mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
f25edfda0e
commit
fc33a122d8
@ -52,20 +52,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/h2database/h2database/issues/3195",
|
||||
"name": "https://github.com/h2database/h2database/issues/3195"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/h2database/h2database/pull/3199"
|
||||
"refsource": "MISC",
|
||||
"url": "https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238",
|
||||
"name": "https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/h2database/h2database/issues/3195"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/h2database/h2database/pull/3199",
|
||||
"name": "https://github.com/h2database/h2database/pull/3199"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3",
|
||||
"name": "https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -73,7 +77,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The package com.h2database:h2 from 0 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.\n"
|
||||
"value": "The package com.h2database:h2 from 0 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,8 +48,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-COMB-1730083"
|
||||
"refsource": "MISC",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-COMB-1730083",
|
||||
"name": "https://snyk.io/vuln/SNYK-JS-COMB-1730083"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -57,7 +58,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "All versions of package comb are vulnerable to Prototype Pollution via the deepMerge() function.\r\n\r\n"
|
||||
"value": "All versions of package comb are vulnerable to Prototype Pollution via the deepMerge() function."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,16 +48,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880"
|
||||
"refsource": "MISC",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880",
|
||||
"name": "https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/simonhaenisch/md-to-pdf/issues/99"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/simonhaenisch/md-to-pdf/issues/99",
|
||||
"name": "https://github.com/simonhaenisch/md-to-pdf/issues/99"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a",
|
||||
"name": "https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -65,7 +68,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.\r\n\r\n"
|
||||
"value": "The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,8 +48,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-SEY-1727592"
|
||||
"refsource": "MISC",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-SEY-1727592",
|
||||
"name": "https://snyk.io/vuln/SNYK-JS-SEY-1727592"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -57,7 +58,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "All versions of package sey are vulnerable to Prototype Pollution via the deepmerge() function. \r\n\r\n"
|
||||
"value": "All versions of package sey are vulnerable to Prototype Pollution via the deepmerge() function."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,8 +48,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593"
|
||||
"refsource": "MISC",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593",
|
||||
"name": "https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -57,7 +58,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function.\r\n\r\n"
|
||||
"value": "All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -72,6 +72,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://github.com/grafana/grafana/commit/fd48aee61e4328aae8d5303a9efd045fa0ca308d",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/grafana/grafana/commit/fd48aee61e4328aae8d5303a9efd045fa0ca308d"
|
||||
},
|
||||
{
|
||||
"name": "https://grafana.com/blog/2021/12/10/grafana-8.3.2-and-7.5.12-released-with-moderate-severity-security-fix/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://grafana.com/blog/2021/12/10/grafana-8.3.2-and-7.5.12-released-with-moderate-severity-security-fix/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/grafana/grafana/security/advisories/GHSA-7533-c8qv-jm9m",
|
||||
"refsource": "CONFIRM",
|
||||
@ -82,20 +92,10 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/grafana/grafana/commit/d6ec6f8ad28f0212e584406730f939105ff6c6d3"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/grafana/grafana/commit/fd48aee61e4328aae8d5303a9efd045fa0ca308d",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/grafana/grafana/commit/fd48aee61e4328aae8d5303a9efd045fa0ca308d"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/grafana/grafana/releases/tag/v8.3.2",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/grafana/grafana/releases/tag/v8.3.2"
|
||||
},
|
||||
{
|
||||
"name": "https://grafana.com/blog/2021/12/10/grafana-8.3.2-and-7.5.12-released-with-moderate-severity-security-fix/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://grafana.com/blog/2021/12/10/grafana-8.3.2-and-7.5.12-released-with-moderate-severity-security-fix/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
18
2021/4xxx/CVE-2021-4096.json
Normal file
18
2021/4xxx/CVE-2021-4096.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-4096",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user