"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-08-24 08:01:01 +00:00
parent fb45288de6
commit 5dbac127e4
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
5 changed files with 42 additions and 26 deletions

View File

@ -548,6 +548,11 @@
"refsource": "MLIST",
"name": "[camel-commits] 20210824 [GitHub] [camel] oscerd commented on pull request #5976: Upgrade thrift to 0.14.1 include the fix of CVE-2020-13949",
"url": "https://lists.apache.org/thread.html/r812915ecfa541ad2ca65c68a97b2c014dc87141dfaefc4de85049681@%3Ccommits.camel.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[camel-commits] 20210824 [GitHub] [camel] zhfeng commented on pull request #5976: Upgrade thrift to 0.14.1 include the fix of CVE-2020-13949",
"url": "https://lists.apache.org/thread.html/r196409cc4df929d540a2e66169104f2b3b258d8bd96b5f083c59ee51@%3Ccommits.camel.apache.org%3E"
}
]
},

View File

@ -48,24 +48,29 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857",
"name": "https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857"
},
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5"
"refsource": "MISC",
"url": "https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5",
"name": "https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e"
"refsource": "MISC",
"url": "https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e",
"name": "https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0"
"refsource": "MISC",
"url": "https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0",
"name": "https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0"
}
]
},
@ -73,7 +78,7 @@
"description_data": [
{
"lang": "eng",
"value": "This affects the package pac-resolver before 5.0.0.\n This can occur when used with untrusted input, due to unsafe PAC file handling.\r\n\r\n**NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer. \r\n\r\n"
"value": "This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer."
}
]
},

View File

@ -48,12 +48,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774",
"name": "https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/stealjs/transpile/blob/56aaeb26f69496e45a60c03dc92653d53021d4ac/main.js%23L53"
"refsource": "MISC",
"url": "https://github.com/stealjs/transpile/blob/56aaeb26f69496e45a60c03dc92653d53021d4ac/main.js%23L53",
"name": "https://github.com/stealjs/transpile/blob/56aaeb26f69496e45a60c03dc92653d53021d4ac/main.js%23L53"
}
]
},
@ -61,7 +63,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function.\r\n\r\n"
"value": "All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function."
}
]
},

View File

@ -48,12 +48,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388",
"name": "https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/xudafeng/startserver/blob/bef0c4e4d21da42a40ce87cf25fd54ac8d8cb2d8/lib/index.js%23L71"
"refsource": "MISC",
"url": "https://github.com/xudafeng/startserver/blob/bef0c4e4d21da42a40ce87cf25fd54ac8d8cb2d8/lib/index.js%23L71",
"name": "https://github.com/xudafeng/startserver/blob/bef0c4e4d21da42a40ce87cf25fd54ac8d8cb2d8/lib/index.js%23L71"
}
]
},
@ -61,7 +63,7 @@
"description_data": [
{
"lang": "eng",
"value": "All versions of package startserver are vulnerable to Directory Traversal due to missing sanitization.\r\n\r\n"
"value": "All versions of package startserver are vulnerable to Directory Traversal due to missing sanitization."
}
]
},

View File

@ -48,12 +48,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537",
"name": "https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e"
"refsource": "MISC",
"url": "https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e",
"name": "https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e"
}
]
},
@ -61,7 +63,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms.\n"
"value": "The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms."
}
]
},