"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-03-18 16:00:47 +00:00
parent 61b64a533c
commit ebbeb9ffe9
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
45 changed files with 708 additions and 97 deletions

View File

@ -243,6 +243,11 @@
"refsource": "MLIST",
"name": "[hbase-issues] 20210317 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
"url": "https://lists.apache.org/thread.html/r02ba8db500d15a5949e9a7742815438002ba1cf1b361bdda52ed40ca@%3Cissues.hbase.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[hbase-issues] 20210318 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
"url": "https://lists.apache.org/thread.html/r8dfbefcd606af6737b62461a45a9af9222040b62eab474ff2287cf75@%3Cissues.hbase.apache.org%3E"
}
]
},

View File

@ -56,6 +56,11 @@
"refsource": "MISC",
"name": "https://www.gruppotim.it/redteam",
"url": "https://www.gruppotim.it/redteam"
},
{
"refsource": "CONFIRM",
"name": "https://support.ts.fujitsu.com/IndexDownload.asp?Softwareguid=C67A44AE-B022-4150-8621-C4393C007ED9",
"url": "https://support.ts.fujitsu.com/IndexDownload.asp?Softwareguid=C67A44AE-B022-4150-8621-C4393C007ED9"
}
]
}

View File

@ -13,40 +13,21 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "lodash",
"product_name": "Lodash",
"version": {
"version_data": [
{
"version_affected": ">=",
"version_value": "0"
"version_value": "prior to 4.17.21"
}
]
}
}
]
},
"vendor_name": "n/a"
},
{
"product": {
"product_data": [
{
"product_name": "org.fujion.webjars:lodash",
"version": {
"version_data": [
{
"version_affected": ">=",
"version_value": "0"
}
]
}
}
]
},
"vendor_name": "n/a"
}
}
]
}
@ -111,7 +92,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package lodash; all versions of package org.fujion.webjars:lodash are vulnerable to Command Injection via template."
"value": "Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function."
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36",
"name": "https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee",
"name": "https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178",
"name": "https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3",
"name": "https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6",
"name": "https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864",
"name": "https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6",
"name": "https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8",
"name": "https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8",
"name": "https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c",
"name": "https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120",
"name": "https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b",
"name": "https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3",
"name": "https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3"
}
]
},

View File

@ -43,7 +43,7 @@
"description_data": [
{
"lang": "eng",
"value": "Unvalidated input and lack of output encoding in the Testimonials Widget WordPress plugin, versions before 4.0.0, lead to multiple Cross-Site Scripting vulnerabilities, allowing remote attackers to inject arbitrary JavaScript code or HTML via the below parameters:\n\n- Author\n- Job Title\n- Location\n- Company\n- Email\n- URL"
"value": "Unvalidated input and lack of output encoding in the Testimonials Widget WordPress plugin, versions before 4.0.0, lead to multiple Cross-Site Scripting vulnerabilities, allowing remote attackers to inject arbitrary JavaScript code or HTML via the below parameters: - Author - Job Title - Location - Company - Email - URL"
}
]
},
@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1",
"name": "https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3",
"name": "https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151",
"name": "https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28",
"name": "https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056",
"name": "https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93",
"name": "https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14",
"name": "https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b",
"name": "https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48",
"name": "https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610",
"name": "https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc",
"name": "https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f",
"name": "https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882",
"name": "https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882"
}
]
},

View File

@ -65,8 +65,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0"
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0",
"name": "https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0"
}
]
},

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26215",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-26215",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditDocument.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://seeddms.com",
"refsource": "MISC",
"name": "http://seeddms.com"
},
{
"refsource": "MISC",
"name": "https://tuhin1729.medium.com/cve-2021-26215-7ce6800be822",
"url": "https://tuhin1729.medium.com/cve-2021-26215-7ce6800be822"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26216",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-26216",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditFolder.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://seeddms.com",
"refsource": "MISC",
"name": "http://seeddms.com"
},
{
"refsource": "MISC",
"name": "https://tuhin1729.medium.com/cve-2021-26216-ffb33321dc91",
"url": "https://tuhin1729.medium.com/cve-2021-26216-ffb33321dc91"
}
]
}

View File

@ -156,6 +156,11 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/161846/Microsoft-Exchange-2019-SSRF-Arbitrary-File-Write.html",
"url": "http://packetstormsecurity.com/files/161846/Microsoft-Exchange-2019-SSRF-Arbitrary-File-Write.html"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76",
"url": "https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76"
},
{
"refsource": "MISC",
"name": "https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566",
"url": "https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-28145",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-28145",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Concrete CMS (formerly concrete5) before 8.5.5 allows remote authenticated users to conduct XSS attacks via a crafted survey block. This requires at least Editor privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.concrete5.org/developers/security",
"refsource": "MISC",
"name": "https://www.concrete5.org/developers/security"
},
{
"refsource": "CONFIRM",
"name": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes",
"url": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-28788",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-28789",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The unofficial apple/swift-format extension before 1.1.2 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted apple-swift-format.path configuration value that triggers execution upon opening the workspace."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/vknabel/vscode-apple-swift-format/releases/tag/1.1.2",
"refsource": "MISC",
"name": "https://github.com/vknabel/vscode-apple-swift-format/releases/tag/1.1.2"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-28790",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The unofficial SwiftLint extension before 1.4.5 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted swiftlint.path configuration value that triggers execution upon opening the workspace."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/vknabel/vscode-swiftlint/releases/tag/1.4.5",
"refsource": "MISC",
"name": "https://github.com/vknabel/vscode-swiftlint/releases/tag/1.4.5"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-28791",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The unofficial SwiftFormat extension before 1.3.7 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted swiftformat.path configuration value that triggers execution upon opening the workspace."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/vknabel/vscode-swiftformat/releases/tag/1.3.7",
"refsource": "MISC",
"name": "https://github.com/vknabel/vscode-swiftformat/releases/tag/1.3.7"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-28792",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The unofficial Swift Development Environment extension before 2.12.1 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted sourcekit-lsp.serverPath, swift.languageServerPath, swift.path.sourcekite, swift.path.sourcekiteDockerMode, swift.path.swift_driver_bin, or swift.path.shell configuration value that triggers execution upon opening the workspace."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/vknabel/vscode-swift-development-environment/releases/tag/2.12.1",
"refsource": "MISC",
"name": "https://github.com/vknabel/vscode-swift-development-environment/releases/tag/2.12.1"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-28793",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-28794",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The unofficial ShellCheck extension before 0.13.4 for Visual Studio Code mishandles shellcheck.executablePath."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/timonwong/vscode-shellcheck/pull/181",
"refsource": "MISC",
"name": "https://github.com/timonwong/vscode-shellcheck/pull/181"
},
{
"url": "https://github.com/timonwong/vscode-shellcheck/releases/tag/v0.13.4",
"refsource": "MISC",
"name": "https://github.com/timonwong/vscode-shellcheck/releases/tag/v0.13.4"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-28795",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-28796",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Increments Qiita::Markdown before 0.33.0 allows XSS in transformers."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/increments/qiita-markdown/compare/v0.32.0...v0.33.0",
"refsource": "MISC",
"name": "https://github.com/increments/qiita-markdown/compare/v0.32.0...v0.33.0"
}
]
}
}

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html"
},
{
"refsource": "MISC",
"name": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes",
"url": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes"
}
]
}