"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-02-07 16:01:52 +00:00
parent 7b1f278a57
commit ce13252800
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
78 changed files with 755 additions and 644 deletions

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name": "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml",
"refsource": "MISC",
"url": "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml"
},
{
"name": "RHSA-2014:0170",
"refsource": "REDHAT",
@ -67,28 +62,35 @@
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0195.html"
},
{
"name": "http://shibboleth.net/community/advisories/secadv_20131213.txt",
"refsource": "CONFIRM",
"url": "http://shibboleth.net/community/advisories/secadv_20131213.txt"
},
{
"name": "RHSA-2014:0172",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0172.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1043332",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1043332"
},
{
"name": "RHSA-2014:0171",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0171.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"name": "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml",
"refsource": "MISC",
"url": "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml"
},
{
"name": "http://shibboleth.net/community/advisories/secadv_20131213.txt",
"refsource": "CONFIRM",
"url": "http://shibboleth.net/community/advisories/secadv_20131213.txt"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1043332",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1043332"
}
]
}

View File

@ -168,9 +168,9 @@
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://www.drupal.org/sa-core-2022-002",
"url": "https://www.drupal.org/sa-core-2022-002"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "MLIST",
@ -178,7 +178,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"refsource": "CONFIRM",
"name": "https://www.drupal.org/sa-core-2022-002",
"url": "https://www.drupal.org/sa-core-2022-002"
}
]
}

View File

@ -458,7 +458,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -134,7 +134,9 @@
"url": "https://lists.apache.org/thread.html/3565494c263dfeb4dcb2a71cb24d09a1ca285cd6ac74edc025a3af8a@%3Ccommits.tinkerpop.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -44,11 +44,6 @@
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://marc.info/?l=xerces-c-users&m=157653840106914&w=2",
"url": "https://marc.info/?l=xerces-c-users&m=157653840106914&w=2"
},
{
"refsource": "MLIST",
"name": "[xerces-c-dev] 20200110 [xerces-c] 06/13: Add CVE-2018-1311 advisory and web site note.",
@ -90,7 +85,14 @@
"url": "https://lists.apache.org/thread.html/r90ec105571622a7dc3a43b846c12732d2e563561dfb2f72941625f35@%3Cc-users.xerces.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://marc.info/?l=xerces-c-users&m=157653840106914&w=2",
"url": "https://marc.info/?l=xerces-c-users&m=157653840106914&w=2"
}
]
},

View File

@ -84,7 +84,9 @@
"url": "https://lists.apache.org/thread.html/r5532dc8d5456b5151e8c286801e2e5769f5c04118b29c3b5d13ea387@%3Cissues.beam.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -305,7 +305,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -44,11 +44,6 @@
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[accumulo-notifications] 20200108 [GitHub] [accumulo] milleruntime opened a new pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219",
@ -105,7 +100,14 @@
"url": "https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219",
"refsource": "CONFIRM"
}
]
},

View File

@ -403,7 +403,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -45,16 +45,6 @@
},
"references": {
"reference_data": [
{
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
},
{
"url": "https://crbug.com/1025466",
"refsource": "MISC",
"name": "https://crbug.com/1025466"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4238",
@ -136,7 +126,19 @@
"url": "https://usn.ubuntu.com/4298-2/"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
},
{
"url": "https://crbug.com/1025466",
"refsource": "MISC",
"name": "https://crbug.com/1025466"
}
]
},

View File

@ -133,7 +133,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -123,7 +123,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -98,7 +98,9 @@
"url": "https://lists.apache.org/thread.html/r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96@%3Ccommits.airflow.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -80,7 +80,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -113,7 +113,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -143,7 +143,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -118,7 +118,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -265,7 +265,9 @@
"url": "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -375,7 +375,9 @@
"url": "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -146,7 +146,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -85,7 +85,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -123,7 +123,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "http://support.ntp.org/bin/view/Main/NtpBug3596",
"refsource": "MISC",
"name": "http://support.ntp.org/bin/view/Main/NtpBug3596"
},
{
"url": "https://bugs.ntp.org/show_bug.cgi?id=3596",
"refsource": "MISC",
"name": "https://bugs.ntp.org/show_bug.cgi?id=3596"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200625-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200625-0004/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0934",
@ -83,7 +68,24 @@
"url": "https://security.gentoo.org/glsa/202007-12"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"url": "http://support.ntp.org/bin/view/Main/NtpBug3596",
"refsource": "MISC",
"name": "http://support.ntp.org/bin/view/Main/NtpBug3596"
},
{
"url": "https://bugs.ntp.org/show_bug.cgi?id=3596",
"refsource": "MISC",
"name": "https://bugs.ntp.org/show_bug.cgi?id=3596"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200625-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200625-0004/"
}
]
},

View File

@ -105,7 +105,9 @@
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -120,7 +120,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -176,7 +176,9 @@
"url": "https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -580,7 +580,9 @@
"url": "https://lists.apache.org/thread.html/r995b945cc8f6ec976d8c52d42ba931a688b45fb32cbdde715b6a816a@%3Cuser.thrift.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -345,7 +345,9 @@
"url": "https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -50,7 +50,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860218"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -88,7 +88,9 @@
"url": "https://blog.jetbrains.com/blog/2020/08/06/jetbrains-security-bulletin-q2-2020/"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -99,7 +99,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -185,7 +185,9 @@
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -85,7 +85,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -300,7 +300,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -44,11 +44,6 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r1933faf8a26c431f38a5f8dbbfab80254454e54e33a79be474b67dc4%40%3Cdev.ignite.apache.org%3E",
"url": "https://lists.apache.org/thread.html/r1933faf8a26c431f38a5f8dbbfab80254454e54e33a79be474b67dc4%40%3Cdev.ignite.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200603 [CVE-2020-1963] Apache Ignite access to file system disclosure vulnerability",
@ -90,7 +85,14 @@
"url": "https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cuser.ignite.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r1933faf8a26c431f38a5f8dbbfab80254454e54e33a79be474b67dc4%40%3Cdev.ignite.apache.org%3E",
"url": "https://lists.apache.org/thread.html/r1933faf8a26c431f38a5f8dbbfab80254454e54e33a79be474b67dc4%40%3Cdev.ignite.apache.org%3E"
}
]
},

View File

@ -17,7 +17,7 @@
"product": {
"product_data": [
{
"product_name": "SupportCandy Helpdesk & Support Ticket System",
"product_name": "SupportCandy \u2013 Helpdesk & Support Ticket System",
"version": {
"version_data": [
{

View File

@ -17,7 +17,7 @@
"product": {
"product_data": [
{
"product_name": "SupportCandy Helpdesk & Support Ticket System",
"product_name": "SupportCandy \u2013 Helpdesk & Support Ticket System",
"version": {
"version_data": [
{

View File

@ -44,15 +44,15 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/e6dd140e-0c9d-41dc-821e-4910a13122c1",
"name": "https://wpscan.com/vulnerability/e6dd140e-0c9d-41dc-821e-4910a13122c1"
},
{
"refsource": "CONFIRM",
"url": "https://plugins.trac.wordpress.org/changeset/2652469",
"name": "https://plugins.trac.wordpress.org/changeset/2652469"
},
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/e6dd140e-0c9d-41dc-821e-4910a13122c1",
"name": "https://wpscan.com/vulnerability/e6dd140e-0c9d-41dc-821e-4910a13122c1"
}
]
},
@ -71,7 +71,7 @@
"credit": [
{
"lang": "eng",
"value": "Krzysztof Zając"
"value": "Krzysztof Zaj\u0105c"
}
],
"source": {

View File

@ -12,20 +12,18 @@
"product": {
"product_data": [
{
"product_name": "Kaseya VSA on premise",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "v9.x",
"version_value": "9.5.6"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Kaseya"
"vendor_name": "n/a"
}
]
}

View File

@ -22,24 +22,21 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Kaseya",
"product": {
"product_data": [
{
"product_name": "Kaseya VSA",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_name": "v9.x",
"version_affected": "<=",
"version_value": "v.9.5.6",
"platform": ""
"version_value": "n/a"
}
]
}
}
]
}
},
"vendor_name": "n/a"
}
]
}

View File

@ -12,20 +12,18 @@
"product": {
"product_data": [
{
"product_name": "Kaseya VSA",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "v9.x",
"version_value": "v9.5.5"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Kaseya"
"vendor_name": "n/a"
}
]
}

View File

@ -12,32 +12,18 @@
"product": {
"product_data": [
{
"product_name": "Kaseya VSA on Premise",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "v9.x",
"version_value": "v9.5.6"
}
]
}
},
{
"product_name": "Kaseya CSA SaaS",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "v9.x",
"version_value": "v9.5.6"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Kaseya"
"vendor_name": "n/a"
}
]
}

View File

@ -12,32 +12,18 @@
"product": {
"product_data": [
{
"product_name": "Kaseya VSA on premise",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "v9.x",
"version_value": "v9.5.6"
}
]
}
},
{
"product_name": "Kaseya VSA SaaS",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "v9.x",
"version_value": "v9.5.6"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Kaseya"
"vendor_name": "n/a"
}
]
}

View File

@ -12,32 +12,18 @@
"product": {
"product_data": [
{
"product_name": "Kaseya VSA on premise",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "v9.x",
"version_value": "v9.5.6"
}
]
}
},
{
"product_name": "Kaseya VSA SaaS",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "v9.x",
"version_value": "v9.5.6"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Kaseya"
"vendor_name": "n/a"
}
]
}
@ -88,7 +74,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-98: Improper Control of Filename for Include/Require"
"value": "n/a"
}
]
}

View File

@ -12,32 +12,18 @@
"product": {
"product_data": [
{
"product_name": "Kaseya VSA on premise",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "v9.x",
"version_value": "v9.5.6"
}
]
}
},
{
"product_name": "Kaseya VSA SaaS",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "v9.x",
"version_value": "v9.5.6"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Kaseya"
"vendor_name": "n/a"
}
]
}
@ -84,7 +70,7 @@
"description": [
{
"lang": "eng",
"value": "CWE-611 Improper Restriction of XML External Entity Reference ('XXE')"
"value": "n/a"
}
]
}
@ -97,6 +83,11 @@
"refsource": "CONFIRM",
"url": "https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/"
},
{
"name": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021",
"refsource": "CONFIRM",
"url": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021"
},
{
"name": "https://csirt.divd.nl/DIVD-2021-00011",
"refsource": "CONFIRM",
@ -106,11 +97,6 @@
"name": "https://csirt.divd.nl/CVE-2021-30201",
"refsource": "CONFIRM",
"url": "https://csirt.divd.nl/CVE-2021-30201"
},
{
"name": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021",
"refsource": "CONFIRM",
"url": "https://helpdesk.kaseya.com/hc/en-gb/articles/360019966738-9-5-6-Feature-Release-8-May-2021"
}
]
},

View File

@ -64,6 +64,11 @@
"refsource": "DEBIAN",
"name": "DSA-5046",
"url": "https://www.debian.org/security/2022/dsa-5046"
},
{
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1398",
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1398"
}
]
},

View File

@ -87,11 +87,6 @@
"refsource": "MISC",
"url": "https://x-stream.github.io/CVE-2021-39153.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
@ -118,7 +113,14 @@
"url": "https://www.debian.org/security/2021/dsa-5004"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
}
]
},

View File

@ -87,11 +87,6 @@
"refsource": "MISC",
"url": "https://x-stream.github.io/CVE-2021-39154.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
@ -118,7 +113,14 @@
"url": "https://www.debian.org/security/2021/dsa-5004"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
}
]
},

View File

@ -109,11 +109,6 @@
"name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4982",
@ -125,7 +120,14 @@
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
}
]
},

View File

@ -173,7 +173,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -67,18 +67,20 @@
"name": "[oss-security] 20210128 Re: glibc iconv crash with ISO-2022-JP-3",
"url": "http://www.openwall.com/lists/oss-security/2021/01/28/2"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210304-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210304-0007/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-07",
"url": "https://security.gentoo.org/glsa/202107-07"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210304-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210304-0007/"
}
]
}

View File

@ -105,7 +105,9 @@
"url": "https://security.netapp.com/advisory/ntap-20210629-0003/"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -70,7 +70,9 @@
"url": "https://security.gentoo.org/glsa/202105-20"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -59,16 +59,6 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225"
},
{
"refsource": "MISC",
"name": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/230",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/230"
},
{
"refsource": "MISC",
"name": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-b950000d2b",
@ -79,13 +69,25 @@
"name": "GLSA-202107-05",
"url": "https://security.gentoo.org/glsa/202107-05"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "MISC",
"name": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/230",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/230"
},
{
"refsource": "MISC",
"name": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210716-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210716-0005/"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -89,13 +89,15 @@
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211022-0004/",
"url": "https://security.netapp.com/advisory/ntap-20211022-0004/"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -49,13 +49,15 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210805-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210805-0007/"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -64,18 +64,20 @@
"name": "FEDORA-2021-288925ac19",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKYD3ZRAMDAQX3ZW6THHUF3GXN7FF6B4/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211004-0003/",
"url": "https://security.netapp.com/advisory/ntap-20211004-0003/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-f2a020a065",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRK67AJCWYYVAGF5SGAHNZXCX3PN3ZFP/"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211004-0003/",
"url": "https://security.netapp.com/advisory/ntap-20211004-0003/"
}
]
},

View File

@ -112,6 +112,11 @@
"name": "https://www.tenable.com/security/tns-2021-16",
"url": "https://www.tenable.com/security/tns-2021-16"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211022-0003/",
@ -121,9 +126,6 @@
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2022-02",
"url": "https://www.tenable.com/security/tns-2022-02"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -135,13 +135,15 @@
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2022-02",
"url": "https://www.tenable.com/security/tns-2022-02"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -109,11 +109,6 @@
"name": "[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
},
{
"refsource": "MLIST",
"name": "[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression",
@ -134,18 +129,25 @@
"name": "[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438",
"url": "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-17",
"url": "https://www.tenable.com/security/tns-2021-17"
},
{
"refsource": "CISCO",
"name": "20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-17",
"url": "https://www.tenable.com/security/tns-2021-17"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211008-0004/",
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
}
]
},

View File

@ -79,13 +79,15 @@
"refsource": "MISC",
"url": "https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://www.drupal.org/sa-core-2021-011",
"url": "https://www.drupal.org/sa-core-2021-011"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -79,13 +79,15 @@
"refsource": "CONFIRM",
"url": "https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://www.drupal.org/sa-core-2021-011",
"url": "https://www.drupal.org/sa-core-2021-011"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -78,7 +78,9 @@
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41355"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -88,18 +88,20 @@
"name": "20211007 Apache HTTP Server Vulnerabilties: October 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211029-0009/",
"url": "https://security.netapp.com/advisory/ntap-20211029-0009/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-f94985afca",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211029-0009/",
"url": "https://security.netapp.com/advisory/ntap-20211029-0009/"
}
]
},

View File

@ -190,9 +190,9 @@
"url": "http://www.openwall.com/lists/oss-security/2021/10/16/1"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html"
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
@ -201,11 +201,13 @@
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html"
"name": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html"
}
]
},

View File

@ -154,11 +154,6 @@
"name": "FEDORA-2021-2a10bc68a4",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-aaf90ef84a",
@ -175,20 +170,20 @@
"url": "http://www.openwall.com/lists/oss-security/2021/10/16/1"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html"
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211029-0009/",
"url": "https://security.netapp.com/advisory/ntap-20211029-0009/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html",
@ -196,11 +191,18 @@
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html",
"url": "http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html"
"name": "http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html",
"url": "http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html"
}
]
},

View File

@ -86,18 +86,20 @@
"name": "[myfaces-commits] 20211021 [myfaces-tobago] branch tobago-5.x updated: build: workaround for CVE-2021-42340",
"url": "https://lists.apache.org/thread.html/r8097a2d1550aa78e585fc77e602b9046e6d4099d8d132497c5387784@%3Ccommits.myfaces.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211104-0001/",
"url": "https://security.netapp.com/advisory/ntap-20211104-0001/"
},
{
"refsource": "DEBIAN",
"name": "DSA-5009",
"url": "https://www.debian.org/security/2021/dsa-5009"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211104-0001/",
"url": "https://security.netapp.com/advisory/ntap-20211104-0001/"
}
]
},

View File

@ -52,13 +52,15 @@
},
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "MISC",
"name": "https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/",
"url": "https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
}

View File

@ -93,16 +93,21 @@
"name": "FEDORA-2021-29a536c2ae",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211224-0001/",
"url": "https://security.netapp.com/advisory/ntap-20211224-0001/"
},
{
"refsource": "DEBIAN",
"name": "DSA-5035",
"url": "https://www.debian.org/security/2022/dsa-5035"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211224-0001/",
"url": "https://security.netapp.com/advisory/ntap-20211224-0001/"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2022-01",
@ -112,9 +117,6 @@
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2022-03",
"url": "https://www.tenable.com/security/tns-2022-03"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -305,6 +305,11 @@
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html",
@ -324,9 +329,6 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -88,16 +88,21 @@
"name": "FEDORA-2021-29a536c2ae",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211224-0001/",
"url": "https://security.netapp.com/advisory/ntap-20211224-0001/"
},
{
"refsource": "DEBIAN",
"name": "DSA-5035",
"url": "https://www.debian.org/security/2022/dsa-5035"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211224-0001/",
"url": "https://security.netapp.com/advisory/ntap-20211224-0001/"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2022-01",
@ -107,9 +112,6 @@
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2022-03",
"url": "https://www.tenable.com/security/tns-2022-03"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -126,11 +126,6 @@
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220104-0001/",
"url": "https://security.netapp.com/advisory/ntap-20220104-0001/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-c6f471ce0f",
@ -142,7 +137,14 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC/"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220104-0001/",
"url": "https://security.netapp.com/advisory/ntap-20220104-0001/"
}
]
},

View File

@ -149,7 +149,9 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -153,7 +153,9 @@
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -81,6 +81,16 @@
"name": "VU#930724",
"url": "https://www.kb.cert.org/vuls/id/930724"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220118 CVE-2022-23302: Deserialization of untrusted data in JMSSink in Apache Log4j 1.x",
"url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033",
@ -90,14 +100,6 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211223-0007/",
"url": "https://security.netapp.com/advisory/ntap-20211223-0007/"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220118 CVE-2022-23302: Deserialization of untrusted data in JMSSink in Apache Log4j 1.x",
"url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0511",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0512",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "In api.rb in Sidekiq before 6.4.0, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users."
"value": "In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users."
}
]
},
@ -61,6 +61,11 @@
"url": "https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md",
"refsource": "MISC",
"name": "https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md"
},
{
"refsource": "MISC",
"name": "https://github.com/rubysec/ruby-advisory-db/pull/495",
"url": "https://github.com/rubysec/ruby-advisory-db/pull/495"
}
]
}