"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-07-20 11:00:56 +00:00
parent 7873948680
commit 0a0e4eeffa
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
35 changed files with 294 additions and 11 deletions

View File

@ -71,6 +71,11 @@
"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.16",
"refsource": "MISC",
"name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.16"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0002/"
}
]
}

View File

@ -102,6 +102,16 @@
"refsource": "MLIST",
"name": "[jackrabbit-dev] 20210716 [GitHub] [jackrabbit-oak] nit0906 commented on pull request #326: OAK-9496 | Update zookeeper version to handle CVE-2018-8012",
"url": "https://lists.apache.org/thread.html/rc5bc4ddb0deabf8cfb69378cecee56fcdc76929bea9e6373cb863870@%3Cdev.jackrabbit.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[jackrabbit-oak-commits] 20210720 [jackrabbit-oak] branch trunk updated: OAK-9496 | Update zookeeper version to handle CVE-2018-8012 (#326)",
"url": "https://lists.apache.org/thread.html/r73daf1fc5d85677d9a854707e1908d14e174b7bbb0c603709c0ab33f@%3Coak-commits.jackrabbit.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[jackrabbit-dev] 20210720 [GitHub] [jackrabbit-oak] nit0906 merged pull request #326: OAK-9496 | Update zookeeper version to handle CVE-2018-8012",
"url": "https://lists.apache.org/thread.html/re3a4048e9515d4afea416df907a612ed384a16c57cf99e97ee4a12f2@%3Cdev.jackrabbit.apache.org%3E"
}
]
}

View File

@ -71,6 +71,11 @@
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbb2483b2a46fbaf833cfb5deb5ed9cace9c7399",
"refsource": "MISC",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbb2483b2a46fbaf833cfb5deb5ed9cace9c7399"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0003/"
}
]
}

View File

@ -83,6 +83,11 @@
"name": "https://github.com/pjsip/pjproject/pull/2663",
"refsource": "MISC",
"url": "https://github.com/pjsip/pjproject/pull/2663"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-42",
"url": "https://security.gentoo.org/glsa/202107-42"
}
]
},

View File

@ -71,6 +71,11 @@
"refsource": "MISC",
"name": "https://git.qemu.org/?p=qemu.git;a=commit;h=bea2a9e3e00b275dc40cfa09c760c715b8753e03",
"url": "https://git.qemu.org/?p=qemu.git;a=commit;h=bea2a9e3e00b275dc40cfa09c760c715b8753e03"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0010/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0010/"
}
]
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1910346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910346"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0008/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0008/"
}
]
},

View File

@ -71,6 +71,11 @@
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10",
"refsource": "MISC",
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0004/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0004/"
}
]
}

View File

@ -84,6 +84,11 @@
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190909",
"name": "ibm-db2-cve20204885-sym-link (190909)"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0006/"
}
]
}

View File

@ -61,6 +61,11 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191945",
"refsource": "XF",
"title": "X-Force Vulnerability Report"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0006/"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:31.icmp6.asc",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:31.icmp6.asc"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0001/"
}
]
},

View File

@ -1,18 +1,97 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "vuln@krcert.or.kr",
"ID": "CVE-2020-7866",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Tobesoft XPLATFORM Arbitrary Command Execution Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "XPLATFORM",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "9.2.2.270"
}
]
}
}
]
},
"vendor_name": "Tobesoft"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Thanks to Jeongun Baek for reporting this vulnerability"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "When using XPLATFORM 9.2.2.270 or earlier versions ActiveX component, arbitrary commands can be executed due to improper input validation"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "http://support.tobesoft.co.kr/Support/index.html",
"name": "http://support.tobesoft.co.kr/Support/index.html"
},
{
"refsource": "MISC",
"url": "https://krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=36082",
"name": "https://krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=36082"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -58,6 +58,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1927007",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927007"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0009/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0009/"
}
]
},

View File

@ -58,6 +58,11 @@
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-43",
"url": "https://security.gentoo.org/glsa/202107-43"
}
]
},

View File

@ -68,6 +68,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-662680e477",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-43",
"url": "https://security.gentoo.org/glsa/202107-43"
}
]
},

View File

@ -73,6 +73,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-af806dd42d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FVJRXUOBN56ZWP6QQ3NTA6DIFZMDZAEQ/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-47",
"url": "https://security.gentoo.org/glsa/202107-47"
}
]
},

View File

@ -46,6 +46,11 @@
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/196770",
"name": "ibm-cognos-cve202120461-gain-access (196770)"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0007/"
}
]
},

View File

@ -49,6 +49,11 @@
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199283",
"name": "ibm-db2-cve202120579-info-disc (199283)"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0006/"
}
]
},

View File

@ -88,6 +88,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210523 [SECURITY] [DLA 2665-1] ring security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00020.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-42",
"url": "https://security.gentoo.org/glsa/202107-42"
}
]
},

View File

@ -71,7 +71,7 @@
"description_data": [
{
"lang": "eng",
"value": "A buffer overflow vulnerability in FortiAnalyzer CLI 6.4.5 and below, 6.2.7 and below, 6.0.x and FortiManager CLI 6.4.5 and below, 6.2.7 and below, 6.0.x may allow an authenticated, local attacker to perform a Denial of Service attack by running the `diagnose system geoip-city` command with a large ip value."
"value": "A buffer overflow vulnerability in FortiAnalyzer CLI 6.4.5 and below, 6.2.7 and below, 6.0.x and FortiManager CLI 6.4.5 and below, 6.2.7 and below, 6.0.x may allow an authenticated, local attacker to perform a Denial of Service attack by running the `diagnose system geoip-city` command with a large ip value."
}
]
}

View File

@ -71,7 +71,7 @@
"description_data": [
{
"lang": "eng",
"value": "The combination of various cryptographic issues in the session management of FortiMail 6.4.0 through 6.4.4 and 6.2.0 through 6.2.6, including\u00a0the encryption construction of the session\u00a0cookie,\u00a0may allow a remote attacker already in possession of a cookie to possibly reveal and alter or forge its content, thereby escalating privileges."
"value": "The combination of various cryptographic issues in the session management of FortiMail 6.4.0 through 6.4.4 and 6.2.0 through 6.2.6, including the encryption construction of the session cookie, may allow a remote attacker already in possession of a cookie to possibly reveal and alter or forge its content, thereby escalating privileges."
}
]
}

View File

@ -198,6 +198,11 @@
"refsource": "MLIST",
"name": "[karaf-issues] 20210719 [jira] [Assigned] (KARAF-7223) Upgrade maven artifacts to mitigate CVE-2021-26291",
"url": "https://lists.apache.org/thread.html/r07a89b32783f73bda6903c1f9aadeb859e5bef0a4daed6d87db8e4a9@%3Cissues.karaf.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[karaf-issues] 20210720 [jira] [Commented] (KARAF-7224) Impact of CVE-2021-26291 on Karaf",
"url": "https://lists.apache.org/thread.html/r96cc126d3ee9aa42af9d3bb4baa94828b0a5f656584a50dcc594125f@%3Cissues.karaf.apache.org%3E"
}
]
},

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27021",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@puppet.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Puppet DB",
"version": {
"version_data": [
{
"version_value": "All prior versions before Puppet DB 6.17.0, 7.4.1, Puppet Platform 6.23, 7.8.0 and PE 2021.2, 2019.8.7"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "[CWE-1027|https://cwe.mitre.org/data/definitions/1027.html]"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://puppet.com/security/cve/cve-2021-27021/",
"url": "https://puppet.com/security/cve/cve-2021-27021/"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A flaw was discovered in Puppet DB, this flaw results in an escalation of privileges which allows the user to delete tables via an SQL query."
}
]
}

View File

@ -72,6 +72,11 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/200658",
"refsource": "XF",
"title": "X-Force Vulnerability Report"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0005/"
}
]
},

View File

@ -26,6 +26,11 @@
"refsource": "XF",
"name": "ibm-db2-cve202129703-dos (200659)",
"title": "X-Force Vulnerability Report"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0006/"
}
]
},

View File

@ -96,6 +96,11 @@
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/203031",
"title": "X-Force Vulnerability Report"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0006/"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/",
"url": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-45",
"url": "https://security.gentoo.org/glsa/202107-45"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "MISC",
"name": "https://github.com/mpv-player/mpv/commit/d0c530919d8cd4d7a774e38ab064e0fabdae34e6",
"url": "https://github.com/mpv-player/mpv/commit/d0c530919d8cd4d7a774e38ab064e0fabdae34e6"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-46",
"url": "https://security.gentoo.org/glsa/202107-46"
}
]
}

View File

@ -63,6 +63,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-43",
"url": "https://security.gentoo.org/glsa/202107-43"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1958935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958935"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0008/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0008/"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1958955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958955"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0008/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0008/"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1958978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958978"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0008/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0008/"
}
]
},

View File

@ -58,6 +58,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-7cd749f133",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-44",
"url": "https://security.gentoo.org/glsa/202107-44"
}
]
},

View File

@ -58,6 +58,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-7cd749f133",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-44",
"url": "https://security.gentoo.org/glsa/202107-44"
}
]
},

View File

@ -58,6 +58,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-7cd749f133",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-44",
"url": "https://security.gentoo.org/glsa/202107-44"
}
]
},

View File

@ -58,6 +58,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-7cd749f133",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-44",
"url": "https://security.gentoo.org/glsa/202107-44"
}
]
},