From 220be2b608b663b34cecea445ae4806797b4f7d9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 9 Sep 2021 02:00:55 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/26xxx/CVE-2020-26300.json | 12 ++++++------ 2021/32xxx/CVE-2021-32833.json | 2 +- 2021/32xxx/CVE-2021-32834.json | 2 +- 3 files changed, 8 insertions(+), 8 deletions(-) diff --git a/2020/26xxx/CVE-2020-26300.json b/2020/26xxx/CVE-2020-26300.json index 8a8a06a6fb9..faae32a6a9d 100644 --- a/2020/26xxx/CVE-2020-26300.json +++ b/2020/26xxx/CVE-2020-26300.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "systeminformation is an npm package that provides system and OS information library for node.js. In systeminformation before version 4.26.2 there is a command injection vulnerability. Problem was fixed in version 4.26.2 with a shell string sanitation fix.\n" + "value": "systeminformation is an npm package that provides system and OS information library for node.js. In systeminformation before version 4.26.2 there is a command injection vulnerability. Problem was fixed in version 4.26.2 with a shell string sanitation fix." } ] }, @@ -72,6 +72,11 @@ }, "references": { "reference_data": [ + { + "name": "https://www.npmjs.com/package/systeminformation", + "refsource": "MISC", + "url": "https://www.npmjs.com/package/systeminformation" + }, { "name": "https://github.com/advisories/GHSA-fj59-f6c3-3vw4", "refsource": "CONFIRM", @@ -86,11 +91,6 @@ "name": "https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607", "refsource": "MISC", "url": "https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607" - }, - { - "name": "https://www.npmjs.com/package/systeminformation", - "refsource": "MISC", - "url": "https://www.npmjs.com/package/systeminformation" } ] }, diff --git a/2021/32xxx/CVE-2021-32833.json b/2021/32xxx/CVE-2021-32833.json index 06d6bfc0149..d175b3685cc 100644 --- a/2021/32xxx/CVE-2021-32833.json +++ b/2021/32xxx/CVE-2021-32833.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Emby Server is a personal media server with apps on many devices. In Emby Server on Windows there is a set of arbitrary file read vulnerabilities. This vulnerability is known to exist in version 4.6.4.0 and may not be patched in later versions. Known vulnerable routes are /Videos/Id/hls/PlaylistId/SegmentId.SegmentContainer, /Images/Ratings/theme/name and /Images/MediaInfo/theme/name. For more details including proof of concept code, refer to the referenced GHSL-2021-051. This issue may lead to unauthorized access to the system especially when Emby Server is configured to be accessible from the Internet." + "value": "Emby Server is a personal media server with apps on many devices. In Emby Server on Windows there is a set of arbitrary file read vulnerabilities. This vulnerability is known to exist in version 4.6.4.0 and may not be patched in later versions. Known vulnerable routes are /Videos/Id/hls/PlaylistId/SegmentId.SegmentContainer, /Images/Ratings/theme/name and /Images/MediaInfo/theme/name. For more details including proof of concept code, refer to the referenced GHSL-2021-051. This issue may lead to unauthorized access to the system especially when Emby Server is configured to be accessible from the Internet." } ] }, diff --git a/2021/32xxx/CVE-2021-32834.json b/2021/32xxx/CVE-2021-32834.json index bca48a233ed..030034c40ec 100644 --- a/2021/32xxx/CVE-2021-32834.json +++ b/2021/32xxx/CVE-2021-32834.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a user able to create Policy Sets can run arbitrary code by sending malicious Groovy scripts which will escape the configured Groovy sandbox. This vulnerability is known to exist in the latest commit at the time of writing this CVE (commit a1c8dbe). For more details see the referenced GHSL-2021-063.\n\n" + "value": "Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a user able to create Policy Sets can run arbitrary code by sending malicious Groovy scripts which will escape the configured Groovy sandbox. This vulnerability is known to exist in the latest commit at the time of writing this CVE (commit a1c8dbe). For more details see the referenced GHSL-2021-063." } ] },