"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-05-26 19:00:42 +00:00
parent 7cef30b2cb
commit b5c3a36697
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
26 changed files with 942 additions and 86 deletions

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10863",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-10863",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "redhat-certification",
"version": {
"version_data": [
{
"version_value": "redhat-certification 7"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-552"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1594122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594122"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "It has been discovered that redhat-certification is not properly configured and it lists all files and directories in the /var/www/rhcert/store/transfer directory through the /rhcert-transfer URL. An unauthorized attacker may use this flaw to gather sensible information. This flaw affects redhat-certification version 7."
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10865",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-10865",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "redhat-certification",
"version": {
"version_data": [
{
"version_value": "redhat-certification 7"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593631"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "It has been discovered that redhat-certification does not perform an authorization check and allows an unauthenticated user to call a \"restart\" RPC method on any host accessible by the system. An attacker could use this flaw to send requests to port 8009 of any host or to keep restarting the RHCertD daemon on a host of another customer. This flaw affects redhat-certification version 7."
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10866",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-10866",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "redhat-certification",
"version": {
"version_data": [
{
"version_value": "redhat-certification 7"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593632"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "It has been discovered that redhat-certification does not perform an authorization check and it allows an unauthenticated user to remove a \"system\" file, that is an xml file with host related information, not belonging to him. This flaw affects redhat-certification version 7."
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10867",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-10867",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "redhat-certification",
"version": {
"version_data": [
{
"version_value": "redhat-certification 7"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-552"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593764"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "It has been discovered that redhat-certification does not restrict file access in the /update/results page. A remote attacker could use this vulnerability to remove any file accessible by the user which is running httpd. This flaw affects redhat-certification version 7."
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10868",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-10868",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "redhat-certification",
"version": {
"version_data": [
{
"version_value": "redhat-certification 7"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-776"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1593776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593776"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "It has been discovered that redhat-certification does not properly limit the number of recursive definitions of entities in XML documents while parsing the status of a host. A remote attacker could use this vulnerability to consume all the memory of the server and cause a Denial of Service. This flaw affects redhat-certification version 7."
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-16494",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-16494",
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Versa VOS",
"version": {
"version_data": [
{
"version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insecure Temporary File (CWE-377)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/1168191",
"url": "https://hackerone.com/reports/1168191"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In VOS and overly permissive \"umask\" may allow for authorized users of the server to gain unauthorized access through insecure file permissions that can result in an arbitrary read, write, or execution of newly created files and directories. Insecure umask setting was present throughout the Versa servers."
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-16495",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-16495",
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Versa VOS",
"version": {
"version_data": [
{
"version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Session Fixation (CWE-384)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/1168192",
"url": "https://hackerone.com/reports/1168192"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In VOS user session identifier (authentication token) is issued to the browser prior to authentication but is not changed after the user successfully logs into the application. Failing to issue a new session ID following a successful login introduces the possibility for an attacker to set up a trap session on the device the victim is likely to login with."
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-16496",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-16496",
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Versa Director",
"version": {
"version_data": [
{
"version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Authentication - Generic (CWE-287)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/1168193",
"url": "https://hackerone.com/reports/1168193"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In Versa Director, the un-authentication request found."
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-16497",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-16497",
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Versa Analytics",
"version": {
"version_data": [
{
"version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Privilege Management (CWE-269)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/1168194",
"url": "https://hackerone.com/reports/1168194"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In Versa Analytics, the cron jobs are used for scheduling tasks by executing commands at specific dates and times on the server. If the job is run as the user root, there is a potential privilege escalation vulnerability. In this case, the job runs a script as root that is writable by users who are members of the versa group."
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-16498",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-16498",
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Versa Director",
"version": {
"version_data": [
{
"version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cleartext Storage of Sensitive Information (CWE-312)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/1168195",
"url": "https://hackerone.com/reports/1168195"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In Versa Director, the unencrypted backup files stored on the Versa deployment contain credentials stored within configuration files. These credentials are for various application components such as SNMP, and SSL and Trust keystores."
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-16499",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-16499",
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Versa VOS",
"version": {
"version_data": [
{
"version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Inadequate Encryption Strength (CWE-326)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/1168196",
"url": "https://hackerone.com/reports/1168196"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In VOS compromised, an attacker at network endpoints can possibly view communications between an unsuspecting user and the service using man-in-the-middle attacks. Usage of unapproved SSH encryption protocols or cipher suites also violates the Data Protection TSR (Technical Security Requirements)."
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-25029",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Versa Director",
"version": {
"version_data": [
{
"version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Command Injection - Generic (CWE-77)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/1168198",
"url": "https://hackerone.com/reports/1168198"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In Versa Director, the command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application. Command injection attacks are possible largely due to insufficient input validation."
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-25030",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Versa Director, Versa Analytics, Versa VOS",
"version": {
"version_data": [
{
"version_value": "Fixed Versions: 16.1R2S11, 20.2.2, 21.1.1, 21.2.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insufficiently Protected Credentials (CWE-522)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/1168197",
"url": "https://hackerone.com/reports/1168197"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In Versa Director, Versa Analytics and VOS, Passwords are not hashed using an adaptive cryptographic hash function or key derivation function prior to storage. Popular hashing algorithms based on the Merkle-Damgardconstruction (such as MD5 and SHA-1) alone are insufficient in thwarting password cracking. Attackers can generate and use precomputed hashes for all possible password character combinations (commonly referred to as \"rainbow tables\") relatively quickly. The use of adaptive hashing algorithms such asscryptorbcryptor Key-Derivation Functions (i.e.PBKDF2) to hash passwords make generation of such rainbow tables computationally infeasible."
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-15076",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@openvpn.net",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Private Tunnel",
"version": {
"version_data": [
{
"version_value": "3.0.1 and prior versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-61: UNIX Symbolic Link (Symlink) Following"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://swupdate.openvpn.net/downloads/privatetunnel/changelog.txt",
"url": "https://swupdate.openvpn.net/downloads/privatetunnel/changelog.txt"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Private Tunnel installer for macOS version 3.0.1 and older versions may corrupt system critical files it should not have access via symlinks in /tmp."
}
]
}

View File

@ -101,6 +101,26 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212531",
"url": "https://support.apple.com/kb/HT212531"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212530",
"url": "https://support.apple.com/kb/HT212530"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4",
"url": "http://seclists.org/fulldisclosure/2021/May/70"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/May/64"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave",
"url": "http://seclists.org/fulldisclosure/2021/May/65"
}
]
}

View File

@ -106,6 +106,26 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212531",
"url": "https://support.apple.com/kb/HT212531"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212530",
"url": "https://support.apple.com/kb/HT212530"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4",
"url": "http://seclists.org/fulldisclosure/2021/May/70"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/May/64"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave",
"url": "http://seclists.org/fulldisclosure/2021/May/65"
}
]
}

View File

@ -91,6 +91,26 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212531",
"url": "https://support.apple.com/kb/HT212531"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212530",
"url": "https://support.apple.com/kb/HT212530"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4",
"url": "http://seclists.org/fulldisclosure/2021/May/70"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/May/64"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave",
"url": "http://seclists.org/fulldisclosure/2021/May/65"
}
]
}

View File

@ -106,6 +106,26 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212531",
"url": "https://support.apple.com/kb/HT212531"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212530",
"url": "https://support.apple.com/kb/HT212530"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4",
"url": "http://seclists.org/fulldisclosure/2021/May/70"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/May/64"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave",
"url": "http://seclists.org/fulldisclosure/2021/May/65"
}
]
}

View File

@ -101,6 +101,31 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212529",
"url": "https://support.apple.com/kb/HT212529"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212531",
"url": "https://support.apple.com/kb/HT212531"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212530",
"url": "https://support.apple.com/kb/HT212530"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4",
"url": "http://seclists.org/fulldisclosure/2021/May/70"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/May/64"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave",
"url": "http://seclists.org/fulldisclosure/2021/May/65"
}
]
}

View File

@ -106,6 +106,26 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212531",
"url": "https://support.apple.com/kb/HT212531"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212530",
"url": "https://support.apple.com/kb/HT212530"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4",
"url": "http://seclists.org/fulldisclosure/2021/May/70"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/May/64"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave",
"url": "http://seclists.org/fulldisclosure/2021/May/65"
}
]
}

View File

@ -86,6 +86,31 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212529",
"url": "https://support.apple.com/kb/HT212529"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212531",
"url": "https://support.apple.com/kb/HT212531"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212530",
"url": "https://support.apple.com/kb/HT212530"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4",
"url": "http://seclists.org/fulldisclosure/2021/May/70"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/May/64"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave",
"url": "http://seclists.org/fulldisclosure/2021/May/65"
}
]
}

View File

@ -86,6 +86,31 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212529",
"url": "https://support.apple.com/kb/HT212529"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212531",
"url": "https://support.apple.com/kb/HT212531"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212530",
"url": "https://support.apple.com/kb/HT212530"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4",
"url": "http://seclists.org/fulldisclosure/2021/May/70"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/May/64"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave",
"url": "http://seclists.org/fulldisclosure/2021/May/65"
}
]
}

View File

@ -86,6 +86,31 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212529",
"url": "https://support.apple.com/kb/HT212529"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212531",
"url": "https://support.apple.com/kb/HT212531"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212530",
"url": "https://support.apple.com/kb/HT212530"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4",
"url": "http://seclists.org/fulldisclosure/2021/May/70"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/May/64"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave",
"url": "http://seclists.org/fulldisclosure/2021/May/65"
}
]
}

View File

@ -91,6 +91,26 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212531",
"url": "https://support.apple.com/kb/HT212531"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212530",
"url": "https://support.apple.com/kb/HT212530"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4",
"url": "http://seclists.org/fulldisclosure/2021/May/70"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-4 Security Update 2021-003 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/May/64"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-3 Security Update 2021-004 Mojave",
"url": "http://seclists.org/fulldisclosure/2021/May/65"
}
]
}

View File

@ -129,6 +129,21 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212534",
"url": "https://support.apple.com/kb/HT212534"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4",
"url": "http://seclists.org/fulldisclosure/2021/May/70"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-5 Safari 14.1.1",
"url": "http://seclists.org/fulldisclosure/2021/May/68"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-1 iOS 14.6 and iPadOS 14.6",
"url": "http://seclists.org/fulldisclosure/2021/May/67"
}
]
}

View File

@ -96,6 +96,11 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31209",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31209"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-615/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-615/"
}
]
}