From a95b207eb535af7d92c36c57c3f99e60052c0a84 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 18 Aug 2021 03:00:51 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/12xxx/CVE-2018-12541.json | 5 +++++ 2021/32xxx/CVE-2021-32810.json | 5 +++++ 2021/35xxx/CVE-2021-35042.json | 5 +++++ 2021/38xxx/CVE-2021-38166.json | 10 ++++++++++ 2021/38xxx/CVE-2021-38699.json | 5 +++++ 2021/39xxx/CVE-2021-39240.json | 5 +++++ 2021/39xxx/CVE-2021-39241.json | 5 +++++ 2021/39xxx/CVE-2021-39242.json | 5 +++++ 2021/39xxx/CVE-2021-39271.json | 18 ++++++++++++++++++ 2021/39xxx/CVE-2021-39272.json | 18 ++++++++++++++++++ 2021/39xxx/CVE-2021-39273.json | 18 ++++++++++++++++++ 2021/39xxx/CVE-2021-39274.json | 18 ++++++++++++++++++ 12 files changed, 117 insertions(+) create mode 100644 2021/39xxx/CVE-2021-39271.json create mode 100644 2021/39xxx/CVE-2021-39272.json create mode 100644 2021/39xxx/CVE-2021-39273.json create mode 100644 2021/39xxx/CVE-2021-39274.json diff --git a/2018/12xxx/CVE-2018-12541.json b/2018/12xxx/CVE-2018-12541.json index 6b5f87ff8a4..ccc2da852ea 100644 --- a/2018/12xxx/CVE-2018-12541.json +++ b/2018/12xxx/CVE-2018-12541.json @@ -131,6 +131,11 @@ "refsource": "MLIST", "name": "[bookkeeper-issues] 20210623 [GitHub] [bookkeeper] sijie merged pull request #2693: [Security] Upgrade vertx to 3.9.8, addresses CVE-2018-12541", "url": "https://lists.apache.org/thread.html/r01123837ffbfdf5809e0a4ac354ad546e4ca8f18df89ee5a10eeb81b@%3Cissues.bookkeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[bookkeeper-commits] 20210817 [bookkeeper] 01/03: [Security] Upgrade vertx to 3.9.8, addresses CVE-2018-12541 (#2693)", + "url": "https://lists.apache.org/thread.html/r98dc06e2b1c498d0e9eb5038d8e1aefd24e411e50522e7082dd9e0b7@%3Ccommits.bookkeeper.apache.org%3E" } ] } diff --git a/2021/32xxx/CVE-2021-32810.json b/2021/32xxx/CVE-2021-32810.json index 98fe4618142..fa6df001b0f 100644 --- a/2021/32xxx/CVE-2021-32810.json +++ b/2021/32xxx/CVE-2021-32810.json @@ -141,6 +141,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-e5ec6d55bf", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-79ce3cb64a", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/" } ] }, diff --git a/2021/35xxx/CVE-2021-35042.json b/2021/35xxx/CVE-2021-35042.json index 7da91c9a7de..8af8f21c2db 100644 --- a/2021/35xxx/CVE-2021-35042.json +++ b/2021/35xxx/CVE-2021-35042.json @@ -76,6 +76,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210805-0008/", "url": "https://security.netapp.com/advisory/ntap-20210805-0008/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-78e501d62a", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/" } ] } diff --git a/2021/38xxx/CVE-2021-38166.json b/2021/38xxx/CVE-2021-38166.json index 156eac7cf4a..a9dbbab0ce1 100644 --- a/2021/38xxx/CVE-2021-38166.json +++ b/2021/38xxx/CVE-2021-38166.json @@ -61,6 +61,16 @@ "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=c4eb1f403243fc7bbb7de644db8587c03de36da6", "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=c4eb1f403243fc7bbb7de644db8587c03de36da6" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-b22606e88b", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GUVLBJKZMWA3E3YXSH4SZ7BOYGJP4GXP/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2021-f35f45a76f", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UL6CH5M5PRLMA3KPBX4LPUO6Z73GRISO/" } ] } diff --git a/2021/38xxx/CVE-2021-38699.json b/2021/38xxx/CVE-2021-38699.json index b658f5d7002..947799acd68 100644 --- a/2021/38xxx/CVE-2021-38699.json +++ b/2021/38xxx/CVE-2021-38699.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/163843/TastyIgniter-3.0.7-Cross-Site-Scripting.html", "url": "http://packetstormsecurity.com/files/163843/TastyIgniter-3.0.7-Cross-Site-Scripting.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS", + "url": "https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS" } ] } diff --git a/2021/39xxx/CVE-2021-39240.json b/2021/39xxx/CVE-2021-39240.json index a256ca4f273..baa32cb71ce 100644 --- a/2021/39xxx/CVE-2021-39240.json +++ b/2021/39xxx/CVE-2021-39240.json @@ -66,6 +66,11 @@ "url": "https://git.haproxy.org/?p=haproxy.git;a=commit;h=4b8852c70d8c4b7e225e24eb58258a15eb54c26e", "refsource": "MISC", "name": "https://git.haproxy.org/?p=haproxy.git;a=commit;h=4b8852c70d8c4b7e225e24eb58258a15eb54c26e" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4960", + "url": "https://www.debian.org/security/2021/dsa-4960" } ] } diff --git a/2021/39xxx/CVE-2021-39241.json b/2021/39xxx/CVE-2021-39241.json index ab8b9c73076..dacf4f61a9a 100644 --- a/2021/39xxx/CVE-2021-39241.json +++ b/2021/39xxx/CVE-2021-39241.json @@ -61,6 +61,11 @@ "url": "https://git.haproxy.org/?p=haproxy.git;a=commit;h=89265224d314a056d77d974284802c1b8a0dc97f", "refsource": "MISC", "name": "https://git.haproxy.org/?p=haproxy.git;a=commit;h=89265224d314a056d77d974284802c1b8a0dc97f" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4960", + "url": "https://www.debian.org/security/2021/dsa-4960" } ] } diff --git a/2021/39xxx/CVE-2021-39242.json b/2021/39xxx/CVE-2021-39242.json index f06028c02df..75fce0d7ed2 100644 --- a/2021/39xxx/CVE-2021-39242.json +++ b/2021/39xxx/CVE-2021-39242.json @@ -61,6 +61,11 @@ "url": "https://git.haproxy.org/?p=haproxy.git;a=commit;h=b5d2b9e154d78e4075db163826c5e0f6d31b2ab1", "refsource": "MISC", "name": "https://git.haproxy.org/?p=haproxy.git;a=commit;h=b5d2b9e154d78e4075db163826c5e0f6d31b2ab1" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4960", + "url": "https://www.debian.org/security/2021/dsa-4960" } ] } diff --git a/2021/39xxx/CVE-2021-39271.json b/2021/39xxx/CVE-2021-39271.json new file mode 100644 index 00000000000..485696cf6d3 --- /dev/null +++ b/2021/39xxx/CVE-2021-39271.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-39271", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39272.json b/2021/39xxx/CVE-2021-39272.json new file mode 100644 index 00000000000..e1aeaff1858 --- /dev/null +++ b/2021/39xxx/CVE-2021-39272.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-39272", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39273.json b/2021/39xxx/CVE-2021-39273.json new file mode 100644 index 00000000000..781a364e15e --- /dev/null +++ b/2021/39xxx/CVE-2021-39273.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-39273", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/39xxx/CVE-2021-39274.json b/2021/39xxx/CVE-2021-39274.json new file mode 100644 index 00000000000..a68924b2487 --- /dev/null +++ b/2021/39xxx/CVE-2021-39274.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-39274", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file