From a72f7e2fecd60b5d734c009bef21ff088cf6ca43 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 16 Jun 2021 12:00:59 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2010/2xxx/CVE-2010-2076.json | 5 +++ 2011/1xxx/CVE-2011-1096.json | 5 +++ 2011/2xxx/CVE-2011-2487.json | 5 +++ 2012/0xxx/CVE-2012-0803.json | 5 +++ 2012/2xxx/CVE-2012-2378.json | 5 +++ 2012/2xxx/CVE-2012-2379.json | 5 +++ 2012/3xxx/CVE-2012-3451.json | 5 +++ 2012/5xxx/CVE-2012-5575.json | 5 +++ 2012/5xxx/CVE-2012-5633.json | 5 +++ 2013/0xxx/CVE-2013-0239.json | 5 +++ 2013/2xxx/CVE-2013-2160.json | 5 +++ 2014/0xxx/CVE-2014-0034.json | 5 +++ 2014/0xxx/CVE-2014-0035.json | 5 +++ 2014/0xxx/CVE-2014-0109.json | 5 +++ 2014/0xxx/CVE-2014-0110.json | 5 +++ 2014/3xxx/CVE-2014-3566.json | 5 +++ 2014/3xxx/CVE-2014-3577.json | 5 +++ 2014/3xxx/CVE-2014-3584.json | 5 +++ 2014/3xxx/CVE-2014-3623.json | 5 +++ 2015/5xxx/CVE-2015-5175.json | 5 +++ 2015/5xxx/CVE-2015-5253.json | 5 +++ 2016/4xxx/CVE-2016-4464.json | 5 +++ 2016/6xxx/CVE-2016-6812.json | 5 +++ 2016/8xxx/CVE-2016-8739.json | 5 +++ 2017/12xxx/CVE-2017-12624.json | 5 +++ 2017/12xxx/CVE-2017-12631.json | 5 +++ 2017/3xxx/CVE-2017-3156.json | 5 +++ 2017/5xxx/CVE-2017-5653.json | 5 +++ 2017/5xxx/CVE-2017-5656.json | 5 +++ 2017/7xxx/CVE-2017-7661.json | 5 +++ 2017/7xxx/CVE-2017-7662.json | 5 +++ 2018/0xxx/CVE-2018-0008.json | 5 +++ 2018/8xxx/CVE-2018-8038.json | 5 +++ 2018/8xxx/CVE-2018-8039.json | 5 +++ 2019/12xxx/CVE-2019-12406.json | 5 +++ 2019/12xxx/CVE-2019-12419.json | 5 +++ 2019/12xxx/CVE-2019-12423.json | 5 +++ 2019/17xxx/CVE-2019-17573.json | 5 +++ 2020/13xxx/CVE-2020-13954.json | 5 +++ 2020/1xxx/CVE-2020-1954.json | 5 +++ 2021/20xxx/CVE-2021-20093.json | 55 ++++++++++++++++++++++++++-- 2021/20xxx/CVE-2021-20094.json | 55 ++++++++++++++++++++++++++-- 2021/22xxx/CVE-2021-22696.json | 5 +++ 2021/27xxx/CVE-2021-27481.json | 50 ++++++++++++++++++++++++-- 2021/27xxx/CVE-2021-27487.json | 50 ++++++++++++++++++++++++-- 2021/27xxx/CVE-2021-27489.json | 50 ++++++++++++++++++++++++-- 2021/27xxx/CVE-2021-27612.json | 2 +- 2021/28xxx/CVE-2021-28979.json | 66 ++++++++++++++++++++++++++++++---- 2021/32xxx/CVE-2021-32033.json | 56 +++++++++++++++++++++++++---- 2021/32xxx/CVE-2021-32612.json | 66 ++++++++++++++++++++++++++++++---- 2021/33xxx/CVE-2021-33813.json | 66 ++++++++++++++++++++++++++++++---- 2021/34xxx/CVE-2021-34683.json | 61 +++++++++++++++++++++++++++---- 52 files changed, 736 insertions(+), 46 deletions(-) diff --git a/2010/2xxx/CVE-2010-2076.json b/2010/2xxx/CVE-2010-2076.json index 0d3c4fb934c..dea155e685f 100644 --- a/2010/2xxx/CVE-2010-2076.json +++ b/2010/2xxx/CVE-2010-2076.json @@ -126,6 +126,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2011/1xxx/CVE-2011-1096.json b/2011/1xxx/CVE-2011-1096.json index 610892d2f06..bd244954186 100644 --- a/2011/1xxx/CVE-2011-1096.json +++ b/2011/1xxx/CVE-2011-1096.json @@ -201,6 +201,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2011/2xxx/CVE-2011-2487.json b/2011/2xxx/CVE-2011-2487.json index f9c8dfb931f..208d362b6c6 100644 --- a/2011/2xxx/CVE-2011-2487.json +++ b/2011/2xxx/CVE-2011-2487.json @@ -153,6 +153,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2012/0xxx/CVE-2012-0803.json b/2012/0xxx/CVE-2012-0803.json index e6a02135483..70798e90ff8 100644 --- a/2012/0xxx/CVE-2012-0803.json +++ b/2012/0xxx/CVE-2012-0803.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2012/2xxx/CVE-2012-2378.json b/2012/2xxx/CVE-2012-2378.json index 5c2b872e01f..dd0c9c12683 100644 --- a/2012/2xxx/CVE-2012-2378.json +++ b/2012/2xxx/CVE-2012-2378.json @@ -111,6 +111,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2012/2xxx/CVE-2012-2379.json b/2012/2xxx/CVE-2012-2379.json index d8fe09e0047..b4380ed4903 100644 --- a/2012/2xxx/CVE-2012-2379.json +++ b/2012/2xxx/CVE-2012-2379.json @@ -166,6 +166,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2012/3xxx/CVE-2012-3451.json b/2012/3xxx/CVE-2012-3451.json index 45d91c06fcb..69aa58e8493 100644 --- a/2012/3xxx/CVE-2012-3451.json +++ b/2012/3xxx/CVE-2012-3451.json @@ -151,6 +151,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2012/5xxx/CVE-2012-5575.json b/2012/5xxx/CVE-2012-5575.json index 9e23f3654ca..c0303ff90cb 100644 --- a/2012/5xxx/CVE-2012-5575.json +++ b/2012/5xxx/CVE-2012-5575.json @@ -151,6 +151,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2012/5xxx/CVE-2012-5633.json b/2012/5xxx/CVE-2012-5633.json index c0cd6455f9f..f591323d2e4 100644 --- a/2012/5xxx/CVE-2012-5633.json +++ b/2012/5xxx/CVE-2012-5633.json @@ -176,6 +176,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2013/0xxx/CVE-2013-0239.json b/2013/0xxx/CVE-2013-0239.json index 502f9786a61..429ffa8d506 100644 --- a/2013/0xxx/CVE-2013-0239.json +++ b/2013/0xxx/CVE-2013-0239.json @@ -121,6 +121,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2013/2xxx/CVE-2013-2160.json b/2013/2xxx/CVE-2013-2160.json index 5a746b6a7f2..907175aaa4b 100644 --- a/2013/2xxx/CVE-2013-2160.json +++ b/2013/2xxx/CVE-2013-2160.json @@ -106,6 +106,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2014/0xxx/CVE-2014-0034.json b/2014/0xxx/CVE-2014-0034.json index 084a4e80811..6cabc82fbe1 100644 --- a/2014/0xxx/CVE-2014-0034.json +++ b/2014/0xxx/CVE-2014-0034.json @@ -121,6 +121,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2014/0xxx/CVE-2014-0035.json b/2014/0xxx/CVE-2014-0035.json index 68c9250e273..1cdfe8bea17 100644 --- a/2014/0xxx/CVE-2014-0035.json +++ b/2014/0xxx/CVE-2014-0035.json @@ -116,6 +116,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2014/0xxx/CVE-2014-0109.json b/2014/0xxx/CVE-2014-0109.json index aee0b8cee0a..e39fae07b35 100644 --- a/2014/0xxx/CVE-2014-0109.json +++ b/2014/0xxx/CVE-2014-0109.json @@ -101,6 +101,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2014/0xxx/CVE-2014-0110.json b/2014/0xxx/CVE-2014-0110.json index 7a14b9eeef2..9495669db99 100644 --- a/2014/0xxx/CVE-2014-0110.json +++ b/2014/0xxx/CVE-2014-0110.json @@ -101,6 +101,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2014/3xxx/CVE-2014-3566.json b/2014/3xxx/CVE-2014-3566.json index bb39e903766..ac1685c719a 100644 --- a/2014/3xxx/CVE-2014-3566.json +++ b/2014/3xxx/CVE-2014-3566.json @@ -1366,6 +1366,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2014/3xxx/CVE-2014-3577.json b/2014/3xxx/CVE-2014-3577.json index ec6243edff4..7065aaba8e2 100644 --- a/2014/3xxx/CVE-2014-3577.json +++ b/2014/3xxx/CVE-2014-3577.json @@ -271,6 +271,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2014/3xxx/CVE-2014-3584.json b/2014/3xxx/CVE-2014-3584.json index b64cbb2112b..27f5929971d 100644 --- a/2014/3xxx/CVE-2014-3584.json +++ b/2014/3xxx/CVE-2014-3584.json @@ -101,6 +101,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2014/3xxx/CVE-2014-3623.json b/2014/3xxx/CVE-2014-3623.json index 01a50624557..1402aec3eb1 100644 --- a/2014/3xxx/CVE-2014-3623.json +++ b/2014/3xxx/CVE-2014-3623.json @@ -121,6 +121,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2015/5xxx/CVE-2015-5175.json b/2015/5xxx/CVE-2015-5175.json index 1a04bdacc9d..fa7e6deb553 100644 --- a/2015/5xxx/CVE-2015-5175.json +++ b/2015/5xxx/CVE-2015-5175.json @@ -101,6 +101,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2015/5xxx/CVE-2015-5253.json b/2015/5xxx/CVE-2015-5253.json index 1ef9cad7e6e..ea938f7ee2d 100644 --- a/2015/5xxx/CVE-2015-5253.json +++ b/2015/5xxx/CVE-2015-5253.json @@ -101,6 +101,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2016/4xxx/CVE-2016-4464.json b/2016/4xxx/CVE-2016-4464.json index 450d1502bcb..14cae03ce26 100644 --- a/2016/4xxx/CVE-2016-4464.json +++ b/2016/4xxx/CVE-2016-4464.json @@ -101,6 +101,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2016/6xxx/CVE-2016-6812.json b/2016/6xxx/CVE-2016-6812.json index b288c2280d5..9729fcf476e 100644 --- a/2016/6xxx/CVE-2016-6812.json +++ b/2016/6xxx/CVE-2016-6812.json @@ -105,6 +105,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2016/8xxx/CVE-2016-8739.json b/2016/8xxx/CVE-2016-8739.json index 4007f57a35c..6a10cd305b0 100644 --- a/2016/8xxx/CVE-2016-8739.json +++ b/2016/8xxx/CVE-2016-8739.json @@ -100,6 +100,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2017/12xxx/CVE-2017-12624.json b/2017/12xxx/CVE-2017-12624.json index 1fc30d8a82b..b3717fa7afb 100644 --- a/2017/12xxx/CVE-2017-12624.json +++ b/2017/12xxx/CVE-2017-12624.json @@ -115,6 +115,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2017/12xxx/CVE-2017-12631.json b/2017/12xxx/CVE-2017-12631.json index 828f84ceaf1..04b1412c43d 100644 --- a/2017/12xxx/CVE-2017-12631.json +++ b/2017/12xxx/CVE-2017-12631.json @@ -95,6 +95,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2017/3xxx/CVE-2017-3156.json b/2017/3xxx/CVE-2017-3156.json index 1418fa17e0f..682958e2564 100644 --- a/2017/3xxx/CVE-2017-3156.json +++ b/2017/3xxx/CVE-2017-3156.json @@ -95,6 +95,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2017/5xxx/CVE-2017-5653.json b/2017/5xxx/CVE-2017-5653.json index 976d0841f7e..e19761ccde7 100644 --- a/2017/5xxx/CVE-2017-5653.json +++ b/2017/5xxx/CVE-2017-5653.json @@ -99,6 +99,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2017/5xxx/CVE-2017-5656.json b/2017/5xxx/CVE-2017-5656.json index 1a6809c79b2..2c10aa41ca1 100644 --- a/2017/5xxx/CVE-2017-5656.json +++ b/2017/5xxx/CVE-2017-5656.json @@ -104,6 +104,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2017/7xxx/CVE-2017-7661.json b/2017/7xxx/CVE-2017-7661.json index 1d07fb139dd..2b79350f9b6 100644 --- a/2017/7xxx/CVE-2017-7661.json +++ b/2017/7xxx/CVE-2017-7661.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2017/7xxx/CVE-2017-7662.json b/2017/7xxx/CVE-2017-7662.json index 44b290c1324..5fcfa908bcb 100644 --- a/2017/7xxx/CVE-2017-7662.json +++ b/2017/7xxx/CVE-2017-7662.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2018/0xxx/CVE-2018-0008.json b/2018/0xxx/CVE-2018-0008.json index 12d25cacccb..e0960447c92 100644 --- a/2018/0xxx/CVE-2018-0008.json +++ b/2018/0xxx/CVE-2018-0008.json @@ -144,6 +144,11 @@ "name": "https://kb.juniper.net/JSA10835", "refsource": "CONFIRM", "url": "https://kb.juniper.net/JSA10835" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] }, diff --git a/2018/8xxx/CVE-2018-8038.json b/2018/8xxx/CVE-2018-8038.json index 9e5436e3f3a..fb7f6ef58e4 100644 --- a/2018/8xxx/CVE-2018-8038.json +++ b/2018/8xxx/CVE-2018-8038.json @@ -97,6 +97,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2018/8xxx/CVE-2018-8039.json b/2018/8xxx/CVE-2018-8039.json index d6275df8090..b56b9c2fffc 100644 --- a/2018/8xxx/CVE-2018-8039.json +++ b/2018/8xxx/CVE-2018-8039.json @@ -170,6 +170,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] } diff --git a/2019/12xxx/CVE-2019-12406.json b/2019/12xxx/CVE-2019-12406.json index fd9b6353f21..1d01410a2d0 100644 --- a/2019/12xxx/CVE-2019-12406.json +++ b/2019/12xxx/CVE-2019-12406.json @@ -108,6 +108,11 @@ "refsource": "CONFIRM", "name": "http://cxf.apache.org/security-advisories.data/CVE-2019-12406.txt.asc", "url": "http://cxf.apache.org/security-advisories.data/CVE-2019-12406.txt.asc" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] }, diff --git a/2019/12xxx/CVE-2019-12419.json b/2019/12xxx/CVE-2019-12419.json index 531c3b22b76..9bed1fc45b9 100644 --- a/2019/12xxx/CVE-2019-12419.json +++ b/2019/12xxx/CVE-2019-12419.json @@ -108,6 +108,11 @@ "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] }, diff --git a/2019/12xxx/CVE-2019-12423.json b/2019/12xxx/CVE-2019-12423.json index 4bd85f17cb6..b0ed05bc71a 100644 --- a/2019/12xxx/CVE-2019-12423.json +++ b/2019/12xxx/CVE-2019-12423.json @@ -88,6 +88,11 @@ "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] }, diff --git a/2019/17xxx/CVE-2019-17573.json b/2019/17xxx/CVE-2019-17573.json index 75c43ccd544..30be81bba19 100644 --- a/2019/17xxx/CVE-2019-17573.json +++ b/2019/17xxx/CVE-2019-17573.json @@ -108,6 +108,11 @@ "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] }, diff --git a/2020/13xxx/CVE-2020-13954.json b/2020/13xxx/CVE-2020-13954.json index 54fa4e4d2a3..6f984f51406 100644 --- a/2020/13xxx/CVE-2020-13954.json +++ b/2020/13xxx/CVE-2020-13954.json @@ -127,6 +127,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210513-0010/", "url": "https://security.netapp.com/advisory/ntap-20210513-0010/" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] }, diff --git a/2020/1xxx/CVE-2020-1954.json b/2020/1xxx/CVE-2020-1954.json index b5f6b42e083..7f457e1898e 100644 --- a/2020/1xxx/CVE-2020-1954.json +++ b/2020/1xxx/CVE-2020-1954.json @@ -63,6 +63,11 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] }, diff --git a/2021/20xxx/CVE-2021-20093.json b/2021/20xxx/CVE-2021-20093.json index dbf2922e638..55f0bd1d40d 100644 --- a/2021/20xxx/CVE-2021-20093.json +++ b/2021/20xxx/CVE-2021-20093.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20093", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnreport@tenable.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Wibu-Systems CodeMeter", + "version": { + "version_data": [ + { + "version_value": "< 7.21a" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Over-read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.tenable.com/security/research/tra-2021-24", + "url": "https://www.tenable.com/security/research/tra-2021-24" + }, + { + "refsource": "MISC", + "name": "https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210423-01.pdf", + "url": "https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210423-01.pdf" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server." } ] } diff --git a/2021/20xxx/CVE-2021-20094.json b/2021/20xxx/CVE-2021-20094.json index eb00c2ad824..a0f17920748 100644 --- a/2021/20xxx/CVE-2021-20094.json +++ b/2021/20xxx/CVE-2021-20094.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20094", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnreport@tenable.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Wibu-Systems CodeMeter", + "version": { + "version_data": [ + { + "version_value": "< 7.21a" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Uncaught Exception" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.tenable.com/security/research/tra-2021-24", + "url": "https://www.tenable.com/security/research/tra-2021-24" + }, + { + "refsource": "MISC", + "name": "https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210423-02.pdf", + "url": "https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210423-02.pdf" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A denial of service vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to crash the CodeMeter Runtime Server." } ] } diff --git a/2021/22xxx/CVE-2021-22696.json b/2021/22xxx/CVE-2021-22696.json index b466c92c9da..dc6f81ebd5d 100644 --- a/2021/22xxx/CVE-2021-22696.json +++ b/2021/22xxx/CVE-2021-22696.json @@ -99,6 +99,11 @@ "refsource": "MLIST", "name": "[announce] 20210402 [Apache CXF] CVE-2021-22696: OAuth 2 authorization service vulnerable to DDos attacks", "url": "https://lists.apache.org/thread.html/r6445001cc5f9a2bb1e6316993753306e054bdd1d702656b7cbe59045@%3Cannounce.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" } ] }, diff --git a/2021/27xxx/CVE-2021-27481.json b/2021/27xxx/CVE-2021-27481.json index 7152d4c971e..bbc0e0ec13c 100644 --- a/2021/27xxx/CVE-2021-27481.json +++ b/2021/27xxx/CVE-2021-27481.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-27481", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ZOLL Defibrillator Dashboard", + "version": { + "version_data": [ + { + "version_value": "All versions prior to 2.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsma-21-161-01", + "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-161-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ZOLL Defibrillator Dashboard, v prior to 2.2, The affected products utilize an encryption key in the data exchange process, which is hardcoded. This could allow an attacker to gain access to sensitive information." } ] } diff --git a/2021/27xxx/CVE-2021-27487.json b/2021/27xxx/CVE-2021-27487.json index d77b6d980ac..99897d2fa53 100644 --- a/2021/27xxx/CVE-2021-27487.json +++ b/2021/27xxx/CVE-2021-27487.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-27487", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ZOLL Defibrillator Dashboard", + "version": { + "version_data": [ + { + "version_value": "All versions prior to 2.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsma-21-161-01", + "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-161-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ZOLL Defibrillator Dashboard, v prior to 2.2, The affected products contain credentials stored in plaintext. This could allow an attacker to gain access to sensitive information." } ] } diff --git a/2021/27xxx/CVE-2021-27489.json b/2021/27xxx/CVE-2021-27489.json index a2ed4d28541..54929bc27ce 100644 --- a/2021/27xxx/CVE-2021-27489.json +++ b/2021/27xxx/CVE-2021-27489.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-27489", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ZOLL Defibrillator Dashboard", + "version": { + "version_data": [ + { + "version_value": "All versions prior to 2.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsma-21-161-01", + "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-161-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ZOLL Defibrillator Dashboard, v prior to 2.2, The web application allows a non-administrative user to upload a malicious file. This file could allow an attacker to remotely execute arbitrary commands." } ] } diff --git a/2021/27xxx/CVE-2021-27612.json b/2021/27xxx/CVE-2021-27612.json index d01e35f4b04..50c278b81a3 100644 --- a/2021/27xxx/CVE-2021-27612.json +++ b/2021/27xxx/CVE-2021-27612.json @@ -39,7 +39,7 @@ "description_data": [ { "lang": "eng", - "value": "In specific situations SAP GUI for Windows, versions - 7.60 PL10, 7.70 PL1, forwards a user to specific malicious website which could contain malware or might lead to phishing attacks to steal credentials of the victim." + "value": "In specific situations SAP GUI for Windows until and including 7.60 PL9, 7.70 PL0, forwards a user to specific malicious website which could contain malware or might lead to phishing attacks to steal credentials of the victim." } ] }, diff --git a/2021/28xxx/CVE-2021-28979.json b/2021/28xxx/CVE-2021-28979.json index a8c730471ee..4751d3e4d69 100644 --- a/2021/28xxx/CVE-2021-28979.json +++ b/2021/28xxx/CVE-2021-28979.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28979", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28979", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SafeNet KeySecure Management Console 8.12.0 is vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://thales.com", + "refsource": "MISC", + "name": "http://thales.com" + }, + { + "refsource": "MISC", + "name": "https://www.gruppotim.it/redteam", + "url": "https://www.gruppotim.it/redteam" + }, + { + "url": "http://safenet.com", + "refsource": "MISC", + "name": "http://safenet.com" } ] } diff --git a/2021/32xxx/CVE-2021-32033.json b/2021/32xxx/CVE-2021-32033.json index 48240e087f1..d58135e0af7 100644 --- a/2021/32xxx/CVE-2021-32033.json +++ b/2021/32xxx/CVE-2021-32033.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-32033", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-32033", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Protectimus SLIM NFC 70 10.01 devices allow a Time Traveler attack in which attackers can predict TOTP passwords in certain situations. The time value used by the device can be set independently from the used seed value for generating time-based one-time passwords, without authentication. Thus, an attacker with short-time physical access to a device can set the internal real-time clock (RTC) to the future, generate one-time passwords, and reset the clock to the current time. This allows the generation of valid future time-based one-time passwords without having further access to the hardware token." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-007.txt", + "refsource": "MISC", + "name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-007.txt" } ] } diff --git a/2021/32xxx/CVE-2021-32612.json b/2021/32xxx/CVE-2021-32612.json index 808c1f30bd5..0465560a408 100644 --- a/2021/32xxx/CVE-2021-32612.json +++ b/2021/32xxx/CVE-2021-32612.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-32612", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-32612", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The VeryFitPro (com.veryfit2hr.second) application 3.2.8 for Android does all communication with the backend API over cleartext HTTP. This includes logins, registrations, and password change requests. This allows information theft and account takeover via network sniffing." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://trovent.io/security-advisory-2105-01", + "refsource": "MISC", + "name": "https://trovent.io/security-advisory-2105-01" + }, + { + "url": "https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt", + "refsource": "MISC", + "name": "https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt" + }, + { + "url": "https://play.google.com/store/apps/details?id=com.veryfit2hr.second&hl=en_US&gl=US", + "refsource": "MISC", + "name": "https://play.google.com/store/apps/details?id=com.veryfit2hr.second&hl=en_US&gl=US" } ] } diff --git a/2021/33xxx/CVE-2021-33813.json b/2021/33xxx/CVE-2021-33813.json index 848f901da30..b3bb63698d1 100644 --- a/2021/33xxx/CVE-2021-33813.json +++ b/2021/33xxx/CVE-2021-33813.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33813", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33813", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/hunterhacker/jdom/pull/188", + "refsource": "MISC", + "name": "https://github.com/hunterhacker/jdom/pull/188" + }, + { + "url": "https://github.com/hunterhacker/jdom/releases", + "refsource": "MISC", + "name": "https://github.com/hunterhacker/jdom/releases" + }, + { + "refsource": "MISC", + "name": "https://alephsecurity.com/vulns/aleph-2021003", + "url": "https://alephsecurity.com/vulns/aleph-2021003" } ] } diff --git a/2021/34xxx/CVE-2021-34683.json b/2021/34xxx/CVE-2021-34683.json index 77ae9ca2e31..ccfa01e2757 100644 --- a/2021/34xxx/CVE-2021-34683.json +++ b/2021/34xxx/CVE-2021-34683.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-34683", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-34683", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in EXCELLENT INFOTEK CORPORATION (EIC) E-document System 3.0. A remote attacker can use kw/auth/bbs/asp/get_user_email_info_bbs.asp to obtain the contact information (name and e-mail address) of everyone in the entire organization. This information can allow remote attackers to perform social engineering or brute force attacks against the system login page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.eic.com.tw/eicHome/pro00.html", + "refsource": "MISC", + "name": "https://www.eic.com.tw/eicHome/pro00.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/ethancsyang/CveProject/tree/main/CVE-2021-34683", + "url": "https://github.com/ethancsyang/CveProject/tree/main/CVE-2021-34683" } ] }