"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-05-04 09:00:48 +00:00
parent bb005b19ed
commit 3efa458d52
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
4 changed files with 36 additions and 18 deletions

View File

@ -74,6 +74,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt", "url": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt",
"name": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt" "name": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210504 [SECURITY] [DLA 2646-1] subversion security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html"
} }
] ]
}, },

View File

@ -48,16 +48,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067",
"name": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067"
}, },
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028" "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028"
}, },
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://github.com/jbgutierrez/path-parse/issues/8" "url": "https://github.com/jbgutierrez/path-parse/issues/8",
"name": "https://github.com/jbgutierrez/path-parse/issues/8"
} }
] ]
}, },
@ -65,7 +68,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.\r\n\r\n" "value": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity."
} }
] ]
}, },

View File

@ -48,24 +48,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029" "url": "https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427",
"name": "https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427"
}, },
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030" "url": "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029",
"name": "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029"
}, },
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031" "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030"
}, },
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032" "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031"
}, },
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427" "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032"
} }
] ]
}, },
@ -73,7 +78,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.\r\n\r\n" "value": "The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source."
} }
] ]
}, },

View File

@ -132,6 +132,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[pulsar-commits] 20210429 [pulsar] branch branch-2.7 updated: [Security] Upgrade commons-io to address CVE-2021-29425 (#10287)", "name": "[pulsar-commits] 20210429 [pulsar] branch branch-2.7 updated: [Security] Upgrade commons-io to address CVE-2021-29425 (#10287)",
"url": "https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E" "url": "https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[myfaces-dev] 20210504 [GitHub] [myfaces-tobago] lofwyr14 opened a new pull request #808: build: CVE fix",
"url": "https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E"
} }
] ]
}, },