mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
7b1f278a57
commit
ce13252800
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0170",
|
||||
"refsource": "REDHAT",
|
||||
@ -67,28 +62,35 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0195.html"
|
||||
},
|
||||
{
|
||||
"name": "http://shibboleth.net/community/advisories/secadv_20131213.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://shibboleth.net/community/advisories/secadv_20131213.txt"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0172",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0172.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1043332",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1043332"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0171",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0171.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml"
|
||||
},
|
||||
{
|
||||
"name": "http://shibboleth.net/community/advisories/secadv_20131213.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://shibboleth.net/community/advisories/secadv_20131213.txt"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1043332",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1043332"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -168,9 +168,9 @@
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.drupal.org/sa-core-2022-002",
|
||||
"url": "https://www.drupal.org/sa-core-2022-002"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
@ -178,7 +178,9 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.drupal.org/sa-core-2022-002",
|
||||
"url": "https://www.drupal.org/sa-core-2022-002"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -458,7 +458,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -134,7 +134,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/3565494c263dfeb4dcb2a71cb24d09a1ca285cd6ac74edc025a3af8a@%3Ccommits.tinkerpop.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -44,11 +44,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://marc.info/?l=xerces-c-users&m=157653840106914&w=2",
|
||||
"url": "https://marc.info/?l=xerces-c-users&m=157653840106914&w=2"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[xerces-c-dev] 20200110 [xerces-c] 06/13: Add CVE-2018-1311 advisory and web site note.",
|
||||
@ -90,7 +85,14 @@
|
||||
"url": "https://lists.apache.org/thread.html/r90ec105571622a7dc3a43b846c12732d2e563561dfb2f72941625f35@%3Cc-users.xerces.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://marc.info/?l=xerces-c-users&m=157653840106914&w=2",
|
||||
"url": "https://marc.info/?l=xerces-c-users&m=157653840106914&w=2"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -84,7 +84,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r5532dc8d5456b5151e8c286801e2e5769f5c04118b29c3b5d13ea387@%3Cissues.beam.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -305,7 +305,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,11 +44,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[accumulo-notifications] 20200108 [GitHub] [accumulo] milleruntime opened a new pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219",
|
||||
@ -105,7 +100,14 @@
|
||||
"url": "https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219",
|
||||
"refsource": "CONFIRM"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -403,7 +403,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -45,16 +45,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1025466",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1025466"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:4238",
|
||||
@ -136,7 +126,19 @@
|
||||
"url": "https://usn.ubuntu.com/4298-2/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1025466",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1025466"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -133,7 +133,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -123,7 +123,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -98,7 +98,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96@%3Ccommits.airflow.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -80,7 +80,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -113,7 +113,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -143,7 +143,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,7 +118,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -265,7 +265,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -375,7 +375,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -146,7 +146,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -85,7 +85,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -123,7 +123,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://support.ntp.org/bin/view/Main/NtpBug3596",
|
||||
"refsource": "MISC",
|
||||
"name": "http://support.ntp.org/bin/view/Main/NtpBug3596"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.ntp.org/show_bug.cgi?id=3596",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.ntp.org/show_bug.cgi?id=3596"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200625-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200625-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0934",
|
||||
@ -83,7 +68,24 @@
|
||||
"url": "https://security.gentoo.org/glsa/202007-12"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "http://support.ntp.org/bin/view/Main/NtpBug3596",
|
||||
"refsource": "MISC",
|
||||
"name": "http://support.ntp.org/bin/view/Main/NtpBug3596"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.ntp.org/show_bug.cgi?id=3596",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.ntp.org/show_bug.cgi?id=3596"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200625-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200625-0004/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -105,7 +105,9 @@
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -120,7 +120,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -176,7 +176,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -580,7 +580,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r995b945cc8f6ec976d8c52d42ba931a688b45fb32cbdde715b6a816a@%3Cuser.thrift.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -345,7 +345,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -50,7 +50,9 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860218"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -88,7 +88,9 @@
|
||||
"url": "https://blog.jetbrains.com/blog/2020/08/06/jetbrains-security-bulletin-q2-2020/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -99,7 +99,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -185,7 +185,9 @@
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -85,7 +85,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -300,7 +300,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,11 +44,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/r1933faf8a26c431f38a5f8dbbfab80254454e54e33a79be474b67dc4%40%3Cdev.ignite.apache.org%3E",
|
||||
"url": "https://lists.apache.org/thread.html/r1933faf8a26c431f38a5f8dbbfab80254454e54e33a79be474b67dc4%40%3Cdev.ignite.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20200603 [CVE-2020-1963] Apache Ignite access to file system disclosure vulnerability",
|
||||
@ -90,7 +85,14 @@
|
||||
"url": "https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cuser.ignite.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/r1933faf8a26c431f38a5f8dbbfab80254454e54e33a79be474b67dc4%40%3Cdev.ignite.apache.org%3E",
|
||||
"url": "https://lists.apache.org/thread.html/r1933faf8a26c431f38a5f8dbbfab80254454e54e33a79be474b67dc4%40%3Cdev.ignite.apache.org%3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -17,7 +17,7 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SupportCandy – Helpdesk & Support Ticket System",
|
||||
"product_name": "SupportCandy \u2013 Helpdesk & Support Ticket System",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
|
@ -17,7 +17,7 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SupportCandy – Helpdesk & Support Ticket System",
|
||||
"product_name": "SupportCandy \u2013 Helpdesk & Support Ticket System",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
|
@ -44,15 +44,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/e6dd140e-0c9d-41dc-821e-4910a13122c1",
|
||||
"name": "https://wpscan.com/vulnerability/e6dd140e-0c9d-41dc-821e-4910a13122c1"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/2652469",
|
||||
"name": "https://plugins.trac.wordpress.org/changeset/2652469"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/e6dd140e-0c9d-41dc-821e-4910a13122c1",
|
||||
"name": "https://wpscan.com/vulnerability/e6dd140e-0c9d-41dc-821e-4910a13122c1"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -71,7 +71,7 @@
|
||||
"credit": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Krzysztof Zając"
|
||||
"value": "Krzysztof Zaj\u0105c"
|
||||
}
|
||||
],
|
||||
"source": {
|
||||
|
@ -12,20 +12,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Kaseya VSA on premise",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "v9.x",
|
||||
"version_value": "9.5.6"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Kaseya"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -22,24 +22,21 @@
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Kaseya",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Kaseya VSA",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_name": "v9.x",
|
||||
"version_affected": "<=",
|
||||
"version_value": "v.9.5.6",
|
||||
"platform": ""
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -12,20 +12,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Kaseya VSA",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "v9.x",
|
||||
"version_value": "v9.5.5"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Kaseya"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -12,32 +12,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Kaseya VSA on Premise",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "v9.x",
|
||||
"version_value": "v9.5.6"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Kaseya CSA SaaS",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "v9.x",
|
||||
"version_value": "v9.5.6"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Kaseya"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -12,32 +12,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Kaseya VSA on premise",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "v9.x",
|
||||
"version_value": "v9.5.6"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Kaseya VSA SaaS",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "v9.x",
|
||||
"version_value": "v9.5.6"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Kaseya"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -12,32 +12,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Kaseya VSA on premise",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "v9.x",
|
||||
"version_value": "v9.5.6"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Kaseya VSA SaaS",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "v9.x",
|
||||
"version_value": "v9.5.6"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Kaseya"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -88,7 +74,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-98: Improper Control of Filename for Include/Require"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -12,32 +12,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Kaseya VSA on premise",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "v9.x",
|
||||
"version_value": "v9.5.6"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Kaseya VSA SaaS",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "v9.x",
|
||||
"version_value": "v9.5.6"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Kaseya"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -84,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-611 Improper Restriction of XML External Entity Reference ('XXE')"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -97,6 +83,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
|
||||
},
|
||||
{
|
||||
"name": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021"
|
||||
},
|
||||
{
|
||||
"name": "https://csirt.divd.nl/DIVD-2021-00011",
|
||||
"refsource": "CONFIRM",
|
||||
@ -106,11 +97,6 @@
|
||||
"name": "https://csirt.divd.nl/CVE-2021-30201",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://csirt.divd.nl/CVE-2021-30201"
|
||||
},
|
||||
{
|
||||
"name": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -64,6 +64,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5046",
|
||||
"url": "https://www.debian.org/security/2022/dsa-5046"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1398",
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1398"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39153.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,11 +87,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://x-stream.github.io/CVE-2021-39154.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
|
||||
@ -118,7 +113,14 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -109,11 +109,6 @@
|
||||
"name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4982",
|
||||
@ -125,7 +120,14 @@
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -173,7 +173,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -67,18 +67,20 @@
|
||||
"name": "[oss-security] 20210128 Re: glibc iconv crash with ISO-2022-JP-3",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2021/01/28/2"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210304-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210304-0007/"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202107-07",
|
||||
"url": "https://security.gentoo.org/glsa/202107-07"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210304-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210304-0007/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -105,7 +105,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210629-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -70,7 +70,9 @@
|
||||
"url": "https://security.gentoo.org/glsa/202105-20"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -59,16 +59,6 @@
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/230",
|
||||
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/230"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539",
|
||||
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-b950000d2b",
|
||||
@ -79,13 +69,25 @@
|
||||
"name": "GLSA-202107-05",
|
||||
"url": "https://security.gentoo.org/glsa/202107-05"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/230",
|
||||
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/230"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539",
|
||||
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210716-0005/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210716-0005/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -89,13 +89,15 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211022-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211022-0004/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -49,13 +49,15 @@
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210805-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210805-0007/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -64,18 +64,20 @@
|
||||
"name": "FEDORA-2021-288925ac19",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKYD3ZRAMDAQX3ZW6THHUF3GXN7FF6B4/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211004-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211004-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-f2a020a065",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRK67AJCWYYVAGF5SGAHNZXCX3PN3ZFP/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211004-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211004-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -112,6 +112,11 @@
|
||||
"name": "https://www.tenable.com/security/tns-2021-16",
|
||||
"url": "https://www.tenable.com/security/tns-2021-16"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211022-0003/",
|
||||
@ -121,9 +126,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2022-02",
|
||||
"url": "https://www.tenable.com/security/tns-2022-02"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -135,13 +135,15 @@
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2022-02",
|
||||
"url": "https://www.tenable.com/security/tns-2022-02"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -109,11 +109,6 @@
|
||||
"name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression",
|
||||
@ -134,18 +129,25 @@
|
||||
"name": "[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438",
|
||||
"url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2021-17",
|
||||
"url": "https://www.tenable.com/security/tns-2021-17"
|
||||
},
|
||||
{
|
||||
"refsource": "CISCO",
|
||||
"name": "20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2021-17",
|
||||
"url": "https://www.tenable.com/security/tns-2021-17"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -79,13 +79,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.drupal.org/sa-core-2021-011",
|
||||
"url": "https://www.drupal.org/sa-core-2021-011"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -79,13 +79,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.drupal.org/sa-core-2021-011",
|
||||
"url": "https://www.drupal.org/sa-core-2021-011"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -78,7 +78,9 @@
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41355"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -88,18 +88,20 @@
|
||||
"name": "20211007 Apache HTTP Server Vulnerabilties: October 2021",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211029-0009/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211029-0009/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-f94985afca",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211029-0009/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211029-0009/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -190,9 +190,9 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2021/10/16/1"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html"
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
@ -201,11 +201,13 @@
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html"
|
||||
"name": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -154,11 +154,6 @@
|
||||
"name": "FEDORA-2021-2a10bc68a4",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-aaf90ef84a",
|
||||
@ -175,20 +170,20 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2021/10/16/1"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html"
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211029-0009/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211029-0009/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html",
|
||||
@ -196,11 +191,18 @@
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html",
|
||||
"url": "http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html"
|
||||
"name": "http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html",
|
||||
"url": "http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -86,18 +86,20 @@
|
||||
"name": "[myfaces-commits] 20211021 [myfaces-tobago] branch tobago-5.x updated: build: workaround for CVE-2021-42340",
|
||||
"url": "https://lists.apache.org/thread.html/r8097a2d1550aa78e585fc77e602b9046e6d4099d8d132497c5387784@%3Ccommits.myfaces.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211104-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211104-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5009",
|
||||
"url": "https://www.debian.org/security/2021/dsa-5009"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211104-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211104-0001/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -52,13 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/",
|
||||
"url": "https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,16 +93,21 @@
|
||||
"name": "FEDORA-2021-29a536c2ae",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211224-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211224-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5035",
|
||||
"url": "https://www.debian.org/security/2022/dsa-5035"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211224-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211224-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2022-01",
|
||||
@ -112,9 +117,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2022-03",
|
||||
"url": "https://www.tenable.com/security/tns-2022-03"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -305,6 +305,11 @@
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html",
|
||||
@ -324,9 +329,6 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -88,16 +88,21 @@
|
||||
"name": "FEDORA-2021-29a536c2ae",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211224-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211224-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5035",
|
||||
"url": "https://www.debian.org/security/2022/dsa-5035"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211224-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211224-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2022-01",
|
||||
@ -107,9 +112,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2022-03",
|
||||
"url": "https://www.tenable.com/security/tns-2022-03"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -126,11 +126,6 @@
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220104-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220104-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-c6f471ce0f",
|
||||
@ -142,7 +137,14 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220104-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220104-0001/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -149,7 +149,9 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -153,7 +153,9 @@
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -81,6 +81,16 @@
|
||||
"name": "VU#930724",
|
||||
"url": "https://www.kb.cert.org/vuls/id/930724"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220118 CVE-2022-23302: Deserialization of untrusted data in JMSSink in Apache Log4j 1.x",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033",
|
||||
@ -90,14 +100,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211223-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211223-0007/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220118 CVE-2022-23302: Deserialization of untrusted data in JMSSink in Apache Log4j 1.x",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
18
2022/0xxx/CVE-2022-0511.json
Normal file
18
2022/0xxx/CVE-2022-0511.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0511",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/0xxx/CVE-2022-0512.json
Normal file
18
2022/0xxx/CVE-2022-0512.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0512",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In api.rb in Sidekiq before 6.4.0, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users."
|
||||
"value": "In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,6 +61,11 @@
|
||||
"url": "https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/rubysec/ruby-advisory-db/pull/495",
|
||||
"url": "https://github.com/rubysec/ruby-advisory-db/pull/495"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user