"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-06-04 10:00:50 +00:00
parent bd940ee51d
commit 9f5248b987
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
15 changed files with 116 additions and 0 deletions

View File

@ -148,6 +148,26 @@
"refsource": "MLIST",
"name": "[maven-issues] 20210530 [jira] [Closed] (DOXIA-615) Can you provide an updated version in order to fix CVE-2020-13956",
"url": "https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[drill-issues] 20210604 [jira] [Commented] (DRILL-7946) Bump HttpClient from 4.5.12 to 4.5.13 for CVE-2020-13956",
"url": "https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[drill-dev] 20210604 [GitHub] [drill] luocooong opened a new pull request #2250: DRILL-7946: Bump HttpClient from 4.5.12 to 4.5.13 for CVE-2020-13956",
"url": "https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[drill-dev] 20210604 [jira] [Created] (DRILL-7946) Bump HttpClient from 4.5.12 to 4.5.13 for CVE-2020-13956",
"url": "https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[drill-issues] 20210604 [jira] [Created] (DRILL-7946) Bump HttpClient from 4.5.12 to 4.5.13 for CVE-2020-13956",
"url": "https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E"
}
]
},

View File

@ -88,6 +88,11 @@
"name": "https://pypi.org/project/django-filter/",
"refsource": "MISC",
"url": "https://pypi.org/project/django-filter/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210604-0010/",
"url": "https://security.netapp.com/advisory/ntap-20210604-0010/"
}
]
},

View File

@ -61,6 +61,11 @@
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7",
"refsource": "MISC",
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210604-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210604-0005/"
}
]
}

View File

@ -398,6 +398,11 @@
"refsource": "MLIST",
"name": "[flink-issues] 20210511 [jira] [Commented] (FLINK-22441) In Flink v1.11.3 contains netty(version:3.10.6) netty(version:4.1.60) . There are many vulnerabilities, like CVE-2021-21409 etc. please confirm these version and fix. thx",
"url": "https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210604-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210604-0003/"
}
]
},

View File

@ -243,6 +243,11 @@
"refsource": "MLIST",
"name": "[zookeeper-notifications] 20210521 [GitHub] [zookeeper] maoling commented on pull request #1696: ZOOKEEPER-4295: Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21409 in branch-3.5",
"url": "https://lists.apache.org/thread.html/redef0fb5474fd686781007de9ddb852b24f1b04131a248d9a4789183@%3Cnotifications.zookeeper.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210604-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210604-0003/"
}
]
},

View File

@ -76,6 +76,11 @@
"refsource": "MISC",
"url": "https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427",
"name": "https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210604-0008/",
"url": "https://security.netapp.com/advisory/ntap-20210604-0008/"
}
]
},

View File

@ -67,6 +67,11 @@
"url": "https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-a[\u2026]ypass-of-app-qsh-verification-via-context-jwts/47072",
"refsource": "MISC",
"name": "https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-a[\u2026]ypass-of-app-qsh-verification-via-context-jwts/47072"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210604-0004/",
"url": "https://security.netapp.com/advisory/ntap-20210604-0004/"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html",
"url": "http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210604-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210604-0006/"
}
]
}

View File

@ -68,6 +68,11 @@
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r536da4c4e4e406f7843461cc754a3d0a3fe575aa576e2b71a9cd57d0%40%3Cannounce.apache.org%3E",
"name": "https://lists.apache.org/thread.html/r536da4c4e4e406f7843461cc754a3d0a3fe575aa576e2b71a9cd57d0%40%3Cannounce.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210604-0009/",
"url": "https://security.netapp.com/advisory/ntap-20210604-0009/"
}
]
},

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://vuln.ryotak.me/advisories/6",
"url": "https://vuln.ryotak.me/advisories/6"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210604-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210604-0001/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-c314017fcc",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7JIPQAY5OZ5D3DA7INQILU7SGHTHMWB/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210604-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210604-0007/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "MISC",
"name": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md",
"url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210604-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210604-0002/"
}
]
}

View File

@ -68,6 +68,11 @@
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r91dd0ff556e0c9aab4c92852e0e540c59d4633718ce12881558cf44d%40%3Cusers.solr.apache.org%3E",
"name": "https://lists.apache.org/thread.html/r91dd0ff556e0c9aab4c92852e0e540c59d4633718ce12881558cf44d%40%3Cusers.solr.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210604-0009/",
"url": "https://security.netapp.com/advisory/ntap-20210604-0009/"
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-33841",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-33842",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}