"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-07-20 11:00:56 +00:00
parent 7873948680
commit 0a0e4eeffa
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
35 changed files with 294 additions and 11 deletions

View File

@ -71,6 +71,11 @@
"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.16",
"refsource": "MISC",
"name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.16"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0002/"
}
]
}

View File

@ -102,6 +102,16 @@
"refsource": "MLIST",
"name": "[jackrabbit-dev] 20210716 [GitHub] [jackrabbit-oak] nit0906 commented on pull request #326: OAK-9496 | Update zookeeper version to handle CVE-2018-8012",
"url": "https://lists.apache.org/thread.html/rc5bc4ddb0deabf8cfb69378cecee56fcdc76929bea9e6373cb863870@%3Cdev.jackrabbit.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[jackrabbit-oak-commits] 20210720 [jackrabbit-oak] branch trunk updated: OAK-9496 | Update zookeeper version to handle CVE-2018-8012 (#326)",
"url": "https://lists.apache.org/thread.html/r73daf1fc5d85677d9a854707e1908d14e174b7bbb0c603709c0ab33f@%3Coak-commits.jackrabbit.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[jackrabbit-dev] 20210720 [GitHub] [jackrabbit-oak] nit0906 merged pull request #326: OAK-9496 | Update zookeeper version to handle CVE-2018-8012",
"url": "https://lists.apache.org/thread.html/re3a4048e9515d4afea416df907a612ed384a16c57cf99e97ee4a12f2@%3Cdev.jackrabbit.apache.org%3E"
}
]
}

View File

@ -71,6 +71,11 @@
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbb2483b2a46fbaf833cfb5deb5ed9cace9c7399",
"refsource": "MISC",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbb2483b2a46fbaf833cfb5deb5ed9cace9c7399"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0003/"
}
]
}

View File

@ -83,6 +83,11 @@
"name": "https://github.com/pjsip/pjproject/pull/2663",
"refsource": "MISC",
"url": "https://github.com/pjsip/pjproject/pull/2663"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-42",
"url": "https://security.gentoo.org/glsa/202107-42"
}
]
},

View File

@ -71,6 +71,11 @@
"refsource": "MISC",
"name": "https://git.qemu.org/?p=qemu.git;a=commit;h=bea2a9e3e00b275dc40cfa09c760c715b8753e03",
"url": "https://git.qemu.org/?p=qemu.git;a=commit;h=bea2a9e3e00b275dc40cfa09c760c715b8753e03"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0010/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0010/"
}
]
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1910346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910346"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0008/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0008/"
}
]
},

View File

@ -71,6 +71,11 @@
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10",
"refsource": "MISC",
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0004/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0004/"
}
]
}

View File

@ -84,6 +84,11 @@
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190909",
"name": "ibm-db2-cve20204885-sym-link (190909)"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0006/"
}
]
}

View File

@ -61,6 +61,11 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191945",
"refsource": "XF",
"title": "X-Force Vulnerability Report"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0006/"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:31.icmp6.asc",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:31.icmp6.asc"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0001/"
}
]
},

View File

@ -1,18 +1,97 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "vuln@krcert.or.kr",
"ID": "CVE-2020-7866",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Tobesoft XPLATFORM Arbitrary Command Execution Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "XPLATFORM",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "9.2.2.270"
}
]
}
}
]
},
"vendor_name": "Tobesoft"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Thanks to Jeongun Baek for reporting this vulnerability"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "When using XPLATFORM 9.2.2.270 or earlier versions ActiveX component, arbitrary commands can be executed due to improper input validation"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "http://support.tobesoft.co.kr/Support/index.html",
"name": "http://support.tobesoft.co.kr/Support/index.html"
},
{
"refsource": "MISC",
"url": "https://krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=36082",
"name": "https://krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=36082"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -58,6 +58,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1927007",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927007"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0009/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0009/"
}
]
},

View File

@ -58,6 +58,11 @@
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-43",
"url": "https://security.gentoo.org/glsa/202107-43"
}
]
},

View File

@ -68,6 +68,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-662680e477",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-43",
"url": "https://security.gentoo.org/glsa/202107-43"
}
]
},

View File

@ -73,6 +73,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-af806dd42d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FVJRXUOBN56ZWP6QQ3NTA6DIFZMDZAEQ/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-47",
"url": "https://security.gentoo.org/glsa/202107-47"
}
]
},

View File

@ -46,6 +46,11 @@
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/196770",
"name": "ibm-cognos-cve202120461-gain-access (196770)"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0007/"
}
]
},

View File

@ -49,6 +49,11 @@
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199283",
"name": "ibm-db2-cve202120579-info-disc (199283)"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0006/"
}
]
},

View File

@ -88,6 +88,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210523 [SECURITY] [DLA 2665-1] ring security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00020.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-42",
"url": "https://security.gentoo.org/glsa/202107-42"
}
]
},

View File

@ -71,7 +71,7 @@
"description_data": [
{
"lang": "eng",
"value": "The combination of various cryptographic issues in the session management of FortiMail 6.4.0 through 6.4.4 and 6.2.0 through 6.2.6, including\u00a0the encryption construction of the session\u00a0cookie,\u00a0may allow a remote attacker already in possession of a cookie to possibly reveal and alter or forge its content, thereby escalating privileges."
"value": "The combination of various cryptographic issues in the session management of FortiMail 6.4.0 through 6.4.4 and 6.2.0 through 6.2.6, including the encryption construction of the session cookie, may allow a remote attacker already in possession of a cookie to possibly reveal and alter or forge its content, thereby escalating privileges."
}
]
}

View File

@ -198,6 +198,11 @@
"refsource": "MLIST",
"name": "[karaf-issues] 20210719 [jira] [Assigned] (KARAF-7223) Upgrade maven artifacts to mitigate CVE-2021-26291",
"url": "https://lists.apache.org/thread.html/r07a89b32783f73bda6903c1f9aadeb859e5bef0a4daed6d87db8e4a9@%3Cissues.karaf.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[karaf-issues] 20210720 [jira] [Commented] (KARAF-7224) Impact of CVE-2021-26291 on Karaf",
"url": "https://lists.apache.org/thread.html/r96cc126d3ee9aa42af9d3bb4baa94828b0a5f656584a50dcc594125f@%3Cissues.karaf.apache.org%3E"
}
]
},

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27021",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@puppet.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Puppet DB",
"version": {
"version_data": [
{
"version_value": "All prior versions before Puppet DB 6.17.0, 7.4.1, Puppet Platform 6.23, 7.8.0 and PE 2021.2, 2019.8.7"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "[CWE-1027|https://cwe.mitre.org/data/definitions/1027.html]"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://puppet.com/security/cve/cve-2021-27021/",
"url": "https://puppet.com/security/cve/cve-2021-27021/"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A flaw was discovered in Puppet DB, this flaw results in an escalation of privileges which allows the user to delete tables via an SQL query."
}
]
}

View File

@ -72,6 +72,11 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/200658",
"refsource": "XF",
"title": "X-Force Vulnerability Report"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0005/"
}
]
},

View File

@ -26,6 +26,11 @@
"refsource": "XF",
"name": "ibm-db2-cve202129703-dos (200659)",
"title": "X-Force Vulnerability Report"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0006/"
}
]
},

View File

@ -96,6 +96,11 @@
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/203031",
"title": "X-Force Vulnerability Report"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0006/"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/",
"url": "https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-45",
"url": "https://security.gentoo.org/glsa/202107-45"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "MISC",
"name": "https://github.com/mpv-player/mpv/commit/d0c530919d8cd4d7a774e38ab064e0fabdae34e6",
"url": "https://github.com/mpv-player/mpv/commit/d0c530919d8cd4d7a774e38ab064e0fabdae34e6"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-46",
"url": "https://security.gentoo.org/glsa/202107-46"
}
]
}

View File

@ -63,6 +63,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-43",
"url": "https://security.gentoo.org/glsa/202107-43"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1958935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958935"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0008/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0008/"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1958955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958955"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0008/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0008/"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1958978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958978"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210720-0008/",
"url": "https://security.netapp.com/advisory/ntap-20210720-0008/"
}
]
},

View File

@ -58,6 +58,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-7cd749f133",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-44",
"url": "https://security.gentoo.org/glsa/202107-44"
}
]
},

View File

@ -58,6 +58,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-7cd749f133",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-44",
"url": "https://security.gentoo.org/glsa/202107-44"
}
]
},

View File

@ -58,6 +58,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-7cd749f133",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-44",
"url": "https://security.gentoo.org/glsa/202107-44"
}
]
},

View File

@ -58,6 +58,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-7cd749f133",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-44",
"url": "https://security.gentoo.org/glsa/202107-44"
}
]
},