From 6f89cfb95a519b9604a53e2aa3b431ee2250082c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 12 Jan 2021 19:02:02 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/13xxx/CVE-2020-13116.json | 56 ++++++++-- 2020/27xxx/CVE-2020-27148.json | 183 +++++++++++++++++---------------- 2021/23xxx/CVE-2021-23906.json | 18 ++++ 2021/23xxx/CVE-2021-23907.json | 18 ++++ 2021/23xxx/CVE-2021-23908.json | 18 ++++ 2021/23xxx/CVE-2021-23909.json | 18 ++++ 2021/23xxx/CVE-2021-23910.json | 18 ++++ 2021/23xxx/CVE-2021-23911.json | 18 ++++ 2021/23xxx/CVE-2021-23912.json | 18 ++++ 2021/23xxx/CVE-2021-23913.json | 18 ++++ 2021/23xxx/CVE-2021-23914.json | 18 ++++ 2021/23xxx/CVE-2021-23915.json | 18 ++++ 2021/23xxx/CVE-2021-23916.json | 18 ++++ 2021/23xxx/CVE-2021-23917.json | 18 ++++ 2021/23xxx/CVE-2021-23918.json | 18 ++++ 2021/23xxx/CVE-2021-23919.json | 18 ++++ 2021/23xxx/CVE-2021-23920.json | 18 ++++ 2021/3xxx/CVE-2021-3130.json | 18 ++++ 2021/3xxx/CVE-2021-3131.json | 18 ++++ 2021/3xxx/CVE-2021-3132.json | 18 ++++ 2021/3xxx/CVE-2021-3133.json | 67 ++++++++++++ 21 files changed, 535 insertions(+), 95 deletions(-) create mode 100644 2021/23xxx/CVE-2021-23906.json create mode 100644 2021/23xxx/CVE-2021-23907.json create mode 100644 2021/23xxx/CVE-2021-23908.json create mode 100644 2021/23xxx/CVE-2021-23909.json create mode 100644 2021/23xxx/CVE-2021-23910.json create mode 100644 2021/23xxx/CVE-2021-23911.json create mode 100644 2021/23xxx/CVE-2021-23912.json create mode 100644 2021/23xxx/CVE-2021-23913.json create mode 100644 2021/23xxx/CVE-2021-23914.json create mode 100644 2021/23xxx/CVE-2021-23915.json create mode 100644 2021/23xxx/CVE-2021-23916.json create mode 100644 2021/23xxx/CVE-2021-23917.json create mode 100644 2021/23xxx/CVE-2021-23918.json create mode 100644 2021/23xxx/CVE-2021-23919.json create mode 100644 2021/23xxx/CVE-2021-23920.json create mode 100644 2021/3xxx/CVE-2021-3130.json create mode 100644 2021/3xxx/CVE-2021-3131.json create mode 100644 2021/3xxx/CVE-2021-3132.json create mode 100644 2021/3xxx/CVE-2021-3133.json diff --git a/2020/13xxx/CVE-2020-13116.json b/2020/13xxx/CVE-2020-13116.json index 5e8c30ec49c..0de09259626 100644 --- a/2020/13xxx/CVE-2020-13116.json +++ b/2020/13xxx/CVE-2020-13116.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-13116", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-13116", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OpenText Carbonite Server Backup Portal before 8.8.7 allows XSS by an authenticated user via policy creation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.carbonite.com/evault/articles/Cross-site-scripting-vulnerability-in-Carbonite-Server-Backup-Portal-policies-functionality", + "url": "https://support.carbonite.com/evault/articles/Cross-site-scripting-vulnerability-in-Carbonite-Server-Backup-Portal-policies-functionality" } ] } diff --git a/2020/27xxx/CVE-2020-27148.json b/2020/27xxx/CVE-2020-27148.json index 5bdf2407a72..5a8ce0c51fe 100644 --- a/2020/27xxx/CVE-2020-27148.json +++ b/2020/27xxx/CVE-2020-27148.json @@ -1,90 +1,95 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@tibco.com", - "DATE_PUBLIC": "2021-01-12T17:00:00Z", - "ID": "CVE-2020-27148", - "STATE": "PUBLIC", - "TITLE": "TIBCO EBX EXML External Entity" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "TIBCO EBX Add-ons", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_value": "4.4.2" - } - ] - } - } - ] - }, - "vendor_name": "TIBCO Software Inc." - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The TIBCO EBX Add-on for Oracle Hyperion EPM, TIBCO EBX Data Exchange Add-on, and TIBCO EBX Insight Add-on components of TIBCO Software Inc.'s TIBCO EBX Add-ons contain a vulnerability that theoretically allows a low privileged attacker with network access to execute an XML External Entity (XXE) attack.\n\nAffected releases are TIBCO Software Inc.'s TIBCO EBX Add-ons: versions 4.4.2 and below.\n" - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "LOW", - "baseScore": 7.1, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "The impact of these vulnerabilities include the possibility that an attacker would gain unauthorized read access to TIBCO EBX data, and the ability to cause a partial denial of service (partial DOS) on the affected system." - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "http://www.tibco.com/services/support/advisories", - "refsource": "CONFIRM", - "url": "http://www.tibco.com/services/support/advisories" - } - ] - }, - "solution": [ - { - "lang": "eng", - "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO EBX Add-ons versions 4.4.2 and below update to version 4.4.3 or higher" - } - ], - "source": { - "discovery": "USER" - } -} + "CVE_data_meta": { + "ASSIGNER": "security@tibco.com", + "DATE_PUBLIC": "2021-01-12T17:00:00Z", + "ID": "CVE-2020-27148", + "STATE": "PUBLIC", + "TITLE": "TIBCO EBX EXML External Entity" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "TIBCO EBX Add-ons", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_value": "4.4.2" + } + ] + } + } + ] + }, + "vendor_name": "TIBCO Software Inc." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The TIBCO EBX Add-on for Oracle Hyperion EPM, TIBCO EBX Data Exchange Add-on, and TIBCO EBX Insight Add-on components of TIBCO Software Inc.'s TIBCO EBX Add-ons contain a vulnerability that theoretically allows a low privileged attacker with network access to execute an XML External Entity (XXE) attack. Affected releases are TIBCO Software Inc.'s TIBCO EBX Add-ons: versions 4.4.2 and below." + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "The impact of these vulnerabilities include the possibility that an attacker would gain unauthorized read access to TIBCO EBX data, and the ability to cause a partial denial of service (partial DOS) on the affected system." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.tibco.com/services/support/advisories", + "refsource": "CONFIRM", + "url": "http://www.tibco.com/services/support/advisories" + }, + { + "refsource": "CONFIRM", + "name": "https://www.tibco.com/support/advisories/2021/01/tibco-security-advisory-january-12-2021-tibco-ebx", + "url": "https://www.tibco.com/support/advisories/2021/01/tibco-security-advisory-january-12-2021-tibco-ebx" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO EBX Add-ons versions 4.4.2 and below update to version 4.4.3 or higher" + } + ], + "source": { + "discovery": "USER" + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23906.json b/2021/23xxx/CVE-2021-23906.json new file mode 100644 index 00000000000..21c80c37a64 --- /dev/null +++ b/2021/23xxx/CVE-2021-23906.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23906", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23907.json b/2021/23xxx/CVE-2021-23907.json new file mode 100644 index 00000000000..cd8b3ed5519 --- /dev/null +++ b/2021/23xxx/CVE-2021-23907.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23907", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23908.json b/2021/23xxx/CVE-2021-23908.json new file mode 100644 index 00000000000..dddbf922a8a --- /dev/null +++ b/2021/23xxx/CVE-2021-23908.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23908", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23909.json b/2021/23xxx/CVE-2021-23909.json new file mode 100644 index 00000000000..24305482400 --- /dev/null +++ b/2021/23xxx/CVE-2021-23909.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23909", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23910.json b/2021/23xxx/CVE-2021-23910.json new file mode 100644 index 00000000000..475992368c4 --- /dev/null +++ b/2021/23xxx/CVE-2021-23910.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23910", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23911.json b/2021/23xxx/CVE-2021-23911.json new file mode 100644 index 00000000000..ac676a7d74a --- /dev/null +++ b/2021/23xxx/CVE-2021-23911.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23911", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23912.json b/2021/23xxx/CVE-2021-23912.json new file mode 100644 index 00000000000..6249a3aa701 --- /dev/null +++ b/2021/23xxx/CVE-2021-23912.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23912", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23913.json b/2021/23xxx/CVE-2021-23913.json new file mode 100644 index 00000000000..a7c86fb3bed --- /dev/null +++ b/2021/23xxx/CVE-2021-23913.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23913", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23914.json b/2021/23xxx/CVE-2021-23914.json new file mode 100644 index 00000000000..fbdfa601c09 --- /dev/null +++ b/2021/23xxx/CVE-2021-23914.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23914", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23915.json b/2021/23xxx/CVE-2021-23915.json new file mode 100644 index 00000000000..ca64a28296f --- /dev/null +++ b/2021/23xxx/CVE-2021-23915.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23915", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23916.json b/2021/23xxx/CVE-2021-23916.json new file mode 100644 index 00000000000..72bad85efe6 --- /dev/null +++ b/2021/23xxx/CVE-2021-23916.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23916", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23917.json b/2021/23xxx/CVE-2021-23917.json new file mode 100644 index 00000000000..d84b04cdd5c --- /dev/null +++ b/2021/23xxx/CVE-2021-23917.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23917", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23918.json b/2021/23xxx/CVE-2021-23918.json new file mode 100644 index 00000000000..d87fdd3b012 --- /dev/null +++ b/2021/23xxx/CVE-2021-23918.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23918", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23919.json b/2021/23xxx/CVE-2021-23919.json new file mode 100644 index 00000000000..ce95815b4b6 --- /dev/null +++ b/2021/23xxx/CVE-2021-23919.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23919", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23920.json b/2021/23xxx/CVE-2021-23920.json new file mode 100644 index 00000000000..42ea26f957a --- /dev/null +++ b/2021/23xxx/CVE-2021-23920.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23920", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3130.json b/2021/3xxx/CVE-2021-3130.json new file mode 100644 index 00000000000..c9dd441347f --- /dev/null +++ b/2021/3xxx/CVE-2021-3130.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3130", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3131.json b/2021/3xxx/CVE-2021-3131.json new file mode 100644 index 00000000000..3b974b950b9 --- /dev/null +++ b/2021/3xxx/CVE-2021-3131.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3131", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3132.json b/2021/3xxx/CVE-2021-3132.json new file mode 100644 index 00000000000..28f2f2693c6 --- /dev/null +++ b/2021/3xxx/CVE-2021-3132.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3132", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3133.json b/2021/3xxx/CVE-2021-3133.json new file mode 100644 index 00000000000..25c80f99e9d --- /dev/null +++ b/2021/3xxx/CVE-2021-3133.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-3133", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Elementor Contact Form DB plugin before 1.6 for WordPress allows CSRF via backend admin pages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/2454670/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/2454670/" + }, + { + "url": "https://wordpress.org/plugins/sb-elementor-contact-form-db/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/sb-elementor-contact-form-db/#developers" + } + ] + } +} \ No newline at end of file