mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
9369a8f0ab
commit
fb29c827b7
@ -43,7 +43,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later. "
|
||||
"value": "A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -70,12 +70,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-40369"
|
||||
"refsource": "MISC",
|
||||
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-40369",
|
||||
"name": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-40369"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://lists.apache.org/thread/r2j00nrnpjgcmoxvlv3pgfoq9kzrcsfh"
|
||||
"refsource": "MISC",
|
||||
"url": "https://lists.apache.org/thread/r2j00nrnpjgcmoxvlv3pgfoq9kzrcsfh",
|
||||
"name": "https://lists.apache.org/thread/r2j00nrnpjgcmoxvlv3pgfoq9kzrcsfh"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -88,4 +90,4 @@
|
||||
"value": "Apache JSPWiki users should upgrade to 2.11.0 or later. "
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -43,7 +43,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later. "
|
||||
"value": "Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -68,12 +68,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-44140"
|
||||
"refsource": "MISC",
|
||||
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-44140",
|
||||
"name": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-44140"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://lists.apache.org/thread/5qglpjdhvobppx7j550lf1sk28f6011t"
|
||||
"refsource": "MISC",
|
||||
"url": "https://lists.apache.org/thread/5qglpjdhvobppx7j550lf1sk28f6011t",
|
||||
"name": "https://lists.apache.org/thread/5qglpjdhvobppx7j550lf1sk28f6011t"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -86,4 +88,4 @@
|
||||
"value": "Apache JSPWiki users should upgrade to 2.11.0 or later. "
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/44xxx/CVE-2021-44196.json
Normal file
18
2021/44xxx/CVE-2021-44196.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-44196",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/44xxx/CVE-2021-44197.json
Normal file
18
2021/44xxx/CVE-2021-44197.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-44197",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user