Commits 10/20/2021

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Entry

Field

Commit Conf

Approve Conf

IDUserEntryFieldChangeRemarksModeratedReasonC
11720432VulD...184473cve_nvd_summaryThe Easytest contains SQL injection vulnerabilities. After obtaining a user’s privilege, remote attackers can inject SQL commands into the parameters of the elective course management page to obtain all database and administrator permissions.mitre.org10/20/2021accepted
70
11720431VulD...184473cve_nvd_summaryThe Easytest contains SQL injection vulnerabilities. After obtaining a user’s privilege, remote attackers can inject SQL commands into the parameters of the elective course management page to obtain all database and administrator permissions.mitre.org10/20/2021accepted
70
11720430VulD...184472cve_nvd_summaryThe Easytest contains SQL injection vulnerabilities. After obtaining user’s privilege, remote attackers can inject SQL commands into the parameters of the learning history page to access all database and obtain administrator permissions.mitre.org10/20/2021accepted
70
11720429VulD...184472cve_nvd_summaryThe Easytest contains SQL injection vulnerabilities. After obtaining user’s privilege, remote attackers can inject SQL commands into the parameters of the learning history page to access all database and obtain administrator permissions.mitre.org10/20/2021accepted
70
11720428VulD...184471cve_nvd_summaryThe “List View” function of ShinHer StudyOnline System is not under authority control. After logging in with user’s privilege, remote attackers can access the content of other users’ message boards by crafting URL parameters.mitre.org10/20/2021accepted
70
11720427VulD...184471cve_nvd_summaryThe “List View” function of ShinHer StudyOnline System is not under authority control. After logging in with user’s privilege, remote attackers can access the content of other users’ message boards by crafting URL parameters.mitre.org10/20/2021accepted
70
11720426VulD...184470cve_nvd_summaryThe “Study Edit” function of ShinHer StudyOnline System does not perform permission control. After logging in with user’s privilege, remote attackers can access and edit other users’ tutorial schedule by crafting URL parameters.mitre.org10/20/2021accepted
70
11759850VulD...185140price_0day$0-$5ksee exploit price documentation10/20/2021accepted
90
11759849VulD...185140cvss3_meta_tempscore6.3see CVSS documentation10/20/2021accepted
90
11759848VulD...185140cvss3_meta_basescore6.3see CVSS documentation10/20/2021accepted
90
11759847VulD...185140cvss3_vuldb_tempscore6.3see CVSS documentation10/20/2021accepted
90
11759846VulD...185140cvss3_vuldb_basescore6.3see CVSS documentation10/20/2021accepted
90
11759845VulD...185140cvss2_vuldb_tempscore5.8see CVSS documentation10/20/2021accepted
90
11759844VulD...185140cvss2_vuldb_basescore5.8see CVSS documentation10/20/2021accepted
90
11759843VulD...185140cvss3_vuldb_rlXderived from historical data10/20/2021accepted
80
11759842VulD...185140cvss3_vuldb_eXderived from historical data10/20/2021accepted
80
11759841VulD...185140cvss3_vuldb_avAderived from historical data10/20/2021accepted
80
11759840VulD...185140cvss2_vuldb_rlNDderived from historical data10/20/2021accepted
80
11759839VulD...185140cvss2_vuldb_eNDderived from historical data10/20/2021accepted
80
11759838VulD...185140cvss2_vuldb_avAderived from historical data10/20/2021accepted
80
11759837VulD...185140cvss2_vuldb_rcCderived from vuldb v3 vector10/20/2021accepted
80
11759836VulD...185140cvss2_vuldb_aiPderived from vuldb v3 vector10/20/2021accepted
80
11759835VulD...185140cvss2_vuldb_iiPderived from vuldb v3 vector10/20/2021accepted
80
11759834VulD...185140cvss2_vuldb_ciPderived from vuldb v3 vector10/20/2021accepted
80
11759833VulD...185140cvss2_vuldb_auNderived from vuldb v3 vector10/20/2021accepted
80
11759832VulD...185140cvss2_vuldb_acLderived from vuldb v3 vector10/20/2021accepted
80
11759831VulD...185140date1634680800 (10/20/2021)10/20/2021accepted
90
11759830VulD...185140cve_assigned1609714800mitre.org10/20/2021accepted
90
11759829VulD...185140cveCVE-2021-21745mitre.org10/20/2021accepted
90
11759828VulD...185140urlhttps://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1019764support.zte.com.cn10/20/2021accepted
90
11759827VulD...185140cvss3_vuldb_rcCsee CVSS documentation10/20/2021accepted
90
11759826VulD...185140cvss3_vuldb_aLsee CVSS documentation10/20/2021accepted
90
11759825VulD...185140cvss3_vuldb_iLsee CVSS documentation10/20/2021accepted
90
11759824VulD...185140cvss3_vuldb_cLsee CVSS documentation10/20/2021accepted
90
11759823VulD...185140cvss3_vuldb_sUsee CVSS documentation10/20/2021accepted
90
11759822VulD...185140cvss3_vuldb_uiNsee CVSS documentation10/20/2021accepted
90
11759821VulD...185140cvss3_vuldb_prNsee CVSS documentation10/20/2021accepted
90
11759820VulD...185140cvss3_vuldb_acLsee CVSS documentation10/20/2021accepted
90
11759819VulD...185140risk2see risk documentation10/20/2021accepted
90
11759818VulD...185140cwe287 (weak authentication)10/20/2021accepted
90
11759817VulD...185140componentReferer Handler10/20/2021accepted
90
11759816VulD...185140nameMF971R10/20/2021accepted
90
11759815VulD...185140vendorZTE10/20/2021accepted
90
11759814VulD...185139price_0day$0-$5ksee exploit price documentation10/20/2021accepted
90
11759813VulD...185139cvss3_meta_tempscore5.5see CVSS documentation10/20/2021accepted
90
11759812VulD...185139cvss3_meta_basescore5.5see CVSS documentation10/20/2021accepted
90
11759811VulD...185139cvss3_vuldb_tempscore5.5see CVSS documentation10/20/2021accepted
90
11759810VulD...185139cvss3_vuldb_basescore5.5see CVSS documentation10/20/2021accepted
90
11759809VulD...185139cvss2_vuldb_tempscore5.2see CVSS documentation10/20/2021accepted
90
11759808VulD...185139cvss2_vuldb_basescore5.2see CVSS documentation10/20/2021accepted
90
11759807VulD...185139cvss3_vuldb_rlXderived from historical data10/20/2021accepted
80
11759806VulD...185139cvss3_vuldb_eXderived from historical data10/20/2021accepted
80
11759805VulD...185139cvss3_vuldb_prLderived from historical data10/20/2021accepted
80
11759804VulD...185139cvss3_vuldb_avAderived from historical data10/20/2021accepted
80
11759803VulD...185139cvss2_vuldb_rlNDderived from historical data10/20/2021accepted
80
11759802VulD...185139cvss2_vuldb_eNDderived from historical data10/20/2021accepted
80
11759801VulD...185139cvss2_vuldb_auSderived from historical data10/20/2021accepted
80
11759800VulD...185139cvss2_vuldb_avAderived from historical data10/20/2021accepted
80
11759799VulD...185139cvss2_vuldb_rcCderived from vuldb v3 vector10/20/2021accepted
80
11759798VulD...185139cvss2_vuldb_aiPderived from vuldb v3 vector10/20/2021accepted
80
11759797VulD...185139cvss2_vuldb_iiPderived from vuldb v3 vector10/20/2021accepted
80
11759796VulD...185139cvss2_vuldb_ciPderived from vuldb v3 vector10/20/2021accepted
80
11759795VulD...185139cvss2_vuldb_acLderived from vuldb v3 vector10/20/2021accepted
80
11759794VulD...185139date1634680800 (10/20/2021)10/20/2021accepted
90
11759793VulD...185139cve_assigned1609714800mitre.org10/20/2021accepted
90
11759792VulD...185139cveCVE-2021-21749mitre.org10/20/2021accepted
90
11759791VulD...185139urlhttps://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1019764support.zte.com.cn10/20/2021accepted
90
11759790VulD...185139cvss3_vuldb_rcCsee CVSS documentation10/20/2021accepted
90
11759789VulD...185139cvss3_vuldb_aLsee CVSS documentation10/20/2021accepted
90
11759788VulD...185139cvss3_vuldb_iLsee CVSS documentation10/20/2021accepted
90
11759787VulD...185139cvss3_vuldb_cLsee CVSS documentation10/20/2021accepted
90
11759786VulD...185139cvss3_vuldb_sUsee CVSS documentation10/20/2021accepted
90
11759785VulD...185139cvss3_vuldb_uiNsee CVSS documentation10/20/2021accepted
90
11759784VulD...185139cvss3_vuldb_acLsee CVSS documentation10/20/2021accepted
90
11759783VulD...185139risk2see risk documentation10/20/2021accepted
90
11759782VulD...185139cwe121 (memory corruption)10/20/2021accepted
90
11759781VulD...185139nameMF971R10/20/2021accepted
90
11759780VulD...185139vendorZTE10/20/2021accepted
90
11759779VulD...185138price_0day$0-$5ksee exploit price documentation10/20/2021accepted
90
11759778VulD...185138cvss3_meta_tempscore5.5see CVSS documentation10/20/2021accepted
90
11759777VulD...185138cvss3_meta_basescore5.5see CVSS documentation10/20/2021accepted
90
11759776VulD...185138cvss3_vuldb_tempscore5.5see CVSS documentation10/20/2021accepted
90
11759775VulD...185138cvss3_vuldb_basescore5.5see CVSS documentation10/20/2021accepted
90
11759774VulD...185138cvss2_vuldb_tempscore5.2see CVSS documentation10/20/2021accepted
90
11759773VulD...185138cvss2_vuldb_basescore5.2see CVSS documentation10/20/2021accepted
90
11759772VulD...185138cvss3_vuldb_rlXderived from historical data10/20/2021accepted
80
11759771VulD...185138cvss3_vuldb_eXderived from historical data10/20/2021accepted
80
11759770VulD...185138cvss3_vuldb_prLderived from historical data10/20/2021accepted
80
11759769VulD...185138cvss3_vuldb_avAderived from historical data10/20/2021accepted
80
11759768VulD...185138cvss2_vuldb_rlNDderived from historical data10/20/2021accepted
80
11759767VulD...185138cvss2_vuldb_eNDderived from historical data10/20/2021accepted
80
11759766VulD...185138cvss2_vuldb_auSderived from historical data10/20/2021accepted
80
11759765VulD...185138cvss2_vuldb_avAderived from historical data10/20/2021accepted
80
11759764VulD...185138cvss2_vuldb_rcCderived from vuldb v3 vector10/20/2021accepted
80
11759763VulD...185138cvss2_vuldb_aiPderived from vuldb v3 vector10/20/2021accepted
80
11759762VulD...185138cvss2_vuldb_iiPderived from vuldb v3 vector10/20/2021accepted
80
11759761VulD...185138cvss2_vuldb_ciPderived from vuldb v3 vector10/20/2021accepted
80
11759760VulD...185138cvss2_vuldb_acLderived from vuldb v3 vector10/20/2021accepted
80
11759759VulD...185138date1634680800 (10/20/2021)10/20/2021accepted
90
11759758VulD...185138cve_assigned1609714800mitre.org10/20/2021accepted
90

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!