"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-10-01 22:00:52 +00:00
parent 7a5691dbb3
commit f2cdb6cb2b
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
7 changed files with 19 additions and 19 deletions

View File

@ -45,9 +45,9 @@
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://cwe.mitre.org/data/definitions/266.html",
"url": "https://cwe.mitre.org/data/definitions/266.html"
"refsource": "CONFIRM",
"name": "https://explore.zoom.us/en/trust/security/security-bulletin/",
"url": "https://explore.zoom.us/en/trust/security/security-bulletin/"
}
]
},

View File

@ -45,9 +45,9 @@
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://cwe.mitre.org/data/definitions/266.html",
"url": "https://cwe.mitre.org/data/definitions/266.html"
"refsource": "CONFIRM",
"name": "https://explore.zoom.us/en/trust/security/security-bulletin/",
"url": "https://explore.zoom.us/en/trust/security/security-bulletin/"
}
]
},

View File

@ -45,9 +45,9 @@
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://cwe.mitre.org/data/definitions/367.html",
"url": "https://cwe.mitre.org/data/definitions/367.html"
"refsource": "CONFIRM",
"name": "https://explore.zoom.us/en/trust/security/security-bulletin/",
"url": "https://explore.zoom.us/en/trust/security/security-bulletin/"
}
]
},

View File

@ -45,9 +45,9 @@
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://cwe.mitre.org/data/definitions/78.html",
"url": "https://cwe.mitre.org/data/definitions/78.html"
"refsource": "CONFIRM",
"name": "https://explore.zoom.us/en/trust/security/security-bulletin/",
"url": "https://explore.zoom.us/en/trust/security/security-bulletin/"
}
]
},

View File

@ -45,9 +45,9 @@
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://cwe.mitre.org/data/definitions/400.html",
"url": "https://cwe.mitre.org/data/definitions/400.html"
"refsource": "CONFIRM",
"name": "https://explore.zoom.us/en/trust/security/security-bulletin/",
"url": "https://explore.zoom.us/en/trust/security/security-bulletin/"
}
]
},

View File

@ -45,9 +45,9 @@
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://cwe.mitre.org/data/definitions/78.html",
"url": "https://cwe.mitre.org/data/definitions/78.html"
"refsource": "CONFIRM",
"name": "https://explore.zoom.us/en/trust/security/security-bulletin/",
"url": "https://explore.zoom.us/en/trust/security/security-bulletin/"
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "A command injection vulnerability in Lodash in 4.17.21 allows attackers to arbitrary code execution via the template function. NOTE: this is a different parameter, method, and version than CVE-2021-23337."
"value": "** DISPUTED ** A command injection vulnerability in Lodash 4.17.21 allows attackers to achieve arbitrary code execution via the template function. This is a different parameter, method, and version than CVE-2021-23337. NOTE: the vendor's position is that it's the developer's responsibility to ensure that a template does not evaluate code that originates from untrusted input."
}
]
},