From c42e3817efcd8c88913f63a542ffaadb7923e59d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 4 Mar 2021 17:00:40 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23344.json | 12 +++++++----- 2021/27xxx/CVE-2021-27885.json | 5 +++++ 2021/27xxx/CVE-2021-27945.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27946.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27947.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27948.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27949.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27950.json | 18 ++++++++++++++++++ 2021/27xxx/CVE-2021-27951.json | 18 ++++++++++++++++++ 9 files changed, 138 insertions(+), 5 deletions(-) create mode 100644 2021/27xxx/CVE-2021-27945.json create mode 100644 2021/27xxx/CVE-2021-27946.json create mode 100644 2021/27xxx/CVE-2021-27947.json create mode 100644 2021/27xxx/CVE-2021-27948.json create mode 100644 2021/27xxx/CVE-2021-27949.json create mode 100644 2021/27xxx/CVE-2021-27950.json create mode 100644 2021/27xxx/CVE-2021-27951.json diff --git a/2021/23xxx/CVE-2021-23344.json b/2021/23xxx/CVE-2021-23344.json index ded1cf42f81..9541122fcb3 100644 --- a/2021/23xxx/CVE-2021-23344.json +++ b/2021/23xxx/CVE-2021-23344.json @@ -48,12 +48,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069", + "name": "https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069" }, { - "refsource": "CONFIRM", - "url": "https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04" + "refsource": "MISC", + "url": "https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04", + "name": "https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04" } ] }, @@ -61,7 +63,7 @@ "description_data": [ { "lang": "eng", - "value": "The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.\r\n\r\n" + "value": "The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set." } ] }, diff --git a/2021/27xxx/CVE-2021-27885.json b/2021/27xxx/CVE-2021-27885.json index d1b3a47c50f..47aa5a5f8c6 100644 --- a/2021/27xxx/CVE-2021-27885.json +++ b/2021/27xxx/CVE-2021-27885.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/e107inc/e107/commit/d9efdb9b5f424b4996c276e754a380a5e251f472", "url": "https://github.com/e107inc/e107/commit/d9efdb9b5f424b4996c276e754a380a5e251f472" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161651/e107-CMS-2.3.0-Cross-Site-Request-Forgery.html", + "url": "http://packetstormsecurity.com/files/161651/e107-CMS-2.3.0-Cross-Site-Request-Forgery.html" } ] } diff --git a/2021/27xxx/CVE-2021-27945.json b/2021/27xxx/CVE-2021-27945.json new file mode 100644 index 00000000000..0a2574661c7 --- /dev/null +++ b/2021/27xxx/CVE-2021-27945.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27945", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27946.json b/2021/27xxx/CVE-2021-27946.json new file mode 100644 index 00000000000..6bce2aa58cf --- /dev/null +++ b/2021/27xxx/CVE-2021-27946.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27946", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27947.json b/2021/27xxx/CVE-2021-27947.json new file mode 100644 index 00000000000..2c05915b449 --- /dev/null +++ b/2021/27xxx/CVE-2021-27947.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27947", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27948.json b/2021/27xxx/CVE-2021-27948.json new file mode 100644 index 00000000000..9b811dacc4b --- /dev/null +++ b/2021/27xxx/CVE-2021-27948.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27948", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27949.json b/2021/27xxx/CVE-2021-27949.json new file mode 100644 index 00000000000..740b9f8f158 --- /dev/null +++ b/2021/27xxx/CVE-2021-27949.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27949", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27950.json b/2021/27xxx/CVE-2021-27950.json new file mode 100644 index 00000000000..ebb9d4fe430 --- /dev/null +++ b/2021/27xxx/CVE-2021-27950.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27950", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27951.json b/2021/27xxx/CVE-2021-27951.json new file mode 100644 index 00000000000..bc7230241af --- /dev/null +++ b/2021/27xxx/CVE-2021-27951.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27951", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file