mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
245b8541b3
commit
b966cb739b
@ -53,6 +53,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=26945",
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26945"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210528-0009/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210528-0009/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,6 +48,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210528-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210528-0008/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -91,6 +91,11 @@
|
||||
"name": "https://www.npmjs.com/package/schema-inspector",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.npmjs.com/package/schema-inspector"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210528-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210528-0006/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,6 +87,16 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[pulsar-dev] 20210528 Re: Cutting 2.6.4 release to address CVE-2021-22160",
|
||||
"url": "https://lists.apache.org/thread.html/r08c7df60cae031361df7fbac39d08b6d5b5079e74db5195d409db9a2@%3Cdev.pulsar.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[pulsar-commits] 20210528 [GitHub] [pulsar] lhotari commented on issue #10733: Pulsar 2.6.3 JWT enabled - /admin/v2/non-persistent/public/default 401 error",
|
||||
"url": "https://lists.apache.org/thread.html/re2ae364e0c02093dc721699698c6f23cfbba0220c78b5e28cafeae81@%3Ccommits.pulsar.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[pulsar-commits] 20210528 [GitHub] [pulsar] lhotari edited a comment on issue #10733: Pulsar 2.6.3 JWT enabled - /admin/v2/non-persistent/public/default 401 error",
|
||||
"url": "https://lists.apache.org/thread.html/rf54fefc25c49d4715d484133d438f13bf2e515a5fed5d3a745d4f6e7@%3Ccommits.pulsar.apache.org%3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -94,6 +94,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html",
|
||||
"url": "http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210528-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210528-0007/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20210414 CVE-2021-27850: Apache Tapestry: Bypass of the fix for CVE-2019-0195",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2021/04/15/1"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210528-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210528-0002/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-01044b8a59",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210528-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210528-0001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md",
|
||||
"url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210528-0010/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210528-0010/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-7b8b65bc7a",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTVFTLFVCSUE5CXHINJEUCKSHU4SWDMT/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210528-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210528-0003/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -83,6 +83,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-491/",
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-491/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210528-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210528-0004/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,6 +48,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1951118",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951118"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210528-0005/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210528-0005/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user