Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit 23e4ce7

Browse files
committed
"-Synchronized-Data."
1 parent ea212cd commit 23e4ce7

File tree

8 files changed

+227
-15
lines changed

8 files changed

+227
-15
lines changed

2021/22xxx/CVE-2021-22535.json

Lines changed: 47 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,58 @@
44
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2021-22535",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
9+
},
10+
"affects": {
11+
"vendor": {
12+
"vendor_data": [
13+
{
14+
"vendor_name": "n/a",
15+
"product": {
16+
"product_data": [
17+
{
18+
"product_name": "Directory and Resource Administrator (DRA)",
19+
"version": {
20+
"version_data": [
21+
{
22+
"version_value": "All DRA versions prior to 10.1 Patch 1"
23+
}
24+
]
25+
}
26+
}
27+
]
28+
}
29+
}
30+
]
31+
}
32+
},
33+
"problemtype": {
34+
"problemtype_data": [
35+
{
36+
"description": [
37+
{
38+
"lang": "eng",
39+
"value": "unauthorized information security disclosure."
40+
}
41+
]
42+
}
43+
]
44+
},
45+
"references": {
46+
"reference_data": [
47+
{
48+
"refsource": "MISC",
49+
"name": "https://support.microfocus.com/kb/doc.php?id=7025273",
50+
"url": "https://support.microfocus.com/kb/doc.php?id=7025273"
51+
}
52+
]
953
},
1054
"description": {
1155
"description_data": [
1256
{
1357
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
58+
"value": "Unauthorized information security disclosure vulnerability on Micro Focus Directory and Resource Administrator (DRA) product, affecting all DRA versions prior to 10.1 Patch 1. The vulnerability could lead to unauthorized information disclosure."
1559
}
1660
]
1761
}

2021/33xxx/CVE-2021-33904.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
"description_data": [
3535
{
3636
"lang": "eng",
37-
"value": "In Accela Civic Platform through 21.1, the security/hostSignon.do parameter servProvCode is vulnerable to XSS."
37+
"value": "** DISPUTED ** In Accela Civic Platform through 21.1, the security/hostSignon.do parameter servProvCode is vulnerable to XSS. NOTE: The vendor states \"there are configurable security flags and we are unable to reproduce them with the available information.\""
3838
}
3939
]
4040
},

2021/34xxx/CVE-2021-34369.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
"description_data": [
3535
{
3636
"lang": "eng",
37-
"value": "portlets/contact/ref/refContactDetail.do in Accela Civic Platform through 20.1 allows remote attackers to obtain sensitive information via a modified contactSeqNumber value."
37+
"value": "** DISPUTED ** portlets/contact/ref/refContactDetail.do in Accela Civic Platform through 20.1 allows remote attackers to obtain sensitive information via a modified contactSeqNumber value. NOTE: the vendor states \"the information that is being queried is authorized for an authenticated user of that application, so we consider this not applicable.\""
3838
}
3939
]
4040
},

2021/34xxx/CVE-2021-34370.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
"description_data": [
3535
{
3636
"lang": "eng",
37-
"value": "Accela Civic Platform through 20.1 allows ssoAdapter/logoutAction.do successURL XSS."
37+
"value": "** DISPUTED ** Accela Civic Platform through 20.1 allows ssoAdapter/logoutAction.do successURL XSS. NOTE: the vendor states \"there are configurable security flags and we are unable to reproduce them with the available information.\""
3838
}
3939
]
4040
},

2021/34xxx/CVE-2021-34636.json

Lines changed: 94 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,106 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
3+
"AKA": "Wordfence",
4+
"ASSIGNER": "[email protected]",
5+
"DATE_PUBLIC": "2021-09-27T13:41:00.000Z",
66
"ID": "CVE-2021-34636",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"STATE": "PUBLIC",
8+
"TITLE": "Countdown and CountUp, WooCommerce Sales Timer <= 1.5.7 Cross-Site Request Forgery to Stored Cross-Site Scripting"
99
},
10+
"affects": {
11+
"vendor": {
12+
"vendor_data": [
13+
{
14+
"product": {
15+
"product_data": [
16+
{
17+
"product_name": "Countdown and CountUp, WooCommerce Sales Timers",
18+
"version": {
19+
"version_data": [
20+
{
21+
"version_affected": "<=",
22+
"version_name": "1.5.7",
23+
"version_value": "1.5.7"
24+
}
25+
]
26+
}
27+
}
28+
]
29+
},
30+
"vendor_name": "WpDevArt"
31+
}
32+
]
33+
}
34+
},
35+
"credit": [
36+
{
37+
"lang": "eng",
38+
"value": "Xu-Liang Liao"
39+
}
40+
],
41+
"data_format": "MITRE",
42+
"data_type": "CVE",
43+
"data_version": "4.0",
1044
"description": {
1145
"description_data": [
1246
{
1347
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
48+
"value": "The Countdown and CountUp, WooCommerce Sales Timers WordPress plugin is vulnerable to Cross-Site Request Forgery via the save_theme function found in the ~/includes/admin/coundown_theme_page.php file due to a missing nonce check which allows attackers to inject arbitrary web scripts, in versions up to and including 1.5.7."
1549
}
1650
]
51+
},
52+
"generator": {
53+
"engine": "Vulnogram 0.0.9"
54+
},
55+
"impact": {
56+
"cvss": {
57+
"attackComplexity": "LOW",
58+
"attackVector": "NETWORK",
59+
"availabilityImpact": "HIGH",
60+
"baseScore": 8.8,
61+
"baseSeverity": "HIGH",
62+
"confidentialityImpact": "HIGH",
63+
"integrityImpact": "HIGH",
64+
"privilegesRequired": "NONE",
65+
"scope": "UNCHANGED",
66+
"userInteraction": "REQUIRED",
67+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
68+
"version": "3.1"
69+
}
70+
},
71+
"problemtype": {
72+
"problemtype_data": [
73+
{
74+
"description": [
75+
{
76+
"lang": "eng",
77+
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
78+
}
79+
]
80+
}
81+
]
82+
},
83+
"references": {
84+
"reference_data": [
85+
{
86+
"refsource": "MISC",
87+
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34636",
88+
"name": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34636"
89+
},
90+
{
91+
"refsource": "MISC",
92+
"url": "https://plugins.trac.wordpress.org/changeset/2605523/countdown-wpdevart-extended/trunk/includes/admin/coundown_theme_page.php",
93+
"name": "https://plugins.trac.wordpress.org/changeset/2605523/countdown-wpdevart-extended/trunk/includes/admin/coundown_theme_page.php"
94+
}
95+
]
96+
},
97+
"solution": [
98+
{
99+
"lang": "eng",
100+
"value": "Update plugin to version 1.5.8 or newer. "
101+
}
102+
],
103+
"source": {
104+
"discovery": "EXTERNAL"
17105
}
18106
}

2021/38xxx/CVE-2021-38124.json

Lines changed: 47 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,58 @@
44
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2021-38124",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
9+
},
10+
"affects": {
11+
"vendor": {
12+
"vendor_data": [
13+
{
14+
"vendor_name": "n/a",
15+
"product": {
16+
"product_data": [
17+
{
18+
"product_name": "ArcSight Enterprise Security Manager (ESM).",
19+
"version": {
20+
"version_data": [
21+
{
22+
"version_value": "ArcSight ESM versions 7.0.2 through 7.5."
23+
}
24+
]
25+
}
26+
}
27+
]
28+
}
29+
}
30+
]
31+
}
32+
},
33+
"problemtype": {
34+
"problemtype_data": [
35+
{
36+
"description": [
37+
{
38+
"lang": "eng",
39+
"value": "Remote Code Execution."
40+
}
41+
]
42+
}
43+
]
44+
},
45+
"references": {
46+
"reference_data": [
47+
{
48+
"refsource": "MISC",
49+
"name": "https://portal.microfocus.com/s/article/KM000001960",
50+
"url": "https://portal.microfocus.com/s/article/KM000001960"
51+
}
52+
]
953
},
1054
"description": {
1155
"description_data": [
1256
{
1357
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
58+
"value": "Remote Code Execution vulnerability in Micro Focus ArcSight Enterprise Security Manager (ESM) product, affecting versions 7.0.2 through 7.5. The vulnerability could be exploited resulting in remote code execution."
1559
}
1660
]
1761
}

2021/41xxx/CVE-2021-41768.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2021-41768",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "RESERVED"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
15+
}
16+
]
17+
}
18+
}

2021/41xxx/CVE-2021-41769.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"CVE_data_meta": {
6+
"ID": "CVE-2021-41769",
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "RESERVED"
9+
},
10+
"description": {
11+
"description_data": [
12+
{
13+
"lang": "eng",
14+
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
15+
}
16+
]
17+
}
18+
}

0 commit comments

Comments
 (0)