mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
61b64a533c
commit
ebbeb9ffe9
@ -243,6 +243,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[hbase-issues] 20210317 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
|
||||
"url": "https://lists.apache.org/thread.html/r02ba8db500d15a5949e9a7742815438002ba1cf1b361bdda52ed40ca@%3Cissues.hbase.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[hbase-issues] 20210318 [jira] [Commented] (HBASE-25568) Upgrade Thrift jar to fix CVE-2020-13949",
|
||||
"url": "https://lists.apache.org/thread.html/r8dfbefcd606af6737b62461a45a9af9222040b62eab474ff2287cf75@%3Cissues.hbase.apache.org%3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -56,6 +56,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.gruppotim.it/redteam",
|
||||
"url": "https://www.gruppotim.it/redteam"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.ts.fujitsu.com/IndexDownload.asp?Softwareguid=C67A44AE-B022-4150-8621-C4393C007ED9",
|
||||
"url": "https://support.ts.fujitsu.com/IndexDownload.asp?Softwareguid=C67A44AE-B022-4150-8621-C4393C007ED9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -13,40 +13,21 @@
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "lodash",
|
||||
"product_name": "Lodash",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "0"
|
||||
"version_value": "prior to 4.17.21"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
},
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "org.fujion.webjars:lodash",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -111,7 +92,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "All versions of package lodash; all versions of package org.fujion.webjars:lodash are vulnerable to Command Injection via template."
|
||||
"value": "Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36",
|
||||
"name": "https://wpscan.com/vulnerability/43aa30bf-eaf8-467a-93a1-78f9bdb37b36"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee",
|
||||
"name": "https://wpscan.com/vulnerability/8d0eb0b4-0cc0-44e5-b720-90b01df3a6ee"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178",
|
||||
"name": "https://wpscan.com/vulnerability/8591b3c9-b041-4ff5-b8d9-6f9f81041178"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3",
|
||||
"name": "https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6",
|
||||
"name": "https://wpscan.com/vulnerability/1fbd9f7a-6f99-45a2-9d57-01631a1f35d6"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864",
|
||||
"name": "https://wpscan.com/vulnerability/11dc3325-e696-4c9e-ba10-968416d5c864"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6",
|
||||
"name": "https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8",
|
||||
"name": "https://wpscan.com/vulnerability/46af9a4d-67ac-4e08-a753-a2a44245f4f8"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8",
|
||||
"name": "https://wpscan.com/vulnerability/1bc28021-28c0-43fa-b89e-6b93c345e5d8"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c",
|
||||
"name": "https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120",
|
||||
"name": "https://wpscan.com/vulnerability/a72a5be4-654b-496f-94cd-3814c0e40120"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b",
|
||||
"name": "https://wpscan.com/vulnerability/8f3cca92-d072-4806-9142-7f1a987f840b"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3",
|
||||
"name": "https://wpscan.com/vulnerability/07e9e70b-97a6-42e3-b0de-8cb69dedcbd3"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -43,7 +43,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Unvalidated input and lack of output encoding in the Testimonials Widget WordPress plugin, versions before 4.0.0, lead to multiple Cross-Site Scripting vulnerabilities, allowing remote attackers to inject arbitrary JavaScript code or HTML via the below parameters:\n\n- Author\n- Job Title\n- Location\n- Company\n- Email\n- URL"
|
||||
"value": "Unvalidated input and lack of output encoding in the Testimonials Widget WordPress plugin, versions before 4.0.0, lead to multiple Cross-Site Scripting vulnerabilities, allowing remote attackers to inject arbitrary JavaScript code or HTML via the below parameters: - Author - Job Title - Location - Company - Email - URL"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1",
|
||||
"name": "https://wpscan.com/vulnerability/537ee410-3833-4e88-9d4a-ee3c72b44ca1"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3",
|
||||
"name": "https://wpscan.com/vulnerability/9eb94e55-765b-4df5-baea-b247ef72aef3"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151",
|
||||
"name": "https://wpscan.com/vulnerability/aafac655-3616-4b27-9d0f-1cbc2faf0151"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28",
|
||||
"name": "https://wpscan.com/vulnerability/2e33088e-7b93-44af-aa6a-e5d924f86e28"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056",
|
||||
"name": "https://wpscan.com/vulnerability/1876312e-3dba-4909-97a5-afbb76fbc056"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93",
|
||||
"name": "https://wpscan.com/vulnerability/5c8adca0-fe19-4624-81ef-465b8d007f93"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14",
|
||||
"name": "https://wpscan.com/vulnerability/19800898-d7b6-4edd-887b-dac3c0597f14"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b",
|
||||
"name": "https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48",
|
||||
"name": "https://wpscan.com/vulnerability/143cdaff-c536-4ff9-8d64-c617511ddd48"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610",
|
||||
"name": "https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc",
|
||||
"name": "https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f",
|
||||
"name": "https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882",
|
||||
"name": "https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -65,8 +65,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0"
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0",
|
||||
"name": "https://wpscan.com/vulnerability/26819680-22a8-4348-b63d-dc52c0d50ed0"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,17 +1,66 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-26215",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2021-26215",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditDocument.php."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://seeddms.com",
|
||||
"refsource": "MISC",
|
||||
"name": "http://seeddms.com"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://tuhin1729.medium.com/cve-2021-26215-7ce6800be822",
|
||||
"url": "https://tuhin1729.medium.com/cve-2021-26215-7ce6800be822"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,66 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-26216",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2021-26216",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditFolder.php."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://seeddms.com",
|
||||
"refsource": "MISC",
|
||||
"name": "http://seeddms.com"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://tuhin1729.medium.com/cve-2021-26216-ffb33321dc91",
|
||||
"url": "https://tuhin1729.medium.com/cve-2021-26216-ffb33321dc91"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -156,6 +156,11 @@
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855",
|
||||
"refsource": "MISC",
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/161846/Microsoft-Exchange-2019-SSRF-Arbitrary-File-Write.html",
|
||||
"url": "http://packetstormsecurity.com/files/161846/Microsoft-Exchange-2019-SSRF-Arbitrary-File-Write.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76",
|
||||
"url": "https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566",
|
||||
"url": "https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,66 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-28145",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2021-28145",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Concrete CMS (formerly concrete5) before 8.5.5 allows remote authenticated users to conduct XSS attacks via a crafted survey block. This requires at least Editor privileges."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.concrete5.org/developers/security",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.concrete5.org/developers/security"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes",
|
||||
"url": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2021/28xxx/CVE-2021-28788.json
Normal file
18
2021/28xxx/CVE-2021-28788.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-28788",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2021/28xxx/CVE-2021-28789.json
Normal file
62
2021/28xxx/CVE-2021-28789.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2021-28789",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The unofficial apple/swift-format extension before 1.1.2 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted apple-swift-format.path configuration value that triggers execution upon opening the workspace."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/vknabel/vscode-apple-swift-format/releases/tag/1.1.2",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/vknabel/vscode-apple-swift-format/releases/tag/1.1.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2021/28xxx/CVE-2021-28790.json
Normal file
62
2021/28xxx/CVE-2021-28790.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2021-28790",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The unofficial SwiftLint extension before 1.4.5 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted swiftlint.path configuration value that triggers execution upon opening the workspace."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/vknabel/vscode-swiftlint/releases/tag/1.4.5",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/vknabel/vscode-swiftlint/releases/tag/1.4.5"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2021/28xxx/CVE-2021-28791.json
Normal file
62
2021/28xxx/CVE-2021-28791.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2021-28791",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The unofficial SwiftFormat extension before 1.3.7 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted swiftformat.path configuration value that triggers execution upon opening the workspace."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/vknabel/vscode-swiftformat/releases/tag/1.3.7",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/vknabel/vscode-swiftformat/releases/tag/1.3.7"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2021/28xxx/CVE-2021-28792.json
Normal file
62
2021/28xxx/CVE-2021-28792.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2021-28792",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The unofficial Swift Development Environment extension before 2.12.1 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted sourcekit-lsp.serverPath, swift.languageServerPath, swift.path.sourcekite, swift.path.sourcekiteDockerMode, swift.path.swift_driver_bin, or swift.path.shell configuration value that triggers execution upon opening the workspace."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/vknabel/vscode-swift-development-environment/releases/tag/2.12.1",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/vknabel/vscode-swift-development-environment/releases/tag/2.12.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/28xxx/CVE-2021-28793.json
Normal file
18
2021/28xxx/CVE-2021-28793.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-28793",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
67
2021/28xxx/CVE-2021-28794.json
Normal file
67
2021/28xxx/CVE-2021-28794.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2021-28794",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The unofficial ShellCheck extension before 0.13.4 for Visual Studio Code mishandles shellcheck.executablePath."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/timonwong/vscode-shellcheck/pull/181",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/timonwong/vscode-shellcheck/pull/181"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/timonwong/vscode-shellcheck/releases/tag/v0.13.4",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/timonwong/vscode-shellcheck/releases/tag/v0.13.4"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/28xxx/CVE-2021-28795.json
Normal file
18
2021/28xxx/CVE-2021-28795.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-28795",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2021/28xxx/CVE-2021-28796.json
Normal file
62
2021/28xxx/CVE-2021-28796.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2021-28796",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Increments Qiita::Markdown before 0.33.0 allows XSS in transformers."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/increments/qiita-markdown/compare/v0.32.0...v0.33.0",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/increments/qiita-markdown/compare/v0.32.0...v0.33.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -66,6 +66,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html",
|
||||
"url": "http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes",
|
||||
"url": "https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user