mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
1a980b74af
commit
8bbb957049
@ -107,6 +107,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT212327",
|
||||
"url": "https://support.apple.com/kb/HT212327"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Apr/51"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT212318",
|
||||
"url": "https://support.apple.com/kb/HT212318"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20210427 APPLE-SA-2021-04-26-1 iOS 14.5 and iPadOS 14.5",
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Apr/49"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20210427 APPLE-SA-2021-04-26-2 macOS Big Sur 11.3",
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Apr/50"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -94,6 +94,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT212327",
|
||||
"url": "https://support.apple.com/kb/HT212327"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Apr/51"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -103,6 +103,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT212327",
|
||||
"url": "https://support.apple.com/kb/HT212327"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Apr/51"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -98,6 +98,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT212327",
|
||||
"url": "https://support.apple.com/kb/HT212327"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Apr/51"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -107,6 +107,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT212327",
|
||||
"url": "https://support.apple.com/kb/HT212327"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Apr/51"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -50,7 +50,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Bootstrap Package is a theme for TYPO3. It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix. Update to version 7.1.2, 8.0.8, 9.1.4, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/."
|
||||
"value": "Bootstrap Package is a theme for TYPO3. It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix. Update to version 7.1.2, 8.0.8, 9.1.4, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -34,7 +34,7 @@
|
||||
"credit": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Apache OFBiz would like to thank the first report from \"r00t4dm at Cloud-Penetrating Arrow Lab, asd of MoyunSec V-Lab <root@thiscode.cc> and 赖涵 <1044309102@qq.com> a bit later"
|
||||
"value": "Apache OFBiz would like to thank the first report from \"r00t4dm at Cloud-Penetrating Arrow Lab, asd of MoyunSec V-Lab <root@thiscode.cc> and \u8d56\u6db5 <1044309102@qq.com> a bit later"
|
||||
}
|
||||
],
|
||||
"data_format": "MITRE",
|
||||
@ -44,7 +44,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Apache OFBiz has unsafe deserialization prior to 17.12.07 version\nAn unauthenticated user can perform an RCE attack\n"
|
||||
"value": "Apache OFBiz has unsafe deserialization prior to 17.12.07 version An unauthenticated user can perform an RCE attack"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -66,8 +66,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cdev.ofbiz.apache.org%3E"
|
||||
"refsource": "MISC",
|
||||
"url": "https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cdev.ofbiz.apache.org%3E",
|
||||
"name": "https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cdev.ofbiz.apache.org%3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -84,4 +85,4 @@
|
||||
"value": "Upgrade to at least 17.12.07\nor apply one of the patches at https://issues.apache.org/jira/browse/OFBIZ-12216\n"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -70,8 +70,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://lists.apache.org/thread.html/rb3f5cd65f3ddce9b9eb4d6ea6e2919933f0f89b15953769d11003743%40%3Cdev.ofbiz.apache.org%3E"
|
||||
"refsource": "MISC",
|
||||
"url": "https://lists.apache.org/thread.html/rb3f5cd65f3ddce9b9eb4d6ea6e2919933f0f89b15953769d11003743%40%3Cdev.ofbiz.apache.org%3E",
|
||||
"name": "https://lists.apache.org/thread.html/rb3f5cd65f3ddce9b9eb4d6ea6e2919933f0f89b15953769d11003743%40%3Cdev.ofbiz.apache.org%3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -88,4 +89,4 @@
|
||||
"value": "Upgrade to at least 17.12.07 or apply patches at https://issues.apache.org/jira/browse/OFBIZ-12212 & OFBIZ-12221\n"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/3xxx/CVE-2021-3519.json
Normal file
18
2021/3xxx/CVE-2021-3519.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-3519",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user