"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-04-27 20:00:47 +00:00
parent 1a980b74af
commit 8bbb957049
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
10 changed files with 64 additions and 9 deletions

View File

@ -107,6 +107,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212327",
"url": "https://support.apple.com/kb/HT212327"
},
{
"refsource": "FULLDISC",
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/Apr/51"
}
]
},

View File

@ -73,6 +73,16 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212318",
"url": "https://support.apple.com/kb/HT212318"
},
{
"refsource": "FULLDISC",
"name": "20210427 APPLE-SA-2021-04-26-1 iOS 14.5 and iPadOS 14.5",
"url": "http://seclists.org/fulldisclosure/2021/Apr/49"
},
{
"refsource": "FULLDISC",
"name": "20210427 APPLE-SA-2021-04-26-2 macOS Big Sur 11.3",
"url": "http://seclists.org/fulldisclosure/2021/Apr/50"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212327",
"url": "https://support.apple.com/kb/HT212327"
},
{
"refsource": "FULLDISC",
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/Apr/51"
}
]
}

View File

@ -103,6 +103,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212327",
"url": "https://support.apple.com/kb/HT212327"
},
{
"refsource": "FULLDISC",
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/Apr/51"
}
]
},

View File

@ -98,6 +98,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212327",
"url": "https://support.apple.com/kb/HT212327"
},
{
"refsource": "FULLDISC",
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/Apr/51"
}
]
},

View File

@ -107,6 +107,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212327",
"url": "https://support.apple.com/kb/HT212327"
},
{
"refsource": "FULLDISC",
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/Apr/51"
}
]
},

View File

@ -50,7 +50,7 @@
"description_data": [
{
"lang": "eng",
"value": "Bootstrap Package is a theme for TYPO3. It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix. Update to version 7.1.2, 8.0.8, 9.1.4, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/."
"value": "Bootstrap Package is a theme for TYPO3. It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix. Update to version 7.1.2, 8.0.8, 9.1.4, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/."
}
]
},

View File

@ -34,7 +34,7 @@
"credit": [
{
"lang": "eng",
"value": "Apache OFBiz would like to thank the first report from \"r00t4dm at Cloud-Penetrating Arrow Lab, asd of MoyunSec V-Lab <root@thiscode.cc> and 赖涵 <1044309102@qq.com> a bit later"
"value": "Apache OFBiz would like to thank the first report from \"r00t4dm at Cloud-Penetrating Arrow Lab, asd of MoyunSec V-Lab <root@thiscode.cc> and \u8d56\u6db5 <1044309102@qq.com> a bit later"
}
],
"data_format": "MITRE",
@ -44,7 +44,7 @@
"description_data": [
{
"lang": "eng",
"value": "Apache OFBiz has unsafe deserialization prior to 17.12.07 version\nAn unauthenticated user can perform an RCE attack\n"
"value": "Apache OFBiz has unsafe deserialization prior to 17.12.07 version An unauthenticated user can perform an RCE attack"
}
]
},
@ -66,8 +66,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cdev.ofbiz.apache.org%3E"
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cdev.ofbiz.apache.org%3E",
"name": "https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cdev.ofbiz.apache.org%3E"
}
]
},
@ -84,4 +85,4 @@
"value": "Upgrade to at least 17.12.07\nor apply one of the patches at https://issues.apache.org/jira/browse/OFBIZ-12216\n"
}
]
}
}

View File

@ -70,8 +70,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://lists.apache.org/thread.html/rb3f5cd65f3ddce9b9eb4d6ea6e2919933f0f89b15953769d11003743%40%3Cdev.ofbiz.apache.org%3E"
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/rb3f5cd65f3ddce9b9eb4d6ea6e2919933f0f89b15953769d11003743%40%3Cdev.ofbiz.apache.org%3E",
"name": "https://lists.apache.org/thread.html/rb3f5cd65f3ddce9b9eb4d6ea6e2919933f0f89b15953769d11003743%40%3Cdev.ofbiz.apache.org%3E"
}
]
},
@ -88,4 +89,4 @@
"value": "Upgrade to at least 17.12.07 or apply patches at https://issues.apache.org/jira/browse/OFBIZ-12212 & OFBIZ-12221\n"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-3519",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}