mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
66fc6a6c25
commit
04da7a6f0e
@ -62,7 +62,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account."
|
||||
"value": "In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the \u201cforgot password\u201d functionality to reset the victim\u2019s password and successfully take over their account."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -100,12 +100,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/debiki/talkyard/commit/4067e191a909ed06f250d09a40e43aa5edbb0289"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/debiki/talkyard/commit/4067e191a909ed06f250d09a40e43aa5edbb0289",
|
||||
"name": "https://github.com/debiki/talkyard/commit/4067e191a909ed06f250d09a40e43aa5edbb0289"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980"
|
||||
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980",
|
||||
"name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -119,4 +121,4 @@
|
||||
"advisory": "https://www.whitesourcesoftware.com/vulnerability-database/",
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
}
|
18
2021/3xxx/CVE-2021-3945.json
Normal file
18
2021/3xxx/CVE-2021-3945.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-3945",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user