mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-10 02:04:31 +00:00
CVE-2021-4243 + CVE-2021-4244
This commit is contained in:
parent
2b504f6c1a
commit
fd81f1ebcb
@ -4,14 +4,87 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-4243",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"TITLE": "claviska jquery-minicolors jquery.minicolors.js cross site scripting",
|
||||
"REQUESTER": "cna@vuldb.com",
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"generator": "vuldb.com",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "claviska",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "jquery-minicolors",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "2.3.0"
|
||||
},
|
||||
{
|
||||
"version_value": "2.3.1"
|
||||
},
|
||||
{
|
||||
"version_value": "2.3.2"
|
||||
},
|
||||
{
|
||||
"version_value": "2.3.3"
|
||||
},
|
||||
{
|
||||
"version_value": "2.3.4"
|
||||
},
|
||||
{
|
||||
"version_value": "2.3.5"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability was found in claviska jquery-minicolors up to 2.3.5. It has been rated as problematic. Affected by this issue is some unknown functionality of the file jquery.minicolors.js. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 2.3.6 is able to address this issue. The name of the patch is ef134824a7f4110ada53ea6c173111a4fa2f48f3. It is recommended to upgrade the affected component. VDB-215306 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "3.5",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/github.com\/claviska\/jquery-minicolors\/commit\/ef134824a7f4110ada53ea6c173111a4fa2f48f3"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/github.com\/claviska\/jquery-minicolors\/releases\/tag\/2.3.6"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.215306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,90 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-4244",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"TITLE": "yikes-inc-easy-mailchimp-extender Plugin add_field_to_form.php cross site scripting",
|
||||
"REQUESTER": "cna@vuldb.com",
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"generator": "vuldb.com",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "yikes-inc-easy-mailchimp-extender Plugin",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "6.8.0"
|
||||
},
|
||||
{
|
||||
"version_value": "6.8.1"
|
||||
},
|
||||
{
|
||||
"version_value": "6.8.2"
|
||||
},
|
||||
{
|
||||
"version_value": "6.8.3"
|
||||
},
|
||||
{
|
||||
"version_value": "6.8.4"
|
||||
},
|
||||
{
|
||||
"version_value": "6.8.5"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability classified as problematic has been found in yikes-inc-easy-mailchimp-extender Plugin up to 6.8.5. This affects an unknown part of the file admin\/partials\/ajax\/add_field_to_form.php. The manipulation of the argument field_name\/merge_tag\/field_type\/list_id leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 6.8.6 is able to address this issue. The name of the patch is 3662c6593aa1bb4286781214891d26de2e947695. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215307."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "2.6",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:H\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/github.com\/EvanHerman\/yikes-inc-easy-mailchimp-extender\/pull\/889"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/github.com\/EvanHerman\/yikes-inc-easy-mailchimp-extender\/releases\/tag\/6.8.6"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/github.com\/EvanHerman\/yikes-inc-easy-mailchimp-extender\/commit\/3662c6593aa1bb4286781214891d26de2e947695"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.215307"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user