Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit eef77a7

Browse files
committed
"-Synchronized-Data."
1 parent 265d387 commit eef77a7

11 files changed

+955
-135
lines changed

2020/11xxx/CVE-2020-11307.json

Lines changed: 405 additions & 60 deletions
Large diffs are not rendered by default.

2021/1xxx/CVE-2021-1907.json

Lines changed: 305 additions & 59 deletions
Large diffs are not rendered by default.

2021/20xxx/CVE-2021-20596.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,11 @@
5959
"refsource": "MISC",
6060
"name": "https://jvn.jp/vu/JVNVU94348759/index.html",
6161
"url": "https://jvn.jp/vu/JVNVU94348759/index.html"
62+
},
63+
{
64+
"refsource": "MISC",
65+
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-201-01",
66+
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-201-01"
6267
}
6368
]
6469
},

2021/22xxx/CVE-2021-22521.json

Lines changed: 47 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,58 @@
44
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2021-22521",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
9+
},
10+
"affects": {
11+
"vendor": {
12+
"vendor_data": [
13+
{
14+
"vendor_name": "n/a",
15+
"product": {
16+
"product_data": [
17+
{
18+
"product_name": "ZENworks Configuration Management",
19+
"version": {
20+
"version_data": [
21+
{
22+
"version_value": "2020 Update 1 and all prior versions"
23+
}
24+
]
25+
}
26+
}
27+
]
28+
}
29+
}
30+
]
31+
}
32+
},
33+
"problemtype": {
34+
"problemtype_data": [
35+
{
36+
"description": [
37+
{
38+
"lang": "eng",
39+
"value": "Privileged escalation vulnerability."
40+
}
41+
]
42+
}
43+
]
44+
},
45+
"references": {
46+
"reference_data": [
47+
{
48+
"refsource": "MISC",
49+
"name": "https://support.microfocus.com/kb/doc.php?id=7025205",
50+
"url": "https://support.microfocus.com/kb/doc.php?id=7025205"
51+
}
52+
]
953
},
1054
"description": {
1155
"description_data": [
1256
{
1357
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
58+
"value": "A privileged escalation vulnerability has been identified in Micro Focus ZENworks Configuration Management, affecting version 2020 Update 1 and all prior versions. The vulnerability could be exploited to gain unauthorized system privileges."
1559
}
1660
]
1761
}

2021/2xxx/CVE-2021-2341.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,11 @@
8989
"refsource": "CONFIRM",
9090
"name": "https://security.netapp.com/advisory/ntap-20210723-0002/",
9191
"url": "https://security.netapp.com/advisory/ntap-20210723-0002/"
92+
},
93+
{
94+
"refsource": "DEBIAN",
95+
"name": "DSA-4946",
96+
"url": "https://www.debian.org/security/2021/dsa-4946"
9297
}
9398
]
9499
}

2021/2xxx/CVE-2021-2369.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,11 @@
8989
"refsource": "CONFIRM",
9090
"name": "https://security.netapp.com/advisory/ntap-20210723-0002/",
9191
"url": "https://security.netapp.com/advisory/ntap-20210723-0002/"
92+
},
93+
{
94+
"refsource": "DEBIAN",
95+
"name": "DSA-4946",
96+
"url": "https://www.debian.org/security/2021/dsa-4946"
9297
}
9398
]
9499
}

2021/2xxx/CVE-2021-2388.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,11 @@
8585
"refsource": "CONFIRM",
8686
"name": "https://security.netapp.com/advisory/ntap-20210723-0002/",
8787
"url": "https://security.netapp.com/advisory/ntap-20210723-0002/"
88+
},
89+
{
90+
"refsource": "DEBIAN",
91+
"name": "DSA-4946",
92+
"url": "https://www.debian.org/security/2021/dsa-4946"
8893
}
8994
]
9095
}

2021/33xxx/CVE-2021-33032.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
"description_data": [
3535
{
3636
"lang": "eng",
37-
"value": "eQ-3 HomeMatic CCU2 2.57.5 and CCU3 3.57.5 devices allow remote code execution."
37+
"value": "A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request."
3838
}
3939
]
4040
},

2021/33xxx/CVE-2021-33807.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,11 @@
6666
"refsource": "CONFIRM",
6767
"name": "https://support.gespage.com/fr/support/solutions/articles/14000130201-security-advisory-gespage-directory-traversal",
6868
"url": "https://support.gespage.com/fr/support/solutions/articles/14000130201-security-advisory-gespage-directory-traversal"
69+
},
70+
{
71+
"refsource": "MISC",
72+
"name": "https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_gespage_-_cve-2021-33807.pdf",
73+
"url": "https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_gespage_-_cve-2021-33807.pdf"
6974
}
7075
]
7176
}

2021/34xxx/CVE-2021-34629.json

Lines changed: 89 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,101 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
3+
"AKA": "Wordfence",
4+
"ASSIGNER": "[email protected]",
5+
"DATE_PUBLIC": "2021-07-21T15:18:00.000Z",
66
"ID": "CVE-2021-34629",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"STATE": "PUBLIC",
8+
"TITLE": "SendGrid <= 1.11.8 \u2013 Authorization Bypass"
99
},
10+
"affects": {
11+
"vendor": {
12+
"vendor_data": [
13+
{
14+
"product": {
15+
"product_data": [
16+
{
17+
"product_name": "SendGrid",
18+
"version": {
19+
"version_data": [
20+
{
21+
"version_affected": "<=",
22+
"version_name": "1.11.8",
23+
"version_value": "1.11.8"
24+
}
25+
]
26+
}
27+
}
28+
]
29+
},
30+
"vendor_name": "SendGrid"
31+
}
32+
]
33+
}
34+
},
35+
"credit": [
36+
{
37+
"lang": "eng",
38+
"value": "Prashant Baldha"
39+
}
40+
],
41+
"data_format": "MITRE",
42+
"data_type": "CVE",
43+
"data_version": "4.0",
1044
"description": {
1145
"description_data": [
1246
{
1347
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
48+
"value": "The SendGrid WordPress plugin is vulnerable to authorization bypass via the get_ajax_statistics function found in the ~/lib/class-sendgrid-statistics.php file which allows authenticated users to export statistic for a WordPress multi-site main site, in versions up to and including 1.11.8."
49+
}
50+
]
51+
},
52+
"generator": {
53+
"engine": "Vulnogram 0.0.9"
54+
},
55+
"impact": {
56+
"cvss": {
57+
"attackComplexity": "LOW",
58+
"attackVector": "NETWORK",
59+
"availabilityImpact": "NONE",
60+
"baseScore": 4.3,
61+
"baseSeverity": "MEDIUM",
62+
"confidentialityImpact": "LOW",
63+
"integrityImpact": "NONE",
64+
"privilegesRequired": "LOW",
65+
"scope": "UNCHANGED",
66+
"userInteraction": "NONE",
67+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
68+
"version": "3.1"
69+
}
70+
},
71+
"problemtype": {
72+
"problemtype_data": [
73+
{
74+
"description": [
75+
{
76+
"lang": "eng",
77+
"value": "CWE-862 Missing Authorization"
78+
}
79+
]
1580
}
1681
]
82+
},
83+
"references": {
84+
"reference_data": [
85+
{
86+
"refsource": "MISC",
87+
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34629",
88+
"name": "https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34629"
89+
}
90+
]
91+
},
92+
"solution": [
93+
{
94+
"lang": "eng",
95+
"value": "Uninstall the plugin from WordPress site. "
96+
}
97+
],
98+
"source": {
99+
"discovery": "EXTERNAL"
17100
}
18101
}

0 commit comments

Comments
 (0)