This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
{"id": "CVE-2021-1132", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-1132", "description": "This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", "published": "2022-02-25T11:31:46", "modified": "2022-02-25T11:31:46", "cvss": {}, "cvss2": {}, "cvss3": {}, "href": "", "reporter": "candidate", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2022-02-25T11:31:46", "viewCount": 4, "enchantments": {"dependencies": {"references": [{"type": "cisco", "idList": ["CISCO-SA-NSO-PATH-TRVSL-DZRQE8LC"]}], "rev": 4}, "score": {"value": 1.5, "vector": "NONE"}, "vulnersScore": 1.5}, "_state": {"dependencies": 1646405851, "score": 1659855189, "epss": 1679179052}, "_internal": {"score_hash": "d050921d425e9696be61dc6e0644c1eb"}, "cpe": [], "cpe23": [], "cwe": [], "affectedSoftware": [], "affectedConfiguration": [], "cpeConfiguration": {}, "extraReferences": [], "product_info": []}
{"cisco": [{"lastseen": "2022-12-22T12:15:39", "description": "A vulnerability in the API subsystem and in the web-management interface of Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to access sensitive data.\n\nThis vulnerability exists because the web-management interface and certain HTTP-based APIs do not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the affected system.\n\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\nThis advisory is available at the following link:\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-path-trvsl-dZRQE8Lc [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-path-trvsl-dZRQE8Lc\"]", "cvss3": {}, "published": "2021-03-03T16:00:00", "type": "cisco", "title": "Cisco Network Services Orchestrator Path Traversal Vulnerability", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2021-1132"], "modified": "2021-03-03T16:00:00", "id": "CISCO-SA-NSO-PATH-TRVSL-DZRQE8LC", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-path-trvsl-dZRQE8Lc", "cvss": {"score": 5.3, "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}}]}