Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit 809c5e1

Browse files
committed
"-Synchronized-Data."
1 parent 82b4eef commit 809c5e1

26 files changed

+471
-37
lines changed

2006/1xxx/CVE-2006-1236.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,11 @@
9696
"name": "crossfire-setup-bo(25252)",
9797
"refsource": "XF",
9898
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25252"
99+
},
100+
{
101+
"refsource": "MISC",
102+
"name": "http://packetstormsecurity.com/files/163873/Crossfire-Server-1.0-Buffer-Overflow.html",
103+
"url": "http://packetstormsecurity.com/files/163873/Crossfire-Server-1.0-Buffer-Overflow.html"
99104
}
100105
]
101106
}

2017/17xxx/CVE-2017-17837.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,11 @@
6767
"refsource": "MLIST",
6868
"name": "[deltaspike-dev] 20210816 Another XSS vulnerability of the same type as CVE-2017-17837",
6969
"url": "https://lists.apache.org/thread.html/r78565f0f4ecb4ad32a6c405b45b9ee568dfc4729ba63e7d7cb6adf88@%3Cdev.deltaspike.apache.org%3E"
70+
},
71+
{
72+
"refsource": "MLIST",
73+
"name": "[deltaspike-dev] 20210818 Re: Another XSS vulnerability of the same type as CVE-2017-17837",
74+
"url": "https://lists.apache.org/thread.html/r17b326c0eb35d8c71c84c171eda83e3e1f011dc757781e34f2846018@%3Cdev.deltaspike.apache.org%3E"
7075
}
7176
]
7277
}

2020/18xxx/CVE-2020-18875.json

Lines changed: 55 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,66 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
6-
"ID": "CVE-2020-18875",
73
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
4+
"ID": "CVE-2020-18875",
5+
"STATE": "PUBLIC"
96
},
7+
"affects": {
8+
"vendor": {
9+
"vendor_data": [
10+
{
11+
"product": {
12+
"product_data": [
13+
{
14+
"product_name": "n/a",
15+
"version": {
16+
"version_data": [
17+
{
18+
"version_value": "n/a"
19+
}
20+
]
21+
}
22+
}
23+
]
24+
},
25+
"vendor_name": "n/a"
26+
}
27+
]
28+
}
29+
},
30+
"data_format": "MITRE",
31+
"data_type": "CVE",
32+
"data_version": "4.0",
1033
"description": {
1134
"description_data": [
1235
{
1336
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
37+
"value": "Incorrect Access Control in DotCMS versions before 5.1 allows remote attackers to gain privileges by injecting client configurations via vtl (velocity) files."
38+
}
39+
]
40+
},
41+
"problemtype": {
42+
"problemtype_data": [
43+
{
44+
"description": [
45+
{
46+
"lang": "eng",
47+
"value": "n/a"
48+
}
49+
]
50+
}
51+
]
52+
},
53+
"references": {
54+
"reference_data": [
55+
{
56+
"url": "https://dotcms.com/security/SI-51",
57+
"refsource": "MISC",
58+
"name": "https://dotcms.com/security/SI-51"
59+
},
60+
{
61+
"url": "https://github.com/dotCMS/core/issues/15882",
62+
"refsource": "MISC",
63+
"name": "https://github.com/dotCMS/core/issues/15882"
1564
}
1665
]
1766
}

2020/23xxx/CVE-2020-23069.json

Lines changed: 50 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,61 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
6-
"ID": "CVE-2020-23069",
73
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
4+
"ID": "CVE-2020-23069",
5+
"STATE": "PUBLIC"
96
},
7+
"affects": {
8+
"vendor": {
9+
"vendor_data": [
10+
{
11+
"product": {
12+
"product_data": [
13+
{
14+
"product_name": "n/a",
15+
"version": {
16+
"version_data": [
17+
{
18+
"version_value": "n/a"
19+
}
20+
]
21+
}
22+
}
23+
]
24+
},
25+
"vendor_name": "n/a"
26+
}
27+
]
28+
}
29+
},
30+
"data_format": "MITRE",
31+
"data_type": "CVE",
32+
"data_version": "4.0",
1033
"description": {
1134
"description_data": [
1235
{
1336
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
37+
"value": "Path Traversal vulneraility exists in webTareas 2.0 via the extpath parameter in general_serv.php, which could let a malicious user read arbitrary files."
38+
}
39+
]
40+
},
41+
"problemtype": {
42+
"problemtype_data": [
43+
{
44+
"description": [
45+
{
46+
"lang": "eng",
47+
"value": "n/a"
48+
}
49+
]
50+
}
51+
]
52+
},
53+
"references": {
54+
"reference_data": [
55+
{
56+
"url": "https://www.exploit-db.com/exploits/48312",
57+
"refsource": "MISC",
58+
"name": "https://www.exploit-db.com/exploits/48312"
1559
}
1660
]
1761
}

2020/28xxx/CVE-2020-28146.json

Lines changed: 60 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,71 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
6-
"ID": "CVE-2020-28146",
73
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
4+
"ID": "CVE-2020-28146",
5+
"STATE": "PUBLIC"
96
},
7+
"affects": {
8+
"vendor": {
9+
"vendor_data": [
10+
{
11+
"product": {
12+
"product_data": [
13+
{
14+
"product_name": "n/a",
15+
"version": {
16+
"version_data": [
17+
{
18+
"version_value": "n/a"
19+
}
20+
]
21+
}
22+
}
23+
]
24+
},
25+
"vendor_name": "n/a"
26+
}
27+
]
28+
}
29+
},
30+
"data_format": "MITRE",
31+
"data_type": "CVE",
32+
"data_version": "4.0",
1033
"description": {
1134
"description_data": [
1235
{
1336
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
37+
"value": "Cross Site Scripting (XSS) vulnerability exists in Eyoucms v1.4.7 and earlier via the addonfieldext parameter."
38+
}
39+
]
40+
},
41+
"problemtype": {
42+
"problemtype_data": [
43+
{
44+
"description": [
45+
{
46+
"lang": "eng",
47+
"value": "n/a"
48+
}
49+
]
50+
}
51+
]
52+
},
53+
"references": {
54+
"reference_data": [
55+
{
56+
"url": "https://www.exploit-db.com/exploits/48530",
57+
"refsource": "MISC",
58+
"name": "https://www.exploit-db.com/exploits/48530"
59+
},
60+
{
61+
"url": "https://github.com/eyoucms/eyoucms/issues/12",
62+
"refsource": "MISC",
63+
"name": "https://github.com/eyoucms/eyoucms/issues/12"
64+
},
65+
{
66+
"url": "https://www.eyoucms.com/ask/list_1_0/4511.html",
67+
"refsource": "MISC",
68+
"name": "https://www.eyoucms.com/ask/list_1_0/4511.html"
1569
}
1670
]
1771
}

2021/22xxx/CVE-2021-22555.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,11 @@
104104
"refsource": "CONFIRM",
105105
"name": "https://security.netapp.com/advisory/ntap-20210805-0010/",
106106
"url": "https://security.netapp.com/advisory/ntap-20210805-0010/"
107+
},
108+
{
109+
"refsource": "MISC",
110+
"name": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html",
111+
"url": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html"
107112
}
108113
]
109114
},

2021/23xxx/CVE-2021-23424.json

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -48,24 +48,27 @@
4848
"references": {
4949
"reference_data": [
5050
{
51-
"refsource": "CONFIRM",
52-
"url": "https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849"
51+
"refsource": "MISC",
52+
"url": "https://github.com/Tjatse/ansi-html/issues/19",
53+
"name": "https://github.com/Tjatse/ansi-html/issues/19"
5354
},
5455
{
55-
"refsource": "CONFIRM",
56-
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567198"
56+
"refsource": "MISC",
57+
"url": "https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849",
58+
"name": "https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849"
5759
},
5860
{
59-
"refsource": "CONFIRM",
60-
"url": "https://github.com/Tjatse/ansi-html/issues/19"
61+
"refsource": "MISC",
62+
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567198",
63+
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567198"
6164
}
6265
]
6366
},
6467
"description": {
6568
"description_data": [
6669
{
6770
"lang": "eng",
68-
"value": "This affects all versions of package ansi-html.\n If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.\r\n\r\n"
71+
"value": "This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time."
6972
}
7073
]
7174
},

2021/23xxx/CVE-2021-23425.json

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -48,24 +48,27 @@
4848
"references": {
4949
"reference_data": [
5050
{
51-
"refsource": "CONFIRM",
52-
"url": "https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850"
51+
"refsource": "MISC",
52+
"url": "https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850",
53+
"name": "https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850"
5354
},
5455
{
55-
"refsource": "CONFIRM",
56-
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197"
56+
"refsource": "MISC",
57+
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197",
58+
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197"
5759
},
5860
{
59-
"refsource": "CONFIRM",
60-
"url": "https://github.com/stevemao/trim-off-newlines/blob/master/index.js%23L6"
61+
"refsource": "MISC",
62+
"url": "https://github.com/stevemao/trim-off-newlines/blob/master/index.js%23L6",
63+
"name": "https://github.com/stevemao/trim-off-newlines/blob/master/index.js%23L6"
6164
}
6265
]
6366
},
6467
"description": {
6568
"description_data": [
6669
{
6770
"lang": "eng",
68-
"value": "All versions of package trim-off-newlines are vulnerable to Regular Expression Denial of Service (ReDoS) via string processing.\r\n\r\n"
71+
"value": "All versions of package trim-off-newlines are vulnerable to Regular Expression Denial of Service (ReDoS) via string processing."
6972
}
7073
]
7174
},

2021/32xxx/CVE-2021-32728.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,11 @@
6969
},
7070
"references": {
7171
"reference_data": [
72+
{
73+
"name": "https://hackerone.com/reports/1189162",
74+
"refsource": "MISC",
75+
"url": "https://hackerone.com/reports/1189162"
76+
},
7277
{
7378
"name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f5fr-5gcv-6cc5",
7479
"refsource": "CONFIRM",
@@ -78,11 +83,6 @@
7883
"name": "https://github.com/nextcloud/desktop/pull/3338",
7984
"refsource": "MISC",
8085
"url": "https://github.com/nextcloud/desktop/pull/3338"
81-
},
82-
{
83-
"name": "https://hackerone.com/reports/1189162",
84-
"refsource": "MISC",
85-
"url": "https://hackerone.com/reports/1189162"
8686
}
8787
]
8888
},

2021/32xxx/CVE-2021-32936.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,11 @@
5353
"refsource": "CONFIRM",
5454
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-365397.pdf",
5555
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-365397.pdf"
56+
},
57+
{
58+
"refsource": "MISC",
59+
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-982/",
60+
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-982/"
5661
}
5762
]
5863
},

0 commit comments

Comments
 (0)