From 742b7323ca8c3356ceee5b32dda300fb1436c552 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 7 Oct 2021 20:00:53 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/3xxx/CVE-2021-3869.json | 18 ++++++++++ 2021/42xxx/CVE-2021-42084.json | 18 ++++++++++ 2021/42xxx/CVE-2021-42085.json | 18 ++++++++++ 2021/42xxx/CVE-2021-42086.json | 18 ++++++++++ 2021/42xxx/CVE-2021-42087.json | 18 ++++++++++ 2021/42xxx/CVE-2021-42088.json | 18 ++++++++++ 2021/42xxx/CVE-2021-42089.json | 18 ++++++++++ 2021/42xxx/CVE-2021-42090.json | 18 ++++++++++ 2021/42xxx/CVE-2021-42091.json | 18 ++++++++++ 2021/42xxx/CVE-2021-42092.json | 62 ++++++++++++++++++++++++++++++++++ 2021/42xxx/CVE-2021-42093.json | 62 ++++++++++++++++++++++++++++++++++ 2021/42xxx/CVE-2021-42094.json | 62 ++++++++++++++++++++++++++++++++++ 12 files changed, 348 insertions(+) create mode 100644 2021/3xxx/CVE-2021-3869.json create mode 100644 2021/42xxx/CVE-2021-42084.json create mode 100644 2021/42xxx/CVE-2021-42085.json create mode 100644 2021/42xxx/CVE-2021-42086.json create mode 100644 2021/42xxx/CVE-2021-42087.json create mode 100644 2021/42xxx/CVE-2021-42088.json create mode 100644 2021/42xxx/CVE-2021-42089.json create mode 100644 2021/42xxx/CVE-2021-42090.json create mode 100644 2021/42xxx/CVE-2021-42091.json create mode 100644 2021/42xxx/CVE-2021-42092.json create mode 100644 2021/42xxx/CVE-2021-42093.json create mode 100644 2021/42xxx/CVE-2021-42094.json diff --git a/2021/3xxx/CVE-2021-3869.json b/2021/3xxx/CVE-2021-3869.json new file mode 100644 index 00000000000..05f05cc1d7c --- /dev/null +++ b/2021/3xxx/CVE-2021-3869.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3869", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42084.json b/2021/42xxx/CVE-2021-42084.json new file mode 100644 index 00000000000..488e2942b4b --- /dev/null +++ b/2021/42xxx/CVE-2021-42084.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42084", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42085.json b/2021/42xxx/CVE-2021-42085.json new file mode 100644 index 00000000000..30fab2cc24e --- /dev/null +++ b/2021/42xxx/CVE-2021-42085.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42085", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42086.json b/2021/42xxx/CVE-2021-42086.json new file mode 100644 index 00000000000..e6addb4b62a --- /dev/null +++ b/2021/42xxx/CVE-2021-42086.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42086", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42087.json b/2021/42xxx/CVE-2021-42087.json new file mode 100644 index 00000000000..53b11235e16 --- /dev/null +++ b/2021/42xxx/CVE-2021-42087.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42087", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42088.json b/2021/42xxx/CVE-2021-42088.json new file mode 100644 index 00000000000..d952890fd79 --- /dev/null +++ b/2021/42xxx/CVE-2021-42088.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42088", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42089.json b/2021/42xxx/CVE-2021-42089.json new file mode 100644 index 00000000000..a01a6397d30 --- /dev/null +++ b/2021/42xxx/CVE-2021-42089.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42089", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42090.json b/2021/42xxx/CVE-2021-42090.json new file mode 100644 index 00000000000..f26a99eff9d --- /dev/null +++ b/2021/42xxx/CVE-2021-42090.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42090", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42091.json b/2021/42xxx/CVE-2021-42091.json new file mode 100644 index 00000000000..c1053198945 --- /dev/null +++ b/2021/42xxx/CVE-2021-42091.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-42091", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42092.json b/2021/42xxx/CVE-2021-42092.json new file mode 100644 index 00000000000..4c6bfbf0865 --- /dev/null +++ b/2021/42xxx/CVE-2021-42092.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42092", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. Stored XSS may occur via an Article during addition of an attachment to a Ticket." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-16", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-16" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42093.json b/2021/42xxx/CVE-2021-42093.json new file mode 100644 index 00000000000..7503a198d13 --- /dev/null +++ b/2021/42xxx/CVE-2021-42093.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42093", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. An admin can execute code on the server via a crafted request that manipulates triggers." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-10", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-10" + } + ] + } +} \ No newline at end of file diff --git a/2021/42xxx/CVE-2021-42094.json b/2021/42xxx/CVE-2021-42094.json new file mode 100644 index 00000000000..4daf44e80f9 --- /dev/null +++ b/2021/42xxx/CVE-2021-42094.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-42094", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Zammad before 4.1.1. Command Injection can occur via custom Packages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/en/advisories/zaa-2021-18", + "refsource": "MISC", + "name": "https://zammad.com/en/advisories/zaa-2021-18" + } + ] + } +} \ No newline at end of file