mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
87cf3146e6
commit
ca62e80281
@ -128,6 +128,11 @@
|
||||
"name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[druid-commits] 20210226 [GitHub] [druid] kingnj opened a new issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty",
|
||||
"url": "https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -133,6 +133,11 @@
|
||||
"name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[druid-commits] 20210226 [GitHub] [druid] kingnj opened a new issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty",
|
||||
"url": "https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -106,6 +106,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210219-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210219-0007/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0007/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0006/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -106,6 +106,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210219-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210219-0007/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0007/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0006/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -111,6 +111,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210219-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210219-0007/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0007/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0006/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -86,6 +86,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4845",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4845"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4845",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4845"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4845",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4845"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4845",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4845"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4845",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4845"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4845",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4845"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4845",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4845"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4845",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4845"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4845",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4845"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4845",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4845"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"name": "https://github.com/moby/moby/commit/64bd4485b3a66a597c02c95f5776395e540b2c7c",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/moby/moby/commit/64bd4485b3a66a597c02c95f5776395e540b2c7c"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0005/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0005/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -96,6 +96,11 @@
|
||||
"name": "https://github.com/moby/moby/commit/8d3179546e79065adefa67cc697c09d0ab137d30",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/moby/moby/commit/8d3179546e79065adefa67cc697c09d0ab137d30"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0005/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0005/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
18
2021/27xxx/CVE-2021-27737.json
Normal file
18
2021/27xxx/CVE-2021-27737.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-27737",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/27xxx/CVE-2021-27738.json
Normal file
18
2021/27xxx/CVE-2021-27738.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-27738",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -151,6 +151,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-907f3bacae",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0003/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-5329c680f7",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210226-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user