "cpe_name" : [ ]
  91083. }, {
  91084. "vulnerable" : true,
  91085. "cpe23Uri" : "cpe:2.3:a:oracle:communications_network_integrity:*:*:*:*:*:*:*:*",
  91086. "versionStartIncluding" : "7.3.2",
  91087. "versionEndIncluding" : "7.3.6",
  91088. "cpe_name" : [ ]
  91089. }, {
  91090. "vulnerable" : true,
  91091. "cpe23Uri" : "cpe:2.3:a:oracle:communications_service_broker:6.0:*:*:*:*:*:*:*",
  91092. "cpe_name" : [ ]
  91093. }, {
  91094. "vulnerable" : true,
  91095. "cpe23Uri" : "cpe:2.3:a:oracle:communications_service_broker:6.1:*:*:*:*:*:*:*",
  91096. "cpe_name" : [ ]
  91097. }, {
  91098. "vulnerable" : true,
  91099. "cpe23Uri" : "cpe:2.3:a:oracle:communications_services_gatekeeper:6.0:*:*:*:*:*:*:*",
  91100. "cpe_name" : [ ]
  91101. }, {
  91102. "vulnerable" : true,
  91103. "cpe23Uri" : "cpe:2.3:a:oracle:communications_services_gatekeeper:6.1:*:*:*:*:*:*:*",
  91104. "cpe_name" : [ ]
  91105. }, {
  91106. "vulnerable" : true,
  91107. "cpe23Uri" : "cpe:2.3:a:oracle:enterprise_repository:11.1.1.7.0:*:*:*:*:*:*:*",
  91108. "cpe_name" : [ ]
  91109. }, {
  91110. "vulnerable" : true,
  91111. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_lending_and_leasing:12.5.0:*:*:*:*:*:*:*",
  91112. "cpe_name" : [ ]
  91113. }, {
  91114. "vulnerable" : true,
  91115. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_lending_and_leasing:*:*:*:*:*:*:*:*",
  91116. "versionStartIncluding" : "14.1.0",
  91117. "versionEndIncluding" : "14.2.0",
  91118. "cpe_name" : [ ]
  91119. }, {
  91120. "vulnerable" : true,
  91121. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.6:*:*:*:*:*:*:*",
  91122. "cpe_name" : [ ]
  91123. }, {
  91124. "vulnerable" : true,
  91125. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7:*:*:*:*:*:*:*",
  91126. "cpe_name" : [ ]
  91127. }, {
  91128. "vulnerable" : true,
  91129. "cpe23Uri" : "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8:*:*:*:*:*:*:*",
  91130. "cpe_name" : [ ]
  91131. }, {
  91132. "vulnerable" : true,
  91133. "cpe23Uri" : "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*",
  91134. "cpe_name" : [ ]
  91135. }, {
  91136. "vulnerable" : true,
  91137. "cpe23Uri" : "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*",
  91138. "cpe_name" : [ ]
  91139. }, {
  91140. "vulnerable" : true,
  91141. "cpe23Uri" : "cpe:2.3:a:oracle:health_sciences_data_management_workbench:2.4:*:*:*:*:*:*:*",
  91142. "cpe_name" : [ ]
  91143. }, {
  91144. "vulnerable" : true,
  91145. "cpe23Uri" : "cpe:2.3:a:oracle:health_sciences_data_management_workbench:2.5:*:*:*:*:*:*:*",
  91146. "cpe_name" : [ ]
  91147. }, {
  91148. "vulnerable" : true,
  91149. "cpe23Uri" : "cpe:2.3:a:oracle:hyperion_planning:11.1.2.4:*:*:*:*:*:*:*",
  91150. "cpe_name" : [ ]
  91151. }, {
  91152. "vulnerable" : true,
  91153. "cpe23Uri" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
  91154. "versionStartIncluding" : "8.0.0",
  91155. "versionEndIncluding" : "8.0.19",
  91156. "cpe_name" : [ ]
  91157. }, {
  91158. "vulnerable" : true,
  91159. "cpe23Uri" : "cpe:2.3:a:oracle:rapid_planning:12.1.3:*:*:*:*:*:*:*",
  91160. "cpe_name" : [ ]
  91161. }, {
  91162. "vulnerable" : true,
  91163. "cpe23Uri" : "cpe:2.3:a:oracle:retail_assortment_planning:15.0.3.0:*:*:*:*:*:*:*",
  91164. "cpe_name" : [ ]
  91165. }, {
  91166. "vulnerable" : true,
  91167. "cpe23Uri" : "cpe:2.3:a:oracle:retail_assortment_planning:16.0.3.0:*:*:*:*:*:*:*",
  91168. "cpe_name" : [ ]
  91169. }, {
  91170. "vulnerable" : true,
  91171. "cpe23Uri" : "cpe:2.3:a:oracle:retail_clearance_optimization_engine:13.4:*:*:*:*:*:*:*",
  91172. "cpe_name" : [ ]
  91173. }, {
  91174. "vulnerable" : true,
  91175. "cpe23Uri" : "cpe:2.3:a:oracle:retail_clearance_optimization_engine:14.0.3:*:*:*:*:*:*:*",
  91176. "cpe_name" : [ ]
  91177. }, {
  91178. "vulnerable" : true,
  91179. "cpe23Uri" : "cpe:2.3:a:oracle:retail_clearance_optimization_engine:14.0.5:*:*:*:*:*:*:*",
  91180. "cpe_name" : [ ]
  91181. }, {
  91182. "vulnerable" : true,
  91183. "cpe23Uri" : "cpe:2.3:a:oracle:retail_markdown_optimization:13.4:*:*:*:*:*:*:*",
  91184. "cpe_name" : [ ]
  91185. }, {
  91186. "vulnerable" : true,
  91187. "cpe23Uri" : "cpe:2.3:a:oracle:retail_sales_audit:15.0.3:*:*:*:*:*:*:*",
  91188. "cpe_name" : [ ]
  91189. }, {
  91190. "vulnerable" : true,
  91191. "cpe23Uri" : "cpe:2.3:a:oracle:retail_sales_audit:16.0.2:*:*:*:*:*:*:*",
  91192. "cpe_name" : [ ]
  91193. } ]
  91194. } ]
  91195. },
  91196. "impact" : {
  91197. "baseMetricV3" : {
  91198. "cvssV3" : {
  91199. "version" : "3.1",
  91200. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  91201. "attackVector" : "NETWORK",
  91202. "attackComplexity" : "LOW",
  91203. "privilegesRequired" : "NONE",
  91204. "userInteraction" : "NONE",
  91205. "scope" : "UNCHANGED",
  91206. "confidentialityImpact" : "HIGH",
  91207. "integrityImpact" : "HIGH",
  91208. "availabilityImpact" : "HIGH",
  91209. "baseScore" : 9.8,
  91210. "baseSeverity" : "CRITICAL"
  91211. },
  91212. "exploitabilityScore" : 3.9,
  91213. "impactScore" : 5.9
  91214. },
  91215. "baseMetricV2" : {
  91216. "cvssV2" : {
  91217. "version" : "2.0",
  91218. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  91219. "accessVector" : "NETWORK",
  91220. "accessComplexity" : "LOW",
  91221. "authentication" : "NONE",
  91222. "confidentialityImpact" : "PARTIAL",
  91223. "integrityImpact" : "PARTIAL",
  91224. "availabilityImpact" : "PARTIAL",
  91225. "baseScore" : 7.5
  91226. },
  91227. "severity" : "HIGH",
  91228. "exploitabilityScore" : 10.0,
  91229. "impactScore" : 6.4,
  91230. "acInsufInfo" : false,
  91231. "obtainAllPrivilege" : false,
  91232. "obtainUserPrivilege" : false,
  91233. "obtainOtherPrivilege" : false,
  91234. "userInteractionRequired" : false
  91235. }
  91236. },
  91237. "publishedDate" : "2019-10-16T18:15Z",
  91238. "lastModifiedDate" : "2021-05-05T14:52Z"
  91239. }, {
  91240. "cve" : {
  91241. "data_type" : "CVE",
  91242. "data_format" : "MITRE",
  91243. "data_version" : "4.0",
  91244. "CVE_data_meta" : {
  91245. "ID" : "CVE-2019-17602",
  91246. "ASSIGNER" : "cve@mitre.org"
  91247. },
  91248. "problemtype" : {
  91249. "problemtype_data" : [ {
  91250. "description" : [ {
  91251. "lang" : "en",
  91252. "value" : "CWE-89"
  91253. } ]
  91254. } ]
  91255. },
  91256. "references" : {
  91257. "reference_data" : [ {
  91258. "url" : "https://www.manageengine.com/network-monitoring/help/read-me-complete.html",
  91259. "name" : "https://www.manageengine.com/network-monitoring/help/read-me-complete.html",
  91260. "refsource" : "MISC",
  91261. "tags" : [ "Release Notes", "Vendor Advisory" ]
  91262. } ]
  91263. },
  91264. "description" : {
  91265. "description_data" : [ {
  91266. "lang" : "en",
  91267. "value" : "An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated."
  91268. } ]
  91269. }
  91270. },
  91271. "configurations" : {
  91272. "CVE_data_version" : "4.0",
  91273. "nodes" : [ {
  91274. "operator" : "OR",
  91275. "children" : [ ],
  91276. "cpe_match" : [ {
  91277. "vulnerable" : true,
  91278. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124040:*:*:*:*:*:*",
  91279. "cpe_name" : [ ]
  91280. }, {
  91281. "vulnerable" : true,
  91282. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124039:*:*:*:*:*:*",
  91283. "cpe_name" : [ ]
  91284. }, {
  91285. "vulnerable" : true,
  91286. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124037:*:*:*:*:*:*",
  91287. "cpe_name" : [ ]
  91288. }, {
  91289. "vulnerable" : true,
  91290. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124033:*:*:*:*:*:*",
  91291. "cpe_name" : [ ]
  91292. }, {
  91293. "vulnerable" : true,
  91294. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124011:*:*:*:*:*:*",
  91295. "cpe_name" : [ ]
  91296. }, {
  91297. "vulnerable" : true,
  91298. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124000:*:*:*:*:*:*",
  91299. "cpe_name" : [ ]
  91300. }, {
  91301. "vulnerable" : true,
  91302. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124065:*:*:*:*:*:*",
  91303. "cpe_name" : [ ]
  91304. }, {
  91305. "vulnerable" : true,
  91306. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124066:*:*:*:*:*:*",
  91307. "cpe_name" : [ ]
  91308. }, {
  91309. "vulnerable" : true,
  91310. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:-:*:*:*:*:*:*",
  91311. "cpe_name" : [ ]
  91312. }, {
  91313. "vulnerable" : true,
  91314. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124058:*:*:*:*:*:*",
  91315. "cpe_name" : [ ]
  91316. }, {
  91317. "vulnerable" : true,
  91318. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124056:*:*:*:*:*:*",
  91319. "cpe_name" : [ ]
  91320. }, {
  91321. "vulnerable" : true,
  91322. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124054:*:*:*:*:*:*",
  91323. "cpe_name" : [ ]
  91324. }, {
  91325. "vulnerable" : true,
  91326. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124024:*:*:*:*:*:*",
  91327. "cpe_name" : [ ]
  91328. }, {
  91329. "vulnerable" : true,
  91330. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124023:*:*:*:*:*:*",
  91331. "cpe_name" : [ ]
  91332. }, {
  91333. "vulnerable" : true,
  91334. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124022:*:*:*:*:*:*",
  91335. "cpe_name" : [ ]
  91336. }, {
  91337. "vulnerable" : true,
  91338. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124016:*:*:*:*:*:*",
  91339. "cpe_name" : [ ]
  91340. }, {
  91341. "vulnerable" : true,
  91342. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124075:*:*:*:*:*:*",
  91343. "cpe_name" : [ ]
  91344. }, {
  91345. "vulnerable" : true,
  91346. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124081:*:*:*:*:*:*",
  91347. "cpe_name" : [ ]
  91348. }, {
  91349. "vulnerable" : true,
  91350. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124082:*:*:*:*:*:*",
  91351. "cpe_name" : [ ]
  91352. }, {
  91353. "vulnerable" : true,
  91354. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124085:*:*:*:*:*:*",
  91355. "cpe_name" : [ ]
  91356. }, {
  91357. "vulnerable" : true,
  91358. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124051:*:*:*:*:*:*",
  91359. "cpe_name" : [ ]
  91360. }, {
  91361. "vulnerable" : true,
  91362. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124042:*:*:*:*:*:*",
  91363. "cpe_name" : [ ]
  91364. }, {
  91365. "vulnerable" : true,
  91366. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124027:*:*:*:*:*:*",
  91367. "cpe_name" : [ ]
  91368. }, {
  91369. "vulnerable" : true,
  91370. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124025:*:*:*:*:*:*",
  91371. "cpe_name" : [ ]
  91372. }, {
  91373. "vulnerable" : true,
  91374. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124015:*:*:*:*:*:*",
  91375. "cpe_name" : [ ]
  91376. }, {
  91377. "vulnerable" : true,
  91378. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124013:*:*:*:*:*:*",
  91379. "cpe_name" : [ ]
  91380. }, {
  91381. "vulnerable" : true,
  91382. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124069:*:*:*:*:*:*",
  91383. "cpe_name" : [ ]
  91384. }, {
  91385. "vulnerable" : true,
  91386. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124071:*:*:*:*:*:*",
  91387. "cpe_name" : [ ]
  91388. }, {
  91389. "vulnerable" : true,
  91390. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124087:*:*:*:*:*:*",
  91391. "cpe_name" : [ ]
  91392. }, {
  91393. "vulnerable" : true,
  91394. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
  91395. "versionEndExcluding" : "12.4",
  91396. "cpe_name" : [ ]
  91397. }, {
  91398. "vulnerable" : true,
  91399. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124053:*:*:*:*:*:*",
  91400. "cpe_name" : [ ]
  91401. }, {
  91402. "vulnerable" : true,
  91403. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124043:*:*:*:*:*:*",
  91404. "cpe_name" : [ ]
  91405. }, {
  91406. "vulnerable" : true,
  91407. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124041:*:*:*:*:*:*",
  91408. "cpe_name" : [ ]
  91409. }, {
  91410. "vulnerable" : true,
  91411. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124030:*:*:*:*:*:*",
  91412. "cpe_name" : [ ]
  91413. }, {
  91414. "vulnerable" : true,
  91415. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124026:*:*:*:*:*:*",
  91416. "cpe_name" : [ ]
  91417. }, {
  91418. "vulnerable" : true,
  91419. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124014:*:*:*:*:*:*",
  91420. "cpe_name" : [ ]
  91421. }, {
  91422. "vulnerable" : true,
  91423. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124012:*:*:*:*:*:*",
  91424. "cpe_name" : [ ]
  91425. }, {
  91426. "vulnerable" : true,
  91427. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124067:*:*:*:*:*:*",
  91428. "cpe_name" : [ ]
  91429. }, {
  91430. "vulnerable" : true,
  91431. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124070:*:*:*:*:*:*",
  91432. "cpe_name" : [ ]
  91433. }, {
  91434. "vulnerable" : true,
  91435. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124074:*:*:*:*:*:*",
  91436. "cpe_name" : [ ]
  91437. }, {
  91438. "vulnerable" : true,
  91439. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124086:*:*:*:*:*:*",
  91440. "cpe_name" : [ ]
  91441. } ]
  91442. } ]
  91443. },
  91444. "impact" : {
  91445. "baseMetricV3" : {
  91446. "cvssV3" : {
  91447. "version" : "3.1",
  91448. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  91449. "attackVector" : "NETWORK",
  91450. "attackComplexity" : "LOW",
  91451. "privilegesRequired" : "NONE",
  91452. "userInteraction" : "NONE",
  91453. "scope" : "UNCHANGED",
  91454. "confidentialityImpact" : "HIGH",
  91455. "integrityImpact" : "HIGH",
  91456. "availabilityImpact" : "HIGH",
  91457. "baseScore" : 9.8,
  91458. "baseSeverity" : "CRITICAL"
  91459. },
  91460. "exploitabilityScore" : 3.9,
  91461. "impactScore" : 5.9
  91462. },
  91463. "baseMetricV2" : {
  91464. "cvssV2" : {
  91465. "version" : "2.0",
  91466. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  91467. "accessVector" : "NETWORK",
  91468. "accessComplexity" : "LOW",
  91469. "authentication" : "NONE",
  91470. "confidentialityImpact" : "PARTIAL",
  91471. "integrityImpact" : "PARTIAL",
  91472. "availabilityImpact" : "PARTIAL",
  91473. "baseScore" : 7.5
  91474. },
  91475. "severity" : "HIGH",
  91476. "exploitabilityScore" : 10.0,
  91477. "impactScore" : 6.4,
  91478. "acInsufInfo" : false,
  91479. "obtainAllPrivilege" : false,
  91480. "obtainUserPrivilege" : false,
  91481. "obtainOtherPrivilege" : false,
  91482. "userInteractionRequired" : false
  91483. }
  91484. },
  91485. "publishedDate" : "2019-10-15T21:15Z",
  91486. "lastModifiedDate" : "2021-05-04T14:34Z"
  91487. }, {
  91488. "cve" : {
  91489. "data_type" : "CVE",
  91490. "data_format" : "MITRE",
  91491. "data_version" : "4.0",
  91492. "CVE_data_meta" : {
  91493. "ID" : "CVE-2019-17195",
  91494. "ASSIGNER" : "cve@mitre.org"
  91495. },
  91496. "problemtype" : {
  91497. "problemtype_data" : [ {
  91498. "description" : [ {
  91499. "lang" : "en",
  91500. "value" : "CWE-754"
  91501. } ]
  91502. } ]
  91503. },
  91504. "references" : {
  91505. "reference_data" : [ {
  91506. "url" : "https://connect2id.com/blog/nimbus-jose-jwt-7-9",
  91507. "name" : "https://connect2id.com/blog/nimbus-jose-jwt-7-9",
  91508. "refsource" : "CONFIRM",
  91509. "tags" : [ "Release Notes", "Vendor Advisory" ]
  91510. }, {
  91511. "url" : "https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/SECURITY-CHANGELOG.txt",
  91512. "name" : "https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/SECURITY-CHANGELOG.txt",
  91513. "refsource" : "CONFIRM",
  91514. "tags" : [ "Release Notes", "Third Party Advisory" ]
  91515. }, {
  91516. "url" : "https://lists.apache.org/thread.html/8768553cda5838f59ee3865cac546e824fa740e82d9dc2a7fc44e80d@%3Ccommon-dev.hadoop.apache.org%3E",
  91517. "name" : "[hadoop-common-dev] 20191107 [jira] [Created] (HADOOP-16690) Update dependency com.nimbusds:nimbus-jose-jwt due to security vulnerability",
  91518. "refsource" : "MLIST",
  91519. "tags" : [ "Mailing List", "Third Party Advisory" ]
  91520. }, {
  91521. "url" : "https://lists.apache.org/thread.html/e10d43984f39327e443e875adcd4a5049193a7c010e81971908caf41@%3Ccommon-issues.hadoop.apache.org%3E",
  91522. "name" : "[hadoop-common-issues] 20191107 [jira] [Created] (HADOOP-16690) Update dependency com.nimbusds:nimbus-jose-jwt due to security vulnerability",
  91523. "refsource" : "MLIST",
  91524. "tags" : [ "Mailing List", "Third Party Advisory" ]
  91525. }, {
  91526. "url" : "https://www.oracle.com/security-alerts/cpuapr2020.html",
  91527. "name" : "N/A",
  91528. "refsource" : "N/A",
  91529. "tags" : [ "Patch", "Third Party Advisory" ]
  91530. }, {
  91531. "url" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  91532. "name" : "https://www.oracle.com/security-alerts/cpujan2021.html",
  91533. "refsource" : "MISC",
  91534. "tags" : [ "Patch", "Third Party Advisory" ]
  91535. }, {
  91536. "url" : "https://lists.apache.org/thread.html/rcac26c2d4df22341fa6ebbfe93ba1eff77d2dcd3f6106a1dc1f9ac98@%3Cdev.avro.apache.org%3E",
  91537. "name" : "[avro-dev] 20210415 [jira] [Created] (AVRO-3111) CVE-2019-17195",
  91538. "refsource" : "MLIST",
  91539. "tags" : [ "Mailing List", "Third Party Advisory" ]
  91540. }, {
  91541. "url" : "https://lists.apache.org/thread.html/r35f6301a3e6a56259224786dd9c2a935ba27ff6b494d15a3b66efe6a@%3Cdev.avro.apache.org%3E",
  91542. "name" : "[avro-dev] 20210416 [jira] [Commented] (AVRO-3111) CVE-2019-17195",
  91543. "refsource" : "MLIST",
  91544. "tags" : [ "Mailing List", "Third Party Advisory" ]
  91545. }, {
  91546. "url" : "https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E",
  91547. "name" : "[druid-commits] 20210506 [GitHub] [druid] jihoonson commented on a change in pull request #11215: Suppressing false positive CVE-2020-7791",
  91548. "refsource" : "MLIST",
  91549. "tags" : [ ]
  91550. }, {
  91551. "url" : "https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E",
  91552. "name" : "[druid-commits] 20210506 [GitHub] [druid] maytasm commented on a change in pull request #11215: Suppressing false positive CVE-2020-7791",
  91553. "refsource" : "MLIST",
  91554. "tags" : [ ]
  91555. }, {
  91556. "url" : "https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E",
  91557. "name" : "[druid-commits] 20210507 [druid] branch 0.21.1 updated: Suppressing false positive CVE-2020-7791 (#11215) (#11217)",
  91558. "refsource" : "MLIST",
  91559. "tags" : [ ]
  91560. } ]
  91561. },
  91562. "description" : {
  91563. "description_data" : [ {
  91564. "lang" : "en",
  91565. "value" : "Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass."
  91566. } ]
  91567. }
  91568. },
  91569. "configurations" : {
  91570. "CVE_data_version" : "4.0",
  91571. "nodes" : [ {
  91572. "operator" : "OR",
  91573. "children" : [ ],
  91574. "cpe_match" : [ {
  91575. "vulnerable" : true,
  91576. "cpe23Uri" : "cpe:2.3:a:connect2id:nimbus_jose\\+jwt:*:*:*:*:*:*:*:*",
  91577. "versionEndExcluding" : "7.9",
  91578. "cpe_name" : [ ]
  91579. } ]
  91580. }, {
  91581. "operator" : "OR",
  91582. "children" : [ ],
  91583. "cpe_match" : [ {
  91584. "vulnerable" : true,
  91585. "cpe23Uri" : "cpe:2.3:a:apache:avro:1.10.1:*:*:*:*:*:*:*",
  91586. "cpe_name" : [ ]
  91587. }, {
  91588. "vulnerable" : true,
  91589. "cpe23Uri" : "cpe:2.3:a:apache:avro:1.10.2:*:*:*:*:*:*:*",
  91590. "cpe_name" : [ ]
  91591. }, {
  91592. "vulnerable" : true,
  91593. "cpe23Uri" : "cpe:2.3:a:apache:hadoop:3.2.1:-:*:*:*:*:*:*",
  91594. "cpe_name" : [ ]
  91595. } ]
  91596. }, {
  91597. "operator" : "OR",
  91598. "children" : [ ],
  91599. "cpe_match" : [ {
  91600. "vulnerable" : true,
  91601. "cpe23Uri" : "cpe:2.3:a:oracle:primavera_gateway:19.12.0:*:*:*:*:*:*:*",
  91602. "cpe_name" : [ ]
  91603. }, {
  91604. "vulnerable" : true,
  91605. "cpe23Uri" : "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
  91606. "cpe_name" : [ ]
  91607. }, {
  91608. "vulnerable" : true,
  91609. "cpe23Uri" : "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
  91610. "cpe_name" : [ ]
  91611. } ]
  91612. } ]
  91613. },
  91614. "impact" : {
  91615. "baseMetricV3" : {
  91616. "cvssV3" : {
  91617. "version" : "3.1",
  91618. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  91619. "attackVector" : "NETWORK",
  91620. "attackComplexity" : "LOW",
  91621. "privilegesRequired" : "NONE",
  91622. "userInteraction" : "NONE",
  91623. "scope" : "UNCHANGED",
  91624. "confidentialityImpact" : "HIGH",
  91625. "integrityImpact" : "HIGH",
  91626. "availabilityImpact" : "HIGH",
  91627. "baseScore" : 9.8,
  91628. "baseSeverity" : "CRITICAL"
  91629. },
  91630. "exploitabilityScore" : 3.9,
  91631. "impactScore" : 5.9
  91632. },
  91633. "baseMetricV2" : {
  91634. "cvssV2" : {
  91635. "version" : "2.0",
  91636. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  91637. "accessVector" : "NETWORK",
  91638. "accessComplexity" : "MEDIUM",
  91639. "authentication" : "NONE",
  91640. "confidentialityImpact" : "PARTIAL",
  91641. "integrityImpact" : "PARTIAL",
  91642. "availabilityImpact" : "PARTIAL",
  91643. "baseScore" : 6.8
  91644. },
  91645. "severity" : "MEDIUM",
  91646. "exploitabilityScore" : 8.6,
  91647. "impactScore" : 6.4,
  91648. "acInsufInfo" : false,
  91649. "obtainAllPrivilege" : false,
  91650. "obtainUserPrivilege" : false,
  91651. "obtainOtherPrivilege" : false,
  91652. "userInteractionRequired" : false
  91653. }
  91654. },
  91655. "publishedDate" : "2019-10-15T14:15Z",
  91656. "lastModifiedDate" : "2021-05-07T11:15Z"
  91657. }, {
  91658. "cve" : {
  91659. "data_type" : "CVE",
  91660. "data_format" : "MITRE",
  91661. "data_version" : "4.0",
  91662. "CVE_data_meta" : {
  91663. "ID" : "CVE-2018-10531",
  91664. "ASSIGNER" : "cve@mitre.org"
  91665. },
  91666. "problemtype" : {
  91667. "problemtype_data" : [ {
  91668. "description" : [ {
  91669. "lang" : "en",
  91670. "value" : "CWE-20"
  91671. } ]
  91672. } ]
  91673. },
  91674. "references" : {
  91675. "reference_data" : [ {
  91676. "url" : "https://www.xlabs.com.br/blog/cve-2018-10531-americas-army-proving-grounds-ddos-amplification/",
  91677. "name" : "https://www.xlabs.com.br/blog/cve-2018-10531-americas-army-proving-grounds-ddos-amplification/",
  91678. "refsource" : "MISC",
  91679. "tags" : [ "Exploit", "Vendor Advisory" ]
  91680. }, {
  91681. "url" : "https://www.xlabs.com.br/blog/author/mauricio-correa/",
  91682. "name" : "https://www.xlabs.com.br/blog/author/mauricio-correa/",
  91683. "refsource" : "MISC",
  91684. "tags" : [ "Third Party Advisory" ]
  91685. } ]
  91686. },
  91687. "description" : {
  91688. "description_data" : [ {
  91689. "lang" : "en",
  91690. "value" : "An issue was discovered in the America's Army Proving Grounds platform for the Unreal Engine. With a false packet sent via UDP, the application server responds with several bytes, giving the possibility of DoS amplification, even being able to be used in DDoS attacks."
  91691. } ]
  91692. }
  91693. },
  91694. "configurations" : {
  91695. "CVE_data_version" : "4.0",
  91696. "nodes" : [ {
  91697. "operator" : "OR",
  91698. "children" : [ ],
  91699. "cpe_match" : [ {
  91700. "vulnerable" : true,
  91701. "cpe23Uri" : "cpe:2.3:a:americasarmy:proving_grounds:-:*:*:*:*:unreal_engine:*:*",
  91702. "cpe_name" : [ ]
  91703. } ]
  91704. } ]
  91705. },
  91706. "impact" : {
  91707. "baseMetricV3" : {
  91708. "cvssV3" : {
  91709. "version" : "3.1",
  91710. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  91711. "attackVector" : "NETWORK",
  91712. "attackComplexity" : "LOW",
  91713. "privilegesRequired" : "NONE",
  91714. "userInteraction" : "NONE",
  91715. "scope" : "UNCHANGED",
  91716. "confidentialityImpact" : "NONE",
  91717. "integrityImpact" : "NONE",
  91718. "availabilityImpact" : "HIGH",
  91719. "baseScore" : 7.5,
  91720. "baseSeverity" : "HIGH"
  91721. },
  91722. "exploitabilityScore" : 3.9,
  91723. "impactScore" : 3.6
  91724. },
  91725. "baseMetricV2" : {
  91726. "cvssV2" : {
  91727. "version" : "2.0",
  91728. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  91729. "accessVector" : "NETWORK",
  91730. "accessComplexity" : "LOW",
  91731. "authentication" : "NONE",
  91732. "confidentialityImpact" : "NONE",
  91733. "integrityImpact" : "NONE",
  91734. "availabilityImpact" : "PARTIAL",
  91735. "baseScore" : 5.0
  91736. },
  91737. "severity" : "MEDIUM",
  91738. "exploitabilityScore" : 10.0,
  91739. "impactScore" : 2.9,
  91740. "acInsufInfo" : false,
  91741. "obtainAllPrivilege" : false,
  91742. "obtainUserPrivilege" : false,
  91743. "obtainOtherPrivilege" : false,
  91744. "userInteractionRequired" : false
  91745. }
  91746. },
  91747. "publishedDate" : "2019-07-10T16:15Z",
  91748. "lastModifiedDate" : "2021-05-10T15:01Z"
  91749. }, {
  91750. "cve" : {
  91751. "data_type" : "CVE",
  91752. "data_format" : "MITRE",
  91753. "data_version" : "4.0",
  91754. "CVE_data_meta" : {
  91755. "ID" : "CVE-2019-10149",
  91756. "ASSIGNER" : "secalert@redhat.com"
  91757. },
  91758. "problemtype" : {
  91759. "problemtype_data" : [ {
  91760. "description" : [ {
  91761. "lang" : "en",
  91762. "value" : "CWE-20"
  91763. } ]
  91764. } ]
  91765. },
  91766. "references" : {
  91767. "reference_data" : [ {
  91768. "url" : "https://www.exim.org/static/doc/security/CVE-2019-10149.txt",
  91769. "name" : "https://www.exim.org/static/doc/security/CVE-2019-10149.txt",
  91770. "refsource" : "CONFIRM",
  91771. "tags" : [ "Vendor Advisory" ]
  91772. }, {
  91773. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149",
  91774. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149",
  91775. "refsource" : "CONFIRM",
  91776. "tags" : [ "Issue Tracking", "Third Party Advisory" ]
  91777. }, {
  91778. "url" : "https://usn.ubuntu.com/4010-1/",
  91779. "name" : "USN-4010-1",
  91780. "refsource" : "UBUNTU",
  91781. "tags" : [ ]
  91782. }, {
  91783. "url" : "http://www.openwall.com/lists/oss-security/2019/06/05/3",
  91784. "name" : "[oss-security] 20190605 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit",
  91785. "refsource" : "MLIST",
  91786. "tags" : [ ]
  91787. }, {
  91788. "url" : "http://www.openwall.com/lists/oss-security/2019/06/05/2",
  91789. "name" : "[oss-security] 20190605 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit",
  91790. "refsource" : "MLIST",
  91791. "tags" : [ ]
  91792. }, {
  91793. "url" : "http://www.openwall.com/lists/oss-security/2019/06/05/4",
  91794. "name" : "[oss-security] 20190605 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit",
  91795. "refsource" : "MLIST",
  91796. "tags" : [ ]
  91797. }, {
  91798. "url" : "https://www.debian.org/security/2019/dsa-4456",
  91799. "name" : "DSA-4456",
  91800. "refsource" : "DEBIAN",
  91801. "tags" : [ ]
  91802. }, {
  91803. "url" : "https://seclists.org/bugtraq/2019/Jun/5",
  91804. "name" : "20190605 [SECURITY] [DSA 4456-1] exim4 security update",
  91805. "refsource" : "BUGTRAQ",
  91806. "tags" : [ ]
  91807. }, {
  91808. "url" : "https://security.gentoo.org/glsa/201906-01",
  91809. "name" : "GLSA-201906-01",
  91810. "refsource" : "GENTOO",
  91811. "tags" : [ ]
  91812. }, {
  91813. "url" : "http://www.openwall.com/lists/oss-security/2019/06/06/1",
  91814. "name" : "[oss-security] 20190606 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit",
  91815. "refsource" : "MLIST",
  91816. "tags" : [ ]
  91817. }, {
  91818. "url" : "http://www.securityfocus.com/bid/108679",
  91819. "name" : "108679",
  91820. "refsource" : "BID",
  91821. "tags" : [ ]
  91822. }, {
  91823. "url" : "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00020.html",
  91824. "name" : "openSUSE-SU-2019:1524",
  91825. "refsource" : "SUSE",
  91826. "tags" : [ ]
  91827. }, {
  91828. "url" : "http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html",
  91829. "name" : "http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html",
  91830. "refsource" : "MISC",
  91831. "tags" : [ ]
  91832. }, {
  91833. "url" : "http://seclists.org/fulldisclosure/2019/Jun/16",
  91834. "name" : "20190611 The Return of the WIZard: RCE in Exim (CVE-2019-10149)",
  91835. "refsource" : "FULLDISC",
  91836. "tags" : [ ]
  91837. }, {
  91838. "url" : "http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html",
  91839. "name" : "http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html",
  91840. "refsource" : "MISC",
  91841. "tags" : [ ]
  91842. }, {
  91843. "url" : "http://www.openwall.com/lists/oss-security/2019/07/25/6",
  91844. "name" : "[oss-security] 20190725 Re: Statistics for distros lists updated for 2019Q2",
  91845. "refsource" : "MLIST",
  91846. "tags" : [ ]
  91847. }, {
  91848. "url" : "http://www.openwall.com/lists/oss-security/2019/07/25/7",
  91849. "name" : "[oss-security] 20190725 Re: Statistics for distros lists updated for 2019Q2",
  91850. "refsource" : "MLIST",
  91851. "tags" : [ ]
  91852. }, {
  91853. "url" : "http://www.openwall.com/lists/oss-security/2019/07/26/4",
  91854. "name" : "[oss-security] 20190726 Re: Statistics for distros lists updated for 2019Q2",
  91855. "refsource" : "MLIST",
  91856. "tags" : [ ]
  91857. }, {
  91858. "url" : "http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html",
  91859. "name" : "http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html",
  91860. "refsource" : "MISC",
  91861. "tags" : [ ]
  91862. }, {
  91863. "url" : "http://www.openwall.com/lists/oss-security/2021/05/04/7",
  91864. "name" : "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
  91865. "refsource" : "MLIST",
  91866. "tags" : [ ]
  91867. } ]
  91868. },
  91869. "description" : {
  91870. "description_data" : [ {
  91871. "lang" : "en",
  91872. "value" : "A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution."
  91873. } ]
  91874. }
  91875. },
  91876. "configurations" : {
  91877. "CVE_data_version" : "4.0",
  91878. "nodes" : [ {
  91879. "operator" : "OR",
  91880. "children" : [ ],
  91881. "cpe_match" : [ {
  91882. "vulnerable" : true,
  91883. "cpe23Uri" : "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*",
  91884. "versionStartIncluding" : "4.87",
  91885. "versionEndIncluding" : "4.91",
  91886. "cpe_name" : [ ]
  91887. } ]
  91888. } ]
  91889. },
  91890. "impact" : {
  91891. "baseMetricV3" : {
  91892. "cvssV3" : {
  91893. "version" : "3.0",
  91894. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  91895. "attackVector" : "NETWORK",
  91896. "attackComplexity" : "LOW",
  91897. "privilegesRequired" : "NONE",
  91898. "userInteraction" : "NONE",
  91899. "scope" : "UNCHANGED",
  91900. "confidentialityImpact" : "HIGH",
  91901. "integrityImpact" : "HIGH",
  91902. "availabilityImpact" : "HIGH",
  91903. "baseScore" : 9.8,
  91904. "baseSeverity" : "CRITICAL"
  91905. },
  91906. "exploitabilityScore" : 3.9,
  91907. "impactScore" : 5.9
  91908. },
  91909. "baseMetricV2" : {
  91910. "cvssV2" : {
  91911. "version" : "2.0",
  91912. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  91913. "accessVector" : "NETWORK",
  91914. "accessComplexity" : "LOW",
  91915. "authentication" : "NONE",
  91916. "confidentialityImpact" : "PARTIAL",
  91917. "integrityImpact" : "PARTIAL",
  91918. "availabilityImpact" : "PARTIAL",
  91919. "baseScore" : 7.5
  91920. },
  91921. "severity" : "HIGH",
  91922. "exploitabilityScore" : 10.0,
  91923. "impactScore" : 6.4,
  91924. "acInsufInfo" : false,
  91925. "obtainAllPrivilege" : false,
  91926. "obtainUserPrivilege" : false,
  91927. "obtainOtherPrivilege" : false,
  91928. "userInteractionRequired" : false
  91929. }
  91930. },
  91931. "publishedDate" : "2019-06-05T14:29Z",
  91932. "lastModifiedDate" : "2021-05-04T18:15Z"
  91933. }, {
  91934. "cve" : {
  91935. "data_type" : "CVE",
  91936. "data_format" : "MITRE",
  91937. "data_version" : "4.0",
  91938. "CVE_data_meta" : {
  91939. "ID" : "CVE-2019-3810",
  91940. "ASSIGNER" : "secalert@redhat.com"
  91941. },
  91942. "problemtype" : {
  91943. "problemtype_data" : [ {
  91944. "description" : [ {
  91945. "lang" : "en",
  91946. "value" : "CWE-20"
  91947. } ]
  91948. } ]
  91949. },
  91950. "references" : {
  91951. "reference_data" : [ {
  91952. "url" : "https://moodle.org/mod/forum/discuss.php?d=381230#p1536767",
  91953. "name" : "https://moodle.org/mod/forum/discuss.php?d=381230#p1536767",
  91954. "refsource" : "CONFIRM",
  91955. "tags" : [ "Patch", "Vendor Advisory" ]
  91956. }, {
  91957. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3810",
  91958. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3810",
  91959. "refsource" : "CONFIRM",
  91960. "tags" : [ "Issue Tracking", "Patch", "Third Party Advisory" ]
  91961. }, {
  91962. "url" : "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-64372",
  91963. "name" : "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-64372",
  91964. "refsource" : "CONFIRM",
  91965. "tags" : [ "Patch", "Vendor Advisory" ]
  91966. }, {
  91967. "url" : "http://packetstormsecurity.com/files/162399/Moodle-3.6.1-Cross-Site-Scripting.html",
  91968. "name" : "http://packetstormsecurity.com/files/162399/Moodle-3.6.1-Cross-Site-Scripting.html",
  91969. "refsource" : "MISC",
  91970. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  91971. } ]
  91972. },
  91973. "description" : {
  91974. "description_data" : [ {
  91975. "lang" : "en",
  91976. "value" : "A flaw was found in moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The /userpix/ page did not escape users' full names, which are included as text when hovering over profile images. Note this page is not linked to by default and its access is restricted."
  91977. } ]
  91978. }
  91979. },
  91980. "configurations" : {
  91981. "CVE_data_version" : "4.0",
  91982. "nodes" : [ {
  91983. "operator" : "OR",
  91984. "children" : [ ],
  91985. "cpe_match" : [ {
  91986. "vulnerable" : true,
  91987. "cpe23Uri" : "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
  91988. "versionStartIncluding" : "3.1.0",
  91989. "versionEndIncluding" : "3.1.15",
  91990. "cpe_name" : [ ]
  91991. }, {
  91992. "vulnerable" : true,
  91993. "cpe23Uri" : "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
  91994. "versionStartIncluding" : "3.4.0",
  91995. "versionEndIncluding" : "3.4.6",
  91996. "cpe_name" : [ ]
  91997. }, {
  91998. "vulnerable" : true,
  91999. "cpe23Uri" : "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
  92000. "versionStartIncluding" : "3.5.0",
  92001. "versionEndIncluding" : "3.5.3",
  92002. "cpe_name" : [ ]
  92003. }, {
  92004. "vulnerable" : true,
  92005. "cpe23Uri" : "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
  92006. "versionStartIncluding" : "3.6.0",
  92007. "versionEndIncluding" : "3.6.1",
  92008. "cpe_name" : [ ]
  92009. } ]
  92010. } ]
  92011. },
  92012. "impact" : {
  92013. "baseMetricV3" : {
  92014. "cvssV3" : {
  92015. "version" : "3.1",
  92016. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  92017. "attackVector" : "NETWORK",
  92018. "attackComplexity" : "LOW",
  92019. "privilegesRequired" : "NONE",
  92020. "userInteraction" : "NONE",
  92021. "scope" : "UNCHANGED",
  92022. "confidentialityImpact" : "LOW",
  92023. "integrityImpact" : "NONE",
  92024. "availabilityImpact" : "NONE",
  92025. "baseScore" : 5.3,
  92026. "baseSeverity" : "MEDIUM"
  92027. },
  92028. "exploitabilityScore" : 3.9,
  92029. "impactScore" : 1.4
  92030. },
  92031. "baseMetricV2" : {
  92032. "cvssV2" : {
  92033. "version" : "2.0",
  92034. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  92035. "accessVector" : "NETWORK",
  92036. "accessComplexity" : "LOW",
  92037. "authentication" : "NONE",
  92038. "confidentialityImpact" : "PARTIAL",
  92039. "integrityImpact" : "NONE",
  92040. "availabilityImpact" : "NONE",
  92041. "baseScore" : 5.0
  92042. },
  92043. "severity" : "MEDIUM",
  92044. "exploitabilityScore" : 10.0,
  92045. "impactScore" : 2.9,
  92046. "acInsufInfo" : false,
  92047. "obtainAllPrivilege" : false,
  92048. "obtainUserPrivilege" : false,
  92049. "obtainOtherPrivilege" : false,
  92050. "userInteractionRequired" : false
  92051. }
  92052. },
  92053. "publishedDate" : "2019-03-25T18:29Z",
  92054. "lastModifiedDate" : "2021-05-05T14:47Z"
  92055. }, {
  92056. "cve" : {
  92057. "data_type" : "CVE",
  92058. "data_format" : "MITRE",
  92059. "data_version" : "4.0",
  92060. "CVE_data_meta" : {
  92061. "ID" : "CVE-2018-20339",
  92062. "ASSIGNER" : "cve@mitre.org"
  92063. },
  92064. "problemtype" : {
  92065. "problemtype_data" : [ {
  92066. "description" : [ {
  92067. "lang" : "en",
  92068. "value" : "CWE-79"
  92069. } ]
  92070. } ]
  92071. },
  92072. "references" : {
  92073. "reference_data" : [ {
  92074. "url" : "https://www.manageengine.com/network-monitoring/help/read-me.html",
  92075. "name" : "https://www.manageengine.com/network-monitoring/help/read-me.html",
  92076. "refsource" : "MISC",
  92077. "tags" : [ "Release Notes", "Vendor Advisory" ]
  92078. }, {
  92079. "url" : "http://www.securityfocus.com/bid/106302",
  92080. "name" : "106302",
  92081. "refsource" : "BID",
  92082. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  92083. } ]
  92084. },
  92085. "description" : {
  92086. "description_data" : [ {
  92087. "lang" : "en",
  92088. "value" : "Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section."
  92089. } ]
  92090. }
  92091. },
  92092. "configurations" : {
  92093. "CVE_data_version" : "4.0",
  92094. "nodes" : [ {
  92095. "operator" : "OR",
  92096. "children" : [ ],
  92097. "cpe_match" : [ {
  92098. "vulnerable" : true,
  92099. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123237:*:*:*:*:*:*",
  92100. "cpe_name" : [ ]
  92101. }, {
  92102. "vulnerable" : true,
  92103. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123230:*:*:*:*:*:*",
  92104. "cpe_name" : [ ]
  92105. }, {
  92106. "vulnerable" : true,
  92107. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
  92108. "cpe_name" : [ ]
  92109. }, {
  92110. "vulnerable" : true,
  92111. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
  92112. "cpe_name" : [ ]
  92113. }, {
  92114. "vulnerable" : true,
  92115. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
  92116. "cpe_name" : [ ]
  92117. }, {
  92118. "vulnerable" : true,
  92119. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
  92120. "cpe_name" : [ ]
  92121. }, {
  92122. "vulnerable" : true,
  92123. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
  92124. "cpe_name" : [ ]
  92125. }, {
  92126. "vulnerable" : true,
  92127. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
  92128. "cpe_name" : [ ]
  92129. }, {
  92130. "vulnerable" : true,
  92131. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
  92132. "cpe_name" : [ ]
  92133. }, {
  92134. "vulnerable" : true,
  92135. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
  92136. "cpe_name" : [ ]
  92137. }, {
  92138. "vulnerable" : true,
  92139. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
  92140. "cpe_name" : [ ]
  92141. }, {
  92142. "vulnerable" : true,
  92143. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
  92144. "cpe_name" : [ ]
  92145. }, {
  92146. "vulnerable" : true,
  92147. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
  92148. "cpe_name" : [ ]
  92149. }, {
  92150. "vulnerable" : true,
  92151. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
  92152. "cpe_name" : [ ]
  92153. }, {
  92154. "vulnerable" : true,
  92155. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
  92156. "cpe_name" : [ ]
  92157. }, {
  92158. "vulnerable" : true,
  92159. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
  92160. "cpe_name" : [ ]
  92161. }, {
  92162. "vulnerable" : true,
  92163. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
  92164. "cpe_name" : [ ]
  92165. }, {
  92166. "vulnerable" : true,
  92167. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
  92168. "cpe_name" : [ ]
  92169. }, {
  92170. "vulnerable" : true,
  92171. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
  92172. "cpe_name" : [ ]
  92173. }, {
  92174. "vulnerable" : true,
  92175. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
  92176. "cpe_name" : [ ]
  92177. }, {
  92178. "vulnerable" : true,
  92179. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
  92180. "cpe_name" : [ ]
  92181. }, {
  92182. "vulnerable" : true,
  92183. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
  92184. "cpe_name" : [ ]
  92185. }, {
  92186. "vulnerable" : true,
  92187. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
  92188. "cpe_name" : [ ]
  92189. }, {
  92190. "vulnerable" : true,
  92191. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
  92192. "cpe_name" : [ ]
  92193. }, {
  92194. "vulnerable" : true,
  92195. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
  92196. "cpe_name" : [ ]
  92197. }, {
  92198. "vulnerable" : true,
  92199. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
  92200. "cpe_name" : [ ]
  92201. }, {
  92202. "vulnerable" : true,
  92203. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
  92204. "cpe_name" : [ ]
  92205. }, {
  92206. "vulnerable" : true,
  92207. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
  92208. "cpe_name" : [ ]
  92209. }, {
  92210. "vulnerable" : true,
  92211. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
  92212. "cpe_name" : [ ]
  92213. }, {
  92214. "vulnerable" : true,
  92215. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
  92216. "cpe_name" : [ ]
  92217. }, {
  92218. "vulnerable" : true,
  92219. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
  92220. "cpe_name" : [ ]
  92221. }, {
  92222. "vulnerable" : true,
  92223. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
  92224. "cpe_name" : [ ]
  92225. }, {
  92226. "vulnerable" : true,
  92227. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
  92228. "cpe_name" : [ ]
  92229. }, {
  92230. "vulnerable" : true,
  92231. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
  92232. "cpe_name" : [ ]
  92233. }, {
  92234. "vulnerable" : true,
  92235. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
  92236. "cpe_name" : [ ]
  92237. }, {
  92238. "vulnerable" : true,
  92239. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
  92240. "cpe_name" : [ ]
  92241. }, {
  92242. "vulnerable" : true,
  92243. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
  92244. "cpe_name" : [ ]
  92245. }, {
  92246. "vulnerable" : true,
  92247. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
  92248. "cpe_name" : [ ]
  92249. }, {
  92250. "vulnerable" : true,
  92251. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
  92252. "cpe_name" : [ ]
  92253. }, {
  92254. "vulnerable" : true,
  92255. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
  92256. "cpe_name" : [ ]
  92257. }, {
  92258. "vulnerable" : true,
  92259. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
  92260. "cpe_name" : [ ]
  92261. }, {
  92262. "vulnerable" : true,
  92263. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
  92264. "cpe_name" : [ ]
  92265. }, {
  92266. "vulnerable" : true,
  92267. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
  92268. "cpe_name" : [ ]
  92269. }, {
  92270. "vulnerable" : true,
  92271. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
  92272. "cpe_name" : [ ]
  92273. }, {
  92274. "vulnerable" : true,
  92275. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
  92276. "cpe_name" : [ ]
  92277. }, {
  92278. "vulnerable" : true,
  92279. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
  92280. "cpe_name" : [ ]
  92281. }, {
  92282. "vulnerable" : true,
  92283. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
  92284. "cpe_name" : [ ]
  92285. }, {
  92286. "vulnerable" : true,
  92287. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
  92288. "cpe_name" : [ ]
  92289. }, {
  92290. "vulnerable" : true,
  92291. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
  92292. "cpe_name" : [ ]
  92293. }, {
  92294. "vulnerable" : true,
  92295. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
  92296. "cpe_name" : [ ]
  92297. }, {
  92298. "vulnerable" : true,
  92299. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
  92300. "cpe_name" : [ ]
  92301. }, {
  92302. "vulnerable" : true,
  92303. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
  92304. "cpe_name" : [ ]
  92305. }, {
  92306. "vulnerable" : true,
  92307. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
  92308. "cpe_name" : [ ]
  92309. }, {
  92310. "vulnerable" : true,
  92311. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
  92312. "cpe_name" : [ ]
  92313. }, {
  92314. "vulnerable" : true,
  92315. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
  92316. "cpe_name" : [ ]
  92317. }, {
  92318. "vulnerable" : true,
  92319. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
  92320. "cpe_name" : [ ]
  92321. }, {
  92322. "vulnerable" : true,
  92323. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
  92324. "cpe_name" : [ ]
  92325. }, {
  92326. "vulnerable" : true,
  92327. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
  92328. "cpe_name" : [ ]
  92329. }, {
  92330. "vulnerable" : true,
  92331. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
  92332. "cpe_name" : [ ]
  92333. }, {
  92334. "vulnerable" : true,
  92335. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
  92336. "cpe_name" : [ ]
  92337. }, {
  92338. "vulnerable" : true,
  92339. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
  92340. "cpe_name" : [ ]
  92341. }, {
  92342. "vulnerable" : true,
  92343. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
  92344. "cpe_name" : [ ]
  92345. }, {
  92346. "vulnerable" : true,
  92347. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
  92348. "cpe_name" : [ ]
  92349. }, {
  92350. "vulnerable" : true,
  92351. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
  92352. "cpe_name" : [ ]
  92353. }, {
  92354. "vulnerable" : true,
  92355. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
  92356. "cpe_name" : [ ]
  92357. }, {
  92358. "vulnerable" : true,
  92359. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
  92360. "cpe_name" : [ ]
  92361. }, {
  92362. "vulnerable" : true,
  92363. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
  92364. "cpe_name" : [ ]
  92365. }, {
  92366. "vulnerable" : true,
  92367. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
  92368. "cpe_name" : [ ]
  92369. }, {
  92370. "vulnerable" : true,
  92371. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
  92372. "cpe_name" : [ ]
  92373. }, {
  92374. "vulnerable" : true,
  92375. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
  92376. "cpe_name" : [ ]
  92377. }, {
  92378. "vulnerable" : true,
  92379. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
  92380. "cpe_name" : [ ]
  92381. }, {
  92382. "vulnerable" : true,
  92383. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
  92384. "cpe_name" : [ ]
  92385. }, {
  92386. "vulnerable" : true,
  92387. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
  92388. "cpe_name" : [ ]
  92389. }, {
  92390. "vulnerable" : true,
  92391. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
  92392. "cpe_name" : [ ]
  92393. }, {
  92394. "vulnerable" : true,
  92395. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123229:*:*:*:*:*:*",
  92396. "cpe_name" : [ ]
  92397. }, {
  92398. "vulnerable" : true,
  92399. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123223:*:*:*:*:*:*",
  92400. "cpe_name" : [ ]
  92401. }, {
  92402. "vulnerable" : true,
  92403. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123224:*:*:*:*:*:*",
  92404. "cpe_name" : [ ]
  92405. }, {
  92406. "vulnerable" : true,
  92407. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123222:*:*:*:*:*:*",
  92408. "cpe_name" : [ ]
  92409. }, {
  92410. "vulnerable" : true,
  92411. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
  92412. "cpe_name" : [ ]
  92413. }, {
  92414. "vulnerable" : true,
  92415. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
  92416. "cpe_name" : [ ]
  92417. }, {
  92418. "vulnerable" : true,
  92419. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
  92420. "cpe_name" : [ ]
  92421. }, {
  92422. "vulnerable" : true,
  92423. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
  92424. "cpe_name" : [ ]
  92425. }, {
  92426. "vulnerable" : true,
  92427. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
  92428. "cpe_name" : [ ]
  92429. }, {
  92430. "vulnerable" : true,
  92431. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
  92432. "cpe_name" : [ ]
  92433. }, {
  92434. "vulnerable" : true,
  92435. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
  92436. "cpe_name" : [ ]
  92437. }, {
  92438. "vulnerable" : true,
  92439. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
  92440. "cpe_name" : [ ]
  92441. }, {
  92442. "vulnerable" : true,
  92443. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
  92444. "cpe_name" : [ ]
  92445. }, {
  92446. "vulnerable" : true,
  92447. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
  92448. "cpe_name" : [ ]
  92449. }, {
  92450. "vulnerable" : true,
  92451. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
  92452. "cpe_name" : [ ]
  92453. }, {
  92454. "vulnerable" : true,
  92455. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
  92456. "cpe_name" : [ ]
  92457. }, {
  92458. "vulnerable" : true,
  92459. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
  92460. "cpe_name" : [ ]
  92461. }, {
  92462. "vulnerable" : true,
  92463. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
  92464. "cpe_name" : [ ]
  92465. }, {
  92466. "vulnerable" : true,
  92467. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
  92468. "cpe_name" : [ ]
  92469. }, {
  92470. "vulnerable" : true,
  92471. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
  92472. "cpe_name" : [ ]
  92473. }, {
  92474. "vulnerable" : true,
  92475. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
  92476. "cpe_name" : [ ]
  92477. }, {
  92478. "vulnerable" : true,
  92479. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
  92480. "cpe_name" : [ ]
  92481. }, {
  92482. "vulnerable" : true,
  92483. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
  92484. "cpe_name" : [ ]
  92485. }, {
  92486. "vulnerable" : true,
  92487. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
  92488. "cpe_name" : [ ]
  92489. }, {
  92490. "vulnerable" : true,
  92491. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
  92492. "cpe_name" : [ ]
  92493. }, {
  92494. "vulnerable" : true,
  92495. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
  92496. "cpe_name" : [ ]
  92497. }, {
  92498. "vulnerable" : true,
  92499. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
  92500. "cpe_name" : [ ]
  92501. }, {
  92502. "vulnerable" : true,
  92503. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
  92504. "cpe_name" : [ ]
  92505. }, {
  92506. "vulnerable" : true,
  92507. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
  92508. "cpe_name" : [ ]
  92509. }, {
  92510. "vulnerable" : true,
  92511. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
  92512. "cpe_name" : [ ]
  92513. }, {
  92514. "vulnerable" : true,
  92515. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
  92516. "cpe_name" : [ ]
  92517. }, {
  92518. "vulnerable" : true,
  92519. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
  92520. "cpe_name" : [ ]
  92521. }, {
  92522. "vulnerable" : true,
  92523. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
  92524. "cpe_name" : [ ]
  92525. }, {
  92526. "vulnerable" : true,
  92527. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
  92528. "cpe_name" : [ ]
  92529. }, {
  92530. "vulnerable" : true,
  92531. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
  92532. "cpe_name" : [ ]
  92533. }, {
  92534. "vulnerable" : true,
  92535. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
  92536. "cpe_name" : [ ]
  92537. }, {
  92538. "vulnerable" : true,
  92539. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
  92540. "cpe_name" : [ ]
  92541. }, {
  92542. "vulnerable" : true,
  92543. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
  92544. "cpe_name" : [ ]
  92545. }, {
  92546. "vulnerable" : true,
  92547. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
  92548. "cpe_name" : [ ]
  92549. }, {
  92550. "vulnerable" : true,
  92551. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123238:*:*:*:*:*:*",
  92552. "cpe_name" : [ ]
  92553. }, {
  92554. "vulnerable" : true,
  92555. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123231:*:*:*:*:*:*",
  92556. "cpe_name" : [ ]
  92557. }, {
  92558. "vulnerable" : true,
  92559. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
  92560. "cpe_name" : [ ]
  92561. }, {
  92562. "vulnerable" : true,
  92563. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
  92564. "cpe_name" : [ ]
  92565. }, {
  92566. "vulnerable" : true,
  92567. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
  92568. "cpe_name" : [ ]
  92569. }, {
  92570. "vulnerable" : true,
  92571. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
  92572. "cpe_name" : [ ]
  92573. }, {
  92574. "vulnerable" : true,
  92575. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
  92576. "cpe_name" : [ ]
  92577. }, {
  92578. "vulnerable" : true,
  92579. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
  92580. "cpe_name" : [ ]
  92581. }, {
  92582. "vulnerable" : true,
  92583. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
  92584. "cpe_name" : [ ]
  92585. }, {
  92586. "vulnerable" : true,
  92587. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
  92588. "cpe_name" : [ ]
  92589. }, {
  92590. "vulnerable" : true,
  92591. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
  92592. "cpe_name" : [ ]
  92593. }, {
  92594. "vulnerable" : true,
  92595. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
  92596. "cpe_name" : [ ]
  92597. }, {
  92598. "vulnerable" : true,
  92599. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
  92600. "cpe_name" : [ ]
  92601. }, {
  92602. "vulnerable" : true,
  92603. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
  92604. "cpe_name" : [ ]
  92605. }, {
  92606. "vulnerable" : true,
  92607. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
  92608. "cpe_name" : [ ]
  92609. }, {
  92610. "vulnerable" : true,
  92611. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
  92612. "cpe_name" : [ ]
  92613. }, {
  92614. "vulnerable" : true,
  92615. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
  92616. "cpe_name" : [ ]
  92617. }, {
  92618. "vulnerable" : true,
  92619. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
  92620. "cpe_name" : [ ]
  92621. }, {
  92622. "vulnerable" : true,
  92623. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
  92624. "cpe_name" : [ ]
  92625. }, {
  92626. "vulnerable" : true,
  92627. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
  92628. "cpe_name" : [ ]
  92629. }, {
  92630. "vulnerable" : true,
  92631. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
  92632. "cpe_name" : [ ]
  92633. }, {
  92634. "vulnerable" : true,
  92635. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
  92636. "cpe_name" : [ ]
  92637. }, {
  92638. "vulnerable" : true,
  92639. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
  92640. "cpe_name" : [ ]
  92641. }, {
  92642. "vulnerable" : true,
  92643. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
  92644. "cpe_name" : [ ]
  92645. }, {
  92646. "vulnerable" : true,
  92647. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
  92648. "cpe_name" : [ ]
  92649. }, {
  92650. "vulnerable" : true,
  92651. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
  92652. "cpe_name" : [ ]
  92653. }, {
  92654. "vulnerable" : true,
  92655. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
  92656. "cpe_name" : [ ]
  92657. }, {
  92658. "vulnerable" : true,
  92659. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
  92660. "cpe_name" : [ ]
  92661. }, {
  92662. "vulnerable" : true,
  92663. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
  92664. "cpe_name" : [ ]
  92665. }, {
  92666. "vulnerable" : true,
  92667. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
  92668. "cpe_name" : [ ]
  92669. }, {
  92670. "vulnerable" : true,
  92671. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
  92672. "cpe_name" : [ ]
  92673. }, {
  92674. "vulnerable" : true,
  92675. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
  92676. "cpe_name" : [ ]
  92677. }, {
  92678. "vulnerable" : true,
  92679. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
  92680. "cpe_name" : [ ]
  92681. }, {
  92682. "vulnerable" : true,
  92683. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
  92684. "cpe_name" : [ ]
  92685. }, {
  92686. "vulnerable" : true,
  92687. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
  92688. "cpe_name" : [ ]
  92689. }, {
  92690. "vulnerable" : true,
  92691. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
  92692. "cpe_name" : [ ]
  92693. }, {
  92694. "vulnerable" : true,
  92695. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
  92696. "cpe_name" : [ ]
  92697. }, {
  92698. "vulnerable" : true,
  92699. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
  92700. "cpe_name" : [ ]
  92701. }, {
  92702. "vulnerable" : true,
  92703. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
  92704. "cpe_name" : [ ]
  92705. } ]
  92706. } ]
  92707. },
  92708. "impact" : {
  92709. "baseMetricV3" : {
  92710. "cvssV3" : {
  92711. "version" : "3.0",
  92712. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  92713. "attackVector" : "NETWORK",
  92714. "attackComplexity" : "LOW",
  92715. "privilegesRequired" : "NONE",
  92716. "userInteraction" : "REQUIRED",
  92717. "scope" : "CHANGED",
  92718. "confidentialityImpact" : "LOW",
  92719. "integrityImpact" : "LOW",
  92720. "availabilityImpact" : "NONE",
  92721. "baseScore" : 6.1,
  92722. "baseSeverity" : "MEDIUM"
  92723. },
  92724. "exploitabilityScore" : 2.8,
  92725. "impactScore" : 2.7
  92726. },
  92727. "baseMetricV2" : {
  92728. "cvssV2" : {
  92729. "version" : "2.0",
  92730. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  92731. "accessVector" : "NETWORK",
  92732. "accessComplexity" : "MEDIUM",
  92733. "authentication" : "NONE",
  92734. "confidentialityImpact" : "NONE",
  92735. "integrityImpact" : "PARTIAL",
  92736. "availabilityImpact" : "NONE",
  92737. "baseScore" : 4.3
  92738. },
  92739. "severity" : "MEDIUM",
  92740. "exploitabilityScore" : 8.6,
  92741. "impactScore" : 2.9,
  92742. "acInsufInfo" : false,
  92743. "obtainAllPrivilege" : false,
  92744. "obtainUserPrivilege" : false,
  92745. "obtainOtherPrivilege" : false,
  92746. "userInteractionRequired" : true
  92747. }
  92748. },
  92749. "publishedDate" : "2018-12-21T09:29Z",
  92750. "lastModifiedDate" : "2021-05-04T15:07Z"
  92751. }, {
  92752. "cve" : {
  92753. "data_type" : "CVE",
  92754. "data_format" : "MITRE",
  92755. "data_version" : "4.0",
  92756. "CVE_data_meta" : {
  92757. "ID" : "CVE-2018-20338",
  92758. "ASSIGNER" : "cve@mitre.org"
  92759. },
  92760. "problemtype" : {
  92761. "problemtype_data" : [ {
  92762. "description" : [ {
  92763. "lang" : "en",
  92764. "value" : "CWE-89"
  92765. } ]
  92766. } ]
  92767. },
  92768. "references" : {
  92769. "reference_data" : [ {
  92770. "url" : "https://www.manageengine.com/network-monitoring/help/read-me.html",
  92771. "name" : "https://www.manageengine.com/network-monitoring/help/read-me.html",
  92772. "refsource" : "MISC",
  92773. "tags" : [ "Release Notes", "Vendor Advisory" ]
  92774. }, {
  92775. "url" : "http://www.securityfocus.com/bid/106302",
  92776. "name" : "106302",
  92777. "refsource" : "BID",
  92778. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  92779. } ]
  92780. },
  92781. "description" : {
  92782. "description_data" : [ {
  92783. "lang" : "en",
  92784. "value" : "Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section."
  92785. } ]
  92786. }
  92787. },
  92788. "configurations" : {
  92789. "CVE_data_version" : "4.0",
  92790. "nodes" : [ {
  92791. "operator" : "OR",
  92792. "children" : [ ],
  92793. "cpe_match" : [ {
  92794. "vulnerable" : true,
  92795. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
  92796. "cpe_name" : [ ]
  92797. }, {
  92798. "vulnerable" : true,
  92799. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
  92800. "cpe_name" : [ ]
  92801. }, {
  92802. "vulnerable" : true,
  92803. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
  92804. "cpe_name" : [ ]
  92805. }, {
  92806. "vulnerable" : true,
  92807. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
  92808. "cpe_name" : [ ]
  92809. }, {
  92810. "vulnerable" : true,
  92811. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
  92812. "cpe_name" : [ ]
  92813. }, {
  92814. "vulnerable" : true,
  92815. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
  92816. "cpe_name" : [ ]
  92817. }, {
  92818. "vulnerable" : true,
  92819. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
  92820. "cpe_name" : [ ]
  92821. }, {
  92822. "vulnerable" : true,
  92823. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
  92824. "cpe_name" : [ ]
  92825. }, {
  92826. "vulnerable" : true,
  92827. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
  92828. "cpe_name" : [ ]
  92829. }, {
  92830. "vulnerable" : true,
  92831. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
  92832. "cpe_name" : [ ]
  92833. }, {
  92834. "vulnerable" : true,
  92835. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
  92836. "cpe_name" : [ ]
  92837. }, {
  92838. "vulnerable" : true,
  92839. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
  92840. "cpe_name" : [ ]
  92841. }, {
  92842. "vulnerable" : true,
  92843. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
  92844. "cpe_name" : [ ]
  92845. }, {
  92846. "vulnerable" : true,
  92847. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
  92848. "cpe_name" : [ ]
  92849. }, {
  92850. "vulnerable" : true,
  92851. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
  92852. "cpe_name" : [ ]
  92853. }, {
  92854. "vulnerable" : true,
  92855. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
  92856. "cpe_name" : [ ]
  92857. }, {
  92858. "vulnerable" : true,
  92859. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
  92860. "cpe_name" : [ ]
  92861. }, {
  92862. "vulnerable" : true,
  92863. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
  92864. "cpe_name" : [ ]
  92865. }, {
  92866. "vulnerable" : true,
  92867. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
  92868. "cpe_name" : [ ]
  92869. }, {
  92870. "vulnerable" : true,
  92871. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
  92872. "cpe_name" : [ ]
  92873. }, {
  92874. "vulnerable" : true,
  92875. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
  92876. "cpe_name" : [ ]
  92877. }, {
  92878. "vulnerable" : true,
  92879. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
  92880. "cpe_name" : [ ]
  92881. }, {
  92882. "vulnerable" : true,
  92883. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
  92884. "cpe_name" : [ ]
  92885. }, {
  92886. "vulnerable" : true,
  92887. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
  92888. "cpe_name" : [ ]
  92889. }, {
  92890. "vulnerable" : true,
  92891. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
  92892. "cpe_name" : [ ]
  92893. }, {
  92894. "vulnerable" : true,
  92895. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
  92896. "cpe_name" : [ ]
  92897. }, {
  92898. "vulnerable" : true,
  92899. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
  92900. "cpe_name" : [ ]
  92901. }, {
  92902. "vulnerable" : true,
  92903. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
  92904. "cpe_name" : [ ]
  92905. }, {
  92906. "vulnerable" : true,
  92907. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
  92908. "cpe_name" : [ ]
  92909. }, {
  92910. "vulnerable" : true,
  92911. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
  92912. "cpe_name" : [ ]
  92913. }, {
  92914. "vulnerable" : true,
  92915. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123222:*:*:*:*:*:*",
  92916. "cpe_name" : [ ]
  92917. }, {
  92918. "vulnerable" : true,
  92919. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123223:*:*:*:*:*:*",
  92920. "cpe_name" : [ ]
  92921. }, {
  92922. "vulnerable" : true,
  92923. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123224:*:*:*:*:*:*",
  92924. "cpe_name" : [ ]
  92925. }, {
  92926. "vulnerable" : true,
  92927. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
  92928. "cpe_name" : [ ]
  92929. }, {
  92930. "vulnerable" : true,
  92931. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
  92932. "cpe_name" : [ ]
  92933. }, {
  92934. "vulnerable" : true,
  92935. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
  92936. "cpe_name" : [ ]
  92937. }, {
  92938. "vulnerable" : true,
  92939. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
  92940. "cpe_name" : [ ]
  92941. }, {
  92942. "vulnerable" : true,
  92943. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123238:*:*:*:*:*:*",
  92944. "cpe_name" : [ ]
  92945. }, {
  92946. "vulnerable" : true,
  92947. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
  92948. "cpe_name" : [ ]
  92949. }, {
  92950. "vulnerable" : true,
  92951. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
  92952. "cpe_name" : [ ]
  92953. }, {
  92954. "vulnerable" : true,
  92955. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
  92956. "cpe_name" : [ ]
  92957. }, {
  92958. "vulnerable" : true,
  92959. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
  92960. "cpe_name" : [ ]
  92961. }, {
  92962. "vulnerable" : true,
  92963. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
  92964. "cpe_name" : [ ]
  92965. }, {
  92966. "vulnerable" : true,
  92967. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
  92968. "cpe_name" : [ ]
  92969. }, {
  92970. "vulnerable" : true,
  92971. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
  92972. "cpe_name" : [ ]
  92973. }, {
  92974. "vulnerable" : true,
  92975. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
  92976. "cpe_name" : [ ]
  92977. }, {
  92978. "vulnerable" : true,
  92979. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
  92980. "cpe_name" : [ ]
  92981. }, {
  92982. "vulnerable" : true,
  92983. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
  92984. "cpe_name" : [ ]
  92985. }, {
  92986. "vulnerable" : true,
  92987. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
  92988. "cpe_name" : [ ]
  92989. }, {
  92990. "vulnerable" : true,
  92991. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
  92992. "cpe_name" : [ ]
  92993. }, {
  92994. "vulnerable" : true,
  92995. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
  92996. "cpe_name" : [ ]
  92997. }, {
  92998. "vulnerable" : true,
  92999. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
  93000. "cpe_name" : [ ]
  93001. }, {
  93002. "vulnerable" : true,
  93003. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
  93004. "cpe_name" : [ ]
  93005. }, {
  93006. "vulnerable" : true,
  93007. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
  93008. "cpe_name" : [ ]
  93009. }, {
  93010. "vulnerable" : true,
  93011. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
  93012. "cpe_name" : [ ]
  93013. }, {
  93014. "vulnerable" : true,
  93015. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
  93016. "cpe_name" : [ ]
  93017. }, {
  93018. "vulnerable" : true,
  93019. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
  93020. "cpe_name" : [ ]
  93021. }, {
  93022. "vulnerable" : true,
  93023. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
  93024. "cpe_name" : [ ]
  93025. }, {
  93026. "vulnerable" : true,
  93027. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
  93028. "cpe_name" : [ ]
  93029. }, {
  93030. "vulnerable" : true,
  93031. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
  93032. "cpe_name" : [ ]
  93033. }, {
  93034. "vulnerable" : true,
  93035. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
  93036. "cpe_name" : [ ]
  93037. }, {
  93038. "vulnerable" : true,
  93039. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
  93040. "cpe_name" : [ ]
  93041. }, {
  93042. "vulnerable" : true,
  93043. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
  93044. "cpe_name" : [ ]
  93045. }, {
  93046. "vulnerable" : true,
  93047. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
  93048. "cpe_name" : [ ]
  93049. }, {
  93050. "vulnerable" : true,
  93051. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
  93052. "cpe_name" : [ ]
  93053. }, {
  93054. "vulnerable" : true,
  93055. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
  93056. "cpe_name" : [ ]
  93057. }, {
  93058. "vulnerable" : true,
  93059. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
  93060. "cpe_name" : [ ]
  93061. }, {
  93062. "vulnerable" : true,
  93063. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
  93064. "cpe_name" : [ ]
  93065. }, {
  93066. "vulnerable" : true,
  93067. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
  93068. "cpe_name" : [ ]
  93069. }, {
  93070. "vulnerable" : true,
  93071. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
  93072. "cpe_name" : [ ]
  93073. }, {
  93074. "vulnerable" : true,
  93075. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
  93076. "cpe_name" : [ ]
  93077. }, {
  93078. "vulnerable" : true,
  93079. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
  93080. "cpe_name" : [ ]
  93081. }, {
  93082. "vulnerable" : true,
  93083. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
  93084. "cpe_name" : [ ]
  93085. }, {
  93086. "vulnerable" : true,
  93087. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
  93088. "cpe_name" : [ ]
  93089. }, {
  93090. "vulnerable" : true,
  93091. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
  93092. "cpe_name" : [ ]
  93093. }, {
  93094. "vulnerable" : true,
  93095. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
  93096. "cpe_name" : [ ]
  93097. }, {
  93098. "vulnerable" : true,
  93099. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
  93100. "cpe_name" : [ ]
  93101. }, {
  93102. "vulnerable" : true,
  93103. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
  93104. "cpe_name" : [ ]
  93105. }, {
  93106. "vulnerable" : true,
  93107. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
  93108. "cpe_name" : [ ]
  93109. }, {
  93110. "vulnerable" : true,
  93111. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
  93112. "cpe_name" : [ ]
  93113. }, {
  93114. "vulnerable" : true,
  93115. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
  93116. "cpe_name" : [ ]
  93117. }, {
  93118. "vulnerable" : true,
  93119. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
  93120. "cpe_name" : [ ]
  93121. }, {
  93122. "vulnerable" : true,
  93123. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
  93124. "cpe_name" : [ ]
  93125. }, {
  93126. "vulnerable" : true,
  93127. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
  93128. "cpe_name" : [ ]
  93129. }, {
  93130. "vulnerable" : true,
  93131. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
  93132. "cpe_name" : [ ]
  93133. }, {
  93134. "vulnerable" : true,
  93135. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
  93136. "cpe_name" : [ ]
  93137. }, {
  93138. "vulnerable" : true,
  93139. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
  93140. "cpe_name" : [ ]
  93141. }, {
  93142. "vulnerable" : true,
  93143. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
  93144. "cpe_name" : [ ]
  93145. }, {
  93146. "vulnerable" : true,
  93147. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
  93148. "cpe_name" : [ ]
  93149. }, {
  93150. "vulnerable" : true,
  93151. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
  93152. "cpe_name" : [ ]
  93153. }, {
  93154. "vulnerable" : true,
  93155. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
  93156. "cpe_name" : [ ]
  93157. }, {
  93158. "vulnerable" : true,
  93159. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
  93160. "cpe_name" : [ ]
  93161. }, {
  93162. "vulnerable" : true,
  93163. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
  93164. "cpe_name" : [ ]
  93165. }, {
  93166. "vulnerable" : true,
  93167. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
  93168. "cpe_name" : [ ]
  93169. }, {
  93170. "vulnerable" : true,
  93171. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
  93172. "cpe_name" : [ ]
  93173. }, {
  93174. "vulnerable" : true,
  93175. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
  93176. "cpe_name" : [ ]
  93177. }, {
  93178. "vulnerable" : true,
  93179. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
  93180. "cpe_name" : [ ]
  93181. }, {
  93182. "vulnerable" : true,
  93183. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
  93184. "cpe_name" : [ ]
  93185. }, {
  93186. "vulnerable" : true,
  93187. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
  93188. "cpe_name" : [ ]
  93189. }, {
  93190. "vulnerable" : true,
  93191. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
  93192. "cpe_name" : [ ]
  93193. }, {
  93194. "vulnerable" : true,
  93195. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
  93196. "cpe_name" : [ ]
  93197. }, {
  93198. "vulnerable" : true,
  93199. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
  93200. "cpe_name" : [ ]
  93201. }, {
  93202. "vulnerable" : true,
  93203. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
  93204. "cpe_name" : [ ]
  93205. }, {
  93206. "vulnerable" : true,
  93207. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
  93208. "cpe_name" : [ ]
  93209. }, {
  93210. "vulnerable" : true,
  93211. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
  93212. "cpe_name" : [ ]
  93213. }, {
  93214. "vulnerable" : true,
  93215. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
  93216. "cpe_name" : [ ]
  93217. }, {
  93218. "vulnerable" : true,
  93219. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
  93220. "cpe_name" : [ ]
  93221. }, {
  93222. "vulnerable" : true,
  93223. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
  93224. "cpe_name" : [ ]
  93225. }, {
  93226. "vulnerable" : true,
  93227. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
  93228. "cpe_name" : [ ]
  93229. }, {
  93230. "vulnerable" : true,
  93231. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123230:*:*:*:*:*:*",
  93232. "cpe_name" : [ ]
  93233. }, {
  93234. "vulnerable" : true,
  93235. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
  93236. "cpe_name" : [ ]
  93237. }, {
  93238. "vulnerable" : true,
  93239. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
  93240. "cpe_name" : [ ]
  93241. }, {
  93242. "vulnerable" : true,
  93243. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
  93244. "cpe_name" : [ ]
  93245. }, {
  93246. "vulnerable" : true,
  93247. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
  93248. "cpe_name" : [ ]
  93249. }, {
  93250. "vulnerable" : true,
  93251. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
  93252. "cpe_name" : [ ]
  93253. }, {
  93254. "vulnerable" : true,
  93255. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123237:*:*:*:*:*:*",
  93256. "cpe_name" : [ ]
  93257. }, {
  93258. "vulnerable" : true,
  93259. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
  93260. "cpe_name" : [ ]
  93261. }, {
  93262. "vulnerable" : true,
  93263. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
  93264. "cpe_name" : [ ]
  93265. }, {
  93266. "vulnerable" : true,
  93267. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
  93268. "cpe_name" : [ ]
  93269. }, {
  93270. "vulnerable" : true,
  93271. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
  93272. "cpe_name" : [ ]
  93273. }, {
  93274. "vulnerable" : true,
  93275. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
  93276. "cpe_name" : [ ]
  93277. }, {
  93278. "vulnerable" : true,
  93279. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
  93280. "cpe_name" : [ ]
  93281. }, {
  93282. "vulnerable" : true,
  93283. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
  93284. "cpe_name" : [ ]
  93285. }, {
  93286. "vulnerable" : true,
  93287. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
  93288. "cpe_name" : [ ]
  93289. }, {
  93290. "vulnerable" : true,
  93291. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
  93292. "cpe_name" : [ ]
  93293. }, {
  93294. "vulnerable" : true,
  93295. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
  93296. "cpe_name" : [ ]
  93297. }, {
  93298. "vulnerable" : true,
  93299. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
  93300. "cpe_name" : [ ]
  93301. }, {
  93302. "vulnerable" : true,
  93303. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
  93304. "cpe_name" : [ ]
  93305. }, {
  93306. "vulnerable" : true,
  93307. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
  93308. "cpe_name" : [ ]
  93309. }, {
  93310. "vulnerable" : true,
  93311. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
  93312. "cpe_name" : [ ]
  93313. }, {
  93314. "vulnerable" : true,
  93315. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
  93316. "cpe_name" : [ ]
  93317. }, {
  93318. "vulnerable" : true,
  93319. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
  93320. "cpe_name" : [ ]
  93321. }, {
  93322. "vulnerable" : true,
  93323. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
  93324. "cpe_name" : [ ]
  93325. }, {
  93326. "vulnerable" : true,
  93327. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
  93328. "cpe_name" : [ ]
  93329. }, {
  93330. "vulnerable" : true,
  93331. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
  93332. "cpe_name" : [ ]
  93333. }, {
  93334. "vulnerable" : true,
  93335. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
  93336. "cpe_name" : [ ]
  93337. }, {
  93338. "vulnerable" : true,
  93339. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
  93340. "cpe_name" : [ ]
  93341. }, {
  93342. "vulnerable" : true,
  93343. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
  93344. "cpe_name" : [ ]
  93345. }, {
  93346. "vulnerable" : true,
  93347. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
  93348. "cpe_name" : [ ]
  93349. }, {
  93350. "vulnerable" : true,
  93351. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
  93352. "cpe_name" : [ ]
  93353. }, {
  93354. "vulnerable" : true,
  93355. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
  93356. "cpe_name" : [ ]
  93357. }, {
  93358. "vulnerable" : true,
  93359. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
  93360. "cpe_name" : [ ]
  93361. }, {
  93362. "vulnerable" : true,
  93363. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
  93364. "cpe_name" : [ ]
  93365. }, {
  93366. "vulnerable" : true,
  93367. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
  93368. "cpe_name" : [ ]
  93369. }, {
  93370. "vulnerable" : true,
  93371. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
  93372. "cpe_name" : [ ]
  93373. }, {
  93374. "vulnerable" : true,
  93375. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
  93376. "cpe_name" : [ ]
  93377. }, {
  93378. "vulnerable" : true,
  93379. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123229:*:*:*:*:*:*",
  93380. "cpe_name" : [ ]
  93381. }, {
  93382. "vulnerable" : true,
  93383. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123231:*:*:*:*:*:*",
  93384. "cpe_name" : [ ]
  93385. }, {
  93386. "vulnerable" : true,
  93387. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
  93388. "cpe_name" : [ ]
  93389. }, {
  93390. "vulnerable" : true,
  93391. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
  93392. "cpe_name" : [ ]
  93393. }, {
  93394. "vulnerable" : true,
  93395. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
  93396. "cpe_name" : [ ]
  93397. }, {
  93398. "vulnerable" : true,
  93399. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
  93400. "cpe_name" : [ ]
  93401. } ]
  93402. } ]
  93403. },
  93404. "impact" : {
  93405. "baseMetricV3" : {
  93406. "cvssV3" : {
  93407. "version" : "3.0",
  93408. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  93409. "attackVector" : "NETWORK",
  93410. "attackComplexity" : "LOW",
  93411. "privilegesRequired" : "NONE",
  93412. "userInteraction" : "NONE",
  93413. "scope" : "UNCHANGED",
  93414. "confidentialityImpact" : "HIGH",
  93415. "integrityImpact" : "HIGH",
  93416. "availabilityImpact" : "HIGH",
  93417. "baseScore" : 9.8,
  93418. "baseSeverity" : "CRITICAL"
  93419. },
  93420. "exploitabilityScore" : 3.9,
  93421. "impactScore" : 5.9
  93422. },
  93423. "baseMetricV2" : {
  93424. "cvssV2" : {
  93425. "version" : "2.0",
  93426. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  93427. "accessVector" : "NETWORK",
  93428. "accessComplexity" : "LOW",
  93429. "authentication" : "NONE",
  93430. "confidentialityImpact" : "PARTIAL",
  93431. "integrityImpact" : "PARTIAL",
  93432. "availabilityImpact" : "PARTIAL",
  93433. "baseScore" : 7.5
  93434. },
  93435. "severity" : "HIGH",
  93436. "exploitabilityScore" : 10.0,
  93437. "impactScore" : 6.4,
  93438. "acInsufInfo" : false,
  93439. "obtainAllPrivilege" : false,
  93440. "obtainUserPrivilege" : false,
  93441. "obtainOtherPrivilege" : false,
  93442. "userInteractionRequired" : false
  93443. }
  93444. },
  93445. "publishedDate" : "2018-12-21T09:29Z",
  93446. "lastModifiedDate" : "2021-05-04T15:07Z"
  93447. }, {
  93448. "cve" : {
  93449. "data_type" : "CVE",
  93450. "data_format" : "MITRE",
  93451. "data_version" : "4.0",
  93452. "CVE_data_meta" : {
  93453. "ID" : "CVE-2018-20173",
  93454. "ASSIGNER" : "cve@mitre.org"
  93455. },
  93456. "problemtype" : {
  93457. "problemtype_data" : [ {
  93458. "description" : [ {
  93459. "lang" : "en",
  93460. "value" : "CWE-89"
  93461. } ]
  93462. } ]
  93463. },
  93464. "references" : {
  93465. "reference_data" : [ {
  93466. "url" : "https://www.manageengine.com/network-monitoring/help/read-me.html",
  93467. "name" : "https://www.manageengine.com/network-monitoring/help/read-me.html",
  93468. "refsource" : "MISC",
  93469. "tags" : [ "Release Notes", "Vendor Advisory" ]
  93470. } ]
  93471. },
  93472. "description" : {
  93473. "description_data" : [ {
  93474. "lang" : "en",
  93475. "value" : "Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API."
  93476. } ]
  93477. }
  93478. },
  93479. "configurations" : {
  93480. "CVE_data_version" : "4.0",
  93481. "nodes" : [ {
  93482. "operator" : "OR",
  93483. "children" : [ ],
  93484. "cpe_match" : [ {
  93485. "vulnerable" : true,
  93486. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123237:*:*:*:*:*:*",
  93487. "cpe_name" : [ ]
  93488. }, {
  93489. "vulnerable" : true,
  93490. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
  93491. "cpe_name" : [ ]
  93492. }, {
  93493. "vulnerable" : true,
  93494. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
  93495. "cpe_name" : [ ]
  93496. }, {
  93497. "vulnerable" : true,
  93498. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
  93499. "cpe_name" : [ ]
  93500. }, {
  93501. "vulnerable" : true,
  93502. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
  93503. "cpe_name" : [ ]
  93504. }, {
  93505. "vulnerable" : true,
  93506. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
  93507. "cpe_name" : [ ]
  93508. }, {
  93509. "vulnerable" : true,
  93510. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
  93511. "cpe_name" : [ ]
  93512. }, {
  93513. "vulnerable" : true,
  93514. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
  93515. "cpe_name" : [ ]
  93516. }, {
  93517. "vulnerable" : true,
  93518. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
  93519. "cpe_name" : [ ]
  93520. }, {
  93521. "vulnerable" : true,
  93522. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
  93523. "cpe_name" : [ ]
  93524. }, {
  93525. "vulnerable" : true,
  93526. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
  93527. "cpe_name" : [ ]
  93528. }, {
  93529. "vulnerable" : true,
  93530. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
  93531. "cpe_name" : [ ]
  93532. }, {
  93533. "vulnerable" : true,
  93534. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
  93535. "cpe_name" : [ ]
  93536. }, {
  93537. "vulnerable" : true,
  93538. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
  93539. "cpe_name" : [ ]
  93540. }, {
  93541. "vulnerable" : true,
  93542. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
  93543. "cpe_name" : [ ]
  93544. }, {
  93545. "vulnerable" : true,
  93546. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123224:*:*:*:*:*:*",
  93547. "cpe_name" : [ ]
  93548. }, {
  93549. "vulnerable" : true,
  93550. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123229:*:*:*:*:*:*",
  93551. "cpe_name" : [ ]
  93552. }, {
  93553. "vulnerable" : true,
  93554. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123230:*:*:*:*:*:*",
  93555. "cpe_name" : [ ]
  93556. }, {
  93557. "vulnerable" : true,
  93558. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123231:*:*:*:*:*:*",
  93559. "cpe_name" : [ ]
  93560. }, {
  93561. "vulnerable" : true,
  93562. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
  93563. "cpe_name" : [ ]
  93564. }, {
  93565. "vulnerable" : true,
  93566. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
  93567. "cpe_name" : [ ]
  93568. }, {
  93569. "vulnerable" : true,
  93570. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
  93571. "cpe_name" : [ ]
  93572. }, {
  93573. "vulnerable" : true,
  93574. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
  93575. "cpe_name" : [ ]
  93576. }, {
  93577. "vulnerable" : true,
  93578. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
  93579. "cpe_name" : [ ]
  93580. }, {
  93581. "vulnerable" : true,
  93582. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
  93583. "cpe_name" : [ ]
  93584. }, {
  93585. "vulnerable" : true,
  93586. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
  93587. "cpe_name" : [ ]
  93588. }, {
  93589. "vulnerable" : true,
  93590. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
  93591. "cpe_name" : [ ]
  93592. }, {
  93593. "vulnerable" : true,
  93594. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
  93595. "cpe_name" : [ ]
  93596. }, {
  93597. "vulnerable" : true,
  93598. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
  93599. "cpe_name" : [ ]
  93600. }, {
  93601. "vulnerable" : true,
  93602. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
  93603. "cpe_name" : [ ]
  93604. }, {
  93605. "vulnerable" : true,
  93606. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
  93607. "cpe_name" : [ ]
  93608. }, {
  93609. "vulnerable" : true,
  93610. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
  93611. "cpe_name" : [ ]
  93612. }, {
  93613. "vulnerable" : true,
  93614. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
  93615. "cpe_name" : [ ]
  93616. }, {
  93617. "vulnerable" : true,
  93618. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
  93619. "cpe_name" : [ ]
  93620. }, {
  93621. "vulnerable" : true,
  93622. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
  93623. "cpe_name" : [ ]
  93624. }, {
  93625. "vulnerable" : true,
  93626. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
  93627. "cpe_name" : [ ]
  93628. }, {
  93629. "vulnerable" : true,
  93630. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123222:*:*:*:*:*:*",
  93631. "cpe_name" : [ ]
  93632. }, {
  93633. "vulnerable" : true,
  93634. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
  93635. "cpe_name" : [ ]
  93636. }, {
  93637. "vulnerable" : true,
  93638. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
  93639. "cpe_name" : [ ]
  93640. }, {
  93641. "vulnerable" : true,
  93642. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
  93643. "cpe_name" : [ ]
  93644. }, {
  93645. "vulnerable" : true,
  93646. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
  93647. "cpe_name" : [ ]
  93648. }, {
  93649. "vulnerable" : true,
  93650. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
  93651. "cpe_name" : [ ]
  93652. }, {
  93653. "vulnerable" : true,
  93654. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
  93655. "cpe_name" : [ ]
  93656. }, {
  93657. "vulnerable" : true,
  93658. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
  93659. "cpe_name" : [ ]
  93660. }, {
  93661. "vulnerable" : true,
  93662. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
  93663. "cpe_name" : [ ]
  93664. }, {
  93665. "vulnerable" : true,
  93666. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
  93667. "cpe_name" : [ ]
  93668. }, {
  93669. "vulnerable" : true,
  93670. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
  93671. "cpe_name" : [ ]
  93672. }, {
  93673. "vulnerable" : true,
  93674. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
  93675. "cpe_name" : [ ]
  93676. }, {
  93677. "vulnerable" : true,
  93678. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
  93679. "cpe_name" : [ ]
  93680. }, {
  93681. "vulnerable" : true,
  93682. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
  93683. "cpe_name" : [ ]
  93684. }, {
  93685. "vulnerable" : true,
  93686. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
  93687. "cpe_name" : [ ]
  93688. }, {
  93689. "vulnerable" : true,
  93690. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
  93691. "cpe_name" : [ ]
  93692. }, {
  93693. "vulnerable" : true,
  93694. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
  93695. "cpe_name" : [ ]
  93696. }, {
  93697. "vulnerable" : true,
  93698. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
  93699. "cpe_name" : [ ]
  93700. }, {
  93701. "vulnerable" : true,
  93702. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
  93703. "cpe_name" : [ ]
  93704. }, {
  93705. "vulnerable" : true,
  93706. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
  93707. "cpe_name" : [ ]
  93708. }, {
  93709. "vulnerable" : true,
  93710. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
  93711. "cpe_name" : [ ]
  93712. }, {
  93713. "vulnerable" : true,
  93714. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
  93715. "cpe_name" : [ ]
  93716. }, {
  93717. "vulnerable" : true,
  93718. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
  93719. "cpe_name" : [ ]
  93720. }, {
  93721. "vulnerable" : true,
  93722. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
  93723. "cpe_name" : [ ]
  93724. }, {
  93725. "vulnerable" : true,
  93726. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
  93727. "cpe_name" : [ ]
  93728. }, {
  93729. "vulnerable" : true,
  93730. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
  93731. "cpe_name" : [ ]
  93732. }, {
  93733. "vulnerable" : true,
  93734. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
  93735. "cpe_name" : [ ]
  93736. }, {
  93737. "vulnerable" : true,
  93738. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
  93739. "cpe_name" : [ ]
  93740. }, {
  93741. "vulnerable" : true,
  93742. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
  93743. "cpe_name" : [ ]
  93744. }, {
  93745. "vulnerable" : true,
  93746. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
  93747. "cpe_name" : [ ]
  93748. }, {
  93749. "vulnerable" : true,
  93750. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
  93751. "cpe_name" : [ ]
  93752. }, {
  93753. "vulnerable" : true,
  93754. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
  93755. "cpe_name" : [ ]
  93756. }, {
  93757. "vulnerable" : true,
  93758. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
  93759. "cpe_name" : [ ]
  93760. }, {
  93761. "vulnerable" : true,
  93762. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
  93763. "cpe_name" : [ ]
  93764. }, {
  93765. "vulnerable" : true,
  93766. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
  93767. "cpe_name" : [ ]
  93768. }, {
  93769. "vulnerable" : true,
  93770. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
  93771. "cpe_name" : [ ]
  93772. }, {
  93773. "vulnerable" : true,
  93774. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
  93775. "cpe_name" : [ ]
  93776. }, {
  93777. "vulnerable" : true,
  93778. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123223:*:*:*:*:*:*",
  93779. "cpe_name" : [ ]
  93780. }, {
  93781. "vulnerable" : true,
  93782. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
  93783. "cpe_name" : [ ]
  93784. }, {
  93785. "vulnerable" : true,
  93786. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
  93787. "cpe_name" : [ ]
  93788. }, {
  93789. "vulnerable" : true,
  93790. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
  93791. "cpe_name" : [ ]
  93792. }, {
  93793. "vulnerable" : true,
  93794. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
  93795. "cpe_name" : [ ]
  93796. }, {
  93797. "vulnerable" : true,
  93798. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
  93799. "cpe_name" : [ ]
  93800. }, {
  93801. "vulnerable" : true,
  93802. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
  93803. "cpe_name" : [ ]
  93804. }, {
  93805. "vulnerable" : true,
  93806. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
  93807. "cpe_name" : [ ]
  93808. }, {
  93809. "vulnerable" : true,
  93810. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
  93811. "cpe_name" : [ ]
  93812. }, {
  93813. "vulnerable" : true,
  93814. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
  93815. "cpe_name" : [ ]
  93816. }, {
  93817. "vulnerable" : true,
  93818. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
  93819. "cpe_name" : [ ]
  93820. }, {
  93821. "vulnerable" : true,
  93822. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
  93823. "cpe_name" : [ ]
  93824. }, {
  93825. "vulnerable" : true,
  93826. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
  93827. "cpe_name" : [ ]
  93828. }, {
  93829. "vulnerable" : true,
  93830. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
  93831. "cpe_name" : [ ]
  93832. }, {
  93833. "vulnerable" : true,
  93834. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
  93835. "cpe_name" : [ ]
  93836. }, {
  93837. "vulnerable" : true,
  93838. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
  93839. "cpe_name" : [ ]
  93840. } ]
  93841. } ]
  93842. },
  93843. "impact" : {
  93844. "baseMetricV3" : {
  93845. "cvssV3" : {
  93846. "version" : "3.0",
  93847. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  93848. "attackVector" : "NETWORK",
  93849. "attackComplexity" : "LOW",
  93850. "privilegesRequired" : "NONE",
  93851. "userInteraction" : "NONE",
  93852. "scope" : "UNCHANGED",
  93853. "confidentialityImpact" : "HIGH",
  93854. "integrityImpact" : "HIGH",
  93855. "availabilityImpact" : "HIGH",
  93856. "baseScore" : 9.8,
  93857. "baseSeverity" : "CRITICAL"
  93858. },
  93859. "exploitabilityScore" : 3.9,
  93860. "impactScore" : 5.9
  93861. },
  93862. "baseMetricV2" : {
  93863. "cvssV2" : {
  93864. "version" : "2.0",
  93865. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  93866. "accessVector" : "NETWORK",
  93867. "accessComplexity" : "LOW",
  93868. "authentication" : "NONE",
  93869. "confidentialityImpact" : "PARTIAL",
  93870. "integrityImpact" : "PARTIAL",
  93871. "availabilityImpact" : "PARTIAL",
  93872. "baseScore" : 7.5
  93873. },
  93874. "severity" : "HIGH",
  93875. "exploitabilityScore" : 10.0,
  93876. "impactScore" : 6.4,
  93877. "acInsufInfo" : false,
  93878. "obtainAllPrivilege" : false,
  93879. "obtainUserPrivilege" : false,
  93880. "obtainOtherPrivilege" : false,
  93881. "userInteractionRequired" : false
  93882. }
  93883. },
  93884. "publishedDate" : "2018-12-17T08:29Z",
  93885. "lastModifiedDate" : "2021-05-04T15:07Z"
  93886. }, {
  93887. "cve" : {
  93888. "data_type" : "CVE",
  93889. "data_format" : "MITRE",
  93890. "data_version" : "4.0",
  93891. "CVE_data_meta" : {
  93892. "ID" : "CVE-2018-19921",
  93893. "ASSIGNER" : "cve@mitre.org"
  93894. },
  93895. "problemtype" : {
  93896. "problemtype_data" : [ {
  93897. "description" : [ {
  93898. "lang" : "en",
  93899. "value" : "CWE-79"
  93900. } ]
  93901. } ]
  93902. },
  93903. "references" : {
  93904. "reference_data" : [ {
  93905. "url" : "https://www.manageengine.com/network-monitoring/help/read-me.html",
  93906. "name" : "https://www.manageengine.com/network-monitoring/help/read-me.html",
  93907. "refsource" : "MISC",
  93908. "tags" : [ "Vendor Advisory" ]
  93909. } ]
  93910. },
  93911. "description" : {
  93912. "description_data" : [ {
  93913. "lang" : "en",
  93914. "value" : "Zoho ManageEngine OpManager 12.3 before 123237 has XSS in the domain controller."
  93915. } ]
  93916. }
  93917. },
  93918. "configurations" : {
  93919. "CVE_data_version" : "4.0",
  93920. "nodes" : [ {
  93921. "operator" : "OR",
  93922. "children" : [ ],
  93923. "cpe_match" : [ {
  93924. "vulnerable" : true,
  93925. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:123230:*:*:*:*:*:*:*",
  93926. "cpe_name" : [ ]
  93927. }, {
  93928. "vulnerable" : true,
  93929. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:123229:*:*:*:*:*:*:*",
  93930. "cpe_name" : [ ]
  93931. }, {
  93932. "vulnerable" : true,
  93933. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:123224:*:*:*:*:*:*:*",
  93934. "cpe_name" : [ ]
  93935. }, {
  93936. "vulnerable" : true,
  93937. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:123223:*:*:*:*:*:*:*",
  93938. "cpe_name" : [ ]
  93939. }, {
  93940. "vulnerable" : true,
  93941. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:123222:*:*:*:*:*:*:*",
  93942. "cpe_name" : [ ]
  93943. }, {
  93944. "vulnerable" : true,
  93945. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
  93946. "cpe_name" : [ ]
  93947. }, {
  93948. "vulnerable" : true,
  93949. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
  93950. "cpe_name" : [ ]
  93951. }, {
  93952. "vulnerable" : true,
  93953. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
  93954. "cpe_name" : [ ]
  93955. }, {
  93956. "vulnerable" : true,
  93957. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
  93958. "cpe_name" : [ ]
  93959. }, {
  93960. "vulnerable" : true,
  93961. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
  93962. "cpe_name" : [ ]
  93963. }, {
  93964. "vulnerable" : true,
  93965. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
  93966. "cpe_name" : [ ]
  93967. }, {
  93968. "vulnerable" : true,
  93969. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
  93970. "cpe_name" : [ ]
  93971. }, {
  93972. "vulnerable" : true,
  93973. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
  93974. "cpe_name" : [ ]
  93975. }, {
  93976. "vulnerable" : true,
  93977. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
  93978. "cpe_name" : [ ]
  93979. }, {
  93980. "vulnerable" : true,
  93981. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
  93982. "cpe_name" : [ ]
  93983. }, {
  93984. "vulnerable" : true,
  93985. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
  93986. "cpe_name" : [ ]
  93987. }, {
  93988. "vulnerable" : true,
  93989. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
  93990. "cpe_name" : [ ]
  93991. }, {
  93992. "vulnerable" : true,
  93993. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
  93994. "cpe_name" : [ ]
  93995. }, {
  93996. "vulnerable" : true,
  93997. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
  93998. "cpe_name" : [ ]
  93999. }, {
  94000. "vulnerable" : true,
  94001. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
  94002. "cpe_name" : [ ]
  94003. }, {
  94004. "vulnerable" : true,
  94005. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
  94006. "cpe_name" : [ ]
  94007. }, {
  94008. "vulnerable" : true,
  94009. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
  94010. "cpe_name" : [ ]
  94011. }, {
  94012. "vulnerable" : true,
  94013. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
  94014. "cpe_name" : [ ]
  94015. }, {
  94016. "vulnerable" : true,
  94017. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
  94018. "cpe_name" : [ ]
  94019. }, {
  94020. "vulnerable" : true,
  94021. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
  94022. "cpe_name" : [ ]
  94023. }, {
  94024. "vulnerable" : true,
  94025. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
  94026. "cpe_name" : [ ]
  94027. }, {
  94028. "vulnerable" : true,
  94029. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
  94030. "cpe_name" : [ ]
  94031. }, {
  94032. "vulnerable" : true,
  94033. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
  94034. "cpe_name" : [ ]
  94035. }, {
  94036. "vulnerable" : true,
  94037. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
  94038. "cpe_name" : [ ]
  94039. }, {
  94040. "vulnerable" : true,
  94041. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
  94042. "cpe_name" : [ ]
  94043. }, {
  94044. "vulnerable" : true,
  94045. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
  94046. "cpe_name" : [ ]
  94047. }, {
  94048. "vulnerable" : true,
  94049. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
  94050. "cpe_name" : [ ]
  94051. }, {
  94052. "vulnerable" : true,
  94053. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
  94054. "cpe_name" : [ ]
  94055. }, {
  94056. "vulnerable" : true,
  94057. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
  94058. "cpe_name" : [ ]
  94059. }, {
  94060. "vulnerable" : true,
  94061. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
  94062. "cpe_name" : [ ]
  94063. }, {
  94064. "vulnerable" : true,
  94065. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
  94066. "cpe_name" : [ ]
  94067. }, {
  94068. "vulnerable" : true,
  94069. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
  94070. "cpe_name" : [ ]
  94071. }, {
  94072. "vulnerable" : true,
  94073. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
  94074. "cpe_name" : [ ]
  94075. }, {
  94076. "vulnerable" : true,
  94077. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
  94078. "cpe_name" : [ ]
  94079. }, {
  94080. "vulnerable" : true,
  94081. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*",
  94082. "cpe_name" : [ ]
  94083. }, {
  94084. "vulnerable" : true,
  94085. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*",
  94086. "cpe_name" : [ ]
  94087. }, {
  94088. "vulnerable" : true,
  94089. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*",
  94090. "cpe_name" : [ ]
  94091. }, {
  94092. "vulnerable" : true,
  94093. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
  94094. "cpe_name" : [ ]
  94095. }, {
  94096. "vulnerable" : true,
  94097. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
  94098. "cpe_name" : [ ]
  94099. }, {
  94100. "vulnerable" : true,
  94101. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
  94102. "cpe_name" : [ ]
  94103. }, {
  94104. "vulnerable" : true,
  94105. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
  94106. "cpe_name" : [ ]
  94107. }, {
  94108. "vulnerable" : true,
  94109. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
  94110. "cpe_name" : [ ]
  94111. }, {
  94112. "vulnerable" : true,
  94113. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
  94114. "cpe_name" : [ ]
  94115. }, {
  94116. "vulnerable" : true,
  94117. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
  94118. "cpe_name" : [ ]
  94119. }, {
  94120. "vulnerable" : true,
  94121. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
  94122. "cpe_name" : [ ]
  94123. }, {
  94124. "vulnerable" : true,
  94125. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
  94126. "cpe_name" : [ ]
  94127. }, {
  94128. "vulnerable" : true,
  94129. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
  94130. "cpe_name" : [ ]
  94131. }, {
  94132. "vulnerable" : true,
  94133. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
  94134. "cpe_name" : [ ]
  94135. }, {
  94136. "vulnerable" : true,
  94137. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
  94138. "cpe_name" : [ ]
  94139. }, {
  94140. "vulnerable" : true,
  94141. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
  94142. "cpe_name" : [ ]
  94143. }, {
  94144. "vulnerable" : true,
  94145. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
  94146. "cpe_name" : [ ]
  94147. }, {
  94148. "vulnerable" : true,
  94149. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
  94150. "cpe_name" : [ ]
  94151. }, {
  94152. "vulnerable" : true,
  94153. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
  94154. "cpe_name" : [ ]
  94155. }, {
  94156. "vulnerable" : true,
  94157. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
  94158. "cpe_name" : [ ]
  94159. }, {
  94160. "vulnerable" : true,
  94161. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
  94162. "cpe_name" : [ ]
  94163. }, {
  94164. "vulnerable" : true,
  94165. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
  94166. "cpe_name" : [ ]
  94167. }, {
  94168. "vulnerable" : true,
  94169. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
  94170. "cpe_name" : [ ]
  94171. }, {
  94172. "vulnerable" : true,
  94173. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
  94174. "cpe_name" : [ ]
  94175. }, {
  94176. "vulnerable" : true,
  94177. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
  94178. "cpe_name" : [ ]
  94179. }, {
  94180. "vulnerable" : true,
  94181. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
  94182. "cpe_name" : [ ]
  94183. }, {
  94184. "vulnerable" : true,
  94185. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
  94186. "cpe_name" : [ ]
  94187. }, {
  94188. "vulnerable" : true,
  94189. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*",
  94190. "cpe_name" : [ ]
  94191. }, {
  94192. "vulnerable" : true,
  94193. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
  94194. "cpe_name" : [ ]
  94195. }, {
  94196. "vulnerable" : true,
  94197. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
  94198. "cpe_name" : [ ]
  94199. }, {
  94200. "vulnerable" : true,
  94201. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
  94202. "cpe_name" : [ ]
  94203. }, {
  94204. "vulnerable" : true,
  94205. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
  94206. "cpe_name" : [ ]
  94207. }, {
  94208. "vulnerable" : true,
  94209. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
  94210. "cpe_name" : [ ]
  94211. }, {
  94212. "vulnerable" : true,
  94213. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
  94214. "cpe_name" : [ ]
  94215. }, {
  94216. "vulnerable" : true,
  94217. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
  94218. "cpe_name" : [ ]
  94219. }, {
  94220. "vulnerable" : true,
  94221. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
  94222. "cpe_name" : [ ]
  94223. }, {
  94224. "vulnerable" : true,
  94225. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
  94226. "cpe_name" : [ ]
  94227. }, {
  94228. "vulnerable" : true,
  94229. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
  94230. "cpe_name" : [ ]
  94231. }, {
  94232. "vulnerable" : true,
  94233. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
  94234. "cpe_name" : [ ]
  94235. }, {
  94236. "vulnerable" : true,
  94237. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
  94238. "cpe_name" : [ ]
  94239. }, {
  94240. "vulnerable" : true,
  94241. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
  94242. "cpe_name" : [ ]
  94243. }, {
  94244. "vulnerable" : true,
  94245. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
  94246. "cpe_name" : [ ]
  94247. }, {
  94248. "vulnerable" : true,
  94249. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
  94250. "cpe_name" : [ ]
  94251. }, {
  94252. "vulnerable" : true,
  94253. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
  94254. "cpe_name" : [ ]
  94255. }, {
  94256. "vulnerable" : true,
  94257. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
  94258. "cpe_name" : [ ]
  94259. }, {
  94260. "vulnerable" : true,
  94261. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
  94262. "cpe_name" : [ ]
  94263. }, {
  94264. "vulnerable" : true,
  94265. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
  94266. "cpe_name" : [ ]
  94267. }, {
  94268. "vulnerable" : true,
  94269. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
  94270. "cpe_name" : [ ]
  94271. }, {
  94272. "vulnerable" : true,
  94273. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
  94274. "cpe_name" : [ ]
  94275. }, {
  94276. "vulnerable" : true,
  94277. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
  94278. "cpe_name" : [ ]
  94279. }, {
  94280. "vulnerable" : true,
  94281. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
  94282. "cpe_name" : [ ]
  94283. }, {
  94284. "vulnerable" : true,
  94285. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
  94286. "cpe_name" : [ ]
  94287. }, {
  94288. "vulnerable" : true,
  94289. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
  94290. "cpe_name" : [ ]
  94291. }, {
  94292. "vulnerable" : true,
  94293. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
  94294. "cpe_name" : [ ]
  94295. }, {
  94296. "vulnerable" : true,
  94297. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
  94298. "cpe_name" : [ ]
  94299. }, {
  94300. "vulnerable" : true,
  94301. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
  94302. "cpe_name" : [ ]
  94303. }, {
  94304. "vulnerable" : true,
  94305. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
  94306. "cpe_name" : [ ]
  94307. }, {
  94308. "vulnerable" : true,
  94309. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
  94310. "cpe_name" : [ ]
  94311. }, {
  94312. "vulnerable" : true,
  94313. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
  94314. "cpe_name" : [ ]
  94315. }, {
  94316. "vulnerable" : true,
  94317. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
  94318. "cpe_name" : [ ]
  94319. }, {
  94320. "vulnerable" : true,
  94321. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
  94322. "cpe_name" : [ ]
  94323. }, {
  94324. "vulnerable" : true,
  94325. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
  94326. "cpe_name" : [ ]
  94327. }, {
  94328. "vulnerable" : true,
  94329. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
  94330. "cpe_name" : [ ]
  94331. }, {
  94332. "vulnerable" : true,
  94333. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
  94334. "cpe_name" : [ ]
  94335. }, {
  94336. "vulnerable" : true,
  94337. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
  94338. "cpe_name" : [ ]
  94339. }, {
  94340. "vulnerable" : true,
  94341. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*",
  94342. "cpe_name" : [ ]
  94343. }, {
  94344. "vulnerable" : true,
  94345. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123220:*:*:*:*:*:*",
  94346. "cpe_name" : [ ]
  94347. }, {
  94348. "vulnerable" : true,
  94349. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
  94350. "cpe_name" : [ ]
  94351. }, {
  94352. "vulnerable" : true,
  94353. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
  94354. "cpe_name" : [ ]
  94355. }, {
  94356. "vulnerable" : true,
  94357. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
  94358. "cpe_name" : [ ]
  94359. }, {
  94360. "vulnerable" : true,
  94361. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
  94362. "cpe_name" : [ ]
  94363. }, {
  94364. "vulnerable" : true,
  94365. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
  94366. "cpe_name" : [ ]
  94367. }, {
  94368. "vulnerable" : true,
  94369. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
  94370. "cpe_name" : [ ]
  94371. }, {
  94372. "vulnerable" : true,
  94373. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
  94374. "cpe_name" : [ ]
  94375. }, {
  94376. "vulnerable" : true,
  94377. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
  94378. "cpe_name" : [ ]
  94379. }, {
  94380. "vulnerable" : true,
  94381. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
  94382. "cpe_name" : [ ]
  94383. }, {
  94384. "vulnerable" : true,
  94385. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
  94386. "cpe_name" : [ ]
  94387. }, {
  94388. "vulnerable" : true,
  94389. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
  94390. "cpe_name" : [ ]
  94391. }, {
  94392. "vulnerable" : true,
  94393. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
  94394. "cpe_name" : [ ]
  94395. }, {
  94396. "vulnerable" : true,
  94397. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
  94398. "cpe_name" : [ ]
  94399. }, {
  94400. "vulnerable" : true,
  94401. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
  94402. "cpe_name" : [ ]
  94403. }, {
  94404. "vulnerable" : true,
  94405. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
  94406. "cpe_name" : [ ]
  94407. }, {
  94408. "vulnerable" : true,
  94409. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:123231:*:*:*:*:*:*:*",
  94410. "cpe_name" : [ ]
  94411. }, {
  94412. "vulnerable" : true,
  94413. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*",
  94414. "cpe_name" : [ ]
  94415. }, {
  94416. "vulnerable" : true,
  94417. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
  94418. "cpe_name" : [ ]
  94419. }, {
  94420. "vulnerable" : true,
  94421. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
  94422. "cpe_name" : [ ]
  94423. }, {
  94424. "vulnerable" : true,
  94425. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
  94426. "cpe_name" : [ ]
  94427. }, {
  94428. "vulnerable" : true,
  94429. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
  94430. "cpe_name" : [ ]
  94431. }, {
  94432. "vulnerable" : true,
  94433. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
  94434. "cpe_name" : [ ]
  94435. }, {
  94436. "vulnerable" : true,
  94437. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
  94438. "cpe_name" : [ ]
  94439. }, {
  94440. "vulnerable" : true,
  94441. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
  94442. "cpe_name" : [ ]
  94443. }, {
  94444. "vulnerable" : true,
  94445. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
  94446. "cpe_name" : [ ]
  94447. }, {
  94448. "vulnerable" : true,
  94449. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
  94450. "cpe_name" : [ ]
  94451. }, {
  94452. "vulnerable" : true,
  94453. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
  94454. "cpe_name" : [ ]
  94455. }, {
  94456. "vulnerable" : true,
  94457. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
  94458. "cpe_name" : [ ]
  94459. }, {
  94460. "vulnerable" : true,
  94461. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
  94462. "cpe_name" : [ ]
  94463. }, {
  94464. "vulnerable" : true,
  94465. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
  94466. "cpe_name" : [ ]
  94467. }, {
  94468. "vulnerable" : true,
  94469. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
  94470. "cpe_name" : [ ]
  94471. }, {
  94472. "vulnerable" : true,
  94473. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
  94474. "cpe_name" : [ ]
  94475. }, {
  94476. "vulnerable" : true,
  94477. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
  94478. "cpe_name" : [ ]
  94479. }, {
  94480. "vulnerable" : true,
  94481. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
  94482. "cpe_name" : [ ]
  94483. }, {
  94484. "vulnerable" : true,
  94485. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
  94486. "cpe_name" : [ ]
  94487. }, {
  94488. "vulnerable" : true,
  94489. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
  94490. "cpe_name" : [ ]
  94491. }, {
  94492. "vulnerable" : true,
  94493. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
  94494. "cpe_name" : [ ]
  94495. }, {
  94496. "vulnerable" : true,
  94497. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
  94498. "cpe_name" : [ ]
  94499. }, {
  94500. "vulnerable" : true,
  94501. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
  94502. "cpe_name" : [ ]
  94503. }, {
  94504. "vulnerable" : true,
  94505. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
  94506. "cpe_name" : [ ]
  94507. }, {
  94508. "vulnerable" : true,
  94509. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
  94510. "cpe_name" : [ ]
  94511. }, {
  94512. "vulnerable" : true,
  94513. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
  94514. "cpe_name" : [ ]
  94515. }, {
  94516. "vulnerable" : true,
  94517. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
  94518. "cpe_name" : [ ]
  94519. }, {
  94520. "vulnerable" : true,
  94521. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
  94522. "cpe_name" : [ ]
  94523. }, {
  94524. "vulnerable" : true,
  94525. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
  94526. "cpe_name" : [ ]
  94527. }, {
  94528. "vulnerable" : true,
  94529. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
  94530. "cpe_name" : [ ]
  94531. }, {
  94532. "vulnerable" : true,
  94533. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
  94534. "cpe_name" : [ ]
  94535. }, {
  94536. "vulnerable" : true,
  94537. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
  94538. "cpe_name" : [ ]
  94539. }, {
  94540. "vulnerable" : true,
  94541. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
  94542. "cpe_name" : [ ]
  94543. }, {
  94544. "vulnerable" : true,
  94545. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
  94546. "cpe_name" : [ ]
  94547. }, {
  94548. "vulnerable" : true,
  94549. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
  94550. "cpe_name" : [ ]
  94551. }, {
  94552. "vulnerable" : true,
  94553. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
  94554. "cpe_name" : [ ]
  94555. }, {
  94556. "vulnerable" : true,
  94557. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123219:*:*:*:*:*:*",
  94558. "cpe_name" : [ ]
  94559. }, {
  94560. "vulnerable" : true,
  94561. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123221:*:*:*:*:*:*",
  94562. "cpe_name" : [ ]
  94563. } ]
  94564. } ]
  94565. },
  94566. "impact" : {
  94567. "baseMetricV3" : {
  94568. "cvssV3" : {
  94569. "version" : "3.0",
  94570. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  94571. "attackVector" : "NETWORK",
  94572. "attackComplexity" : "LOW",
  94573. "privilegesRequired" : "NONE",
  94574. "userInteraction" : "REQUIRED",
  94575. "scope" : "CHANGED",
  94576. "confidentialityImpact" : "LOW",
  94577. "integrityImpact" : "LOW",
  94578. "availabilityImpact" : "NONE",
  94579. "baseScore" : 6.1,
  94580. "baseSeverity" : "MEDIUM"
  94581. },
  94582. "exploitabilityScore" : 2.8,
  94583. "impactScore" : 2.7
  94584. },
  94585. "baseMetricV2" : {
  94586. "cvssV2" : {
  94587. "version" : "2.0",
  94588. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  94589. "accessVector" : "NETWORK",
  94590. "accessComplexity" : "MEDIUM",
  94591. "authentication" : "NONE",
  94592. "confidentialityImpact" : "NONE",
  94593. "integrityImpact" : "PARTIAL",
  94594. "availabilityImpact" : "NONE",
  94595. "baseScore" : 4.3
  94596. },
  94597. "severity" : "MEDIUM",
  94598. "exploitabilityScore" : 8.6,
  94599. "impactScore" : 2.9,
  94600. "acInsufInfo" : false,
  94601. "obtainAllPrivilege" : false,
  94602. "obtainUserPrivilege" : false,
  94603. "obtainOtherPrivilege" : false,
  94604. "userInteractionRequired" : true
  94605. }
  94606. },
  94607. "publishedDate" : "2018-12-06T22:29Z",
  94608. "lastModifiedDate" : "2021-05-04T15:07Z"
  94609. }, {
  94610. "cve" : {
  94611. "data_type" : "CVE",
  94612. "data_format" : "MITRE",
  94613. "data_version" : "4.0",
  94614. "CVE_data_meta" : {
  94615. "ID" : "CVE-2018-18716",
  94616. "ASSIGNER" : "cve@mitre.org"
  94617. },
  94618. "problemtype" : {
  94619. "problemtype_data" : [ {
  94620. "description" : [ {
  94621. "lang" : "en",
  94622. "value" : "CWE-79"
  94623. } ]
  94624. } ]
  94625. },
  94626. "references" : {
  94627. "reference_data" : [ {
  94628. "url" : "https://seclists.org/bugtraq/2018/Oct/61",
  94629. "name" : "20181031 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability",
  94630. "refsource" : "BUGTRAQ",
  94631. "tags" : [ "Mailing List", "Third Party Advisory" ]
  94632. }, {
  94633. "url" : "http://seclists.org/fulldisclosure/2018/Nov/6",
  94634. "name" : "20181102 Zoho ManageEngine OpManager 12.3 allows Self XSS Vulnerability",
  94635. "refsource" : "FULLDISC",
  94636. "tags" : [ "Mailing List", "Third Party Advisory" ]
  94637. }, {
  94638. "url" : "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html",
  94639. "name" : "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html",
  94640. "refsource" : "MISC",
  94641. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  94642. } ]
  94643. },
  94644. "description" : {
  94645. "description_data" : [ {
  94646. "lang" : "en",
  94647. "value" : "Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability."
  94648. } ]
  94649. }
  94650. },
  94651. "configurations" : {
  94652. "CVE_data_version" : "4.0",
  94653. "nodes" : [ {
  94654. "operator" : "OR",
  94655. "children" : [ ],
  94656. "cpe_match" : [ {
  94657. "vulnerable" : true,
  94658. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
  94659. "cpe_name" : [ ]
  94660. }, {
  94661. "vulnerable" : true,
  94662. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
  94663. "cpe_name" : [ ]
  94664. }, {
  94665. "vulnerable" : true,
  94666. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
  94667. "cpe_name" : [ ]
  94668. }, {
  94669. "vulnerable" : true,
  94670. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
  94671. "cpe_name" : [ ]
  94672. }, {
  94673. "vulnerable" : true,
  94674. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
  94675. "cpe_name" : [ ]
  94676. }, {
  94677. "vulnerable" : true,
  94678. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
  94679. "cpe_name" : [ ]
  94680. }, {
  94681. "vulnerable" : true,
  94682. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
  94683. "cpe_name" : [ ]
  94684. }, {
  94685. "vulnerable" : true,
  94686. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
  94687. "cpe_name" : [ ]
  94688. }, {
  94689. "vulnerable" : true,
  94690. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
  94691. "cpe_name" : [ ]
  94692. }, {
  94693. "vulnerable" : true,
  94694. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
  94695. "cpe_name" : [ ]
  94696. }, {
  94697. "vulnerable" : true,
  94698. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
  94699. "cpe_name" : [ ]
  94700. }, {
  94701. "vulnerable" : true,
  94702. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
  94703. "cpe_name" : [ ]
  94704. }, {
  94705. "vulnerable" : true,
  94706. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
  94707. "cpe_name" : [ ]
  94708. }, {
  94709. "vulnerable" : true,
  94710. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
  94711. "cpe_name" : [ ]
  94712. }, {
  94713. "vulnerable" : true,
  94714. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
  94715. "cpe_name" : [ ]
  94716. }, {
  94717. "vulnerable" : true,
  94718. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
  94719. "cpe_name" : [ ]
  94720. }, {
  94721. "vulnerable" : true,
  94722. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
  94723. "cpe_name" : [ ]
  94724. }, {
  94725. "vulnerable" : true,
  94726. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
  94727. "cpe_name" : [ ]
  94728. }, {
  94729. "vulnerable" : true,
  94730. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
  94731. "cpe_name" : [ ]
  94732. }, {
  94733. "vulnerable" : true,
  94734. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
  94735. "cpe_name" : [ ]
  94736. }, {
  94737. "vulnerable" : true,
  94738. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
  94739. "cpe_name" : [ ]
  94740. }, {
  94741. "vulnerable" : true,
  94742. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
  94743. "cpe_name" : [ ]
  94744. }, {
  94745. "vulnerable" : true,
  94746. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
  94747. "cpe_name" : [ ]
  94748. }, {
  94749. "vulnerable" : true,
  94750. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
  94751. "cpe_name" : [ ]
  94752. }, {
  94753. "vulnerable" : true,
  94754. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
  94755. "cpe_name" : [ ]
  94756. }, {
  94757. "vulnerable" : true,
  94758. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
  94759. "cpe_name" : [ ]
  94760. }, {
  94761. "vulnerable" : true,
  94762. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
  94763. "cpe_name" : [ ]
  94764. }, {
  94765. "vulnerable" : true,
  94766. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
  94767. "cpe_name" : [ ]
  94768. }, {
  94769. "vulnerable" : true,
  94770. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
  94771. "cpe_name" : [ ]
  94772. }, {
  94773. "vulnerable" : true,
  94774. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
  94775. "cpe_name" : [ ]
  94776. }, {
  94777. "vulnerable" : true,
  94778. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
  94779. "cpe_name" : [ ]
  94780. }, {
  94781. "vulnerable" : true,
  94782. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
  94783. "cpe_name" : [ ]
  94784. }, {
  94785. "vulnerable" : true,
  94786. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
  94787. "cpe_name" : [ ]
  94788. }, {
  94789. "vulnerable" : true,
  94790. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
  94791. "cpe_name" : [ ]
  94792. }, {
  94793. "vulnerable" : true,
  94794. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
  94795. "cpe_name" : [ ]
  94796. }, {
  94797. "vulnerable" : true,
  94798. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
  94799. "cpe_name" : [ ]
  94800. }, {
  94801. "vulnerable" : true,
  94802. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
  94803. "cpe_name" : [ ]
  94804. }, {
  94805. "vulnerable" : true,
  94806. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
  94807. "cpe_name" : [ ]
  94808. }, {
  94809. "vulnerable" : true,
  94810. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
  94811. "cpe_name" : [ ]
  94812. }, {
  94813. "vulnerable" : true,
  94814. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
  94815. "cpe_name" : [ ]
  94816. }, {
  94817. "vulnerable" : true,
  94818. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
  94819. "cpe_name" : [ ]
  94820. }, {
  94821. "vulnerable" : true,
  94822. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
  94823. "cpe_name" : [ ]
  94824. }, {
  94825. "vulnerable" : true,
  94826. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
  94827. "cpe_name" : [ ]
  94828. }, {
  94829. "vulnerable" : true,
  94830. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
  94831. "cpe_name" : [ ]
  94832. }, {
  94833. "vulnerable" : true,
  94834. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
  94835. "cpe_name" : [ ]
  94836. }, {
  94837. "vulnerable" : true,
  94838. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
  94839. "cpe_name" : [ ]
  94840. }, {
  94841. "vulnerable" : true,
  94842. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
  94843. "cpe_name" : [ ]
  94844. }, {
  94845. "vulnerable" : true,
  94846. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
  94847. "cpe_name" : [ ]
  94848. }, {
  94849. "vulnerable" : true,
  94850. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
  94851. "cpe_name" : [ ]
  94852. }, {
  94853. "vulnerable" : true,
  94854. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
  94855. "cpe_name" : [ ]
  94856. }, {
  94857. "vulnerable" : true,
  94858. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
  94859. "cpe_name" : [ ]
  94860. }, {
  94861. "vulnerable" : true,
  94862. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
  94863. "cpe_name" : [ ]
  94864. }, {
  94865. "vulnerable" : true,
  94866. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
  94867. "cpe_name" : [ ]
  94868. }, {
  94869. "vulnerable" : true,
  94870. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
  94871. "cpe_name" : [ ]
  94872. }, {
  94873. "vulnerable" : true,
  94874. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
  94875. "cpe_name" : [ ]
  94876. }, {
  94877. "vulnerable" : true,
  94878. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
  94879. "cpe_name" : [ ]
  94880. }, {
  94881. "vulnerable" : true,
  94882. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
  94883. "cpe_name" : [ ]
  94884. }, {
  94885. "vulnerable" : true,
  94886. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
  94887. "cpe_name" : [ ]
  94888. }, {
  94889. "vulnerable" : true,
  94890. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
  94891. "cpe_name" : [ ]
  94892. }, {
  94893. "vulnerable" : true,
  94894. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
  94895. "cpe_name" : [ ]
  94896. }, {
  94897. "vulnerable" : true,
  94898. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
  94899. "cpe_name" : [ ]
  94900. }, {
  94901. "vulnerable" : true,
  94902. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
  94903. "cpe_name" : [ ]
  94904. }, {
  94905. "vulnerable" : true,
  94906. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
  94907. "cpe_name" : [ ]
  94908. }, {
  94909. "vulnerable" : true,
  94910. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
  94911. "cpe_name" : [ ]
  94912. }, {
  94913. "vulnerable" : true,
  94914. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
  94915. "cpe_name" : [ ]
  94916. }, {
  94917. "vulnerable" : true,
  94918. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
  94919. "cpe_name" : [ ]
  94920. }, {
  94921. "vulnerable" : true,
  94922. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
  94923. "cpe_name" : [ ]
  94924. }, {
  94925. "vulnerable" : true,
  94926. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
  94927. "cpe_name" : [ ]
  94928. }, {
  94929. "vulnerable" : true,
  94930. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
  94931. "cpe_name" : [ ]
  94932. }, {
  94933. "vulnerable" : true,
  94934. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
  94935. "cpe_name" : [ ]
  94936. }, {
  94937. "vulnerable" : true,
  94938. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
  94939. "cpe_name" : [ ]
  94940. }, {
  94941. "vulnerable" : true,
  94942. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
  94943. "cpe_name" : [ ]
  94944. }, {
  94945. "vulnerable" : true,
  94946. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
  94947. "cpe_name" : [ ]
  94948. }, {
  94949. "vulnerable" : true,
  94950. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*",
  94951. "cpe_name" : [ ]
  94952. }, {
  94953. "vulnerable" : true,
  94954. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*",
  94955. "cpe_name" : [ ]
  94956. }, {
  94957. "vulnerable" : true,
  94958. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
  94959. "cpe_name" : [ ]
  94960. }, {
  94961. "vulnerable" : true,
  94962. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*",
  94963. "cpe_name" : [ ]
  94964. }, {
  94965. "vulnerable" : true,
  94966. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*",
  94967. "cpe_name" : [ ]
  94968. }, {
  94969. "vulnerable" : true,
  94970. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
  94971. "cpe_name" : [ ]
  94972. }, {
  94973. "vulnerable" : true,
  94974. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
  94975. "cpe_name" : [ ]
  94976. }, {
  94977. "vulnerable" : true,
  94978. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
  94979. "cpe_name" : [ ]
  94980. }, {
  94981. "vulnerable" : true,
  94982. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
  94983. "cpe_name" : [ ]
  94984. }, {
  94985. "vulnerable" : true,
  94986. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
  94987. "cpe_name" : [ ]
  94988. }, {
  94989. "vulnerable" : true,
  94990. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
  94991. "cpe_name" : [ ]
  94992. }, {
  94993. "vulnerable" : true,
  94994. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
  94995. "cpe_name" : [ ]
  94996. }, {
  94997. "vulnerable" : true,
  94998. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
  94999. "cpe_name" : [ ]
  95000. }, {
  95001. "vulnerable" : true,
  95002. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
  95003. "cpe_name" : [ ]
  95004. }, {
  95005. "vulnerable" : true,
  95006. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
  95007. "cpe_name" : [ ]
  95008. }, {
  95009. "vulnerable" : true,
  95010. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
  95011. "cpe_name" : [ ]
  95012. }, {
  95013. "vulnerable" : true,
  95014. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
  95015. "cpe_name" : [ ]
  95016. }, {
  95017. "vulnerable" : true,
  95018. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
  95019. "cpe_name" : [ ]
  95020. }, {
  95021. "vulnerable" : true,
  95022. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
  95023. "cpe_name" : [ ]
  95024. }, {
  95025. "vulnerable" : true,
  95026. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
  95027. "cpe_name" : [ ]
  95028. }, {
  95029. "vulnerable" : true,
  95030. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
  95031. "cpe_name" : [ ]
  95032. }, {
  95033. "vulnerable" : true,
  95034. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
  95035. "cpe_name" : [ ]
  95036. }, {
  95037. "vulnerable" : true,
  95038. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
  95039. "cpe_name" : [ ]
  95040. }, {
  95041. "vulnerable" : true,
  95042. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
  95043. "cpe_name" : [ ]
  95044. }, {
  95045. "vulnerable" : true,
  95046. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
  95047. "cpe_name" : [ ]
  95048. }, {
  95049. "vulnerable" : true,
  95050. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
  95051. "cpe_name" : [ ]
  95052. }, {
  95053. "vulnerable" : true,
  95054. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
  95055. "cpe_name" : [ ]
  95056. }, {
  95057. "vulnerable" : true,
  95058. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
  95059. "cpe_name" : [ ]
  95060. }, {
  95061. "vulnerable" : true,
  95062. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
  95063. "cpe_name" : [ ]
  95064. }, {
  95065. "vulnerable" : true,
  95066. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
  95067. "cpe_name" : [ ]
  95068. }, {
  95069. "vulnerable" : true,
  95070. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
  95071. "cpe_name" : [ ]
  95072. }, {
  95073. "vulnerable" : true,
  95074. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
  95075. "cpe_name" : [ ]
  95076. }, {
  95077. "vulnerable" : true,
  95078. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
  95079. "cpe_name" : [ ]
  95080. }, {
  95081. "vulnerable" : true,
  95082. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
  95083. "cpe_name" : [ ]
  95084. }, {
  95085. "vulnerable" : true,
  95086. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
  95087. "cpe_name" : [ ]
  95088. }, {
  95089. "vulnerable" : true,
  95090. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
  95091. "cpe_name" : [ ]
  95092. }, {
  95093. "vulnerable" : true,
  95094. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
  95095. "cpe_name" : [ ]
  95096. }, {
  95097. "vulnerable" : true,
  95098. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
  95099. "cpe_name" : [ ]
  95100. }, {
  95101. "vulnerable" : true,
  95102. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
  95103. "cpe_name" : [ ]
  95104. }, {
  95105. "vulnerable" : true,
  95106. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*",
  95107. "cpe_name" : [ ]
  95108. }, {
  95109. "vulnerable" : true,
  95110. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
  95111. "cpe_name" : [ ]
  95112. }, {
  95113. "vulnerable" : true,
  95114. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
  95115. "cpe_name" : [ ]
  95116. }, {
  95117. "vulnerable" : true,
  95118. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
  95119. "cpe_name" : [ ]
  95120. }, {
  95121. "vulnerable" : true,
  95122. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
  95123. "cpe_name" : [ ]
  95124. }, {
  95125. "vulnerable" : true,
  95126. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
  95127. "cpe_name" : [ ]
  95128. }, {
  95129. "vulnerable" : true,
  95130. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
  95131. "cpe_name" : [ ]
  95132. }, {
  95133. "vulnerable" : true,
  95134. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
  95135. "cpe_name" : [ ]
  95136. }, {
  95137. "vulnerable" : true,
  95138. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
  95139. "cpe_name" : [ ]
  95140. }, {
  95141. "vulnerable" : true,
  95142. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
  95143. "cpe_name" : [ ]
  95144. }, {
  95145. "vulnerable" : true,
  95146. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
  95147. "cpe_name" : [ ]
  95148. }, {
  95149. "vulnerable" : true,
  95150. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
  95151. "cpe_name" : [ ]
  95152. }, {
  95153. "vulnerable" : true,
  95154. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
  95155. "cpe_name" : [ ]
  95156. }, {
  95157. "vulnerable" : true,
  95158. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
  95159. "cpe_name" : [ ]
  95160. }, {
  95161. "vulnerable" : true,
  95162. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
  95163. "cpe_name" : [ ]
  95164. }, {
  95165. "vulnerable" : true,
  95166. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
  95167. "cpe_name" : [ ]
  95168. }, {
  95169. "vulnerable" : true,
  95170. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
  95171. "cpe_name" : [ ]
  95172. }, {
  95173. "vulnerable" : true,
  95174. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
  95175. "cpe_name" : [ ]
  95176. }, {
  95177. "vulnerable" : true,
  95178. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
  95179. "cpe_name" : [ ]
  95180. }, {
  95181. "vulnerable" : true,
  95182. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
  95183. "cpe_name" : [ ]
  95184. }, {
  95185. "vulnerable" : true,
  95186. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
  95187. "cpe_name" : [ ]
  95188. }, {
  95189. "vulnerable" : true,
  95190. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
  95191. "cpe_name" : [ ]
  95192. }, {
  95193. "vulnerable" : true,
  95194. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
  95195. "cpe_name" : [ ]
  95196. }, {
  95197. "vulnerable" : true,
  95198. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
  95199. "cpe_name" : [ ]
  95200. }, {
  95201. "vulnerable" : true,
  95202. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
  95203. "cpe_name" : [ ]
  95204. }, {
  95205. "vulnerable" : true,
  95206. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
  95207. "cpe_name" : [ ]
  95208. }, {
  95209. "vulnerable" : true,
  95210. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
  95211. "cpe_name" : [ ]
  95212. }, {
  95213. "vulnerable" : true,
  95214. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
  95215. "cpe_name" : [ ]
  95216. }, {
  95217. "vulnerable" : true,
  95218. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
  95219. "cpe_name" : [ ]
  95220. }, {
  95221. "vulnerable" : true,
  95222. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
  95223. "cpe_name" : [ ]
  95224. }, {
  95225. "vulnerable" : true,
  95226. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
  95227. "cpe_name" : [ ]
  95228. }, {
  95229. "vulnerable" : true,
  95230. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
  95231. "cpe_name" : [ ]
  95232. }, {
  95233. "vulnerable" : true,
  95234. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
  95235. "cpe_name" : [ ]
  95236. }, {
  95237. "vulnerable" : true,
  95238. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
  95239. "cpe_name" : [ ]
  95240. }, {
  95241. "vulnerable" : true,
  95242. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
  95243. "cpe_name" : [ ]
  95244. }, {
  95245. "vulnerable" : true,
  95246. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
  95247. "cpe_name" : [ ]
  95248. }, {
  95249. "vulnerable" : true,
  95250. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
  95251. "cpe_name" : [ ]
  95252. }, {
  95253. "vulnerable" : true,
  95254. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
  95255. "cpe_name" : [ ]
  95256. }, {
  95257. "vulnerable" : true,
  95258. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*",
  95259. "cpe_name" : [ ]
  95260. } ]
  95261. } ]
  95262. },
  95263. "impact" : {
  95264. "baseMetricV3" : {
  95265. "cvssV3" : {
  95266. "version" : "3.0",
  95267. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  95268. "attackVector" : "NETWORK",
  95269. "attackComplexity" : "LOW",
  95270. "privilegesRequired" : "NONE",
  95271. "userInteraction" : "REQUIRED",
  95272. "scope" : "CHANGED",
  95273. "confidentialityImpact" : "LOW",
  95274. "integrityImpact" : "LOW",
  95275. "availabilityImpact" : "NONE",
  95276. "baseScore" : 6.1,
  95277. "baseSeverity" : "MEDIUM"
  95278. },
  95279. "exploitabilityScore" : 2.8,
  95280. "impactScore" : 2.7
  95281. },
  95282. "baseMetricV2" : {
  95283. "cvssV2" : {
  95284. "version" : "2.0",
  95285. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  95286. "accessVector" : "NETWORK",
  95287. "accessComplexity" : "MEDIUM",
  95288. "authentication" : "NONE",
  95289. "confidentialityImpact" : "NONE",
  95290. "integrityImpact" : "PARTIAL",
  95291. "availabilityImpact" : "NONE",
  95292. "baseScore" : 4.3
  95293. },
  95294. "severity" : "MEDIUM",
  95295. "exploitabilityScore" : 8.6,
  95296. "impactScore" : 2.9,
  95297. "acInsufInfo" : false,
  95298. "obtainAllPrivilege" : false,
  95299. "obtainUserPrivilege" : false,
  95300. "obtainOtherPrivilege" : false,
  95301. "userInteractionRequired" : true
  95302. }
  95303. },
  95304. "publishedDate" : "2018-11-20T19:29Z",
  95305. "lastModifiedDate" : "2021-05-04T15:06Z"
  95306. }, {
  95307. "cve" : {
  95308. "data_type" : "CVE",
  95309. "data_format" : "MITRE",
  95310. "data_version" : "4.0",
  95311. "CVE_data_meta" : {
  95312. "ID" : "CVE-2018-18715",
  95313. "ASSIGNER" : "cve@mitre.org"
  95314. },
  95315. "problemtype" : {
  95316. "problemtype_data" : [ {
  95317. "description" : [ {
  95318. "lang" : "en",
  95319. "value" : "CWE-79"
  95320. } ]
  95321. } ]
  95322. },
  95323. "references" : {
  95324. "reference_data" : [ {
  95325. "url" : "https://seclists.org/bugtraq/2018/Oct/60",
  95326. "name" : "20181031 Zoho ManageEngine OpManager 12.3 allows Stored XSS",
  95327. "refsource" : "BUGTRAQ",
  95328. "tags" : [ "Mailing List", "Third Party Advisory" ]
  95329. }, {
  95330. "url" : "http://seclists.org/fulldisclosure/2018/Nov/3",
  95331. "name" : "20181102 Zoho ManageEngine OpManager 12.3 allows Stored XSS",
  95332. "refsource" : "FULLDISC",
  95333. "tags" : [ "Mailing List", "Third Party Advisory" ]
  95334. }, {
  95335. "url" : "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html",
  95336. "name" : "http://packetstormsecurity.com/files/150124/Zoho-ManageEngine-OpManager-12.3-Cross-Site-Scripting.html",
  95337. "refsource" : "MISC",
  95338. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  95339. } ]
  95340. },
  95341. "description" : {
  95342. "description_data" : [ {
  95343. "lang" : "en",
  95344. "value" : "Zoho ManageEngine OpManager 12.3 before 123219 has stored XSS."
  95345. } ]
  95346. }
  95347. },
  95348. "configurations" : {
  95349. "CVE_data_version" : "4.0",
  95350. "nodes" : [ {
  95351. "operator" : "OR",
  95352. "children" : [ ],
  95353. "cpe_match" : [ {
  95354. "vulnerable" : true,
  95355. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
  95356. "cpe_name" : [ ]
  95357. }, {
  95358. "vulnerable" : true,
  95359. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
  95360. "cpe_name" : [ ]
  95361. }, {
  95362. "vulnerable" : true,
  95363. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
  95364. "cpe_name" : [ ]
  95365. }, {
  95366. "vulnerable" : true,
  95367. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
  95368. "cpe_name" : [ ]
  95369. }, {
  95370. "vulnerable" : true,
  95371. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
  95372. "cpe_name" : [ ]
  95373. }, {
  95374. "vulnerable" : true,
  95375. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
  95376. "cpe_name" : [ ]
  95377. }, {
  95378. "vulnerable" : true,
  95379. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
  95380. "cpe_name" : [ ]
  95381. }, {
  95382. "vulnerable" : true,
  95383. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
  95384. "cpe_name" : [ ]
  95385. }, {
  95386. "vulnerable" : true,
  95387. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
  95388. "cpe_name" : [ ]
  95389. }, {
  95390. "vulnerable" : true,
  95391. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
  95392. "cpe_name" : [ ]
  95393. }, {
  95394. "vulnerable" : true,
  95395. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
  95396. "cpe_name" : [ ]
  95397. }, {
  95398. "vulnerable" : true,
  95399. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
  95400. "cpe_name" : [ ]
  95401. }, {
  95402. "vulnerable" : true,
  95403. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
  95404. "cpe_name" : [ ]
  95405. }, {
  95406. "vulnerable" : true,
  95407. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
  95408. "cpe_name" : [ ]
  95409. }, {
  95410. "vulnerable" : true,
  95411. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
  95412. "cpe_name" : [ ]
  95413. }, {
  95414. "vulnerable" : true,
  95415. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
  95416. "cpe_name" : [ ]
  95417. }, {
  95418. "vulnerable" : true,
  95419. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
  95420. "cpe_name" : [ ]
  95421. }, {
  95422. "vulnerable" : true,
  95423. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
  95424. "cpe_name" : [ ]
  95425. }, {
  95426. "vulnerable" : true,
  95427. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
  95428. "cpe_name" : [ ]
  95429. }, {
  95430. "vulnerable" : true,
  95431. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
  95432. "cpe_name" : [ ]
  95433. }, {
  95434. "vulnerable" : true,
  95435. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
  95436. "cpe_name" : [ ]
  95437. }, {
  95438. "vulnerable" : true,
  95439. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
  95440. "cpe_name" : [ ]
  95441. }, {
  95442. "vulnerable" : true,
  95443. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
  95444. "cpe_name" : [ ]
  95445. }, {
  95446. "vulnerable" : true,
  95447. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
  95448. "cpe_name" : [ ]
  95449. }, {
  95450. "vulnerable" : true,
  95451. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
  95452. "cpe_name" : [ ]
  95453. }, {
  95454. "vulnerable" : true,
  95455. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
  95456. "cpe_name" : [ ]
  95457. }, {
  95458. "vulnerable" : true,
  95459. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
  95460. "cpe_name" : [ ]
  95461. }, {
  95462. "vulnerable" : true,
  95463. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
  95464. "cpe_name" : [ ]
  95465. }, {
  95466. "vulnerable" : true,
  95467. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
  95468. "cpe_name" : [ ]
  95469. }, {
  95470. "vulnerable" : true,
  95471. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
  95472. "cpe_name" : [ ]
  95473. }, {
  95474. "vulnerable" : true,
  95475. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
  95476. "cpe_name" : [ ]
  95477. }, {
  95478. "vulnerable" : true,
  95479. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
  95480. "cpe_name" : [ ]
  95481. }, {
  95482. "vulnerable" : true,
  95483. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
  95484. "cpe_name" : [ ]
  95485. }, {
  95486. "vulnerable" : true,
  95487. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
  95488. "cpe_name" : [ ]
  95489. }, {
  95490. "vulnerable" : true,
  95491. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
  95492. "cpe_name" : [ ]
  95493. }, {
  95494. "vulnerable" : true,
  95495. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
  95496. "cpe_name" : [ ]
  95497. }, {
  95498. "vulnerable" : true,
  95499. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
  95500. "cpe_name" : [ ]
  95501. }, {
  95502. "vulnerable" : true,
  95503. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
  95504. "cpe_name" : [ ]
  95505. }, {
  95506. "vulnerable" : true,
  95507. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
  95508. "cpe_name" : [ ]
  95509. }, {
  95510. "vulnerable" : true,
  95511. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
  95512. "cpe_name" : [ ]
  95513. }, {
  95514. "vulnerable" : true,
  95515. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
  95516. "cpe_name" : [ ]
  95517. }, {
  95518. "vulnerable" : true,
  95519. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
  95520. "cpe_name" : [ ]
  95521. }, {
  95522. "vulnerable" : true,
  95523. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
  95524. "cpe_name" : [ ]
  95525. }, {
  95526. "vulnerable" : true,
  95527. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
  95528. "cpe_name" : [ ]
  95529. }, {
  95530. "vulnerable" : true,
  95531. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
  95532. "cpe_name" : [ ]
  95533. }, {
  95534. "vulnerable" : true,
  95535. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
  95536. "cpe_name" : [ ]
  95537. }, {
  95538. "vulnerable" : true,
  95539. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
  95540. "cpe_name" : [ ]
  95541. }, {
  95542. "vulnerable" : true,
  95543. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
  95544. "cpe_name" : [ ]
  95545. }, {
  95546. "vulnerable" : true,
  95547. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
  95548. "cpe_name" : [ ]
  95549. }, {
  95550. "vulnerable" : true,
  95551. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
  95552. "cpe_name" : [ ]
  95553. }, {
  95554. "vulnerable" : true,
  95555. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
  95556. "cpe_name" : [ ]
  95557. }, {
  95558. "vulnerable" : true,
  95559. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
  95560. "cpe_name" : [ ]
  95561. }, {
  95562. "vulnerable" : true,
  95563. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
  95564. "cpe_name" : [ ]
  95565. }, {
  95566. "vulnerable" : true,
  95567. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
  95568. "cpe_name" : [ ]
  95569. }, {
  95570. "vulnerable" : true,
  95571. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
  95572. "cpe_name" : [ ]
  95573. }, {
  95574. "vulnerable" : true,
  95575. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
  95576. "cpe_name" : [ ]
  95577. }, {
  95578. "vulnerable" : true,
  95579. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
  95580. "cpe_name" : [ ]
  95581. }, {
  95582. "vulnerable" : true,
  95583. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
  95584. "cpe_name" : [ ]
  95585. }, {
  95586. "vulnerable" : true,
  95587. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
  95588. "cpe_name" : [ ]
  95589. }, {
  95590. "vulnerable" : true,
  95591. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
  95592. "cpe_name" : [ ]
  95593. }, {
  95594. "vulnerable" : true,
  95595. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
  95596. "cpe_name" : [ ]
  95597. }, {
  95598. "vulnerable" : true,
  95599. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
  95600. "cpe_name" : [ ]
  95601. }, {
  95602. "vulnerable" : true,
  95603. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
  95604. "cpe_name" : [ ]
  95605. }, {
  95606. "vulnerable" : true,
  95607. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
  95608. "cpe_name" : [ ]
  95609. }, {
  95610. "vulnerable" : true,
  95611. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
  95612. "cpe_name" : [ ]
  95613. }, {
  95614. "vulnerable" : true,
  95615. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
  95616. "cpe_name" : [ ]
  95617. }, {
  95618. "vulnerable" : true,
  95619. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
  95620. "cpe_name" : [ ]
  95621. }, {
  95622. "vulnerable" : true,
  95623. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
  95624. "cpe_name" : [ ]
  95625. }, {
  95626. "vulnerable" : true,
  95627. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
  95628. "cpe_name" : [ ]
  95629. }, {
  95630. "vulnerable" : true,
  95631. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
  95632. "cpe_name" : [ ]
  95633. }, {
  95634. "vulnerable" : true,
  95635. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
  95636. "cpe_name" : [ ]
  95637. }, {
  95638. "vulnerable" : true,
  95639. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*",
  95640. "cpe_name" : [ ]
  95641. }, {
  95642. "vulnerable" : true,
  95643. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*",
  95644. "cpe_name" : [ ]
  95645. }, {
  95646. "vulnerable" : true,
  95647. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*",
  95648. "cpe_name" : [ ]
  95649. }, {
  95650. "vulnerable" : true,
  95651. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
  95652. "cpe_name" : [ ]
  95653. }, {
  95654. "vulnerable" : true,
  95655. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
  95656. "cpe_name" : [ ]
  95657. }, {
  95658. "vulnerable" : true,
  95659. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
  95660. "cpe_name" : [ ]
  95661. }, {
  95662. "vulnerable" : true,
  95663. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
  95664. "cpe_name" : [ ]
  95665. }, {
  95666. "vulnerable" : true,
  95667. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
  95668. "cpe_name" : [ ]
  95669. }, {
  95670. "vulnerable" : true,
  95671. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
  95672. "cpe_name" : [ ]
  95673. }, {
  95674. "vulnerable" : true,
  95675. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
  95676. "cpe_name" : [ ]
  95677. }, {
  95678. "vulnerable" : true,
  95679. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
  95680. "cpe_name" : [ ]
  95681. }, {
  95682. "vulnerable" : true,
  95683. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
  95684. "cpe_name" : [ ]
  95685. }, {
  95686. "vulnerable" : true,
  95687. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
  95688. "cpe_name" : [ ]
  95689. }, {
  95690. "vulnerable" : true,
  95691. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
  95692. "cpe_name" : [ ]
  95693. }, {
  95694. "vulnerable" : true,
  95695. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
  95696. "cpe_name" : [ ]
  95697. }, {
  95698. "vulnerable" : true,
  95699. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
  95700. "cpe_name" : [ ]
  95701. }, {
  95702. "vulnerable" : true,
  95703. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
  95704. "cpe_name" : [ ]
  95705. }, {
  95706. "vulnerable" : true,
  95707. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
  95708. "cpe_name" : [ ]
  95709. }, {
  95710. "vulnerable" : true,
  95711. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
  95712. "cpe_name" : [ ]
  95713. }, {
  95714. "vulnerable" : true,
  95715. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
  95716. "cpe_name" : [ ]
  95717. }, {
  95718. "vulnerable" : true,
  95719. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
  95720. "cpe_name" : [ ]
  95721. }, {
  95722. "vulnerable" : true,
  95723. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
  95724. "cpe_name" : [ ]
  95725. }, {
  95726. "vulnerable" : true,
  95727. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
  95728. "cpe_name" : [ ]
  95729. }, {
  95730. "vulnerable" : true,
  95731. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
  95732. "cpe_name" : [ ]
  95733. }, {
  95734. "vulnerable" : true,
  95735. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
  95736. "cpe_name" : [ ]
  95737. }, {
  95738. "vulnerable" : true,
  95739. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
  95740. "cpe_name" : [ ]
  95741. }, {
  95742. "vulnerable" : true,
  95743. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
  95744. "cpe_name" : [ ]
  95745. }, {
  95746. "vulnerable" : true,
  95747. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
  95748. "cpe_name" : [ ]
  95749. }, {
  95750. "vulnerable" : true,
  95751. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
  95752. "cpe_name" : [ ]
  95753. }, {
  95754. "vulnerable" : true,
  95755. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
  95756. "cpe_name" : [ ]
  95757. }, {
  95758. "vulnerable" : true,
  95759. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
  95760. "cpe_name" : [ ]
  95761. }, {
  95762. "vulnerable" : true,
  95763. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
  95764. "cpe_name" : [ ]
  95765. }, {
  95766. "vulnerable" : true,
  95767. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
  95768. "cpe_name" : [ ]
  95769. }, {
  95770. "vulnerable" : true,
  95771. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
  95772. "cpe_name" : [ ]
  95773. }, {
  95774. "vulnerable" : true,
  95775. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
  95776. "cpe_name" : [ ]
  95777. }, {
  95778. "vulnerable" : true,
  95779. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
  95780. "cpe_name" : [ ]
  95781. }, {
  95782. "vulnerable" : true,
  95783. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
  95784. "cpe_name" : [ ]
  95785. }, {
  95786. "vulnerable" : true,
  95787. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
  95788. "cpe_name" : [ ]
  95789. }, {
  95790. "vulnerable" : true,
  95791. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*",
  95792. "cpe_name" : [ ]
  95793. }, {
  95794. "vulnerable" : true,
  95795. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
  95796. "cpe_name" : [ ]
  95797. }, {
  95798. "vulnerable" : true,
  95799. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
  95800. "cpe_name" : [ ]
  95801. }, {
  95802. "vulnerable" : true,
  95803. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
  95804. "cpe_name" : [ ]
  95805. }, {
  95806. "vulnerable" : true,
  95807. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
  95808. "cpe_name" : [ ]
  95809. }, {
  95810. "vulnerable" : true,
  95811. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
  95812. "cpe_name" : [ ]
  95813. }, {
  95814. "vulnerable" : true,
  95815. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
  95816. "cpe_name" : [ ]
  95817. }, {
  95818. "vulnerable" : true,
  95819. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
  95820. "cpe_name" : [ ]
  95821. }, {
  95822. "vulnerable" : true,
  95823. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
  95824. "cpe_name" : [ ]
  95825. }, {
  95826. "vulnerable" : true,
  95827. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
  95828. "cpe_name" : [ ]
  95829. }, {
  95830. "vulnerable" : true,
  95831. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
  95832. "cpe_name" : [ ]
  95833. }, {
  95834. "vulnerable" : true,
  95835. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
  95836. "cpe_name" : [ ]
  95837. }, {
  95838. "vulnerable" : true,
  95839. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
  95840. "cpe_name" : [ ]
  95841. }, {
  95842. "vulnerable" : true,
  95843. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
  95844. "cpe_name" : [ ]
  95845. }, {
  95846. "vulnerable" : true,
  95847. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
  95848. "cpe_name" : [ ]
  95849. }, {
  95850. "vulnerable" : true,
  95851. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
  95852. "cpe_name" : [ ]
  95853. }, {
  95854. "vulnerable" : true,
  95855. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
  95856. "cpe_name" : [ ]
  95857. }, {
  95858. "vulnerable" : true,
  95859. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
  95860. "cpe_name" : [ ]
  95861. }, {
  95862. "vulnerable" : true,
  95863. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
  95864. "cpe_name" : [ ]
  95865. }, {
  95866. "vulnerable" : true,
  95867. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
  95868. "cpe_name" : [ ]
  95869. }, {
  95870. "vulnerable" : true,
  95871. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
  95872. "cpe_name" : [ ]
  95873. }, {
  95874. "vulnerable" : true,
  95875. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
  95876. "cpe_name" : [ ]
  95877. }, {
  95878. "vulnerable" : true,
  95879. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
  95880. "cpe_name" : [ ]
  95881. }, {
  95882. "vulnerable" : true,
  95883. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
  95884. "cpe_name" : [ ]
  95885. }, {
  95886. "vulnerable" : true,
  95887. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
  95888. "cpe_name" : [ ]
  95889. }, {
  95890. "vulnerable" : true,
  95891. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
  95892. "cpe_name" : [ ]
  95893. }, {
  95894. "vulnerable" : true,
  95895. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
  95896. "cpe_name" : [ ]
  95897. }, {
  95898. "vulnerable" : true,
  95899. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
  95900. "cpe_name" : [ ]
  95901. }, {
  95902. "vulnerable" : true,
  95903. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
  95904. "cpe_name" : [ ]
  95905. }, {
  95906. "vulnerable" : true,
  95907. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
  95908. "cpe_name" : [ ]
  95909. }, {
  95910. "vulnerable" : true,
  95911. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
  95912. "cpe_name" : [ ]
  95913. }, {
  95914. "vulnerable" : true,
  95915. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
  95916. "cpe_name" : [ ]
  95917. }, {
  95918. "vulnerable" : true,
  95919. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
  95920. "cpe_name" : [ ]
  95921. }, {
  95922. "vulnerable" : true,
  95923. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
  95924. "cpe_name" : [ ]
  95925. }, {
  95926. "vulnerable" : true,
  95927. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
  95928. "cpe_name" : [ ]
  95929. }, {
  95930. "vulnerable" : true,
  95931. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
  95932. "cpe_name" : [ ]
  95933. }, {
  95934. "vulnerable" : true,
  95935. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
  95936. "cpe_name" : [ ]
  95937. }, {
  95938. "vulnerable" : true,
  95939. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
  95940. "cpe_name" : [ ]
  95941. }, {
  95942. "vulnerable" : true,
  95943. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
  95944. "cpe_name" : [ ]
  95945. }, {
  95946. "vulnerable" : true,
  95947. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*",
  95948. "cpe_name" : [ ]
  95949. } ]
  95950. } ]
  95951. },
  95952. "impact" : {
  95953. "baseMetricV3" : {
  95954. "cvssV3" : {
  95955. "version" : "3.0",
  95956. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  95957. "attackVector" : "NETWORK",
  95958. "attackComplexity" : "LOW",
  95959. "privilegesRequired" : "NONE",
  95960. "userInteraction" : "REQUIRED",
  95961. "scope" : "CHANGED",
  95962. "confidentialityImpact" : "LOW",
  95963. "integrityImpact" : "LOW",
  95964. "availabilityImpact" : "NONE",
  95965. "baseScore" : 6.1,
  95966. "baseSeverity" : "MEDIUM"
  95967. },
  95968. "exploitabilityScore" : 2.8,
  95969. "impactScore" : 2.7
  95970. },
  95971. "baseMetricV2" : {
  95972. "cvssV2" : {
  95973. "version" : "2.0",
  95974. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  95975. "accessVector" : "NETWORK",
  95976. "accessComplexity" : "MEDIUM",
  95977. "authentication" : "NONE",
  95978. "confidentialityImpact" : "NONE",
  95979. "integrityImpact" : "PARTIAL",
  95980. "availabilityImpact" : "NONE",
  95981. "baseScore" : 4.3
  95982. },
  95983. "severity" : "MEDIUM",
  95984. "exploitabilityScore" : 8.6,
  95985. "impactScore" : 2.9,
  95986. "acInsufInfo" : false,
  95987. "obtainAllPrivilege" : false,
  95988. "obtainUserPrivilege" : false,
  95989. "obtainOtherPrivilege" : false,
  95990. "userInteractionRequired" : true
  95991. }
  95992. },
  95993. "publishedDate" : "2018-11-20T19:29Z",
  95994. "lastModifiedDate" : "2021-05-04T15:06Z"
  95995. }, {
  95996. "cve" : {
  95997. "data_type" : "CVE",
  95998. "data_format" : "MITRE",
  95999. "data_version" : "4.0",
  96000. "CVE_data_meta" : {
  96001. "ID" : "CVE-2018-19288",
  96002. "ASSIGNER" : "cve@mitre.org"
  96003. },
  96004. "problemtype" : {
  96005. "problemtype_data" : [ {
  96006. "description" : [ {
  96007. "lang" : "en",
  96008. "value" : "CWE-79"
  96009. } ]
  96010. } ]
  96011. },
  96012. "references" : {
  96013. "reference_data" : [ {
  96014. "url" : "https://www.manageengine.com/network-monitoring/help/read-me.html",
  96015. "name" : "https://www.manageengine.com/network-monitoring/help/read-me.html",
  96016. "refsource" : "MISC",
  96017. "tags" : [ "Vendor Advisory" ]
  96018. }, {
  96019. "url" : "http://www.securityfocus.com/bid/105960",
  96020. "name" : "105960",
  96021. "refsource" : "BID",
  96022. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  96023. } ]
  96024. },
  96025. "description" : {
  96026. "description_data" : [ {
  96027. "lang" : "en",
  96028. "value" : "Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API."
  96029. } ]
  96030. }
  96031. },
  96032. "configurations" : {
  96033. "CVE_data_version" : "4.0",
  96034. "nodes" : [ {
  96035. "operator" : "OR",
  96036. "children" : [ ],
  96037. "cpe_match" : [ {
  96038. "vulnerable" : true,
  96039. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
  96040. "cpe_name" : [ ]
  96041. }, {
  96042. "vulnerable" : true,
  96043. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*",
  96044. "cpe_name" : [ ]
  96045. }, {
  96046. "vulnerable" : true,
  96047. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*",
  96048. "cpe_name" : [ ]
  96049. }, {
  96050. "vulnerable" : true,
  96051. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
  96052. "cpe_name" : [ ]
  96053. }, {
  96054. "vulnerable" : true,
  96055. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
  96056. "cpe_name" : [ ]
  96057. }, {
  96058. "vulnerable" : true,
  96059. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
  96060. "cpe_name" : [ ]
  96061. }, {
  96062. "vulnerable" : true,
  96063. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
  96064. "cpe_name" : [ ]
  96065. }, {
  96066. "vulnerable" : true,
  96067. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
  96068. "cpe_name" : [ ]
  96069. }, {
  96070. "vulnerable" : true,
  96071. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
  96072. "cpe_name" : [ ]
  96073. }, {
  96074. "vulnerable" : true,
  96075. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
  96076. "cpe_name" : [ ]
  96077. }, {
  96078. "vulnerable" : true,
  96079. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
  96080. "cpe_name" : [ ]
  96081. }, {
  96082. "vulnerable" : true,
  96083. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
  96084. "cpe_name" : [ ]
  96085. }, {
  96086. "vulnerable" : true,
  96087. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
  96088. "cpe_name" : [ ]
  96089. }, {
  96090. "vulnerable" : true,
  96091. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
  96092. "cpe_name" : [ ]
  96093. }, {
  96094. "vulnerable" : true,
  96095. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
  96096. "cpe_name" : [ ]
  96097. }, {
  96098. "vulnerable" : true,
  96099. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
  96100. "cpe_name" : [ ]
  96101. }, {
  96102. "vulnerable" : true,
  96103. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
  96104. "cpe_name" : [ ]
  96105. }, {
  96106. "vulnerable" : true,
  96107. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
  96108. "cpe_name" : [ ]
  96109. }, {
  96110. "vulnerable" : true,
  96111. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
  96112. "cpe_name" : [ ]
  96113. }, {
  96114. "vulnerable" : true,
  96115. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
  96116. "cpe_name" : [ ]
  96117. }, {
  96118. "vulnerable" : true,
  96119. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
  96120. "cpe_name" : [ ]
  96121. }, {
  96122. "vulnerable" : true,
  96123. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
  96124. "cpe_name" : [ ]
  96125. }, {
  96126. "vulnerable" : true,
  96127. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
  96128. "cpe_name" : [ ]
  96129. }, {
  96130. "vulnerable" : true,
  96131. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
  96132. "cpe_name" : [ ]
  96133. }, {
  96134. "vulnerable" : true,
  96135. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
  96136. "cpe_name" : [ ]
  96137. }, {
  96138. "vulnerable" : true,
  96139. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
  96140. "cpe_name" : [ ]
  96141. }, {
  96142. "vulnerable" : true,
  96143. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
  96144. "cpe_name" : [ ]
  96145. }, {
  96146. "vulnerable" : true,
  96147. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
  96148. "cpe_name" : [ ]
  96149. }, {
  96150. "vulnerable" : true,
  96151. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
  96152. "cpe_name" : [ ]
  96153. }, {
  96154. "vulnerable" : true,
  96155. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
  96156. "cpe_name" : [ ]
  96157. }, {
  96158. "vulnerable" : true,
  96159. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
  96160. "cpe_name" : [ ]
  96161. }, {
  96162. "vulnerable" : true,
  96163. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
  96164. "cpe_name" : [ ]
  96165. }, {
  96166. "vulnerable" : true,
  96167. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
  96168. "cpe_name" : [ ]
  96169. }, {
  96170. "vulnerable" : true,
  96171. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
  96172. "cpe_name" : [ ]
  96173. }, {
  96174. "vulnerable" : true,
  96175. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
  96176. "cpe_name" : [ ]
  96177. }, {
  96178. "vulnerable" : true,
  96179. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
  96180. "cpe_name" : [ ]
  96181. }, {
  96182. "vulnerable" : true,
  96183. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
  96184. "cpe_name" : [ ]
  96185. }, {
  96186. "vulnerable" : true,
  96187. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*",
  96188. "cpe_name" : [ ]
  96189. }, {
  96190. "vulnerable" : true,
  96191. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*",
  96192. "cpe_name" : [ ]
  96193. }, {
  96194. "vulnerable" : true,
  96195. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123219:*:*:*:*:*:*",
  96196. "cpe_name" : [ ]
  96197. }, {
  96198. "vulnerable" : true,
  96199. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123220:*:*:*:*:*:*",
  96200. "cpe_name" : [ ]
  96201. }, {
  96202. "vulnerable" : true,
  96203. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
  96204. "cpe_name" : [ ]
  96205. }, {
  96206. "vulnerable" : true,
  96207. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
  96208. "cpe_name" : [ ]
  96209. }, {
  96210. "vulnerable" : true,
  96211. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
  96212. "cpe_name" : [ ]
  96213. }, {
  96214. "vulnerable" : true,
  96215. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
  96216. "cpe_name" : [ ]
  96217. }, {
  96218. "vulnerable" : true,
  96219. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
  96220. "cpe_name" : [ ]
  96221. }, {
  96222. "vulnerable" : true,
  96223. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
  96224. "cpe_name" : [ ]
  96225. }, {
  96226. "vulnerable" : true,
  96227. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
  96228. "cpe_name" : [ ]
  96229. }, {
  96230. "vulnerable" : true,
  96231. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
  96232. "cpe_name" : [ ]
  96233. }, {
  96234. "vulnerable" : true,
  96235. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
  96236. "cpe_name" : [ ]
  96237. }, {
  96238. "vulnerable" : true,
  96239. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
  96240. "cpe_name" : [ ]
  96241. }, {
  96242. "vulnerable" : true,
  96243. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
  96244. "cpe_name" : [ ]
  96245. }, {
  96246. "vulnerable" : true,
  96247. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
  96248. "cpe_name" : [ ]
  96249. }, {
  96250. "vulnerable" : true,
  96251. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
  96252. "cpe_name" : [ ]
  96253. }, {
  96254. "vulnerable" : true,
  96255. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
  96256. "cpe_name" : [ ]
  96257. }, {
  96258. "vulnerable" : true,
  96259. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
  96260. "cpe_name" : [ ]
  96261. }, {
  96262. "vulnerable" : true,
  96263. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
  96264. "cpe_name" : [ ]
  96265. }, {
  96266. "vulnerable" : true,
  96267. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
  96268. "cpe_name" : [ ]
  96269. }, {
  96270. "vulnerable" : true,
  96271. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
  96272. "cpe_name" : [ ]
  96273. }, {
  96274. "vulnerable" : true,
  96275. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
  96276. "cpe_name" : [ ]
  96277. }, {
  96278. "vulnerable" : true,
  96279. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
  96280. "cpe_name" : [ ]
  96281. }, {
  96282. "vulnerable" : true,
  96283. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
  96284. "cpe_name" : [ ]
  96285. }, {
  96286. "vulnerable" : true,
  96287. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
  96288. "cpe_name" : [ ]
  96289. }, {
  96290. "vulnerable" : true,
  96291. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
  96292. "cpe_name" : [ ]
  96293. }, {
  96294. "vulnerable" : true,
  96295. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
  96296. "cpe_name" : [ ]
  96297. }, {
  96298. "vulnerable" : true,
  96299. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
  96300. "cpe_name" : [ ]
  96301. }, {
  96302. "vulnerable" : true,
  96303. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
  96304. "cpe_name" : [ ]
  96305. }, {
  96306. "vulnerable" : true,
  96307. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
  96308. "cpe_name" : [ ]
  96309. }, {
  96310. "vulnerable" : true,
  96311. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
  96312. "cpe_name" : [ ]
  96313. }, {
  96314. "vulnerable" : true,
  96315. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
  96316. "cpe_name" : [ ]
  96317. }, {
  96318. "vulnerable" : true,
  96319. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
  96320. "cpe_name" : [ ]
  96321. }, {
  96322. "vulnerable" : true,
  96323. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
  96324. "cpe_name" : [ ]
  96325. }, {
  96326. "vulnerable" : true,
  96327. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
  96328. "cpe_name" : [ ]
  96329. }, {
  96330. "vulnerable" : true,
  96331. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
  96332. "cpe_name" : [ ]
  96333. }, {
  96334. "vulnerable" : true,
  96335. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
  96336. "cpe_name" : [ ]
  96337. }, {
  96338. "vulnerable" : true,
  96339. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
  96340. "cpe_name" : [ ]
  96341. }, {
  96342. "vulnerable" : true,
  96343. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*",
  96344. "cpe_name" : [ ]
  96345. }, {
  96346. "vulnerable" : true,
  96347. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123221:*:*:*:*:*:*",
  96348. "cpe_name" : [ ]
  96349. }, {
  96350. "vulnerable" : true,
  96351. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
  96352. "cpe_name" : [ ]
  96353. }, {
  96354. "vulnerable" : true,
  96355. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
  96356. "cpe_name" : [ ]
  96357. }, {
  96358. "vulnerable" : true,
  96359. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
  96360. "cpe_name" : [ ]
  96361. }, {
  96362. "vulnerable" : true,
  96363. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
  96364. "cpe_name" : [ ]
  96365. }, {
  96366. "vulnerable" : true,
  96367. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
  96368. "cpe_name" : [ ]
  96369. }, {
  96370. "vulnerable" : true,
  96371. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
  96372. "cpe_name" : [ ]
  96373. }, {
  96374. "vulnerable" : true,
  96375. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
  96376. "cpe_name" : [ ]
  96377. }, {
  96378. "vulnerable" : true,
  96379. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
  96380. "cpe_name" : [ ]
  96381. }, {
  96382. "vulnerable" : true,
  96383. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
  96384. "cpe_name" : [ ]
  96385. }, {
  96386. "vulnerable" : true,
  96387. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
  96388. "cpe_name" : [ ]
  96389. }, {
  96390. "vulnerable" : true,
  96391. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
  96392. "cpe_name" : [ ]
  96393. }, {
  96394. "vulnerable" : true,
  96395. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
  96396. "cpe_name" : [ ]
  96397. }, {
  96398. "vulnerable" : true,
  96399. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
  96400. "cpe_name" : [ ]
  96401. }, {
  96402. "vulnerable" : true,
  96403. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
  96404. "cpe_name" : [ ]
  96405. }, {
  96406. "vulnerable" : true,
  96407. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
  96408. "cpe_name" : [ ]
  96409. }, {
  96410. "vulnerable" : true,
  96411. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
  96412. "cpe_name" : [ ]
  96413. }, {
  96414. "vulnerable" : true,
  96415. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
  96416. "cpe_name" : [ ]
  96417. }, {
  96418. "vulnerable" : true,
  96419. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
  96420. "cpe_name" : [ ]
  96421. }, {
  96422. "vulnerable" : true,
  96423. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
  96424. "cpe_name" : [ ]
  96425. }, {
  96426. "vulnerable" : true,
  96427. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
  96428. "cpe_name" : [ ]
  96429. }, {
  96430. "vulnerable" : true,
  96431. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
  96432. "cpe_name" : [ ]
  96433. }, {
  96434. "vulnerable" : true,
  96435. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
  96436. "cpe_name" : [ ]
  96437. }, {
  96438. "vulnerable" : true,
  96439. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
  96440. "cpe_name" : [ ]
  96441. }, {
  96442. "vulnerable" : true,
  96443. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
  96444. "cpe_name" : [ ]
  96445. }, {
  96446. "vulnerable" : true,
  96447. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
  96448. "cpe_name" : [ ]
  96449. }, {
  96450. "vulnerable" : true,
  96451. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
  96452. "cpe_name" : [ ]
  96453. }, {
  96454. "vulnerable" : true,
  96455. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
  96456. "cpe_name" : [ ]
  96457. }, {
  96458. "vulnerable" : true,
  96459. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
  96460. "cpe_name" : [ ]
  96461. }, {
  96462. "vulnerable" : true,
  96463. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
  96464. "cpe_name" : [ ]
  96465. }, {
  96466. "vulnerable" : true,
  96467. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
  96468. "cpe_name" : [ ]
  96469. }, {
  96470. "vulnerable" : true,
  96471. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
  96472. "cpe_name" : [ ]
  96473. }, {
  96474. "vulnerable" : true,
  96475. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
  96476. "cpe_name" : [ ]
  96477. }, {
  96478. "vulnerable" : true,
  96479. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
  96480. "cpe_name" : [ ]
  96481. }, {
  96482. "vulnerable" : true,
  96483. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
  96484. "cpe_name" : [ ]
  96485. }, {
  96486. "vulnerable" : true,
  96487. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
  96488. "cpe_name" : [ ]
  96489. }, {
  96490. "vulnerable" : true,
  96491. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
  96492. "cpe_name" : [ ]
  96493. }, {
  96494. "vulnerable" : true,
  96495. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
  96496. "cpe_name" : [ ]
  96497. }, {
  96498. "vulnerable" : true,
  96499. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
  96500. "cpe_name" : [ ]
  96501. }, {
  96502. "vulnerable" : true,
  96503. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
  96504. "cpe_name" : [ ]
  96505. }, {
  96506. "vulnerable" : true,
  96507. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
  96508. "cpe_name" : [ ]
  96509. }, {
  96510. "vulnerable" : true,
  96511. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
  96512. "cpe_name" : [ ]
  96513. }, {
  96514. "vulnerable" : true,
  96515. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
  96516. "cpe_name" : [ ]
  96517. }, {
  96518. "vulnerable" : true,
  96519. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
  96520. "cpe_name" : [ ]
  96521. }, {
  96522. "vulnerable" : true,
  96523. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
  96524. "cpe_name" : [ ]
  96525. }, {
  96526. "vulnerable" : true,
  96527. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
  96528. "cpe_name" : [ ]
  96529. }, {
  96530. "vulnerable" : true,
  96531. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
  96532. "cpe_name" : [ ]
  96533. }, {
  96534. "vulnerable" : true,
  96535. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
  96536. "cpe_name" : [ ]
  96537. }, {
  96538. "vulnerable" : true,
  96539. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
  96540. "cpe_name" : [ ]
  96541. }, {
  96542. "vulnerable" : true,
  96543. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
  96544. "cpe_name" : [ ]
  96545. }, {
  96546. "vulnerable" : true,
  96547. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
  96548. "cpe_name" : [ ]
  96549. }, {
  96550. "vulnerable" : true,
  96551. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
  96552. "cpe_name" : [ ]
  96553. }, {
  96554. "vulnerable" : true,
  96555. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
  96556. "cpe_name" : [ ]
  96557. }, {
  96558. "vulnerable" : true,
  96559. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
  96560. "cpe_name" : [ ]
  96561. }, {
  96562. "vulnerable" : true,
  96563. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
  96564. "cpe_name" : [ ]
  96565. }, {
  96566. "vulnerable" : true,
  96567. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
  96568. "cpe_name" : [ ]
  96569. }, {
  96570. "vulnerable" : true,
  96571. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
  96572. "cpe_name" : [ ]
  96573. }, {
  96574. "vulnerable" : true,
  96575. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
  96576. "cpe_name" : [ ]
  96577. }, {
  96578. "vulnerable" : true,
  96579. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
  96580. "cpe_name" : [ ]
  96581. }, {
  96582. "vulnerable" : true,
  96583. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
  96584. "cpe_name" : [ ]
  96585. }, {
  96586. "vulnerable" : true,
  96587. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
  96588. "cpe_name" : [ ]
  96589. }, {
  96590. "vulnerable" : true,
  96591. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
  96592. "cpe_name" : [ ]
  96593. }, {
  96594. "vulnerable" : true,
  96595. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
  96596. "cpe_name" : [ ]
  96597. }, {
  96598. "vulnerable" : true,
  96599. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
  96600. "cpe_name" : [ ]
  96601. }, {
  96602. "vulnerable" : true,
  96603. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
  96604. "cpe_name" : [ ]
  96605. }, {
  96606. "vulnerable" : true,
  96607. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
  96608. "cpe_name" : [ ]
  96609. }, {
  96610. "vulnerable" : true,
  96611. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
  96612. "cpe_name" : [ ]
  96613. }, {
  96614. "vulnerable" : true,
  96615. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
  96616. "cpe_name" : [ ]
  96617. }, {
  96618. "vulnerable" : true,
  96619. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
  96620. "cpe_name" : [ ]
  96621. }, {
  96622. "vulnerable" : true,
  96623. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
  96624. "cpe_name" : [ ]
  96625. }, {
  96626. "vulnerable" : true,
  96627. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
  96628. "cpe_name" : [ ]
  96629. }, {
  96630. "vulnerable" : true,
  96631. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
  96632. "cpe_name" : [ ]
  96633. }, {
  96634. "vulnerable" : true,
  96635. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
  96636. "cpe_name" : [ ]
  96637. }, {
  96638. "vulnerable" : true,
  96639. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
  96640. "cpe_name" : [ ]
  96641. }, {
  96642. "vulnerable" : true,
  96643. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
  96644. "cpe_name" : [ ]
  96645. }, {
  96646. "vulnerable" : true,
  96647. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
  96648. "cpe_name" : [ ]
  96649. }, {
  96650. "vulnerable" : true,
  96651. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*",
  96652. "cpe_name" : [ ]
  96653. } ]
  96654. } ]
  96655. },
  96656. "impact" : {
  96657. "baseMetricV3" : {
  96658. "cvssV3" : {
  96659. "version" : "3.0",
  96660. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  96661. "attackVector" : "NETWORK",
  96662. "attackComplexity" : "LOW",
  96663. "privilegesRequired" : "NONE",
  96664. "userInteraction" : "REQUIRED",
  96665. "scope" : "CHANGED",
  96666. "confidentialityImpact" : "LOW",
  96667. "integrityImpact" : "LOW",
  96668. "availabilityImpact" : "NONE",
  96669. "baseScore" : 6.1,
  96670. "baseSeverity" : "MEDIUM"
  96671. },
  96672. "exploitabilityScore" : 2.8,
  96673. "impactScore" : 2.7
  96674. },
  96675. "baseMetricV2" : {
  96676. "cvssV2" : {
  96677. "version" : "2.0",
  96678. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  96679. "accessVector" : "NETWORK",
  96680. "accessComplexity" : "MEDIUM",
  96681. "authentication" : "NONE",
  96682. "confidentialityImpact" : "NONE",
  96683. "integrityImpact" : "PARTIAL",
  96684. "availabilityImpact" : "NONE",
  96685. "baseScore" : 4.3
  96686. },
  96687. "severity" : "MEDIUM",
  96688. "exploitabilityScore" : 8.6,
  96689. "impactScore" : 2.9,
  96690. "acInsufInfo" : false,
  96691. "obtainAllPrivilege" : false,
  96692. "obtainUserPrivilege" : false,
  96693. "obtainOtherPrivilege" : false,
  96694. "userInteractionRequired" : true
  96695. }
  96696. },
  96697. "publishedDate" : "2018-11-15T06:29Z",
  96698. "lastModifiedDate" : "2021-05-04T15:07Z"
  96699. }, {
  96700. "cve" : {
  96701. "data_type" : "CVE",
  96702. "data_format" : "MITRE",
  96703. "data_version" : "4.0",
  96704. "CVE_data_meta" : {
  96705. "ID" : "CVE-2018-18949",
  96706. "ASSIGNER" : "cve@mitre.org"
  96707. },
  96708. "problemtype" : {
  96709. "problemtype_data" : [ {
  96710. "description" : [ {
  96711. "lang" : "en",
  96712. "value" : "CWE-89"
  96713. } ]
  96714. } ]
  96715. },
  96716. "references" : {
  96717. "reference_data" : [ {
  96718. "url" : "https://www.manageengine.com/network-monitoring/help/read-me.html",
  96719. "name" : "https://www.manageengine.com/network-monitoring/help/read-me.html",
  96720. "refsource" : "MISC",
  96721. "tags" : [ "Vendor Advisory" ]
  96722. } ]
  96723. },
  96724. "description" : {
  96725. "description_data" : [ {
  96726. "lang" : "en",
  96727. "value" : "Zoho ManageEngine OpManager 12.3 before 123222 has SQL Injection via Mail Server settings."
  96728. } ]
  96729. }
  96730. },
  96731. "configurations" : {
  96732. "CVE_data_version" : "4.0",
  96733. "nodes" : [ {
  96734. "operator" : "OR",
  96735. "children" : [ ],
  96736. "cpe_match" : [ {
  96737. "vulnerable" : true,
  96738. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123221:*:*:*:*:*:*",
  96739. "cpe_name" : [ ]
  96740. }, {
  96741. "vulnerable" : true,
  96742. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123215:*:*:*:*:*:*",
  96743. "cpe_name" : [ ]
  96744. }, {
  96745. "vulnerable" : true,
  96746. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123214:*:*:*:*:*:*",
  96747. "cpe_name" : [ ]
  96748. }, {
  96749. "vulnerable" : true,
  96750. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123217:*:*:*:*:*:*",
  96751. "cpe_name" : [ ]
  96752. }, {
  96753. "vulnerable" : true,
  96754. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
  96755. "cpe_name" : [ ]
  96756. }, {
  96757. "vulnerable" : true,
  96758. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
  96759. "cpe_name" : [ ]
  96760. }, {
  96761. "vulnerable" : true,
  96762. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
  96763. "cpe_name" : [ ]
  96764. }, {
  96765. "vulnerable" : true,
  96766. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
  96767. "cpe_name" : [ ]
  96768. }, {
  96769. "vulnerable" : true,
  96770. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
  96771. "cpe_name" : [ ]
  96772. }, {
  96773. "vulnerable" : true,
  96774. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
  96775. "cpe_name" : [ ]
  96776. }, {
  96777. "vulnerable" : true,
  96778. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
  96779. "cpe_name" : [ ]
  96780. }, {
  96781. "vulnerable" : true,
  96782. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
  96783. "cpe_name" : [ ]
  96784. }, {
  96785. "vulnerable" : true,
  96786. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
  96787. "cpe_name" : [ ]
  96788. }, {
  96789. "vulnerable" : true,
  96790. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
  96791. "cpe_name" : [ ]
  96792. }, {
  96793. "vulnerable" : true,
  96794. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
  96795. "cpe_name" : [ ]
  96796. }, {
  96797. "vulnerable" : true,
  96798. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
  96799. "cpe_name" : [ ]
  96800. }, {
  96801. "vulnerable" : true,
  96802. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
  96803. "cpe_name" : [ ]
  96804. }, {
  96805. "vulnerable" : true,
  96806. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
  96807. "cpe_name" : [ ]
  96808. }, {
  96809. "vulnerable" : true,
  96810. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
  96811. "cpe_name" : [ ]
  96812. }, {
  96813. "vulnerable" : true,
  96814. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
  96815. "cpe_name" : [ ]
  96816. }, {
  96817. "vulnerable" : true,
  96818. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
  96819. "cpe_name" : [ ]
  96820. }, {
  96821. "vulnerable" : true,
  96822. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
  96823. "cpe_name" : [ ]
  96824. }, {
  96825. "vulnerable" : true,
  96826. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
  96827. "cpe_name" : [ ]
  96828. }, {
  96829. "vulnerable" : true,
  96830. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
  96831. "cpe_name" : [ ]
  96832. }, {
  96833. "vulnerable" : true,
  96834. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
  96835. "cpe_name" : [ ]
  96836. }, {
  96837. "vulnerable" : true,
  96838. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
  96839. "cpe_name" : [ ]
  96840. }, {
  96841. "vulnerable" : true,
  96842. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
  96843. "cpe_name" : [ ]
  96844. }, {
  96845. "vulnerable" : true,
  96846. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
  96847. "cpe_name" : [ ]
  96848. }, {
  96849. "vulnerable" : true,
  96850. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
  96851. "cpe_name" : [ ]
  96852. }, {
  96853. "vulnerable" : true,
  96854. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
  96855. "cpe_name" : [ ]
  96856. }, {
  96857. "vulnerable" : true,
  96858. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
  96859. "cpe_name" : [ ]
  96860. }, {
  96861. "vulnerable" : true,
  96862. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
  96863. "cpe_name" : [ ]
  96864. }, {
  96865. "vulnerable" : true,
  96866. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
  96867. "cpe_name" : [ ]
  96868. }, {
  96869. "vulnerable" : true,
  96870. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
  96871. "cpe_name" : [ ]
  96872. }, {
  96873. "vulnerable" : true,
  96874. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
  96875. "cpe_name" : [ ]
  96876. }, {
  96877. "vulnerable" : true,
  96878. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
  96879. "cpe_name" : [ ]
  96880. }, {
  96881. "vulnerable" : true,
  96882. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
  96883. "cpe_name" : [ ]
  96884. }, {
  96885. "vulnerable" : true,
  96886. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
  96887. "cpe_name" : [ ]
  96888. }, {
  96889. "vulnerable" : true,
  96890. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
  96891. "cpe_name" : [ ]
  96892. }, {
  96893. "vulnerable" : true,
  96894. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
  96895. "cpe_name" : [ ]
  96896. }, {
  96897. "vulnerable" : true,
  96898. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
  96899. "cpe_name" : [ ]
  96900. }, {
  96901. "vulnerable" : true,
  96902. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
  96903. "cpe_name" : [ ]
  96904. }, {
  96905. "vulnerable" : true,
  96906. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123219:*:*:*:*:*:*",
  96907. "cpe_name" : [ ]
  96908. }, {
  96909. "vulnerable" : true,
  96910. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:11.4:*:*:*:*:*:*:*",
  96911. "cpe_name" : [ ]
  96912. }, {
  96913. "vulnerable" : true,
  96914. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
  96915. "cpe_name" : [ ]
  96916. }, {
  96917. "vulnerable" : true,
  96918. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
  96919. "cpe_name" : [ ]
  96920. }, {
  96921. "vulnerable" : true,
  96922. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
  96923. "cpe_name" : [ ]
  96924. }, {
  96925. "vulnerable" : true,
  96926. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
  96927. "cpe_name" : [ ]
  96928. }, {
  96929. "vulnerable" : true,
  96930. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
  96931. "cpe_name" : [ ]
  96932. }, {
  96933. "vulnerable" : true,
  96934. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
  96935. "cpe_name" : [ ]
  96936. }, {
  96937. "vulnerable" : true,
  96938. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
  96939. "cpe_name" : [ ]
  96940. }, {
  96941. "vulnerable" : true,
  96942. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
  96943. "cpe_name" : [ ]
  96944. }, {
  96945. "vulnerable" : true,
  96946. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
  96947. "cpe_name" : [ ]
  96948. }, {
  96949. "vulnerable" : true,
  96950. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
  96951. "cpe_name" : [ ]
  96952. }, {
  96953. "vulnerable" : true,
  96954. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
  96955. "cpe_name" : [ ]
  96956. }, {
  96957. "vulnerable" : true,
  96958. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
  96959. "cpe_name" : [ ]
  96960. }, {
  96961. "vulnerable" : true,
  96962. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
  96963. "cpe_name" : [ ]
  96964. }, {
  96965. "vulnerable" : true,
  96966. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
  96967. "cpe_name" : [ ]
  96968. }, {
  96969. "vulnerable" : true,
  96970. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
  96971. "cpe_name" : [ ]
  96972. }, {
  96973. "vulnerable" : true,
  96974. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
  96975. "cpe_name" : [ ]
  96976. }, {
  96977. "vulnerable" : true,
  96978. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
  96979. "cpe_name" : [ ]
  96980. }, {
  96981. "vulnerable" : true,
  96982. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
  96983. "cpe_name" : [ ]
  96984. }, {
  96985. "vulnerable" : true,
  96986. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
  96987. "cpe_name" : [ ]
  96988. }, {
  96989. "vulnerable" : true,
  96990. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
  96991. "cpe_name" : [ ]
  96992. }, {
  96993. "vulnerable" : true,
  96994. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
  96995. "cpe_name" : [ ]
  96996. }, {
  96997. "vulnerable" : true,
  96998. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
  96999. "cpe_name" : [ ]
  97000. }, {
  97001. "vulnerable" : true,
  97002. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
  97003. "cpe_name" : [ ]
  97004. }, {
  97005. "vulnerable" : true,
  97006. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
  97007. "cpe_name" : [ ]
  97008. }, {
  97009. "vulnerable" : true,
  97010. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
  97011. "cpe_name" : [ ]
  97012. }, {
  97013. "vulnerable" : true,
  97014. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
  97015. "cpe_name" : [ ]
  97016. }, {
  97017. "vulnerable" : true,
  97018. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
  97019. "cpe_name" : [ ]
  97020. }, {
  97021. "vulnerable" : true,
  97022. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*",
  97023. "cpe_name" : [ ]
  97024. }, {
  97025. "vulnerable" : true,
  97026. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:*:*:*:*:*:*:*",
  97027. "cpe_name" : [ ]
  97028. }, {
  97029. "vulnerable" : true,
  97030. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
  97031. "cpe_name" : [ ]
  97032. }, {
  97033. "vulnerable" : true,
  97034. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
  97035. "cpe_name" : [ ]
  97036. }, {
  97037. "vulnerable" : true,
  97038. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
  97039. "cpe_name" : [ ]
  97040. }, {
  97041. "vulnerable" : true,
  97042. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
  97043. "cpe_name" : [ ]
  97044. }, {
  97045. "vulnerable" : true,
  97046. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
  97047. "cpe_name" : [ ]
  97048. }, {
  97049. "vulnerable" : true,
  97050. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
  97051. "cpe_name" : [ ]
  97052. }, {
  97053. "vulnerable" : true,
  97054. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
  97055. "cpe_name" : [ ]
  97056. }, {
  97057. "vulnerable" : true,
  97058. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
  97059. "cpe_name" : [ ]
  97060. }, {
  97061. "vulnerable" : true,
  97062. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
  97063. "cpe_name" : [ ]
  97064. }, {
  97065. "vulnerable" : true,
  97066. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
  97067. "cpe_name" : [ ]
  97068. }, {
  97069. "vulnerable" : true,
  97070. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
  97071. "cpe_name" : [ ]
  97072. }, {
  97073. "vulnerable" : true,
  97074. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
  97075. "cpe_name" : [ ]
  97076. }, {
  97077. "vulnerable" : true,
  97078. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
  97079. "cpe_name" : [ ]
  97080. }, {
  97081. "vulnerable" : true,
  97082. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
  97083. "cpe_name" : [ ]
  97084. }, {
  97085. "vulnerable" : true,
  97086. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
  97087. "cpe_name" : [ ]
  97088. }, {
  97089. "vulnerable" : true,
  97090. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
  97091. "cpe_name" : [ ]
  97092. }, {
  97093. "vulnerable" : true,
  97094. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
  97095. "cpe_name" : [ ]
  97096. }, {
  97097. "vulnerable" : true,
  97098. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
  97099. "cpe_name" : [ ]
  97100. }, {
  97101. "vulnerable" : true,
  97102. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
  97103. "cpe_name" : [ ]
  97104. }, {
  97105. "vulnerable" : true,
  97106. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
  97107. "cpe_name" : [ ]
  97108. }, {
  97109. "vulnerable" : true,
  97110. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
  97111. "cpe_name" : [ ]
  97112. }, {
  97113. "vulnerable" : true,
  97114. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
  97115. "cpe_name" : [ ]
  97116. }, {
  97117. "vulnerable" : true,
  97118. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
  97119. "cpe_name" : [ ]
  97120. }, {
  97121. "vulnerable" : true,
  97122. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
  97123. "cpe_name" : [ ]
  97124. }, {
  97125. "vulnerable" : true,
  97126. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
  97127. "cpe_name" : [ ]
  97128. }, {
  97129. "vulnerable" : true,
  97130. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
  97131. "cpe_name" : [ ]
  97132. }, {
  97133. "vulnerable" : true,
  97134. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
  97135. "cpe_name" : [ ]
  97136. }, {
  97137. "vulnerable" : true,
  97138. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
  97139. "cpe_name" : [ ]
  97140. }, {
  97141. "vulnerable" : true,
  97142. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
  97143. "cpe_name" : [ ]
  97144. }, {
  97145. "vulnerable" : true,
  97146. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
  97147. "cpe_name" : [ ]
  97148. }, {
  97149. "vulnerable" : true,
  97150. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
  97151. "cpe_name" : [ ]
  97152. }, {
  97153. "vulnerable" : true,
  97154. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
  97155. "cpe_name" : [ ]
  97156. }, {
  97157. "vulnerable" : true,
  97158. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
  97159. "cpe_name" : [ ]
  97160. }, {
  97161. "vulnerable" : true,
  97162. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
  97163. "cpe_name" : [ ]
  97164. }, {
  97165. "vulnerable" : true,
  97166. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
  97167. "cpe_name" : [ ]
  97168. }, {
  97169. "vulnerable" : true,
  97170. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
  97171. "cpe_name" : [ ]
  97172. }, {
  97173. "vulnerable" : true,
  97174. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
  97175. "cpe_name" : [ ]
  97176. }, {
  97177. "vulnerable" : true,
  97178. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
  97179. "cpe_name" : [ ]
  97180. }, {
  97181. "vulnerable" : true,
  97182. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
  97183. "cpe_name" : [ ]
  97184. }, {
  97185. "vulnerable" : true,
  97186. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
  97187. "cpe_name" : [ ]
  97188. }, {
  97189. "vulnerable" : true,
  97190. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
  97191. "cpe_name" : [ ]
  97192. }, {
  97193. "vulnerable" : true,
  97194. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
  97195. "cpe_name" : [ ]
  97196. }, {
  97197. "vulnerable" : true,
  97198. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
  97199. "cpe_name" : [ ]
  97200. }, {
  97201. "vulnerable" : true,
  97202. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123218:*:*:*:*:*:*",
  97203. "cpe_name" : [ ]
  97204. }, {
  97205. "vulnerable" : true,
  97206. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123220:*:*:*:*:*:*",
  97207. "cpe_name" : [ ]
  97208. }, {
  97209. "vulnerable" : true,
  97210. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
  97211. "cpe_name" : [ ]
  97212. }, {
  97213. "vulnerable" : true,
  97214. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
  97215. "cpe_name" : [ ]
  97216. }, {
  97217. "vulnerable" : true,
  97218. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
  97219. "cpe_name" : [ ]
  97220. }, {
  97221. "vulnerable" : true,
  97222. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
  97223. "cpe_name" : [ ]
  97224. }, {
  97225. "vulnerable" : true,
  97226. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
  97227. "cpe_name" : [ ]
  97228. }, {
  97229. "vulnerable" : true,
  97230. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
  97231. "cpe_name" : [ ]
  97232. }, {
  97233. "vulnerable" : true,
  97234. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
  97235. "cpe_name" : [ ]
  97236. }, {
  97237. "vulnerable" : true,
  97238. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
  97239. "cpe_name" : [ ]
  97240. }, {
  97241. "vulnerable" : true,
  97242. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
  97243. "cpe_name" : [ ]
  97244. }, {
  97245. "vulnerable" : true,
  97246. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
  97247. "cpe_name" : [ ]
  97248. }, {
  97249. "vulnerable" : true,
  97250. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
  97251. "cpe_name" : [ ]
  97252. }, {
  97253. "vulnerable" : true,
  97254. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
  97255. "cpe_name" : [ ]
  97256. }, {
  97257. "vulnerable" : true,
  97258. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
  97259. "cpe_name" : [ ]
  97260. }, {
  97261. "vulnerable" : true,
  97262. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
  97263. "cpe_name" : [ ]
  97264. }, {
  97265. "vulnerable" : true,
  97266. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
  97267. "cpe_name" : [ ]
  97268. }, {
  97269. "vulnerable" : true,
  97270. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
  97271. "cpe_name" : [ ]
  97272. }, {
  97273. "vulnerable" : true,
  97274. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
  97275. "cpe_name" : [ ]
  97276. }, {
  97277. "vulnerable" : true,
  97278. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
  97279. "cpe_name" : [ ]
  97280. }, {
  97281. "vulnerable" : true,
  97282. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
  97283. "cpe_name" : [ ]
  97284. }, {
  97285. "vulnerable" : true,
  97286. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
  97287. "cpe_name" : [ ]
  97288. }, {
  97289. "vulnerable" : true,
  97290. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
  97291. "cpe_name" : [ ]
  97292. }, {
  97293. "vulnerable" : true,
  97294. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
  97295. "cpe_name" : [ ]
  97296. }, {
  97297. "vulnerable" : true,
  97298. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
  97299. "cpe_name" : [ ]
  97300. }, {
  97301. "vulnerable" : true,
  97302. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
  97303. "cpe_name" : [ ]
  97304. }, {
  97305. "vulnerable" : true,
  97306. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
  97307. "cpe_name" : [ ]
  97308. }, {
  97309. "vulnerable" : true,
  97310. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
  97311. "cpe_name" : [ ]
  97312. }, {
  97313. "vulnerable" : true,
  97314. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
  97315. "cpe_name" : [ ]
  97316. }, {
  97317. "vulnerable" : true,
  97318. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
  97319. "cpe_name" : [ ]
  97320. }, {
  97321. "vulnerable" : true,
  97322. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
  97323. "cpe_name" : [ ]
  97324. }, {
  97325. "vulnerable" : true,
  97326. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
  97327. "cpe_name" : [ ]
  97328. }, {
  97329. "vulnerable" : true,
  97330. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
  97331. "cpe_name" : [ ]
  97332. }, {
  97333. "vulnerable" : true,
  97334. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
  97335. "cpe_name" : [ ]
  97336. }, {
  97337. "vulnerable" : true,
  97338. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
  97339. "cpe_name" : [ ]
  97340. }, {
  97341. "vulnerable" : true,
  97342. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
  97343. "cpe_name" : [ ]
  97344. }, {
  97345. "vulnerable" : true,
  97346. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
  97347. "cpe_name" : [ ]
  97348. }, {
  97349. "vulnerable" : true,
  97350. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
  97351. "cpe_name" : [ ]
  97352. } ]
  97353. } ]
  97354. },
  97355. "impact" : {
  97356. "baseMetricV3" : {
  97357. "cvssV3" : {
  97358. "version" : "3.0",
  97359. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  97360. "attackVector" : "NETWORK",
  97361. "attackComplexity" : "LOW",
  97362. "privilegesRequired" : "NONE",
  97363. "userInteraction" : "NONE",
  97364. "scope" : "UNCHANGED",
  97365. "confidentialityImpact" : "HIGH",
  97366. "integrityImpact" : "HIGH",
  97367. "availabilityImpact" : "HIGH",
  97368. "baseScore" : 9.8,
  97369. "baseSeverity" : "CRITICAL"
  97370. },
  97371. "exploitabilityScore" : 3.9,
  97372. "impactScore" : 5.9
  97373. },
  97374. "baseMetricV2" : {
  97375. "cvssV2" : {
  97376. "version" : "2.0",
  97377. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  97378. "accessVector" : "NETWORK",
  97379. "accessComplexity" : "LOW",
  97380. "authentication" : "NONE",
  97381. "confidentialityImpact" : "PARTIAL",
  97382. "integrityImpact" : "PARTIAL",
  97383. "availabilityImpact" : "PARTIAL",
  97384. "baseScore" : 7.5
  97385. },
  97386. "severity" : "HIGH",
  97387. "exploitabilityScore" : 10.0,
  97388. "impactScore" : 6.4,
  97389. "acInsufInfo" : false,
  97390. "obtainAllPrivilege" : false,
  97391. "obtainUserPrivilege" : false,
  97392. "obtainOtherPrivilege" : false,
  97393. "userInteractionRequired" : false
  97394. }
  97395. },
  97396. "publishedDate" : "2018-11-05T09:29Z",
  97397. "lastModifiedDate" : "2021-05-04T15:07Z"
  97398. }, {
  97399. "cve" : {
  97400. "data_type" : "CVE",
  97401. "data_format" : "MITRE",
  97402. "data_version" : "4.0",
  97403. "CVE_data_meta" : {
  97404. "ID" : "CVE-2018-18475",
  97405. "ASSIGNER" : "cve@mitre.org"
  97406. },
  97407. "problemtype" : {
  97408. "problemtype_data" : [ {
  97409. "description" : [ {
  97410. "lang" : "en",
  97411. "value" : "CWE-434"
  97412. } ]
  97413. } ]
  97414. },
  97415. "references" : {
  97416. "reference_data" : [ {
  97417. "url" : "http://seclists.org/fulldisclosure/2018/Oct/42",
  97418. "name" : "20181019 Zoho ManageEngine OpManager 12.3 allows Unrestricted Arbitrary File Upload",
  97419. "refsource" : "FULLDISC",
  97420. "tags" : [ "Mailing List", "Third Party Advisory" ]
  97421. }, {
  97422. "url" : "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html",
  97423. "name" : "http://packetstormsecurity.com/files/149878/Zoho-ManageEngine-OpManager-12.3-Arbitrary-File-Upload.html",
  97424. "refsource" : "MISC",
  97425. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  97426. } ]
  97427. },
  97428. "description" : {
  97429. "description_data" : [ {
  97430. "lang" : "en",
  97431. "value" : "Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload."
  97432. } ]
  97433. }
  97434. },
  97435. "configurations" : {
  97436. "CVE_data_version" : "4.0",
  97437. "nodes" : [ {
  97438. "operator" : "OR",
  97439. "children" : [ ],
  97440. "cpe_match" : [ {
  97441. "vulnerable" : true,
  97442. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
  97443. "cpe_name" : [ ]
  97444. }, {
  97445. "vulnerable" : true,
  97446. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
  97447. "cpe_name" : [ ]
  97448. }, {
  97449. "vulnerable" : true,
  97450. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
  97451. "cpe_name" : [ ]
  97452. }, {
  97453. "vulnerable" : true,
  97454. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
  97455. "cpe_name" : [ ]
  97456. }, {
  97457. "vulnerable" : true,
  97458. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
  97459. "cpe_name" : [ ]
  97460. }, {
  97461. "vulnerable" : true,
  97462. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
  97463. "cpe_name" : [ ]
  97464. }, {
  97465. "vulnerable" : true,
  97466. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
  97467. "cpe_name" : [ ]
  97468. }, {
  97469. "vulnerable" : true,
  97470. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
  97471. "cpe_name" : [ ]
  97472. }, {
  97473. "vulnerable" : true,
  97474. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
  97475. "cpe_name" : [ ]
  97476. }, {
  97477. "vulnerable" : true,
  97478. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
  97479. "cpe_name" : [ ]
  97480. }, {
  97481. "vulnerable" : true,
  97482. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
  97483. "cpe_name" : [ ]
  97484. }, {
  97485. "vulnerable" : true,
  97486. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
  97487. "cpe_name" : [ ]
  97488. }, {
  97489. "vulnerable" : true,
  97490. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
  97491. "cpe_name" : [ ]
  97492. }, {
  97493. "vulnerable" : true,
  97494. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
  97495. "cpe_name" : [ ]
  97496. }, {
  97497. "vulnerable" : true,
  97498. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
  97499. "cpe_name" : [ ]
  97500. }, {
  97501. "vulnerable" : true,
  97502. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
  97503. "cpe_name" : [ ]
  97504. }, {
  97505. "vulnerable" : true,
  97506. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
  97507. "cpe_name" : [ ]
  97508. }, {
  97509. "vulnerable" : true,
  97510. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
  97511. "cpe_name" : [ ]
  97512. }, {
  97513. "vulnerable" : true,
  97514. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
  97515. "cpe_name" : [ ]
  97516. }, {
  97517. "vulnerable" : true,
  97518. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
  97519. "cpe_name" : [ ]
  97520. }, {
  97521. "vulnerable" : true,
  97522. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
  97523. "cpe_name" : [ ]
  97524. }, {
  97525. "vulnerable" : true,
  97526. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
  97527. "cpe_name" : [ ]
  97528. }, {
  97529. "vulnerable" : true,
  97530. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
  97531. "cpe_name" : [ ]
  97532. }, {
  97533. "vulnerable" : true,
  97534. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
  97535. "cpe_name" : [ ]
  97536. }, {
  97537. "vulnerable" : true,
  97538. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
  97539. "cpe_name" : [ ]
  97540. }, {
  97541. "vulnerable" : true,
  97542. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
  97543. "cpe_name" : [ ]
  97544. }, {
  97545. "vulnerable" : true,
  97546. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
  97547. "cpe_name" : [ ]
  97548. }, {
  97549. "vulnerable" : true,
  97550. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
  97551. "cpe_name" : [ ]
  97552. }, {
  97553. "vulnerable" : true,
  97554. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
  97555. "cpe_name" : [ ]
  97556. }, {
  97557. "vulnerable" : true,
  97558. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
  97559. "cpe_name" : [ ]
  97560. }, {
  97561. "vulnerable" : true,
  97562. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
  97563. "cpe_name" : [ ]
  97564. }, {
  97565. "vulnerable" : true,
  97566. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
  97567. "cpe_name" : [ ]
  97568. }, {
  97569. "vulnerable" : true,
  97570. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
  97571. "cpe_name" : [ ]
  97572. }, {
  97573. "vulnerable" : true,
  97574. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
  97575. "cpe_name" : [ ]
  97576. }, {
  97577. "vulnerable" : true,
  97578. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
  97579. "cpe_name" : [ ]
  97580. }, {
  97581. "vulnerable" : true,
  97582. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
  97583. "cpe_name" : [ ]
  97584. }, {
  97585. "vulnerable" : true,
  97586. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
  97587. "cpe_name" : [ ]
  97588. }, {
  97589. "vulnerable" : true,
  97590. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
  97591. "cpe_name" : [ ]
  97592. }, {
  97593. "vulnerable" : true,
  97594. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
  97595. "cpe_name" : [ ]
  97596. }, {
  97597. "vulnerable" : true,
  97598. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
  97599. "cpe_name" : [ ]
  97600. }, {
  97601. "vulnerable" : true,
  97602. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
  97603. "cpe_name" : [ ]
  97604. }, {
  97605. "vulnerable" : true,
  97606. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
  97607. "cpe_name" : [ ]
  97608. }, {
  97609. "vulnerable" : true,
  97610. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
  97611. "cpe_name" : [ ]
  97612. }, {
  97613. "vulnerable" : true,
  97614. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
  97615. "cpe_name" : [ ]
  97616. }, {
  97617. "vulnerable" : true,
  97618. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
  97619. "cpe_name" : [ ]
  97620. }, {
  97621. "vulnerable" : true,
  97622. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
  97623. "cpe_name" : [ ]
  97624. }, {
  97625. "vulnerable" : true,
  97626. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
  97627. "cpe_name" : [ ]
  97628. }, {
  97629. "vulnerable" : true,
  97630. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
  97631. "cpe_name" : [ ]
  97632. }, {
  97633. "vulnerable" : true,
  97634. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
  97635. "cpe_name" : [ ]
  97636. }, {
  97637. "vulnerable" : true,
  97638. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
  97639. "cpe_name" : [ ]
  97640. }, {
  97641. "vulnerable" : true,
  97642. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
  97643. "cpe_name" : [ ]
  97644. }, {
  97645. "vulnerable" : true,
  97646. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
  97647. "cpe_name" : [ ]
  97648. }, {
  97649. "vulnerable" : true,
  97650. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
  97651. "cpe_name" : [ ]
  97652. }, {
  97653. "vulnerable" : true,
  97654. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
  97655. "cpe_name" : [ ]
  97656. }, {
  97657. "vulnerable" : true,
  97658. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
  97659. "cpe_name" : [ ]
  97660. }, {
  97661. "vulnerable" : true,
  97662. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
  97663. "cpe_name" : [ ]
  97664. }, {
  97665. "vulnerable" : true,
  97666. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
  97667. "cpe_name" : [ ]
  97668. }, {
  97669. "vulnerable" : true,
  97670. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
  97671. "cpe_name" : [ ]
  97672. }, {
  97673. "vulnerable" : true,
  97674. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
  97675. "cpe_name" : [ ]
  97676. }, {
  97677. "vulnerable" : true,
  97678. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
  97679. "cpe_name" : [ ]
  97680. }, {
  97681. "vulnerable" : true,
  97682. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
  97683. "cpe_name" : [ ]
  97684. }, {
  97685. "vulnerable" : true,
  97686. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
  97687. "cpe_name" : [ ]
  97688. }, {
  97689. "vulnerable" : true,
  97690. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
  97691. "cpe_name" : [ ]
  97692. }, {
  97693. "vulnerable" : true,
  97694. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
  97695. "cpe_name" : [ ]
  97696. }, {
  97697. "vulnerable" : true,
  97698. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
  97699. "cpe_name" : [ ]
  97700. }, {
  97701. "vulnerable" : true,
  97702. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
  97703. "cpe_name" : [ ]
  97704. }, {
  97705. "vulnerable" : true,
  97706. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
  97707. "cpe_name" : [ ]
  97708. }, {
  97709. "vulnerable" : true,
  97710. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
  97711. "cpe_name" : [ ]
  97712. }, {
  97713. "vulnerable" : true,
  97714. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
  97715. "cpe_name" : [ ]
  97716. }, {
  97717. "vulnerable" : true,
  97718. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
  97719. "cpe_name" : [ ]
  97720. }, {
  97721. "vulnerable" : true,
  97722. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
  97723. "cpe_name" : [ ]
  97724. }, {
  97725. "vulnerable" : true,
  97726. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
  97727. "cpe_name" : [ ]
  97728. }, {
  97729. "vulnerable" : true,
  97730. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
  97731. "cpe_name" : [ ]
  97732. }, {
  97733. "vulnerable" : true,
  97734. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
  97735. "cpe_name" : [ ]
  97736. }, {
  97737. "vulnerable" : true,
  97738. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
  97739. "cpe_name" : [ ]
  97740. }, {
  97741. "vulnerable" : true,
  97742. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
  97743. "cpe_name" : [ ]
  97744. }, {
  97745. "vulnerable" : true,
  97746. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
  97747. "cpe_name" : [ ]
  97748. }, {
  97749. "vulnerable" : true,
  97750. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
  97751. "cpe_name" : [ ]
  97752. }, {
  97753. "vulnerable" : true,
  97754. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
  97755. "cpe_name" : [ ]
  97756. }, {
  97757. "vulnerable" : true,
  97758. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
  97759. "cpe_name" : [ ]
  97760. }, {
  97761. "vulnerable" : true,
  97762. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
  97763. "cpe_name" : [ ]
  97764. }, {
  97765. "vulnerable" : true,
  97766. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
  97767. "cpe_name" : [ ]
  97768. }, {
  97769. "vulnerable" : true,
  97770. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
  97771. "cpe_name" : [ ]
  97772. }, {
  97773. "vulnerable" : true,
  97774. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
  97775. "cpe_name" : [ ]
  97776. }, {
  97777. "vulnerable" : true,
  97778. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
  97779. "cpe_name" : [ ]
  97780. }, {
  97781. "vulnerable" : true,
  97782. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
  97783. "cpe_name" : [ ]
  97784. }, {
  97785. "vulnerable" : true,
  97786. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
  97787. "cpe_name" : [ ]
  97788. }, {
  97789. "vulnerable" : true,
  97790. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
  97791. "cpe_name" : [ ]
  97792. }, {
  97793. "vulnerable" : true,
  97794. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
  97795. "cpe_name" : [ ]
  97796. }, {
  97797. "vulnerable" : true,
  97798. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
  97799. "cpe_name" : [ ]
  97800. }, {
  97801. "vulnerable" : true,
  97802. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
  97803. "cpe_name" : [ ]
  97804. }, {
  97805. "vulnerable" : true,
  97806. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
  97807. "cpe_name" : [ ]
  97808. }, {
  97809. "vulnerable" : true,
  97810. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
  97811. "cpe_name" : [ ]
  97812. }, {
  97813. "vulnerable" : true,
  97814. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
  97815. "cpe_name" : [ ]
  97816. }, {
  97817. "vulnerable" : true,
  97818. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
  97819. "cpe_name" : [ ]
  97820. }, {
  97821. "vulnerable" : true,
  97822. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
  97823. "cpe_name" : [ ]
  97824. }, {
  97825. "vulnerable" : true,
  97826. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
  97827. "cpe_name" : [ ]
  97828. }, {
  97829. "vulnerable" : true,
  97830. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
  97831. "cpe_name" : [ ]
  97832. }, {
  97833. "vulnerable" : true,
  97834. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
  97835. "cpe_name" : [ ]
  97836. }, {
  97837. "vulnerable" : true,
  97838. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
  97839. "cpe_name" : [ ]
  97840. }, {
  97841. "vulnerable" : true,
  97842. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
  97843. "cpe_name" : [ ]
  97844. }, {
  97845. "vulnerable" : true,
  97846. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
  97847. "cpe_name" : [ ]
  97848. }, {
  97849. "vulnerable" : true,
  97850. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
  97851. "cpe_name" : [ ]
  97852. }, {
  97853. "vulnerable" : true,
  97854. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
  97855. "cpe_name" : [ ]
  97856. }, {
  97857. "vulnerable" : true,
  97858. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
  97859. "cpe_name" : [ ]
  97860. }, {
  97861. "vulnerable" : true,
  97862. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
  97863. "cpe_name" : [ ]
  97864. }, {
  97865. "vulnerable" : true,
  97866. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
  97867. "cpe_name" : [ ]
  97868. }, {
  97869. "vulnerable" : true,
  97870. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
  97871. "cpe_name" : [ ]
  97872. }, {
  97873. "vulnerable" : true,
  97874. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
  97875. "cpe_name" : [ ]
  97876. }, {
  97877. "vulnerable" : true,
  97878. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
  97879. "cpe_name" : [ ]
  97880. }, {
  97881. "vulnerable" : true,
  97882. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
  97883. "cpe_name" : [ ]
  97884. }, {
  97885. "vulnerable" : true,
  97886. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
  97887. "cpe_name" : [ ]
  97888. }, {
  97889. "vulnerable" : true,
  97890. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
  97891. "cpe_name" : [ ]
  97892. }, {
  97893. "vulnerable" : true,
  97894. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
  97895. "cpe_name" : [ ]
  97896. }, {
  97897. "vulnerable" : true,
  97898. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
  97899. "cpe_name" : [ ]
  97900. }, {
  97901. "vulnerable" : true,
  97902. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
  97903. "cpe_name" : [ ]
  97904. }, {
  97905. "vulnerable" : true,
  97906. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
  97907. "cpe_name" : [ ]
  97908. }, {
  97909. "vulnerable" : true,
  97910. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
  97911. "cpe_name" : [ ]
  97912. }, {
  97913. "vulnerable" : true,
  97914. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
  97915. "cpe_name" : [ ]
  97916. }, {
  97917. "vulnerable" : true,
  97918. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
  97919. "cpe_name" : [ ]
  97920. }, {
  97921. "vulnerable" : true,
  97922. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
  97923. "cpe_name" : [ ]
  97924. }, {
  97925. "vulnerable" : true,
  97926. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
  97927. "cpe_name" : [ ]
  97928. }, {
  97929. "vulnerable" : true,
  97930. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
  97931. "cpe_name" : [ ]
  97932. }, {
  97933. "vulnerable" : true,
  97934. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
  97935. "cpe_name" : [ ]
  97936. }, {
  97937. "vulnerable" : true,
  97938. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
  97939. "cpe_name" : [ ]
  97940. }, {
  97941. "vulnerable" : true,
  97942. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
  97943. "cpe_name" : [ ]
  97944. }, {
  97945. "vulnerable" : true,
  97946. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
  97947. "cpe_name" : [ ]
  97948. }, {
  97949. "vulnerable" : true,
  97950. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
  97951. "cpe_name" : [ ]
  97952. }, {
  97953. "vulnerable" : true,
  97954. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
  97955. "cpe_name" : [ ]
  97956. }, {
  97957. "vulnerable" : true,
  97958. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
  97959. "cpe_name" : [ ]
  97960. }, {
  97961. "vulnerable" : true,
  97962. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
  97963. "cpe_name" : [ ]
  97964. }, {
  97965. "vulnerable" : true,
  97966. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
  97967. "cpe_name" : [ ]
  97968. }, {
  97969. "vulnerable" : true,
  97970. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
  97971. "cpe_name" : [ ]
  97972. }, {
  97973. "vulnerable" : true,
  97974. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
  97975. "cpe_name" : [ ]
  97976. }, {
  97977. "vulnerable" : true,
  97978. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
  97979. "cpe_name" : [ ]
  97980. }, {
  97981. "vulnerable" : true,
  97982. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
  97983. "cpe_name" : [ ]
  97984. }, {
  97985. "vulnerable" : true,
  97986. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
  97987. "cpe_name" : [ ]
  97988. }, {
  97989. "vulnerable" : true,
  97990. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
  97991. "cpe_name" : [ ]
  97992. }, {
  97993. "vulnerable" : true,
  97994. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
  97995. "cpe_name" : [ ]
  97996. }, {
  97997. "vulnerable" : true,
  97998. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
  97999. "cpe_name" : [ ]
  98000. }, {
  98001. "vulnerable" : true,
  98002. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
  98003. "cpe_name" : [ ]
  98004. }, {
  98005. "vulnerable" : true,
  98006. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
  98007. "cpe_name" : [ ]
  98008. }, {
  98009. "vulnerable" : true,
  98010. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
  98011. "cpe_name" : [ ]
  98012. } ]
  98013. } ]
  98014. },
  98015. "impact" : {
  98016. "baseMetricV3" : {
  98017. "cvssV3" : {
  98018. "version" : "3.0",
  98019. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  98020. "attackVector" : "NETWORK",
  98021. "attackComplexity" : "LOW",
  98022. "privilegesRequired" : "NONE",
  98023. "userInteraction" : "NONE",
  98024. "scope" : "UNCHANGED",
  98025. "confidentialityImpact" : "HIGH",
  98026. "integrityImpact" : "HIGH",
  98027. "availabilityImpact" : "HIGH",
  98028. "baseScore" : 9.8,
  98029. "baseSeverity" : "CRITICAL"
  98030. },
  98031. "exploitabilityScore" : 3.9,
  98032. "impactScore" : 5.9
  98033. },
  98034. "baseMetricV2" : {
  98035. "cvssV2" : {
  98036. "version" : "2.0",
  98037. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  98038. "accessVector" : "NETWORK",
  98039. "accessComplexity" : "LOW",
  98040. "authentication" : "NONE",
  98041. "confidentialityImpact" : "PARTIAL",
  98042. "integrityImpact" : "PARTIAL",
  98043. "availabilityImpact" : "PARTIAL",
  98044. "baseScore" : 7.5
  98045. },
  98046. "severity" : "HIGH",
  98047. "exploitabilityScore" : 10.0,
  98048. "impactScore" : 6.4,
  98049. "acInsufInfo" : false,
  98050. "obtainAllPrivilege" : false,
  98051. "obtainUserPrivilege" : false,
  98052. "obtainOtherPrivilege" : false,
  98053. "userInteractionRequired" : false
  98054. }
  98055. },
  98056. "publishedDate" : "2018-10-23T21:30Z",
  98057. "lastModifiedDate" : "2021-05-04T15:06Z"
  98058. }, {
  98059. "cve" : {
  98060. "data_type" : "CVE",
  98061. "data_format" : "MITRE",
  98062. "data_version" : "4.0",
  98063. "CVE_data_meta" : {
  98064. "ID" : "CVE-2018-18262",
  98065. "ASSIGNER" : "cve@mitre.org"
  98066. },
  98067. "problemtype" : {
  98068. "problemtype_data" : [ {
  98069. "description" : [ {
  98070. "lang" : "en",
  98071. "value" : "CWE-79"
  98072. } ]
  98073. } ]
  98074. },
  98075. "references" : {
  98076. "reference_data" : [ {
  98077. "url" : "http://seclists.org/fulldisclosure/2018/Oct/34",
  98078. "name" : "20181016 Vulnerability Disclose",
  98079. "refsource" : "FULLDISC",
  98080. "tags" : [ "Mailing List", "Third Party Advisory" ]
  98081. } ]
  98082. },
  98083. "description" : {
  98084. "description_data" : [ {
  98085. "lang" : "en",
  98086. "value" : "Zoho ManageEngine OpManager 12.3 before build 123214 has XSS."
  98087. } ]
  98088. }
  98089. },
  98090. "configurations" : {
  98091. "CVE_data_version" : "4.0",
  98092. "nodes" : [ {
  98093. "operator" : "OR",
  98094. "children" : [ ],
  98095. "cpe_match" : [ {
  98096. "vulnerable" : true,
  98097. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
  98098. "cpe_name" : [ ]
  98099. }, {
  98100. "vulnerable" : true,
  98101. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
  98102. "cpe_name" : [ ]
  98103. }, {
  98104. "vulnerable" : true,
  98105. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
  98106. "cpe_name" : [ ]
  98107. }, {
  98108. "vulnerable" : true,
  98109. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
  98110. "cpe_name" : [ ]
  98111. }, {
  98112. "vulnerable" : true,
  98113. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
  98114. "cpe_name" : [ ]
  98115. }, {
  98116. "vulnerable" : true,
  98117. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
  98118. "cpe_name" : [ ]
  98119. }, {
  98120. "vulnerable" : true,
  98121. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
  98122. "cpe_name" : [ ]
  98123. }, {
  98124. "vulnerable" : true,
  98125. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
  98126. "cpe_name" : [ ]
  98127. }, {
  98128. "vulnerable" : true,
  98129. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
  98130. "cpe_name" : [ ]
  98131. }, {
  98132. "vulnerable" : true,
  98133. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
  98134. "cpe_name" : [ ]
  98135. }, {
  98136. "vulnerable" : true,
  98137. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
  98138. "cpe_name" : [ ]
  98139. }, {
  98140. "vulnerable" : true,
  98141. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
  98142. "cpe_name" : [ ]
  98143. }, {
  98144. "vulnerable" : true,
  98145. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
  98146. "cpe_name" : [ ]
  98147. }, {
  98148. "vulnerable" : true,
  98149. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
  98150. "cpe_name" : [ ]
  98151. }, {
  98152. "vulnerable" : true,
  98153. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
  98154. "cpe_name" : [ ]
  98155. }, {
  98156. "vulnerable" : true,
  98157. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
  98158. "cpe_name" : [ ]
  98159. }, {
  98160. "vulnerable" : true,
  98161. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
  98162. "cpe_name" : [ ]
  98163. }, {
  98164. "vulnerable" : true,
  98165. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
  98166. "cpe_name" : [ ]
  98167. }, {
  98168. "vulnerable" : true,
  98169. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
  98170. "cpe_name" : [ ]
  98171. }, {
  98172. "vulnerable" : true,
  98173. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
  98174. "cpe_name" : [ ]
  98175. }, {
  98176. "vulnerable" : true,
  98177. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
  98178. "cpe_name" : [ ]
  98179. }, {
  98180. "vulnerable" : true,
  98181. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
  98182. "cpe_name" : [ ]
  98183. }, {
  98184. "vulnerable" : true,
  98185. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
  98186. "cpe_name" : [ ]
  98187. }, {
  98188. "vulnerable" : true,
  98189. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
  98190. "cpe_name" : [ ]
  98191. }, {
  98192. "vulnerable" : true,
  98193. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
  98194. "cpe_name" : [ ]
  98195. }, {
  98196. "vulnerable" : true,
  98197. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
  98198. "cpe_name" : [ ]
  98199. }, {
  98200. "vulnerable" : true,
  98201. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
  98202. "cpe_name" : [ ]
  98203. }, {
  98204. "vulnerable" : true,
  98205. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
  98206. "cpe_name" : [ ]
  98207. }, {
  98208. "vulnerable" : true,
  98209. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
  98210. "cpe_name" : [ ]
  98211. }, {
  98212. "vulnerable" : true,
  98213. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
  98214. "cpe_name" : [ ]
  98215. }, {
  98216. "vulnerable" : true,
  98217. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
  98218. "cpe_name" : [ ]
  98219. }, {
  98220. "vulnerable" : true,
  98221. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
  98222. "cpe_name" : [ ]
  98223. }, {
  98224. "vulnerable" : true,
  98225. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
  98226. "cpe_name" : [ ]
  98227. }, {
  98228. "vulnerable" : true,
  98229. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
  98230. "cpe_name" : [ ]
  98231. }, {
  98232. "vulnerable" : true,
  98233. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
  98234. "cpe_name" : [ ]
  98235. }, {
  98236. "vulnerable" : true,
  98237. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
  98238. "cpe_name" : [ ]
  98239. }, {
  98240. "vulnerable" : true,
  98241. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
  98242. "cpe_name" : [ ]
  98243. }, {
  98244. "vulnerable" : true,
  98245. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
  98246. "cpe_name" : [ ]
  98247. }, {
  98248. "vulnerable" : true,
  98249. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
  98250. "cpe_name" : [ ]
  98251. }, {
  98252. "vulnerable" : true,
  98253. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
  98254. "cpe_name" : [ ]
  98255. }, {
  98256. "vulnerable" : true,
  98257. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
  98258. "cpe_name" : [ ]
  98259. }, {
  98260. "vulnerable" : true,
  98261. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
  98262. "cpe_name" : [ ]
  98263. }, {
  98264. "vulnerable" : true,
  98265. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
  98266. "cpe_name" : [ ]
  98267. }, {
  98268. "vulnerable" : true,
  98269. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
  98270. "cpe_name" : [ ]
  98271. }, {
  98272. "vulnerable" : true,
  98273. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
  98274. "cpe_name" : [ ]
  98275. }, {
  98276. "vulnerable" : true,
  98277. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
  98278. "cpe_name" : [ ]
  98279. }, {
  98280. "vulnerable" : true,
  98281. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
  98282. "cpe_name" : [ ]
  98283. }, {
  98284. "vulnerable" : true,
  98285. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
  98286. "cpe_name" : [ ]
  98287. }, {
  98288. "vulnerable" : true,
  98289. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
  98290. "cpe_name" : [ ]
  98291. }, {
  98292. "vulnerable" : true,
  98293. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
  98294. "cpe_name" : [ ]
  98295. }, {
  98296. "vulnerable" : true,
  98297. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
  98298. "cpe_name" : [ ]
  98299. }, {
  98300. "vulnerable" : true,
  98301. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
  98302. "cpe_name" : [ ]
  98303. }, {
  98304. "vulnerable" : true,
  98305. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
  98306. "cpe_name" : [ ]
  98307. }, {
  98308. "vulnerable" : true,
  98309. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
  98310. "cpe_name" : [ ]
  98311. }, {
  98312. "vulnerable" : true,
  98313. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
  98314. "cpe_name" : [ ]
  98315. }, {
  98316. "vulnerable" : true,
  98317. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
  98318. "cpe_name" : [ ]
  98319. }, {
  98320. "vulnerable" : true,
  98321. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
  98322. "cpe_name" : [ ]
  98323. }, {
  98324. "vulnerable" : true,
  98325. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
  98326. "cpe_name" : [ ]
  98327. }, {
  98328. "vulnerable" : true,
  98329. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
  98330. "cpe_name" : [ ]
  98331. }, {
  98332. "vulnerable" : true,
  98333. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
  98334. "cpe_name" : [ ]
  98335. }, {
  98336. "vulnerable" : true,
  98337. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
  98338. "cpe_name" : [ ]
  98339. }, {
  98340. "vulnerable" : true,
  98341. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
  98342. "cpe_name" : [ ]
  98343. }, {
  98344. "vulnerable" : true,
  98345. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
  98346. "cpe_name" : [ ]
  98347. }, {
  98348. "vulnerable" : true,
  98349. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
  98350. "cpe_name" : [ ]
  98351. }, {
  98352. "vulnerable" : true,
  98353. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
  98354. "cpe_name" : [ ]
  98355. }, {
  98356. "vulnerable" : true,
  98357. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
  98358. "cpe_name" : [ ]
  98359. }, {
  98360. "vulnerable" : true,
  98361. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
  98362. "cpe_name" : [ ]
  98363. }, {
  98364. "vulnerable" : true,
  98365. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
  98366. "cpe_name" : [ ]
  98367. }, {
  98368. "vulnerable" : true,
  98369. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
  98370. "cpe_name" : [ ]
  98371. }, {
  98372. "vulnerable" : true,
  98373. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
  98374. "cpe_name" : [ ]
  98375. }, {
  98376. "vulnerable" : true,
  98377. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
  98378. "cpe_name" : [ ]
  98379. }, {
  98380. "vulnerable" : true,
  98381. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
  98382. "cpe_name" : [ ]
  98383. }, {
  98384. "vulnerable" : true,
  98385. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
  98386. "cpe_name" : [ ]
  98387. }, {
  98388. "vulnerable" : true,
  98389. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
  98390. "cpe_name" : [ ]
  98391. }, {
  98392. "vulnerable" : true,
  98393. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
  98394. "cpe_name" : [ ]
  98395. }, {
  98396. "vulnerable" : true,
  98397. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
  98398. "cpe_name" : [ ]
  98399. }, {
  98400. "vulnerable" : true,
  98401. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
  98402. "cpe_name" : [ ]
  98403. }, {
  98404. "vulnerable" : true,
  98405. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
  98406. "cpe_name" : [ ]
  98407. }, {
  98408. "vulnerable" : true,
  98409. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
  98410. "cpe_name" : [ ]
  98411. }, {
  98412. "vulnerable" : true,
  98413. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
  98414. "cpe_name" : [ ]
  98415. }, {
  98416. "vulnerable" : true,
  98417. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
  98418. "cpe_name" : [ ]
  98419. }, {
  98420. "vulnerable" : true,
  98421. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
  98422. "cpe_name" : [ ]
  98423. }, {
  98424. "vulnerable" : true,
  98425. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
  98426. "cpe_name" : [ ]
  98427. }, {
  98428. "vulnerable" : true,
  98429. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
  98430. "cpe_name" : [ ]
  98431. }, {
  98432. "vulnerable" : true,
  98433. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
  98434. "cpe_name" : [ ]
  98435. }, {
  98436. "vulnerable" : true,
  98437. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
  98438. "cpe_name" : [ ]
  98439. }, {
  98440. "vulnerable" : true,
  98441. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
  98442. "cpe_name" : [ ]
  98443. }, {
  98444. "vulnerable" : true,
  98445. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
  98446. "cpe_name" : [ ]
  98447. }, {
  98448. "vulnerable" : true,
  98449. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
  98450. "cpe_name" : [ ]
  98451. }, {
  98452. "vulnerable" : true,
  98453. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
  98454. "cpe_name" : [ ]
  98455. }, {
  98456. "vulnerable" : true,
  98457. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
  98458. "cpe_name" : [ ]
  98459. }, {
  98460. "vulnerable" : true,
  98461. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
  98462. "cpe_name" : [ ]
  98463. }, {
  98464. "vulnerable" : true,
  98465. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
  98466. "cpe_name" : [ ]
  98467. }, {
  98468. "vulnerable" : true,
  98469. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
  98470. "cpe_name" : [ ]
  98471. }, {
  98472. "vulnerable" : true,
  98473. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
  98474. "cpe_name" : [ ]
  98475. }, {
  98476. "vulnerable" : true,
  98477. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
  98478. "cpe_name" : [ ]
  98479. }, {
  98480. "vulnerable" : true,
  98481. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
  98482. "cpe_name" : [ ]
  98483. }, {
  98484. "vulnerable" : true,
  98485. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
  98486. "cpe_name" : [ ]
  98487. }, {
  98488. "vulnerable" : true,
  98489. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
  98490. "cpe_name" : [ ]
  98491. }, {
  98492. "vulnerable" : true,
  98493. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
  98494. "cpe_name" : [ ]
  98495. }, {
  98496. "vulnerable" : true,
  98497. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
  98498. "cpe_name" : [ ]
  98499. }, {
  98500. "vulnerable" : true,
  98501. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
  98502. "cpe_name" : [ ]
  98503. }, {
  98504. "vulnerable" : true,
  98505. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
  98506. "cpe_name" : [ ]
  98507. }, {
  98508. "vulnerable" : true,
  98509. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
  98510. "cpe_name" : [ ]
  98511. }, {
  98512. "vulnerable" : true,
  98513. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
  98514. "cpe_name" : [ ]
  98515. }, {
  98516. "vulnerable" : true,
  98517. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
  98518. "cpe_name" : [ ]
  98519. }, {
  98520. "vulnerable" : true,
  98521. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*",
  98522. "cpe_name" : [ ]
  98523. }, {
  98524. "vulnerable" : true,
  98525. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*",
  98526. "cpe_name" : [ ]
  98527. }, {
  98528. "vulnerable" : true,
  98529. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
  98530. "cpe_name" : [ ]
  98531. }, {
  98532. "vulnerable" : true,
  98533. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
  98534. "cpe_name" : [ ]
  98535. }, {
  98536. "vulnerable" : true,
  98537. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
  98538. "cpe_name" : [ ]
  98539. }, {
  98540. "vulnerable" : true,
  98541. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
  98542. "cpe_name" : [ ]
  98543. }, {
  98544. "vulnerable" : true,
  98545. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
  98546. "cpe_name" : [ ]
  98547. }, {
  98548. "vulnerable" : true,
  98549. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
  98550. "cpe_name" : [ ]
  98551. }, {
  98552. "vulnerable" : true,
  98553. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
  98554. "cpe_name" : [ ]
  98555. }, {
  98556. "vulnerable" : true,
  98557. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
  98558. "cpe_name" : [ ]
  98559. }, {
  98560. "vulnerable" : true,
  98561. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
  98562. "cpe_name" : [ ]
  98563. }, {
  98564. "vulnerable" : true,
  98565. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
  98566. "cpe_name" : [ ]
  98567. }, {
  98568. "vulnerable" : true,
  98569. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
  98570. "cpe_name" : [ ]
  98571. }, {
  98572. "vulnerable" : true,
  98573. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
  98574. "cpe_name" : [ ]
  98575. }, {
  98576. "vulnerable" : true,
  98577. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
  98578. "cpe_name" : [ ]
  98579. }, {
  98580. "vulnerable" : true,
  98581. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
  98582. "cpe_name" : [ ]
  98583. }, {
  98584. "vulnerable" : true,
  98585. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
  98586. "cpe_name" : [ ]
  98587. }, {
  98588. "vulnerable" : true,
  98589. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
  98590. "cpe_name" : [ ]
  98591. }, {
  98592. "vulnerable" : true,
  98593. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
  98594. "cpe_name" : [ ]
  98595. }, {
  98596. "vulnerable" : true,
  98597. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
  98598. "cpe_name" : [ ]
  98599. }, {
  98600. "vulnerable" : true,
  98601. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
  98602. "cpe_name" : [ ]
  98603. }, {
  98604. "vulnerable" : true,
  98605. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
  98606. "cpe_name" : [ ]
  98607. }, {
  98608. "vulnerable" : true,
  98609. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
  98610. "cpe_name" : [ ]
  98611. }, {
  98612. "vulnerable" : true,
  98613. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
  98614. "cpe_name" : [ ]
  98615. }, {
  98616. "vulnerable" : true,
  98617. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
  98618. "cpe_name" : [ ]
  98619. }, {
  98620. "vulnerable" : true,
  98621. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
  98622. "cpe_name" : [ ]
  98623. }, {
  98624. "vulnerable" : true,
  98625. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
  98626. "cpe_name" : [ ]
  98627. }, {
  98628. "vulnerable" : true,
  98629. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
  98630. "cpe_name" : [ ]
  98631. }, {
  98632. "vulnerable" : true,
  98633. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
  98634. "cpe_name" : [ ]
  98635. }, {
  98636. "vulnerable" : true,
  98637. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
  98638. "cpe_name" : [ ]
  98639. }, {
  98640. "vulnerable" : true,
  98641. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
  98642. "cpe_name" : [ ]
  98643. }, {
  98644. "vulnerable" : true,
  98645. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
  98646. "cpe_name" : [ ]
  98647. }, {
  98648. "vulnerable" : true,
  98649. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
  98650. "cpe_name" : [ ]
  98651. }, {
  98652. "vulnerable" : true,
  98653. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
  98654. "cpe_name" : [ ]
  98655. }, {
  98656. "vulnerable" : true,
  98657. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
  98658. "cpe_name" : [ ]
  98659. }, {
  98660. "vulnerable" : true,
  98661. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
  98662. "cpe_name" : [ ]
  98663. }, {
  98664. "vulnerable" : true,
  98665. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
  98666. "cpe_name" : [ ]
  98667. }, {
  98668. "vulnerable" : true,
  98669. "cpe23Uri" : "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
  98670. "cpe_name" : [ ]
  98671. } ]
  98672. } ]
  98673. },
  98674. "impact" : {
  98675. "baseMetricV3" : {
  98676. "cvssV3" : {
  98677. "version" : "3.0",
  98678. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  98679. "attackVector" : "NETWORK",
  98680. "attackComplexity" : "LOW",
  98681. "privilegesRequired" : "NONE",
  98682. "userInteraction" : "REQUIRED",
  98683. "scope" : "CHANGED",
  98684. "confidentialityImpact" : "LOW",
  98685. "integrityImpact" : "LOW",
  98686. "availabilityImpact" : "NONE",
  98687. "baseScore" : 6.1,
  98688. "baseSeverity" : "MEDIUM"
  98689. },
  98690. "exploitabilityScore" : 2.8,
  98691. "impactScore" : 2.7
  98692. },
  98693. "baseMetricV2" : {
  98694. "cvssV2" : {
  98695. "version" : "2.0",
  98696. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  98697. "accessVector" : "NETWORK",
  98698. "accessComplexity" : "MEDIUM",
  98699. "authentication" : "NONE",
  98700. "confidentialityImpact" : "NONE",
  98701. "integrityImpact" : "PARTIAL",
  98702. "availabilityImpact" : "NONE",
  98703. "baseScore" : 4.3
  98704. },
  98705. "severity" : "MEDIUM",
  98706. "exploitabilityScore" : 8.6,
  98707. "impactScore" : 2.9,
  98708. "acInsufInfo" : false,
  98709. "obtainAllPrivilege" : false,
  98710. "obtainUserPrivilege" : false,
  98711. "obtainOtherPrivilege" : false,
  98712. "userInteractionRequired" : true
  98713. }
  98714. },
  98715. "publishedDate" : "2018-10-17T14:29Z",
  98716. "lastModifiedDate" : "2021-05-04T15:06Z"
  98717. }, {
  98718. "cve" : {
  98719. "data_type" : "CVE",
  98720. "data_format" : "MITRE",
  98721. "data_version" : "4.0",
  98722. "CVE_data_meta" : {
  98723. "ID" : "CVE-2018-12541",
  98724. "ASSIGNER" : "security@eclipse.org"
  98725. },
  98726. "problemtype" : {
  98727. "problemtype_data" : [ {
  98728. "description" : [ {
  98729. "lang" : "en",
  98730. "value" : "CWE-119"
  98731. } ]
  98732. } ]
  98733. },
  98734. "references" : {
  98735. "reference_data" : [ {
  98736. "url" : "https://github.com/eclipse-vertx/vert.x/issues/2648",
  98737. "name" : "https://github.com/eclipse-vertx/vert.x/issues/2648",
  98738. "refsource" : "CONFIRM",
  98739. "tags" : [ "Third Party Advisory" ]
  98740. }, {
  98741. "url" : "https://bugs.eclipse.org/bugs/show_bug.cgi?id=539170",
  98742. "name" : "https://bugs.eclipse.org/bugs/show_bug.cgi?id=539170",
  98743. "refsource" : "CONFIRM",
  98744. "tags" : [ "Vendor Advisory" ]
  98745. }, {
  98746. "url" : "https://access.redhat.com/errata/RHSA-2018:2946",
  98747. "name" : "RHSA-2018:2946",
  98748. "refsource" : "REDHAT",
  98749. "tags" : [ "Third Party Advisory" ]
  98750. }, {
  98751. "url" : "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
  98752. "name" : "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list",
  98753. "refsource" : "MLIST",
  98754. "tags" : [ "Mailing List", "Third Party Advisory" ]
  98755. }, {
  98756. "url" : "https://lists.apache.org/thread.html/re5ddabee26fbcadc7254d03a5a073d64080a9389adc9e452529664ed@%3Ccommits.pulsar.apache.org%3E",
  98757. "name" : "[pulsar-commits] 20210419 [GitHub] [pulsar] lhotari opened a new pull request #10261: [Security] Upgrade vertx to 3.9.7, addresses CVE-2018-12541",
  98758. "refsource" : "MLIST",
  98759. "tags" : [ "Mailing List", "Third Party Advisory" ]
  98760. }, {
  98761. "url" : "https://lists.apache.org/thread.html/r344235b1aea2f7fa2381495df1d77d02b595e3d7e4626e701f7c1062@%3Ccommits.pulsar.apache.org%3E",
  98762. "name" : "[pulsar-commits] 20210419 [GitHub] [pulsar] lhotari commented on pull request #10261: [Security] Upgrade vertx to 3.9.7, addresses CVE-2018-12541",
  98763. "refsource" : "MLIST",
  98764. "tags" : [ "Mailing List", "Third Party Advisory" ]
  98765. }, {
  98766. "url" : "https://lists.apache.org/thread.html/r362835e6c7f34324ed24e318b363fcdd20cea91d0cea0b2e1164f73e@%3Cissues.bookkeeper.apache.org%3E",
  98767. "name" : "[bookkeeper-issues] 20210419 [GitHub] [bookkeeper] lhotari opened a new pull request #2693: [Security] Upgrade vertx to 3.9.7, addresses CVE-2018-12541",
  98768. "refsource" : "MLIST",
  98769. "tags" : [ "Mailing List", "Third Party Advisory" ]
  98770. }, {
  98771. "url" : "https://lists.apache.org/thread.html/r11789cd6d67ecca2d6f6bbb11e34495e68ee99287b6c59edf5b1a09c@%3Ccommits.pulsar.apache.org%3E",
  98772. "name" : "[pulsar-commits] 20210419 [GitHub] [pulsar] eolivelli merged pull request #10261: [Security] Upgrade vertx to 3.9.7, addresses CVE-2018-12541",
  98773. "refsource" : "MLIST",
  98774. "tags" : [ "Mailing List", "Third Party Advisory" ]
  98775. }, {
  98776. "url" : "https://lists.apache.org/thread.html/r3da899890536af744dec897fbc561fd9810ac45e79a16164b53c31b2@%3Ccommits.pulsar.apache.org%3E",
  98777. "name" : "[pulsar-commits] 20210419 [GitHub] [pulsar] lhotari edited a comment on pull request #10261: [Security] Upgrade vertx to 3.9.7, addresses CVE-2018-12541",
  98778. "refsource" : "MLIST",
  98779. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  98780. }, {
  98781. "url" : "https://lists.apache.org/thread.html/r8db0431ecf93f2dd2128db5ddca897b33ba883b7f126648d6a9e4c47@%3Ccommits.pulsar.apache.org%3E",
  98782. "name" : "[pulsar-commits] 20210419 [pulsar] branch master updated: [Security] Upgrade vertx to 3.9.7, addresses CVE-2018-12541 (#10261)",
  98783. "refsource" : "MLIST",
  98784. "tags" : [ "Mailing List", "Patch", "Third Party Advisory" ]
  98785. }, {
  98786. "url" : "https://lists.apache.org/thread.html/rbdc279ecdb7ac496a03befb05a53605c4ce2b67e14f8f4df4cfa1203@%3Cissues.bookkeeper.apache.org%3E",
  98787. "name" : "[bookkeeper-issues] 20210421 [GitHub] [bookkeeper] lhotari commented on pull request #2693: [Security] Upgrade vertx to 3.9.7, addresses CVE-2018-12541",
  98788. "refsource" : "MLIST",
  98789. "tags" : [ "Mailing List", "Third Party Advisory" ]
  98790. }, {
  98791. "url" : "https://lists.apache.org/thread.html/r1af71105539fe01fcecb92d2ecd8eea56c515fb1c80ecab4df424553@%3Cissues.bookkeeper.apache.org%3E",
  98792. "name" : "[bookkeeper-issues] 20210507 [GitHub] [bookkeeper] dlg99 commented on pull request #2693: [Security] Upgrade vertx to 3.9.7, addresses CVE-2018-12541",
  98793. "refsource" : "MLIST",
  98794. "tags" : [ ]
  98795. } ]
  98796. },
  98797. "description" : {
  98798. "description_data" : [ {
  98799. "lang" : "en",
  98800. "value" : "In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the WebSocket HTTP upgrade implementation buffers the full http request before doing the handshake, holding the entire request body in memory. There should be a reasonnable limit (8192 bytes) above which the WebSocket gets an HTTP response with the 413 status code and the connection gets closed."
  98801. } ]
  98802. }
  98803. },
  98804. "configurations" : {
  98805. "CVE_data_version" : "4.0",
  98806. "nodes" : [ {
  98807. "operator" : "OR",
  98808. "children" : [ ],
  98809. "cpe_match" : [ {
  98810. "vulnerable" : true,
  98811. "cpe23Uri" : "cpe:2.3:a:eclipse:vert.x:*:*:*:*:*:*:*:*",
  98812. "versionStartIncluding" : "3.0.0",
  98813. "versionEndExcluding" : "3.9.7",
  98814. "cpe_name" : [ ]
  98815. } ]
  98816. } ]
  98817. },
  98818. "impact" : {
  98819. "baseMetricV3" : {
  98820. "cvssV3" : {
  98821. "version" : "3.1",
  98822. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
  98823. "attackVector" : "NETWORK",
  98824. "attackComplexity" : "LOW",
  98825. "privilegesRequired" : "LOW",
  98826. "userInteraction" : "NONE",
  98827. "scope" : "UNCHANGED",
  98828. "confidentialityImpact" : "NONE",
  98829. "integrityImpact" : "NONE",
  98830. "availabilityImpact" : "HIGH",
  98831. "baseScore" : 6.5,
  98832. "baseSeverity" : "MEDIUM"
  98833. },
  98834. "exploitabilityScore" : 2.8,
  98835. "impactScore" : 3.6
  98836. },
  98837. "baseMetricV2" : {
  98838. "cvssV2" : {
  98839. "version" : "2.0",
  98840. "vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P",
  98841. "accessVector" : "NETWORK",
  98842. "accessComplexity" : "LOW",
  98843. "authentication" : "SINGLE",
  98844. "confidentialityImpact" : "NONE",
  98845. "integrityImpact" : "NONE",
  98846. "availabilityImpact" : "PARTIAL",
  98847. "baseScore" : 4.0
  98848. },
  98849. "severity" : "MEDIUM",
  98850. "exploitabilityScore" : 8.0,
  98851. "impactScore" : 2.9,
  98852. "acInsufInfo" : false,
  98853. "obtainAllPrivilege" : false,
  98854. "obtainUserPrivilege" : false,
  98855. "obtainOtherPrivilege" : false,
  98856. "userInteractionRequired" : false
  98857. }
  98858. },
  98859. "publishedDate" : "2018-10-10T20:29Z",
  98860. "lastModifiedDate" : "2021-05-08T00:15Z"
  98861. }, {
  98862. "cve" : {
  98863. "data_type" : "CVE",
  98864. "data_format" : "MITRE",
  98865. "data_version" : "4.0",
  98866. "CVE_data_meta" : {
  98867. "ID" : "CVE-2017-18347",
  98868. "ASSIGNER" : "cve@mitre.org"
  98869. },
  98870. "problemtype" : {
  98871. "problemtype_data" : [ {
  98872. "description" : [ {
  98873. "lang" : "en",
  98874. "value" : "CWE-362"
  98875. } ]
  98876. } ]
  98877. },
  98878. "references" : {
  98879. "reference_data" : [ {
  98880. "url" : "https://www.usenix.org/conference/woot17/workshop-program/presentation/obermaier",
  98881. "name" : "https://www.usenix.org/conference/woot17/workshop-program/presentation/obermaier",
  98882. "refsource" : "MISC",
  98883. "tags" : [ "Exploit", "Third Party Advisory" ]
  98884. }, {
  98885. "url" : "https://www.aisec.fraunhofer.de/en/FirmwareProtection.html",
  98886. "name" : "https://www.aisec.fraunhofer.de/en/FirmwareProtection.html",
  98887. "refsource" : "MISC",
  98888. "tags" : [ "Exploit", "Third Party Advisory" ]
  98889. }, {
  98890. "url" : "https://community.st.com/s/question/0D50X00009Xke7aSAB/readout-protection-cracked-on-stm32",
  98891. "name" : "https://community.st.com/s/question/0D50X00009Xke7aSAB/readout-protection-cracked-on-stm32",
  98892. "refsource" : "MISC",
  98893. "tags" : [ "Vendor Advisory" ]
  98894. } ]
  98895. },
  98896. "description" : {
  98897. "description_data" : [ {
  98898. "lang" : "en",
  98899. "value" : "Incorrect access control in RDP Level 1 on STMicroelectronics STM32F0 series devices allows physically present attackers to extract the device's protected firmware via a special sequence of Serial Wire Debug (SWD) commands because there is a race condition between full initialization of the SWD interface and the setup of flash protection."
  98900. } ]
  98901. }
  98902. },
  98903. "configurations" : {
  98904. "CVE_data_version" : "4.0",
  98905. "nodes" : [ {
  98906. "operator" : "AND",
  98907. "children" : [ {
  98908. "operator" : "OR",
  98909. "children" : [ ],
  98910. "cpe_match" : [ {
  98911. "vulnerable" : true,
  98912. "cpe23Uri" : "cpe:2.3:o:st:stm32f071rb_firmware:-:*:*:*:*:*:*:*",
  98913. "cpe_name" : [ ]
  98914. } ]
  98915. }, {
  98916. "operator" : "OR",
  98917. "children" : [ ],
  98918. "cpe_match" : [ {
  98919. "vulnerable" : false,
  98920. "cpe23Uri" : "cpe:2.3:h:st:stm32f071rb:-:*:*:*:*:*:*:*",
  98921. "cpe_name" : [ ]
  98922. } ]
  98923. } ],
  98924. "cpe_match" : [ ]
  98925. }, {
  98926. "operator" : "AND",
  98927. "children" : [ {
  98928. "operator" : "OR",
  98929. "children" : [ ],
  98930. "cpe_match" : [ {
  98931. "vulnerable" : true,
  98932. "cpe23Uri" : "cpe:2.3:o:st:stm32f071v8_firmware:-:*:*:*:*:*:*:*",
  98933. "cpe_name" : [ ]
  98934. } ]
  98935. }, {
  98936. "operator" : "OR",
  98937. "children" : [ ],
  98938. "cpe_match" : [ {
  98939. "vulnerable" : false,
  98940. "cpe23Uri" : "cpe:2.3:h:st:stm32f071v8:-:*:*:*:*:*:*:*",
  98941. "cpe_name" : [ ]
  98942. } ]
  98943. } ],
  98944. "cpe_match" : [ ]
  98945. }, {
  98946. "operator" : "AND",
  98947. "children" : [ {
  98948. "operator" : "OR",
  98949. "children" : [ ],
  98950. "cpe_match" : [ {
  98951. "vulnerable" : true,
  98952. "cpe23Uri" : "cpe:2.3:o:st:stm32f071vb_firmware:-:*:*:*:*:*:*:*",
  98953. "cpe_name" : [ ]
  98954. } ]
  98955. }, {
  98956. "operator" : "OR",
  98957. "children" : [ ],
  98958. "cpe_match" : [ {
  98959. "vulnerable" : false,
  98960. "cpe23Uri" : "cpe:2.3:h:st:stm32f071vb:-:*:*:*:*:*:*:*",
  98961. "cpe_name" : [ ]
  98962. } ]
  98963. } ],
  98964. "cpe_match" : [ ]
  98965. }, {
  98966. "operator" : "AND",
  98967. "children" : [ {
  98968. "operator" : "OR",
  98969. "children" : [ ],
  98970. "cpe_match" : [ {
  98971. "vulnerable" : true,
  98972. "cpe23Uri" : "cpe:2.3:o:st:stm32f072c8_firmware:-:*:*:*:*:*:*:*",
  98973. "cpe_name" : [ ]
  98974. } ]
  98975. }, {
  98976. "operator" : "OR",
  98977. "children" : [ ],
  98978. "cpe_match" : [ {
  98979. "vulnerable" : false,
  98980. "cpe23Uri" : "cpe:2.3:h:st:stm32f072c8:-:*:*:*:*:*:*:*",
  98981. "cpe_name" : [ ]
  98982. } ]
  98983. } ],
  98984. "cpe_match" : [ ]
  98985. }, {
  98986. "operator" : "AND",
  98987. "children" : [ {
  98988. "operator" : "OR",
  98989. "children" : [ ],
  98990. "cpe_match" : [ {
  98991. "vulnerable" : true,
  98992. "cpe23Uri" : "cpe:2.3:o:st:stm32f072cb_firmware:-:*:*:*:*:*:*:*",
  98993. "cpe_name" : [ ]
  98994. } ]
  98995. }, {
  98996. "operator" : "OR",
  98997. "children" : [ ],
  98998. "cpe_match" : [ {
  98999. "vulnerable" : false,
  99000. "cpe23Uri" : "cpe:2.3:h:st:stm32f072cb:-:*:*:*:*:*:*:*",
  99001. "cpe_name" : [ ]
  99002. } ]
  99003. } ],
  99004. "cpe_match" : [ ]
  99005. }, {
  99006. "operator" : "AND",
  99007. "children" : [ {
  99008. "operator" : "OR",
  99009. "children" : [ ],
  99010. "cpe_match" : [ {
  99011. "vulnerable" : true,
  99012. "cpe23Uri" : "cpe:2.3:o:st:stm32f072r8_firmware:-:*:*:*:*:*:*:*",
  99013. "cpe_name" : [ ]
  99014. } ]
  99015. }, {
  99016. "operator" : "OR",
  99017. "children" : [ ],
  99018. "cpe_match" : [ {
  99019. "vulnerable" : false,
  99020. "cpe23Uri" : "cpe:2.3:h:st:stm32f072r8:-:*:*:*:*:*:*:*",
  99021. "cpe_name" : [ ]
  99022. } ]
  99023. } ],
  99024. "cpe_match" : [ ]
  99025. }, {
  99026. "operator" : "AND",
  99027. "children" : [ {
  99028. "operator" : "OR",
  99029. "children" : [ ],
  99030. "cpe_match" : [ {
  99031. "vulnerable" : true,
  99032. "cpe23Uri" : "cpe:2.3:o:st:stm32f072rb_firmware:-:*:*:*:*:*:*:*",
  99033. "cpe_name" : [ ]
  99034. } ]
  99035. }, {
  99036. "operator" : "OR",
  99037. "children" : [ ],
  99038. "cpe_match" : [ {
  99039. "vulnerable" : false,
  99040. "cpe23Uri" : "cpe:2.3:h:st:stm32f072rb:-:*:*:*:*:*:*:*",
  99041. "cpe_name" : [ ]
  99042. } ]
  99043. } ],
  99044. "cpe_match" : [ ]
  99045. }, {
  99046. "operator" : "AND",
  99047. "children" : [ {
  99048. "operator" : "OR",
  99049. "children" : [ ],
  99050. "cpe_match" : [ {
  99051. "vulnerable" : true,
  99052. "cpe23Uri" : "cpe:2.3:o:st:stm32f072v8_firmware:-:*:*:*:*:*:*:*",
  99053. "cpe_name" : [ ]
  99054. } ]
  99055. }, {
  99056. "operator" : "OR",
  99057. "children" : [ ],
  99058. "cpe_match" : [ {
  99059. "vulnerable" : false,
  99060. "cpe23Uri" : "cpe:2.3:h:st:stm32f072v8:-:*:*:*:*:*:*:*",
  99061. "cpe_name" : [ ]
  99062. } ]
  99063. } ],
  99064. "cpe_match" : [ ]
  99065. }, {
  99066. "operator" : "AND",
  99067. "children" : [ {
  99068. "operator" : "OR",
  99069. "children" : [ ],
  99070. "cpe_match" : [ {
  99071. "vulnerable" : true,
  99072. "cpe23Uri" : "cpe:2.3:o:st:stm32f072vb_firmware:-:*:*:*:*:*:*:*",
  99073. "cpe_name" : [ ]
  99074. } ]
  99075. }, {
  99076. "operator" : "OR",
  99077. "children" : [ ],
  99078. "cpe_match" : [ {
  99079. "vulnerable" : false,
  99080. "cpe23Uri" : "cpe:2.3:h:st:stm32f072vb:-:*:*:*:*:*:*:*",
  99081. "cpe_name" : [ ]
  99082. } ]
  99083. } ],
  99084. "cpe_match" : [ ]
  99085. }, {
  99086. "operator" : "AND",
  99087. "children" : [ {
  99088. "operator" : "OR",
  99089. "children" : [ ],
  99090. "cpe_match" : [ {
  99091. "vulnerable" : true,
  99092. "cpe23Uri" : "cpe:2.3:o:st:stm32f078cb_firmware:-:*:*:*:*:*:*:*",
  99093. "cpe_name" : [ ]
  99094. } ]
  99095. }, {
  99096. "operator" : "OR",
  99097. "children" : [ ],
  99098. "cpe_match" : [ {
  99099. "vulnerable" : false,
  99100. "cpe23Uri" : "cpe:2.3:h:st:stm32f078cb:-:*:*:*:*:*:*:*",
  99101. "cpe_name" : [ ]
  99102. } ]
  99103. } ],
  99104. "cpe_match" : [ ]
  99105. }, {
  99106. "operator" : "AND",
  99107. "children" : [ {
  99108. "operator" : "OR",
  99109. "children" : [ ],
  99110. "cpe_match" : [ {
  99111. "vulnerable" : true,
  99112. "cpe23Uri" : "cpe:2.3:o:st:stm32f078rb_firmware:-:*:*:*:*:*:*:*",
  99113. "cpe_name" : [ ]
  99114. } ]
  99115. }, {
  99116. "operator" : "OR",
  99117. "children" : [ ],
  99118. "cpe_match" : [ {
  99119. "vulnerable" : false,
  99120. "cpe23Uri" : "cpe:2.3:h:st:stm32f078rb:-:*:*:*:*:*:*:*",
  99121. "cpe_name" : [ ]
  99122. } ]
  99123. } ],
  99124. "cpe_match" : [ ]
  99125. }, {
  99126. "operator" : "AND",
  99127. "children" : [ {
  99128. "operator" : "OR",
  99129. "children" : [ ],
  99130. "cpe_match" : [ {
  99131. "vulnerable" : true,
  99132. "cpe23Uri" : "cpe:2.3:o:st:stm32f078vb_firmware:-:*:*:*:*:*:*:*",
  99133. "cpe_name" : [ ]
  99134. } ]
  99135. }, {
  99136. "operator" : "OR",
  99137. "children" : [ ],
  99138. "cpe_match" : [ {
  99139. "vulnerable" : false,
  99140. "cpe23Uri" : "cpe:2.3:h:st:stm32f078vb:-:*:*:*:*:*:*:*",
  99141. "cpe_name" : [ ]
  99142. } ]
  99143. } ],
  99144. "cpe_match" : [ ]
  99145. }, {
  99146. "operator" : "AND",
  99147. "children" : [ {
  99148. "operator" : "OR",
  99149. "children" : [ ],
  99150. "cpe_match" : [ {
  99151. "vulnerable" : true,
  99152. "cpe23Uri" : "cpe:2.3:o:st:stm32f091cb_firmware:-:*:*:*:*:*:*:*",
  99153. "cpe_name" : [ ]
  99154. } ]
  99155. }, {
  99156. "operator" : "OR",
  99157. "children" : [ ],
  99158. "cpe_match" : [ {
  99159. "vulnerable" : false,
  99160. "cpe23Uri" : "cpe:2.3:h:st:stm32f091cb:-:*:*:*:*:*:*:*",
  99161. "cpe_name" : [ ]
  99162. } ]
  99163. } ],
  99164. "cpe_match" : [ ]
  99165. }, {
  99166. "operator" : "AND",
  99167. "children" : [ {
  99168. "operator" : "OR",
  99169. "children" : [ ],
  99170. "cpe_match" : [ {
  99171. "vulnerable" : true,
  99172. "cpe23Uri" : "cpe:2.3:o:st:stm32f091cc_firmware:-:*:*:*:*:*:*:*",
  99173. "cpe_name" : [ ]
  99174. } ]
  99175. }, {
  99176. "operator" : "OR",
  99177. "children" : [ ],
  99178. "cpe_match" : [ {
  99179. "vulnerable" : false,
  99180. "cpe23Uri" : "cpe:2.3:h:st:stm32f091cc:-:*:*:*:*:*:*:*",
  99181. "cpe_name" : [ ]
  99182. } ]
  99183. } ],
  99184. "cpe_match" : [ ]
  99185. }, {
  99186. "operator" : "AND",
  99187. "children" : [ {
  99188. "operator" : "OR",
  99189. "children" : [ ],
  99190. "cpe_match" : [ {
  99191. "vulnerable" : true,
  99192. "cpe23Uri" : "cpe:2.3:o:st:stm32f091rb_firmware:-:*:*:*:*:*:*:*",
  99193. "cpe_name" : [ ]
  99194. } ]
  99195. }, {
  99196. "operator" : "OR",
  99197. "children" : [ ],
  99198. "cpe_match" : [ {
  99199. "vulnerable" : false,
  99200. "cpe23Uri" : "cpe:2.3:h:st:stm32f091rb:-:*:*:*:*:*:*:*",
  99201. "cpe_name" : [ ]
  99202. } ]
  99203. } ],
  99204. "cpe_match" : [ ]
  99205. }, {
  99206. "operator" : "AND",
  99207. "children" : [ {
  99208. "operator" : "OR",
  99209. "children" : [ ],
  99210. "cpe_match" : [ {
  99211. "vulnerable" : true,
  99212. "cpe23Uri" : "cpe:2.3:o:st:stm32f091rc_firmware:-:*:*:*:*:*:*:*",
  99213. "cpe_name" : [ ]
  99214. } ]
  99215. }, {
  99216. "operator" : "OR",
  99217. "children" : [ ],
  99218. "cpe_match" : [ {
  99219. "vulnerable" : false,
  99220. "cpe23Uri" : "cpe:2.3:h:st:stm32f091rc:-:*:*:*:*:*:*:*",
  99221. "cpe_name" : [ ]
  99222. } ]
  99223. } ],
  99224. "cpe_match" : [ ]
  99225. }, {
  99226. "operator" : "AND",
  99227. "children" : [ {
  99228. "operator" : "OR",
  99229. "children" : [ ],
  99230. "cpe_match" : [ {
  99231. "vulnerable" : true,
  99232. "cpe23Uri" : "cpe:2.3:o:st:stm32f091vb_firmware:-:*:*:*:*:*:*:*",
  99233. "cpe_name" : [ ]
  99234. } ]
  99235. }, {
  99236. "operator" : "OR",
  99237. "children" : [ ],
  99238. "cpe_match" : [ {
  99239. "vulnerable" : false,
  99240. "cpe23Uri" : "cpe:2.3:h:st:stm32f091vb:-:*:*:*:*:*:*:*",
  99241. "cpe_name" : [ ]
  99242. } ]
  99243. } ],
  99244. "cpe_match" : [ ]
  99245. }, {
  99246. "operator" : "AND",
  99247. "children" : [ {
  99248. "operator" : "OR",
  99249. "children" : [ ],
  99250. "cpe_match" : [ {
  99251. "vulnerable" : true,
  99252. "cpe23Uri" : "cpe:2.3:o:st:stm32f091vc_firmware:-:*:*:*:*:*:*:*",
  99253. "cpe_name" : [ ]
  99254. } ]
  99255. }, {
  99256. "operator" : "OR",
  99257. "children" : [ ],
  99258. "cpe_match" : [ {
  99259. "vulnerable" : false,
  99260. "cpe23Uri" : "cpe:2.3:h:st:stm32f091vc:-:*:*:*:*:*:*:*",
  99261. "cpe_name" : [ ]
  99262. } ]
  99263. } ],
  99264. "cpe_match" : [ ]
  99265. }, {
  99266. "operator" : "AND",
  99267. "children" : [ {
  99268. "operator" : "OR",
  99269. "children" : [ ],
  99270. "cpe_match" : [ {
  99271. "vulnerable" : true,
  99272. "cpe23Uri" : "cpe:2.3:o:st:stm32f098cc_firmware:-:*:*:*:*:*:*:*",
  99273. "cpe_name" : [ ]
  99274. } ]
  99275. }, {
  99276. "operator" : "OR",
  99277. "children" : [ ],
  99278. "cpe_match" : [ {
  99279. "vulnerable" : false,
  99280. "cpe23Uri" : "cpe:2.3:h:st:stm32f098cc:-:*:*:*:*:*:*:*",
  99281. "cpe_name" : [ ]
  99282. } ]
  99283. } ],
  99284. "cpe_match" : [ ]
  99285. }, {
  99286. "operator" : "AND",
  99287. "children" : [ {
  99288. "operator" : "OR",
  99289. "children" : [ ],
  99290. "cpe_match" : [ {
  99291. "vulnerable" : true,
  99292. "cpe23Uri" : "cpe:2.3:o:st:stm32f098rc_firmware:-:*:*:*:*:*:*:*",
  99293. "cpe_name" : [ ]
  99294. } ]
  99295. }, {
  99296. "operator" : "OR",
  99297. "children" : [ ],
  99298. "cpe_match" : [ {
  99299. "vulnerable" : false,
  99300. "cpe23Uri" : "cpe:2.3:h:st:stm32f098rc:-:*:*:*:*:*:*:*",
  99301. "cpe_name" : [ ]
  99302. } ]
  99303. } ],
  99304. "cpe_match" : [ ]
  99305. }, {
  99306. "operator" : "AND",
  99307. "children" : [ {
  99308. "operator" : "OR",
  99309. "children" : [ ],
  99310. "cpe_match" : [ {
  99311. "vulnerable" : true,
  99312. "cpe23Uri" : "cpe:2.3:o:st:stm32f098vc_firmware:-:*:*:*:*:*:*:*",
  99313. "cpe_name" : [ ]
  99314. } ]
  99315. }, {
  99316. "operator" : "OR",
  99317. "children" : [ ],
  99318. "cpe_match" : [ {
  99319. "vulnerable" : false,
  99320. "cpe23Uri" : "cpe:2.3:h:st:stm32f098vc:-:*:*:*:*:*:*:*",
  99321. "cpe_name" : [ ]
  99322. } ]
  99323. } ],
  99324. "cpe_match" : [ ]
  99325. }, {
  99326. "operator" : "AND",
  99327. "children" : [ {
  99328. "operator" : "OR",
  99329. "children" : [ ],
  99330. "cpe_match" : [ {
  99331. "vulnerable" : true,
  99332. "cpe23Uri" : "cpe:2.3:o:st:stm32f070c6_firmware:-:*:*:*:*:*:*:*",
  99333. "cpe_name" : [ ]
  99334. } ]
  99335. }, {
  99336. "operator" : "OR",
  99337. "children" : [ ],
  99338. "cpe_match" : [ {
  99339. "vulnerable" : false,
  99340. "cpe23Uri" : "cpe:2.3:h:st:stm32f070c6:-:*:*:*:*:*:*:*",
  99341. "cpe_name" : [ ]
  99342. } ]
  99343. } ],
  99344. "cpe_match" : [ ]
  99345. }, {
  99346. "operator" : "AND",
  99347. "children" : [ {
  99348. "operator" : "OR",
  99349. "children" : [ ],
  99350. "cpe_match" : [ {
  99351. "vulnerable" : true,
  99352. "cpe23Uri" : "cpe:2.3:o:st:stm32f070cb_firmware:-:*:*:*:*:*:*:*",
  99353. "cpe_name" : [ ]
  99354. } ]
  99355. }, {
  99356. "operator" : "OR",
  99357. "children" : [ ],
  99358. "cpe_match" : [ {
  99359. "vulnerable" : false,
  99360. "cpe23Uri" : "cpe:2.3:h:st:stm32f070cb:-:*:*:*:*:*:*:*",
  99361. "cpe_name" : [ ]
  99362. } ]
  99363. } ],
  99364. "cpe_match" : [ ]
  99365. }, {
  99366. "operator" : "AND",
  99367. "children" : [ {
  99368. "operator" : "OR",
  99369. "children" : [ ],
  99370. "cpe_match" : [ {
  99371. "vulnerable" : true,
  99372. "cpe23Uri" : "cpe:2.3:o:st:stm32f070f6_firmware:-:*:*:*:*:*:*:*",
  99373. "cpe_name" : [ ]
  99374. } ]
  99375. }, {
  99376. "operator" : "OR",
  99377. "children" : [ ],
  99378. "cpe_match" : [ {
  99379. "vulnerable" : false,
  99380. "cpe23Uri" : "cpe:2.3:h:st:stm32f070f6:-:*:*:*:*:*:*:*",
  99381. "cpe_name" : [ ]
  99382. } ]
  99383. } ],
  99384. "cpe_match" : [ ]
  99385. }, {
  99386. "operator" : "AND",
  99387. "children" : [ {
  99388. "operator" : "OR",
  99389. "children" : [ ],
  99390. "cpe_match" : [ {
  99391. "vulnerable" : true,
  99392. "cpe23Uri" : "cpe:2.3:o:st:stm32f070rb_firmware:-:*:*:*:*:*:*:*",
  99393. "cpe_name" : [ ]
  99394. } ]
  99395. }, {
  99396. "operator" : "OR",
  99397. "children" : [ ],
  99398. "cpe_match" : [ {
  99399. "vulnerable" : false,
  99400. "cpe23Uri" : "cpe:2.3:h:st:stm32f070rb:-:*:*:*:*:*:*:*",
  99401. "cpe_name" : [ ]
  99402. } ]
  99403. } ],
  99404. "cpe_match" : [ ]
  99405. }, {
  99406. "operator" : "AND",
  99407. "children" : [ {
  99408. "operator" : "OR",
  99409. "children" : [ ],
  99410. "cpe_match" : [ {
  99411. "vulnerable" : true,
  99412. "cpe23Uri" : "cpe:2.3:o:st:stm32f071c8_firmware:-:*:*:*:*:*:*:*",
  99413. "cpe_name" : [ ]
  99414. } ]
  99415. }, {
  99416. "operator" : "OR",
  99417. "children" : [ ],
  99418. "cpe_match" : [ {
  99419. "vulnerable" : false,
  99420. "cpe23Uri" : "cpe:2.3:h:st:stm32f071c8:-:*:*:*:*:*:*:*",
  99421. "cpe_name" : [ ]
  99422. } ]
  99423. } ],
  99424. "cpe_match" : [ ]
  99425. }, {
  99426. "operator" : "AND",
  99427. "children" : [ {
  99428. "operator" : "OR",
  99429. "children" : [ ],
  99430. "cpe_match" : [ {
  99431. "vulnerable" : true,
  99432. "cpe23Uri" : "cpe:2.3:o:st:stm32f071cb_firmware:-:*:*:*:*:*:*:*",
  99433. "cpe_name" : [ ]
  99434. } ]
  99435. }, {
  99436. "operator" : "OR",
  99437. "children" : [ ],
  99438. "cpe_match" : [ {
  99439. "vulnerable" : false,
  99440. "cpe23Uri" : "cpe:2.3:h:st:stm32f071cb:-:*:*:*:*:*:*:*",
  99441. "cpe_name" : [ ]
  99442. } ]
  99443. } ],
  99444. "cpe_match" : [ ]
  99445. }, {
  99446. "operator" : "AND",
  99447. "children" : [ {
  99448. "operator" : "OR",
  99449. "children" : [ ],
  99450. "cpe_match" : [ {
  99451. "vulnerable" : true,
  99452. "cpe23Uri" : "cpe:2.3:o:st:stm32f051t8_firmware:-:*:*:*:*:*:*:*",
  99453. "cpe_name" : [ ]
  99454. } ]
  99455. }, {
  99456. "operator" : "OR",
  99457. "children" : [ ],
  99458. "cpe_match" : [ {
  99459. "vulnerable" : false,
  99460. "cpe23Uri" : "cpe:2.3:h:st:stm32f051t8:-:*:*:*:*:*:*:*",
  99461. "cpe_name" : [ ]
  99462. } ]
  99463. } ],
  99464. "cpe_match" : [ ]
  99465. }, {
  99466. "operator" : "AND",
  99467. "children" : [ {
  99468. "operator" : "OR",
  99469. "children" : [ ],
  99470. "cpe_match" : [ {
  99471. "vulnerable" : true,
  99472. "cpe23Uri" : "cpe:2.3:o:st:stm32f058c8_firmware:-:*:*:*:*:*:*:*",
  99473. "cpe_name" : [ ]
  99474. } ]
  99475. }, {
  99476. "operator" : "OR",
  99477. "children" : [ ],
  99478. "cpe_match" : [ {
  99479. "vulnerable" : false,
  99480. "cpe23Uri" : "cpe:2.3:h:st:stm32f058c8:-:*:*:*:*:*:*:*",
  99481. "cpe_name" : [ ]
  99482. } ]
  99483. } ],
  99484. "cpe_match" : [ ]
  99485. }, {
  99486. "operator" : "AND",
  99487. "children" : [ {
  99488. "operator" : "OR",
  99489. "children" : [ ],
  99490. "cpe_match" : [ {
  99491. "vulnerable" : true,
  99492. "cpe23Uri" : "cpe:2.3:o:st:stm32f058r8_firmware:-:*:*:*:*:*:*:*",
  99493. "cpe_name" : [ ]
  99494. } ]
  99495. }, {
  99496. "operator" : "OR",
  99497. "children" : [ ],
  99498. "cpe_match" : [ {
  99499. "vulnerable" : false,
  99500. "cpe23Uri" : "cpe:2.3:h:st:stm32f058r8:-:*:*:*:*:*:*:*",
  99501. "cpe_name" : [ ]
  99502. } ]
  99503. } ],
  99504. "cpe_match" : [ ]
  99505. }, {
  99506. "operator" : "AND",
  99507. "children" : [ {
  99508. "operator" : "OR",
  99509. "children" : [ ],
  99510. "cpe_match" : [ {
  99511. "vulnerable" : true,
  99512. "cpe23Uri" : "cpe:2.3:o:st:stm32f058t8_firmware:-:*:*:*:*:*:*:*",
  99513. "cpe_name" : [ ]
  99514. } ]
  99515. }, {
  99516. "operator" : "OR",
  99517. "children" : [ ],
  99518. "cpe_match" : [ {
  99519. "vulnerable" : false,
  99520. "cpe23Uri" : "cpe:2.3:h:st:stm32f058t8:-:*:*:*:*:*:*:*",
  99521. "cpe_name" : [ ]
  99522. } ]
  99523. } ],
  99524. "cpe_match" : [ ]
  99525. }, {
  99526. "operator" : "AND",
  99527. "children" : [ {
  99528. "operator" : "OR",
  99529. "children" : [ ],
  99530. "cpe_match" : [ {
  99531. "vulnerable" : true,
  99532. "cpe23Uri" : "cpe:2.3:o:st:stm32f070c6_firmware:-:*:*:*:*:*:*:*",
  99533. "cpe_name" : [ ]
  99534. } ]
  99535. }, {
  99536. "operator" : "OR",
  99537. "children" : [ ],
  99538. "cpe_match" : [ {
  99539. "vulnerable" : false,
  99540. "cpe23Uri" : "cpe:2.3:h:st:stm32f070c6:-:*:*:*:*:*:*:*",
  99541. "cpe_name" : [ ]
  99542. } ]
  99543. } ],
  99544. "cpe_match" : [ ]
  99545. }, {
  99546. "operator" : "AND",
  99547. "children" : [ {
  99548. "operator" : "OR",
  99549. "children" : [ ],
  99550. "cpe_match" : [ {
  99551. "vulnerable" : true,
  99552. "cpe23Uri" : "cpe:2.3:o:st:stm32f051k4_firmware:-:*:*:*:*:*:*:*",
  99553. "cpe_name" : [ ]
  99554. } ]
  99555. }, {
  99556. "operator" : "OR",
  99557. "children" : [ ],
  99558. "cpe_match" : [ {
  99559. "vulnerable" : false,
  99560. "cpe23Uri" : "cpe:2.3:h:st:stm32f051k4:-:*:*:*:*:*:*:*",
  99561. "cpe_name" : [ ]
  99562. } ]
  99563. } ],
  99564. "cpe_match" : [ ]
  99565. }, {
  99566. "operator" : "AND",
  99567. "children" : [ {
  99568. "operator" : "OR",
  99569. "children" : [ ],
  99570. "cpe_match" : [ {
  99571. "vulnerable" : true,
  99572. "cpe23Uri" : "cpe:2.3:o:st:stm32f051k6_firmware:-:*:*:*:*:*:*:*",
  99573. "cpe_name" : [ ]
  99574. } ]
  99575. }, {
  99576. "operator" : "OR",
  99577. "children" : [ ],
  99578. "cpe_match" : [ {
  99579. "vulnerable" : false,
  99580. "cpe23Uri" : "cpe:2.3:h:st:stm32f051k6:-:*:*:*:*:*:*:*",
  99581. "cpe_name" : [ ]
  99582. } ]
  99583. } ],
  99584. "cpe_match" : [ ]
  99585. }, {
  99586. "operator" : "AND",
  99587. "children" : [ {
  99588. "operator" : "OR",
  99589. "children" : [ ],
  99590. "cpe_match" : [ {
  99591. "vulnerable" : true,
  99592. "cpe23Uri" : "cpe:2.3:o:st:stm32f051k8_firmware:-:*:*:*:*:*:*:*",
  99593. "cpe_name" : [ ]
  99594. } ]
  99595. }, {
  99596. "operator" : "OR",
  99597. "children" : [ ],
  99598. "cpe_match" : [ {
  99599. "vulnerable" : false,
  99600. "cpe23Uri" : "cpe:2.3:h:st:stm32f051k8:-:*:*:*:*:*:*:*",
  99601. "cpe_name" : [ ]
  99602. } ]
  99603. } ],
  99604. "cpe_match" : [ ]
  99605. }, {
  99606. "operator" : "AND",
  99607. "children" : [ {
  99608. "operator" : "OR",
  99609. "children" : [ ],
  99610. "cpe_match" : [ {
  99611. "vulnerable" : true,
  99612. "cpe23Uri" : "cpe:2.3:o:st:stm32f051r4_firmware:-:*:*:*:*:*:*:*",
  99613. "cpe_name" : [ ]
  99614. } ]
  99615. }, {
  99616. "operator" : "OR",
  99617. "children" : [ ],
  99618. "cpe_match" : [ {
  99619. "vulnerable" : false,
  99620. "cpe23Uri" : "cpe:2.3:h:st:stm32f051r4:-:*:*:*:*:*:*:*",
  99621. "cpe_name" : [ ]
  99622. } ]
  99623. } ],
  99624. "cpe_match" : [ ]
  99625. }, {
  99626. "operator" : "AND",
  99627. "children" : [ {
  99628. "operator" : "OR",
  99629. "children" : [ ],
  99630. "cpe_match" : [ {
  99631. "vulnerable" : true,
  99632. "cpe23Uri" : "cpe:2.3:o:st:stm32f051r6_firmware:-:*:*:*:*:*:*:*",
  99633. "cpe_name" : [ ]
  99634. } ]
  99635. }, {
  99636. "operator" : "OR",
  99637. "children" : [ ],
  99638. "cpe_match" : [ {
  99639. "vulnerable" : false,
  99640. "cpe23Uri" : "cpe:2.3:h:st:stm32f051r6:-:*:*:*:*:*:*:*",
  99641. "cpe_name" : [ ]
  99642. } ]
  99643. } ],
  99644. "cpe_match" : [ ]
  99645. }, {
  99646. "operator" : "AND",
  99647. "children" : [ {
  99648. "operator" : "OR",
  99649. "children" : [ ],
  99650. "cpe_match" : [ {
  99651. "vulnerable" : true,
  99652. "cpe23Uri" : "cpe:2.3:o:st:stm32f051r8_firmware:-:*:*:*:*:*:*:*",
  99653. "cpe_name" : [ ]
  99654. } ]
  99655. }, {
  99656. "operator" : "OR",
  99657. "children" : [ ],
  99658. "cpe_match" : [ {
  99659. "vulnerable" : false,
  99660. "cpe23Uri" : "cpe:2.3:h:st:stm32f051r8:-:*:*:*:*:*:*:*",
  99661. "cpe_name" : [ ]
  99662. } ]
  99663. } ],
  99664. "cpe_match" : [ ]
  99665. }, {
  99666. "operator" : "AND",
  99667. "children" : [ {
  99668. "operator" : "OR",
  99669. "children" : [ ],
  99670. "cpe_match" : [ {
  99671. "vulnerable" : true,
  99672. "cpe23Uri" : "cpe:2.3:o:st:stm32f042t6_firmware:-:*:*:*:*:*:*:*",
  99673. "cpe_name" : [ ]
  99674. } ]
  99675. }, {
  99676. "operator" : "OR",
  99677. "children" : [ ],
  99678. "cpe_match" : [ {
  99679. "vulnerable" : false,
  99680. "cpe23Uri" : "cpe:2.3:h:st:stm32f042t6:-:*:*:*:*:*:*:*",
  99681. "cpe_name" : [ ]
  99682. } ]
  99683. } ],
  99684. "cpe_match" : [ ]
  99685. }, {
  99686. "operator" : "AND",
  99687. "children" : [ {
  99688. "operator" : "OR",
  99689. "children" : [ ],
  99690. "cpe_match" : [ {
  99691. "vulnerable" : true,
  99692. "cpe23Uri" : "cpe:2.3:o:st:stm32f048c6_firmware:-:*:*:*:*:*:*:*",
  99693. "cpe_name" : [ ]
  99694. } ]
  99695. }, {
  99696. "operator" : "OR",
  99697. "children" : [ ],
  99698. "cpe_match" : [ {
  99699. "vulnerable" : false,
  99700. "cpe23Uri" : "cpe:2.3:h:st:stm32f048c6:-:*:*:*:*:*:*:*",
  99701. "cpe_name" : [ ]
  99702. } ]
  99703. } ],
  99704. "cpe_match" : [ ]
  99705. }, {
  99706. "operator" : "AND",
  99707. "children" : [ {
  99708. "operator" : "OR",
  99709. "children" : [ ],
  99710. "cpe_match" : [ {
  99711. "vulnerable" : true,
  99712. "cpe23Uri" : "cpe:2.3:o:st:stm32f048g6_firmware:-:*:*:*:*:*:*:*",
  99713. "cpe_name" : [ ]
  99714. } ]
  99715. }, {
  99716. "operator" : "OR",
  99717. "children" : [ ],
  99718. "cpe_match" : [ {
  99719. "vulnerable" : false,
  99720. "cpe23Uri" : "cpe:2.3:h:st:stm32f048g6:-:*:*:*:*:*:*:*",
  99721. "cpe_name" : [ ]
  99722. } ]
  99723. } ],
  99724. "cpe_match" : [ ]
  99725. }, {
  99726. "operator" : "AND",
  99727. "children" : [ {
  99728. "operator" : "OR",
  99729. "children" : [ ],
  99730. "cpe_match" : [ {
  99731. "vulnerable" : true,
  99732. "cpe23Uri" : "cpe:2.3:o:st:stm32f048t6_firmware:-:*:*:*:*:*:*:*",
  99733. "cpe_name" : [ ]
  99734. } ]
  99735. }, {
  99736. "operator" : "OR",
  99737. "children" : [ ],
  99738. "cpe_match" : [ {
  99739. "vulnerable" : false,
  99740. "cpe23Uri" : "cpe:2.3:h:st:stm32f048t6:-:*:*:*:*:*:*:*",
  99741. "cpe_name" : [ ]
  99742. } ]
  99743. } ],
  99744. "cpe_match" : [ ]
  99745. }, {
  99746. "operator" : "AND",
  99747. "children" : [ {
  99748. "operator" : "OR",
  99749. "children" : [ ],
  99750. "cpe_match" : [ {
  99751. "vulnerable" : true,
  99752. "cpe23Uri" : "cpe:2.3:o:st:stm32f051c4_firmware:-:*:*:*:*:*:*:*",
  99753. "cpe_name" : [ ]
  99754. } ]
  99755. }, {
  99756. "operator" : "OR",
  99757. "children" : [ ],
  99758. "cpe_match" : [ {
  99759. "vulnerable" : false,
  99760. "cpe23Uri" : "cpe:2.3:h:st:stm32f051c4:-:*:*:*:*:*:*:*",
  99761. "cpe_name" : [ ]
  99762. } ]
  99763. } ],
  99764. "cpe_match" : [ ]
  99765. }, {
  99766. "operator" : "AND",
  99767. "children" : [ {
  99768. "operator" : "OR",
  99769. "children" : [ ],
  99770. "cpe_match" : [ {
  99771. "vulnerable" : true,
  99772. "cpe23Uri" : "cpe:2.3:o:st:stm32f051c6_firmware:-:*:*:*:*:*:*:*",
  99773. "cpe_name" : [ ]
  99774. } ]
  99775. }, {
  99776. "operator" : "OR",
  99777. "children" : [ ],
  99778. "cpe_match" : [ {
  99779. "vulnerable" : false,
  99780. "cpe23Uri" : "cpe:2.3:h:st:stm32f051c6:-:*:*:*:*:*:*:*",
  99781. "cpe_name" : [ ]
  99782. } ]
  99783. } ],
  99784. "cpe_match" : [ ]
  99785. }, {
  99786. "operator" : "AND",
  99787. "children" : [ {
  99788. "operator" : "OR",
  99789. "children" : [ ],
  99790. "cpe_match" : [ {
  99791. "vulnerable" : true,
  99792. "cpe23Uri" : "cpe:2.3:o:st:stm32f051c8_firmware:-:*:*:*:*:*:*:*",
  99793. "cpe_name" : [ ]
  99794. } ]
  99795. }, {
  99796. "operator" : "OR",
  99797. "children" : [ ],
  99798. "cpe_match" : [ {
  99799. "vulnerable" : false,
  99800. "cpe23Uri" : "cpe:2.3:h:st:stm32f051c8:-:*:*:*:*:*:*:*",
  99801. "cpe_name" : [ ]
  99802. } ]
  99803. } ],
  99804. "cpe_match" : [ ]
  99805. }, {
  99806. "operator" : "AND",
  99807. "children" : [ {
  99808. "operator" : "OR",
  99809. "children" : [ ],
  99810. "cpe_match" : [ {
  99811. "vulnerable" : true,
  99812. "cpe23Uri" : "cpe:2.3:o:st:stm32f042f4_firmware:-:*:*:*:*:*:*:*",
  99813. "cpe_name" : [ ]
  99814. } ]
  99815. }, {
  99816. "operator" : "OR",
  99817. "children" : [ ],
  99818. "cpe_match" : [ {
  99819. "vulnerable" : false,
  99820. "cpe23Uri" : "cpe:2.3:h:st:stm32f042f4:-:*:*:*:*:*:*:*",
  99821. "cpe_name" : [ ]
  99822. } ]
  99823. } ],
  99824. "cpe_match" : [ ]
  99825. }, {
  99826. "operator" : "AND",
  99827. "children" : [ {
  99828. "operator" : "OR",
  99829. "children" : [ ],
  99830. "cpe_match" : [ {
  99831. "vulnerable" : true,
  99832. "cpe23Uri" : "cpe:2.3:o:st:stm32f042f6_firmware:-:*:*:*:*:*:*:*",
  99833. "cpe_name" : [ ]
  99834. } ]
  99835. }, {
  99836. "operator" : "OR",
  99837. "children" : [ ],
  99838. "cpe_match" : [ {
  99839. "vulnerable" : false,
  99840. "cpe23Uri" : "cpe:2.3:h:st:stm32f042f6:-:*:*:*:*:*:*:*",
  99841. "cpe_name" : [ ]
  99842. } ]
  99843. } ],
  99844. "cpe_match" : [ ]
  99845. }, {
  99846. "operator" : "AND",
  99847. "children" : [ {
  99848. "operator" : "OR",
  99849. "children" : [ ],
  99850. "cpe_match" : [ {
  99851. "vulnerable" : true,
  99852. "cpe23Uri" : "cpe:2.3:o:st:stm32f042g4_firmware:-:*:*:*:*:*:*:*",
  99853. "cpe_name" : [ ]
  99854. } ]
  99855. }, {
  99856. "operator" : "OR",
  99857. "children" : [ ],
  99858. "cpe_match" : [ {
  99859. "vulnerable" : false,
  99860. "cpe23Uri" : "cpe:2.3:h:st:stm32f042g4:-:*:*:*:*:*:*:*",
  99861. "cpe_name" : [ ]
  99862. } ]
  99863. } ],
  99864. "cpe_match" : [ ]
  99865. }, {
  99866. "operator" : "AND",
  99867. "children" : [ {
  99868. "operator" : "OR",
  99869. "children" : [ ],
  99870. "cpe_match" : [ {
  99871. "vulnerable" : true,
  99872. "cpe23Uri" : "cpe:2.3:o:st:stm32f042g6_firmware:-:*:*:*:*:*:*:*",
  99873. "cpe_name" : [ ]
  99874. } ]
  99875. }, {
  99876. "operator" : "OR",
  99877. "children" : [ ],
  99878. "cpe_match" : [ {
  99879. "vulnerable" : false,
  99880. "cpe23Uri" : "cpe:2.3:h:st:stm32f042g6:-:*:*:*:*:*:*:*",
  99881. "cpe_name" : [ ]
  99882. } ]
  99883. } ],
  99884. "cpe_match" : [ ]
  99885. }, {
  99886. "operator" : "AND",
  99887. "children" : [ {
  99888. "operator" : "OR",
  99889. "children" : [ ],
  99890. "cpe_match" : [ {
  99891. "vulnerable" : true,
  99892. "cpe23Uri" : "cpe:2.3:o:st:stm32f042k4_firmware:-:*:*:*:*:*:*:*",
  99893. "cpe_name" : [ ]
  99894. } ]
  99895. }, {
  99896. "operator" : "OR",
  99897. "children" : [ ],
  99898. "cpe_match" : [ {
  99899. "vulnerable" : false,
  99900. "cpe23Uri" : "cpe:2.3:h:st:stm32f042k4:-:*:*:*:*:*:*:*",
  99901. "cpe_name" : [ ]
  99902. } ]
  99903. } ],
  99904. "cpe_match" : [ ]
  99905. }, {
  99906. "operator" : "AND",
  99907. "children" : [ {
  99908. "operator" : "OR",
  99909. "children" : [ ],
  99910. "cpe_match" : [ {
  99911. "vulnerable" : true,
  99912. "cpe23Uri" : "cpe:2.3:o:st:stm32f042k6_firmware:-:*:*:*:*:*:*:*",
  99913. "cpe_name" : [ ]
  99914. } ]
  99915. }, {
  99916. "operator" : "OR",
  99917. "children" : [ ],
  99918. "cpe_match" : [ {
  99919. "vulnerable" : false,
  99920. "cpe23Uri" : "cpe:2.3:h:st:stm32f042k6:-:*:*:*:*:*:*:*",
  99921. "cpe_name" : [ ]
  99922. } ]
  99923. } ],
  99924. "cpe_match" : [ ]
  99925. }, {
  99926. "operator" : "AND",
  99927. "children" : [ {
  99928. "operator" : "OR",
  99929. "children" : [ ],
  99930. "cpe_match" : [ {
  99931. "vulnerable" : true,
  99932. "cpe23Uri" : "cpe:2.3:o:st:stm32f038c6_firmware:-:*:*:*:*:*:*:*",
  99933. "cpe_name" : [ ]
  99934. } ]
  99935. }, {
  99936. "operator" : "OR",
  99937. "children" : [ ],
  99938. "cpe_match" : [ {
  99939. "vulnerable" : false,
  99940. "cpe23Uri" : "cpe:2.3:h:st:stm32f038c6:-:*:*:*:*:*:*:*",
  99941. "cpe_name" : [ ]
  99942. } ]
  99943. } ],
  99944. "cpe_match" : [ ]
  99945. }, {
  99946. "operator" : "AND",
  99947. "children" : [ {
  99948. "operator" : "OR",
  99949. "children" : [ ],
  99950. "cpe_match" : [ {
  99951. "vulnerable" : true,
  99952. "cpe23Uri" : "cpe:2.3:o:st:stm32f038e6_firmware:-:*:*:*:*:*:*:*",
  99953. "cpe_name" : [ ]
  99954. } ]
  99955. }, {
  99956. "operator" : "OR",
  99957. "children" : [ ],
  99958. "cpe_match" : [ {
  99959. "vulnerable" : false,
  99960. "cpe23Uri" : "cpe:2.3:h:st:stm32f038e6:-:*:*:*:*:*:*:*",
  99961. "cpe_name" : [ ]
  99962. } ]
  99963. } ],
  99964. "cpe_match" : [ ]
  99965. }, {
  99966. "operator" : "AND",
  99967. "children" : [ {
  99968. "operator" : "OR",
  99969. "children" : [ ],
  99970. "cpe_match" : [ {
  99971. "vulnerable" : true,
  99972. "cpe23Uri" : "cpe:2.3:o:st:stm32f038f6_firmware:-:*:*:*:*:*:*:*",
  99973. "cpe_name" : [ ]
  99974. } ]
  99975. }, {
  99976. "operator" : "OR",
  99977. "children" : [ ],
  99978. "cpe_match" : [ {
  99979. "vulnerable" : false,
  99980. "cpe23Uri" : "cpe:2.3:h:st:stm32f038f6:-:*:*:*:*:*:*:*",
  99981. "cpe_name" : [ ]
  99982. } ]
  99983. } ],
  99984. "cpe_match" : [ ]
  99985. }, {
  99986. "operator" : "AND",
  99987. "children" : [ {
  99988. "operator" : "OR",
  99989. "children" : [ ],
  99990. "cpe_match" : [ {
  99991. "vulnerable" : true,
  99992. "cpe23Uri" : "cpe:2.3:o:st:stm32f038g6_firmware:-:*:*:*:*:*:*:*",
  99993. "cpe_name" : [ ]
  99994. } ]
  99995. }, {
  99996. "operator" : "OR",
  99997. "children" : [ ],
  99998. "cpe_match" : [ {
  99999. "vulnerable" : false,
  100000. "cpe23Uri" : "cpe:2.3:h:st:stm32f038g6:-:*:*:*:*:*:*:*",
  100001. "cpe_name" : [ ]
  100002. } ]
  100003. } ],
  100004. "cpe_match" : [ ]
  100005. }, {
  100006. "operator" : "AND",
  100007. "children" : [ {
  100008. "operator" : "OR",
  100009. "children" : [ ],
  100010. "cpe_match" : [ {
  100011. "vulnerable" : true,
  100012. "cpe23Uri" : "cpe:2.3:o:st:stm32f038k6_firmware:-:*:*:*:*:*:*:*",
  100013. "cpe_name" : [ ]
  100014. } ]
  100015. }, {
  100016. "operator" : "OR",
  100017. "children" : [ ],
  100018. "cpe_match" : [ {
  100019. "vulnerable" : false,
  100020. "cpe23Uri" : "cpe:2.3:h:st:stm32f038k6:-:*:*:*:*:*:*:*",
  100021. "cpe_name" : [ ]
  100022. } ]
  100023. } ],
  100024. "cpe_match" : [ ]
  100025. }, {
  100026. "operator" : "AND",
  100027. "children" : [ {
  100028. "operator" : "OR",
  100029. "children" : [ ],
  100030. "cpe_match" : [ {
  100031. "vulnerable" : true,
  100032. "cpe23Uri" : "cpe:2.3:o:st:stm32f042c4_firmware:-:*:*:*:*:*:*:*",
  100033. "cpe_name" : [ ]
  100034. } ]
  100035. }, {
  100036. "operator" : "OR",
  100037. "children" : [ ],
  100038. "cpe_match" : [ {
  100039. "vulnerable" : false,
  100040. "cpe23Uri" : "cpe:2.3:h:st:stm32f042c4:-:*:*:*:*:*:*:*",
  100041. "cpe_name" : [ ]
  100042. } ]
  100043. } ],
  100044. "cpe_match" : [ ]
  100045. }, {
  100046. "operator" : "AND",
  100047. "children" : [ {
  100048. "operator" : "OR",
  100049. "children" : [ ],
  100050. "cpe_match" : [ {
  100051. "vulnerable" : true,
  100052. "cpe23Uri" : "cpe:2.3:o:st:stm32f042c6_firmware:-:*:*:*:*:*:*:*",
  100053. "cpe_name" : [ ]
  100054. } ]
  100055. }, {
  100056. "operator" : "OR",
  100057. "children" : [ ],
  100058. "cpe_match" : [ {
  100059. "vulnerable" : false,
  100060. "cpe23Uri" : "cpe:2.3:h:st:stm32f042c6:-:*:*:*:*:*:*:*",
  100061. "cpe_name" : [ ]
  100062. } ]
  100063. } ],
  100064. "cpe_match" : [ ]
  100065. }, {
  100066. "operator" : "AND",
  100067. "children" : [ {
  100068. "operator" : "OR",
  100069. "children" : [ ],
  100070. "cpe_match" : [ {
  100071. "vulnerable" : true,
  100072. "cpe23Uri" : "cpe:2.3:o:st:stm32f031e6_firmware:-:*:*:*:*:*:*:*",
  100073. "cpe_name" : [ ]
  100074. } ]
  100075. }, {
  100076. "operator" : "OR",
  100077. "children" : [ ],
  100078. "cpe_match" : [ {
  100079. "vulnerable" : false,
  100080. "cpe23Uri" : "cpe:2.3:h:st:stm32f031e6:-:*:*:*:*:*:*:*",
  100081. "cpe_name" : [ ]
  100082. } ]
  100083. } ],
  100084. "cpe_match" : [ ]
  100085. }, {
  100086. "operator" : "AND",
  100087. "children" : [ {
  100088. "operator" : "OR",
  100089. "children" : [ ],
  100090. "cpe_match" : [ {
  100091. "vulnerable" : true,
  100092. "cpe23Uri" : "cpe:2.3:o:st:stm32f031f4_firmware:-:*:*:*:*:*:*:*",
  100093. "cpe_name" : [ ]
  100094. } ]
  100095. }, {
  100096. "operator" : "OR",
  100097. "children" : [ ],
  100098. "cpe_match" : [ {
  100099. "vulnerable" : false,
  100100. "cpe23Uri" : "cpe:2.3:h:st:stm32f031f4:-:*:*:*:*:*:*:*",
  100101. "cpe_name" : [ ]
  100102. } ]
  100103. } ],
  100104. "cpe_match" : [ ]
  100105. }, {
  100106. "operator" : "AND",
  100107. "children" : [ {
  100108. "operator" : "OR",
  100109. "children" : [ ],
  100110. "cpe_match" : [ {
  100111. "vulnerable" : true,
  100112. "cpe23Uri" : "cpe:2.3:o:st:stm32f031f6_firmware:-:*:*:*:*:*:*:*",
  100113. "cpe_name" : [ ]
  100114. } ]
  100115. }, {
  100116. "operator" : "OR",
  100117. "children" : [ ],
  100118. "cpe_match" : [ {
  100119. "vulnerable" : false,
  100120. "cpe23Uri" : "cpe:2.3:h:st:stm32f031f6:-:*:*:*:*:*:*:*",
  100121. "cpe_name" : [ ]
  100122. } ]
  100123. } ],
  100124. "cpe_match" : [ ]
  100125. }, {
  100126. "operator" : "AND",
  100127. "children" : [ {
  100128. "operator" : "OR",
  100129. "children" : [ ],
  100130. "cpe_match" : [ {
  100131. "vulnerable" : true,
  100132. "cpe23Uri" : "cpe:2.3:o:st:stm32f031g4_firmware:-:*:*:*:*:*:*:*",
  100133. "cpe_name" : [ ]
  100134. } ]
  100135. }, {
  100136. "operator" : "OR",
  100137. "children" : [ ],
  100138. "cpe_match" : [ {
  100139. "vulnerable" : false,
  100140. "cpe23Uri" : "cpe:2.3:h:st:stm32f031g4:-:*:*:*:*:*:*:*",
  100141. "cpe_name" : [ ]
  100142. } ]
  100143. } ],
  100144. "cpe_match" : [ ]
  100145. }, {
  100146. "operator" : "AND",
  100147. "children" : [ {
  100148. "operator" : "OR",
  100149. "children" : [ ],
  100150. "cpe_match" : [ {
  100151. "vulnerable" : true,
  100152. "cpe23Uri" : "cpe:2.3:o:st:stm32f031g6_firmware:-:*:*:*:*:*:*:*",
  100153. "cpe_name" : [ ]
  100154. } ]
  100155. }, {
  100156. "operator" : "OR",
  100157. "children" : [ ],
  100158. "cpe_match" : [ {
  100159. "vulnerable" : false,
  100160. "cpe23Uri" : "cpe:2.3:h:st:stm32f031g6:-:*:*:*:*:*:*:*",
  100161. "cpe_name" : [ ]
  100162. } ]
  100163. } ],
  100164. "cpe_match" : [ ]
  100165. }, {
  100166. "operator" : "AND",
  100167. "children" : [ {
  100168. "operator" : "OR",
  100169. "children" : [ ],
  100170. "cpe_match" : [ {
  100171. "vulnerable" : true,
  100172. "cpe23Uri" : "cpe:2.3:o:st:stm32f031k4_firmware:-:*:*:*:*:*:*:*",
  100173. "cpe_name" : [ ]
  100174. } ]
  100175. }, {
  100176. "operator" : "OR",
  100177. "children" : [ ],
  100178. "cpe_match" : [ {
  100179. "vulnerable" : false,
  100180. "cpe23Uri" : "cpe:2.3:h:st:stm32f031k4:-:*:*:*:*:*:*:*",
  100181. "cpe_name" : [ ]
  100182. } ]
  100183. } ],
  100184. "cpe_match" : [ ]
  100185. }, {
  100186. "operator" : "AND",
  100187. "children" : [ {
  100188. "operator" : "OR",
  100189. "children" : [ ],
  100190. "cpe_match" : [ {
  100191. "vulnerable" : true,
  100192. "cpe23Uri" : "cpe:2.3:o:st:stm32f030f4_firmware:-:*:*:*:*:*:*:*",
  100193. "cpe_name" : [ ]
  100194. } ]
  100195. }, {
  100196. "operator" : "OR",
  100197. "children" : [ ],
  100198. "cpe_match" : [ {
  100199. "vulnerable" : false,
  100200. "cpe23Uri" : "cpe:2.3:h:st:stm32f030f4:-:*:*:*:*:*:*:*",
  100201. "cpe_name" : [ ]
  100202. } ]
  100203. } ],
  100204. "cpe_match" : [ ]
  100205. }, {
  100206. "operator" : "AND",
  100207. "children" : [ {
  100208. "operator" : "OR",
  100209. "children" : [ ],
  100210. "cpe_match" : [ {
  100211. "vulnerable" : true,
  100212. "cpe23Uri" : "cpe:2.3:o:st:stm32f030k6_firmware:-:*:*:*:*:*:*:*",
  100213. "cpe_name" : [ ]
  100214. } ]
  100215. }, {
  100216. "operator" : "OR",
  100217. "children" : [ ],
  100218. "cpe_match" : [ {
  100219. "vulnerable" : false,
  100220. "cpe23Uri" : "cpe:2.3:h:st:stm32f030k6:-:*:*:*:*:*:*:*",
  100221. "cpe_name" : [ ]
  100222. } ]
  100223. } ],
  100224. "cpe_match" : [ ]
  100225. }, {
  100226. "operator" : "AND",
  100227. "children" : [ {
  100228. "operator" : "OR",
  100229. "children" : [ ],
  100230. "cpe_match" : [ {
  100231. "vulnerable" : true,
  100232. "cpe23Uri" : "cpe:2.3:o:st:stm32f030r8_firmware:-:*:*:*:*:*:*:*",
  100233. "cpe_name" : [ ]
  100234. } ]
  100235. }, {
  100236. "operator" : "OR",
  100237. "children" : [ ],
  100238. "cpe_match" : [ {
  100239. "vulnerable" : false,
  100240. "cpe23Uri" : "cpe:2.3:h:st:stm32f030r8:-:*:*:*:*:*:*:*",
  100241. "cpe_name" : [ ]
  100242. } ]
  100243. } ],
  100244. "cpe_match" : [ ]
  100245. }, {
  100246. "operator" : "AND",
  100247. "children" : [ {
  100248. "operator" : "OR",
  100249. "children" : [ ],
  100250. "cpe_match" : [ {
  100251. "vulnerable" : true,
  100252. "cpe23Uri" : "cpe:2.3:o:st:stm32f030rc_firmware:-:*:*:*:*:*:*:*",
  100253. "cpe_name" : [ ]
  100254. } ]
  100255. }, {
  100256. "operator" : "OR",
  100257. "children" : [ ],
  100258. "cpe_match" : [ {
  100259. "vulnerable" : false,
  100260. "cpe23Uri" : "cpe:2.3:h:st:stm32f030rc:-:*:*:*:*:*:*:*",
  100261. "cpe_name" : [ ]
  100262. } ]
  100263. } ],
  100264. "cpe_match" : [ ]
  100265. }, {
  100266. "operator" : "AND",
  100267. "children" : [ {
  100268. "operator" : "OR",
  100269. "children" : [ ],
  100270. "cpe_match" : [ {
  100271. "vulnerable" : true,
  100272. "cpe23Uri" : "cpe:2.3:o:st:stm32f031c4_firmware:-:*:*:*:*:*:*:*",
  100273. "cpe_name" : [ ]
  100274. } ]
  100275. }, {
  100276. "operator" : "OR",
  100277. "children" : [ ],
  100278. "cpe_match" : [ {
  100279. "vulnerable" : false,
  100280. "cpe23Uri" : "cpe:2.3:h:st:stm32f031c4:-:*:*:*:*:*:*:*",
  100281. "cpe_name" : [ ]
  100282. } ]
  100283. } ],
  100284. "cpe_match" : [ ]
  100285. }, {
  100286. "operator" : "AND",
  100287. "children" : [ {
  100288. "operator" : "OR",
  100289. "children" : [ ],
  100290. "cpe_match" : [ {
  100291. "vulnerable" : true,
  100292. "cpe23Uri" : "cpe:2.3:o:st:stm32f031c6_firmware:-:*:*:*:*:*:*:*",
  100293. "cpe_name" : [ ]
  100294. } ]
  100295. }, {
  100296. "operator" : "OR",
  100297. "children" : [ ],
  100298. "cpe_match" : [ {
  100299. "vulnerable" : false,
  100300. "cpe23Uri" : "cpe:2.3:h:st:stm32f031c6:-:*:*:*:*:*:*:*",
  100301. "cpe_name" : [ ]
  100302. } ]
  100303. } ],
  100304. "cpe_match" : [ ]
  100305. }, {
  100306. "operator" : "AND",
  100307. "children" : [ {
  100308. "operator" : "OR",
  100309. "children" : [ ],
  100310. "cpe_match" : [ {
  100311. "vulnerable" : true,
  100312. "cpe23Uri" : "cpe:2.3:o:st:stm32f030c6_firmware:-:*:*:*:*:*:*:*",
  100313. "cpe_name" : [ ]
  100314. } ]
  100315. }, {
  100316. "operator" : "OR",
  100317. "children" : [ ],
  100318. "cpe_match" : [ {
  100319. "vulnerable" : false,
  100320. "cpe23Uri" : "cpe:2.3:h:st:stm32f030c6:-:*:*:*:*:*:*:*",
  100321. "cpe_name" : [ ]
  100322. } ]
  100323. } ],
  100324. "cpe_match" : [ ]
  100325. }, {
  100326. "operator" : "AND",
  100327. "children" : [ {
  100328. "operator" : "OR",
  100329. "children" : [ ],
  100330. "cpe_match" : [ {
  100331. "vulnerable" : true,
  100332. "cpe23Uri" : "cpe:2.3:o:st:stm32f030c8_firmware:-:*:*:*:*:*:*:*",
  100333. "cpe_name" : [ ]
  100334. } ]
  100335. }, {
  100336. "operator" : "OR",
  100337. "children" : [ ],
  100338. "cpe_match" : [ {
  100339. "vulnerable" : false,
  100340. "cpe23Uri" : "cpe:2.3:h:st:stm32f030c8:-:*:*:*:*:*:*:*",
  100341. "cpe_name" : [ ]
  100342. } ]
  100343. } ],
  100344. "cpe_match" : [ ]
  100345. }, {
  100346. "operator" : "AND",
  100347. "children" : [ {
  100348. "operator" : "OR",
  100349. "children" : [ ],
  100350. "cpe_match" : [ {
  100351. "vulnerable" : true,
  100352. "cpe23Uri" : "cpe:2.3:o:st:stm32f030cc_firmware:-:*:*:*:*:*:*:*",
  100353. "cpe_name" : [ ]
  100354. } ]
  100355. }, {
  100356. "operator" : "OR",
  100357. "children" : [ ],
  100358. "cpe_match" : [ {
  100359. "vulnerable" : false,
  100360. "cpe23Uri" : "cpe:2.3:h:st:stm32f030cc:-:*:*:*:*:*:*:*",
  100361. "cpe_name" : [ ]
  100362. } ]
  100363. } ],
  100364. "cpe_match" : [ ]
  100365. } ]
  100366. },
  100367. "impact" : {
  100368. "baseMetricV3" : {
  100369. "cvssV3" : {
  100370. "version" : "3.1",
  100371. "vectorString" : "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  100372. "attackVector" : "PHYSICAL",
  100373. "attackComplexity" : "LOW",
  100374. "privilegesRequired" : "NONE",
  100375. "userInteraction" : "NONE",
  100376. "scope" : "UNCHANGED",
  100377. "confidentialityImpact" : "HIGH",
  100378. "integrityImpact" : "NONE",
  100379. "availabilityImpact" : "NONE",
  100380. "baseScore" : 4.6,
  100381. "baseSeverity" : "MEDIUM"
  100382. },
  100383. "exploitabilityScore" : 0.9,
  100384. "impactScore" : 3.6
  100385. },
  100386. "baseMetricV2" : {
  100387. "cvssV2" : {
  100388. "version" : "2.0",
  100389. "vectorString" : "AV:L/AC:L/Au:N/C:C/I:N/A:N",
  100390. "accessVector" : "LOCAL",
  100391. "accessComplexity" : "LOW",
  100392. "authentication" : "NONE",
  100393. "confidentialityImpact" : "COMPLETE",
  100394. "integrityImpact" : "NONE",
  100395. "availabilityImpact" : "NONE",
  100396. "baseScore" : 4.9
  100397. },
  100398. "severity" : "MEDIUM",
  100399. "exploitabilityScore" : 3.9,
  100400. "impactScore" : 6.9,
  100401. "obtainAllPrivilege" : false,
  100402. "obtainUserPrivilege" : false,
  100403. "obtainOtherPrivilege" : false,
  100404. "userInteractionRequired" : false
  100405. }
  100406. },
  100407. "publishedDate" : "2018-09-12T15:29Z",
  100408. "lastModifiedDate" : "2021-05-04T14:07Z"
  100409. }, {
  100410. "cve" : {
  100411. "data_type" : "CVE",
  100412. "data_format" : "MITRE",
  100413. "data_version" : "4.0",
  100414. "CVE_data_meta" : {
  100415. "ID" : "CVE-2018-16384",
  100416. "ASSIGNER" : "cve@mitre.org"
  100417. },
  100418. "problemtype" : {
  100419. "problemtype_data" : [ {
  100420. "description" : [ {
  100421. "lang" : "en",
  100422. "value" : "CWE-89"
  100423. } ]
  100424. } ]
  100425. },
  100426. "references" : {
  100427. "reference_data" : [ {
  100428. "url" : "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1167",
  100429. "name" : "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1167",
  100430. "refsource" : "MISC",
  100431. "tags" : [ "Exploit", "Third Party Advisory" ]
  100432. } ]
  100433. },
  100434. "description" : {
  100435. "description_data" : [ {
  100436. "lang" : "en",
  100437. "value" : "A SQL injection bypass (aka PL1 bypass) exists in OWASP ModSecurity Core Rule Set (owasp-modsecurity-crs) through v3.1.0-rc3 via {`a`b} where a is a special function name (such as \"if\") and b is the SQL statement to be executed."
  100438. } ]
  100439. }
  100440. },
  100441. "configurations" : {
  100442. "CVE_data_version" : "4.0",
  100443. "nodes" : [ {
  100444. "operator" : "OR",
  100445. "children" : [ ],
  100446. "cpe_match" : [ {
  100447. "vulnerable" : true,
  100448. "cpe23Uri" : "cpe:2.3:a:owasp:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*",
  100449. "versionEndIncluding" : "3.0.2:",
  100450. "cpe_name" : [ ]
  100451. }, {
  100452. "vulnerable" : true,
  100453. "cpe23Uri" : "cpe:2.3:a:owasp:owasp_modsecurity_core_rule_set:3.1.0:rc1:*:*:*:*:*:*",
  100454. "cpe_name" : [ ]
  100455. }, {
  100456. "vulnerable" : true,
  100457. "cpe23Uri" : "cpe:2.3:a:owasp:owasp_modsecurity_core_rule_set:3.1.0:rc3:*:*:*:*:*:*",
  100458. "cpe_name" : [ ]
  100459. } ]
  100460. } ]
  100461. },
  100462. "impact" : {
  100463. "baseMetricV3" : {
  100464. "cvssV3" : {
  100465. "version" : "3.1",
  100466. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  100467. "attackVector" : "NETWORK",
  100468. "attackComplexity" : "LOW",
  100469. "privilegesRequired" : "NONE",
  100470. "userInteraction" : "NONE",
  100471. "scope" : "UNCHANGED",
  100472. "confidentialityImpact" : "HIGH",
  100473. "integrityImpact" : "NONE",
  100474. "availabilityImpact" : "NONE",
  100475. "baseScore" : 7.5,
  100476. "baseSeverity" : "HIGH"
  100477. },
  100478. "exploitabilityScore" : 3.9,
  100479. "impactScore" : 3.6
  100480. },
  100481. "baseMetricV2" : {
  100482. "cvssV2" : {
  100483. "version" : "2.0",
  100484. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  100485. "accessVector" : "NETWORK",
  100486. "accessComplexity" : "LOW",
  100487. "authentication" : "NONE",
  100488. "confidentialityImpact" : "PARTIAL",
  100489. "integrityImpact" : "NONE",
  100490. "availabilityImpact" : "NONE",
  100491. "baseScore" : 5.0
  100492. },
  100493. "severity" : "MEDIUM",
  100494. "exploitabilityScore" : 10.0,
  100495. "impactScore" : 2.9,
  100496. "obtainAllPrivilege" : false,
  100497. "obtainUserPrivilege" : false,
  100498. "obtainOtherPrivilege" : false,
  100499. "userInteractionRequired" : false
  100500. }
  100501. },
  100502. "publishedDate" : "2018-09-03T02:29Z",
  100503. "lastModifiedDate" : "2021-05-10T12:32Z"
  100504. }, {
  100505. "cve" : {
  100506. "data_type" : "CVE",
  100507. "data_format" : "MITRE",
  100508. "data_version" : "4.0",
  100509. "CVE_data_meta" : {
  100510. "ID" : "CVE-2018-3627",
  100511. "ASSIGNER" : "secure@intel.com"
  100512. },
  100513. "problemtype" : {
  100514. "problemtype_data" : [ {
  100515. "description" : [ {
  100516. "lang" : "en",
  100517. "value" : "NVD-CWE-noinfo"
  100518. } ]
  100519. } ]
  100520. },
  100521. "references" : {
  100522. "reference_data" : [ {
  100523. "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00118.html",
  100524. "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00118.html",
  100525. "refsource" : "CONFIRM",
  100526. "tags" : [ "Vendor Advisory" ]
  100527. }, {
  100528. "url" : "https://security.netapp.com/advisory/ntap-20190327-0006/",
  100529. "name" : "https://security.netapp.com/advisory/ntap-20190327-0006/",
  100530. "refsource" : "CONFIRM",
  100531. "tags" : [ "Third Party Advisory" ]
  100532. } ]
  100533. },
  100534. "description" : {
  100535. "description_data" : [ {
  100536. "lang" : "en",
  100537. "value" : "Logic bug in Intel Converged Security Management Engine 11.x may allow an attacker to execute arbitrary code via local privileged access."
  100538. } ]
  100539. }
  100540. },
  100541. "configurations" : {
  100542. "CVE_data_version" : "4.0",
  100543. "nodes" : [ {
  100544. "operator" : "AND",
  100545. "children" : [ {
  100546. "operator" : "OR",
  100547. "children" : [ ],
  100548. "cpe_match" : [ {
  100549. "vulnerable" : true,
  100550. "cpe23Uri" : "cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*",
  100551. "cpe_name" : [ ]
  100552. } ]
  100553. }, {
  100554. "operator" : "OR",
  100555. "children" : [ ],
  100556. "cpe_match" : [ {
  100557. "vulnerable" : false,
  100558. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
  100559. "cpe_name" : [ ]
  100560. }, {
  100561. "vulnerable" : false,
  100562. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
  100563. "cpe_name" : [ ]
  100564. }, {
  100565. "vulnerable" : false,
  100566. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
  100567. "cpe_name" : [ ]
  100568. }, {
  100569. "vulnerable" : false,
  100570. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
  100571. "cpe_name" : [ ]
  100572. }, {
  100573. "vulnerable" : false,
  100574. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
  100575. "cpe_name" : [ ]
  100576. }, {
  100577. "vulnerable" : false,
  100578. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
  100579. "cpe_name" : [ ]
  100580. }, {
  100581. "vulnerable" : false,
  100582. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
  100583. "cpe_name" : [ ]
  100584. }, {
  100585. "vulnerable" : false,
  100586. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
  100587. "cpe_name" : [ ]
  100588. }, {
  100589. "vulnerable" : false,
  100590. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
  100591. "cpe_name" : [ ]
  100592. }, {
  100593. "vulnerable" : false,
  100594. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
  100595. "cpe_name" : [ ]
  100596. }, {
  100597. "vulnerable" : false,
  100598. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
  100599. "cpe_name" : [ ]
  100600. }, {
  100601. "vulnerable" : false,
  100602. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
  100603. "cpe_name" : [ ]
  100604. }, {
  100605. "vulnerable" : false,
  100606. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
  100607. "cpe_name" : [ ]
  100608. }, {
  100609. "vulnerable" : false,
  100610. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
  100611. "cpe_name" : [ ]
  100612. }, {
  100613. "vulnerable" : false,
  100614. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
  100615. "cpe_name" : [ ]
  100616. }, {
  100617. "vulnerable" : false,
  100618. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
  100619. "cpe_name" : [ ]
  100620. }, {
  100621. "vulnerable" : false,
  100622. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
  100623. "cpe_name" : [ ]
  100624. }, {
  100625. "vulnerable" : false,
  100626. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
  100627. "cpe_name" : [ ]
  100628. }, {
  100629. "vulnerable" : false,
  100630. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
  100631. "cpe_name" : [ ]
  100632. }, {
  100633. "vulnerable" : false,
  100634. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
  100635. "cpe_name" : [ ]
  100636. }, {
  100637. "vulnerable" : false,
  100638. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
  100639. "cpe_name" : [ ]
  100640. }, {
  100641. "vulnerable" : false,
  100642. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
  100643. "cpe_name" : [ ]
  100644. }, {
  100645. "vulnerable" : false,
  100646. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
  100647. "cpe_name" : [ ]
  100648. }, {
  100649. "vulnerable" : false,
  100650. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
  100651. "cpe_name" : [ ]
  100652. }, {
  100653. "vulnerable" : false,
  100654. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
  100655. "cpe_name" : [ ]
  100656. }, {
  100657. "vulnerable" : false,
  100658. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
  100659. "cpe_name" : [ ]
  100660. }, {
  100661. "vulnerable" : false,
  100662. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
  100663. "cpe_name" : [ ]
  100664. }, {
  100665. "vulnerable" : false,
  100666. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
  100667. "cpe_name" : [ ]
  100668. }, {
  100669. "vulnerable" : false,
  100670. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
  100671. "cpe_name" : [ ]
  100672. }, {
  100673. "vulnerable" : false,
  100674. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
  100675. "cpe_name" : [ ]
  100676. }, {
  100677. "vulnerable" : false,
  100678. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
  100679. "cpe_name" : [ ]
  100680. }, {
  100681. "vulnerable" : false,
  100682. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
  100683. "cpe_name" : [ ]
  100684. }, {
  100685. "vulnerable" : false,
  100686. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
  100687. "cpe_name" : [ ]
  100688. }, {
  100689. "vulnerable" : false,
  100690. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
  100691. "cpe_name" : [ ]
  100692. }, {
  100693. "vulnerable" : false,
  100694. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
  100695. "cpe_name" : [ ]
  100696. }, {
  100697. "vulnerable" : false,
  100698. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
  100699. "cpe_name" : [ ]
  100700. }, {
  100701. "vulnerable" : false,
  100702. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
  100703. "cpe_name" : [ ]
  100704. }, {
  100705. "vulnerable" : false,
  100706. "cpe23Uri" : "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
  100707. "cpe_name" : [ ]
  100708. } ]
  100709. } ],
  100710. "cpe_match" : [ ]
  100711. }, {
  100712. "operator" : "AND",
  100713. "children" : [ {
  100714. "operator" : "OR",
  100715. "children" : [ ],
  100716. "cpe_match" : [ {
  100717. "vulnerable" : true,
  100718. "cpe23Uri" : "cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*",
  100719. "cpe_name" : [ ]
  100720. } ]
  100721. }, {
  100722. "operator" : "OR",
  100723. "children" : [ ],
  100724. "cpe_match" : [ {
  100725. "vulnerable" : false,
  100726. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*",
  100727. "cpe_name" : [ ]
  100728. }, {
  100729. "vulnerable" : false,
  100730. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*",
  100731. "cpe_name" : [ ]
  100732. }, {
  100733. "vulnerable" : false,
  100734. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
  100735. "cpe_name" : [ ]
  100736. }, {
  100737. "vulnerable" : false,
  100738. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
  100739. "cpe_name" : [ ]
  100740. }, {
  100741. "vulnerable" : false,
  100742. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
  100743. "cpe_name" : [ ]
  100744. }, {
  100745. "vulnerable" : false,
  100746. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
  100747. "cpe_name" : [ ]
  100748. }, {
  100749. "vulnerable" : false,
  100750. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
  100751. "cpe_name" : [ ]
  100752. }, {
  100753. "vulnerable" : false,
  100754. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
  100755. "cpe_name" : [ ]
  100756. }, {
  100757. "vulnerable" : false,
  100758. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
  100759. "cpe_name" : [ ]
  100760. }, {
  100761. "vulnerable" : false,
  100762. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
  100763. "cpe_name" : [ ]
  100764. }, {
  100765. "vulnerable" : false,
  100766. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
  100767. "cpe_name" : [ ]
  100768. }, {
  100769. "vulnerable" : false,
  100770. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
  100771. "cpe_name" : [ ]
  100772. }, {
  100773. "vulnerable" : false,
  100774. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
  100775. "cpe_name" : [ ]
  100776. }, {
  100777. "vulnerable" : false,
  100778. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
  100779. "cpe_name" : [ ]
  100780. }, {
  100781. "vulnerable" : false,
  100782. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
  100783. "cpe_name" : [ ]
  100784. }, {
  100785. "vulnerable" : false,
  100786. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
  100787. "cpe_name" : [ ]
  100788. }, {
  100789. "vulnerable" : false,
  100790. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
  100791. "cpe_name" : [ ]
  100792. }, {
  100793. "vulnerable" : false,
  100794. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
  100795. "cpe_name" : [ ]
  100796. }, {
  100797. "vulnerable" : false,
  100798. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
  100799. "cpe_name" : [ ]
  100800. }, {
  100801. "vulnerable" : false,
  100802. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
  100803. "cpe_name" : [ ]
  100804. }, {
  100805. "vulnerable" : false,
  100806. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
  100807. "cpe_name" : [ ]
  100808. }, {
  100809. "vulnerable" : false,
  100810. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
  100811. "cpe_name" : [ ]
  100812. }, {
  100813. "vulnerable" : false,
  100814. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
  100815. "cpe_name" : [ ]
  100816. }, {
  100817. "vulnerable" : false,
  100818. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
  100819. "cpe_name" : [ ]
  100820. }, {
  100821. "vulnerable" : false,
  100822. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
  100823. "cpe_name" : [ ]
  100824. }, {
  100825. "vulnerable" : false,
  100826. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
  100827. "cpe_name" : [ ]
  100828. }, {
  100829. "vulnerable" : false,
  100830. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
  100831. "cpe_name" : [ ]
  100832. }, {
  100833. "vulnerable" : false,
  100834. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
  100835. "cpe_name" : [ ]
  100836. }, {
  100837. "vulnerable" : false,
  100838. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
  100839. "cpe_name" : [ ]
  100840. }, {
  100841. "vulnerable" : false,
  100842. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
  100843. "cpe_name" : [ ]
  100844. }, {
  100845. "vulnerable" : false,
  100846. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
  100847. "cpe_name" : [ ]
  100848. }, {
  100849. "vulnerable" : false,
  100850. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
  100851. "cpe_name" : [ ]
  100852. }, {
  100853. "vulnerable" : false,
  100854. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
  100855. "cpe_name" : [ ]
  100856. }, {
  100857. "vulnerable" : false,
  100858. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
  100859. "cpe_name" : [ ]
  100860. }, {
  100861. "vulnerable" : false,
  100862. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
  100863. "cpe_name" : [ ]
  100864. }, {
  100865. "vulnerable" : false,
  100866. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
  100867. "cpe_name" : [ ]
  100868. }, {
  100869. "vulnerable" : false,
  100870. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
  100871. "cpe_name" : [ ]
  100872. }, {
  100873. "vulnerable" : false,
  100874. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
  100875. "cpe_name" : [ ]
  100876. }, {
  100877. "vulnerable" : false,
  100878. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
  100879. "cpe_name" : [ ]
  100880. }, {
  100881. "vulnerable" : false,
  100882. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
  100883. "cpe_name" : [ ]
  100884. }, {
  100885. "vulnerable" : false,
  100886. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
  100887. "cpe_name" : [ ]
  100888. }, {
  100889. "vulnerable" : false,
  100890. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
  100891. "cpe_name" : [ ]
  100892. }, {
  100893. "vulnerable" : false,
  100894. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
  100895. "cpe_name" : [ ]
  100896. }, {
  100897. "vulnerable" : false,
  100898. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
  100899. "cpe_name" : [ ]
  100900. }, {
  100901. "vulnerable" : false,
  100902. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
  100903. "cpe_name" : [ ]
  100904. }, {
  100905. "vulnerable" : false,
  100906. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
  100907. "cpe_name" : [ ]
  100908. }, {
  100909. "vulnerable" : false,
  100910. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
  100911. "cpe_name" : [ ]
  100912. }, {
  100913. "vulnerable" : false,
  100914. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
  100915. "cpe_name" : [ ]
  100916. }, {
  100917. "vulnerable" : false,
  100918. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
  100919. "cpe_name" : [ ]
  100920. }, {
  100921. "vulnerable" : false,
  100922. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
  100923. "cpe_name" : [ ]
  100924. }, {
  100925. "vulnerable" : false,
  100926. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
  100927. "cpe_name" : [ ]
  100928. }, {
  100929. "vulnerable" : false,
  100930. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
  100931. "cpe_name" : [ ]
  100932. }, {
  100933. "vulnerable" : false,
  100934. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
  100935. "cpe_name" : [ ]
  100936. }, {
  100937. "vulnerable" : false,
  100938. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
  100939. "cpe_name" : [ ]
  100940. }, {
  100941. "vulnerable" : false,
  100942. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
  100943. "cpe_name" : [ ]
  100944. }, {
  100945. "vulnerable" : false,
  100946. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
  100947. "cpe_name" : [ ]
  100948. }, {
  100949. "vulnerable" : false,
  100950. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
  100951. "cpe_name" : [ ]
  100952. }, {
  100953. "vulnerable" : false,
  100954. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
  100955. "cpe_name" : [ ]
  100956. }, {
  100957. "vulnerable" : false,
  100958. "cpe23Uri" : "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
  100959. "cpe_name" : [ ]
  100960. } ]
  100961. } ],
  100962. "cpe_match" : [ ]
  100963. }, {
  100964. "operator" : "AND",
  100965. "children" : [ {
  100966. "operator" : "OR",
  100967. "children" : [ ],
  100968. "cpe_match" : [ {
  100969. "vulnerable" : true,
  100970. "cpe23Uri" : "cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*",
  100971. "cpe_name" : [ ]
  100972. } ]
  100973. }, {
  100974. "operator" : "OR",
  100975. "children" : [ ],
  100976. "cpe_match" : [ {
  100977. "vulnerable" : false,
  100978. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
  100979. "cpe_name" : [ ]
  100980. }, {
  100981. "vulnerable" : false,
  100982. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*",
  100983. "cpe_name" : [ ]
  100984. }, {
  100985. "vulnerable" : false,
  100986. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*",
  100987. "cpe_name" : [ ]
  100988. }, {
  100989. "vulnerable" : false,
  100990. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*",
  100991. "cpe_name" : [ ]
  100992. }, {
  100993. "vulnerable" : false,
  100994. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*",
  100995. "cpe_name" : [ ]
  100996. }, {
  100997. "vulnerable" : false,
  100998. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*",
  100999. "cpe_name" : [ ]
  101000. }, {
  101001. "vulnerable" : false,
  101002. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*",
  101003. "cpe_name" : [ ]
  101004. }, {
  101005. "vulnerable" : false,
  101006. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*",
  101007. "cpe_name" : [ ]
  101008. }, {
  101009. "vulnerable" : false,
  101010. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*",
  101011. "cpe_name" : [ ]
  101012. }, {
  101013. "vulnerable" : false,
  101014. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*",
  101015. "cpe_name" : [ ]
  101016. }, {
  101017. "vulnerable" : false,
  101018. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*",
  101019. "cpe_name" : [ ]
  101020. }, {
  101021. "vulnerable" : false,
  101022. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*",
  101023. "cpe_name" : [ ]
  101024. }, {
  101025. "vulnerable" : false,
  101026. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*",
  101027. "cpe_name" : [ ]
  101028. }, {
  101029. "vulnerable" : false,
  101030. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*",
  101031. "cpe_name" : [ ]
  101032. }, {
  101033. "vulnerable" : false,
  101034. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*",
  101035. "cpe_name" : [ ]
  101036. }, {
  101037. "vulnerable" : false,
  101038. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*",
  101039. "cpe_name" : [ ]
  101040. }, {
  101041. "vulnerable" : false,
  101042. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*",
  101043. "cpe_name" : [ ]
  101044. }, {
  101045. "vulnerable" : false,
  101046. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*",
  101047. "cpe_name" : [ ]
  101048. }, {
  101049. "vulnerable" : false,
  101050. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*",
  101051. "cpe_name" : [ ]
  101052. }, {
  101053. "vulnerable" : false,
  101054. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*",
  101055. "cpe_name" : [ ]
  101056. }, {
  101057. "vulnerable" : false,
  101058. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*",
  101059. "cpe_name" : [ ]
  101060. }, {
  101061. "vulnerable" : false,
  101062. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
  101063. "cpe_name" : [ ]
  101064. }, {
  101065. "vulnerable" : false,
  101066. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
  101067. "cpe_name" : [ ]
  101068. }, {
  101069. "vulnerable" : false,
  101070. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
  101071. "cpe_name" : [ ]
  101072. }, {
  101073. "vulnerable" : false,
  101074. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
  101075. "cpe_name" : [ ]
  101076. }, {
  101077. "vulnerable" : false,
  101078. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
  101079. "cpe_name" : [ ]
  101080. }, {
  101081. "vulnerable" : false,
  101082. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
  101083. "cpe_name" : [ ]
  101084. }, {
  101085. "vulnerable" : false,
  101086. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
  101087. "cpe_name" : [ ]
  101088. }, {
  101089. "vulnerable" : false,
  101090. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
  101091. "cpe_name" : [ ]
  101092. }, {
  101093. "vulnerable" : false,
  101094. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
  101095. "cpe_name" : [ ]
  101096. }, {
  101097. "vulnerable" : false,
  101098. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
  101099. "cpe_name" : [ ]
  101100. }, {
  101101. "vulnerable" : false,
  101102. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
  101103. "cpe_name" : [ ]
  101104. }, {
  101105. "vulnerable" : false,
  101106. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
  101107. "cpe_name" : [ ]
  101108. }, {
  101109. "vulnerable" : false,
  101110. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
  101111. "cpe_name" : [ ]
  101112. }, {
  101113. "vulnerable" : false,
  101114. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
  101115. "cpe_name" : [ ]
  101116. }, {
  101117. "vulnerable" : false,
  101118. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
  101119. "cpe_name" : [ ]
  101120. }, {
  101121. "vulnerable" : false,
  101122. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
  101123. "cpe_name" : [ ]
  101124. }, {
  101125. "vulnerable" : false,
  101126. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
  101127. "cpe_name" : [ ]
  101128. }, {
  101129. "vulnerable" : false,
  101130. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
  101131. "cpe_name" : [ ]
  101132. }, {
  101133. "vulnerable" : false,
  101134. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
  101135. "cpe_name" : [ ]
  101136. }, {
  101137. "vulnerable" : false,
  101138. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
  101139. "cpe_name" : [ ]
  101140. }, {
  101141. "vulnerable" : false,
  101142. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
  101143. "cpe_name" : [ ]
  101144. }, {
  101145. "vulnerable" : false,
  101146. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
  101147. "cpe_name" : [ ]
  101148. }, {
  101149. "vulnerable" : false,
  101150. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
  101151. "cpe_name" : [ ]
  101152. }, {
  101153. "vulnerable" : false,
  101154. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
  101155. "cpe_name" : [ ]
  101156. }, {
  101157. "vulnerable" : false,
  101158. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
  101159. "cpe_name" : [ ]
  101160. }, {
  101161. "vulnerable" : false,
  101162. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
  101163. "cpe_name" : [ ]
  101164. }, {
  101165. "vulnerable" : false,
  101166. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
  101167. "cpe_name" : [ ]
  101168. }, {
  101169. "vulnerable" : false,
  101170. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
  101171. "cpe_name" : [ ]
  101172. }, {
  101173. "vulnerable" : false,
  101174. "cpe23Uri" : "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
  101175. "cpe_name" : [ ]
  101176. } ]
  101177. } ],
  101178. "cpe_match" : [ ]
  101179. }, {
  101180. "operator" : "AND",
  101181. "children" : [ {
  101182. "operator" : "OR",
  101183. "children" : [ ],
  101184. "cpe_match" : [ {
  101185. "vulnerable" : true,
  101186. "cpe23Uri" : "cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*",
  101187. "cpe_name" : [ ]
  101188. } ]
  101189. }, {
  101190. "operator" : "OR",
  101191. "children" : [ ],
  101192. "cpe_match" : [ {
  101193. "vulnerable" : false,
  101194. "cpe23Uri" : "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*",
  101195. "cpe_name" : [ ]
  101196. } ]
  101197. } ],
  101198. "cpe_match" : [ ]
  101199. }, {
  101200. "operator" : "AND",
  101201. "children" : [ {
  101202. "operator" : "OR",
  101203. "children" : [ ],
  101204. "cpe_match" : [ {
  101205. "vulnerable" : true,
  101206. "cpe23Uri" : "cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*",
  101207. "cpe_name" : [ ]
  101208. } ]
  101209. }, {
  101210. "operator" : "OR",
  101211. "children" : [ ],
  101212. "cpe_match" : [ {
  101213. "vulnerable" : false,
  101214. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*",
  101215. "cpe_name" : [ ]
  101216. }, {
  101217. "vulnerable" : false,
  101218. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*",
  101219. "cpe_name" : [ ]
  101220. }, {
  101221. "vulnerable" : false,
  101222. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*",
  101223. "cpe_name" : [ ]
  101224. }, {
  101225. "vulnerable" : false,
  101226. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*",
  101227. "cpe_name" : [ ]
  101228. }, {
  101229. "vulnerable" : false,
  101230. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*",
  101231. "cpe_name" : [ ]
  101232. }, {
  101233. "vulnerable" : false,
  101234. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*",
  101235. "cpe_name" : [ ]
  101236. }, {
  101237. "vulnerable" : false,
  101238. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*",
  101239. "cpe_name" : [ ]
  101240. }, {
  101241. "vulnerable" : false,
  101242. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*",
  101243. "cpe_name" : [ ]
  101244. }, {
  101245. "vulnerable" : false,
  101246. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*",
  101247. "cpe_name" : [ ]
  101248. }, {
  101249. "vulnerable" : false,
  101250. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*",
  101251. "cpe_name" : [ ]
  101252. }, {
  101253. "vulnerable" : false,
  101254. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*",
  101255. "cpe_name" : [ ]
  101256. }, {
  101257. "vulnerable" : false,
  101258. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*",
  101259. "cpe_name" : [ ]
  101260. }, {
  101261. "vulnerable" : false,
  101262. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*",
  101263. "cpe_name" : [ ]
  101264. }, {
  101265. "vulnerable" : false,
  101266. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*",
  101267. "cpe_name" : [ ]
  101268. }, {
  101269. "vulnerable" : false,
  101270. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*",
  101271. "cpe_name" : [ ]
  101272. }, {
  101273. "vulnerable" : false,
  101274. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*",
  101275. "cpe_name" : [ ]
  101276. }, {
  101277. "vulnerable" : false,
  101278. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*",
  101279. "cpe_name" : [ ]
  101280. }, {
  101281. "vulnerable" : false,
  101282. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*",
  101283. "cpe_name" : [ ]
  101284. }, {
  101285. "vulnerable" : false,
  101286. "cpe23Uri" : "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*",
  101287. "cpe_name" : [ ]
  101288. } ]
  101289. } ],
  101290. "cpe_match" : [ ]
  101291. }, {
  101292. "operator" : "AND",
  101293. "children" : [ {
  101294. "operator" : "OR",
  101295. "children" : [ ],
  101296. "cpe_match" : [ {
  101297. "vulnerable" : true,
  101298. "cpe23Uri" : "cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*",
  101299. "cpe_name" : [ ]
  101300. } ]
  101301. }, {
  101302. "operator" : "OR",
  101303. "children" : [ ],
  101304. "cpe_match" : [ {
  101305. "vulnerable" : false,
  101306. "cpe23Uri" : "cpe:2.3:h:intel:xeon_w:2123:*:*:*:*:*:*:*",
  101307. "cpe_name" : [ ]
  101308. }, {
  101309. "vulnerable" : false,
  101310. "cpe23Uri" : "cpe:2.3:h:intel:xeon_w:2125:*:*:*:*:*:*:*",
  101311. "cpe_name" : [ ]
  101312. }, {
  101313. "vulnerable" : false,
  101314. "cpe23Uri" : "cpe:2.3:h:intel:xeon_w:2133:*:*:*:*:*:*:*",
  101315. "cpe_name" : [ ]
  101316. }, {
  101317. "vulnerable" : false,
  101318. "cpe23Uri" : "cpe:2.3:h:intel:xeon_w:2135:*:*:*:*:*:*:*",
  101319. "cpe_name" : [ ]
  101320. }, {
  101321. "vulnerable" : false,
  101322. "cpe23Uri" : "cpe:2.3:h:intel:xeon_w:2145:*:*:*:*:*:*:*",
  101323. "cpe_name" : [ ]
  101324. }, {
  101325. "vulnerable" : false,
  101326. "cpe23Uri" : "cpe:2.3:h:intel:xeon_w:2155:*:*:*:*:*:*:*",
  101327. "cpe_name" : [ ]
  101328. }, {
  101329. "vulnerable" : false,
  101330. "cpe23Uri" : "cpe:2.3:h:intel:xeon_w:2175:*:*:*:*:*:*:*",
  101331. "cpe_name" : [ ]
  101332. }, {
  101333. "vulnerable" : false,
  101334. "cpe23Uri" : "cpe:2.3:h:intel:xeon_w:2195:*:*:*:*:*:*:*",
  101335. "cpe_name" : [ ]
  101336. } ]
  101337. } ],
  101338. "cpe_match" : [ ]
  101339. }, {
  101340. "operator" : "OR",
  101341. "children" : [ ],
  101342. "cpe_match" : [ {
  101343. "vulnerable" : true,
  101344. "cpe23Uri" : "cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*",
  101345. "cpe_name" : [ ]
  101346. } ]
  101347. } ]
  101348. },
  101349. "impact" : {
  101350. "baseMetricV3" : {
  101351. "cvssV3" : {
  101352. "version" : "3.1",
  101353. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
  101354. "attackVector" : "LOCAL",
  101355. "attackComplexity" : "LOW",
  101356. "privilegesRequired" : "HIGH",
  101357. "userInteraction" : "NONE",
  101358. "scope" : "CHANGED",
  101359. "confidentialityImpact" : "HIGH",
  101360. "integrityImpact" : "HIGH",
  101361. "availabilityImpact" : "HIGH",
  101362. "baseScore" : 8.2,
  101363. "baseSeverity" : "HIGH"
  101364. },
  101365. "exploitabilityScore" : 1.5,
  101366. "impactScore" : 6.0
  101367. },
  101368. "baseMetricV2" : {
  101369. "cvssV2" : {
  101370. "version" : "2.0",
  101371. "vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P",
  101372. "accessVector" : "LOCAL",
  101373. "accessComplexity" : "LOW",
  101374. "authentication" : "NONE",
  101375. "confidentialityImpact" : "PARTIAL",
  101376. "integrityImpact" : "PARTIAL",
  101377. "availabilityImpact" : "PARTIAL",
  101378. "baseScore" : 4.6
  101379. },
  101380. "severity" : "MEDIUM",
  101381. "exploitabilityScore" : 3.9,
  101382. "impactScore" : 6.4,
  101383. "acInsufInfo" : false,
  101384. "obtainAllPrivilege" : false,
  101385. "obtainUserPrivilege" : false,
  101386. "obtainOtherPrivilege" : false,
  101387. "userInteractionRequired" : false
  101388. }
  101389. },
  101390. "publishedDate" : "2018-07-10T21:29Z",
  101391. "lastModifiedDate" : "2021-05-08T02:12Z"
  101392. }, {
  101393. "cve" : {
  101394. "data_type" : "CVE",
  101395. "data_format" : "MITRE",
  101396. "data_version" : "4.0",
  101397. "CVE_data_meta" : {
  101398. "ID" : "CVE-2018-12920",
  101399. "ASSIGNER" : "cve@mitre.org"
  101400. },
  101401. "problemtype" : {
  101402. "problemtype_data" : [ {
  101403. "description" : [ {
  101404. "lang" : "en",
  101405. "value" : "CWE-200"
  101406. } ]
  101407. } ]
  101408. },
  101409. "references" : {
  101410. "reference_data" : [ {
  101411. "url" : "https://www.seebug.org/vuldb/ssvid-97370",
  101412. "name" : "https://www.seebug.org/vuldb/ssvid-97370",
  101413. "refsource" : "MISC",
  101414. "tags" : [ "Third Party Advisory" ]
  101415. } ]
  101416. },
  101417. "description" : {
  101418. "description_data" : [ {
  101419. "lang" : "en",
  101420. "value" : "Brickstream 2300 devices allow remote attackers to obtain potentially sensitive information via a direct request for the basic.html#ipsettings or basic.html#datadelivery URI."
  101421. } ]
  101422. }
  101423. },
  101424. "configurations" : {
  101425. "CVE_data_version" : "4.0",
  101426. "nodes" : [ {
  101427. "operator" : "AND",
  101428. "children" : [ {
  101429. "operator" : "OR",
  101430. "children" : [ ],
  101431. "cpe_match" : [ {
  101432. "vulnerable" : true,
  101433. "cpe23Uri" : "cpe:2.3:o:flir:brickstream_2300_firmware:-:*:*:*:*:*:*:*",
  101434. "cpe_name" : [ ]
  101435. } ]
  101436. }, {
  101437. "operator" : "OR",
  101438. "children" : [ ],
  101439. "cpe_match" : [ {
  101440. "vulnerable" : false,
  101441. "cpe23Uri" : "cpe:2.3:h:flir:brickstream_2300:-:*:*:*:*:*:*:*",
  101442. "cpe_name" : [ ]
  101443. } ]
  101444. } ],
  101445. "cpe_match" : [ ]
  101446. } ]
  101447. },
  101448. "impact" : {
  101449. "baseMetricV3" : {
  101450. "cvssV3" : {
  101451. "version" : "3.1",
  101452. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  101453. "attackVector" : "NETWORK",
  101454. "attackComplexity" : "LOW",
  101455. "privilegesRequired" : "NONE",
  101456. "userInteraction" : "NONE",
  101457. "scope" : "UNCHANGED",
  101458. "confidentialityImpact" : "HIGH",
  101459. "integrityImpact" : "NONE",
  101460. "availabilityImpact" : "NONE",
  101461. "baseScore" : 7.5,
  101462. "baseSeverity" : "HIGH"
  101463. },
  101464. "exploitabilityScore" : 3.9,
  101465. "impactScore" : 3.6
  101466. },
  101467. "baseMetricV2" : {
  101468. "cvssV2" : {
  101469. "version" : "2.0",
  101470. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  101471. "accessVector" : "NETWORK",
  101472. "accessComplexity" : "LOW",
  101473. "authentication" : "NONE",
  101474. "confidentialityImpact" : "PARTIAL",
  101475. "integrityImpact" : "NONE",
  101476. "availabilityImpact" : "NONE",
  101477. "baseScore" : 5.0
  101478. },
  101479. "severity" : "MEDIUM",
  101480. "exploitabilityScore" : 10.0,
  101481. "impactScore" : 2.9,
  101482. "obtainAllPrivilege" : false,
  101483. "obtainUserPrivilege" : false,
  101484. "obtainOtherPrivilege" : false,
  101485. "userInteractionRequired" : false
  101486. }
  101487. },
  101488. "publishedDate" : "2018-06-28T11:29Z",
  101489. "lastModifiedDate" : "2021-05-03T17:45Z"
  101490. }, {
  101491. "cve" : {
  101492. "data_type" : "CVE",
  101493. "data_format" : "MITRE",
  101494. "data_version" : "4.0",
  101495. "CVE_data_meta" : {
  101496. "ID" : "CVE-2018-10601",
  101497. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  101498. },
  101499. "problemtype" : {
  101500. "problemtype_data" : [ {
  101501. "description" : [ {
  101502. "lang" : "en",
  101503. "value" : "CWE-787"
  101504. } ]
  101505. } ]
  101506. },
  101507. "references" : {
  101508. "reference_data" : [ {
  101509. "url" : "https://ics-cert.us-cert.gov/advisories/ICSMA-18-156-01",
  101510. "name" : "https://ics-cert.us-cert.gov/advisories/ICSMA-18-156-01",
  101511. "refsource" : "MISC",
  101512. "tags" : [ "Third Party Advisory", "US Government Resource" ]
  101513. } ]
  101514. },
  101515. "description" : {
  101516. "description_data" : [ {
  101517. "lang" : "en",
  101518. "value" : "IntelliVue Patient Monitors MP Series (including MP2/X2/MP30/MP50/MP70/NP90/MX700/800) Rev B-M, IntelliVue Patient Monitors MX (MX400-550) Rev J-M and (X3/MX100 for Rev M only), and Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 with software Revisions F.0, G.0 and J.3 have a vulnerability that exposes an \"echo\" service, in which an attacker-sent buffer to an attacker-chosen device address within the same subnet is copied to the stack with no boundary checks, hence resulting in stack overflow."
  101519. } ]
  101520. }
  101521. },
  101522. "configurations" : {
  101523. "CVE_data_version" : "4.0",
  101524. "nodes" : [ {
  101525. "operator" : "AND",
  101526. "children" : [ {
  101527. "operator" : "OR",
  101528. "children" : [ ],
  101529. "cpe_match" : [ {
  101530. "vulnerable" : true,
  101531. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mp2_firmware:-:*:*:*:*:*:*:*",
  101532. "cpe_name" : [ ]
  101533. } ]
  101534. }, {
  101535. "operator" : "OR",
  101536. "children" : [ ],
  101537. "cpe_match" : [ {
  101538. "vulnerable" : false,
  101539. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mp2:-:*:*:*:*:*:*:*",
  101540. "cpe_name" : [ ]
  101541. } ]
  101542. } ],
  101543. "cpe_match" : [ ]
  101544. }, {
  101545. "operator" : "AND",
  101546. "children" : [ {
  101547. "operator" : "OR",
  101548. "children" : [ ],
  101549. "cpe_match" : [ {
  101550. "vulnerable" : true,
  101551. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_x2_firmware:-:*:*:*:*:*:*:*",
  101552. "cpe_name" : [ ]
  101553. } ]
  101554. }, {
  101555. "operator" : "OR",
  101556. "children" : [ ],
  101557. "cpe_match" : [ {
  101558. "vulnerable" : false,
  101559. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_x2:-:*:*:*:*:*:*:*",
  101560. "cpe_name" : [ ]
  101561. } ]
  101562. } ],
  101563. "cpe_match" : [ ]
  101564. }, {
  101565. "operator" : "AND",
  101566. "children" : [ {
  101567. "operator" : "OR",
  101568. "children" : [ ],
  101569. "cpe_match" : [ {
  101570. "vulnerable" : true,
  101571. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mp30_firmware:-:*:*:*:*:*:*:*",
  101572. "cpe_name" : [ ]
  101573. } ]
  101574. }, {
  101575. "operator" : "OR",
  101576. "children" : [ ],
  101577. "cpe_match" : [ {
  101578. "vulnerable" : false,
  101579. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mp30:-:*:*:*:*:*:*:*",
  101580. "cpe_name" : [ ]
  101581. } ]
  101582. } ],
  101583. "cpe_match" : [ ]
  101584. }, {
  101585. "operator" : "AND",
  101586. "children" : [ {
  101587. "operator" : "OR",
  101588. "children" : [ ],
  101589. "cpe_match" : [ {
  101590. "vulnerable" : true,
  101591. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mp50_firmware:-:*:*:*:*:*:*:*",
  101592. "cpe_name" : [ ]
  101593. } ]
  101594. }, {
  101595. "operator" : "OR",
  101596. "children" : [ ],
  101597. "cpe_match" : [ {
  101598. "vulnerable" : false,
  101599. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mp50:-:*:*:*:*:*:*:*",
  101600. "cpe_name" : [ ]
  101601. } ]
  101602. } ],
  101603. "cpe_match" : [ ]
  101604. }, {
  101605. "operator" : "AND",
  101606. "children" : [ {
  101607. "operator" : "OR",
  101608. "children" : [ ],
  101609. "cpe_match" : [ {
  101610. "vulnerable" : true,
  101611. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mp70_firmware:-:*:*:*:*:*:*:*",
  101612. "cpe_name" : [ ]
  101613. } ]
  101614. }, {
  101615. "operator" : "OR",
  101616. "children" : [ ],
  101617. "cpe_match" : [ {
  101618. "vulnerable" : false,
  101619. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mp70:-:*:*:*:*:*:*:*",
  101620. "cpe_name" : [ ]
  101621. } ]
  101622. } ],
  101623. "cpe_match" : [ ]
  101624. }, {
  101625. "operator" : "AND",
  101626. "children" : [ {
  101627. "operator" : "OR",
  101628. "children" : [ ],
  101629. "cpe_match" : [ {
  101630. "vulnerable" : true,
  101631. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_np90_firmware:-:*:*:*:*:*:*:*",
  101632. "cpe_name" : [ ]
  101633. } ]
  101634. }, {
  101635. "operator" : "OR",
  101636. "children" : [ ],
  101637. "cpe_match" : [ {
  101638. "vulnerable" : false,
  101639. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_np90:-:*:*:*:*:*:*:*",
  101640. "cpe_name" : [ ]
  101641. } ]
  101642. } ],
  101643. "cpe_match" : [ ]
  101644. }, {
  101645. "operator" : "AND",
  101646. "children" : [ {
  101647. "operator" : "OR",
  101648. "children" : [ ],
  101649. "cpe_match" : [ {
  101650. "vulnerable" : true,
  101651. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx700_firmware:-:*:*:*:*:*:*:*",
  101652. "cpe_name" : [ ]
  101653. } ]
  101654. }, {
  101655. "operator" : "OR",
  101656. "children" : [ ],
  101657. "cpe_match" : [ {
  101658. "vulnerable" : false,
  101659. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx700:-:*:*:*:*:*:*:*",
  101660. "cpe_name" : [ ]
  101661. } ]
  101662. } ],
  101663. "cpe_match" : [ ]
  101664. }, {
  101665. "operator" : "AND",
  101666. "children" : [ {
  101667. "operator" : "OR",
  101668. "children" : [ ],
  101669. "cpe_match" : [ {
  101670. "vulnerable" : true,
  101671. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx800_firmware:-:*:*:*:*:*:*:*",
  101672. "cpe_name" : [ ]
  101673. } ]
  101674. }, {
  101675. "operator" : "OR",
  101676. "children" : [ ],
  101677. "cpe_match" : [ {
  101678. "vulnerable" : false,
  101679. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx800:-:*:*:*:*:*:*:*",
  101680. "cpe_name" : [ ]
  101681. } ]
  101682. } ],
  101683. "cpe_match" : [ ]
  101684. }, {
  101685. "operator" : "AND",
  101686. "children" : [ {
  101687. "operator" : "OR",
  101688. "children" : [ ],
  101689. "cpe_match" : [ {
  101690. "vulnerable" : true,
  101691. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx400_firmware:-:*:*:*:*:*:*:*",
  101692. "cpe_name" : [ ]
  101693. } ]
  101694. }, {
  101695. "operator" : "OR",
  101696. "children" : [ ],
  101697. "cpe_match" : [ {
  101698. "vulnerable" : false,
  101699. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx400:-:*:*:*:*:*:*:*",
  101700. "cpe_name" : [ ]
  101701. } ]
  101702. } ],
  101703. "cpe_match" : [ ]
  101704. }, {
  101705. "operator" : "AND",
  101706. "children" : [ {
  101707. "operator" : "OR",
  101708. "children" : [ ],
  101709. "cpe_match" : [ {
  101710. "vulnerable" : true,
  101711. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx450_firmware:-:*:*:*:*:*:*:*",
  101712. "cpe_name" : [ ]
  101713. } ]
  101714. }, {
  101715. "operator" : "OR",
  101716. "children" : [ ],
  101717. "cpe_match" : [ {
  101718. "vulnerable" : false,
  101719. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx450:-:*:*:*:*:*:*:*",
  101720. "cpe_name" : [ ]
  101721. } ]
  101722. } ],
  101723. "cpe_match" : [ ]
  101724. }, {
  101725. "operator" : "AND",
  101726. "children" : [ {
  101727. "operator" : "OR",
  101728. "children" : [ ],
  101729. "cpe_match" : [ {
  101730. "vulnerable" : true,
  101731. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx500_firmware:-:*:*:*:*:*:*:*",
  101732. "cpe_name" : [ ]
  101733. } ]
  101734. }, {
  101735. "operator" : "OR",
  101736. "children" : [ ],
  101737. "cpe_match" : [ {
  101738. "vulnerable" : false,
  101739. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx500:-:*:*:*:*:*:*:*",
  101740. "cpe_name" : [ ]
  101741. } ]
  101742. } ],
  101743. "cpe_match" : [ ]
  101744. }, {
  101745. "operator" : "AND",
  101746. "children" : [ {
  101747. "operator" : "OR",
  101748. "children" : [ ],
  101749. "cpe_match" : [ {
  101750. "vulnerable" : true,
  101751. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx550_firmware:-:*:*:*:*:*:*:*",
  101752. "cpe_name" : [ ]
  101753. } ]
  101754. }, {
  101755. "operator" : "OR",
  101756. "children" : [ ],
  101757. "cpe_match" : [ {
  101758. "vulnerable" : false,
  101759. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx550:-:*:*:*:*:*:*:*",
  101760. "cpe_name" : [ ]
  101761. } ]
  101762. } ],
  101763. "cpe_match" : [ ]
  101764. }, {
  101765. "operator" : "AND",
  101766. "children" : [ {
  101767. "operator" : "OR",
  101768. "children" : [ ],
  101769. "cpe_match" : [ {
  101770. "vulnerable" : true,
  101771. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_x3_firmware:-:*:*:*:*:*:*:*",
  101772. "cpe_name" : [ ]
  101773. } ]
  101774. }, {
  101775. "operator" : "OR",
  101776. "children" : [ ],
  101777. "cpe_match" : [ {
  101778. "vulnerable" : false,
  101779. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_x3:-:*:*:*:*:*:*:*",
  101780. "cpe_name" : [ ]
  101781. } ]
  101782. } ],
  101783. "cpe_match" : [ ]
  101784. }, {
  101785. "operator" : "AND",
  101786. "children" : [ {
  101787. "operator" : "OR",
  101788. "children" : [ ],
  101789. "cpe_match" : [ {
  101790. "vulnerable" : true,
  101791. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx100_firmware:-:*:*:*:*:*:*:*",
  101792. "cpe_name" : [ ]
  101793. } ]
  101794. }, {
  101795. "operator" : "OR",
  101796. "children" : [ ],
  101797. "cpe_match" : [ {
  101798. "vulnerable" : false,
  101799. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx100:-:*:*:*:*:*:*:*",
  101800. "cpe_name" : [ ]
  101801. } ]
  101802. } ],
  101803. "cpe_match" : [ ]
  101804. }, {
  101805. "operator" : "AND",
  101806. "children" : [ {
  101807. "operator" : "OR",
  101808. "children" : [ ],
  101809. "cpe_match" : [ {
  101810. "vulnerable" : true,
  101811. "cpe23Uri" : "cpe:2.3:o:philips:avalon_fetal\\/maternal_monitors_fm20_firmware:-:*:*:*:*:*:*:*",
  101812. "cpe_name" : [ ]
  101813. } ]
  101814. }, {
  101815. "operator" : "OR",
  101816. "children" : [ ],
  101817. "cpe_match" : [ {
  101818. "vulnerable" : false,
  101819. "cpe23Uri" : "cpe:2.3:h:philips:avalon_fetal\\/maternal_monitors_fm20:-:*:*:*:*:*:*:*",
  101820. "cpe_name" : [ ]
  101821. } ]
  101822. } ],
  101823. "cpe_match" : [ ]
  101824. }, {
  101825. "operator" : "AND",
  101826. "children" : [ {
  101827. "operator" : "OR",
  101828. "children" : [ ],
  101829. "cpe_match" : [ {
  101830. "vulnerable" : true,
  101831. "cpe23Uri" : "cpe:2.3:o:philips:avalon_fetal\\/maternal_monitors_fm30_firmware:-:*:*:*:*:*:*:*",
  101832. "cpe_name" : [ ]
  101833. } ]
  101834. }, {
  101835. "operator" : "OR",
  101836. "children" : [ ],
  101837. "cpe_match" : [ {
  101838. "vulnerable" : false,
  101839. "cpe23Uri" : "cpe:2.3:h:philips:avalon_fetal\\/maternal_monitors_fm30:-:*:*:*:*:*:*:*",
  101840. "cpe_name" : [ ]
  101841. } ]
  101842. } ],
  101843. "cpe_match" : [ ]
  101844. }, {
  101845. "operator" : "AND",
  101846. "children" : [ {
  101847. "operator" : "OR",
  101848. "children" : [ ],
  101849. "cpe_match" : [ {
  101850. "vulnerable" : true,
  101851. "cpe23Uri" : "cpe:2.3:o:philips:avalon_fetal\\/maternal_monitors_fm40_firmware:-:*:*:*:*:*:*:*",
  101852. "cpe_name" : [ ]
  101853. } ]
  101854. }, {
  101855. "operator" : "OR",
  101856. "children" : [ ],
  101857. "cpe_match" : [ {
  101858. "vulnerable" : false,
  101859. "cpe23Uri" : "cpe:2.3:h:philips:avalon_fetal\\/maternal_monitors_fm40:-:*:*:*:*:*:*:*",
  101860. "cpe_name" : [ ]
  101861. } ]
  101862. } ],
  101863. "cpe_match" : [ ]
  101864. }, {
  101865. "operator" : "AND",
  101866. "children" : [ {
  101867. "operator" : "OR",
  101868. "children" : [ ],
  101869. "cpe_match" : [ {
  101870. "vulnerable" : true,
  101871. "cpe23Uri" : "cpe:2.3:o:philips:avalon_fetal\\/maternal_monitors_fm50_firmware:-:*:*:*:*:*:*:*",
  101872. "cpe_name" : [ ]
  101873. } ]
  101874. }, {
  101875. "operator" : "OR",
  101876. "children" : [ ],
  101877. "cpe_match" : [ {
  101878. "vulnerable" : false,
  101879. "cpe23Uri" : "cpe:2.3:h:philips:avalon_fetal\\/maternal_monitors_fm50:-:*:*:*:*:*:*:*",
  101880. "cpe_name" : [ ]
  101881. } ]
  101882. } ],
  101883. "cpe_match" : [ ]
  101884. } ]
  101885. },
  101886. "impact" : {
  101887. "baseMetricV3" : {
  101888. "cvssV3" : {
  101889. "version" : "3.1",
  101890. "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H",
  101891. "attackVector" : "ADJACENT_NETWORK",
  101892. "attackComplexity" : "HIGH",
  101893. "privilegesRequired" : "NONE",
  101894. "userInteraction" : "NONE",
  101895. "scope" : "CHANGED",
  101896. "confidentialityImpact" : "HIGH",
  101897. "integrityImpact" : "LOW",
  101898. "availabilityImpact" : "HIGH",
  101899. "baseScore" : 8.2,
  101900. "baseSeverity" : "HIGH"
  101901. },
  101902. "exploitabilityScore" : 1.6,
  101903. "impactScore" : 6.0
  101904. },
  101905. "baseMetricV2" : {
  101906. "cvssV2" : {
  101907. "version" : "2.0",
  101908. "vectorString" : "AV:A/AC:M/Au:N/C:P/I:P/A:P",
  101909. "accessVector" : "ADJACENT_NETWORK",
  101910. "accessComplexity" : "MEDIUM",
  101911. "authentication" : "NONE",
  101912. "confidentialityImpact" : "PARTIAL",
  101913. "integrityImpact" : "PARTIAL",
  101914. "availabilityImpact" : "PARTIAL",
  101915. "baseScore" : 5.4
  101916. },
  101917. "severity" : "MEDIUM",
  101918. "exploitabilityScore" : 5.5,
  101919. "impactScore" : 6.4,
  101920. "acInsufInfo" : false,
  101921. "obtainAllPrivilege" : false,
  101922. "obtainUserPrivilege" : false,
  101923. "obtainOtherPrivilege" : false,
  101924. "userInteractionRequired" : false
  101925. }
  101926. },
  101927. "publishedDate" : "2018-06-05T20:29Z",
  101928. "lastModifiedDate" : "2020-09-04T15:52Z"
  101929. }, {
  101930. "cve" : {
  101931. "data_type" : "CVE",
  101932. "data_format" : "MITRE",
  101933. "data_version" : "4.0",
  101934. "CVE_data_meta" : {
  101935. "ID" : "CVE-2018-10599",
  101936. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  101937. },
  101938. "problemtype" : {
  101939. "problemtype_data" : [ {
  101940. "description" : [ {
  101941. "lang" : "en",
  101942. "value" : "CWE-200"
  101943. } ]
  101944. } ]
  101945. },
  101946. "references" : {
  101947. "reference_data" : [ {
  101948. "url" : "https://ics-cert.us-cert.gov/advisories/ICSMA-18-156-01",
  101949. "name" : "https://ics-cert.us-cert.gov/advisories/ICSMA-18-156-01",
  101950. "refsource" : "MISC",
  101951. "tags" : [ "Third Party Advisory", "US Government Resource" ]
  101952. } ]
  101953. },
  101954. "description" : {
  101955. "description_data" : [ {
  101956. "lang" : "en",
  101957. "value" : "IntelliVue Patient Monitors MP Series (including MP2/X2/MP30/MP50/MP70/NP90/MX700/800) Rev B-M, IntelliVue Patient Monitors MX (MX400-550) Rev J-M and (X3/MX100 for Rev M only), and Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 with software Revisions F.0, G.0 and J.3 have a vulnerability that allows an unauthenticated attacker to read memory from an attacker-chosen device address within the same subnet."
  101958. } ]
  101959. }
  101960. },
  101961. "configurations" : {
  101962. "CVE_data_version" : "4.0",
  101963. "nodes" : [ {
  101964. "operator" : "AND",
  101965. "children" : [ {
  101966. "operator" : "OR",
  101967. "children" : [ ],
  101968. "cpe_match" : [ {
  101969. "vulnerable" : true,
  101970. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mp2_firmware:-:*:*:*:*:*:*:*",
  101971. "cpe_name" : [ ]
  101972. } ]
  101973. }, {
  101974. "operator" : "OR",
  101975. "children" : [ ],
  101976. "cpe_match" : [ {
  101977. "vulnerable" : false,
  101978. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mp2:-:*:*:*:*:*:*:*",
  101979. "cpe_name" : [ ]
  101980. } ]
  101981. } ],
  101982. "cpe_match" : [ ]
  101983. }, {
  101984. "operator" : "AND",
  101985. "children" : [ {
  101986. "operator" : "OR",
  101987. "children" : [ ],
  101988. "cpe_match" : [ {
  101989. "vulnerable" : true,
  101990. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_x2_firmware:-:*:*:*:*:*:*:*",
  101991. "cpe_name" : [ ]
  101992. } ]
  101993. }, {
  101994. "operator" : "OR",
  101995. "children" : [ ],
  101996. "cpe_match" : [ {
  101997. "vulnerable" : false,
  101998. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_x2:-:*:*:*:*:*:*:*",
  101999. "cpe_name" : [ ]
  102000. } ]
  102001. } ],
  102002. "cpe_match" : [ ]
  102003. }, {
  102004. "operator" : "AND",
  102005. "children" : [ {
  102006. "operator" : "OR",
  102007. "children" : [ ],
  102008. "cpe_match" : [ {
  102009. "vulnerable" : true,
  102010. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mp30_firmware:-:*:*:*:*:*:*:*",
  102011. "cpe_name" : [ ]
  102012. } ]
  102013. }, {
  102014. "operator" : "OR",
  102015. "children" : [ ],
  102016. "cpe_match" : [ {
  102017. "vulnerable" : false,
  102018. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mp30:-:*:*:*:*:*:*:*",
  102019. "cpe_name" : [ ]
  102020. } ]
  102021. } ],
  102022. "cpe_match" : [ ]
  102023. }, {
  102024. "operator" : "AND",
  102025. "children" : [ {
  102026. "operator" : "OR",
  102027. "children" : [ ],
  102028. "cpe_match" : [ {
  102029. "vulnerable" : true,
  102030. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mp50_firmware:-:*:*:*:*:*:*:*",
  102031. "cpe_name" : [ ]
  102032. } ]
  102033. }, {
  102034. "operator" : "OR",
  102035. "children" : [ ],
  102036. "cpe_match" : [ {
  102037. "vulnerable" : false,
  102038. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mp50:-:*:*:*:*:*:*:*",
  102039. "cpe_name" : [ ]
  102040. } ]
  102041. } ],
  102042. "cpe_match" : [ ]
  102043. }, {
  102044. "operator" : "AND",
  102045. "children" : [ {
  102046. "operator" : "OR",
  102047. "children" : [ ],
  102048. "cpe_match" : [ {
  102049. "vulnerable" : true,
  102050. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mp70_firmware:-:*:*:*:*:*:*:*",
  102051. "cpe_name" : [ ]
  102052. } ]
  102053. }, {
  102054. "operator" : "OR",
  102055. "children" : [ ],
  102056. "cpe_match" : [ {
  102057. "vulnerable" : false,
  102058. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mp70:-:*:*:*:*:*:*:*",
  102059. "cpe_name" : [ ]
  102060. } ]
  102061. } ],
  102062. "cpe_match" : [ ]
  102063. }, {
  102064. "operator" : "AND",
  102065. "children" : [ {
  102066. "operator" : "OR",
  102067. "children" : [ ],
  102068. "cpe_match" : [ {
  102069. "vulnerable" : true,
  102070. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_np90_firmware:-:*:*:*:*:*:*:*",
  102071. "cpe_name" : [ ]
  102072. } ]
  102073. }, {
  102074. "operator" : "OR",
  102075. "children" : [ ],
  102076. "cpe_match" : [ {
  102077. "vulnerable" : false,
  102078. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_np90:-:*:*:*:*:*:*:*",
  102079. "cpe_name" : [ ]
  102080. } ]
  102081. } ],
  102082. "cpe_match" : [ ]
  102083. }, {
  102084. "operator" : "AND",
  102085. "children" : [ {
  102086. "operator" : "OR",
  102087. "children" : [ ],
  102088. "cpe_match" : [ {
  102089. "vulnerable" : true,
  102090. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx700_firmware:-:*:*:*:*:*:*:*",
  102091. "cpe_name" : [ ]
  102092. } ]
  102093. }, {
  102094. "operator" : "OR",
  102095. "children" : [ ],
  102096. "cpe_match" : [ {
  102097. "vulnerable" : false,
  102098. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx700:-:*:*:*:*:*:*:*",
  102099. "cpe_name" : [ ]
  102100. } ]
  102101. } ],
  102102. "cpe_match" : [ ]
  102103. }, {
  102104. "operator" : "AND",
  102105. "children" : [ {
  102106. "operator" : "OR",
  102107. "children" : [ ],
  102108. "cpe_match" : [ {
  102109. "vulnerable" : true,
  102110. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx800_firmware:-:*:*:*:*:*:*:*",
  102111. "cpe_name" : [ ]
  102112. } ]
  102113. }, {
  102114. "operator" : "OR",
  102115. "children" : [ ],
  102116. "cpe_match" : [ {
  102117. "vulnerable" : false,
  102118. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx800:-:*:*:*:*:*:*:*",
  102119. "cpe_name" : [ ]
  102120. } ]
  102121. } ],
  102122. "cpe_match" : [ ]
  102123. }, {
  102124. "operator" : "AND",
  102125. "children" : [ {
  102126. "operator" : "OR",
  102127. "children" : [ ],
  102128. "cpe_match" : [ {
  102129. "vulnerable" : true,
  102130. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx400_firmware:-:*:*:*:*:*:*:*",
  102131. "cpe_name" : [ ]
  102132. } ]
  102133. }, {
  102134. "operator" : "OR",
  102135. "children" : [ ],
  102136. "cpe_match" : [ {
  102137. "vulnerable" : false,
  102138. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx400:-:*:*:*:*:*:*:*",
  102139. "cpe_name" : [ ]
  102140. } ]
  102141. } ],
  102142. "cpe_match" : [ ]
  102143. }, {
  102144. "operator" : "AND",
  102145. "children" : [ {
  102146. "operator" : "OR",
  102147. "children" : [ ],
  102148. "cpe_match" : [ {
  102149. "vulnerable" : true,
  102150. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx450_firmware:-:*:*:*:*:*:*:*",
  102151. "cpe_name" : [ ]
  102152. } ]
  102153. }, {
  102154. "operator" : "OR",
  102155. "children" : [ ],
  102156. "cpe_match" : [ {
  102157. "vulnerable" : false,
  102158. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx450:-:*:*:*:*:*:*:*",
  102159. "cpe_name" : [ ]
  102160. } ]
  102161. } ],
  102162. "cpe_match" : [ ]
  102163. }, {
  102164. "operator" : "AND",
  102165. "children" : [ {
  102166. "operator" : "OR",
  102167. "children" : [ ],
  102168. "cpe_match" : [ {
  102169. "vulnerable" : true,
  102170. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx500_firmware:-:*:*:*:*:*:*:*",
  102171. "cpe_name" : [ ]
  102172. } ]
  102173. }, {
  102174. "operator" : "OR",
  102175. "children" : [ ],
  102176. "cpe_match" : [ {
  102177. "vulnerable" : false,
  102178. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx500:-:*:*:*:*:*:*:*",
  102179. "cpe_name" : [ ]
  102180. } ]
  102181. } ],
  102182. "cpe_match" : [ ]
  102183. }, {
  102184. "operator" : "AND",
  102185. "children" : [ {
  102186. "operator" : "OR",
  102187. "children" : [ ],
  102188. "cpe_match" : [ {
  102189. "vulnerable" : true,
  102190. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx550_firmware:-:*:*:*:*:*:*:*",
  102191. "cpe_name" : [ ]
  102192. } ]
  102193. }, {
  102194. "operator" : "OR",
  102195. "children" : [ ],
  102196. "cpe_match" : [ {
  102197. "vulnerable" : false,
  102198. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx550:-:*:*:*:*:*:*:*",
  102199. "cpe_name" : [ ]
  102200. } ]
  102201. } ],
  102202. "cpe_match" : [ ]
  102203. }, {
  102204. "operator" : "AND",
  102205. "children" : [ {
  102206. "operator" : "OR",
  102207. "children" : [ ],
  102208. "cpe_match" : [ {
  102209. "vulnerable" : true,
  102210. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_x3_firmware:-:*:*:*:*:*:*:*",
  102211. "cpe_name" : [ ]
  102212. } ]
  102213. }, {
  102214. "operator" : "OR",
  102215. "children" : [ ],
  102216. "cpe_match" : [ {
  102217. "vulnerable" : false,
  102218. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_x3:-:*:*:*:*:*:*:*",
  102219. "cpe_name" : [ ]
  102220. } ]
  102221. } ],
  102222. "cpe_match" : [ ]
  102223. }, {
  102224. "operator" : "AND",
  102225. "children" : [ {
  102226. "operator" : "OR",
  102227. "children" : [ ],
  102228. "cpe_match" : [ {
  102229. "vulnerable" : true,
  102230. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx100_firmware:-:*:*:*:*:*:*:*",
  102231. "cpe_name" : [ ]
  102232. } ]
  102233. }, {
  102234. "operator" : "OR",
  102235. "children" : [ ],
  102236. "cpe_match" : [ {
  102237. "vulnerable" : false,
  102238. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx100:-:*:*:*:*:*:*:*",
  102239. "cpe_name" : [ ]
  102240. } ]
  102241. } ],
  102242. "cpe_match" : [ ]
  102243. }, {
  102244. "operator" : "AND",
  102245. "children" : [ {
  102246. "operator" : "OR",
  102247. "children" : [ ],
  102248. "cpe_match" : [ {
  102249. "vulnerable" : true,
  102250. "cpe23Uri" : "cpe:2.3:o:philips:avalon_fetal\\/maternal_monitors_fm20_firmware:-:*:*:*:*:*:*:*",
  102251. "cpe_name" : [ ]
  102252. } ]
  102253. }, {
  102254. "operator" : "OR",
  102255. "children" : [ ],
  102256. "cpe_match" : [ {
  102257. "vulnerable" : false,
  102258. "cpe23Uri" : "cpe:2.3:h:philips:avalon_fetal\\/maternal_monitors_fm20:-:*:*:*:*:*:*:*",
  102259. "cpe_name" : [ ]
  102260. } ]
  102261. } ],
  102262. "cpe_match" : [ ]
  102263. }, {
  102264. "operator" : "AND",
  102265. "children" : [ {
  102266. "operator" : "OR",
  102267. "children" : [ ],
  102268. "cpe_match" : [ {
  102269. "vulnerable" : true,
  102270. "cpe23Uri" : "cpe:2.3:o:philips:avalon_fetal\\/maternal_monitors_fm30_firmware:-:*:*:*:*:*:*:*",
  102271. "cpe_name" : [ ]
  102272. } ]
  102273. }, {
  102274. "operator" : "OR",
  102275. "children" : [ ],
  102276. "cpe_match" : [ {
  102277. "vulnerable" : false,
  102278. "cpe23Uri" : "cpe:2.3:h:philips:avalon_fetal\\/maternal_monitors_fm30:-:*:*:*:*:*:*:*",
  102279. "cpe_name" : [ ]
  102280. } ]
  102281. } ],
  102282. "cpe_match" : [ ]
  102283. }, {
  102284. "operator" : "AND",
  102285. "children" : [ {
  102286. "operator" : "OR",
  102287. "children" : [ ],
  102288. "cpe_match" : [ {
  102289. "vulnerable" : true,
  102290. "cpe23Uri" : "cpe:2.3:o:philips:avalon_fetal\\/maternal_monitors_fm40_firmware:-:*:*:*:*:*:*:*",
  102291. "cpe_name" : [ ]
  102292. } ]
  102293. }, {
  102294. "operator" : "OR",
  102295. "children" : [ ],
  102296. "cpe_match" : [ {
  102297. "vulnerable" : false,
  102298. "cpe23Uri" : "cpe:2.3:h:philips:avalon_fetal\\/maternal_monitors_fm40:-:*:*:*:*:*:*:*",
  102299. "cpe_name" : [ ]
  102300. } ]
  102301. } ],
  102302. "cpe_match" : [ ]
  102303. }, {
  102304. "operator" : "AND",
  102305. "children" : [ {
  102306. "operator" : "OR",
  102307. "children" : [ ],
  102308. "cpe_match" : [ {
  102309. "vulnerable" : true,
  102310. "cpe23Uri" : "cpe:2.3:o:philips:avalon_fetal\\/maternal_monitors_fm50_firmware:-:*:*:*:*:*:*:*",
  102311. "cpe_name" : [ ]
  102312. } ]
  102313. }, {
  102314. "operator" : "OR",
  102315. "children" : [ ],
  102316. "cpe_match" : [ {
  102317. "vulnerable" : false,
  102318. "cpe23Uri" : "cpe:2.3:h:philips:avalon_fetal\\/maternal_monitors_fm50:-:*:*:*:*:*:*:*",
  102319. "cpe_name" : [ ]
  102320. } ]
  102321. } ],
  102322. "cpe_match" : [ ]
  102323. } ]
  102324. },
  102325. "impact" : {
  102326. "baseMetricV3" : {
  102327. "cvssV3" : {
  102328. "version" : "3.0",
  102329. "vectorString" : "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
  102330. "attackVector" : "ADJACENT_NETWORK",
  102331. "attackComplexity" : "HIGH",
  102332. "privilegesRequired" : "NONE",
  102333. "userInteraction" : "NONE",
  102334. "scope" : "UNCHANGED",
  102335. "confidentialityImpact" : "HIGH",
  102336. "integrityImpact" : "NONE",
  102337. "availabilityImpact" : "NONE",
  102338. "baseScore" : 5.3,
  102339. "baseSeverity" : "MEDIUM"
  102340. },
  102341. "exploitabilityScore" : 1.6,
  102342. "impactScore" : 3.6
  102343. },
  102344. "baseMetricV2" : {
  102345. "cvssV2" : {
  102346. "version" : "2.0",
  102347. "vectorString" : "AV:A/AC:M/Au:N/C:P/I:N/A:N",
  102348. "accessVector" : "ADJACENT_NETWORK",
  102349. "accessComplexity" : "MEDIUM",
  102350. "authentication" : "NONE",
  102351. "confidentialityImpact" : "PARTIAL",
  102352. "integrityImpact" : "NONE",
  102353. "availabilityImpact" : "NONE",
  102354. "baseScore" : 2.9
  102355. },
  102356. "severity" : "LOW",
  102357. "exploitabilityScore" : 5.5,
  102358. "impactScore" : 2.9,
  102359. "obtainAllPrivilege" : false,
  102360. "obtainUserPrivilege" : false,
  102361. "obtainOtherPrivilege" : false,
  102362. "userInteractionRequired" : false
  102363. }
  102364. },
  102365. "publishedDate" : "2018-06-05T20:29Z",
  102366. "lastModifiedDate" : "2019-10-09T23:32Z"
  102367. }, {
  102368. "cve" : {
  102369. "data_type" : "CVE",
  102370. "data_format" : "MITRE",
  102371. "data_version" : "4.0",
  102372. "CVE_data_meta" : {
  102373. "ID" : "CVE-2018-10597",
  102374. "ASSIGNER" : "ics-cert@hq.dhs.gov"
  102375. },
  102376. "problemtype" : {
  102377. "problemtype_data" : [ {
  102378. "description" : [ {
  102379. "lang" : "en",
  102380. "value" : "CWE-787"
  102381. } ]
  102382. } ]
  102383. },
  102384. "references" : {
  102385. "reference_data" : [ {
  102386. "url" : "https://ics-cert.us-cert.gov/advisories/ICSMA-18-156-01",
  102387. "name" : "https://ics-cert.us-cert.gov/advisories/ICSMA-18-156-01",
  102388. "refsource" : "MISC",
  102389. "tags" : [ "Third Party Advisory", "US Government Resource" ]
  102390. } ]
  102391. },
  102392. "description" : {
  102393. "description_data" : [ {
  102394. "lang" : "en",
  102395. "value" : "IntelliVue Patient Monitors MP Series (including MP2/X2/MP30/MP50/MP70/NP90/MX700/800) Rev B-M, IntelliVue Patient Monitors MX (MX400-550) Rev J-M and (X3/MX100 for Rev M only), and Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 with software Revisions F.0, G.0 and J.3 have a vulnerability that allows an unauthenticated attacker to access memory (\"write-what-where\") from an attacker-chosen device address within the same subnet."
  102396. } ]
  102397. }
  102398. },
  102399. "configurations" : {
  102400. "CVE_data_version" : "4.0",
  102401. "nodes" : [ {
  102402. "operator" : "AND",
  102403. "children" : [ {
  102404. "operator" : "OR",
  102405. "children" : [ ],
  102406. "cpe_match" : [ {
  102407. "vulnerable" : true,
  102408. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mp2_firmware:-:*:*:*:*:*:*:*",
  102409. "cpe_name" : [ ]
  102410. } ]
  102411. }, {
  102412. "operator" : "OR",
  102413. "children" : [ ],
  102414. "cpe_match" : [ {
  102415. "vulnerable" : false,
  102416. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mp2:-:*:*:*:*:*:*:*",
  102417. "cpe_name" : [ ]
  102418. } ]
  102419. } ],
  102420. "cpe_match" : [ ]
  102421. }, {
  102422. "operator" : "AND",
  102423. "children" : [ {
  102424. "operator" : "OR",
  102425. "children" : [ ],
  102426. "cpe_match" : [ {
  102427. "vulnerable" : true,
  102428. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_x2_firmware:-:*:*:*:*:*:*:*",
  102429. "cpe_name" : [ ]
  102430. } ]
  102431. }, {
  102432. "operator" : "OR",
  102433. "children" : [ ],
  102434. "cpe_match" : [ {
  102435. "vulnerable" : false,
  102436. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_x2:-:*:*:*:*:*:*:*",
  102437. "cpe_name" : [ ]
  102438. } ]
  102439. } ],
  102440. "cpe_match" : [ ]
  102441. }, {
  102442. "operator" : "AND",
  102443. "children" : [ {
  102444. "operator" : "OR",
  102445. "children" : [ ],
  102446. "cpe_match" : [ {
  102447. "vulnerable" : true,
  102448. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mp30_firmware:-:*:*:*:*:*:*:*",
  102449. "cpe_name" : [ ]
  102450. } ]
  102451. }, {
  102452. "operator" : "OR",
  102453. "children" : [ ],
  102454. "cpe_match" : [ {
  102455. "vulnerable" : false,
  102456. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mp30:-:*:*:*:*:*:*:*",
  102457. "cpe_name" : [ ]
  102458. } ]
  102459. } ],
  102460. "cpe_match" : [ ]
  102461. }, {
  102462. "operator" : "AND",
  102463. "children" : [ {
  102464. "operator" : "OR",
  102465. "children" : [ ],
  102466. "cpe_match" : [ {
  102467. "vulnerable" : true,
  102468. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mp50_firmware:-:*:*:*:*:*:*:*",
  102469. "cpe_name" : [ ]
  102470. } ]
  102471. }, {
  102472. "operator" : "OR",
  102473. "children" : [ ],
  102474. "cpe_match" : [ {
  102475. "vulnerable" : false,
  102476. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mp50:-:*:*:*:*:*:*:*",
  102477. "cpe_name" : [ ]
  102478. } ]
  102479. } ],
  102480. "cpe_match" : [ ]
  102481. }, {
  102482. "operator" : "AND",
  102483. "children" : [ {
  102484. "operator" : "OR",
  102485. "children" : [ ],
  102486. "cpe_match" : [ {
  102487. "vulnerable" : true,
  102488. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mp70_firmware:-:*:*:*:*:*:*:*",
  102489. "cpe_name" : [ ]
  102490. } ]
  102491. }, {
  102492. "operator" : "OR",
  102493. "children" : [ ],
  102494. "cpe_match" : [ {
  102495. "vulnerable" : false,
  102496. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mp70:-:*:*:*:*:*:*:*",
  102497. "cpe_name" : [ ]
  102498. } ]
  102499. } ],
  102500. "cpe_match" : [ ]
  102501. }, {
  102502. "operator" : "AND",
  102503. "children" : [ {
  102504. "operator" : "OR",
  102505. "children" : [ ],
  102506. "cpe_match" : [ {
  102507. "vulnerable" : true,
  102508. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_np90_firmware:-:*:*:*:*:*:*:*",
  102509. "cpe_name" : [ ]
  102510. } ]
  102511. }, {
  102512. "operator" : "OR",
  102513. "children" : [ ],
  102514. "cpe_match" : [ {
  102515. "vulnerable" : false,
  102516. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_np90:-:*:*:*:*:*:*:*",
  102517. "cpe_name" : [ ]
  102518. } ]
  102519. } ],
  102520. "cpe_match" : [ ]
  102521. }, {
  102522. "operator" : "AND",
  102523. "children" : [ {
  102524. "operator" : "OR",
  102525. "children" : [ ],
  102526. "cpe_match" : [ {
  102527. "vulnerable" : true,
  102528. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx700_firmware:-:*:*:*:*:*:*:*",
  102529. "cpe_name" : [ ]
  102530. } ]
  102531. }, {
  102532. "operator" : "OR",
  102533. "children" : [ ],
  102534. "cpe_match" : [ {
  102535. "vulnerable" : false,
  102536. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx700:-:*:*:*:*:*:*:*",
  102537. "cpe_name" : [ ]
  102538. } ]
  102539. } ],
  102540. "cpe_match" : [ ]
  102541. }, {
  102542. "operator" : "AND",
  102543. "children" : [ {
  102544. "operator" : "OR",
  102545. "children" : [ ],
  102546. "cpe_match" : [ {
  102547. "vulnerable" : true,
  102548. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx800_firmware:-:*:*:*:*:*:*:*",
  102549. "cpe_name" : [ ]
  102550. } ]
  102551. }, {
  102552. "operator" : "OR",
  102553. "children" : [ ],
  102554. "cpe_match" : [ {
  102555. "vulnerable" : false,
  102556. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx800:-:*:*:*:*:*:*:*",
  102557. "cpe_name" : [ ]
  102558. } ]
  102559. } ],
  102560. "cpe_match" : [ ]
  102561. }, {
  102562. "operator" : "AND",
  102563. "children" : [ {
  102564. "operator" : "OR",
  102565. "children" : [ ],
  102566. "cpe_match" : [ {
  102567. "vulnerable" : true,
  102568. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx400_firmware:-:*:*:*:*:*:*:*",
  102569. "cpe_name" : [ ]
  102570. } ]
  102571. }, {
  102572. "operator" : "OR",
  102573. "children" : [ ],
  102574. "cpe_match" : [ {
  102575. "vulnerable" : false,
  102576. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx400:-:*:*:*:*:*:*:*",
  102577. "cpe_name" : [ ]
  102578. } ]
  102579. } ],
  102580. "cpe_match" : [ ]
  102581. }, {
  102582. "operator" : "AND",
  102583. "children" : [ {
  102584. "operator" : "OR",
  102585. "children" : [ ],
  102586. "cpe_match" : [ {
  102587. "vulnerable" : true,
  102588. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx450_firmware:-:*:*:*:*:*:*:*",
  102589. "cpe_name" : [ ]
  102590. } ]
  102591. }, {
  102592. "operator" : "OR",
  102593. "children" : [ ],
  102594. "cpe_match" : [ {
  102595. "vulnerable" : false,
  102596. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx450:-:*:*:*:*:*:*:*",
  102597. "cpe_name" : [ ]
  102598. } ]
  102599. } ],
  102600. "cpe_match" : [ ]
  102601. }, {
  102602. "operator" : "AND",
  102603. "children" : [ {
  102604. "operator" : "OR",
  102605. "children" : [ ],
  102606. "cpe_match" : [ {
  102607. "vulnerable" : true,
  102608. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx500_firmware:-:*:*:*:*:*:*:*",
  102609. "cpe_name" : [ ]
  102610. } ]
  102611. }, {
  102612. "operator" : "OR",
  102613. "children" : [ ],
  102614. "cpe_match" : [ {
  102615. "vulnerable" : false,
  102616. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx500:-:*:*:*:*:*:*:*",
  102617. "cpe_name" : [ ]
  102618. } ]
  102619. } ],
  102620. "cpe_match" : [ ]
  102621. }, {
  102622. "operator" : "AND",
  102623. "children" : [ {
  102624. "operator" : "OR",
  102625. "children" : [ ],
  102626. "cpe_match" : [ {
  102627. "vulnerable" : true,
  102628. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx550_firmware:-:*:*:*:*:*:*:*",
  102629. "cpe_name" : [ ]
  102630. } ]
  102631. }, {
  102632. "operator" : "OR",
  102633. "children" : [ ],
  102634. "cpe_match" : [ {
  102635. "vulnerable" : false,
  102636. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx550:-:*:*:*:*:*:*:*",
  102637. "cpe_name" : [ ]
  102638. } ]
  102639. } ],
  102640. "cpe_match" : [ ]
  102641. }, {
  102642. "operator" : "AND",
  102643. "children" : [ {
  102644. "operator" : "OR",
  102645. "children" : [ ],
  102646. "cpe_match" : [ {
  102647. "vulnerable" : true,
  102648. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_x3_firmware:-:*:*:*:*:*:*:*",
  102649. "cpe_name" : [ ]
  102650. } ]
  102651. }, {
  102652. "operator" : "OR",
  102653. "children" : [ ],
  102654. "cpe_match" : [ {
  102655. "vulnerable" : false,
  102656. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_x3:-:*:*:*:*:*:*:*",
  102657. "cpe_name" : [ ]
  102658. } ]
  102659. } ],
  102660. "cpe_match" : [ ]
  102661. }, {
  102662. "operator" : "AND",
  102663. "children" : [ {
  102664. "operator" : "OR",
  102665. "children" : [ ],
  102666. "cpe_match" : [ {
  102667. "vulnerable" : true,
  102668. "cpe23Uri" : "cpe:2.3:o:philips:intellivue_mx100_firmware:-:*:*:*:*:*:*:*",
  102669. "cpe_name" : [ ]
  102670. } ]
  102671. }, {
  102672. "operator" : "OR",
  102673. "children" : [ ],
  102674. "cpe_match" : [ {
  102675. "vulnerable" : false,
  102676. "cpe23Uri" : "cpe:2.3:h:philips:intellivue_mx100:-:*:*:*:*:*:*:*",
  102677. "cpe_name" : [ ]
  102678. } ]
  102679. } ],
  102680. "cpe_match" : [ ]
  102681. }, {
  102682. "operator" : "AND",
  102683. "children" : [ {
  102684. "operator" : "OR",
  102685. "children" : [ ],
  102686. "cpe_match" : [ {
  102687. "vulnerable" : true,
  102688. "cpe23Uri" : "cpe:2.3:o:philips:avalon_fetal\\/maternal_monitors_fm20_firmware:-:*:*:*:*:*:*:*",
  102689. "cpe_name" : [ ]
  102690. } ]
  102691. }, {
  102692. "operator" : "OR",
  102693. "children" : [ ],
  102694. "cpe_match" : [ {
  102695. "vulnerable" : false,
  102696. "cpe23Uri" : "cpe:2.3:h:philips:avalon_fetal\\/maternal_monitors_fm20:-:*:*:*:*:*:*:*",
  102697. "cpe_name" : [ ]
  102698. } ]
  102699. } ],
  102700. "cpe_match" : [ ]
  102701. }, {
  102702. "operator" : "AND",
  102703. "children" : [ {
  102704. "operator" : "OR",
  102705. "children" : [ ],
  102706. "cpe_match" : [ {
  102707. "vulnerable" : true,
  102708. "cpe23Uri" : "cpe:2.3:o:philips:avalon_fetal\\/maternal_monitors_fm30_firmware:-:*:*:*:*:*:*:*",
  102709. "cpe_name" : [ ]
  102710. } ]
  102711. }, {
  102712. "operator" : "OR",
  102713. "children" : [ ],
  102714. "cpe_match" : [ {
  102715. "vulnerable" : false,
  102716. "cpe23Uri" : "cpe:2.3:h:philips:avalon_fetal\\/maternal_monitors_fm30:-:*:*:*:*:*:*:*",
  102717. "cpe_name" : [ ]
  102718. } ]
  102719. } ],
  102720. "cpe_match" : [ ]
  102721. }, {
  102722. "operator" : "AND",
  102723. "children" : [ {
  102724. "operator" : "OR",
  102725. "children" : [ ],
  102726. "cpe_match" : [ {
  102727. "vulnerable" : true,
  102728. "cpe23Uri" : "cpe:2.3:o:philips:avalon_fetal\\/maternal_monitors_fm40_firmware:-:*:*:*:*:*:*:*",
  102729. "cpe_name" : [ ]
  102730. } ]
  102731. }, {
  102732. "operator" : "OR",
  102733. "children" : [ ],
  102734. "cpe_match" : [ {
  102735. "vulnerable" : false,
  102736. "cpe23Uri" : "cpe:2.3:h:philips:avalon_fetal\\/maternal_monitors_fm40:-:*:*:*:*:*:*:*",
  102737. "cpe_name" : [ ]
  102738. } ]
  102739. } ],
  102740. "cpe_match" : [ ]
  102741. }, {
  102742. "operator" : "AND",
  102743. "children" : [ {
  102744. "operator" : "OR",
  102745. "children" : [ ],
  102746. "cpe_match" : [ {
  102747. "vulnerable" : true,
  102748. "cpe23Uri" : "cpe:2.3:o:philips:avalon_fetal\\/maternal_monitors_fm50_firmware:-:*:*:*:*:*:*:*",
  102749. "cpe_name" : [ ]
  102750. } ]
  102751. }, {
  102752. "operator" : "OR",
  102753. "children" : [ ],
  102754. "cpe_match" : [ {
  102755. "vulnerable" : false,
  102756. "cpe23Uri" : "cpe:2.3:h:philips:avalon_fetal\\/maternal_monitors_fm50:-:*:*:*:*:*:*:*",
  102757. "cpe_name" : [ ]
  102758. } ]
  102759. } ],
  102760. "cpe_match" : [ ]
  102761. } ]
  102762. },
  102763. "impact" : {
  102764. "baseMetricV3" : {
  102765. "cvssV3" : {
  102766. "version" : "3.1",
  102767. "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
  102768. "attackVector" : "ADJACENT_NETWORK",
  102769. "attackComplexity" : "HIGH",
  102770. "privilegesRequired" : "NONE",
  102771. "userInteraction" : "NONE",
  102772. "scope" : "CHANGED",
  102773. "confidentialityImpact" : "HIGH",
  102774. "integrityImpact" : "HIGH",
  102775. "availabilityImpact" : "HIGH",
  102776. "baseScore" : 8.3,
  102777. "baseSeverity" : "HIGH"
  102778. },
  102779. "exploitabilityScore" : 1.6,
  102780. "impactScore" : 6.0
  102781. },
  102782. "baseMetricV2" : {
  102783. "cvssV2" : {
  102784. "version" : "2.0",
  102785. "vectorString" : "AV:A/AC:M/Au:N/C:P/I:P/A:P",
  102786. "accessVector" : "ADJACENT_NETWORK",
  102787. "accessComplexity" : "MEDIUM",
  102788. "authentication" : "NONE",
  102789. "confidentialityImpact" : "PARTIAL",
  102790. "integrityImpact" : "PARTIAL",
  102791. "availabilityImpact" : "PARTIAL",
  102792. "baseScore" : 5.4
  102793. },
  102794. "severity" : "MEDIUM",
  102795. "exploitabilityScore" : 5.5,
  102796. "impactScore" : 6.4,
  102797. "obtainAllPrivilege" : false,
  102798. "obtainUserPrivilege" : false,
  102799. "obtainOtherPrivilege" : false,
  102800. "userInteractionRequired" : false
  102801. }
  102802. },
  102803. "publishedDate" : "2018-06-05T20:29Z",
  102804. "lastModifiedDate" : "2020-09-04T15:52Z"
  102805. }, {
  102806. "cve" : {
  102807. "data_type" : "CVE",
  102808. "data_format" : "MITRE",
  102809. "data_version" : "4.0",
  102810. "CVE_data_meta" : {
  102811. "ID" : "CVE-2017-16944",
  102812. "ASSIGNER" : "cve@mitre.org"
  102813. },
  102814. "problemtype" : {
  102815. "problemtype_data" : [ {
  102816. "description" : [ {
  102817. "lang" : "en",
  102818. "value" : "CWE-835"
  102819. } ]
  102820. } ]
  102821. },
  102822. "references" : {
  102823. "reference_data" : [ {
  102824. "url" : "https://bugs.exim.org/show_bug.cgi?id=2201",
  102825. "name" : "https://bugs.exim.org/show_bug.cgi?id=2201",
  102826. "refsource" : "MISC",
  102827. "tags" : [ "Exploit", "Issue Tracking" ]
  102828. }, {
  102829. "url" : "https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html",
  102830. "name" : "https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html",
  102831. "refsource" : "MISC",
  102832. "tags" : [ "Mailing List" ]
  102833. }, {
  102834. "url" : "http://openwall.com/lists/oss-security/2017/11/25/3",
  102835. "name" : "http://openwall.com/lists/oss-security/2017/11/25/3",
  102836. "refsource" : "MISC",
  102837. "tags" : [ "Mailing List" ]
  102838. }, {
  102839. "url" : "http://openwall.com/lists/oss-security/2017/11/25/2",
  102840. "name" : "http://openwall.com/lists/oss-security/2017/11/25/2",
  102841. "refsource" : "MISC",
  102842. "tags" : [ "Mailing List" ]
  102843. }, {
  102844. "url" : "http://openwall.com/lists/oss-security/2017/11/25/1",
  102845. "name" : "http://openwall.com/lists/oss-security/2017/11/25/1",
  102846. "refsource" : "MISC",
  102847. "tags" : [ "Mailing List" ]
  102848. }, {
  102849. "url" : "http://www.securitytracker.com/id/1039873",
  102850. "name" : "1039873",
  102851. "refsource" : "SECTRACK",
  102852. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  102853. }, {
  102854. "url" : "https://www.exploit-db.com/exploits/43184/",
  102855. "name" : "43184",
  102856. "refsource" : "EXPLOIT-DB",
  102857. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  102858. }, {
  102859. "url" : "https://www.debian.org/security/2017/dsa-4053",
  102860. "name" : "DSA-4053",
  102861. "refsource" : "DEBIAN",
  102862. "tags" : [ "Third Party Advisory" ]
  102863. }, {
  102864. "url" : "http://www.openwall.com/lists/oss-security/2021/05/04/7",
  102865. "name" : "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
  102866. "refsource" : "MLIST",
  102867. "tags" : [ ]
  102868. } ]
  102869. },
  102870. "description" : {
  102871. "description_data" : [ {
  102872. "lang" : "en",
  102873. "value" : "The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function."
  102874. } ]
  102875. }
  102876. },
  102877. "configurations" : {
  102878. "CVE_data_version" : "4.0",
  102879. "nodes" : [ {
  102880. "operator" : "OR",
  102881. "children" : [ ],
  102882. "cpe_match" : [ {
  102883. "vulnerable" : true,
  102884. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.88:*:*:*:*:*:*:*",
  102885. "cpe_name" : [ ]
  102886. }, {
  102887. "vulnerable" : true,
  102888. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.89:*:*:*:*:*:*:*",
  102889. "cpe_name" : [ ]
  102890. } ]
  102891. }, {
  102892. "operator" : "OR",
  102893. "children" : [ ],
  102894. "cpe_match" : [ {
  102895. "vulnerable" : true,
  102896. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  102897. "cpe_name" : [ ]
  102898. } ]
  102899. } ]
  102900. },
  102901. "impact" : {
  102902. "baseMetricV3" : {
  102903. "cvssV3" : {
  102904. "version" : "3.0",
  102905. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  102906. "attackVector" : "NETWORK",
  102907. "attackComplexity" : "LOW",
  102908. "privilegesRequired" : "NONE",
  102909. "userInteraction" : "NONE",
  102910. "scope" : "UNCHANGED",
  102911. "confidentialityImpact" : "NONE",
  102912. "integrityImpact" : "NONE",
  102913. "availabilityImpact" : "HIGH",
  102914. "baseScore" : 7.5,
  102915. "baseSeverity" : "HIGH"
  102916. },
  102917. "exploitabilityScore" : 3.9,
  102918. "impactScore" : 3.6
  102919. },
  102920. "baseMetricV2" : {
  102921. "cvssV2" : {
  102922. "version" : "2.0",
  102923. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  102924. "accessVector" : "NETWORK",
  102925. "accessComplexity" : "LOW",
  102926. "authentication" : "NONE",
  102927. "confidentialityImpact" : "NONE",
  102928. "integrityImpact" : "NONE",
  102929. "availabilityImpact" : "PARTIAL",
  102930. "baseScore" : 5.0
  102931. },
  102932. "severity" : "MEDIUM",
  102933. "exploitabilityScore" : 10.0,
  102934. "impactScore" : 2.9,
  102935. "obtainAllPrivilege" : false,
  102936. "obtainUserPrivilege" : false,
  102937. "obtainOtherPrivilege" : false,
  102938. "userInteractionRequired" : false
  102939. }
  102940. },
  102941. "publishedDate" : "2017-11-25T17:29Z",
  102942. "lastModifiedDate" : "2021-05-04T18:15Z"
  102943. }, {
  102944. "cve" : {
  102945. "data_type" : "CVE",
  102946. "data_format" : "MITRE",
  102947. "data_version" : "4.0",
  102948. "CVE_data_meta" : {
  102949. "ID" : "CVE-2017-16943",
  102950. "ASSIGNER" : "cve@mitre.org"
  102951. },
  102952. "problemtype" : {
  102953. "problemtype_data" : [ {
  102954. "description" : [ {
  102955. "lang" : "en",
  102956. "value" : "CWE-416"
  102957. } ]
  102958. } ]
  102959. },
  102960. "references" : {
  102961. "reference_data" : [ {
  102962. "url" : "https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4",
  102963. "name" : "https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4",
  102964. "refsource" : "MISC",
  102965. "tags" : [ "Patch" ]
  102966. }, {
  102967. "url" : "https://bugs.exim.org/show_bug.cgi?id=2199",
  102968. "name" : "https://bugs.exim.org/show_bug.cgi?id=2199",
  102969. "refsource" : "MISC",
  102970. "tags" : [ "Exploit", "Issue Tracking" ]
  102971. }, {
  102972. "url" : "https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html",
  102973. "name" : "https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html",
  102974. "refsource" : "MISC",
  102975. "tags" : [ "Mailing List" ]
  102976. }, {
  102977. "url" : "https://github.com/LetUsFsck/PoC-Exploit-Mirror/tree/master/CVE-2017-16944",
  102978. "name" : "https://github.com/LetUsFsck/PoC-Exploit-Mirror/tree/master/CVE-2017-16944",
  102979. "refsource" : "MISC",
  102980. "tags" : [ "Exploit" ]
  102981. }, {
  102982. "url" : "https://git.exim.org/exim.git/commit/4090d62a4b25782129cc1643596dc2f6e8f63bde",
  102983. "name" : "https://git.exim.org/exim.git/commit/4090d62a4b25782129cc1643596dc2f6e8f63bde",
  102984. "refsource" : "MISC",
  102985. "tags" : [ "Patch" ]
  102986. }, {
  102987. "url" : "http://openwall.com/lists/oss-security/2017/11/25/3",
  102988. "name" : "http://openwall.com/lists/oss-security/2017/11/25/3",
  102989. "refsource" : "MISC",
  102990. "tags" : [ "Mailing List" ]
  102991. }, {
  102992. "url" : "http://openwall.com/lists/oss-security/2017/11/25/2",
  102993. "name" : "http://openwall.com/lists/oss-security/2017/11/25/2",
  102994. "refsource" : "MISC",
  102995. "tags" : [ "Mailing List" ]
  102996. }, {
  102997. "url" : "http://openwall.com/lists/oss-security/2017/11/25/1",
  102998. "name" : "http://openwall.com/lists/oss-security/2017/11/25/1",
  102999. "refsource" : "MISC",
  103000. "tags" : [ "Mailing List" ]
  103001. }, {
  103002. "url" : "http://www.securitytracker.com/id/1039872",
  103003. "name" : "1039872",
  103004. "refsource" : "SECTRACK",
  103005. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  103006. }, {
  103007. "url" : "https://www.debian.org/security/2017/dsa-4053",
  103008. "name" : "DSA-4053",
  103009. "refsource" : "DEBIAN",
  103010. "tags" : [ "Third Party Advisory" ]
  103011. }, {
  103012. "url" : "http://www.openwall.com/lists/oss-security/2021/05/04/7",
  103013. "name" : "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
  103014. "refsource" : "MLIST",
  103015. "tags" : [ ]
  103016. } ]
  103017. },
  103018. "description" : {
  103019. "description_data" : [ {
  103020. "lang" : "en",
  103021. "value" : "The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands."
  103022. } ]
  103023. }
  103024. },
  103025. "configurations" : {
  103026. "CVE_data_version" : "4.0",
  103027. "nodes" : [ {
  103028. "operator" : "OR",
  103029. "children" : [ ],
  103030. "cpe_match" : [ {
  103031. "vulnerable" : true,
  103032. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.89:-:*:*:*:*:*:*",
  103033. "cpe_name" : [ ]
  103034. }, {
  103035. "vulnerable" : true,
  103036. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.88:-:*:*:*:*:*:*",
  103037. "cpe_name" : [ ]
  103038. } ]
  103039. }, {
  103040. "operator" : "OR",
  103041. "children" : [ ],
  103042. "cpe_match" : [ {
  103043. "vulnerable" : true,
  103044. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  103045. "cpe_name" : [ ]
  103046. } ]
  103047. } ]
  103048. },
  103049. "impact" : {
  103050. "baseMetricV3" : {
  103051. "cvssV3" : {
  103052. "version" : "3.0",
  103053. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  103054. "attackVector" : "NETWORK",
  103055. "attackComplexity" : "LOW",
  103056. "privilegesRequired" : "NONE",
  103057. "userInteraction" : "NONE",
  103058. "scope" : "UNCHANGED",
  103059. "confidentialityImpact" : "HIGH",
  103060. "integrityImpact" : "HIGH",
  103061. "availabilityImpact" : "HIGH",
  103062. "baseScore" : 9.8,
  103063. "baseSeverity" : "CRITICAL"
  103064. },
  103065. "exploitabilityScore" : 3.9,
  103066. "impactScore" : 5.9
  103067. },
  103068. "baseMetricV2" : {
  103069. "cvssV2" : {
  103070. "version" : "2.0",
  103071. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  103072. "accessVector" : "NETWORK",
  103073. "accessComplexity" : "LOW",
  103074. "authentication" : "NONE",
  103075. "confidentialityImpact" : "PARTIAL",
  103076. "integrityImpact" : "PARTIAL",
  103077. "availabilityImpact" : "PARTIAL",
  103078. "baseScore" : 7.5
  103079. },
  103080. "severity" : "HIGH",
  103081. "exploitabilityScore" : 10.0,
  103082. "impactScore" : 6.4,
  103083. "obtainAllPrivilege" : false,
  103084. "obtainUserPrivilege" : false,
  103085. "obtainOtherPrivilege" : false,
  103086. "userInteractionRequired" : false
  103087. }
  103088. },
  103089. "publishedDate" : "2017-11-25T17:29Z",
  103090. "lastModifiedDate" : "2021-05-04T18:15Z"
  103091. }, {
  103092. "cve" : {
  103093. "data_type" : "CVE",
  103094. "data_format" : "MITRE",
  103095. "data_version" : "4.0",
  103096. "CVE_data_meta" : {
  103097. "ID" : "CVE-2017-11323",
  103098. "ASSIGNER" : "cve@mitre.org"
  103099. },
  103100. "problemtype" : {
  103101. "problemtype_data" : [ {
  103102. "description" : [ {
  103103. "lang" : "en",
  103104. "value" : "CWE-119"
  103105. } ]
  103106. } ]
  103107. },
  103108. "references" : {
  103109. "reference_data" : [ {
  103110. "url" : "http://www.altools.com/ALTools/ALZip/Version-History.aspx",
  103111. "name" : "http://www.altools.com/ALTools/ALZip/Version-History.aspx",
  103112. "refsource" : "MISC",
  103113. "tags" : [ "Release Notes", "Vendor Advisory" ]
  103114. }, {
  103115. "url" : "http://exploit.kitploit.com/2017/08/alzip-851-buffer-overflow.html",
  103116. "name" : "http://exploit.kitploit.com/2017/08/alzip-851-buffer-overflow.html",
  103117. "refsource" : "MISC",
  103118. "tags" : [ "Exploit", "Third Party Advisory" ]
  103119. } ]
  103120. },
  103121. "description" : {
  103122. "description_data" : [ {
  103123. "lang" : "en",
  103124. "value" : "Stack-based buffer overflow in ESTsoft ALZip 8.51 and earlier allows remote attackers to execute arbitrary code via a crafted MS-DOS device file, as demonstrated by use of \"AUX\" as the initial substring of a filename."
  103125. } ]
  103126. }
  103127. },
  103128. "configurations" : {
  103129. "CVE_data_version" : "4.0",
  103130. "nodes" : [ {
  103131. "operator" : "OR",
  103132. "children" : [ ],
  103133. "cpe_match" : [ {
  103134. "vulnerable" : true,
  103135. "cpe23Uri" : "cpe:2.3:a:estsoft:alzip:*:*:*:*:*:*:*:*",
  103136. "versionEndIncluding" : "8.51",
  103137. "cpe_name" : [ ]
  103138. } ]
  103139. } ]
  103140. },
  103141. "impact" : {
  103142. "baseMetricV3" : {
  103143. "cvssV3" : {
  103144. "version" : "3.1",
  103145. "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  103146. "attackVector" : "LOCAL",
  103147. "attackComplexity" : "LOW",
  103148. "privilegesRequired" : "NONE",
  103149. "userInteraction" : "REQUIRED",
  103150. "scope" : "UNCHANGED",
  103151. "confidentialityImpact" : "HIGH",
  103152. "integrityImpact" : "HIGH",
  103153. "availabilityImpact" : "HIGH",
  103154. "baseScore" : 7.8,
  103155. "baseSeverity" : "HIGH"
  103156. },
  103157. "exploitabilityScore" : 1.8,
  103158. "impactScore" : 5.9
  103159. },
  103160. "baseMetricV2" : {
  103161. "cvssV2" : {
  103162. "version" : "2.0",
  103163. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  103164. "accessVector" : "NETWORK",
  103165. "accessComplexity" : "MEDIUM",
  103166. "authentication" : "NONE",
  103167. "confidentialityImpact" : "PARTIAL",
  103168. "integrityImpact" : "PARTIAL",
  103169. "availabilityImpact" : "PARTIAL",
  103170. "baseScore" : 6.8
  103171. },
  103172. "severity" : "MEDIUM",
  103173. "exploitabilityScore" : 8.6,
  103174. "impactScore" : 6.4,
  103175. "obtainAllPrivilege" : false,
  103176. "obtainUserPrivilege" : false,
  103177. "obtainOtherPrivilege" : false,
  103178. "userInteractionRequired" : true
  103179. }
  103180. },
  103181. "publishedDate" : "2017-08-19T16:29Z",
  103182. "lastModifiedDate" : "2021-05-03T17:52Z"
  103183. }, {
  103184. "cve" : {
  103185. "data_type" : "CVE",
  103186. "data_format" : "MITRE",
  103187. "data_version" : "4.0",
  103188. "CVE_data_meta" : {
  103189. "ID" : "CVE-2017-10796",
  103190. "ASSIGNER" : "cve@mitre.org"
  103191. },
  103192. "problemtype" : {
  103193. "problemtype_data" : [ {
  103194. "description" : [ {
  103195. "lang" : "en",
  103196. "value" : "CWE-287"
  103197. } ]
  103198. } ]
  103199. },
  103200. "references" : {
  103201. "reference_data" : [ {
  103202. "url" : "https://gist.github.com/elbauldelgeek/8f0f24c582f43f51a34b34420a385d75",
  103203. "name" : "https://gist.github.com/elbauldelgeek/8f0f24c582f43f51a34b34420a385d75",
  103204. "refsource" : "MISC",
  103205. "tags" : [ "Third Party Advisory" ]
  103206. } ]
  103207. },
  103208. "description" : {
  103209. "description_data" : [ {
  103210. "lang" : "en",
  103211. "value" : "On TP-Link NC250 devices with firmware through 1.2.1 build 170515, anyone can view video and audio without authentication via an rtsp://admin@yourip:554/h264_hd.sdp URL."
  103212. } ]
  103213. }
  103214. },
  103215. "configurations" : {
  103216. "CVE_data_version" : "4.0",
  103217. "nodes" : [ {
  103218. "operator" : "AND",
  103219. "children" : [ {
  103220. "operator" : "OR",
  103221. "children" : [ ],
  103222. "cpe_match" : [ {
  103223. "vulnerable" : true,
  103224. "cpe23Uri" : "cpe:2.3:o:tp-link:nc250_firmware:*:*:*:*:*:*:*:*",
  103225. "versionEndIncluding" : "1.2.1",
  103226. "cpe_name" : [ ]
  103227. } ]
  103228. }, {
  103229. "operator" : "OR",
  103230. "children" : [ ],
  103231. "cpe_match" : [ {
  103232. "vulnerable" : false,
  103233. "cpe23Uri" : "cpe:2.3:h:tp-link:nc250:-:*:*:*:*:*:*:*",
  103234. "cpe_name" : [ ]
  103235. } ]
  103236. } ],
  103237. "cpe_match" : [ ]
  103238. } ]
  103239. },
  103240. "impact" : {
  103241. "baseMetricV3" : {
  103242. "cvssV3" : {
  103243. "version" : "3.1",
  103244. "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
  103245. "attackVector" : "ADJACENT_NETWORK",
  103246. "attackComplexity" : "LOW",
  103247. "privilegesRequired" : "NONE",
  103248. "userInteraction" : "NONE",
  103249. "scope" : "UNCHANGED",
  103250. "confidentialityImpact" : "HIGH",
  103251. "integrityImpact" : "NONE",
  103252. "availabilityImpact" : "NONE",
  103253. "baseScore" : 6.5,
  103254. "baseSeverity" : "MEDIUM"
  103255. },
  103256. "exploitabilityScore" : 2.8,
  103257. "impactScore" : 3.6
  103258. },
  103259. "baseMetricV2" : {
  103260. "cvssV2" : {
  103261. "version" : "2.0",
  103262. "vectorString" : "AV:A/AC:L/Au:N/C:P/I:N/A:N",
  103263. "accessVector" : "ADJACENT_NETWORK",
  103264. "accessComplexity" : "LOW",
  103265. "authentication" : "NONE",
  103266. "confidentialityImpact" : "PARTIAL",
  103267. "integrityImpact" : "NONE",
  103268. "availabilityImpact" : "NONE",
  103269. "baseScore" : 3.3
  103270. },
  103271. "severity" : "LOW",
  103272. "exploitabilityScore" : 6.5,
  103273. "impactScore" : 2.9,
  103274. "obtainAllPrivilege" : false,
  103275. "obtainUserPrivilege" : false,
  103276. "obtainOtherPrivilege" : false,
  103277. "userInteractionRequired" : false
  103278. }
  103279. },
  103280. "publishedDate" : "2017-07-02T22:29Z",
  103281. "lastModifiedDate" : "2021-05-07T14:42Z"
  103282. }, {
  103283. "cve" : {
  103284. "data_type" : "CVE",
  103285. "data_format" : "MITRE",
  103286. "data_version" : "4.0",
  103287. "CVE_data_meta" : {
  103288. "ID" : "CVE-2017-3167",
  103289. "ASSIGNER" : "security@apache.org"
  103290. },
  103291. "problemtype" : {
  103292. "problemtype_data" : [ {
  103293. "description" : [ {
  103294. "lang" : "en",
  103295. "value" : "CWE-287"
  103296. } ]
  103297. } ]
  103298. },
  103299. "references" : {
  103300. "reference_data" : [ {
  103301. "url" : "https://lists.apache.org/thread.html/8409e41a8f7dd9ded37141c38df001be930115428c3d64f70bbdb8b4@%3Cdev.httpd.apache.org%3E",
  103302. "name" : "[dev] 20170619 CVE-2017-3167: ap_get_basic_auth_pw authentication bypass",
  103303. "refsource" : "MLIST",
  103304. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  103305. }, {
  103306. "url" : "http://www.securityfocus.com/bid/99135",
  103307. "name" : "99135",
  103308. "refsource" : "BID",
  103309. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  103310. }, {
  103311. "url" : "http://www.securitytracker.com/id/1038711",
  103312. "name" : "1038711",
  103313. "refsource" : "SECTRACK",
  103314. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  103315. }, {
  103316. "url" : "https://www.nomachine.com/SU08O00185",
  103317. "name" : "https://www.nomachine.com/SU08O00185",
  103318. "refsource" : "CONFIRM",
  103319. "tags" : [ "Third Party Advisory" ]
  103320. }, {
  103321. "url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
  103322. "name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
  103323. "refsource" : "CONFIRM",
  103324. "tags" : [ "Patch", "Third Party Advisory" ]
  103325. }, {
  103326. "url" : "https://security.gentoo.org/glsa/201710-32",
  103327. "name" : "GLSA-201710-32",
  103328. "refsource" : "GENTOO",
  103329. "tags" : [ "Third Party Advisory" ]
  103330. }, {
  103331. "url" : "http://www.debian.org/security/2017/dsa-3896",
  103332. "name" : "DSA-3896",
  103333. "refsource" : "DEBIAN",
  103334. "tags" : [ "Third Party Advisory" ]
  103335. }, {
  103336. "url" : "https://support.apple.com/HT208221",
  103337. "name" : "https://support.apple.com/HT208221",
  103338. "refsource" : "CONFIRM",
  103339. "tags" : [ "Third Party Advisory" ]
  103340. }, {
  103341. "url" : "https://access.redhat.com/errata/RHSA-2017:3195",
  103342. "name" : "RHSA-2017:3195",
  103343. "refsource" : "REDHAT",
  103344. "tags" : [ "Third Party Advisory" ]
  103345. }, {
  103346. "url" : "https://access.redhat.com/errata/RHSA-2017:3194",
  103347. "name" : "RHSA-2017:3194",
  103348. "refsource" : "REDHAT",
  103349. "tags" : [ "Third Party Advisory" ]
  103350. }, {
  103351. "url" : "https://access.redhat.com/errata/RHSA-2017:3193",
  103352. "name" : "RHSA-2017:3193",
  103353. "refsource" : "REDHAT",
  103354. "tags" : [ "Third Party Advisory" ]
  103355. }, {
  103356. "url" : "https://access.redhat.com/errata/RHSA-2017:3477",
  103357. "name" : "RHSA-2017:3477",
  103358. "refsource" : "REDHAT",
  103359. "tags" : [ "Third Party Advisory" ]
  103360. }, {
  103361. "url" : "https://access.redhat.com/errata/RHSA-2017:3476",
  103362. "name" : "RHSA-2017:3476",
  103363. "refsource" : "REDHAT",
  103364. "tags" : [ "Third Party Advisory" ]
  103365. }, {
  103366. "url" : "https://access.redhat.com/errata/RHSA-2017:3475",
  103367. "name" : "RHSA-2017:3475",
  103368. "refsource" : "REDHAT",
  103369. "tags" : [ "Third Party Advisory" ]
  103370. }, {
  103371. "url" : "https://access.redhat.com/errata/RHSA-2017:2483",
  103372. "name" : "RHSA-2017:2483",
  103373. "refsource" : "REDHAT",
  103374. "tags" : [ "Third Party Advisory" ]
  103375. }, {
  103376. "url" : "https://access.redhat.com/errata/RHSA-2017:2479",
  103377. "name" : "RHSA-2017:2479",
  103378. "refsource" : "REDHAT",
  103379. "tags" : [ "Third Party Advisory" ]
  103380. }, {
  103381. "url" : "https://access.redhat.com/errata/RHSA-2017:2478",
  103382. "name" : "RHSA-2017:2478",
  103383. "refsource" : "REDHAT",
  103384. "tags" : [ "Third Party Advisory" ]
  103385. }, {
  103386. "url" : "https://security.netapp.com/advisory/ntap-20180601-0002/",
  103387. "name" : "https://security.netapp.com/advisory/ntap-20180601-0002/",
  103388. "refsource" : "CONFIRM",
  103389. "tags" : [ "Third Party Advisory" ]
  103390. }, {
  103391. "url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
  103392. "name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
  103393. "refsource" : "CONFIRM",
  103394. "tags" : [ "Third Party Advisory" ]
  103395. }, {
  103396. "url" : "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E",
  103397. "name" : "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
  103398. "refsource" : "MLIST",
  103399. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103400. }, {
  103401. "url" : "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E",
  103402. "name" : "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
  103403. "refsource" : "MLIST",
  103404. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103405. }, {
  103406. "url" : "https://www.tenable.com/security/tns-2019-09",
  103407. "name" : "https://www.tenable.com/security/tns-2019-09",
  103408. "refsource" : "CONFIRM",
  103409. "tags" : [ "Third Party Advisory" ]
  103410. }, {
  103411. "url" : "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E",
  103412. "name" : "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
  103413. "refsource" : "MLIST",
  103414. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103415. }, {
  103416. "url" : "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E",
  103417. "name" : "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
  103418. "refsource" : "MLIST",
  103419. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103420. }, {
  103421. "url" : "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E",
  103422. "name" : "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
  103423. "refsource" : "MLIST",
  103424. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103425. }, {
  103426. "url" : "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E",
  103427. "name" : "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
  103428. "refsource" : "MLIST",
  103429. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103430. }, {
  103431. "url" : "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E",
  103432. "name" : "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
  103433. "refsource" : "MLIST",
  103434. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103435. }, {
  103436. "url" : "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E",
  103437. "name" : "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
  103438. "refsource" : "MLIST",
  103439. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103440. }, {
  103441. "url" : "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E",
  103442. "name" : "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
  103443. "refsource" : "MLIST",
  103444. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103445. }, {
  103446. "url" : "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E",
  103447. "name" : "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
  103448. "refsource" : "MLIST",
  103449. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103450. }, {
  103451. "url" : "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E",
  103452. "name" : "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
  103453. "refsource" : "MLIST",
  103454. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103455. }, {
  103456. "url" : "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E",
  103457. "name" : "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
  103458. "refsource" : "MLIST",
  103459. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103460. }, {
  103461. "url" : "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E",
  103462. "name" : "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
  103463. "refsource" : "MLIST",
  103464. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103465. }, {
  103466. "url" : "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E",
  103467. "name" : "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
  103468. "refsource" : "MLIST",
  103469. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103470. }, {
  103471. "url" : "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E",
  103472. "name" : "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
  103473. "refsource" : "MLIST",
  103474. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103475. }, {
  103476. "url" : "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E",
  103477. "name" : "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
  103478. "refsource" : "MLIST",
  103479. "tags" : [ "Mailing List", "Vendor Advisory" ]
  103480. } ]
  103481. },
  103482. "description" : {
  103483. "description_data" : [ {
  103484. "lang" : "en",
  103485. "value" : "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed."
  103486. } ]
  103487. }
  103488. },
  103489. "configurations" : {
  103490. "CVE_data_version" : "4.0",
  103491. "nodes" : [ {
  103492. "operator" : "OR",
  103493. "children" : [ ],
  103494. "cpe_match" : [ {
  103495. "vulnerable" : true,
  103496. "cpe23Uri" : "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
  103497. "versionStartIncluding" : "2.2.0",
  103498. "versionEndExcluding" : "2.2.33",
  103499. "cpe_name" : [ ]
  103500. }, {
  103501. "vulnerable" : true,
  103502. "cpe23Uri" : "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
  103503. "versionStartIncluding" : "2.4.0",
  103504. "versionEndExcluding" : "2.4.26",
  103505. "cpe_name" : [ ]
  103506. } ]
  103507. }, {
  103508. "operator" : "OR",
  103509. "children" : [ ],
  103510. "cpe_match" : [ {
  103511. "vulnerable" : true,
  103512. "cpe23Uri" : "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
  103513. "cpe_name" : [ ]
  103514. }, {
  103515. "vulnerable" : true,
  103516. "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
  103517. "cpe_name" : [ ]
  103518. }, {
  103519. "vulnerable" : true,
  103520. "cpe23Uri" : "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
  103521. "cpe_name" : [ ]
  103522. } ]
  103523. }, {
  103524. "operator" : "OR",
  103525. "children" : [ ],
  103526. "cpe_match" : [ {
  103527. "vulnerable" : true,
  103528. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
  103529. "cpe_name" : [ ]
  103530. }, {
  103531. "vulnerable" : true,
  103532. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
  103533. "cpe_name" : [ ]
  103534. }, {
  103535. "vulnerable" : true,
  103536. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
  103537. "cpe_name" : [ ]
  103538. }, {
  103539. "vulnerable" : true,
  103540. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
  103541. "cpe_name" : [ ]
  103542. }, {
  103543. "vulnerable" : true,
  103544. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
  103545. "cpe_name" : [ ]
  103546. }, {
  103547. "vulnerable" : true,
  103548. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
  103549. "cpe_name" : [ ]
  103550. }, {
  103551. "vulnerable" : true,
  103552. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
  103553. "cpe_name" : [ ]
  103554. }, {
  103555. "vulnerable" : true,
  103556. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
  103557. "cpe_name" : [ ]
  103558. }, {
  103559. "vulnerable" : true,
  103560. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
  103561. "cpe_name" : [ ]
  103562. }, {
  103563. "vulnerable" : true,
  103564. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
  103565. "cpe_name" : [ ]
  103566. }, {
  103567. "vulnerable" : true,
  103568. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
  103569. "cpe_name" : [ ]
  103570. }, {
  103571. "vulnerable" : true,
  103572. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
  103573. "cpe_name" : [ ]
  103574. }, {
  103575. "vulnerable" : true,
  103576. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
  103577. "cpe_name" : [ ]
  103578. }, {
  103579. "vulnerable" : true,
  103580. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
  103581. "cpe_name" : [ ]
  103582. }, {
  103583. "vulnerable" : true,
  103584. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
  103585. "cpe_name" : [ ]
  103586. }, {
  103587. "vulnerable" : true,
  103588. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
  103589. "cpe_name" : [ ]
  103590. }, {
  103591. "vulnerable" : true,
  103592. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
  103593. "cpe_name" : [ ]
  103594. }, {
  103595. "vulnerable" : true,
  103596. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
  103597. "cpe_name" : [ ]
  103598. }, {
  103599. "vulnerable" : true,
  103600. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
  103601. "cpe_name" : [ ]
  103602. }, {
  103603. "vulnerable" : true,
  103604. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
  103605. "cpe_name" : [ ]
  103606. }, {
  103607. "vulnerable" : true,
  103608. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
  103609. "cpe_name" : [ ]
  103610. }, {
  103611. "vulnerable" : true,
  103612. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
  103613. "cpe_name" : [ ]
  103614. }, {
  103615. "vulnerable" : true,
  103616. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
  103617. "cpe_name" : [ ]
  103618. } ]
  103619. }, {
  103620. "operator" : "AND",
  103621. "children" : [ {
  103622. "operator" : "OR",
  103623. "children" : [ ],
  103624. "cpe_match" : [ {
  103625. "vulnerable" : true,
  103626. "cpe23Uri" : "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*",
  103627. "cpe_name" : [ ]
  103628. } ]
  103629. }, {
  103630. "operator" : "OR",
  103631. "children" : [ ],
  103632. "cpe_match" : [ {
  103633. "vulnerable" : false,
  103634. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
  103635. "cpe_name" : [ ]
  103636. }, {
  103637. "vulnerable" : false,
  103638. "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
  103639. "cpe_name" : [ ]
  103640. } ]
  103641. } ],
  103642. "cpe_match" : [ ]
  103643. }, {
  103644. "operator" : "OR",
  103645. "children" : [ ],
  103646. "cpe_match" : [ {
  103647. "vulnerable" : true,
  103648. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  103649. "versionEndExcluding" : "10.13.1",
  103650. "cpe_name" : [ ]
  103651. } ]
  103652. }, {
  103653. "operator" : "OR",
  103654. "children" : [ ],
  103655. "cpe_match" : [ {
  103656. "vulnerable" : true,
  103657. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
  103658. "cpe_name" : [ ]
  103659. }, {
  103660. "vulnerable" : true,
  103661. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
  103662. "cpe_name" : [ ]
  103663. } ]
  103664. }, {
  103665. "operator" : "OR",
  103666. "children" : [ ],
  103667. "cpe_match" : [ {
  103668. "vulnerable" : true,
  103669. "cpe23Uri" : "cpe:2.3:a:oracle:secure_global_desktop:5.3:*:*:*:*:*:*:*",
  103670. "cpe_name" : [ ]
  103671. } ]
  103672. } ]
  103673. },
  103674. "impact" : {
  103675. "baseMetricV3" : {
  103676. "cvssV3" : {
  103677. "version" : "3.1",
  103678. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  103679. "attackVector" : "NETWORK",
  103680. "attackComplexity" : "LOW",
  103681. "privilegesRequired" : "NONE",
  103682. "userInteraction" : "NONE",
  103683. "scope" : "UNCHANGED",
  103684. "confidentialityImpact" : "HIGH",
  103685. "integrityImpact" : "HIGH",
  103686. "availabilityImpact" : "HIGH",
  103687. "baseScore" : 9.8,
  103688. "baseSeverity" : "CRITICAL"
  103689. },
  103690. "exploitabilityScore" : 3.9,
  103691. "impactScore" : 5.9
  103692. },
  103693. "baseMetricV2" : {
  103694. "cvssV2" : {
  103695. "version" : "2.0",
  103696. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  103697. "accessVector" : "NETWORK",
  103698. "accessComplexity" : "LOW",
  103699. "authentication" : "NONE",
  103700. "confidentialityImpact" : "PARTIAL",
  103701. "integrityImpact" : "PARTIAL",
  103702. "availabilityImpact" : "PARTIAL",
  103703. "baseScore" : 7.5
  103704. },
  103705. "severity" : "HIGH",
  103706. "exploitabilityScore" : 10.0,
  103707. "impactScore" : 6.4,
  103708. "acInsufInfo" : true,
  103709. "obtainAllPrivilege" : false,
  103710. "obtainUserPrivilege" : false,
  103711. "obtainOtherPrivilege" : false,
  103712. "userInteractionRequired" : false
  103713. }
  103714. },
  103715. "publishedDate" : "2017-06-20T01:29Z",
  103716. "lastModifiedDate" : "2021-05-04T15:18Z"
  103717. }, {
  103718. "cve" : {
  103719. "data_type" : "CVE",
  103720. "data_format" : "MITRE",
  103721. "data_version" : "4.0",
  103722. "CVE_data_meta" : {
  103723. "ID" : "CVE-2017-9438",
  103724. "ASSIGNER" : "cve@mitre.org"
  103725. },
  103726. "problemtype" : {
  103727. "problemtype_data" : [ {
  103728. "description" : [ {
  103729. "lang" : "en",
  103730. "value" : "CWE-674"
  103731. } ]
  103732. } ]
  103733. },
  103734. "references" : {
  103735. "reference_data" : [ {
  103736. "url" : "https://github.com/VirusTotal/yara/issues/674",
  103737. "name" : "https://github.com/VirusTotal/yara/issues/674",
  103738. "refsource" : "CONFIRM",
  103739. "tags" : [ "Issue Tracking", "Patch" ]
  103740. }, {
  103741. "url" : "https://github.com/VirusTotal/yara/commit/10e8bd3071677dd1fa76beeef4bc2fc427cea5e7",
  103742. "name" : "https://github.com/VirusTotal/yara/commit/10e8bd3071677dd1fa76beeef4bc2fc427cea5e7",
  103743. "refsource" : "CONFIRM",
  103744. "tags" : [ "Patch" ]
  103745. }, {
  103746. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXM224OLGI6KAOROLDPPGGCZ2OQVQ6HH/",
  103747. "name" : "FEDORA-2021-f41d5fc954",
  103748. "refsource" : "FEDORA",
  103749. "tags" : [ ]
  103750. }, {
  103751. "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKNXSH5ERG6NELTXCYVJLUPJJJ2TNEBD/",
  103752. "name" : "FEDORA-2021-dd62918333",
  103753. "refsource" : "FEDORA",
  103754. "tags" : [ ]
  103755. } ]
  103756. },
  103757. "description" : {
  103758. "description_data" : [ {
  103759. "lang" : "en",
  103760. "value" : "libyara/re.c in the regexp module in YARA 3.5.0 allows remote attackers to cause a denial of service (stack consumption) via a crafted rule (involving hex strings) that is mishandled in the _yr_re_emit function, a different vulnerability than CVE-2017-9304."
  103761. } ]
  103762. }
  103763. },
  103764. "configurations" : {
  103765. "CVE_data_version" : "4.0",
  103766. "nodes" : [ {
  103767. "operator" : "OR",
  103768. "children" : [ ],
  103769. "cpe_match" : [ {
  103770. "vulnerable" : true,
  103771. "cpe23Uri" : "cpe:2.3:a:virustotal:yara:3.5.0:*:*:*:*:*:*:*",
  103772. "cpe_name" : [ ]
  103773. } ]
  103774. } ]
  103775. },
  103776. "impact" : {
  103777. "baseMetricV3" : {
  103778. "cvssV3" : {
  103779. "version" : "3.0",
  103780. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  103781. "attackVector" : "NETWORK",
  103782. "attackComplexity" : "LOW",
  103783. "privilegesRequired" : "NONE",
  103784. "userInteraction" : "NONE",
  103785. "scope" : "UNCHANGED",
  103786. "confidentialityImpact" : "NONE",
  103787. "integrityImpact" : "NONE",
  103788. "availabilityImpact" : "HIGH",
  103789. "baseScore" : 7.5,
  103790. "baseSeverity" : "HIGH"
  103791. },
  103792. "exploitabilityScore" : 3.9,
  103793. "impactScore" : 3.6
  103794. },
  103795. "baseMetricV2" : {
  103796. "cvssV2" : {
  103797. "version" : "2.0",
  103798. "vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
  103799. "accessVector" : "NETWORK",
  103800. "accessComplexity" : "LOW",
  103801. "authentication" : "NONE",
  103802. "confidentialityImpact" : "NONE",
  103803. "integrityImpact" : "NONE",
  103804. "availabilityImpact" : "PARTIAL",
  103805. "baseScore" : 5.0
  103806. },
  103807. "severity" : "MEDIUM",
  103808. "exploitabilityScore" : 10.0,
  103809. "impactScore" : 2.9,
  103810. "obtainAllPrivilege" : false,
  103811. "obtainUserPrivilege" : false,
  103812. "obtainOtherPrivilege" : false,
  103813. "userInteractionRequired" : false
  103814. }
  103815. },
  103816. "publishedDate" : "2017-06-05T17:29Z",
  103817. "lastModifiedDate" : "2021-05-06T14:15Z"
  103818. }, {
  103819. "cve" : {
  103820. "data_type" : "CVE",
  103821. "data_format" : "MITRE",
  103822. "data_version" : "4.0",
  103823. "CVE_data_meta" : {
  103824. "ID" : "CVE-2016-10307",
  103825. "ASSIGNER" : "cve@mitre.org"
  103826. },
  103827. "problemtype" : {
  103828. "problemtype_data" : [ {
  103829. "description" : [ {
  103830. "lang" : "en",
  103831. "value" : "CWE-798"
  103832. } ]
  103833. } ]
  103834. },
  103835. "references" : {
  103836. "reference_data" : [ {
  103837. "url" : "http://blog.iancaling.com/post/153011925478",
  103838. "name" : "http://blog.iancaling.com/post/153011925478",
  103839. "refsource" : "MISC",
  103840. "tags" : [ "Exploit", "Third Party Advisory" ]
  103841. }, {
  103842. "url" : "http://www.securityfocus.com/bid/97242",
  103843. "name" : "97242",
  103844. "refsource" : "BID",
  103845. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  103846. } ]
  103847. },
  103848. "description" : {
  103849. "description_data" : [ {
  103850. "lang" : "en",
  103851. "value" : "Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it."
  103852. } ]
  103853. }
  103854. },
  103855. "configurations" : {
  103856. "CVE_data_version" : "4.0",
  103857. "nodes" : [ {
  103858. "operator" : "AND",
  103859. "children" : [ {
  103860. "operator" : "OR",
  103861. "children" : [ ],
  103862. "cpe_match" : [ {
  103863. "vulnerable" : true,
  103864. "cpe23Uri" : "cpe:2.3:o:gotrango:apex_lynx_firmware:2.0:*:*:*:*:*:*:*",
  103865. "cpe_name" : [ ]
  103866. } ]
  103867. }, {
  103868. "operator" : "OR",
  103869. "children" : [ ],
  103870. "cpe_match" : [ {
  103871. "vulnerable" : false,
  103872. "cpe23Uri" : "cpe:2.3:h:gotrango:apex_lynx:-:*:*:*:*:*:*:*",
  103873. "cpe_name" : [ ]
  103874. } ]
  103875. } ],
  103876. "cpe_match" : [ ]
  103877. }, {
  103878. "operator" : "AND",
  103879. "children" : [ {
  103880. "operator" : "OR",
  103881. "children" : [ ],
  103882. "cpe_match" : [ {
  103883. "vulnerable" : true,
  103884. "cpe23Uri" : "cpe:2.3:o:gotrango:apex_orion_firmware:2.0:*:*:*:*:*:*:*",
  103885. "cpe_name" : [ ]
  103886. } ]
  103887. }, {
  103888. "operator" : "OR",
  103889. "children" : [ ],
  103890. "cpe_match" : [ {
  103891. "vulnerable" : false,
  103892. "cpe23Uri" : "cpe:2.3:h:gotrango:apex_orion:-:*:*:*:*:*:*:*",
  103893. "cpe_name" : [ ]
  103894. } ]
  103895. } ],
  103896. "cpe_match" : [ ]
  103897. }, {
  103898. "operator" : "AND",
  103899. "children" : [ {
  103900. "operator" : "OR",
  103901. "children" : [ ],
  103902. "cpe_match" : [ {
  103903. "vulnerable" : true,
  103904. "cpe23Uri" : "cpe:2.3:o:gotrango:giga_lynx_firmware:2.0:*:*:*:*:*:*:*",
  103905. "cpe_name" : [ ]
  103906. } ]
  103907. }, {
  103908. "operator" : "OR",
  103909. "children" : [ ],
  103910. "cpe_match" : [ {
  103911. "vulnerable" : false,
  103912. "cpe23Uri" : "cpe:2.3:h:gotrango:giga_lynx:-:*:*:*:*:*:*:*",
  103913. "cpe_name" : [ ]
  103914. } ]
  103915. } ],
  103916. "cpe_match" : [ ]
  103917. }, {
  103918. "operator" : "AND",
  103919. "children" : [ {
  103920. "operator" : "OR",
  103921. "children" : [ ],
  103922. "cpe_match" : [ {
  103923. "vulnerable" : true,
  103924. "cpe23Uri" : "cpe:2.3:o:gotrango:giga_orion_firmware:2.0:*:*:*:*:*:*:*",
  103925. "cpe_name" : [ ]
  103926. } ]
  103927. }, {
  103928. "operator" : "OR",
  103929. "children" : [ ],
  103930. "cpe_match" : [ {
  103931. "vulnerable" : false,
  103932. "cpe23Uri" : "cpe:2.3:h:gotrango:giga_orion:-:*:*:*:*:*:*:*",
  103933. "cpe_name" : [ ]
  103934. } ]
  103935. } ],
  103936. "cpe_match" : [ ]
  103937. }, {
  103938. "operator" : "AND",
  103939. "children" : [ {
  103940. "operator" : "OR",
  103941. "children" : [ ],
  103942. "cpe_match" : [ {
  103943. "vulnerable" : true,
  103944. "cpe23Uri" : "cpe:2.3:o:gotrango:stratalink_firmware:*:*:*:*:*:*:*:*",
  103945. "versionEndIncluding" : "3.0",
  103946. "cpe_name" : [ ]
  103947. } ]
  103948. }, {
  103949. "operator" : "OR",
  103950. "children" : [ ],
  103951. "cpe_match" : [ {
  103952. "vulnerable" : false,
  103953. "cpe23Uri" : "cpe:2.3:h:gotrango:stratalink:-:*:*:*:*:*:*:*",
  103954. "cpe_name" : [ ]
  103955. } ]
  103956. } ],
  103957. "cpe_match" : [ ]
  103958. } ]
  103959. },
  103960. "impact" : {
  103961. "baseMetricV3" : {
  103962. "cvssV3" : {
  103963. "version" : "3.1",
  103964. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  103965. "attackVector" : "NETWORK",
  103966. "attackComplexity" : "LOW",
  103967. "privilegesRequired" : "NONE",
  103968. "userInteraction" : "NONE",
  103969. "scope" : "UNCHANGED",
  103970. "confidentialityImpact" : "HIGH",
  103971. "integrityImpact" : "HIGH",
  103972. "availabilityImpact" : "HIGH",
  103973. "baseScore" : 9.8,
  103974. "baseSeverity" : "CRITICAL"
  103975. },
  103976. "exploitabilityScore" : 3.9,
  103977. "impactScore" : 5.9
  103978. },
  103979. "baseMetricV2" : {
  103980. "cvssV2" : {
  103981. "version" : "2.0",
  103982. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  103983. "accessVector" : "NETWORK",
  103984. "accessComplexity" : "LOW",
  103985. "authentication" : "NONE",
  103986. "confidentialityImpact" : "COMPLETE",
  103987. "integrityImpact" : "COMPLETE",
  103988. "availabilityImpact" : "COMPLETE",
  103989. "baseScore" : 10.0
  103990. },
  103991. "severity" : "HIGH",
  103992. "exploitabilityScore" : 10.0,
  103993. "impactScore" : 10.0,
  103994. "acInsufInfo" : true,
  103995. "obtainAllPrivilege" : false,
  103996. "obtainUserPrivilege" : false,
  103997. "obtainOtherPrivilege" : false,
  103998. "userInteractionRequired" : false
  103999. }
  104000. },
  104001. "publishedDate" : "2017-03-30T07:59Z",
  104002. "lastModifiedDate" : "2021-05-05T14:46Z"
  104003. }, {
  104004. "cve" : {
  104005. "data_type" : "CVE",
  104006. "data_format" : "MITRE",
  104007. "data_version" : "4.0",
  104008. "CVE_data_meta" : {
  104009. "ID" : "CVE-2016-10305",
  104010. "ASSIGNER" : "cve@mitre.org"
  104011. },
  104012. "problemtype" : {
  104013. "problemtype_data" : [ {
  104014. "description" : [ {
  104015. "lang" : "en",
  104016. "value" : "CWE-798"
  104017. } ]
  104018. } ]
  104019. },
  104020. "references" : {
  104021. "reference_data" : [ {
  104022. "url" : "http://blog.iancaling.com/post/153011925478",
  104023. "name" : "http://blog.iancaling.com/post/153011925478",
  104024. "refsource" : "MISC",
  104025. "tags" : [ "Exploit", "Third Party Advisory" ]
  104026. } ]
  104027. },
  104028. "description" : {
  104029. "description_data" : [ {
  104030. "lang" : "en",
  104031. "value" : "Trango Apex <= 2.1.1, ApexLynx < 2.0, ApexOrion < 2.0, ApexPlus <= 3.2.0, Giga <= 2.6.1, GigaLynx < 2.0, GigaOrion < 2.0, GigaPlus <= 3.2.3, GigaPro <= 1.4.1, StrataLink < 3.0, and StrataPro devices have a built-in, hidden root account, with a default password that was once stored in cleartext within a software update package on a Trango FTP server. This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it."
  104032. } ]
  104033. }
  104034. },
  104035. "configurations" : {
  104036. "CVE_data_version" : "4.0",
  104037. "nodes" : [ {
  104038. "operator" : "AND",
  104039. "children" : [ {
  104040. "operator" : "OR",
  104041. "children" : [ ],
  104042. "cpe_match" : [ {
  104043. "vulnerable" : true,
  104044. "cpe23Uri" : "cpe:2.3:o:gotrango:apex_plus_firmware:*:*:*:*:*:*:*:*",
  104045. "versionEndIncluding" : "3.2.0",
  104046. "cpe_name" : [ ]
  104047. } ]
  104048. }, {
  104049. "operator" : "OR",
  104050. "children" : [ ],
  104051. "cpe_match" : [ {
  104052. "vulnerable" : false,
  104053. "cpe23Uri" : "cpe:2.3:h:gotrango:apex_plus:-:*:*:*:*:*:*:*",
  104054. "cpe_name" : [ ]
  104055. } ]
  104056. } ],
  104057. "cpe_match" : [ ]
  104058. }, {
  104059. "operator" : "AND",
  104060. "children" : [ {
  104061. "operator" : "OR",
  104062. "children" : [ ],
  104063. "cpe_match" : [ {
  104064. "vulnerable" : true,
  104065. "cpe23Uri" : "cpe:2.3:o:gotrango:apex_firmware:*:*:*:*:*:*:*:*",
  104066. "versionEndIncluding" : "2.1.1",
  104067. "cpe_name" : [ ]
  104068. } ]
  104069. }, {
  104070. "operator" : "OR",
  104071. "children" : [ ],
  104072. "cpe_match" : [ {
  104073. "vulnerable" : false,
  104074. "cpe23Uri" : "cpe:2.3:h:gotrango:apex:-:*:*:*:*:*:*:*",
  104075. "cpe_name" : [ ]
  104076. } ]
  104077. } ],
  104078. "cpe_match" : [ ]
  104079. }, {
  104080. "operator" : "AND",
  104081. "children" : [ {
  104082. "operator" : "OR",
  104083. "children" : [ ],
  104084. "cpe_match" : [ {
  104085. "vulnerable" : true,
  104086. "cpe23Uri" : "cpe:2.3:o:gotrango:apex_lynx_firmware:*:*:*:*:*:*:*:*",
  104087. "versionEndIncluding" : "1.2.3",
  104088. "cpe_name" : [ ]
  104089. } ]
  104090. }, {
  104091. "operator" : "OR",
  104092. "children" : [ ],
  104093. "cpe_match" : [ {
  104094. "vulnerable" : false,
  104095. "cpe23Uri" : "cpe:2.3:h:gotrango:apex_lynx:-:*:*:*:*:*:*:*",
  104096. "cpe_name" : [ ]
  104097. } ]
  104098. } ],
  104099. "cpe_match" : [ ]
  104100. }, {
  104101. "operator" : "AND",
  104102. "children" : [ {
  104103. "operator" : "OR",
  104104. "children" : [ ],
  104105. "cpe_match" : [ {
  104106. "vulnerable" : true,
  104107. "cpe23Uri" : "cpe:2.3:o:gotrango:apex_orion_firmware:*:*:*:*:*:*:*:*",
  104108. "versionEndIncluding" : "1.2.3",
  104109. "cpe_name" : [ ]
  104110. } ]
  104111. }, {
  104112. "operator" : "OR",
  104113. "children" : [ ],
  104114. "cpe_match" : [ {
  104115. "vulnerable" : false,
  104116. "cpe23Uri" : "cpe:2.3:h:gotrango:apex_orion:-:*:*:*:*:*:*:*",
  104117. "cpe_name" : [ ]
  104118. } ]
  104119. } ],
  104120. "cpe_match" : [ ]
  104121. }, {
  104122. "operator" : "AND",
  104123. "children" : [ {
  104124. "operator" : "OR",
  104125. "children" : [ ],
  104126. "cpe_match" : [ {
  104127. "vulnerable" : true,
  104128. "cpe23Uri" : "cpe:2.3:o:gotrango:giga_firmware:*:*:*:*:*:*:*:*",
  104129. "versionEndIncluding" : "2.6.1",
  104130. "cpe_name" : [ ]
  104131. } ]
  104132. }, {
  104133. "operator" : "OR",
  104134. "children" : [ ],
  104135. "cpe_match" : [ {
  104136. "vulnerable" : false,
  104137. "cpe23Uri" : "cpe:2.3:h:gotrango:giga:-:*:*:*:*:*:*:*",
  104138. "cpe_name" : [ ]
  104139. } ]
  104140. } ],
  104141. "cpe_match" : [ ]
  104142. }, {
  104143. "operator" : "AND",
  104144. "children" : [ {
  104145. "operator" : "OR",
  104146. "children" : [ ],
  104147. "cpe_match" : [ {
  104148. "vulnerable" : true,
  104149. "cpe23Uri" : "cpe:2.3:o:gotrango:giga_lynx_firmware:*:*:*:*:*:*:*:*",
  104150. "versionEndIncluding" : "1.2.3",
  104151. "cpe_name" : [ ]
  104152. } ]
  104153. }, {
  104154. "operator" : "OR",
  104155. "children" : [ ],
  104156. "cpe_match" : [ {
  104157. "vulnerable" : false,
  104158. "cpe23Uri" : "cpe:2.3:h:gotrango:giga_lynx:-:*:*:*:*:*:*:*",
  104159. "cpe_name" : [ ]
  104160. } ]
  104161. } ],
  104162. "cpe_match" : [ ]
  104163. }, {
  104164. "operator" : "AND",
  104165. "children" : [ {
  104166. "operator" : "OR",
  104167. "children" : [ ],
  104168. "cpe_match" : [ {
  104169. "vulnerable" : true,
  104170. "cpe23Uri" : "cpe:2.3:o:gotrango:giga_orion_firmware:*:*:*:*:*:*:*:*",
  104171. "versionEndIncluding" : "1.2.3",
  104172. "cpe_name" : [ ]
  104173. } ]
  104174. }, {
  104175. "operator" : "OR",
  104176. "children" : [ ],
  104177. "cpe_match" : [ {
  104178. "vulnerable" : false,
  104179. "cpe23Uri" : "cpe:2.3:h:gotrango:giga_orion:-:*:*:*:*:*:*:*",
  104180. "cpe_name" : [ ]
  104181. } ]
  104182. } ],
  104183. "cpe_match" : [ ]
  104184. }, {
  104185. "operator" : "AND",
  104186. "children" : [ {
  104187. "operator" : "OR",
  104188. "children" : [ ],
  104189. "cpe_match" : [ {
  104190. "vulnerable" : true,
  104191. "cpe23Uri" : "cpe:2.3:o:gotrango:giga_plus_firmware:*:*:*:*:*:*:*:*",
  104192. "versionEndIncluding" : "3.2.3",
  104193. "cpe_name" : [ ]
  104194. } ]
  104195. }, {
  104196. "operator" : "OR",
  104197. "children" : [ ],
  104198. "cpe_match" : [ {
  104199. "vulnerable" : false,
  104200. "cpe23Uri" : "cpe:2.3:h:gotrango:giga_plus:-:*:*:*:*:*:*:*",
  104201. "cpe_name" : [ ]
  104202. } ]
  104203. } ],
  104204. "cpe_match" : [ ]
  104205. }, {
  104206. "operator" : "AND",
  104207. "children" : [ {
  104208. "operator" : "OR",
  104209. "children" : [ ],
  104210. "cpe_match" : [ {
  104211. "vulnerable" : true,
  104212. "cpe23Uri" : "cpe:2.3:o:gotrango:giga_pro_firmware:*:*:*:*:*:*:*:*",
  104213. "versionEndIncluding" : "1.4.1",
  104214. "cpe_name" : [ ]
  104215. } ]
  104216. }, {
  104217. "operator" : "OR",
  104218. "children" : [ ],
  104219. "cpe_match" : [ {
  104220. "vulnerable" : false,
  104221. "cpe23Uri" : "cpe:2.3:h:gotrango:giga_pro:-:*:*:*:*:*:*:*",
  104222. "cpe_name" : [ ]
  104223. } ]
  104224. } ],
  104225. "cpe_match" : [ ]
  104226. }, {
  104227. "operator" : "AND",
  104228. "children" : [ {
  104229. "operator" : "OR",
  104230. "children" : [ ],
  104231. "cpe_match" : [ {
  104232. "vulnerable" : true,
  104233. "cpe23Uri" : "cpe:2.3:o:gotrango:stratalink_pro_firmware:-:*:*:*:*:*:*:*",
  104234. "cpe_name" : [ ]
  104235. } ]
  104236. }, {
  104237. "operator" : "OR",
  104238. "children" : [ ],
  104239. "cpe_match" : [ {
  104240. "vulnerable" : false,
  104241. "cpe23Uri" : "cpe:2.3:h:gotrango:stratalink_pro:-:*:*:*:*:*:*:*",
  104242. "cpe_name" : [ ]
  104243. } ]
  104244. } ],
  104245. "cpe_match" : [ ]
  104246. }, {
  104247. "operator" : "AND",
  104248. "children" : [ {
  104249. "operator" : "OR",
  104250. "children" : [ ],
  104251. "cpe_match" : [ {
  104252. "vulnerable" : true,
  104253. "cpe23Uri" : "cpe:2.3:o:gotrango:stratalink_firmware:*:*:*:*:*:*:*:*",
  104254. "versionEndIncluding" : "2.2.0",
  104255. "cpe_name" : [ ]
  104256. } ]
  104257. }, {
  104258. "operator" : "OR",
  104259. "children" : [ ],
  104260. "cpe_match" : [ {
  104261. "vulnerable" : false,
  104262. "cpe23Uri" : "cpe:2.3:h:gotrango:stratalink:-:*:*:*:*:*:*:*",
  104263. "cpe_name" : [ ]
  104264. } ]
  104265. } ],
  104266. "cpe_match" : [ ]
  104267. } ]
  104268. },
  104269. "impact" : {
  104270. "baseMetricV3" : {
  104271. "cvssV3" : {
  104272. "version" : "3.1",
  104273. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  104274. "attackVector" : "NETWORK",
  104275. "attackComplexity" : "LOW",
  104276. "privilegesRequired" : "NONE",
  104277. "userInteraction" : "NONE",
  104278. "scope" : "UNCHANGED",
  104279. "confidentialityImpact" : "HIGH",
  104280. "integrityImpact" : "HIGH",
  104281. "availabilityImpact" : "HIGH",
  104282. "baseScore" : 9.8,
  104283. "baseSeverity" : "CRITICAL"
  104284. },
  104285. "exploitabilityScore" : 3.9,
  104286. "impactScore" : 5.9
  104287. },
  104288. "baseMetricV2" : {
  104289. "cvssV2" : {
  104290. "version" : "2.0",
  104291. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  104292. "accessVector" : "NETWORK",
  104293. "accessComplexity" : "LOW",
  104294. "authentication" : "NONE",
  104295. "confidentialityImpact" : "COMPLETE",
  104296. "integrityImpact" : "COMPLETE",
  104297. "availabilityImpact" : "COMPLETE",
  104298. "baseScore" : 10.0
  104299. },
  104300. "severity" : "HIGH",
  104301. "exploitabilityScore" : 10.0,
  104302. "impactScore" : 10.0,
  104303. "acInsufInfo" : true,
  104304. "obtainAllPrivilege" : false,
  104305. "obtainUserPrivilege" : false,
  104306. "obtainOtherPrivilege" : false,
  104307. "userInteractionRequired" : false
  104308. }
  104309. },
  104310. "publishedDate" : "2017-03-30T07:59Z",
  104311. "lastModifiedDate" : "2021-05-05T14:44Z"
  104312. }, {
  104313. "cve" : {
  104314. "data_type" : "CVE",
  104315. "data_format" : "MITRE",
  104316. "data_version" : "4.0",
  104317. "CVE_data_meta" : {
  104318. "ID" : "CVE-2016-1566",
  104319. "ASSIGNER" : "cve@mitre.org"
  104320. },
  104321. "problemtype" : {
  104322. "problemtype_data" : [ {
  104323. "description" : [ {
  104324. "lang" : "en",
  104325. "value" : "CWE-79"
  104326. } ]
  104327. } ]
  104328. },
  104329. "references" : {
  104330. "reference_data" : [ {
  104331. "url" : "https://sourceforge.net/p/guacamole/news/2016/02/security-advisory---stored-xss-cve-2016-1566--guac-1465/",
  104332. "name" : "https://sourceforge.net/p/guacamole/news/2016/02/security-advisory---stored-xss-cve-2016-1566--guac-1465/",
  104333. "refsource" : "CONFIRM",
  104334. "tags" : [ "Third Party Advisory" ]
  104335. } ]
  104336. },
  104337. "description" : {
  104338. "description_data" : [ {
  104339. "lang" : "en",
  104340. "value" : "Cross-site scripting (XSS) vulnerability in the file browser in Guacamole 0.9.8 and 0.9.9, when file transfer is enabled to a location shared by multiple users, allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename. NOTE: this vulnerability was fixed in guacamole.war on 2016-01-13, but the version number was not changed."
  104341. } ]
  104342. }
  104343. },
  104344. "configurations" : {
  104345. "CVE_data_version" : "4.0",
  104346. "nodes" : [ {
  104347. "operator" : "OR",
  104348. "children" : [ ],
  104349. "cpe_match" : [ {
  104350. "vulnerable" : true,
  104351. "cpe23Uri" : "cpe:2.3:a:apache:guacamole:0.9.9:*:*:*:*:*:*:*",
  104352. "cpe_name" : [ ]
  104353. }, {
  104354. "vulnerable" : true,
  104355. "cpe23Uri" : "cpe:2.3:a:apache:guacamole:0.9.8:*:*:*:*:*:*:*",
  104356. "cpe_name" : [ ]
  104357. } ]
  104358. } ]
  104359. },
  104360. "impact" : {
  104361. "baseMetricV3" : {
  104362. "cvssV3" : {
  104363. "version" : "3.0",
  104364. "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
  104365. "attackVector" : "NETWORK",
  104366. "attackComplexity" : "LOW",
  104367. "privilegesRequired" : "LOW",
  104368. "userInteraction" : "REQUIRED",
  104369. "scope" : "CHANGED",
  104370. "confidentialityImpact" : "LOW",
  104371. "integrityImpact" : "LOW",
  104372. "availabilityImpact" : "NONE",
  104373. "baseScore" : 5.4,
  104374. "baseSeverity" : "MEDIUM"
  104375. },
  104376. "exploitabilityScore" : 2.3,
  104377. "impactScore" : 2.7
  104378. },
  104379. "baseMetricV2" : {
  104380. "cvssV2" : {
  104381. "version" : "2.0",
  104382. "vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N",
  104383. "accessVector" : "NETWORK",
  104384. "accessComplexity" : "MEDIUM",
  104385. "authentication" : "SINGLE",
  104386. "confidentialityImpact" : "NONE",
  104387. "integrityImpact" : "PARTIAL",
  104388. "availabilityImpact" : "NONE",
  104389. "baseScore" : 3.5
  104390. },
  104391. "severity" : "LOW",
  104392. "exploitabilityScore" : 6.8,
  104393. "impactScore" : 2.9,
  104394. "obtainAllPrivilege" : false,
  104395. "obtainUserPrivilege" : false,
  104396. "obtainOtherPrivilege" : false,
  104397. "userInteractionRequired" : true
  104398. }
  104399. },
  104400. "publishedDate" : "2017-02-02T15:59Z",
  104401. "lastModifiedDate" : "2021-05-07T18:33Z"
  104402. }, {
  104403. "cve" : {
  104404. "data_type" : "CVE",
  104405. "data_format" : "MITRE",
  104406. "data_version" : "4.0",
  104407. "CVE_data_meta" : {
  104408. "ID" : "CVE-2016-4971",
  104409. "ASSIGNER" : "secalert@redhat.com"
  104410. },
  104411. "problemtype" : {
  104412. "problemtype_data" : [ {
  104413. "description" : [ {
  104414. "lang" : "en",
  104415. "value" : "NVD-CWE-noinfo"
  104416. } ]
  104417. } ]
  104418. },
  104419. "references" : {
  104420. "reference_data" : [ {
  104421. "url" : "http://git.savannah.gnu.org/cgit/wget.git/commit/?id=e996e322ffd42aaa051602da182d03178d0f13e1",
  104422. "name" : "http://git.savannah.gnu.org/cgit/wget.git/commit/?id=e996e322ffd42aaa051602da182d03178d0f13e1",
  104423. "refsource" : "CONFIRM",
  104424. "tags" : [ "Patch", "Vendor Advisory" ]
  104425. }, {
  104426. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1343666",
  104427. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1343666",
  104428. "refsource" : "CONFIRM",
  104429. "tags" : [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
  104430. }, {
  104431. "url" : "http://lists.gnu.org/archive/html/info-gnu/2016-06/msg00004.html",
  104432. "name" : "[info-gnu] 20160609 GNU wget 1.18 released",
  104433. "refsource" : "MLIST",
  104434. "tags" : [ "Mailing List", "Patch", "Vendor Advisory" ]
  104435. }, {
  104436. "url" : "http://www.ubuntu.com/usn/USN-3012-1",
  104437. "name" : "USN-3012-1",
  104438. "refsource" : "UBUNTU",
  104439. "tags" : [ "Third Party Advisory" ]
  104440. }, {
  104441. "url" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
  104442. "name" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
  104443. "refsource" : "CONFIRM",
  104444. "tags" : [ "Third Party Advisory" ]
  104445. }, {
  104446. "url" : "http://www.securityfocus.com/bid/91530",
  104447. "name" : "91530",
  104448. "refsource" : "BID",
  104449. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  104450. }, {
  104451. "url" : "http://lists.opensuse.org/opensuse-updates/2016-08/msg00043.html",
  104452. "name" : "openSUSE-SU-2016:2027",
  104453. "refsource" : "SUSE",
  104454. "tags" : [ "Broken Link" ]
  104455. }, {
  104456. "url" : "https://security.gentoo.org/glsa/201610-11",
  104457. "name" : "GLSA-201610-11",
  104458. "refsource" : "GENTOO",
  104459. "tags" : [ "Third Party Advisory" ]
  104460. }, {
  104461. "url" : "http://www.securitytracker.com/id/1036133",
  104462. "name" : "1036133",
  104463. "refsource" : "SECTRACK",
  104464. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  104465. }, {
  104466. "url" : "https://www.exploit-db.com/exploits/40064/",
  104467. "name" : "40064",
  104468. "refsource" : "EXPLOIT-DB",
  104469. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  104470. }, {
  104471. "url" : "http://rhn.redhat.com/errata/RHSA-2016-2587.html",
  104472. "name" : "RHSA-2016:2587",
  104473. "refsource" : "REDHAT",
  104474. "tags" : [ "Broken Link" ]
  104475. }, {
  104476. "url" : "https://security.paloaltonetworks.com/CVE-2016-4971",
  104477. "name" : "https://security.paloaltonetworks.com/CVE-2016-4971",
  104478. "refsource" : "CONFIRM",
  104479. "tags" : [ "Third Party Advisory" ]
  104480. }, {
  104481. "url" : "http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html",
  104482. "name" : "http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html",
  104483. "refsource" : "MISC",
  104484. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  104485. } ]
  104486. },
  104487. "description" : {
  104488. "description_data" : [ {
  104489. "lang" : "en",
  104490. "value" : "GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource."
  104491. } ]
  104492. }
  104493. },
  104494. "configurations" : {
  104495. "CVE_data_version" : "4.0",
  104496. "nodes" : [ {
  104497. "operator" : "OR",
  104498. "children" : [ ],
  104499. "cpe_match" : [ {
  104500. "vulnerable" : true,
  104501. "cpe23Uri" : "cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*",
  104502. "versionEndExcluding" : "1.18",
  104503. "cpe_name" : [ ]
  104504. } ]
  104505. }, {
  104506. "operator" : "OR",
  104507. "children" : [ ],
  104508. "cpe_match" : [ {
  104509. "vulnerable" : true,
  104510. "cpe23Uri" : "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
  104511. "cpe_name" : [ ]
  104512. }, {
  104513. "vulnerable" : true,
  104514. "cpe23Uri" : "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
  104515. "cpe_name" : [ ]
  104516. }, {
  104517. "vulnerable" : true,
  104518. "cpe23Uri" : "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
  104519. "cpe_name" : [ ]
  104520. }, {
  104521. "vulnerable" : true,
  104522. "cpe23Uri" : "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
  104523. "cpe_name" : [ ]
  104524. } ]
  104525. }, {
  104526. "operator" : "OR",
  104527. "children" : [ ],
  104528. "cpe_match" : [ {
  104529. "vulnerable" : true,
  104530. "cpe23Uri" : "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
  104531. "cpe_name" : [ ]
  104532. }, {
  104533. "vulnerable" : true,
  104534. "cpe23Uri" : "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
  104535. "cpe_name" : [ ]
  104536. } ]
  104537. }, {
  104538. "operator" : "OR",
  104539. "children" : [ ],
  104540. "cpe_match" : [ {
  104541. "vulnerable" : true,
  104542. "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
  104543. "versionStartIncluding" : "6.1.0",
  104544. "versionEndIncluding" : "6.1.16",
  104545. "cpe_name" : [ ]
  104546. }, {
  104547. "vulnerable" : true,
  104548. "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
  104549. "versionStartIncluding" : "7.0.0",
  104550. "versionEndIncluding" : "7.0.14",
  104551. "cpe_name" : [ ]
  104552. }, {
  104553. "vulnerable" : true,
  104554. "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
  104555. "versionStartIncluding" : "7.1.0",
  104556. "versionEndIncluding" : "7.1.9",
  104557. "cpe_name" : [ ]
  104558. } ]
  104559. } ]
  104560. },
  104561. "impact" : {
  104562. "baseMetricV3" : {
  104563. "cvssV3" : {
  104564. "version" : "3.1",
  104565. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  104566. "attackVector" : "NETWORK",
  104567. "attackComplexity" : "LOW",
  104568. "privilegesRequired" : "NONE",
  104569. "userInteraction" : "REQUIRED",
  104570. "scope" : "UNCHANGED",
  104571. "confidentialityImpact" : "HIGH",
  104572. "integrityImpact" : "HIGH",
  104573. "availabilityImpact" : "HIGH",
  104574. "baseScore" : 8.8,
  104575. "baseSeverity" : "HIGH"
  104576. },
  104577. "exploitabilityScore" : 2.8,
  104578. "impactScore" : 5.9
  104579. },
  104580. "baseMetricV2" : {
  104581. "cvssV2" : {
  104582. "version" : "2.0",
  104583. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  104584. "accessVector" : "NETWORK",
  104585. "accessComplexity" : "MEDIUM",
  104586. "authentication" : "NONE",
  104587. "confidentialityImpact" : "NONE",
  104588. "integrityImpact" : "PARTIAL",
  104589. "availabilityImpact" : "NONE",
  104590. "baseScore" : 4.3
  104591. },
  104592. "severity" : "MEDIUM",
  104593. "exploitabilityScore" : 8.6,
  104594. "impactScore" : 2.9,
  104595. "obtainAllPrivilege" : false,
  104596. "obtainUserPrivilege" : false,
  104597. "obtainOtherPrivilege" : false,
  104598. "userInteractionRequired" : true
  104599. }
  104600. },
  104601. "publishedDate" : "2016-06-30T17:59Z",
  104602. "lastModifiedDate" : "2021-05-05T14:43Z"
  104603. }, {
  104604. "cve" : {
  104605. "data_type" : "CVE",
  104606. "data_format" : "MITRE",
  104607. "data_version" : "4.0",
  104608. "CVE_data_meta" : {
  104609. "ID" : "CVE-2016-2170",
  104610. "ASSIGNER" : "secalert@redhat.com"
  104611. },
  104612. "problemtype" : {
  104613. "problemtype_data" : [ {
  104614. "description" : [ {
  104615. "lang" : "en",
  104616. "value" : "CWE-20"
  104617. } ]
  104618. } ]
  104619. },
  104620. "references" : {
  104621. "reference_data" : [ {
  104622. "url" : "http://packetstormsecurity.com/files/136639/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html",
  104623. "name" : "http://packetstormsecurity.com/files/136639/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html",
  104624. "refsource" : "MISC",
  104625. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  104626. }, {
  104627. "url" : "https://blogs.apache.org/ofbiz/entry/announce_apache_ofbiz_12_04",
  104628. "name" : "https://blogs.apache.org/ofbiz/entry/announce_apache_ofbiz_12_04",
  104629. "refsource" : "CONFIRM",
  104630. "tags" : [ "Patch", "Vendor Advisory" ]
  104631. }, {
  104632. "url" : "https://blogs.apache.org/ofbiz/entry/announce_apache_ofbiz_13_07",
  104633. "name" : "https://blogs.apache.org/ofbiz/entry/announce_apache_ofbiz_13_07",
  104634. "refsource" : "CONFIRM",
  104635. "tags" : [ "Vendor Advisory" ]
  104636. }, {
  104637. "url" : "https://cwiki.apache.org/confluence/display/OFBIZ/The+infamous+Java+serialization+vulnerability",
  104638. "name" : "https://cwiki.apache.org/confluence/display/OFBIZ/The+infamous+Java+serialization+vulnerability",
  104639. "refsource" : "CONFIRM",
  104640. "tags" : [ "Vendor Advisory" ]
  104641. }, {
  104642. "url" : "http://ofbiz.apache.org/download.html#vulnerabilities",
  104643. "name" : "http://ofbiz.apache.org/download.html#vulnerabilities",
  104644. "refsource" : "CONFIRM",
  104645. "tags" : [ "Patch", "Vendor Advisory" ]
  104646. }, {
  104647. "url" : "https://issues.apache.org/jira/browse/OFBIZ-6726",
  104648. "name" : "https://issues.apache.org/jira/browse/OFBIZ-6726",
  104649. "refsource" : "CONFIRM",
  104650. "tags" : [ "Patch", "Vendor Advisory" ]
  104651. }, {
  104652. "url" : "http://www.securitytracker.com/id/1035513",
  104653. "name" : "1035513",
  104654. "refsource" : "SECTRACK",
  104655. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  104656. }, {
  104657. "url" : "http://www.securityfocus.com/archive/1/538034/100/0/threaded",
  104658. "name" : "20160408 CVE-2016-2170: Apache OFBiz information disclosure vulnerability",
  104659. "refsource" : "BUGTRAQ",
  104660. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  104661. }, {
  104662. "url" : "https://lists.apache.org/thread.html/r0d97a3b7a14777b9e9e085b483629d2774343c4723236d1c73f43ff0@%3Cdev.ofbiz.apache.org%3E",
  104663. "name" : "[ofbiz-dev] 20210325 Comment out the SOAP and HTTP engines?",
  104664. "refsource" : "MLIST",
  104665. "tags" : [ "Mailing List", "Vendor Advisory" ]
  104666. }, {
  104667. "url" : "https://lists.apache.org/thread.html/reccf8c8a58337ce7c035495d3d82fbc549e97036a9789a2a7d9cccf6@%3Cdev.ofbiz.apache.org%3E",
  104668. "name" : "[ofbiz-dev] 20210325 Re: Comment out the SOAP and HTTP engines?",
  104669. "refsource" : "MLIST",
  104670. "tags" : [ "Mailing List", "Vendor Advisory" ]
  104671. }, {
  104672. "url" : "https://lists.apache.org/thread.html/rec5e9fdcdca13099cfb29f632333f44ad1dd60d90f67b90434e4467a@%3Cdev.ofbiz.apache.org%3E",
  104673. "name" : "[ofbiz-dev] 20210329 Re: Comment out the SOAP and HTTP engines?",
  104674. "refsource" : "MLIST",
  104675. "tags" : [ "Mailing List", "Vendor Advisory" ]
  104676. }, {
  104677. "url" : "https://lists.apache.org/thread.html/r3ee005dd767cd83f522719423f5e7dd316f168ddbd1dc51a13d4e244@%3Cnotifications.ofbiz.apache.org%3E",
  104678. "name" : "[ofbiz-notifications] 20210329 [jira] [Commented] (OFBIZ-6942) Comment out RMI related code because of the Java deserialization issue [CVE-2016-2170]",
  104679. "refsource" : "MLIST",
  104680. "tags" : [ "Mailing List", "Vendor Advisory" ]
  104681. }, {
  104682. "url" : "https://lists.apache.org/thread.html/rc9bd0d3d794dc370bc70585960841868cb29b92dcc80552b84ca2599@%3Cnotifications.ofbiz.apache.org%3E",
  104683. "name" : "[ofbiz-notifications] 20210329 [jira] [Commented] (OFBIZ-12167) Adds a blacklist (to be renamed soon to denylist) in Java serialisation (CVE-2021-26295)",
  104684. "refsource" : "MLIST",
  104685. "tags" : [ "Mailing List", "Vendor Advisory" ]
  104686. }, {
  104687. "url" : "https://lists.apache.org/thread.html/rbe512e5ccd6b11169c6379daa1234bc805f3d53c5a38224e956295ce@%3Cnotifications.ofbiz.apache.org%3E",
  104688. "name" : "[ofbiz-notifications] 20210427 [jira] [Updated] (OFBIZ-12212) Comment out the SOAP and HTTP engines - Fix [CVE-2021-30128]",
  104689. "refsource" : "MLIST",
  104690. "tags" : [ "Mailing List", "Vendor Advisory" ]
  104691. } ]
  104692. },
  104693. "description" : {
  104694. "description_data" : [ {
  104695. "lang" : "en",
  104696. "value" : "Apache OFBiz 12.04.x before 12.04.06 and 13.07.x before 13.07.03 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library."
  104697. } ]
  104698. }
  104699. },
  104700. "configurations" : {
  104701. "CVE_data_version" : "4.0",
  104702. "nodes" : [ {
  104703. "operator" : "OR",
  104704. "children" : [ ],
  104705. "cpe_match" : [ {
  104706. "vulnerable" : true,
  104707. "cpe23Uri" : "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*",
  104708. "versionStartIncluding" : "12.04",
  104709. "versionEndExcluding" : "12.04.06",
  104710. "cpe_name" : [ ]
  104711. }, {
  104712. "vulnerable" : true,
  104713. "cpe23Uri" : "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*",
  104714. "versionStartIncluding" : "13.07",
  104715. "versionEndExcluding" : "13.07.03",
  104716. "cpe_name" : [ ]
  104717. } ]
  104718. } ]
  104719. },
  104720. "impact" : {
  104721. "baseMetricV3" : {
  104722. "cvssV3" : {
  104723. "version" : "3.1",
  104724. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  104725. "attackVector" : "NETWORK",
  104726. "attackComplexity" : "LOW",
  104727. "privilegesRequired" : "NONE",
  104728. "userInteraction" : "NONE",
  104729. "scope" : "UNCHANGED",
  104730. "confidentialityImpact" : "HIGH",
  104731. "integrityImpact" : "HIGH",
  104732. "availabilityImpact" : "HIGH",
  104733. "baseScore" : 9.8,
  104734. "baseSeverity" : "CRITICAL"
  104735. },
  104736. "exploitabilityScore" : 3.9,
  104737. "impactScore" : 5.9
  104738. },
  104739. "baseMetricV2" : {
  104740. "cvssV2" : {
  104741. "version" : "2.0",
  104742. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
  104743. "accessVector" : "NETWORK",
  104744. "accessComplexity" : "LOW",
  104745. "authentication" : "NONE",
  104746. "confidentialityImpact" : "PARTIAL",
  104747. "integrityImpact" : "PARTIAL",
  104748. "availabilityImpact" : "PARTIAL",
  104749. "baseScore" : 7.5
  104750. },
  104751. "severity" : "HIGH",
  104752. "exploitabilityScore" : 10.0,
  104753. "impactScore" : 6.4,
  104754. "obtainAllPrivilege" : false,
  104755. "obtainUserPrivilege" : false,
  104756. "obtainOtherPrivilege" : false
  104757. }
  104758. },
  104759. "publishedDate" : "2016-04-12T14:59Z",
  104760. "lastModifiedDate" : "2021-05-03T20:45Z"
  104761. }, {
  104762. "cve" : {
  104763. "data_type" : "CVE",
  104764. "data_format" : "MITRE",
  104765. "data_version" : "4.0",
  104766. "CVE_data_meta" : {
  104767. "ID" : "CVE-2016-2388",
  104768. "ASSIGNER" : "cve@mitre.org"
  104769. },
  104770. "problemtype" : {
  104771. "problemtype_data" : [ {
  104772. "description" : [ {
  104773. "lang" : "en",
  104774. "value" : "CWE-200"
  104775. } ]
  104776. } ]
  104777. },
  104778. "references" : {
  104779. "reference_data" : [ {
  104780. "url" : "http://seclists.org/fulldisclosure/2016/May/55",
  104781. "name" : "20160523 [ERPSCAN-16-010] SAP NetWeaver AS JAVA - information disclosure vulnerability",
  104782. "refsource" : "FULLDISC",
  104783. "tags" : [ "Exploit", "Mailing List", "Third Party Advisory" ]
  104784. }, {
  104785. "url" : "http://packetstormsecurity.com/files/137128/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html",
  104786. "name" : "http://packetstormsecurity.com/files/137128/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html",
  104787. "refsource" : "MISC",
  104788. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  104789. }, {
  104790. "url" : "https://www.exploit-db.com/exploits/39841/",
  104791. "name" : "39841",
  104792. "refsource" : "EXPLOIT-DB",
  104793. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  104794. }, {
  104795. "url" : "https://www.exploit-db.com/exploits/43495/",
  104796. "name" : "43495",
  104797. "refsource" : "EXPLOIT-DB",
  104798. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  104799. }, {
  104800. "url" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/",
  104801. "name" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/",
  104802. "refsource" : "MISC",
  104803. "tags" : [ "Third Party Advisory" ]
  104804. }, {
  104805. "url" : "https://erpscan.io/advisories/erpscan-16-010-sap-netweaver-7-4-information-disclosure/",
  104806. "name" : "https://erpscan.io/advisories/erpscan-16-010-sap-netweaver-7-4-information-disclosure/",
  104807. "refsource" : "MISC",
  104808. "tags" : [ "Third Party Advisory" ]
  104809. }, {
  104810. "url" : "http://packetstormsecurity.com/files/145860/SAP-NetWeaver-J2EE-Engine-7.40-SQL-Injection.html",
  104811. "name" : "http://packetstormsecurity.com/files/145860/SAP-NetWeaver-J2EE-Engine-7.40-SQL-Injection.html",
  104812. "refsource" : "MISC",
  104813. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  104814. } ]
  104815. },
  104816. "description" : {
  104817. "description_data" : [ {
  104818. "lang" : "en",
  104819. "value" : "The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP request, aka SAP Security Note 2256846."
  104820. } ]
  104821. }
  104822. },
  104823. "configurations" : {
  104824. "CVE_data_version" : "4.0",
  104825. "nodes" : [ {
  104826. "operator" : "OR",
  104827. "children" : [ ],
  104828. "cpe_match" : [ {
  104829. "vulnerable" : true,
  104830. "cpe23Uri" : "cpe:2.3:a:sap:netweaver_application_server_java:*:*:*:*:*:*:*:*",
  104831. "versionStartIncluding" : "7.10",
  104832. "versionEndIncluding" : "7.50",
  104833. "cpe_name" : [ ]
  104834. } ]
  104835. } ]
  104836. },
  104837. "impact" : {
  104838. "baseMetricV3" : {
  104839. "cvssV3" : {
  104840. "version" : "3.1",
  104841. "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
  104842. "attackVector" : "NETWORK",
  104843. "attackComplexity" : "LOW",
  104844. "privilegesRequired" : "NONE",
  104845. "userInteraction" : "NONE",
  104846. "scope" : "UNCHANGED",
  104847. "confidentialityImpact" : "LOW",
  104848. "integrityImpact" : "NONE",
  104849. "availabilityImpact" : "NONE",
  104850. "baseScore" : 5.3,
  104851. "baseSeverity" : "MEDIUM"
  104852. },
  104853. "exploitabilityScore" : 3.9,
  104854. "impactScore" : 1.4
  104855. },
  104856. "baseMetricV2" : {
  104857. "cvssV2" : {
  104858. "version" : "2.0",
  104859. "vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N",
  104860. "accessVector" : "NETWORK",
  104861. "accessComplexity" : "LOW",
  104862. "authentication" : "NONE",
  104863. "confidentialityImpact" : "PARTIAL",
  104864. "integrityImpact" : "NONE",
  104865. "availabilityImpact" : "NONE",
  104866. "baseScore" : 5.0
  104867. },
  104868. "severity" : "MEDIUM",
  104869. "exploitabilityScore" : 10.0,
  104870. "impactScore" : 2.9,
  104871. "obtainAllPrivilege" : false,
  104872. "obtainUserPrivilege" : false,
  104873. "obtainOtherPrivilege" : false
  104874. }
  104875. },
  104876. "publishedDate" : "2016-02-16T15:59Z",
  104877. "lastModifiedDate" : "2021-05-05T14:01Z"
  104878. }, {
  104879. "cve" : {
  104880. "data_type" : "CVE",
  104881. "data_format" : "MITRE",
  104882. "data_version" : "4.0",
  104883. "CVE_data_meta" : {
  104884. "ID" : "CVE-2015-0235",
  104885. "ASSIGNER" : "secalert@redhat.com"
  104886. },
  104887. "problemtype" : {
  104888. "problemtype_data" : [ {
  104889. "description" : [ {
  104890. "lang" : "en",
  104891. "value" : "CWE-787"
  104892. } ]
  104893. } ]
  104894. },
  104895. "references" : {
  104896. "reference_data" : [ {
  104897. "url" : "http://seclists.org/oss-sec/2015/q1/274",
  104898. "name" : "20150127 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow",
  104899. "refsource" : "BUGTRAQ",
  104900. "tags" : [ "Exploit", "Mailing List", "Third Party Advisory" ]
  104901. }, {
  104902. "url" : "http://seclists.org/oss-sec/2015/q1/269",
  104903. "name" : "20150127 GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)",
  104904. "refsource" : "BUGTRAQ",
  104905. "tags" : [ "Mailing List", "Third Party Advisory" ]
  104906. }, {
  104907. "url" : "https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability",
  104908. "name" : "https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability",
  104909. "refsource" : "MISC",
  104910. "tags" : [ "Third Party Advisory" ]
  104911. }, {
  104912. "url" : "http://secunia.com/advisories/62691",
  104913. "name" : "62691",
  104914. "refsource" : "SECUNIA",
  104915. "tags" : [ "Third Party Advisory" ]
  104916. }, {
  104917. "url" : "http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/",
  104918. "name" : "http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/",
  104919. "refsource" : "CONFIRM",
  104920. "tags" : [ "Third Party Advisory" ]
  104921. }, {
  104922. "url" : "http://linux.oracle.com/errata/ELSA-2015-0090.html",
  104923. "name" : "http://linux.oracle.com/errata/ELSA-2015-0090.html",
  104924. "refsource" : "CONFIRM",
  104925. "tags" : [ "Third Party Advisory" ]
  104926. }, {
  104927. "url" : "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671",
  104928. "name" : "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671",
  104929. "refsource" : "CONFIRM",
  104930. "tags" : [ "Third Party Advisory" ]
  104931. }, {
  104932. "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21695835",
  104933. "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21695835",
  104934. "refsource" : "CONFIRM",
  104935. "tags" : [ "Third Party Advisory" ]
  104936. }, {
  104937. "url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10100",
  104938. "name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10100",
  104939. "refsource" : "CONFIRM",
  104940. "tags" : [ "Third Party Advisory" ]
  104941. }, {
  104942. "url" : "http://secunia.com/advisories/62698",
  104943. "name" : "62698",
  104944. "refsource" : "SECUNIA",
  104945. "tags" : [ "Third Party Advisory" ]
  104946. }, {
  104947. "url" : "http://linux.oracle.com/errata/ELSA-2015-0092.html",
  104948. "name" : "http://linux.oracle.com/errata/ELSA-2015-0092.html",
  104949. "refsource" : "CONFIRM",
  104950. "tags" : [ "Third Party Advisory" ]
  104951. }, {
  104952. "url" : "http://secunia.com/advisories/62692",
  104953. "name" : "62692",
  104954. "refsource" : "SECUNIA",
  104955. "tags" : [ "Third Party Advisory" ]
  104956. }, {
  104957. "url" : "https://bto.bluecoat.com/security-advisory/sa90",
  104958. "name" : "https://bto.bluecoat.com/security-advisory/sa90",
  104959. "refsource" : "CONFIRM",
  104960. "tags" : [ "Third Party Advisory" ]
  104961. }, {
  104962. "url" : "http://secunia.com/advisories/62690",
  104963. "name" : "62690",
  104964. "refsource" : "SECUNIA",
  104965. "tags" : [ "Third Party Advisory" ]
  104966. }, {
  104967. "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21695860",
  104968. "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21695860",
  104969. "refsource" : "CONFIRM",
  104970. "tags" : [ "Third Party Advisory" ]
  104971. }, {
  104972. "url" : "http://secunia.com/advisories/62715",
  104973. "name" : "62715",
  104974. "refsource" : "SECUNIA",
  104975. "tags" : [ "Third Party Advisory" ]
  104976. }, {
  104977. "url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost",
  104978. "name" : "20150128 GNU glibc gethostbyname Function Buffer Overflow Vulnerability",
  104979. "refsource" : "CISCO",
  104980. "tags" : [ "Third Party Advisory" ]
  104981. }, {
  104982. "url" : "http://secunia.com/advisories/62688",
  104983. "name" : "62688",
  104984. "refsource" : "SECUNIA",
  104985. "tags" : [ "Third Party Advisory" ]
  104986. }, {
  104987. "url" : "http://secunia.com/advisories/62681",
  104988. "name" : "62681",
  104989. "refsource" : "SECUNIA",
  104990. "tags" : [ "Third Party Advisory" ]
  104991. }, {
  104992. "url" : "http://secunia.com/advisories/62667",
  104993. "name" : "62667",
  104994. "refsource" : "SECUNIA",
  104995. "tags" : [ "Third Party Advisory" ]
  104996. }, {
  104997. "url" : "https://www.sophos.com/en-us/support/knowledgebase/121879.aspx",
  104998. "name" : "https://www.sophos.com/en-us/support/knowledgebase/121879.aspx",
  104999. "refsource" : "CONFIRM",
  105000. "tags" : [ "Third Party Advisory" ]
  105001. }, {
  105002. "url" : "http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html",
  105003. "name" : "http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html",
  105004. "refsource" : "MISC",
  105005. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  105006. }, {
  105007. "url" : "http://secunia.com/advisories/62517",
  105008. "name" : "62517",
  105009. "refsource" : "SECUNIA",
  105010. "tags" : [ "Third Party Advisory" ]
  105011. }, {
  105012. "url" : "http://secunia.com/advisories/62640",
  105013. "name" : "62640",
  105014. "refsource" : "SECUNIA",
  105015. "tags" : [ "Third Party Advisory" ]
  105016. }, {
  105017. "url" : "http://secunia.com/advisories/62680",
  105018. "name" : "62680",
  105019. "refsource" : "SECUNIA",
  105020. "tags" : [ "Third Party Advisory" ]
  105021. }, {
  105022. "url" : "http://seclists.org/fulldisclosure/2015/Jan/111",
  105023. "name" : "20150128 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow",
  105024. "refsource" : "FULLDISC",
  105025. "tags" : [ "Mailing List", "Third Party Advisory" ]
  105026. }, {
  105027. "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696600",
  105028. "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696600",
  105029. "refsource" : "CONFIRM",
  105030. "tags" : [ "Third Party Advisory" ]
  105031. }, {
  105032. "url" : "http://secunia.com/advisories/62883",
  105033. "name" : "62883",
  105034. "refsource" : "SECUNIA",
  105035. "tags" : [ "Third Party Advisory" ]
  105036. }, {
  105037. "url" : "http://secunia.com/advisories/62870",
  105038. "name" : "62870",
  105039. "refsource" : "SECUNIA",
  105040. "tags" : [ "Third Party Advisory" ]
  105041. }, {
  105042. "url" : "http://secunia.com/advisories/62871",
  105043. "name" : "62871",
  105044. "refsource" : "SECUNIA",
  105045. "tags" : [ "Third Party Advisory" ]
  105046. }, {
  105047. "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696526",
  105048. "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696526",
  105049. "refsource" : "CONFIRM",
  105050. "tags" : [ "Third Party Advisory" ]
  105051. }, {
  105052. "url" : "http://secunia.com/advisories/62879",
  105053. "name" : "62879",
  105054. "refsource" : "SECUNIA",
  105055. "tags" : [ "Third Party Advisory" ]
  105056. }, {
  105057. "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696602",
  105058. "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696602",
  105059. "refsource" : "CONFIRM",
  105060. "tags" : [ "Third Party Advisory" ]
  105061. }, {
  105062. "url" : "http://secunia.com/advisories/62865",
  105063. "name" : "62865",
  105064. "refsource" : "SECUNIA",
  105065. "tags" : [ "Third Party Advisory" ]
  105066. }, {
  105067. "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696618",
  105068. "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696618",
  105069. "refsource" : "CONFIRM",
  105070. "tags" : [ "Third Party Advisory" ]
  105071. }, {
  105072. "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696243",
  105073. "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696243",
  105074. "refsource" : "CONFIRM",
  105075. "tags" : [ "Third Party Advisory" ]
  105076. }, {
  105077. "url" : "http://www.debian.org/security/2015/dsa-3142",
  105078. "name" : "DSA-3142",
  105079. "refsource" : "DEBIAN",
  105080. "tags" : [ "Third Party Advisory" ]
  105081. }, {
  105082. "url" : "http://rhn.redhat.com/errata/RHSA-2015-0126.html",
  105083. "name" : "RHSA-2015:0126",
  105084. "refsource" : "REDHAT",
  105085. "tags" : [ "Third Party Advisory" ]
  105086. }, {
  105087. "url" : "http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html",
  105088. "name" : "http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html",
  105089. "refsource" : "MISC",
  105090. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  105091. }, {
  105092. "url" : "http://www.securityfocus.com/bid/72325",
  105093. "name" : "72325",
  105094. "refsource" : "BID",
  105095. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  105096. }, {
  105097. "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:039",
  105098. "name" : "MDVSA-2015:039",
  105099. "refsource" : "MANDRIVA",
  105100. "tags" : [ "Third Party Advisory" ]
  105101. }, {
  105102. "url" : "http://marc.info/?l=bugtraq&m=142721102728110&w=2",
  105103. "name" : "HPSBHF03289",
  105104. "refsource" : "HP",
  105105. "tags" : [ "Issue Tracking", "Mailing List", "Third Party Advisory" ]
  105106. }, {
  105107. "url" : "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
  105108. "name" : "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
  105109. "refsource" : "CONFIRM",
  105110. "tags" : [ "Permissions Required" ]
  105111. }, {
  105112. "url" : "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt",
  105113. "name" : "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt",
  105114. "refsource" : "MISC",
  105115. "tags" : [ "Third Party Advisory" ]
  105116. }, {
  105117. "url" : "http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf",
  105118. "name" : "http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf",
  105119. "refsource" : "CONFIRM",
  105120. "tags" : [ "Broken Link" ]
  105121. }, {
  105122. "url" : "http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html",
  105123. "name" : "http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html",
  105124. "refsource" : "MISC",
  105125. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  105126. }, {
  105127. "url" : "http://marc.info/?l=bugtraq&m=142781412222323&w=2",
  105128. "name" : "HPSBGN03270",
  105129. "refsource" : "HP",
  105130. "tags" : [ "Issue Tracking", "Mailing List", "Third Party Advisory" ]
  105131. }, {
  105132. "url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
  105133. "name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
  105134. "refsource" : "CONFIRM",
  105135. "tags" : [ "Third Party Advisory" ]
  105136. }, {
  105137. "url" : "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html",
  105138. "name" : "APPLE-SA-2015-06-30-2",
  105139. "refsource" : "APPLE",
  105140. "tags" : [ "Mailing List", "Third Party Advisory" ]
  105141. }, {
  105142. "url" : "http://support.apple.com/kb/HT204942",
  105143. "name" : "http://support.apple.com/kb/HT204942",
  105144. "refsource" : "CONFIRM",
  105145. "tags" : [ "Third Party Advisory" ]
  105146. }, {
  105147. "url" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
  105148. "name" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
  105149. "refsource" : "CONFIRM",
  105150. "tags" : [ "Third Party Advisory" ]
  105151. }, {
  105152. "url" : "https://support.apple.com/HT205267",
  105153. "name" : "https://support.apple.com/HT205267",
  105154. "refsource" : "CONFIRM",
  105155. "tags" : [ "Third Party Advisory" ]
  105156. }, {
  105157. "url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html",
  105158. "name" : "APPLE-SA-2015-09-30-3",
  105159. "refsource" : "APPLE",
  105160. "tags" : [ "Mailing List", "Third Party Advisory" ]
  105161. }, {
  105162. "url" : "https://support.apple.com/HT205375",
  105163. "name" : "https://support.apple.com/HT205375",
  105164. "refsource" : "CONFIRM",
  105165. "tags" : [ "Third Party Advisory" ]
  105166. }, {
  105167. "url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html",
  105168. "name" : "APPLE-SA-2015-10-21-4",
  105169. "refsource" : "APPLE",
  105170. "tags" : [ "Mailing List", "Third Party Advisory" ]
  105171. }, {
  105172. "url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
  105173. "name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
  105174. "refsource" : "CONFIRM",
  105175. "tags" : [ "Third Party Advisory" ]
  105176. }, {
  105177. "url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
  105178. "name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
  105179. "refsource" : "CONFIRM",
  105180. "tags" : [ "Third Party Advisory" ]
  105181. }, {
  105182. "url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
  105183. "name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
  105184. "refsource" : "CONFIRM",
  105185. "tags" : [ "Third Party Advisory" ]
  105186. }, {
  105187. "url" : "http://www.securityfocus.com/bid/91787",
  105188. "name" : "91787",
  105189. "refsource" : "BID",
  105190. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  105191. }, {
  105192. "url" : "http://marc.info/?l=bugtraq&m=142722450701342&w=2",
  105193. "name" : "HPSBGN03285",
  105194. "refsource" : "HP",
  105195. "tags" : [ "Issue Tracking", "Mailing List", "Third Party Advisory" ]
  105196. }, {
  105197. "url" : "http://marc.info/?l=bugtraq&m=142296726407499&w=2",
  105198. "name" : "HPSBGN03247",
  105199. "refsource" : "HP",
  105200. "tags" : [ "Issue Tracking", "Mailing List", "Third Party Advisory" ]
  105201. }, {
  105202. "url" : "http://marc.info/?l=bugtraq&m=143145428124857&w=2",
  105203. "name" : "HPSBMU03330",
  105204. "refsource" : "HP",
  105205. "tags" : [ "Issue Tracking", "Mailing List", "Third Party Advisory" ]
  105206. }, {
  105207. "url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
  105208. "name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
  105209. "refsource" : "CONFIRM",
  105210. "tags" : [ "Third Party Advisory" ]
  105211. }, {
  105212. "url" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668",
  105213. "name" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668",
  105214. "refsource" : "CONFIRM",
  105215. "tags" : [ "Third Party Advisory" ]
  105216. }, {
  105217. "url" : "https://www.f-secure.com/en/web/labs_global/fsc-2015-1",
  105218. "name" : "https://www.f-secure.com/en/web/labs_global/fsc-2015-1",
  105219. "refsource" : "CONFIRM",
  105220. "tags" : [ "Third Party Advisory" ]
  105221. }, {
  105222. "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696131",
  105223. "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21696131",
  105224. "refsource" : "CONFIRM",
  105225. "tags" : [ "Third Party Advisory" ]
  105226. }, {
  105227. "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21695774",
  105228. "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21695774",
  105229. "refsource" : "CONFIRM",
  105230. "tags" : [ "Third Party Advisory" ]
  105231. }, {
  105232. "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21695695",
  105233. "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21695695",
  105234. "refsource" : "CONFIRM",
  105235. "tags" : [ "Third Party Advisory" ]
  105236. }, {
  105237. "url" : "http://secunia.com/advisories/62816",
  105238. "name" : "62816",
  105239. "refsource" : "SECUNIA",
  105240. "tags" : [ "Third Party Advisory" ]
  105241. }, {
  105242. "url" : "http://secunia.com/advisories/62813",
  105243. "name" : "62813",
  105244. "refsource" : "SECUNIA",
  105245. "tags" : [ "Third Party Advisory" ]
  105246. }, {
  105247. "url" : "http://secunia.com/advisories/62812",
  105248. "name" : "62812",
  105249. "refsource" : "SECUNIA",
  105250. "tags" : [ "Third Party Advisory" ]
  105251. }, {
  105252. "url" : "http://secunia.com/advisories/62758",
  105253. "name" : "62758",
  105254. "refsource" : "SECUNIA",
  105255. "tags" : [ "Third Party Advisory" ]
  105256. }, {
  105257. "url" : "https://security.gentoo.org/glsa/201503-04",
  105258. "name" : "GLSA-201503-04",
  105259. "refsource" : "GENTOO",
  105260. "tags" : [ "Third Party Advisory" ]
  105261. }, {
  105262. "url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
  105263. "name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
  105264. "refsource" : "CONFIRM",
  105265. "tags" : [ "Third Party Advisory" ]
  105266. }, {
  105267. "url" : "http://www.securitytracker.com/id/1032909",
  105268. "name" : "1032909",
  105269. "refsource" : "SECTRACK",
  105270. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  105271. }, {
  105272. "url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
  105273. "name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
  105274. "refsource" : "CONFIRM",
  105275. "tags" : [ "Third Party Advisory" ]
  105276. }, {
  105277. "url" : "https://security.netapp.com/advisory/ntap-20150127-0001/",
  105278. "name" : "https://security.netapp.com/advisory/ntap-20150127-0001/",
  105279. "refsource" : "CONFIRM",
  105280. "tags" : [ "Third Party Advisory" ]
  105281. }, {
  105282. "url" : "http://www.securityfocus.com/archive/1/534845/100/0/threaded",
  105283. "name" : "20150311 OpenSSL v1.0.2 for Linux affected by CVE-2015-0235",
  105284. "refsource" : "BUGTRAQ",
  105285. "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
  105286. }, {
  105287. "url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
  105288. "name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
  105289. "refsource" : "CONFIRM",
  105290. "tags" : [ "Third Party Advisory" ]
  105291. }, {
  105292. "url" : "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
  105293. "name" : "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
  105294. "refsource" : "CONFIRM",
  105295. "tags" : [ "Third Party Advisory" ]
  105296. }, {
  105297. "url" : "http://seclists.org/fulldisclosure/2019/Jun/18",
  105298. "name" : "20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
  105299. "refsource" : "FULLDISC",
  105300. "tags" : [ "Mailing List", "Third Party Advisory" ]
  105301. }, {
  105302. "url" : "https://seclists.org/bugtraq/2019/Jun/14",
  105303. "name" : "20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
  105304. "refsource" : "BUGTRAQ",
  105305. "tags" : [ "Mailing List", "Third Party Advisory" ]
  105306. }, {
  105307. "url" : "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
  105308. "name" : "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
  105309. "refsource" : "MISC",
  105310. "tags" : [ "Third Party Advisory", "VDB Entry" ]
  105311. }, {
  105312. "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf",
  105313. "name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf",
  105314. "refsource" : "CONFIRM",
  105315. "tags" : [ "Third Party Advisory" ]
  105316. }, {
  105317. "url" : "http://www.openwall.com/lists/oss-security/2021/05/04/7",
  105318. "name" : "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
  105319. "refsource" : "MLIST",
  105320. "tags" : [ ]
  105321. } ]
  105322. },
  105323. "description" : {
  105324. "description_data" : [ {
  105325. "lang" : "en",
  105326. "value" : "Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka \"GHOST.\""
  105327. } ]
  105328. }
  105329. },
  105330. "configurations" : {
  105331. "CVE_data_version" : "4.0",
  105332. "nodes" : [ {
  105333. "operator" : "OR",
  105334. "children" : [ ],
  105335. "cpe_match" : [ {
  105336. "vulnerable" : true,
  105337. "cpe23Uri" : "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
  105338. "versionStartIncluding" : "2.0",
  105339. "versionEndExcluding" : "2.18",
  105340. "cpe_name" : [ ]
  105341. } ]
  105342. }, {
  105343. "operator" : "OR",
  105344. "children" : [ ],
  105345. "cpe_match" : [ {
  105346. "vulnerable" : true,
  105347. "cpe23Uri" : "cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*",
  105348. "versionEndExcluding" : "3.7.1",
  105349. "cpe_name" : [ ]
  105350. }, {
  105351. "vulnerable" : true,
  105352. "cpe23Uri" : "cpe:2.3:a:oracle:communications_application_session_controller:3.7.1:-:*:*:*:*:*:*",
  105353. "cpe_name" : [ ]
  105354. }, {
  105355. "vulnerable" : true,
  105356. "cpe23Uri" : "cpe:2.3:a:oracle:communications_eagle_application_processor:16.0:*:*:*:*:*:*:*",
  105357. "cpe_name" : [ ]
  105358. }, {
  105359. "vulnerable" : true,
  105360. "cpe23Uri" : "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.0:*:*:*:*:*:*:*",
  105361. "cpe_name" : [ ]
  105362. }, {
  105363. "vulnerable" : true,
  105364. "cpe23Uri" : "cpe:2.3:a:oracle:communications_lsms:13.1:*:*:*:*:*:*:*",
  105365. "cpe_name" : [ ]
  105366. }, {
  105367. "vulnerable" : true,
  105368. "cpe23Uri" : "cpe:2.3:a:oracle:communications_policy_management:9.7.3:*:*:*:*:*:*:*",
  105369. "cpe_name" : [ ]
  105370. }, {
  105371. "vulnerable" : true,
  105372. "cpe23Uri" : "cpe:2.3:a:oracle:communications_policy_management:9.9.1:*:*:*:*:*:*:*",
  105373. "cpe_name" : [ ]
  105374. }, {
  105375. "vulnerable" : true,
  105376. "cpe23Uri" : "cpe:2.3:a:oracle:communications_policy_management:10.4.1:*:*:*:*:*:*:*",
  105377. "cpe_name" : [ ]
  105378. }, {
  105379. "vulnerable" : true,
  105380. "cpe23Uri" : "cpe:2.3:a:oracle:communications_policy_management:11.5:*:*:*:*:*:*:*",
  105381. "cpe_name" : [ ]
  105382. }, {
  105383. "vulnerable" : true,
  105384. "cpe23Uri" : "cpe:2.3:a:oracle:communications_policy_management:12.1.1:*:*:*:*:*:*:*",
  105385. "cpe_name" : [ ]
  105386. }, {
  105387. "vulnerable" : true,
  105388. "cpe23Uri" : "cpe:2.3:a:oracle:communications_session_border_controller:*:*:*:*:*:*:*:*",
  105389. "versionEndExcluding" : "7.2.0",
  105390. "cpe_name" : [ ]
  105391. }, {
  105392. "vulnerable" : true,
  105393. "cpe23Uri" : "cpe:2.3:a:oracle:communications_session_border_controller:7.2.0:-:*:*:*:*:*:*",
  105394. "cpe_name" : [ ]
  105395. }, {
  105396. "vulnerable" : true,
  105397. "cpe23Uri" : "cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*",
  105398. "cpe_name" : [ ]
  105399. }, {
  105400. "vulnerable" : true,
  105401. "cpe23Uri" : "cpe:2.3:a:oracle:communications_user_data_repository:*:*:*:*:*:*:*:*",
  105402. "versionStartIncluding" : "10.0.0",
  105403. "versionEndIncluding" : "10.0.1",
  105404. "cpe_name" : [ ]
  105405. }, {
  105406. "vulnerable" : true,
  105407. "cpe23Uri" : "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.0:*:*:*:*:*:*:*",
  105408. "cpe_name" : [ ]
  105409. }, {
  105410. "vulnerable" : true,
  105411. "cpe23Uri" : "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.1:*:*:*:*:*:*:*",
  105412. "cpe_name" : [ ]
  105413. }, {
  105414. "vulnerable" : true,
  105415. "cpe23Uri" : "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:*",
  105416. "cpe_name" : [ ]
  105417. }, {
  105418. "vulnerable" : true,
  105419. "cpe23Uri" : "cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*",
  105420. "cpe_name" : [ ]
  105421. }, {
  105422. "vulnerable" : true,
  105423. "cpe23Uri" : "cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*",
  105424. "cpe_name" : [ ]
  105425. }, {
  105426. "vulnerable" : true,
  105427. "cpe23Uri" : "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
  105428. "versionEndExcluding" : "5.1.24",
  105429. "cpe_name" : [ ]
  105430. }, {
  105431. "vulnerable" : true,
  105432. "cpe23Uri" : "cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*",
  105433. "cpe_name" : [ ]
  105434. }, {
  105435. "vulnerable" : true,
  105436. "cpe23Uri" : "cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*",
  105437. "cpe_name" : [ ]
  105438. } ]
  105439. }, {
  105440. "operator" : "OR",
  105441. "children" : [ ],
  105442. "cpe_match" : [ {
  105443. "vulnerable" : true,
  105444. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
  105445. "cpe_name" : [ ]
  105446. }, {
  105447. "vulnerable" : true,
  105448. "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
  105449. "cpe_name" : [ ]
  105450. } ]
  105451. }, {
  105452. "operator" : "OR",
  105453. "children" : [ ],
  105454. "cpe_match" : [ {
  105455. "vulnerable" : true,
  105456. "cpe23Uri" : "cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*",
  105457. "cpe_name" : [ ]
  105458. } ]
  105459. }, {
  105460. "operator" : "OR",
  105461. "children" : [ ],
  105462. "cpe_match" : [ {
  105463. "vulnerable" : true,
  105464. "cpe23Uri" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
  105465. "versionEndExcluding" : "10.11.1",
  105466. "cpe_name" : [ ]
  105467. } ]
  105468. }, {
  105469. "operator" : "OR",
  105470. "children" : [ ],
  105471. "cpe_match" : [ {
  105472. "vulnerable" : true,
  105473. "cpe23Uri" : "cpe:2.3:a:ibm:pureapplication_system:1.0.0.0:*:*:*:*:*:*:*",
  105474. "cpe_name" : [ ]
  105475. }, {
  105476. "vulnerable" : true,
  105477. "cpe23Uri" : "cpe:2.3:a:ibm:pureapplication_system:1.1.0.0:*:*:*:*:*:*:*",
  105478. "cpe_name" : [ ]
  105479. }, {
  105480. "vulnerable" : true,
  105481. "cpe23Uri" : "cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*",
  105482. "cpe_name" : [ ]
  105483. }, {
  105484. "vulnerable" : true,
  105485. "cpe23Uri" : "cpe:2.3:a:ibm:security_access_manager_for_enterprise_single_sign-on:8.2:*:*:*:*:*:*:*",
  105486. "cpe_name" : [ ]
  105487. } ]
  105488. } ]
  105489. },
  105490. "impact" : {
  105491. "baseMetricV2" : {
  105492. "cvssV2" : {
  105493. "version" : "2.0",
  105494. "vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  105495. "accessVector" : "NETWORK",
  105496. "accessComplexity" : "LOW",
  105497. "authentication" : "NONE",
  105498. "confidentialityImpact" : "COMPLETE",
  105499. "integrityImpact" : "COMPLETE",
  105500. "availabilityImpact" : "COMPLETE",
  105501. "baseScore" : 10.0
  105502. },
  105503. "severity" : "HIGH",
  105504. "exploitabilityScore" : 10.0,
  105505. "impactScore" : 10.0,
  105506. "obtainAllPrivilege" : false,
  105507. "obtainUserPrivilege" : false,
  105508. "obtainOtherPrivilege" : false,
  105509. "userInteractionRequired" : false
  105510. }
  105511. },
  105512. "publishedDate" : "2015-01-28T19:59Z",
  105513. "lastModifiedDate" : "2021-05-04T18:15Z"
  105514. }, {
  105515. "cve" : {
  105516. "data_type" : "CVE",
  105517. "data_format" : "MITRE",
  105518. "data_version" : "4.0",
  105519. "CVE_data_meta" : {
  105520. "ID" : "CVE-2014-9342",
  105521. "ASSIGNER" : "cve@mitre.org"
  105522. },
  105523. "problemtype" : {
  105524. "problemtype_data" : [ {
  105525. "description" : [ {
  105526. "lang" : "en",
  105527. "value" : "CWE-79"
  105528. } ]
  105529. } ]
  105530. },
  105531. "references" : {
  105532. "reference_data" : [ {
  105533. "url" : "http://www.securityfocus.com/archive/1/534137/100/0/threaded",
  105534. "name" : "20141202 F5 BIGIP - (OLD!) Persistent XSS in ASM Module",
  105535. "refsource" : "BUGTRAQ",
  105536. "tags" : [ ]
  105537. }, {
  105538. "url" : "https://support.f5.com/csp/article/K15939",
  105539. "name" : "https://support.f5.com/csp/article/K15939",
  105540. "refsource" : "MISC",
  105541. "tags" : [ ]
  105542. }, {
  105543. "url" : "https://support.f5.com/kb/en-us/solutions/public/15000/900/sol15939.html",
  105544. "name" : "https://support.f5.com/kb/en-us/solutions/public/15000/900/sol15939.html",
  105545. "refsource" : "CONFIRM",
  105546. "tags" : [ ]
  105547. }, {
  105548. "url" : "http://secunia.com/advisories/62000",
  105549. "name" : "62000",
  105550. "refsource" : "SECUNIA",
  105551. "tags" : [ ]
  105552. } ]
  105553. },
  105554. "description" : {
  105555. "description_data" : [ {
  105556. "lang" : "en",
  105557. "value" : "Cross-site scripting (XSS) vulnerability in the tree view (pl_tree.php) feature in Application Security Manager (ASM) in F5 BIG-IP 11.3.0 allows remote attackers to inject arbitrary web script or HTML by accessing a crafted URL during automatic policy generation."
  105558. } ]
  105559. }
  105560. },
  105561. "configurations" : {
  105562. "CVE_data_version" : "4.0",
  105563. "nodes" : [ {
  105564. "operator" : "OR",
  105565. "children" : [ ],
  105566. "cpe_match" : [ {
  105567. "vulnerable" : true,
  105568. "cpe23Uri" : "cpe:2.3:a:f5:big-ip:11.3.0:*:*:*:*:*:*:*",
  105569. "cpe_name" : [ ]
  105570. } ]
  105571. } ]
  105572. },
  105573. "impact" : {
  105574. "baseMetricV2" : {
  105575. "cvssV2" : {
  105576. "version" : "2.0",
  105577. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  105578. "accessVector" : "NETWORK",
  105579. "accessComplexity" : "MEDIUM",
  105580. "authentication" : "NONE",
  105581. "confidentialityImpact" : "NONE",
  105582. "integrityImpact" : "PARTIAL",
  105583. "availabilityImpact" : "NONE",
  105584. "baseScore" : 4.3
  105585. },
  105586. "severity" : "MEDIUM",
  105587. "exploitabilityScore" : 8.6,
  105588. "impactScore" : 2.9,
  105589. "obtainAllPrivilege" : false,
  105590. "obtainUserPrivilege" : false,
  105591. "obtainOtherPrivilege" : false,
  105592. "userInteractionRequired" : true
  105593. }
  105594. },
  105595. "publishedDate" : "2014-12-08T11:59Z",
  105596. "lastModifiedDate" : "2021-05-03T11:15Z"
  105597. }, {
  105598. "cve" : {
  105599. "data_type" : "CVE",
  105600. "data_format" : "MITRE",
  105601. "data_version" : "4.0",
  105602. "CVE_data_meta" : {
  105603. "ID" : "CVE-2014-2957",
  105604. "ASSIGNER" : "cert@cert.org"
  105605. },
  105606. "problemtype" : {
  105607. "problemtype_data" : [ {
  105608. "description" : [ {
  105609. "lang" : "en",
  105610. "value" : "CWE-20"
  105611. } ]
  105612. } ]
  105613. },
  105614. "references" : {
  105615. "reference_data" : [ {
  105616. "url" : "https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html",
  105617. "name" : "[exim-announce] 20140528 [exim] Exim 4.82.1 Security Release",
  105618. "refsource" : "MLIST",
  105619. "tags" : [ "Patch", "Vendor Advisory" ]
  105620. }, {
  105621. "url" : "http://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0",
  105622. "name" : "http://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0",
  105623. "refsource" : "CONFIRM",
  105624. "tags" : [ ]
  105625. }, {
  105626. "url" : "http://www.openwall.com/lists/oss-security/2021/05/04/7",
  105627. "name" : "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
  105628. "refsource" : "MLIST",
  105629. "tags" : [ ]
  105630. } ]
  105631. },
  105632. "description" : {
  105633. "description_data" : [ {
  105634. "lang" : "en",
  105635. "value" : "The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function."
  105636. } ]
  105637. }
  105638. },
  105639. "configurations" : {
  105640. "CVE_data_version" : "4.0",
  105641. "nodes" : [ {
  105642. "operator" : "OR",
  105643. "children" : [ ],
  105644. "cpe_match" : [ {
  105645. "vulnerable" : true,
  105646. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.77:*:*:*:*:*:*:*",
  105647. "cpe_name" : [ ]
  105648. }, {
  105649. "vulnerable" : true,
  105650. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.76:*:*:*:*:*:*:*",
  105651. "cpe_name" : [ ]
  105652. }, {
  105653. "vulnerable" : true,
  105654. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*",
  105655. "cpe_name" : [ ]
  105656. }, {
  105657. "vulnerable" : true,
  105658. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*",
  105659. "cpe_name" : [ ]
  105660. }, {
  105661. "vulnerable" : true,
  105662. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*",
  105663. "cpe_name" : [ ]
  105664. }, {
  105665. "vulnerable" : true,
  105666. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*",
  105667. "cpe_name" : [ ]
  105668. }, {
  105669. "vulnerable" : true,
  105670. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*",
  105671. "cpe_name" : [ ]
  105672. }, {
  105673. "vulnerable" : true,
  105674. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*",
  105675. "cpe_name" : [ ]
  105676. }, {
  105677. "vulnerable" : true,
  105678. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*",
  105679. "cpe_name" : [ ]
  105680. }, {
  105681. "vulnerable" : true,
  105682. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*",
  105683. "cpe_name" : [ ]
  105684. }, {
  105685. "vulnerable" : true,
  105686. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*",
  105687. "cpe_name" : [ ]
  105688. }, {
  105689. "vulnerable" : true,
  105690. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*",
  105691. "cpe_name" : [ ]
  105692. }, {
  105693. "vulnerable" : true,
  105694. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*",
  105695. "cpe_name" : [ ]
  105696. }, {
  105697. "vulnerable" : true,
  105698. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.80.1:*:*:*:*:*:*:*",
  105699. "cpe_name" : [ ]
  105700. }, {
  105701. "vulnerable" : true,
  105702. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*",
  105703. "cpe_name" : [ ]
  105704. }, {
  105705. "vulnerable" : true,
  105706. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*",
  105707. "cpe_name" : [ ]
  105708. }, {
  105709. "vulnerable" : true,
  105710. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*",
  105711. "cpe_name" : [ ]
  105712. }, {
  105713. "vulnerable" : true,
  105714. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*",
  105715. "cpe_name" : [ ]
  105716. }, {
  105717. "vulnerable" : true,
  105718. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*",
  105719. "cpe_name" : [ ]
  105720. }, {
  105721. "vulnerable" : true,
  105722. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*",
  105723. "cpe_name" : [ ]
  105724. }, {
  105725. "vulnerable" : true,
  105726. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*",
  105727. "cpe_name" : [ ]
  105728. }, {
  105729. "vulnerable" : true,
  105730. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*",
  105731. "cpe_name" : [ ]
  105732. }, {
  105733. "vulnerable" : true,
  105734. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*",
  105735. "cpe_name" : [ ]
  105736. }, {
  105737. "vulnerable" : true,
  105738. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*",
  105739. "cpe_name" : [ ]
  105740. }, {
  105741. "vulnerable" : true,
  105742. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*",
  105743. "cpe_name" : [ ]
  105744. }, {
  105745. "vulnerable" : true,
  105746. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*",
  105747. "cpe_name" : [ ]
  105748. }, {
  105749. "vulnerable" : true,
  105750. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*",
  105751. "cpe_name" : [ ]
  105752. }, {
  105753. "vulnerable" : true,
  105754. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*",
  105755. "cpe_name" : [ ]
  105756. }, {
  105757. "vulnerable" : true,
  105758. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*",
  105759. "cpe_name" : [ ]
  105760. }, {
  105761. "vulnerable" : true,
  105762. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*",
  105763. "cpe_name" : [ ]
  105764. }, {
  105765. "vulnerable" : true,
  105766. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*",
  105767. "cpe_name" : [ ]
  105768. }, {
  105769. "vulnerable" : true,
  105770. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*",
  105771. "cpe_name" : [ ]
  105772. }, {
  105773. "vulnerable" : true,
  105774. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*",
  105775. "cpe_name" : [ ]
  105776. }, {
  105777. "vulnerable" : true,
  105778. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*",
  105779. "cpe_name" : [ ]
  105780. }, {
  105781. "vulnerable" : true,
  105782. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*",
  105783. "cpe_name" : [ ]
  105784. }, {
  105785. "vulnerable" : true,
  105786. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*",
  105787. "cpe_name" : [ ]
  105788. }, {
  105789. "vulnerable" : true,
  105790. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*",
  105791. "cpe_name" : [ ]
  105792. }, {
  105793. "vulnerable" : true,
  105794. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*",
  105795. "cpe_name" : [ ]
  105796. }, {
  105797. "vulnerable" : true,
  105798. "cpe23Uri" : "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*",
  105799. "versionEndIncluding" : "4.82",
  105800. "cpe_name" : [ ]
  105801. }, {
  105802. "vulnerable" : true,
  105803. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.80:*:*:*:*:*:*:*",
  105804. "cpe_name" : [ ]
  105805. }, {
  105806. "vulnerable" : true,
  105807. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*",
  105808. "cpe_name" : [ ]
  105809. }, {
  105810. "vulnerable" : true,
  105811. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*",
  105812. "cpe_name" : [ ]
  105813. }, {
  105814. "vulnerable" : true,
  105815. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*",
  105816. "cpe_name" : [ ]
  105817. }, {
  105818. "vulnerable" : true,
  105819. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*",
  105820. "cpe_name" : [ ]
  105821. }, {
  105822. "vulnerable" : true,
  105823. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*",
  105824. "cpe_name" : [ ]
  105825. }, {
  105826. "vulnerable" : true,
  105827. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*",
  105828. "cpe_name" : [ ]
  105829. }, {
  105830. "vulnerable" : true,
  105831. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*",
  105832. "cpe_name" : [ ]
  105833. }, {
  105834. "vulnerable" : true,
  105835. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*",
  105836. "cpe_name" : [ ]
  105837. }, {
  105838. "vulnerable" : true,
  105839. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*",
  105840. "cpe_name" : [ ]
  105841. }, {
  105842. "vulnerable" : true,
  105843. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*",
  105844. "cpe_name" : [ ]
  105845. }, {
  105846. "vulnerable" : true,
  105847. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*",
  105848. "cpe_name" : [ ]
  105849. } ]
  105850. } ]
  105851. },
  105852. "impact" : {
  105853. "baseMetricV2" : {
  105854. "cvssV2" : {
  105855. "version" : "2.0",
  105856. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
  105857. "accessVector" : "NETWORK",
  105858. "accessComplexity" : "MEDIUM",
  105859. "authentication" : "NONE",
  105860. "confidentialityImpact" : "PARTIAL",
  105861. "integrityImpact" : "PARTIAL",
  105862. "availabilityImpact" : "PARTIAL",
  105863. "baseScore" : 6.8
  105864. },
  105865. "severity" : "MEDIUM",
  105866. "exploitabilityScore" : 8.6,
  105867. "impactScore" : 6.4,
  105868. "obtainAllPrivilege" : false,
  105869. "obtainUserPrivilege" : false,
  105870. "obtainOtherPrivilege" : false,
  105871. "userInteractionRequired" : false
  105872. }
  105873. },
  105874. "publishedDate" : "2014-09-04T17:55Z",
  105875. "lastModifiedDate" : "2021-05-04T18:15Z"
  105876. }, {
  105877. "cve" : {
  105878. "data_type" : "CVE",
  105879. "data_format" : "MITRE",
  105880. "data_version" : "4.0",
  105881. "CVE_data_meta" : {
  105882. "ID" : "CVE-2013-4492",
  105883. "ASSIGNER" : "secalert@redhat.com"
  105884. },
  105885. "problemtype" : {
  105886. "problemtype_data" : [ {
  105887. "description" : [ {
  105888. "lang" : "en",
  105889. "value" : "CWE-79"
  105890. } ]
  105891. } ]
  105892. },
  105893. "references" : {
  105894. "reference_data" : [ {
  105895. "url" : "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/",
  105896. "name" : "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/",
  105897. "refsource" : "CONFIRM",
  105898. "tags" : [ "Patch", "Vendor Advisory" ]
  105899. }, {
  105900. "url" : "https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445",
  105901. "name" : "https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445",
  105902. "refsource" : "CONFIRM",
  105903. "tags" : [ ]
  105904. }, {
  105905. "url" : "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ",
  105906. "name" : "[ruby-security-ann] 20131203 [CVE-2013-4491] Reflective XSS Vulnerability in Ruby on Rails",
  105907. "refsource" : "MLIST",
  105908. "tags" : [ ]
  105909. }, {
  105910. "url" : "http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html",
  105911. "name" : "openSUSE-SU-2013:1930",
  105912. "refsource" : "SUSE",
  105913. "tags" : [ ]
  105914. }, {
  105915. "url" : "http://www.debian.org/security/2013/dsa-2830",
  105916. "name" : "DSA-2830",
  105917. "refsource" : "DEBIAN",
  105918. "tags" : [ ]
  105919. }, {
  105920. "url" : "http://www.securityfocus.com/bid/64076",
  105921. "name" : "64076",
  105922. "refsource" : "BID",
  105923. "tags" : [ ]
  105924. } ]
  105925. },
  105926. "description" : {
  105927. "description_data" : [ {
  105928. "lang" : "en",
  105929. "value" : "Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call."
  105930. } ]
  105931. }
  105932. },
  105933. "configurations" : {
  105934. "CVE_data_version" : "4.0",
  105935. "nodes" : [ {
  105936. "operator" : "OR",
  105937. "children" : [ ],
  105938. "cpe_match" : [ {
  105939. "vulnerable" : true,
  105940. "cpe23Uri" : "cpe:2.3:a:i18n_project:i18n:*:*:*:*:*:ruby:*:*",
  105941. "versionEndIncluding" : "0.6.5",
  105942. "cpe_name" : [ ]
  105943. } ]
  105944. } ]
  105945. },
  105946. "impact" : {
  105947. "baseMetricV2" : {
  105948. "cvssV2" : {
  105949. "version" : "2.0",
  105950. "vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
  105951. "accessVector" : "NETWORK",
  105952. "accessComplexity" : "MEDIUM",
  105953. "authentication" : "NONE",
  105954. "confidentialityImpact" : "NONE",
  105955. "integrityImpact" : "PARTIAL",
  105956. "availabilityImpact" : "NONE",
  105957. "baseScore" : 4.3
  105958. },
  105959. "severity" : "MEDIUM",
  105960. "exploitabilityScore" : 8.6,
  105961. "impactScore" : 2.9,
  105962. "obtainAllPrivilege" : false,
  105963. "obtainUserPrivilege" : false,
  105964. "obtainOtherPrivilege" : false,
  105965. "userInteractionRequired" : true
  105966. }
  105967. },
  105968. "publishedDate" : "2013-12-07T00:55Z",
  105969. "lastModifiedDate" : "2021-05-04T09:08Z"
  105970. }, {
  105971. "cve" : {
  105972. "data_type" : "CVE",
  105973. "data_format" : "MITRE",
  105974. "data_version" : "4.0",
  105975. "CVE_data_meta" : {
  105976. "ID" : "CVE-2012-5781",
  105977. "ASSIGNER" : "cve@mitre.org"
  105978. },
  105979. "problemtype" : {
  105980. "problemtype_data" : [ {
  105981. "description" : [ {
  105982. "lang" : "en",
  105983. "value" : "CWE-20"
  105984. } ]
  105985. } ]
  105986. },
  105987. "references" : {
  105988. "reference_data" : [ {
  105989. "url" : "http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf",
  105990. "name" : "http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf",
  105991. "refsource" : "MISC",
  105992. "tags" : [ "Exploit" ]
  105993. } ]
  105994. },
  105995. "description" : {
  105996. "description_data" : [ {
  105997. "lang" : "en",
  105998. "value" : "Amazon Elastic Load Balancing API Tools does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to overriding the default JDK X509TrustManager."
  105999. } ]
  106000. }
  106001. },
  106002. "configurations" : {
  106003. "CVE_data_version" : "4.0",
  106004. "nodes" : [ {
  106005. "operator" : "OR",
  106006. "children" : [ ],
  106007. "cpe_match" : [ {
  106008. "vulnerable" : true,
  106009. "cpe23Uri" : "cpe:2.3:a:amazon:elastic_load_balancing:1.0.12.0:*:*:*:*:*:*:*",
  106010. "cpe_name" : [ ]
  106011. }, {
  106012. "vulnerable" : true,
  106013. "cpe23Uri" : "cpe:2.3:a:amazon:elastic_load_balancing:1.0.10.0:*:*:*:*:*:*:*",
  106014. "cpe_name" : [ ]
  106015. }, {
  106016. "vulnerable" : true,
  106017. "cpe23Uri" : "cpe:2.3:a:amazon:elastic_load_balancing:1.0.3.4:*:*:*:*:*:*:*",
  106018. "cpe_name" : [ ]
  106019. }, {
  106020. "vulnerable" : true,
  106021. "cpe23Uri" : "cpe:2.3:a:amazon:elastic_load_balancing:1.0:1:*:*:*:*:*:*",
  106022. "cpe_name" : [ ]
  106023. }, {
  106024. "vulnerable" : true,
  106025. "cpe23Uri" : "cpe:2.3:a:amazon:elastic_load_balancing:1.0:*:*:*:*:*:*:*",
  106026. "cpe_name" : [ ]
  106027. }, {
  106028. "vulnerable" : true,
  106029. "cpe23Uri" : "cpe:2.3:a:amazon:elastic_load_balancing:-:*:*:*:*:*:*:*",
  106030. "cpe_name" : [ ]
  106031. }, {
  106032. "vulnerable" : true,
  106033. "cpe23Uri" : "cpe:2.3:a:amazon:elastic_load_balancing:1.0.17.0:*:*:*:*:*:*:*",
  106034. "cpe_name" : [ ]
  106035. }, {
  106036. "vulnerable" : true,
  106037. "cpe23Uri" : "cpe:2.3:a:amazon:elastic_load_balancing:1.0.15.1:*:*:*:*:*:*:*",
  106038. "cpe_name" : [ ]
  106039. }, {
  106040. "vulnerable" : true,
  106041. "cpe23Uri" : "cpe:2.3:a:amazon:elastic_load_balancing:1.0.14.3:*:*:*:*:*:*:*",
  106042. "cpe_name" : [ ]
  106043. }, {
  106044. "vulnerable" : true,
  106045. "cpe23Uri" : "cpe:2.3:a:amazon:elastic_load_balancing:1.0.11.1:*:*:*:*:*:*:*",
  106046. "cpe_name" : [ ]
  106047. }, {
  106048. "vulnerable" : true,
  106049. "cpe23Uri" : "cpe:2.3:a:amazon:elastic_load_balancing:1.0.9.3:*:*:*:*:*:*:*",
  106050. "cpe_name" : [ ]
  106051. } ]
  106052. } ]
  106053. },
  106054. "impact" : {
  106055. "baseMetricV2" : {
  106056. "cvssV2" : {
  106057. "version" : "2.0",
  106058. "vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:N",
  106059. "accessVector" : "NETWORK",
  106060. "accessComplexity" : "MEDIUM",
  106061. "authentication" : "NONE",
  106062. "confidentialityImpact" : "PARTIAL",
  106063. "integrityImpact" : "PARTIAL",
  106064. "availabilityImpact" : "NONE",
  106065. "baseScore" : 5.8
  106066. },
  106067. "severity" : "MEDIUM",
  106068. "exploitabilityScore" : 8.6,
  106069. "impactScore" : 4.9,
  106070. "obtainAllPrivilege" : false,
  106071. "obtainUserPrivilege" : false,
  106072. "obtainOtherPrivilege" : false,
  106073. "userInteractionRequired" : false
  106074. }
  106075. },
  106076. "publishedDate" : "2012-11-04T22:55Z",
  106077. "lastModifiedDate" : "2012-11-06T05:00Z"
  106078. }, {
  106079. "cve" : {
  106080. "data_type" : "CVE",
  106081. "data_format" : "MITRE",
  106082. "data_version" : "4.0",
  106083. "CVE_data_meta" : {
  106084. "ID" : "CVE-2010-4345",
  106085. "ASSIGNER" : "secalert@redhat.com"
  106086. },
  106087. "problemtype" : {
  106088. "problemtype_data" : [ {
  106089. "description" : [ {
  106090. "lang" : "en",
  106091. "value" : "CWE-264"
  106092. } ]
  106093. } ]
  106094. },
  106095. "references" : {
  106096. "reference_data" : [ {
  106097. "url" : "http://openwall.com/lists/oss-security/2010/12/10/1",
  106098. "name" : "[oss-security] 20101210 Exim remote root",
  106099. "refsource" : "MLIST",
  106100. "tags" : [ ]
  106101. }, {
  106102. "url" : "http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html",
  106103. "name" : "[exim-dev] 20101209 Re: [Exim-maintainers] Remote root vulnerability in Exim",
  106104. "refsource" : "MLIST",
  106105. "tags" : [ "Patch" ]
  106106. }, {
  106107. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=662012",
  106108. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=662012",
  106109. "refsource" : "CONFIRM",
  106110. "tags" : [ "Patch" ]
  106111. }, {
  106112. "url" : "http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html",
  106113. "name" : "[exim-dev] 20101207 Remote root vulnerability in Exim",
  106114. "refsource" : "MLIST",
  106115. "tags" : [ "Vendor Advisory" ]
  106116. }, {
  106117. "url" : "http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/",
  106118. "name" : "http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/",
  106119. "refsource" : "MISC",
  106120. "tags" : [ ]
  106121. }, {
  106122. "url" : "http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html",
  106123. "name" : "[exim-dev] 20101210 Re: Remote root vulnerability in Exim",
  106124. "refsource" : "MLIST",
  106125. "tags" : [ ]
  106126. }, {
  106127. "url" : "http://bugs.exim.org/show_bug.cgi?id=1044",
  106128. "name" : "http://bugs.exim.org/show_bug.cgi?id=1044",
  106129. "refsource" : "CONFIRM",
  106130. "tags" : [ "Patch" ]
  106131. }, {
  106132. "url" : "http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format",
  106133. "name" : "http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format",
  106134. "refsource" : "MISC",
  106135. "tags" : [ ]
  106136. }, {
  106137. "url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html",
  106138. "name" : "SUSE-SA:2010:059",
  106139. "refsource" : "SUSE",
  106140. "tags" : [ ]
  106141. }, {
  106142. "url" : "http://www.vupen.com/english/advisories/2010/3204",
  106143. "name" : "ADV-2010-3204",
  106144. "refsource" : "VUPEN",
  106145. "tags" : [ "Vendor Advisory" ]
  106146. }, {
  106147. "url" : "http://www.kb.cert.org/vuls/id/758489",
  106148. "name" : "VU#758489",
  106149. "refsource" : "CERT-VN",
  106150. "tags" : [ "US Government Resource" ]
  106151. }, {
  106152. "url" : "http://www.vupen.com/english/advisories/2010/3171",
  106153. "name" : "ADV-2010-3171",
  106154. "refsource" : "VUPEN",
  106155. "tags" : [ "Vendor Advisory" ]
  106156. }, {
  106157. "url" : "http://www.debian.org/security/2010/dsa-2131",
  106158. "name" : "DSA-2131",
  106159. "refsource" : "DEBIAN",
  106160. "tags" : [ ]
  106161. }, {
  106162. "url" : "http://secunia.com/advisories/42576",
  106163. "name" : "42576",
  106164. "refsource" : "SECUNIA",
  106165. "tags" : [ "Vendor Advisory" ]
  106166. }, {
  106167. "url" : "http://www.cpanel.net/2010/12/critical-exim-security-update.html",
  106168. "name" : "http://www.cpanel.net/2010/12/critical-exim-security-update.html",
  106169. "refsource" : "CONFIRM",
  106170. "tags" : [ ]
  106171. }, {
  106172. "url" : "http://www.securityfocus.com/bid/45341",
  106173. "name" : "45341",
  106174. "refsource" : "BID",
  106175. "tags" : [ ]
  106176. }, {
  106177. "url" : "http://www.securitytracker.com/id?1024859",
  106178. "name" : "1024859",
  106179. "refsource" : "SECTRACK",
  106180. "tags" : [ ]
  106181. }, {
  106182. "url" : "http://www.vupen.com/english/advisories/2011/0135",
  106183. "name" : "ADV-2011-0135",
  106184. "refsource" : "VUPEN",
  106185. "tags" : [ ]
  106186. }, {
  106187. "url" : "http://secunia.com/advisories/42930",
  106188. "name" : "42930",
  106189. "refsource" : "SECUNIA",
  106190. "tags" : [ ]
  106191. }, {
  106192. "url" : "http://www.redhat.com/support/errata/RHSA-2011-0153.html",
  106193. "name" : "RHSA-2011:0153",
  106194. "refsource" : "REDHAT",
  106195. "tags" : [ ]
  106196. }, {
  106197. "url" : "http://www.vupen.com/english/advisories/2011/0245",
  106198. "name" : "ADV-2011-0245",
  106199. "refsource" : "VUPEN",
  106200. "tags" : [ ]
  106201. }, {
  106202. "url" : "http://secunia.com/advisories/43128",
  106203. "name" : "43128",
  106204. "refsource" : "SECUNIA",
  106205. "tags" : [ ]
  106206. }, {
  106207. "url" : "http://www.debian.org/security/2011/dsa-2154",
  106208. "name" : "DSA-2154",
  106209. "refsource" : "DEBIAN",
  106210. "tags" : [ ]
  106211. }, {
  106212. "url" : "http://www.ubuntu.com/usn/USN-1060-1",
  106213. "name" : "USN-1060-1",
  106214. "refsource" : "UBUNTU",
  106215. "tags" : [ ]
  106216. }, {
  106217. "url" : "http://secunia.com/advisories/43243",
  106218. "name" : "43243",
  106219. "refsource" : "SECUNIA",
  106220. "tags" : [ ]
  106221. }, {
  106222. "url" : "http://www.vupen.com/english/advisories/2011/0364",
  106223. "name" : "ADV-2011-0364",
  106224. "refsource" : "VUPEN",
  106225. "tags" : [ ]
  106226. }, {
  106227. "url" : "http://www.securityfocus.com/archive/1/515172/100/0/threaded",
  106228. "name" : "20101213 Exim security issue in historical release",
  106229. "refsource" : "BUGTRAQ",
  106230. "tags" : [ ]
  106231. }, {
  106232. "url" : "http://www.openwall.com/lists/oss-security/2021/05/04/7",
  106233. "name" : "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
  106234. "refsource" : "MLIST",
  106235. "tags" : [ ]
  106236. } ]
  106237. },
  106238. "description" : {
  106239. "description_data" : [ {
  106240. "lang" : "en",
  106241. "value" : "Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive."
  106242. } ]
  106243. }
  106244. },
  106245. "configurations" : {
  106246. "CVE_data_version" : "4.0",
  106247. "nodes" : [ {
  106248. "operator" : "OR",
  106249. "children" : [ ],
  106250. "cpe_match" : [ {
  106251. "vulnerable" : true,
  106252. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*",
  106253. "cpe_name" : [ ]
  106254. }, {
  106255. "vulnerable" : true,
  106256. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*",
  106257. "cpe_name" : [ ]
  106258. }, {
  106259. "vulnerable" : true,
  106260. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*",
  106261. "cpe_name" : [ ]
  106262. }, {
  106263. "vulnerable" : true,
  106264. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*",
  106265. "cpe_name" : [ ]
  106266. }, {
  106267. "vulnerable" : true,
  106268. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*",
  106269. "cpe_name" : [ ]
  106270. }, {
  106271. "vulnerable" : true,
  106272. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*",
  106273. "cpe_name" : [ ]
  106274. }, {
  106275. "vulnerable" : true,
  106276. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*",
  106277. "cpe_name" : [ ]
  106278. }, {
  106279. "vulnerable" : true,
  106280. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*",
  106281. "cpe_name" : [ ]
  106282. }, {
  106283. "vulnerable" : true,
  106284. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*",
  106285. "cpe_name" : [ ]
  106286. }, {
  106287. "vulnerable" : true,
  106288. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*",
  106289. "cpe_name" : [ ]
  106290. }, {
  106291. "vulnerable" : true,
  106292. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*",
  106293. "cpe_name" : [ ]
  106294. }, {
  106295. "vulnerable" : true,
  106296. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*",
  106297. "cpe_name" : [ ]
  106298. }, {
  106299. "vulnerable" : true,
  106300. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*",
  106301. "cpe_name" : [ ]
  106302. }, {
  106303. "vulnerable" : true,
  106304. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*",
  106305. "cpe_name" : [ ]
  106306. }, {
  106307. "vulnerable" : true,
  106308. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*",
  106309. "cpe_name" : [ ]
  106310. }, {
  106311. "vulnerable" : true,
  106312. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*",
  106313. "cpe_name" : [ ]
  106314. }, {
  106315. "vulnerable" : true,
  106316. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*",
  106317. "cpe_name" : [ ]
  106318. }, {
  106319. "vulnerable" : true,
  106320. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*",
  106321. "cpe_name" : [ ]
  106322. }, {
  106323. "vulnerable" : true,
  106324. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*",
  106325. "cpe_name" : [ ]
  106326. }, {
  106327. "vulnerable" : true,
  106328. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*",
  106329. "cpe_name" : [ ]
  106330. }, {
  106331. "vulnerable" : true,
  106332. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*",
  106333. "cpe_name" : [ ]
  106334. }, {
  106335. "vulnerable" : true,
  106336. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*",
  106337. "cpe_name" : [ ]
  106338. }, {
  106339. "vulnerable" : true,
  106340. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*",
  106341. "cpe_name" : [ ]
  106342. }, {
  106343. "vulnerable" : true,
  106344. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*",
  106345. "cpe_name" : [ ]
  106346. }, {
  106347. "vulnerable" : true,
  106348. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*",
  106349. "cpe_name" : [ ]
  106350. }, {
  106351. "vulnerable" : true,
  106352. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*",
  106353. "cpe_name" : [ ]
  106354. }, {
  106355. "vulnerable" : true,
  106356. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*",
  106357. "cpe_name" : [ ]
  106358. }, {
  106359. "vulnerable" : true,
  106360. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*",
  106361. "cpe_name" : [ ]
  106362. }, {
  106363. "vulnerable" : true,
  106364. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*",
  106365. "cpe_name" : [ ]
  106366. }, {
  106367. "vulnerable" : true,
  106368. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*",
  106369. "cpe_name" : [ ]
  106370. }, {
  106371. "vulnerable" : true,
  106372. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*",
  106373. "cpe_name" : [ ]
  106374. }, {
  106375. "vulnerable" : true,
  106376. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*",
  106377. "cpe_name" : [ ]
  106378. }, {
  106379. "vulnerable" : true,
  106380. "cpe23Uri" : "cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*",
  106381. "cpe_name" : [ ]
  106382. }, {
  106383. "vulnerable" : true,
  106384. "cpe23Uri" : "cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*",
  106385. "cpe_name" : [ ]
  106386. }, {
  106387. "vulnerable" : true,
  106388. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*",
  106389. "cpe_name" : [ ]
  106390. }, {
  106391. "vulnerable" : true,
  106392. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*",
  106393. "cpe_name" : [ ]
  106394. }, {
  106395. "vulnerable" : true,
  106396. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*",
  106397. "cpe_name" : [ ]
  106398. }, {
  106399. "vulnerable" : true,
  106400. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*",
  106401. "cpe_name" : [ ]
  106402. }, {
  106403. "vulnerable" : true,
  106404. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*",
  106405. "cpe_name" : [ ]
  106406. }, {
  106407. "vulnerable" : true,
  106408. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*",
  106409. "cpe_name" : [ ]
  106410. }, {
  106411. "vulnerable" : true,
  106412. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*",
  106413. "cpe_name" : [ ]
  106414. }, {
  106415. "vulnerable" : true,
  106416. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*",
  106417. "cpe_name" : [ ]
  106418. }, {
  106419. "vulnerable" : true,
  106420. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*",
  106421. "cpe_name" : [ ]
  106422. }, {
  106423. "vulnerable" : true,
  106424. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*",
  106425. "cpe_name" : [ ]
  106426. }, {
  106427. "vulnerable" : true,
  106428. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*",
  106429. "cpe_name" : [ ]
  106430. }, {
  106431. "vulnerable" : true,
  106432. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*",
  106433. "cpe_name" : [ ]
  106434. }, {
  106435. "vulnerable" : true,
  106436. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*",
  106437. "cpe_name" : [ ]
  106438. }, {
  106439. "vulnerable" : true,
  106440. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*",
  106441. "cpe_name" : [ ]
  106442. }, {
  106443. "vulnerable" : true,
  106444. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*",
  106445. "cpe_name" : [ ]
  106446. }, {
  106447. "vulnerable" : true,
  106448. "cpe23Uri" : "cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*",
  106449. "cpe_name" : [ ]
  106450. }, {
  106451. "vulnerable" : true,
  106452. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*",
  106453. "cpe_name" : [ ]
  106454. }, {
  106455. "vulnerable" : true,
  106456. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*",
  106457. "cpe_name" : [ ]
  106458. }, {
  106459. "vulnerable" : true,
  106460. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*",
  106461. "cpe_name" : [ ]
  106462. }, {
  106463. "vulnerable" : true,
  106464. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*",
  106465. "cpe_name" : [ ]
  106466. }, {
  106467. "vulnerable" : true,
  106468. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*",
  106469. "cpe_name" : [ ]
  106470. }, {
  106471. "vulnerable" : true,
  106472. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*",
  106473. "cpe_name" : [ ]
  106474. }, {
  106475. "vulnerable" : true,
  106476. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*",
  106477. "cpe_name" : [ ]
  106478. }, {
  106479. "vulnerable" : true,
  106480. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*",
  106481. "cpe_name" : [ ]
  106482. }, {
  106483. "vulnerable" : true,
  106484. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*",
  106485. "cpe_name" : [ ]
  106486. }, {
  106487. "vulnerable" : true,
  106488. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*",
  106489. "cpe_name" : [ ]
  106490. }, {
  106491. "vulnerable" : true,
  106492. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*",
  106493. "cpe_name" : [ ]
  106494. }, {
  106495. "vulnerable" : true,
  106496. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*",
  106497. "cpe_name" : [ ]
  106498. }, {
  106499. "vulnerable" : true,
  106500. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*",
  106501. "cpe_name" : [ ]
  106502. }, {
  106503. "vulnerable" : true,
  106504. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*",
  106505. "cpe_name" : [ ]
  106506. }, {
  106507. "vulnerable" : true,
  106508. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*",
  106509. "cpe_name" : [ ]
  106510. }, {
  106511. "vulnerable" : true,
  106512. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*",
  106513. "cpe_name" : [ ]
  106514. }, {
  106515. "vulnerable" : true,
  106516. "cpe23Uri" : "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*",
  106517. "versionEndIncluding" : "4.72",
  106518. "cpe_name" : [ ]
  106519. } ]
  106520. } ]
  106521. },
  106522. "impact" : {
  106523. "baseMetricV2" : {
  106524. "cvssV2" : {
  106525. "version" : "2.0",
  106526. "vectorString" : "AV:L/AC:M/Au:N/C:C/I:C/A:C",
  106527. "accessVector" : "LOCAL",
  106528. "accessComplexity" : "MEDIUM",
  106529. "authentication" : "NONE",
  106530. "confidentialityImpact" : "COMPLETE",
  106531. "integrityImpact" : "COMPLETE",
  106532. "availabilityImpact" : "COMPLETE",
  106533. "baseScore" : 6.9
  106534. },
  106535. "severity" : "MEDIUM",
  106536. "exploitabilityScore" : 3.4,
  106537. "impactScore" : 10.0,
  106538. "obtainAllPrivilege" : false,
  106539. "obtainUserPrivilege" : false,
  106540. "obtainOtherPrivilege" : false,
  106541. "userInteractionRequired" : false
  106542. }
  106543. },
  106544. "publishedDate" : "2010-12-14T16:00Z",
  106545. "lastModifiedDate" : "2021-05-04T18:15Z"
  106546. }, {
  106547. "cve" : {
  106548. "data_type" : "CVE",
  106549. "data_format" : "MITRE",
  106550. "data_version" : "4.0",
  106551. "CVE_data_meta" : {
  106552. "ID" : "CVE-2010-4344",
  106553. "ASSIGNER" : "secalert@redhat.com"
  106554. },
  106555. "problemtype" : {
  106556. "problemtype_data" : [ {
  106557. "description" : [ {
  106558. "lang" : "en",
  106559. "value" : "CWE-119"
  106560. } ]
  106561. } ]
  106562. },
  106563. "references" : {
  106564. "reference_data" : [ {
  106565. "url" : "http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html",
  106566. "name" : "[exim-dev] 20101210 Re: Remote root vulnerability in Exim",
  106567. "refsource" : "MLIST",
  106568. "tags" : [ "Patch" ]
  106569. }, {
  106570. "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=661756",
  106571. "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=661756",
  106572. "refsource" : "CONFIRM",
  106573. "tags" : [ "Exploit" ]
  106574. }, {
  106575. "url" : "http://secunia.com/advisories/40019",
  106576. "name" : "40019",
  106577. "refsource" : "SECUNIA",
  106578. "tags" : [ "Vendor Advisory" ]
  106579. }, {
  106580. "url" : "http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html",
  106581. "name" : "[exim-dev] 20101207 Remote root vulnerability in Exim",
  106582. "refsource" : "MLIST",
  106583. "tags" : [ ]
  106584. }, {
  106585. "url" : "http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/",
  106586. "name" : "http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/",
  106587. "refsource" : "MISC",
  106588. "tags" : [ ]
  106589. }, {
  106590. "url" : "http://git.exim.org/exim.git/commit/24c929a27415c7cfc7126c47e4cad39acf3efa6b",
  106591. "name" : "http://git.exim.org/exim.git/commit/24c929a27415c7cfc7126c47e4cad39acf3efa6b",
  106592. "refsource" : "CONFIRM",
  106593. "tags" : [ "Patch" ]
  106594. }, {
  106595. "url" : "http://openwall.com/lists/oss-security/2010/12/10/1",
  106596. "name" : "[oss-security] 20101210 Exim remote root",
  106597. "refsource" : "MLIST",
  106598. "tags" : [ ]
  106599. }, {
  106600. "url" : "http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format",
  106601. "name" : "http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format",
  106602. "refsource" : "MISC",
  106603. "tags" : [ ]
  106604. }, {
  106605. "url" : "ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.70",
  106606. "name" : "ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.70",
  106607. "refsource" : "CONFIRM",
  106608. "tags" : [ ]
  106609. }, {
  106610. "url" : "http://www.osvdb.org/69685",
  106611. "name" : "69685",
  106612. "refsource" : "OSVDB",
  106613. "tags" : [ "Exploit", "Patch" ]
  106614. }, {
  106615. "url" : "http://bugs.exim.org/show_bug.cgi?id=787",
  106616. "name" : "http://bugs.exim.org/show_bug.cgi?id=787",
  106617. "refsource" : "CONFIRM",
  106618. "tags" : [ "Patch" ]
  106619. }, {
  106620. "url" : "http://www.ubuntu.com/usn/USN-1032-1",
  106621. "name" : "USN-1032-1",
  106622. "refsource" : "UBUNTU",
  106623. "tags" : [ ]
  106624. }, {
  106625. "url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html",
  106626. "name" : "SUSE-SA:2010:059",
  106627. "refsource" : "SUSE",
  106628. "tags" : [ ]
  106629. }, {
  106630. "url" : "http://www.debian.org/security/2010/dsa-2131",
  106631. "name" : "DSA-2131",
  106632. "refsource" : "DEBIAN",
  106633. "tags" : [ ]
  106634. }, {
  106635. "url" : "http://secunia.com/advisories/42576",
  106636. "name" : "42576",
  106637. "refsource" : "SECUNIA",
  106638. "tags" : [ "Vendor Advisory" ]
  106639. }, {
  106640. "url" : "http://www.vupen.com/english/advisories/2010/3171",
  106641. "name" : "ADV-2010-3171",
  106642. "refsource" : "VUPEN",
  106643. "tags" : [ "Vendor Advisory" ]
  106644. }, {
  106645. "url" : "http://www.vupen.com/english/advisories/2010/3172",
  106646. "name" : "ADV-2010-3172",
  106647. "refsource" : "VUPEN",
  106648. "tags" : [ "Vendor Advisory" ]
  106649. }, {
  106650. "url" : "http://secunia.com/advisories/42586",
  106651. "name" : "42586",
  106652. "refsource" : "SECUNIA",
  106653. "tags" : [ "Vendor Advisory" ]
  106654. }, {
  106655. "url" : "http://www.vupen.com/english/advisories/2010/3186",
  106656. "name" : "ADV-2010-3186",
  106657. "refsource" : "VUPEN",
  106658. "tags" : [ "Vendor Advisory" ]
  106659. }, {
  106660. "url" : "http://www.vupen.com/english/advisories/2010/3204",
  106661. "name" : "ADV-2010-3204",
  106662. "refsource" : "VUPEN",
  106663. "tags" : [ "Vendor Advisory" ]
  106664. }, {
  106665. "url" : "http://www.redhat.com/support/errata/RHSA-2010-0970.html",
  106666. "name" : "RHSA-2010:0970",
  106667. "refsource" : "REDHAT",
  106668. "tags" : [ ]
  106669. }, {
  106670. "url" : "http://secunia.com/advisories/42587",
  106671. "name" : "42587",
  106672. "refsource" : "SECUNIA",
  106673. "tags" : [ "Vendor Advisory" ]
  106674. }, {
  106675. "url" : "http://secunia.com/advisories/42589",
  106676. "name" : "42589",
  106677. "refsource" : "SECUNIA",
  106678. "tags" : [ "Vendor Advisory" ]
  106679. }, {
  106680. "url" : "http://www.vupen.com/english/advisories/2010/3181",
  106681. "name" : "ADV-2010-3181",
  106682. "refsource" : "VUPEN",
  106683. "tags" : [ "Vendor Advisory" ]
  106684. }, {
  106685. "url" : "http://www.vupen.com/english/advisories/2010/3246",
  106686. "name" : "ADV-2010-3246",
  106687. "refsource" : "VUPEN",
  106688. "tags" : [ "Vendor Advisory" ]
  106689. }, {
  106690. "url" : "http://www.kb.cert.org/vuls/id/682457",
  106691. "name" : "VU#682457",
  106692. "refsource" : "CERT-VN",
  106693. "tags" : [ "US Government Resource" ]
  106694. }, {
  106695. "url" : "http://www.securityfocus.com/bid/45308",
  106696. "name" : "45308",
  106697. "refsource" : "BID",
  106698. "tags" : [ ]
  106699. }, {
  106700. "url" : "http://www.securitytracker.com/id?1024858",
  106701. "name" : "1024858",
  106702. "refsource" : "SECTRACK",
  106703. "tags" : [ ]
  106704. }, {
  106705. "url" : "http://www.cpanel.net/2010/12/exim-remote-memory-corruption-vulnerability-notification-cve-2010-4344.html",
  106706. "name" : "http://www.cpanel.net/2010/12/exim-remote-memory-corruption-vulnerability-notification-cve-2010-4344.html",
  106707. "refsource" : "CONFIRM",
  106708. "tags" : [ ]
  106709. }, {
  106710. "url" : "http://atmail.com/blog/2010/atmail-6204-now-available/",
  106711. "name" : "http://atmail.com/blog/2010/atmail-6204-now-available/",
  106712. "refsource" : "CONFIRM",
  106713. "tags" : [ ]
  106714. }, {
  106715. "url" : "http://www.vupen.com/english/advisories/2010/3317",
  106716. "name" : "ADV-2010-3317",
  106717. "refsource" : "VUPEN",
  106718. "tags" : [ ]
  106719. }, {
  106720. "url" : "http://www.securityfocus.com/archive/1/515172/100/0/threaded",
  106721. "name" : "20101213 Exim security issue in historical release",
  106722. "refsource" : "BUGTRAQ",
  106723. "tags" : [ ]
  106724. }, {
  106725. "url" : "http://www.openwall.com/lists/oss-security/2021/05/04/7",
  106726. "name" : "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
  106727. "refsource" : "MLIST",
  106728. "tags" : [ ]
  106729. } ]
  106730. },
  106731. "description" : {
  106732. "description_data" : [ {
  106733. "lang" : "en",
  106734. "value" : "Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging."
  106735. } ]
  106736. }
  106737. },
  106738. "configurations" : {
  106739. "CVE_data_version" : "4.0",
  106740. "nodes" : [ {
  106741. "operator" : "OR",
  106742. "children" : [ ],
  106743. "cpe_match" : [ {
  106744. "vulnerable" : true,
  106745. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*",
  106746. "cpe_name" : [ ]
  106747. }, {
  106748. "vulnerable" : true,
  106749. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*",
  106750. "cpe_name" : [ ]
  106751. }, {
  106752. "vulnerable" : true,
  106753. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*",
  106754. "cpe_name" : [ ]
  106755. }, {
  106756. "vulnerable" : true,
  106757. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*",
  106758. "cpe_name" : [ ]
  106759. }, {
  106760. "vulnerable" : true,
  106761. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*",
  106762. "cpe_name" : [ ]
  106763. }, {
  106764. "vulnerable" : true,
  106765. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*",
  106766. "cpe_name" : [ ]
  106767. }, {
  106768. "vulnerable" : true,
  106769. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*",
  106770. "cpe_name" : [ ]
  106771. }, {
  106772. "vulnerable" : true,
  106773. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*",
  106774. "cpe_name" : [ ]
  106775. }, {
  106776. "vulnerable" : true,
  106777. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*",
  106778. "cpe_name" : [ ]
  106779. }, {
  106780. "vulnerable" : true,
  106781. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*",
  106782. "cpe_name" : [ ]
  106783. }, {
  106784. "vulnerable" : true,
  106785. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*",
  106786. "cpe_name" : [ ]
  106787. }, {
  106788. "vulnerable" : true,
  106789. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*",
  106790. "cpe_name" : [ ]
  106791. }, {
  106792. "vulnerable" : true,
  106793. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*",
  106794. "cpe_name" : [ ]
  106795. }, {
  106796. "vulnerable" : true,
  106797. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*",
  106798. "cpe_name" : [ ]
  106799. }, {
  106800. "vulnerable" : true,
  106801. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*",
  106802. "cpe_name" : [ ]
  106803. }, {
  106804. "vulnerable" : true,
  106805. "cpe23Uri" : "cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*",
  106806. "cpe_name" : [ ]
  106807. }, {
  106808. "vulnerable" : true,
  106809. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*",
  106810. "cpe_name" : [ ]
  106811. }, {
  106812. "vulnerable" : true,
  106813. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*",
  106814. "cpe_name" : [ ]
  106815. }, {
  106816. "vulnerable" : true,
  106817. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*",
  106818. "cpe_name" : [ ]
  106819. }, {
  106820. "vulnerable" : true,
  106821. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*",
  106822. "cpe_name" : [ ]
  106823. }, {
  106824. "vulnerable" : true,
  106825. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*",
  106826. "cpe_name" : [ ]
  106827. }, {
  106828. "vulnerable" : true,
  106829. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*",
  106830. "cpe_name" : [ ]
  106831. }, {
  106832. "vulnerable" : true,
  106833. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*",
  106834. "cpe_name" : [ ]
  106835. }, {
  106836. "vulnerable" : true,
  106837. "cpe23Uri" : "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*",
  106838. "versionEndIncluding" : "4.69",
  106839. "cpe_name" : [ ]
  106840. }, {
  106841. "vulnerable" : true,
  106842. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*",
  106843. "cpe_name" : [ ]
  106844. }, {
  106845. "vulnerable" : true,
  106846. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*",
  106847. "cpe_name" : [ ]
  106848. }, {
  106849. "vulnerable" : true,
  106850. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*",
  106851. "cpe_name" : [ ]
  106852. }, {
  106853. "vulnerable" : true,
  106854. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*",
  106855. "cpe_name" : [ ]
  106856. }, {
  106857. "vulnerable" : true,
  106858. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*",
  106859. "cpe_name" : [ ]
  106860. }, {
  106861. "vulnerable" : true,
  106862. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*",
  106863. "cpe_name" : [ ]
  106864. }, {
  106865. "vulnerable" : true,
  106866. "cpe23Uri" : "cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*",
  106867. "cpe_name" : [ ]
  106868. }, {
  106869. "vulnerable" : true,
  106870. "cpe23Uri" : "cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*",
  106871. "cpe_name" : [ ]
  106872. }, {
  106873. "vulnerable" : true,
  106874. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*",
  106875. "cpe_name" : [ ]
  106876. }, {
  106877. "vulnerable" : true,
  106878. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*",
  106879. "cpe_name" : [ ]
  106880. }, {
  106881. "vulnerable" : true,
  106882. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*",
  106883. "cpe_name" : [ ]
  106884. }, {
  106885. "vulnerable" : true,
  106886. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*",
  106887. "cpe_name" : [ ]
  106888. }, {
  106889. "vulnerable" : true,
  106890. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*",
  106891. "cpe_name" : [ ]
  106892. }, {
  106893. "vulnerable" : true,
  106894. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*",
  106895. "cpe_name" : [ ]
  106896. }, {
  106897. "vulnerable" : true,
  106898. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*",
  106899. "cpe_name" : [ ]
  106900. }, {
  106901. "vulnerable" : true,
  106902. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*",
  106903. "cpe_name" : [ ]
  106904. }, {
  106905. "vulnerable" : true,
  106906. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*",
  106907. "cpe_name" : [ ]
  106908. }, {
  106909. "vulnerable" : true,
  106910. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*",
  106911. "cpe_name" : [ ]
  106912. }, {
  106913. "vulnerable" : true,
  106914. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*",
  106915. "cpe_name" : [ ]
  106916. }, {
  106917. "vulnerable" : true,
  106918. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*",
  106919. "cpe_name" : [ ]
  106920. }, {
  106921. "vulnerable" : true,
  106922. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*",
  106923. "cpe_name" : [ ]
  106924. }, {
  106925. "vulnerable" : true,
  106926. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*",
  106927. "cpe_name" : [ ]
  106928. }, {
  106929. "vulnerable" : true,
  106930. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*",
  106931. "cpe_name" : [ ]
  106932. }, {
  106933. "vulnerable" : true,
  106934. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*",
  106935. "cpe_name" : [ ]
  106936. }, {
  106937. "vulnerable" : true,
  106938. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*",
  106939. "cpe_name" : [ ]
  106940. }, {
  106941. "vulnerable" : true,
  106942. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*",
  106943. "cpe_name" : [ ]
  106944. }, {
  106945. "vulnerable" : true,
  106946. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*",
  106947. "cpe_name" : [ ]
  106948. }, {
  106949. "vulnerable" : true,
  106950. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*",
  106951. "cpe_name" : [ ]
  106952. }, {
  106953. "vulnerable" : true,
  106954. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*",
  106955. "cpe_name" : [ ]
  106956. }, {
  106957. "vulnerable" : true,
  106958. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*",
  106959. "cpe_name" : [ ]
  106960. }, {
  106961. "vulnerable" : true,
  106962. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*",
  106963. "cpe_name" : [ ]
  106964. }, {
  106965. "vulnerable" : true,
  106966. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*",
  106967. "cpe_name" : [ ]
  106968. }, {
  106969. "vulnerable" : true,
  106970. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*",
  106971. "cpe_name" : [ ]
  106972. }, {
  106973. "vulnerable" : true,
  106974. "cpe23Uri" : "cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*",
  106975. "cpe_name" : [ ]
  106976. }, {
  106977. "vulnerable" : true,
  106978. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*",
  106979. "cpe_name" : [ ]
  106980. }, {
  106981. "vulnerable" : true,
  106982. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*",
  106983. "cpe_name" : [ ]
  106984. }, {
  106985. "vulnerable" : true,
  106986. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*",
  106987. "cpe_name" : [ ]
  106988. }, {
  106989. "vulnerable" : true,
  106990. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*",
  106991. "cpe_name" : [ ]
  106992. }, {
  106993. "vulnerable" : true,
  106994. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*",
  106995. "cpe_name" : [ ]
  106996. }, {
  106997. "vulnerable" : true,
  106998. "cpe23Uri" : "cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*",
  106999. "cpe_name" : [ ]
  107000. } ]
  107001. } ]
  107002. },
  107003. "impact" : {
  107004. "baseMetricV2" : {
  107005. "cvssV2" : {
  107006. "version" : "2.0",
  107007. "vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C",
  107008. "accessVector" : "NETWORK",
  107009. "accessComplexity" : "MEDIUM",
  107010. "authentication" : "NONE",
  107011. "confidentialityImpact" : "COMPLETE",
  107012. "integrityImpact" : "COMPLETE",
  107013. "availabilityImpact" : "COMPLETE",
  107014. "baseScore" : 9.3
  107015. },
  107016. "severity" : "HIGH",
  107017. "exploitabilityScore" : 8.6,
  107018. "impactScore" : 10.0,
  107019. "obtainAllPrivilege" : false,
  107020. "obtainUserPrivilege" : false,
  107021. "obtainOtherPrivilege" : false,
  107022. "userInteractionRequired" : false
  107023. }
  107024. },
  107025. "publishedDate" : "2010-12-14T16:00Z",
  107026. "lastModifiedDate" : "2021-05-04T18:15Z"
  107027. } ]
  107028. }