"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-10-20 12:01:08 +00:00
parent 27a74c2339
commit 903b226043
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
6 changed files with 62 additions and 18 deletions

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-23192",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -40,7 +40,7 @@
"description_data": [
{
"lang": "eng",
"value": "In “Camaleon CMS” application, versions 0.0.1 to 2.6.0 are vulnerable to stored XSS, that allows unprivileged application users to store malicious scripts in the comments section of the post. These scripts are executed in a victims browser when they open the page containing the malicious comment."
"value": "In \u201cCamaleon CMS\u201d application, versions 0.0.1 to 2.6.0 are vulnerable to stored XSS, that allows unprivileged application users to store malicious scripts in the comments section of the post. These scripts are executed in a victim\u2019s browser when they open the page containing the malicious comment."
}
]
},
@ -78,12 +78,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c"
"refsource": "MISC",
"url": "https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c",
"name": "https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c"
},
{
"refsource": "MISC",
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969"
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969",
"name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969"
}
]
},
@ -97,4 +99,4 @@
"advisory": "https://www.whitesourcesoftware.com/vulnerability-database/",
"discovery": "UNKNOWN"
}
}
}

View File

@ -40,7 +40,7 @@
"description_data": [
{
"lang": "eng",
"value": "Camaleon CMS 0.1.7 to 2.6.0 doesnt terminate the active session of the users, even after the admin changes the users password. A user that was already logged in, will still have access to the application even after the password was changed."
"value": "Camaleon CMS 0.1.7 to 2.6.0 doesn\u2019t terminate the active session of the users, even after the admin changes the user\u2019s password. A user that was already logged in, will still have access to the application even after the password was changed."
}
]
},
@ -78,12 +78,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://github.com/owen2345/camaleon-cms/commit/77e31bc6cdde7c951fba104aebcd5ebb3f02b030"
"refsource": "MISC",
"url": "https://github.com/owen2345/camaleon-cms/commit/77e31bc6cdde7c951fba104aebcd5ebb3f02b030",
"name": "https://github.com/owen2345/camaleon-cms/commit/77e31bc6cdde7c951fba104aebcd5ebb3f02b030"
},
{
"refsource": "MISC",
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25970"
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25970",
"name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25970"
}
]
},
@ -97,4 +99,4 @@
"advisory": "https://www.whitesourcesoftware.com/vulnerability-database/",
"discovery": "UNKNOWN"
}
}
}

View File

@ -78,12 +78,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://github.com/owen2345/camaleon-cms/commit/ab89584ab32b98a0af3d711e3f508a1d048147d2"
"refsource": "MISC",
"url": "https://github.com/owen2345/camaleon-cms/commit/ab89584ab32b98a0af3d711e3f508a1d048147d2",
"name": "https://github.com/owen2345/camaleon-cms/commit/ab89584ab32b98a0af3d711e3f508a1d048147d2"
},
{
"refsource": "MISC",
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25971"
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25971",
"name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25971"
}
]
},
@ -97,4 +99,4 @@
"advisory": "https://www.whitesourcesoftware.com/vulnerability-database/",
"discovery": "UNKNOWN"
}
}
}

View File

@ -78,12 +78,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://github.com/owen2345/camaleon-cms/commit/5a252d537411fdd0127714d66c1d76069dc7e190"
"refsource": "MISC",
"url": "https://github.com/owen2345/camaleon-cms/commit/5a252d537411fdd0127714d66c1d76069dc7e190",
"name": "https://github.com/owen2345/camaleon-cms/commit/5a252d537411fdd0127714d66c1d76069dc7e190"
},
{
"refsource": "MISC",
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25972"
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25972",
"name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25972"
}
]
},
@ -97,4 +99,4 @@
"advisory": "https://www.whitesourcesoftware.com/vulnerability-database/",
"discovery": "UNKNOWN"
}
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-42745",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}