From eca2eb7df7503056dd6c3afca210907ccb189acd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 30 Mar 2021 16:00:41 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23363.json | 17 ++++++++++------- 2021/27xxx/CVE-2021-27516.json | 5 +++++ 2 files changed, 15 insertions(+), 7 deletions(-) diff --git a/2021/23xxx/CVE-2021-23363.json b/2021/23xxx/CVE-2021-23363.json index b299a29d2a0..6aeb35821f4 100644 --- a/2021/23xxx/CVE-2021-23363.json +++ b/2021/23xxx/CVE-2021-23363.json @@ -48,16 +48,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531" + "refsource": "MISC", + "url": "https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531", + "name": "https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531" }, { - "refsource": "CONFIRM", - "url": "https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8" + "refsource": "MISC", + "url": "https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8", + "name": "https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8" }, { - "refsource": "CONFIRM", - "url": "https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4" + "refsource": "MISC", + "url": "https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4", + "name": "https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4" } ] }, @@ -65,7 +68,7 @@ "description_data": [ { "lang": "eng", - "value": "This affects the package kill-by-port before 0.0.2.\n If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands.\r\nThis is due to use of the child_process exec function without input sanitization.\r\n\r\n\r\n" + "value": "This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization." } ] }, diff --git a/2021/27xxx/CVE-2021-27516.json b/2021/27xxx/CVE-2021-27516.json index a5815779be3..54fa24b8830 100644 --- a/2021/27xxx/CVE-2021-27516.json +++ b/2021/27xxx/CVE-2021-27516.json @@ -61,6 +61,11 @@ "url": "https://github.com/medialize/URI.js/releases/tag/v1.19.6", "refsource": "MISC", "name": "https://github.com/medialize/URI.js/releases/tag/v1.19.6" + }, + { + "refsource": "MISC", + "name": "https://advisory.checkmarx.net/advisory/CX-2021-4305", + "url": "https://advisory.checkmarx.net/advisory/CX-2021-4305" } ] }