"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-08-30 06:00:39 +00:00
parent a8d5926ec9
commit cadb885c32
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
4 changed files with 42 additions and 26 deletions

View File

@ -48,16 +48,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://security.snyk.io/vuln/SNYK-JS-XDATASPREADSHEET-2430381"
"refsource": "MISC",
"url": "https://security.snyk.io/vuln/SNYK-JS-XDATASPREADSHEET-2430381",
"name": "https://security.snyk.io/vuln/SNYK-JS-XDATASPREADSHEET-2430381"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/myliang/x-spreadsheet/issues/580"
"refsource": "MISC",
"url": "https://github.com/myliang/x-spreadsheet/issues/580",
"name": "https://github.com/myliang/x-spreadsheet/issues/580"
},
{
"refsource": "CONFIRM",
"url": "https://youtu.be/Ij-8VVKNh7U"
"refsource": "MISC",
"url": "https://youtu.be/Ij-8VVKNh7U",
"name": "https://youtu.be/Ij-8VVKNh7U"
}
]
},
@ -65,7 +68,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells.\r\n\r\n"
"value": "All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells."
}
]
},

View File

@ -52,20 +52,24 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360"
"refsource": "MISC",
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360",
"name": "https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360"
},
{
"refsource": "CONFIRM",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/commits/fc300780da21f4bb92c148bc90257201220cf174"
"refsource": "MISC",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/commits/fc300780da21f4bb92c148bc90257201220cf174",
"name": "https://bitbucket.org/snakeyaml/snakeyaml/commits/fc300780da21f4bb92c148bc90257201220cf174"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/snakeyaml/snakeyaml/commit/fc300780da21f4bb92c148bc90257201220cf174"
"refsource": "MISC",
"url": "https://github.com/snakeyaml/snakeyaml/commit/fc300780da21f4bb92c148bc90257201220cf174",
"name": "https://github.com/snakeyaml/snakeyaml/commit/fc300780da21f4bb92c148bc90257201220cf174"
},
{
"refsource": "CONFIRM",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525"
"refsource": "MISC",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525",
"name": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525"
}
]
},
@ -73,7 +77,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.\n"
"value": "The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections."
}
]
},

View File

@ -48,20 +48,24 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-2957526"
"refsource": "MISC",
"url": "https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-2957526",
"name": "https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-2957526"
},
{
"refsource": "CONFIRM",
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3008102"
"refsource": "MISC",
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3008102",
"name": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3008102"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/apostrophecms/sanitize-html/pull/557"
"refsource": "MISC",
"url": "https://github.com/apostrophecms/sanitize-html/pull/557",
"name": "https://github.com/apostrophecms/sanitize-html/pull/557"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/apostrophecms/sanitize-html/commit/b4682c12fd30e12e82fa2d9b766de91d7d2cd23c"
"refsource": "MISC",
"url": "https://github.com/apostrophecms/sanitize-html/commit/b4682c12fd30e12e82fa2d9b766de91d7d2cd23c",
"name": "https://github.com/apostrophecms/sanitize-html/commit/b4682c12fd30e12e82fa2d9b766de91d7d2cd23c"
}
]
},
@ -69,7 +73,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.\n"
"value": "The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal."
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "A certain 5400 RPM OEM hard drive, as shipped with laptop PCs in approximately 2005, allows physically proximate attackers to cause a denial of service (device malfunction and system crash) via a resonant-frequency attack with the audio signal from the Rhythm Nation music video."
"value": "Certain 5400 RPM hard drives, for laptops and other PCs in approximately 2005 and later, allow physically proximate attackers to cause a denial of service (device malfunction and system crash) via a resonant-frequency attack with the audio signal from the Rhythm Nation music video. A reported product is Seagate STDT4000100 763649053447."
}
]
},
@ -56,6 +56,11 @@
"url": "https://devblogs.microsoft.com/oldnewthing/20220816-00/?p=106994",
"refsource": "MISC",
"name": "https://devblogs.microsoft.com/oldnewthing/20220816-00/?p=106994"
},
{
"refsource": "MISC",
"name": "https://www.youtube.com/watch?v=nSvu9IDUjZw&t=416s",
"url": "https://www.youtube.com/watch?v=nSvu9IDUjZw&t=416s"
}
]
},