"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-03-15 15:00:40 +00:00
parent d70c2f2999
commit 371744bd4e
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
21 changed files with 440 additions and 35 deletions

View File

@ -204,6 +204,11 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-284/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-284/"
}
]
}

View File

@ -69,6 +69,86 @@
"url": "https://launchpad.support.sap.com/#/notes/3027758",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/3027758"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-293/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-293/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-304/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-304/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-297/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-297/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-305/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-305/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-309/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-309/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-295/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-295/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-303/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-303/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-290/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-290/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-289/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-289/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-301/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-301/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-302/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-302/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-300/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-300/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-291/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-291/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-296/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-296/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-307/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-307/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-308/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-308/"
}
]
}

View File

@ -267,6 +267,11 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-285/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-285/"
}
]
}

View File

@ -222,6 +222,11 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26866",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26866"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-286/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-286/"
}
]
}

View File

@ -267,6 +267,11 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26873",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26873"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-283/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-283/"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "CONFIRM",
"name": "https://github.com/argoproj/argo-cd/commit/f5b0db240b4e3abf18e97f6fd99096b4f9e94dc5",
"url": "https://github.com/argoproj/argo-cd/commit/f5b0db240b4e3abf18e97f6fd99096b4f9e94dc5"
},
{
"refsource": "MISC",
"name": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9h6w-j7w4-jr52",
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9h6w-j7w4-jr52"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26923",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-26923",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Argo CD before 1.8.4. Accessing the endpoint /api/version leaks internal information for the system, and this endpoint is not protected with authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4",
"refsource": "MISC",
"name": "https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4"
},
{
"refsource": "MISC",
"name": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-pfgj-mh5m-2p48",
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-pfgj-mh5m-2p48"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26924",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-26924",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Argo CD before 1.8.4. Browser XSS protection is not activated due to the missing XSS protection header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4",
"refsource": "MISC",
"name": "https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4"
},
{
"refsource": "MISC",
"name": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-pg99-h5gc-446r",
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-pg99-h5gc-446r"
}
]
}

View File

@ -267,6 +267,11 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-287/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-287/"
}
]
}

View File

@ -52,15 +52,20 @@
},
"references": {
"reference_data": [
{
"url": "https://www.xilinx.com/support.html",
"refsource": "MISC",
"name": "https://www.xilinx.com/support.html"
},
{
"refsource": "MISC",
"name": "https://www.xilinx.com/products/silicon-devices/soc/zynq-7000.html",
"url": "https://www.xilinx.com/products/silicon-devices/soc/zynq-7000.html"
},
{
"refsource": "MISC",
"name": "https://www.xilinx.com/support/answers/76201.html",
"url": "https://www.xilinx.com/support/answers/76201.html"
},
{
"refsource": "MISC",
"name": "http://www.onfi.org/specifications",
"url": "http://www.onfi.org/specifications"
}
]
}

View File

@ -69,6 +69,16 @@
"url": "https://launchpad.support.sap.com/#/notes/3027758",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/3027758"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-299/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-299/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-288/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-288/"
}
]
}

View File

@ -69,6 +69,11 @@
"url": "https://launchpad.support.sap.com/#/notes/3027758",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/3027758"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-315/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-315/"
}
]
}

View File

@ -69,6 +69,16 @@
"url": "https://launchpad.support.sap.com/#/notes/3027758",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/3027758"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-310/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-310/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-312/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-312/"
}
]
}

View File

@ -69,6 +69,11 @@
"url": "https://launchpad.support.sap.com/#/notes/3027758",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/3027758"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-292/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-292/"
}
]
}

View File

@ -69,6 +69,11 @@
"url": "https://launchpad.support.sap.com/#/notes/3027758",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/3027758"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-306/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-306/"
}
]
}

View File

@ -69,6 +69,11 @@
"url": "https://launchpad.support.sap.com/#/notes/3027758",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/3027758"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-294/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-294/"
}
]
}

View File

@ -69,6 +69,11 @@
"url": "https://launchpad.support.sap.com/#/notes/3027758",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/3027758"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-298/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-298/"
}
]
}

View File

@ -69,6 +69,21 @@
"url": "https://launchpad.support.sap.com/#/notes/3027767",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/3027767"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-313/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-313/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-311/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-311/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-314/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-314/"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27891",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-27891",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://info.ssh.com/tectia-vulnerability-cve-2021-27891",
"url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27891"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27892",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-27892",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://info.ssh.com/tectia-vulnerability-cve-2021-27892",
"url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27892"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27893",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-27893",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://info.ssh.com/tectia-vulnerability-cve-2021-27893",
"url": "https://info.ssh.com/tectia-vulnerability-cve-2021-27893"
}
]
}