var-202106-0870
Vulnerability from variot

Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0870",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nuc 10 performance kit nuc10i3fnk",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 11 enthusiast mini pc nuc11phki7caa",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "phtgl579.0056"
      },
      {
        "model": "nuc 10 performance kit nuc10i3fnhf",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 8 mainstream-g kit nuc8i7inh",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "inwhl357.0040"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi30p",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi3",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 10 performance mini pc nuc10i5fnhja",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 11 performance mini pc nuc11paqi50wa",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "patgl357.0037"
      },
      {
        "model": "nuc 10 performance kit nuc10i3fnh",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc kit nuc8i7hvk",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "hnkbli70.86a.0065"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 8 compute element cm8pcb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "cbwhl.0092"
      },
      {
        "model": "nuc m15 laptop kit lapbc710",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "bctgl357.0051"
      },
      {
        "model": "nuc 10 performance kit nuc10i5fnk",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 10 performance mini pc nuc10i7fnkpa",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 10 performance kit nuc10i5fnh",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc board nuc8cchb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "chaplcel.0051"
      },
      {
        "model": "nuc 8 pro kit nuc8i3pnh",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "pnwhl357.0039"
      },
      {
        "model": "nuc kit nuc7cjyh",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "jyglkcpx.86a.0057"
      },
      {
        "model": "nuc 8 mainstream-g kit nuc8i5inh",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "inwhl357.0040"
      },
      {
        "model": "nuc 9 pro kit nuc9vxqnx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "qncflx70.0059"
      },
      {
        "model": "nuc 10 performance kit nuc10i7fnhc",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 11 pro kit nuc11tnki5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 8 pro board nuc8i3pnb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "pnwhl357.0039"
      },
      {
        "model": "nuc 10 performance mini pc nuc10i3fnhja",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 8 mainstream-g mini pc nuc8i7inh",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "inwhl357.0040"
      },
      {
        "model": "nuc 8 enthusiast\\, a mini pc with windows 10 nuc8i7hvkva",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "hnkbli70.86a.0065"
      },
      {
        "model": "nuc 8 compute element cm8i3cb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "cbwhl.0092"
      },
      {
        "model": "nuc 10 performance mini pc nuc10i7fnhaa",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 11 pro board nuc11tnbi5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 11 performance mini pc nuc11paqi70qa",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "patgl357.0037"
      },
      {
        "model": "nuc 11 compute element cm11ebi58w",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "ebtgl357.0045"
      },
      {
        "model": "nuc 7 essential\\, a mini pc with windows 10 nuc7cjysal",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "jyglkcpx.86a.0057"
      },
      {
        "model": "nuc 8 pro kit nuc8i3pnk",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "pnwhl357.0039"
      },
      {
        "model": "nuc 10 performance kit nuc10i7fnk",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc kit nuc7pjyh",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "jyglkcpx.86a.0057"
      },
      {
        "model": "nuc 10 performance kit nuc10i5fnhf",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc kit nuc8i7hnk",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "hnkbli70.86a.0065"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi50l",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 8 enthusiast\\, a mini pc with windows 10 nuc8i7hvkvaw",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "hnkbli70.86a.0065"
      },
      {
        "model": "nuc 11 performance kit nuc11pahi3",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "patgl357.0037"
      },
      {
        "model": "nuc 8 mainstream-g mini pc nuc8i5inh",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "inwhl357.0040"
      },
      {
        "model": "nuc 11 performance kit nuc11paki3",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "patgl357.0037"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi50w",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 9 pro kit nuc9v7qnx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "qncflx70.0059"
      },
      {
        "model": "nuc 11 pro board nuc11tnbi7",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 10 performance mini pc nuc10i5fnhca",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi70l",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 11 compute element cm11ebi716w",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "ebtgl357.0045"
      },
      {
        "model": "nuc 10 performance mini pc nuc10i7fnhja",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 11 pro kit nuc11tnki3",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 11 performance kit nuc11paki5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "patgl357.0037"
      },
      {
        "model": "nuc 8 compute element cm8i5cb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "cbwhl.0092"
      },
      {
        "model": "nuc 8 business\\, a mini pc with windows 10 nuc8i7hnkqc",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "hnkbli70.86a.0065"
      },
      {
        "model": "nuc 11 performance kit nuc11pahi7",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "patgl357.0037"
      },
      {
        "model": "nuc 11 compute element cm11ebi38w",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "ebtgl357.0045"
      },
      {
        "model": "nuc 11 compute element cm11ebc4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "ebtgl357.0045"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi70q",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 10 performance kit nuc10i5fnhj",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 9 pro compute element nuc9v7qnb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "qncflx70.0059"
      },
      {
        "model": "nuc 8 rugged kit nuc8cchkr",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "chaplcel.0051"
      },
      {
        "model": "nuc 8 compute element cm8i7cb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "cbwhl.0092"
      },
      {
        "model": "nuc 11 enthusiast kit nuc11phki7c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "phtgl579.0056"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi30l",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 10 performance kit nuc10i7fnh",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 8 compute element cm8ccb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "cbwhl.0092"
      },
      {
        "model": "nuc 10 performance mini pc nuc10i5fnkpa",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 10 performance mini pc nuc10i3fnhfa",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 10 performance kit nuc10i5fnkp",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 11 pro kit nuc11tnki7",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 11 performance kit nuc11pahi5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "patgl357.0037"
      },
      {
        "model": "nuc m15 laptop kit lapbc510",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "bctgl357.0051"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi7",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 11 pro board nuc11tnbi3",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0052"
      },
      {
        "model": "nuc 10 performance kit nuc10i7fnkp",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "fncml.0050"
      },
      {
        "model": "nuc 9 pro compute element nuc9vxqnb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "qncflx70.0059"
      },
      {
        "model": "nuc 11 performance kit nuc11paki7",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "patgl357.0037"
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-0054"
      }
    ]
  },
  "cve": "CVE-2021-0054",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-0054",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 0.8,
            "id": "CVE-2021-0054",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-0054",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202104-975",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202106-711",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-711"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0054"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-0054"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      }
    ],
    "trust": 1.44
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-0054",
        "trust": 1.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021041363",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2006",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021061610",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-711",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-711"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0054"
      }
    ]
  },
  "id": "VAR-202106-0870",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.36190475666666666
  },
  "last_update_date": "2024-08-14T13:18:06.785000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Intel NUC Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155756"
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-711"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-0054"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021061610"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2006"
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-711"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0054"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-711"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0054"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "date": "2021-06-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202106-711"
      },
      {
        "date": "2021-06-09T20:15:08.267000",
        "db": "NVD",
        "id": "CVE-2021-0054"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "date": "2021-07-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202106-711"
      },
      {
        "date": "2021-07-01T18:14:16.483000",
        "db": "NVD",
        "id": "CVE-2021-0054"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-711"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Pillow Buffer error vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.