"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-01-12 20:01:13 +00:00
parent ba3df7f1e2
commit 63ee75d929
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
36 changed files with 323 additions and 48 deletions

View File

@ -56,6 +56,11 @@
"name": "https://github.com/kongxin520/EmpireCMS/blob/master/EmpireCMS.md",
"refsource": "MISC",
"url": "https://github.com/kongxin520/EmpireCMS/blob/master/EmpireCMS.md"
},
{
"refsource": "MISC",
"name": "https://kongxin.gitbook.io/empirecms/",
"url": "https://kongxin.gitbook.io/empirecms/"
}
]
}

View File

@ -56,6 +56,16 @@
"name": "https://github.com/kongxin520/EmpireCMS/blob/master/EmpireCMS.md",
"refsource": "MISC",
"url": "https://github.com/kongxin520/EmpireCMS/blob/master/EmpireCMS.md"
},
{
"refsource": "MISC",
"name": "https://kongxin.gitbook.io/empirecms/",
"url": "https://kongxin.gitbook.io/empirecms/"
},
{
"refsource": "MISC",
"name": "https://kongxin.gitbook.io/dedecms-5-7-bug/",
"url": "https://kongxin.gitbook.io/dedecms-5-7-bug/"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://github.com/kongxin520/DedeCMS/blob/master/DedeCMS_5.7_Bug.md",
"refsource": "MISC",
"url": "https://github.com/kongxin520/DedeCMS/blob/master/DedeCMS_5.7_Bug.md"
},
{
"refsource": "MISC",
"name": "https://kongxin.gitbook.io/dedecms-5-7-bug/",
"url": "https://kongxin.gitbook.io/dedecms-5-7-bug/"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://github.com/kongxin520/zzcms/blob/master/zzcms_8.2_bug.md",
"refsource": "MISC",
"url": "https://github.com/kongxin520/zzcms/blob/master/zzcms_8.2_bug.md"
},
{
"refsource": "MISC",
"name": "https://kongxin.gitbook.io/zzcms-8-2-bug/",
"url": "https://kongxin.gitbook.io/zzcms-8-2-bug/"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://github.com/kongxin520/YzmCMS/blob/master/YzmCMS_3.6_bug.md",
"refsource": "MISC",
"url": "https://github.com/kongxin520/YzmCMS/blob/master/YzmCMS_3.6_bug.md"
},
{
"refsource": "MISC",
"name": "https://kongxin.gitbook.io/yzmcms-3-6-bug/",
"url": "https://kongxin.gitbook.io/yzmcms-3-6-bug/"
}
]
}

View File

@ -108,6 +108,11 @@
"name": "https://www.tibco.com/services/support/advisories",
"refsource": "CONFIRM",
"url": "https://www.tibco.com/services/support/advisories"
},
{
"refsource": "CONFIRM",
"name": "https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-12-2022-tibco-data-virtualization-2021-35500",
"url": "https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-12-2022-tibco-data-virtualization-2021-35500"
}
]
},

View File

@ -1,17 +1,81 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-41597",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-41597",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "SuiteCRM through 7.11.21 is vulnerable to CSRF, with resultant remote code execution, via the UpgradeWizard functionality, if a PHP file is included in a ZIP archive."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://suitecrm.com",
"refsource": "MISC",
"name": "https://suitecrm.com"
},
{
"url": "https://github.com/salesagility/SuiteCRM",
"refsource": "MISC",
"name": "https://github.com/salesagility/SuiteCRM"
},
{
"refsource": "MISC",
"name": "https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_35",
"url": "https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_35"
},
{
"refsource": "MISC",
"name": "https://github.com/ach-ing/cves/blob/main/CVE-2021-41597.md",
"url": "https://github.com/ach-ing/cves/blob/main/CVE-2021-41597.md"
},
{
"refsource": "MISC",
"name": "https://docs.suitecrm.com/admin/releases/",
"url": "https://docs.suitecrm.com/admin/releases/"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-42558",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-42558",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in CALDERA 2.8.1. It contains multiple reflected, stored, and self XSS vulnerabilities that may be exploited by authenticated and unauthenticated attackers."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/mitre/caldera/releases",
"refsource": "MISC",
"name": "https://github.com/mitre/caldera/releases"
},
{
"refsource": "MISC",
"name": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42558-Multiple%20XSS-MITRE%20Caldera",
"url": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42558-Multiple%20XSS-MITRE%20Caldera"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-42559",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-42559",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in CALDERA 2.8.1. It contains multiple startup \"requirements\" that execute commands when starting the server. Because these commands can be changed via the REST API, an authenticated user can insert arbitrary commands that will execute when the server is restarted."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/mitre/caldera/releases",
"refsource": "MISC",
"name": "https://github.com/mitre/caldera/releases"
},
{
"refsource": "MISC",
"name": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42559-Command%20Injection%20Via%20Configurations-MITRE%20Caldera",
"url": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42559-Command%20Injection%20Via%20Configurations-MITRE%20Caldera"
}
]
}

View File

@ -107,6 +107,11 @@
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2022-01",
"url": "https://www.tenable.com/security/tns-2022-01"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2022-03",
"url": "https://www.tenable.com/security/tns-2022-03"
}
]
},

View File

@ -102,6 +102,11 @@
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2022-01",
"url": "https://www.tenable.com/security/tns-2022-01"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2022-03",
"url": "https://www.tenable.com/security/tns-2022-03"
}
]
},

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-45449",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-45449",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Docker Desktop version 4.3.0 and 4.3.1 has a bug that may log sensitive information (access token or password) on the user's machine during login. This only affects users if they are on Docker Desktop 4.3.0, 4.3.1 and the user has logged in while on 4.3.0, 4.3.1. Gaining access to this data would require having access to the user\u2019s local files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://docs.docker.com/desktop/windows/release-notes/",
"refsource": "MISC",
"name": "https://docs.docker.com/desktop/windows/release-notes/"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-20612",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-20613",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-20614",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-20615",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-20616",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-20617",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-20618",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-20619",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-20620",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-20621",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23105",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23106",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23107",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23108",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23109",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23110",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23111",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23112",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23113",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23114",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23115",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23116",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23117",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2022-23118",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {