diff --git a/2021/4xxx/CVE-2021-4243.json b/2021/4xxx/CVE-2021-4243.json index 84b2b6d5f3d..06efec52fa6 100644 --- a/2021/4xxx/CVE-2021-4243.json +++ b/2021/4xxx/CVE-2021-4243.json @@ -4,14 +4,87 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-4243", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "TITLE": "claviska jquery-minicolors jquery.minicolors.js cross site scripting", + "REQUESTER": "cna@vuldb.com", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "generator": "vuldb.com", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "claviska", + "product": { + "product_data": [ + { + "product_name": "jquery-minicolors", + "version": { + "version_data": [ + { + "version_value": "2.3.0" + }, + { + "version_value": "2.3.1" + }, + { + "version_value": "2.3.2" + }, + { + "version_value": "2.3.3" + }, + { + "version_value": "2.3.4" + }, + { + "version_value": "2.3.5" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in claviska jquery-minicolors up to 2.3.5. It has been rated as problematic. Affected by this issue is some unknown functionality of the file jquery.minicolors.js. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 2.3.6 is able to address this issue. The name of the patch is ef134824a7f4110ada53ea6c173111a4fa2f48f3. It is recommended to upgrade the affected component. VDB-215306 is the identifier assigned to this vulnerability." + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "baseScore": "3.5", + "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + } + }, + "references": { + "reference_data": [ + { + "url": "https:\/\/github.com\/claviska\/jquery-minicolors\/commit\/ef134824a7f4110ada53ea6c173111a4fa2f48f3" + }, + { + "url": "https:\/\/github.com\/claviska\/jquery-minicolors\/releases\/tag\/2.3.6" + }, + { + "url": "https:\/\/vuldb.com\/?id.215306" } ] } diff --git a/2021/4xxx/CVE-2021-4244.json b/2021/4xxx/CVE-2021-4244.json index 3c916366e97..587804ade00 100644 --- a/2021/4xxx/CVE-2021-4244.json +++ b/2021/4xxx/CVE-2021-4244.json @@ -4,14 +4,90 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-4244", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "TITLE": "yikes-inc-easy-mailchimp-extender Plugin add_field_to_form.php cross site scripting", + "REQUESTER": "cna@vuldb.com", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "generator": "vuldb.com", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "", + "product": { + "product_data": [ + { + "product_name": "yikes-inc-easy-mailchimp-extender Plugin", + "version": { + "version_data": [ + { + "version_value": "6.8.0" + }, + { + "version_value": "6.8.1" + }, + { + "version_value": "6.8.2" + }, + { + "version_value": "6.8.3" + }, + { + "version_value": "6.8.4" + }, + { + "version_value": "6.8.5" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting" + } + ] + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as problematic has been found in yikes-inc-easy-mailchimp-extender Plugin up to 6.8.5. This affects an unknown part of the file admin\/partials\/ajax\/add_field_to_form.php. The manipulation of the argument field_name\/merge_tag\/field_type\/list_id leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 6.8.6 is able to address this issue. The name of the patch is 3662c6593aa1bb4286781214891d26de2e947695. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215307." + } + ] + }, + "impact": { + "cvss": { + "version": "3.1", + "baseScore": "2.6", + "vectorString": "CVSS:3.1\/AV:N\/AC:H\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + } + }, + "references": { + "reference_data": [ + { + "url": "https:\/\/github.com\/EvanHerman\/yikes-inc-easy-mailchimp-extender\/pull\/889" + }, + { + "url": "https:\/\/github.com\/EvanHerman\/yikes-inc-easy-mailchimp-extender\/releases\/tag\/6.8.6" + }, + { + "url": "https:\/\/github.com\/EvanHerman\/yikes-inc-easy-mailchimp-extender\/commit\/3662c6593aa1bb4286781214891d26de2e947695" + }, + { + "url": "https:\/\/vuldb.com\/?id.215307" } ] }