Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit 4de668d

Browse files
committed
"-Synchronized-Data."
1 parent 8c76c24 commit 4de668d

21 files changed

+369
-23
lines changed

2020/22xxx/CVE-2020-22120.json

Lines changed: 50 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,61 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
6-
"ID": "CVE-2020-22120",
73
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
4+
"ID": "CVE-2020-22120",
5+
"STATE": "PUBLIC"
96
},
7+
"affects": {
8+
"vendor": {
9+
"vendor_data": [
10+
{
11+
"product": {
12+
"product_data": [
13+
{
14+
"product_name": "n/a",
15+
"version": {
16+
"version_data": [
17+
{
18+
"version_value": "n/a"
19+
}
20+
]
21+
}
22+
}
23+
]
24+
},
25+
"vendor_name": "n/a"
26+
}
27+
]
28+
}
29+
},
30+
"data_format": "MITRE",
31+
"data_type": "CVE",
32+
"data_version": "4.0",
1033
"description": {
1134
"description_data": [
1235
{
1336
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
37+
"value": "A remote code execution (RCE) vulnerability in /root/run/adm.php?admin-ediy&part=exdiy of imcat v5.1 allows authenticated attackers to execute arbitrary code."
38+
}
39+
]
40+
},
41+
"problemtype": {
42+
"problemtype_data": [
43+
{
44+
"description": [
45+
{
46+
"lang": "eng",
47+
"value": "n/a"
48+
}
49+
]
50+
}
51+
]
52+
},
53+
"references": {
54+
"reference_data": [
55+
{
56+
"url": "https://github.com/peacexie/imcat/issues/3",
57+
"refsource": "MISC",
58+
"name": "https://github.com/peacexie/imcat/issues/3"
1559
}
1660
]
1761
}

2020/22xxx/CVE-2020-22122.json

Lines changed: 50 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,61 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
6-
"ID": "CVE-2020-22122",
73
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
4+
"ID": "CVE-2020-22122",
5+
"STATE": "PUBLIC"
96
},
7+
"affects": {
8+
"vendor": {
9+
"vendor_data": [
10+
{
11+
"product": {
12+
"product_data": [
13+
{
14+
"product_name": "n/a",
15+
"version": {
16+
"version_data": [
17+
{
18+
"version_value": "n/a"
19+
}
20+
]
21+
}
22+
}
23+
]
24+
},
25+
"vendor_name": "n/a"
26+
}
27+
]
28+
}
29+
},
30+
"data_format": "MITRE",
31+
"data_type": "CVE",
32+
"data_version": "4.0",
1033
"description": {
1134
"description_data": [
1235
{
1336
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
37+
"value": "A SQL injection vulnerability in /oa.php?c=Staff&a=read of Find a Place LJCMS v 1.3 allows attackers to access sensitive database information via a crafted POST request."
38+
}
39+
]
40+
},
41+
"problemtype": {
42+
"problemtype_data": [
43+
{
44+
"description": [
45+
{
46+
"lang": "eng",
47+
"value": "n/a"
48+
}
49+
]
50+
}
51+
]
52+
},
53+
"references": {
54+
"reference_data": [
55+
{
56+
"url": "https://github.com/876054426/vul/blob/master/ljcms_sql.md",
57+
"refsource": "MISC",
58+
"name": "https://github.com/876054426/vul/blob/master/ljcms_sql.md"
1559
}
1660
]
1761
}

2020/22xxx/CVE-2020-22124.json

Lines changed: 50 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,61 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
6-
"ID": "CVE-2020-22124",
73
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
4+
"ID": "CVE-2020-22124",
5+
"STATE": "PUBLIC"
96
},
7+
"affects": {
8+
"vendor": {
9+
"vendor_data": [
10+
{
11+
"product": {
12+
"product_data": [
13+
{
14+
"product_name": "n/a",
15+
"version": {
16+
"version_data": [
17+
{
18+
"version_value": "n/a"
19+
}
20+
]
21+
}
22+
}
23+
]
24+
},
25+
"vendor_name": "n/a"
26+
}
27+
]
28+
}
29+
},
30+
"data_format": "MITRE",
31+
"data_type": "CVE",
32+
"data_version": "4.0",
1033
"description": {
1134
"description_data": [
1235
{
1336
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
37+
"value": "A vulnerability in the \\inc\\config.php component of joyplus-cms v1.6 allows attackers to access sensitive information."
38+
}
39+
]
40+
},
41+
"problemtype": {
42+
"problemtype_data": [
43+
{
44+
"description": [
45+
{
46+
"lang": "eng",
47+
"value": "n/a"
48+
}
49+
]
50+
}
51+
]
52+
},
53+
"references": {
54+
"reference_data": [
55+
{
56+
"url": "https://github.com/876054426/vul/issues/1",
57+
"refsource": "MISC",
58+
"name": "https://github.com/876054426/vul/issues/1"
1559
}
1660
]
1761
}

2021/21xxx/CVE-2021-21837.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,11 @@
4444
},
4545
"references": {
4646
"reference_data": [
47+
{
48+
"refsource": "MISC",
49+
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
50+
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
51+
},
4752
{
4853
"refsource": "MISC",
4954
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",

2021/21xxx/CVE-2021-21838.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,11 @@
4444
},
4545
"references": {
4646
"reference_data": [
47+
{
48+
"refsource": "MISC",
49+
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
50+
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
51+
},
4752
{
4853
"refsource": "MISC",
4954
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",

2021/21xxx/CVE-2021-21839.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,11 @@
4444
},
4545
"references": {
4646
"reference_data": [
47+
{
48+
"refsource": "MISC",
49+
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
50+
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
51+
},
4752
{
4853
"refsource": "MISC",
4954
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",

2021/21xxx/CVE-2021-21843.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,11 @@
4444
},
4545
"references": {
4646
"reference_data": [
47+
{
48+
"refsource": "MISC",
49+
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
50+
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
51+
},
4752
{
4853
"refsource": "MISC",
4954
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",

2021/21xxx/CVE-2021-21844.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,11 @@
4444
},
4545
"references": {
4646
"reference_data": [
47+
{
48+
"refsource": "MISC",
49+
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
50+
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
51+
},
4752
{
4853
"refsource": "MISC",
4954
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",

2021/21xxx/CVE-2021-21845.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,11 @@
4444
},
4545
"references": {
4646
"reference_data": [
47+
{
48+
"refsource": "MISC",
49+
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
50+
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
51+
},
4752
{
4853
"refsource": "MISC",
4954
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",

2021/21xxx/CVE-2021-21846.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,11 @@
4444
},
4545
"references": {
4646
"reference_data": [
47+
{
48+
"refsource": "MISC",
49+
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297",
50+
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297"
51+
},
4752
{
4853
"refsource": "MISC",
4954
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297",

0 commit comments

Comments
 (0)