"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-05-13 18:00:40 +00:00
parent 31ec4f86ee
commit 7c3d89c064
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
64 changed files with 622 additions and 240 deletions

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/160211/ZeroShell-3.9.0-Remote-Command-Execution.html",
"url": "http://packetstormsecurity.com/files/160211/ZeroShell-3.9.0-Remote-Command-Execution.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/162561/ZeroShell-3.9.0-Remote-Command-Execution.html",
"url": "http://packetstormsecurity.com/files/162561/ZeroShell-3.9.0-Remote-Command-Execution.html"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "UBUNTU",
"name": "USN-4335-1",
"url": "https://usn.ubuntu.com/4335-1/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html",
"url": "http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html"
}
]
},

View File

@ -227,6 +227,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/161309/Microsoft-Internet-Explorer-11-Use-After-Free.html",
"url": "http://packetstormsecurity.com/files/161309/Microsoft-Internet-Explorer-11-Use-After-Free.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/162565/Microsoft-Internet-Explorer-8-11-Use-After-Free.html",
"url": "http://packetstormsecurity.com/files/162565/Microsoft-Internet-Explorer-8-11-Use-After-Free.html"
}
]
}

View File

@ -48,6 +48,16 @@
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r104eeefeb1e9da51f7ef79cef0f9ff12e21ef8559b77801e86b21e16%40%3Cusers.wicket.apache.org%3E",
"url": "https://lists.apache.org/thread.html/r104eeefeb1e9da51f7ef79cef0f9ff12e21ef8559b77801e86b21e16%40%3Cusers.wicket.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[directory-commits] 20210513 [directory-fortress-commander] branch master updated: FC-293 - CVE-2020-11976 - upgrade wicket core -> 8.9.0",
"url": "https://lists.apache.org/thread.html/rd0f36b83cc9f28b016ec552f023fb5a59a9ea8db56f2b9dcc6a2f6b7@%3Ccommits.directory.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[directory-dev] 20210513 [jira] [Created] (FC-293) [fortress-web] CVE-2020-11976",
"url": "https://lists.apache.org/thread.html/r982c626dbce5c995223c4a6ddd7685de3592f8d65ba8372da1f3ce19@%3Cdev.directory.apache.org%3E"
}
]
},

View File

@ -154,6 +154,11 @@
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-09",
"url": "https://www.tenable.com/security/tns-2021-09"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201202-0001/",
"url": "https://security.netapp.com/advisory/ntap-20201202-0001/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1956348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956348"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210513 [SECURITY] [DLA 2660-1] libgetdata security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00015.html"
}
]
},

View File

@ -3,58 +3,60 @@
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "bressers@elastic.co",
"ASSIGNER": "security@elastic.co",
"ID": "CVE-2021-22135",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Elastic",
"product": {
"product_data": [
"vendor": {
"vendor_data": [
{
"product_name": "Elasticsearch",
"version": {
"version_data": [
{
"version_value": "before 7.11.2 and 6.8.15"
}
]
}
"vendor_name": "Elastic",
"product": {
"product_data": [
{
"product_name": "Elasticsearch",
"version": {
"version_data": [
{
"version_value": "before 7.11.2 and 6.8.15"
}
]
}
}
]
}
}
]
}
}
]
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
"problemtype_data": [
{
"lang": "eng",
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
"description": [
{
"lang": "eng",
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
}
]
}
]
}
]
]
},
"references": {
"reference_data": [
{
"url": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125"
}
]
"reference_data": [
{
"url": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125",
"refsource": "MISC",
"name": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view."
}
]
"description_data": [
{
"lang": "eng",
"value": "Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view."
}
]
}
}
}

View File

@ -3,58 +3,60 @@
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "bressers@elastic.co",
"ASSIGNER": "security@elastic.co",
"ID": "CVE-2021-22136",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Elastic",
"product": {
"product_data": [
"vendor": {
"vendor_data": [
{
"product_name": "Kibana",
"version": {
"version_data": [
{
"version_value": "before 7.12.0 and 6.8.15"
}
]
}
"vendor_name": "Elastic",
"product": {
"product_data": [
{
"product_name": "Kibana",
"version": {
"version_data": [
{
"version_value": "before 7.12.0 and 6.8.15"
}
]
}
}
]
}
}
]
}
}
]
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
"problemtype_data": [
{
"lang": "eng",
"value": "CWE-613: Insufficient Session Expiration"
"description": [
{
"lang": "eng",
"value": "CWE-613: Insufficient Session Expiration"
}
]
}
]
}
]
]
},
"references": {
"reference_data": [
{
"url": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125"
}
]
"reference_data": [
{
"url": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125",
"refsource": "MISC",
"name": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Kibana versions before 7.12.0 and 6.8.15 a flaw in the session timeout was discovered where the xpack.security.session.idleTimeout setting is not being respected. This was caused by background polling activities unintentionally extending authenticated users sessions, preventing a user session from timing out."
}
]
"description_data": [
{
"lang": "eng",
"value": "In Kibana versions before 7.12.0 and 6.8.15 a flaw in the session timeout was discovered where the xpack.security.session.idleTimeout setting is not being respected. This was caused by background polling activities unintentionally extending authenticated users sessions, preventing a user session from timing out."
}
]
}
}
}

View File

@ -3,58 +3,60 @@
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "bressers@elastic.co",
"ASSIGNER": "security@elastic.co",
"ID": "CVE-2021-22137",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Elastic",
"product": {
"product_data": [
"vendor": {
"vendor_data": [
{
"product_name": "Elasticsearch",
"version": {
"version_data": [
{
"version_value": "before 7.11.2 and 6.8.15"
}
]
}
"vendor_name": "Elastic",
"product": {
"product_data": [
{
"product_name": "Elasticsearch",
"version": {
"version_data": [
{
"version_value": "before 7.11.2 and 6.8.15"
}
]
}
}
]
}
}
]
}
}
]
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
"problemtype_data": [
{
"lang": "eng",
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
"description": [
{
"lang": "eng",
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
}
]
}
]
}
]
]
},
"references": {
"reference_data": [
{
"url": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125"
}
]
"reference_data": [
{
"url": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125",
"refsource": "MISC",
"name": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Elasticsearch versions before 7.11.2 and 6.8.15 a document disclosure flaw was found when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain cross-cluster search queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices."
}
]
"description_data": [
{
"lang": "eng",
"value": "In Elasticsearch versions before 7.11.2 and 6.8.15 a document disclosure flaw was found when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain cross-cluster search queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices."
}
]
}
}
}

View File

@ -3,58 +3,60 @@
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "bressers@elastic.co",
"ASSIGNER": "security@elastic.co",
"ID": "CVE-2021-22138",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Elastic",
"product": {
"product_data": [
"vendor": {
"vendor_data": [
{
"product_name": "Elasticsearch",
"version": {
"version_data": [
{
"version_value": "after 6.4.0 and before 6.8.15 and 7.12.0"
}
]
}
"vendor_name": "Elastic",
"product": {
"product_data": [
{
"product_name": "Elasticsearch",
"version": {
"version_data": [
{
"version_value": "after 6.4.0 and before 6.8.15 and 7.12.0"
}
]
}
}
]
}
}
]
}
}
]
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
"problemtype_data": [
{
"lang": "eng",
"value": "CWE-295: Improper Certificate Validation"
"description": [
{
"lang": "eng",
"value": "CWE-295: Improper Certificate Validation"
}
]
}
]
}
]
]
},
"references": {
"reference_data": [
{
"url": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125"
}
]
"reference_data": [
{
"url": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125",
"refsource": "MISC",
"name": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring data."
}
]
"description_data": [
{
"lang": "eng",
"value": "In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring data."
}
]
}
}
}

View File

@ -3,58 +3,60 @@
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "bressers@elastic.co",
"ASSIGNER": "security@elastic.co",
"ID": "CVE-2021-22139",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Elastic",
"product": {
"product_data": [
"vendor": {
"vendor_data": [
{
"product_name": "Kibana",
"version": {
"version_data": [
{
"version_value": "before 7.12.1"
}
]
}
"vendor_name": "Elastic",
"product": {
"product_data": [
{
"product_name": "Kibana",
"version": {
"version_data": [
{
"version_value": "before 7.12.1"
}
]
}
}
]
}
}
]
}
}
]
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
"problemtype_data": [
{
"lang": "eng",
"value": "CWE-400: Uncontrolled Resource Consumption"
"description": [
{
"lang": "eng",
"value": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
]
}
]
]
},
"references": {
"reference_data": [
{
"url": "https://discuss.elastic.co/t/7-12-1-security-update/271433"
}
]
"reference_data": [
{
"url": "https://discuss.elastic.co/t/7-12-1-security-update/271433",
"refsource": "MISC",
"name": "https://discuss.elastic.co/t/7-12-1-security-update/271433"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Kibana versions before 7.12.1 contain a denial of service vulnerability was found in the webhook actions due to a lack of timeout or a limit on the request size. An attacker with permissions to create webhook actions could drain the Kibana host connection pool, making Kibana unavailable for all other users."
}
]
"description_data": [
{
"lang": "eng",
"value": "Kibana versions before 7.12.1 contain a denial of service vulnerability was found in the webhook actions due to a lack of timeout or a limit on the request size. An attacker with permissions to create webhook actions could drain the Kibana host connection pool, making Kibana unavailable for all other users."
}
]
}
}
}

View File

@ -3,58 +3,60 @@
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "bressers@elastic.co",
"ASSIGNER": "security@elastic.co",
"ID": "CVE-2021-22140",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Elastic",
"product": {
"product_data": [
"vendor": {
"vendor_data": [
{
"product_name": "Elastic App Search",
"version": {
"version_data": [
{
"version_value": "after 7.11.0 and before 7.12.0"
}
]
}
"vendor_name": "Elastic",
"product": {
"product_data": [
{
"product_name": "Elastic App Search",
"version": {
"version_data": [
{
"version_value": "after 7.11.0 and before 7.12.0"
}
]
}
}
]
}
}
]
}
}
]
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
"problemtype_data": [
{
"lang": "eng",
"value": "CWE-611: Improper Restriction of XML External Entity Reference"
"description": [
{
"lang": "eng",
"value": "CWE-611: Improper Restriction of XML External Entity Reference"
}
]
}
]
}
]
]
},
"references": {
"reference_data": [
{
"url": "https://discuss.elastic.co/t/7-12-1-security-update/271433"
}
]
"reference_data": [
{
"url": "https://discuss.elastic.co/t/7-12-1-security-update/271433",
"refsource": "MISC",
"name": "https://discuss.elastic.co/t/7-12-1-security-update/271433"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Elastic App Search versions after 7.11.0 and before 7.12.0 contain an XML External Entity Injection issue (XXE) in the App Search web crawler beta feature. Using this vector, an attacker whose website is being crawled by App Search could craft a malicious sitemap.xml to traverse the filesystem of the host running the instance and obtain sensitive files."
}
]
"description_data": [
{
"lang": "eng",
"value": "Elastic App Search versions after 7.11.0 and before 7.12.0 contain an XML External Entity Injection issue (XXE) in the App Search web crawler beta feature. Using this vector, an attacker whose website is being crawled by App Search could craft a malicious sitemap.xml to traverse the filesystem of the host running the instance and obtain sensitive files."
}
]
}
}
}

View File

@ -109,6 +109,11 @@
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-09",
"url": "https://www.tenable.com/security/tns-2021-09"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -223,6 +223,11 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26419",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26419"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/162570/Internet-Explorer-jscript9.dll-Memory-Corruption.html",
"url": "http://packetstormsecurity.com/files/162570/Internet-Explorer-jscript9.dll-Memory-Corruption.html"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -83,6 +83,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -69,6 +69,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-68db93b130",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -132,6 +132,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b88e86b753",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0001/"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -132,6 +132,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b88e86b753",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0001/"
}
]
}

View File

@ -79,6 +79,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -88,6 +88,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-68db93b130",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -83,6 +83,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -79,6 +79,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -83,6 +83,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -79,6 +79,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -83,6 +83,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -83,6 +83,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -83,6 +83,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -83,6 +83,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -79,6 +79,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -83,6 +83,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -79,6 +79,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-b8b7829a83",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -64,6 +64,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://blog.prosody.im/prosody-0.11.9-released/",
"refsource": "MISC",
"name": "https://blog.prosody.im/prosody-0.11.9-released/"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210513 Prosody XMPP server advisory 2021-05-12 (multiple vulnerabilities)",
"url": "http://www.openwall.com/lists/oss-security/2021/05/13/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://blog.prosody.im/prosody-0.11.9-released/",
"refsource": "MISC",
"name": "https://blog.prosody.im/prosody-0.11.9-released/"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210513 Prosody XMPP server advisory 2021-05-12 (multiple vulnerabilities)",
"url": "http://www.openwall.com/lists/oss-security/2021/05/13/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://blog.prosody.im/prosody-0.11.9-released/",
"refsource": "MISC",
"name": "https://blog.prosody.im/prosody-0.11.9-released/"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210513 Prosody XMPP server advisory 2021-05-12 (multiple vulnerabilities)",
"url": "http://www.openwall.com/lists/oss-security/2021/05/13/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://blog.prosody.im/prosody-0.11.9-released/",
"refsource": "MISC",
"name": "https://blog.prosody.im/prosody-0.11.9-released/"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210513 Prosody XMPP server advisory 2021-05-12 (multiple vulnerabilities)",
"url": "http://www.openwall.com/lists/oss-security/2021/05/13/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://blog.prosody.im/prosody-0.11.9-released/",
"refsource": "MISC",
"name": "https://blog.prosody.im/prosody-0.11.9-released/"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210513 Prosody XMPP server advisory 2021-05-12 (multiple vulnerabilities)",
"url": "http://www.openwall.com/lists/oss-security/2021/05/13/1"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-32924",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-32925",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "admin/user_import.php in Chamilo 1.11.14 reads XML data without disabling the ability to load external entities."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/chamilo/chamilo-lms/commit/e71437c8de809044ba3ae1b181d70857c050a3e9",
"refsource": "MISC",
"name": "https://github.com/chamilo/chamilo-lms/commit/e71437c8de809044ba3ae1b181d70857c050a3e9"
},
{
"url": "https://www.php.net/manual/en/function.libxml-disable-entity-loader.php",
"refsource": "MISC",
"name": "https://www.php.net/manual/en/function.libxml-disable-entity-loader.php"
}
]
}
}

View File

@ -146,6 +146,11 @@
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-09",
"url": "https://www.tenable.com/security/tns-2021-09"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
}
]
}