Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit 80be687

Browse files
committed
"-Synchronized-Data."
1 parent ecd6c77 commit 80be687

12 files changed

+948
-48
lines changed

2021/22xxx/CVE-2021-22509.json

Lines changed: 75 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,88 @@
11
{
2+
"data_version": "4.0",
23
"data_type": "CVE",
34
"data_format": "MITRE",
4-
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2021-22509",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
99
},
1010
"description": {
1111
"description_data": [
1212
{
1313
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
14+
"value": "A vulnerability identified in storing and reusing information in Advance Authentication. This issue can lead to leakage of sensitive data to unauthorized user. The issue affects NetIQ Advance Authentication before 6.3.5.1"
15+
}
16+
]
17+
},
18+
"problemtype": {
19+
"problemtype_data": [
20+
{
21+
"description": [
22+
{
23+
"lang": "eng",
24+
"value": "CWE-312 Cleartext Storage of Sensitive Information",
25+
"cweId": "CWE-312"
26+
}
27+
]
28+
}
29+
]
30+
},
31+
"affects": {
32+
"vendor": {
33+
"vendor_data": [
34+
{
35+
"vendor_name": "OpenText",
36+
"product": {
37+
"product_data": [
38+
{
39+
"product_name": "NetIQ Advance Authentication",
40+
"version": {
41+
"version_data": [
42+
{
43+
"version_affected": "<",
44+
"version_name": "6.3.5.1",
45+
"version_value": "<"
46+
}
47+
]
48+
}
49+
}
50+
]
51+
}
52+
}
53+
]
54+
}
55+
},
56+
"references": {
57+
"reference_data": [
58+
{
59+
"url": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html",
60+
"refsource": "MISC",
61+
"name": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html"
62+
}
63+
]
64+
},
65+
"generator": {
66+
"engine": "Vulnogram 0.2.0"
67+
},
68+
"source": {
69+
"discovery": "UNKNOWN"
70+
},
71+
"impact": {
72+
"cvss": [
73+
{
74+
"attackComplexity": "LOW",
75+
"attackVector": "LOCAL",
76+
"availabilityImpact": "LOW",
77+
"baseScore": 8.1,
78+
"baseSeverity": "HIGH",
79+
"confidentialityImpact": "HIGH",
80+
"integrityImpact": "HIGH",
81+
"privilegesRequired": "LOW",
82+
"scope": "CHANGED",
83+
"userInteraction": "REQUIRED",
84+
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L",
85+
"version": "3.1"
1586
}
1687
]
1788
}

2021/22xxx/CVE-2021-22529.json

Lines changed: 75 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,88 @@
11
{
2+
"data_version": "4.0",
23
"data_type": "CVE",
34
"data_format": "MITRE",
4-
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2021-22529",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
99
},
1010
"description": {
1111
"description_data": [
1212
{
1313
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
14+
"value": "A vulnerability identified in NetIQ Advance Authentication that leaks sensitive server information. This issue affects NetIQ Advance Authentication version before 6.3.5.1"
15+
}
16+
]
17+
},
18+
"problemtype": {
19+
"problemtype_data": [
20+
{
21+
"description": [
22+
{
23+
"lang": "eng",
24+
"value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
25+
"cweId": "CWE-200"
26+
}
27+
]
28+
}
29+
]
30+
},
31+
"affects": {
32+
"vendor": {
33+
"vendor_data": [
34+
{
35+
"vendor_name": "OpenText",
36+
"product": {
37+
"product_data": [
38+
{
39+
"product_name": "NetIQ Advance Authentication",
40+
"version": {
41+
"version_data": [
42+
{
43+
"version_affected": "<",
44+
"version_name": "6.3.5.1",
45+
"version_value": "<"
46+
}
47+
]
48+
}
49+
}
50+
]
51+
}
52+
}
53+
]
54+
}
55+
},
56+
"references": {
57+
"reference_data": [
58+
{
59+
"url": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html",
60+
"refsource": "MISC",
61+
"name": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html"
62+
}
63+
]
64+
},
65+
"generator": {
66+
"engine": "Vulnogram 0.2.0"
67+
},
68+
"source": {
69+
"discovery": "UNKNOWN"
70+
},
71+
"impact": {
72+
"cvss": [
73+
{
74+
"attackComplexity": "HIGH",
75+
"attackVector": "LOCAL",
76+
"availabilityImpact": "HIGH",
77+
"baseScore": 6.3,
78+
"baseSeverity": "MEDIUM",
79+
"confidentialityImpact": "HIGH",
80+
"integrityImpact": "HIGH",
81+
"privilegesRequired": "HIGH",
82+
"scope": "UNCHANGED",
83+
"userInteraction": "REQUIRED",
84+
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
85+
"version": "3.1"
1586
}
1687
]
1788
}

2021/22xxx/CVE-2021-22530.json

Lines changed: 75 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,88 @@
11
{
2+
"data_version": "4.0",
23
"data_type": "CVE",
34
"data_format": "MITRE",
4-
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2021-22530",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
99
},
1010
"description": {
1111
"description_data": [
1212
{
1313
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
14+
"value": "A vulnerability identified in NetIQ Advance Authentication that doesn't enforce account lockout when brute force attack is performed on API based login. This issue may lead to user account compromise if successful or may impact server performance. This issue impacts all NetIQ Advance Authentication before 6.3.5.1"
15+
}
16+
]
17+
},
18+
"problemtype": {
19+
"problemtype_data": [
20+
{
21+
"description": [
22+
{
23+
"lang": "eng",
24+
"value": "CWE-667 Improper Locking",
25+
"cweId": "CWE-667"
26+
}
27+
]
28+
}
29+
]
30+
},
31+
"affects": {
32+
"vendor": {
33+
"vendor_data": [
34+
{
35+
"vendor_name": "OpenText",
36+
"product": {
37+
"product_data": [
38+
{
39+
"product_name": "NetIQ Advance Authentication",
40+
"version": {
41+
"version_data": [
42+
{
43+
"version_affected": "<",
44+
"version_name": "6.3.5.1",
45+
"version_value": "<"
46+
}
47+
]
48+
}
49+
}
50+
]
51+
}
52+
}
53+
]
54+
}
55+
},
56+
"references": {
57+
"reference_data": [
58+
{
59+
"url": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html",
60+
"refsource": "MISC",
61+
"name": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html"
62+
}
63+
]
64+
},
65+
"generator": {
66+
"engine": "Vulnogram 0.2.0"
67+
},
68+
"source": {
69+
"discovery": "UNKNOWN"
70+
},
71+
"impact": {
72+
"cvss": [
73+
{
74+
"attackComplexity": "LOW",
75+
"attackVector": "NETWORK",
76+
"availabilityImpact": "LOW",
77+
"baseScore": 8.2,
78+
"baseSeverity": "HIGH",
79+
"confidentialityImpact": "HIGH",
80+
"integrityImpact": "LOW",
81+
"privilegesRequired": "LOW",
82+
"scope": "CHANGED",
83+
"userInteraction": "REQUIRED",
84+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
85+
"version": "3.1"
1586
}
1687
]
1788
}

2021/38xxx/CVE-2021-38120.json

Lines changed: 75 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,88 @@
11
{
2+
"data_version": "4.0",
23
"data_type": "CVE",
34
"data_format": "MITRE",
4-
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2021-38120",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
99
},
1010
"description": {
1111
"description_data": [
1212
{
1313
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
14+
"value": "A vulnerability identified in Advance Authentication that allows bash command Injection in administrative controlled functionality of backup due to improper\nhandling in provided\u00a0command parameters. This issue affects NetIQ Advance Authentication version before 6.3.5.1."
15+
}
16+
]
17+
},
18+
"problemtype": {
19+
"problemtype_data": [
20+
{
21+
"description": [
22+
{
23+
"lang": "eng",
24+
"value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')",
25+
"cweId": "CWE-77"
26+
}
27+
]
28+
}
29+
]
30+
},
31+
"affects": {
32+
"vendor": {
33+
"vendor_data": [
34+
{
35+
"vendor_name": "OpenText",
36+
"product": {
37+
"product_data": [
38+
{
39+
"product_name": "NetIQ Advance Authentication",
40+
"version": {
41+
"version_data": [
42+
{
43+
"version_affected": "<",
44+
"version_name": "6.3.5.1",
45+
"version_value": "<"
46+
}
47+
]
48+
}
49+
}
50+
]
51+
}
52+
}
53+
]
54+
}
55+
},
56+
"references": {
57+
"reference_data": [
58+
{
59+
"url": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html",
60+
"refsource": "MISC",
61+
"name": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html"
62+
}
63+
]
64+
},
65+
"generator": {
66+
"engine": "Vulnogram 0.2.0"
67+
},
68+
"source": {
69+
"discovery": "UNKNOWN"
70+
},
71+
"impact": {
72+
"cvss": [
73+
{
74+
"attackComplexity": "HIGH",
75+
"attackVector": "LOCAL",
76+
"availabilityImpact": "LOW",
77+
"baseScore": 5.1,
78+
"baseSeverity": "MEDIUM",
79+
"confidentialityImpact": "LOW",
80+
"integrityImpact": "HIGH",
81+
"privilegesRequired": "HIGH",
82+
"scope": "UNCHANGED",
83+
"userInteraction": "REQUIRED",
84+
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:L",
85+
"version": "3.1"
1586
}
1687
]
1788
}

0 commit comments

Comments
 (0)