"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-12-10 21:01:11 +00:00
parent f25edfda0e
commit fc33a122d8
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
7 changed files with 63 additions and 35 deletions

View File

@ -52,20 +52,24 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238"
"refsource": "MISC",
"url": "https://github.com/h2database/h2database/issues/3195",
"name": "https://github.com/h2database/h2database/issues/3195"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/h2database/h2database/pull/3199"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238",
"name": "https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/h2database/h2database/issues/3195"
"refsource": "MISC",
"url": "https://github.com/h2database/h2database/pull/3199",
"name": "https://github.com/h2database/h2database/pull/3199"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3"
"refsource": "MISC",
"url": "https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3",
"name": "https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3"
}
]
},
@ -73,7 +77,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package com.h2database:h2 from 0 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.\n"
"value": "The package com.h2database:h2 from 0 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability."
}
]
},

View File

@ -48,8 +48,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-COMB-1730083"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-COMB-1730083",
"name": "https://snyk.io/vuln/SNYK-JS-COMB-1730083"
}
]
},
@ -57,7 +58,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package comb are vulnerable to Prototype Pollution via the deepMerge() function.\r\n\r\n"
"value": "All versions of package comb are vulnerable to Prototype Pollution via the deepMerge() function."
}
]
},

View File

@ -48,16 +48,19 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880",
"name": "https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/simonhaenisch/md-to-pdf/issues/99"
"refsource": "MISC",
"url": "https://github.com/simonhaenisch/md-to-pdf/issues/99",
"name": "https://github.com/simonhaenisch/md-to-pdf/issues/99"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a"
"refsource": "MISC",
"url": "https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a",
"name": "https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a"
}
]
},
@ -65,7 +68,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.\r\n\r\n"
"value": "The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine."
}
]
},

View File

@ -48,8 +48,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-SEY-1727592"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-SEY-1727592",
"name": "https://snyk.io/vuln/SNYK-JS-SEY-1727592"
}
]
},
@ -57,7 +58,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package sey are vulnerable to Prototype Pollution via the deepmerge() function. \r\n\r\n"
"value": "All versions of package sey are vulnerable to Prototype Pollution via the deepmerge() function."
}
]
},

View File

@ -48,8 +48,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593",
"name": "https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593"
}
]
},
@ -57,7 +58,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function.\r\n\r\n"
"value": "All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function."
}
]
},

View File

@ -72,6 +72,16 @@
},
"references": {
"reference_data": [
{
"name": "https://github.com/grafana/grafana/commit/fd48aee61e4328aae8d5303a9efd045fa0ca308d",
"refsource": "MISC",
"url": "https://github.com/grafana/grafana/commit/fd48aee61e4328aae8d5303a9efd045fa0ca308d"
},
{
"name": "https://grafana.com/blog/2021/12/10/grafana-8.3.2-and-7.5.12-released-with-moderate-severity-security-fix/",
"refsource": "MISC",
"url": "https://grafana.com/blog/2021/12/10/grafana-8.3.2-and-7.5.12-released-with-moderate-severity-security-fix/"
},
{
"name": "https://github.com/grafana/grafana/security/advisories/GHSA-7533-c8qv-jm9m",
"refsource": "CONFIRM",
@ -82,20 +92,10 @@
"refsource": "MISC",
"url": "https://github.com/grafana/grafana/commit/d6ec6f8ad28f0212e584406730f939105ff6c6d3"
},
{
"name": "https://github.com/grafana/grafana/commit/fd48aee61e4328aae8d5303a9efd045fa0ca308d",
"refsource": "MISC",
"url": "https://github.com/grafana/grafana/commit/fd48aee61e4328aae8d5303a9efd045fa0ca308d"
},
{
"name": "https://github.com/grafana/grafana/releases/tag/v8.3.2",
"refsource": "MISC",
"url": "https://github.com/grafana/grafana/releases/tag/v8.3.2"
},
{
"name": "https://grafana.com/blog/2021/12/10/grafana-8.3.2-and-7.5.12-released-with-moderate-severity-security-fix/",
"refsource": "MISC",
"url": "https://grafana.com/blog/2021/12/10/grafana-8.3.2-and-7.5.12-released-with-moderate-severity-security-fix/"
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-4096",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}