"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-02-10 19:00:42 +00:00
parent e05968b225
commit 0e79887312
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
17 changed files with 183 additions and 7 deletions

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rce5943430a6136d37a1f2fc201d245fe094e2727a0bc27e3b2d43a39%40%3Cdev.shiro.apache.org%3E",
"url": "https://lists.apache.org/thread.html/rce5943430a6136d37a1f2fc201d245fe094e2727a0bc27e3b2d43a39%40%3Cdev.shiro.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[activemq-gitbox] 20210210 [GitHub] [activemq] ehossack-aws opened a new pull request #614: Update shiro to 1.7.1",
"url": "https://lists.apache.org/thread.html/r5b93ddf97e2c4cda779d22fab30539bdec454cfa5baec4ad0ffae235@%3Cgitbox.activemq.apache.org%3E"
}
]
},

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "ftp-srv is an open-source FTP server designed to be simple yet configurable. In ftp-srv before version 4.4.0 there is a path-traversal vulnerability. Clients of FTP servers utilizing ftp-srv hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, for example, CWD and UPDR.\n\nWhen windows separators exist within the path (`\\`), `path.resolve` leaves the upper pointers intact and allows the user to move beyond the root folder defined for that user. We did not take that into account when creating the path resolve function.\n\nThe issue is patched in version 4.4.0 (commit 457b859450a37cba10ff3c431eb4aa67771122e3)."
"value": "ftp-srv is an open-source FTP server designed to be simple yet configurable. In ftp-srv before version 4.4.0 there is a path-traversal vulnerability. Clients of FTP servers utilizing ftp-srv hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, for example, CWD and UPDR. When windows separators exist within the path (`\\`), `path.resolve` leaves the upper pointers intact and allows the user to move beyond the root folder defined for that user. We did not take that into account when creating the path resolve function. The issue is patched in version 4.4.0 (commit 457b859450a37cba10ff3c431eb4aa67771122e3)."
}
]
},
@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"name": "https://www.npmjs.com/package/ftp-srv",
"refsource": "MISC",
"url": "https://www.npmjs.com/package/ftp-srv"
},
{
"name": "https://github.com/autovance/ftp-srv/security/advisories/GHSA-pmw4-jgxx-pcq9",
"refsource": "CONFIRM",
@ -93,11 +98,6 @@
"name": "https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3",
"refsource": "MISC",
"url": "https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3"
},
{
"name": "https://www.npmjs.com/package/ftp-srv",
"refsource": "MISC",
"url": "https://www.npmjs.com/package/ftp-srv"
}
]
},

View File

@ -95,6 +95,11 @@
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/"
}
]
},

View File

@ -95,6 +95,11 @@
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/"
}
]
},

View File

@ -95,6 +95,16 @@
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/"
}
]
},

View File

@ -71,6 +71,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210115-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210115-0001/"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210210 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards()",
"url": "http://www.openwall.com/lists/oss-security/2021/02/10/6"
}
]
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://www.se.com/ww/en/download/document/SEVD-2021-012-02/",
"url": "https://www.se.com/ww/en/download/document/SEVD-2021-012-02/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-186/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-186/"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://www.se.com/ww/en/download/document/SEVD-2021-012-02/",
"url": "https://www.se.com/ww/en/download/document/SEVD-2021-012-02/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-187/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-187/"
}
]
},

View File

@ -78,10 +78,15 @@
"name": "http://service.mcafee.com/FAQDocument.aspx?&id=TS103114",
"refsource": "CONFIRM",
"url": "http://service.mcafee.com/FAQDocument.aspx?&id=TS103114"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-175/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-175/"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}
}

View File

@ -61,6 +61,11 @@
"url": "https://www.openwall.com/lists/oss-security/2021/02/09/9",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2021/02/09/9"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210210 Re: Re: screen crash processing combining characters",
"url": "http://www.openwall.com/lists/oss-security/2021/02/10/7"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27139",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27140",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27141",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27142",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27143",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27144",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27145",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}