"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-05-26 12:01:18 +00:00
parent 545537bf5b
commit 5e39948f42
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
38 changed files with 579 additions and 26 deletions

View File

@ -0,0 +1,67 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14836",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "3Scale",
"version": {
"version_data": [
{
"version_value": "2.4 GA"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2019-14836,",
"url": "https://access.redhat.com/security/cve/CVE-2019-14836,"
},
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1750928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750928"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "3scale dev portal login form does not verify CSRF token, and so does not protect against login CSRF."
}
]
}
}

View File

@ -76,6 +76,11 @@
"refsource": "MLIST",
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-34",
"url": "https://security.gentoo.org/glsa/202105-34"
}
]
}

View File

@ -74,6 +74,11 @@
"refsource": "UBUNTU",
"name": "USN-4441-1",
"url": "https://usn.ubuntu.com/4441-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -112,6 +112,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210131 [SECURITY] [DLA 2538-1] mariadb-10.1 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -69,6 +69,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201023-0003/",
"url": "https://security.netapp.com/advisory/ntap-20201023-0003/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -69,6 +69,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201023-0003/",
"url": "https://security.netapp.com/advisory/ntap-20201023-0003/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -58,6 +58,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-d6b9d8497b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JGEGLC4YGBDN5CGHTNWN2GH6DJJA36T2/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-25",
"url": "https://security.gentoo.org/glsa/202105-25"
}
]
},

View File

@ -96,6 +96,11 @@
"refsource": "DEBIAN",
"name": "DSA-4865",
"url": "https://www.debian.org/security/2021/dsa-4865"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-33",
"url": "https://security.gentoo.org/glsa/202105-33"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-5a4377797c",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKAXYBKBMQOLIW6UKASJCAZRBOIYS4RL/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-26",
"url": "https://security.gentoo.org/glsa/202105-26"
}
]
},

View File

@ -4,14 +4,93 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-25668",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Linux Kernel",
"version": {
"version_data": [
{
"version_value": "5.9.2"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-362 -> CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MLIST",
"name": "[oss-security] 20201030 CVE-2020-25668: Linux kernel concurrency use-after-free in vt",
"url": "http://www.openwall.com/lists/oss-security/2020/10/30/1"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20201104 Re: CVE-2020-25668: Linux kernel concurrency use-after-free in vt",
"url": "http://www.openwall.com/lists/oss-security/2020/11/04/3"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2020/11/04/3,",
"url": "https://www.openwall.com/lists/oss-security/2020/11/04/3,"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2020/10/30/1,",
"url": "https://www.openwall.com/lists/oss-security/2020/10/30/1,"
},
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1893287,",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893287,"
},
{
"refsource": "MISC",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=90bfdeef83f1d6c696039b6a917190dcbbad3220",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=90bfdeef83f1d6c696039b6a917190dcbbad3220"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op."
}
]
}

View File

@ -4,14 +4,88 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-25669",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Linux Kernel",
"version": {
"version_data": [
{
"version_value": "5.9.4"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MLIST",
"name": "[oss-security] 20201105 CVE-2020-25669: Linux Kernel use-after-free in sunkbd_reinit",
"url": "http://www.openwall.com/lists/oss-security/2020/11/05/2"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20201120 Re: CVE-2020-25669: Linux Kernel use-after-free in sunkbd_reinit",
"url": "http://www.openwall.com/lists/oss-security/2020/11/20/5"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2020/11/05/2,",
"url": "https://www.openwall.com/lists/oss-security/2020/11/05/2,"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2020/11/20/5,",
"url": "https://www.openwall.com/lists/oss-security/2020/11/20/5,"
},
{
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e",
"url": "https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free."
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26678",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-26678",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "vFairs 3.3 is affected by Remote Code Execution. Any user logged in to a vFairs virtual conference or event can abuse the functionality to upload a profile picture in order to place a malicious PHP file on the server and gain code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://vfairs.com",
"refsource": "MISC",
"name": "http://vfairs.com"
},
{
"url": "https://api.vfairs.com/v1/profiles",
"refsource": "MISC",
"name": "https://api.vfairs.com/v1/profiles"
},
{
"refsource": "MISC",
"name": "https://www.huntress.com/blog/zero-day-vulnerabilities-in-popular-event-management-platforms-could-leave-msps-open-to-attack",
"url": "https://www.huntress.com/blog/zero-day-vulnerabilities-in-popular-event-management-platforms-could-leave-msps-open-to-attack"
}
]
}

View File

@ -1,17 +1,76 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26679",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-26679",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "vFairs 3.3 is affected by Insecure Permissions. Any user logged in to a vFairs virtual conference or event can modify any other users profile information or profile picture. After receiving any user's unique identification number and their own, an HTTP POST request can be made update their profile description or supply a new profile image. This can lead to potential cross-site scripting attacks on any user, or upload malicious PHP webshells as \"profile pictures.\" The user IDs can be easily determined by other responses from the API for an event or chat room."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://vfairs.com",
"refsource": "MISC",
"name": "http://vfairs.com"
},
{
"url": "https://api.vfairs.com/v1/profiles",
"refsource": "MISC",
"name": "https://api.vfairs.com/v1/profiles"
},
{
"url": "https://api.vfairs.com/v1/profiles?access_key=",
"refsource": "MISC",
"name": "https://api.vfairs.com/v1/profiles?access_key="
},
{
"refsource": "MISC",
"name": "https://www.huntress.com/blog/zero-day-vulnerabilities-in-popular-event-management-platforms-could-leave-msps-open-to-attack",
"url": "https://www.huntress.com/blog/zero-day-vulnerabilities-in-popular-event-management-platforms-could-leave-msps-open-to-attack"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-26680",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-26680",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In vFairs 3.3, any user logged in to a vFairs virtual conference or event can modify any other users profile information to include a cross-site scripting payload. The user data stored by the database includes HTML tags that are intentionally rendered out onto the page, and this can be abused to perform XSS attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://vfairs.com",
"refsource": "MISC",
"name": "http://vfairs.com"
},
{
"refsource": "MISC",
"name": "https://www.huntress.com/blog/zero-day-vulnerabilities-in-popular-event-management-platforms-could-leave-msps-open-to-attack",
"url": "https://www.huntress.com/blog/zero-day-vulnerabilities-in-popular-event-management-platforms-could-leave-msps-open-to-attack"
}
]
}

View File

@ -83,6 +83,11 @@
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2020-27840.html",
"url": "https://www.samba.org/samba/security/CVE-2020-27840.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-22",
"url": "https://security.gentoo.org/glsa/202105-22"
}
]
},

View File

@ -1,4 +1,3 @@
{
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
@ -79,6 +78,11 @@
"refsource": "UBUNTU",
"name": "USN-4250-1",
"url": "https://usn.ubuntu.com/4250-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -1,4 +1,3 @@
{
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
@ -75,6 +74,11 @@
"refsource": "UBUNTU",
"name": "USN-4250-1",
"url": "https://usn.ubuntu.com/4250-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -89,6 +89,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-261c9ddd7c",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -82,6 +82,11 @@
"refsource": "UBUNTU",
"name": "USN-4350-1",
"url": "https://usn.ubuntu.com/4350-1/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -89,6 +89,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-261c9ddd7c",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -88,6 +88,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-35995bb2d3",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -61,6 +61,11 @@
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26622",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26622"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-24",
"url": "https://security.gentoo.org/glsa/202105-24"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210131 [SECURITY] [DLA 2537-1] ffmpeg security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00026.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-24",
"url": "https://security.gentoo.org/glsa/202105-24"
}
]
}

View File

@ -58,6 +58,11 @@
"refsource": "MISC",
"name": "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777",
"url": "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-29",
"url": "https://security.gentoo.org/glsa/202105-29"
}
]
},

View File

@ -68,6 +68,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-7026246ea9",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZAF6L2M6CNAJ2YYYGXPWETTW5YLCWTVT/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-22",
"url": "https://security.gentoo.org/glsa/202105-22"
}
]
},

View File

@ -83,6 +83,11 @@
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2021-20277.html",
"url": "https://www.samba.org/samba/security/CVE-2021-20277.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-22",
"url": "https://security.gentoo.org/glsa/202105-22"
}
]
},

View File

@ -106,6 +106,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-f049305892",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTXHA5JOWQRCCUZH7ZQBEYN6KZKJEYSD/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-33",
"url": "https://security.gentoo.org/glsa/202105-33"
}
]
},

View File

@ -91,6 +91,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html",
"url": "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-28",
"url": "https://security.gentoo.org/glsa/202105-28"
}
]
}

View File

@ -82,6 +82,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b1d1655cef",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -79,6 +79,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210219-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -69,6 +69,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210219-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -69,6 +69,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210219-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -69,6 +69,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210219-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
}
]
}

View File

@ -89,6 +89,11 @@
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-28",
"url": "https://security.gentoo.org/glsa/202105-28"
}
]
}

View File

@ -108,6 +108,11 @@
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-28",
"url": "https://security.gentoo.org/glsa/202105-28"
}
]
}

View File

@ -93,6 +93,11 @@
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-28",
"url": "https://security.gentoo.org/glsa/202105-28"
}
]
}

View File

@ -66,6 +66,11 @@
"url": "https://trac.ffmpeg.org/ticket/8863",
"refsource": "MISC",
"name": "https://trac.ffmpeg.org/ticket/8863"
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-24",
"url": "https://security.gentoo.org/glsa/202105-24"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-33580",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}