"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-06-14 18:01:37 +00:00
parent 2ae6322bfc
commit e2cd0aa252
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
16 changed files with 175 additions and 133 deletions

View File

@ -61,6 +61,11 @@
"name": "https://github.com/openemr/openemr/pull/1757/commits/c2808a0493243f618bbbb3459af23c7da3dc5485",
"refsource": "CONFIRM",
"url": "https://github.com/openemr/openemr/pull/1757/commits/c2808a0493243f618bbbb3459af23c7da3dc5485"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163110/OpenEMR-5.0.1.3-Shell-Upload.html",
"url": "http://packetstormsecurity.com/files/163110/OpenEMR-5.0.1.3-Shell-Upload.html"
}
]
}

View File

@ -78,6 +78,11 @@
"name": "https://github.com/glpi-project/glpi/commit/ad748d59c94da177a3ed25111c453902396f320c",
"refsource": "MISC",
"url": "https://github.com/glpi-project/glpi/commit/ad748d59c94da177a3ed25111c453902396f320c"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html"
}
]
},

View File

@ -148,9 +148,9 @@
"url": "https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"refsource": "MLIST",
"name": "[drill-dev] 20210614 [GitHub] [drill] ssainz opened a new issue #2260: CVE-2020-8908 in Guava v.28.2-jre, should upgrade to v.30.1.1",
"url": "https://lists.apache.org/thread.html/r037fed1d0ebde50c9caf8d99815db3093c344c3f651c5a49a09824ce@%3Cdev.drill.apache.org%3E"
}
]
},

View File

@ -70,7 +70,9 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYXLKQJ3D632XSG6VO7M4YFDAG6GRCLY/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -63,7 +63,9 @@
"refsource": "CONFIRM"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -69,13 +69,15 @@
"name": "FEDORA-2021-6aaba80ba2",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210416-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210416-0001/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -74,13 +74,15 @@
"name": "FEDORA-2021-6aaba80ba2",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210416-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210416-0001/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -185,11 +185,6 @@
"name": "FEDORA-2021-e525e48886",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210326-0004/",
"url": "https://security.netapp.com/advisory/ntap-20210326-0004/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update",
@ -236,7 +231,14 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210326-0004/",
"url": "https://security.netapp.com/advisory/ntap-20210326-0004/"
}
]
},

View File

@ -77,13 +77,15 @@
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210219-0009/",
"url": "https://security.netapp.com/advisory/ntap-20210219-0009/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -90,21 +90,21 @@
"name": "DSA-4855",
"url": "https://www.debian.org/security/2021/dsa-4855"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210219-0009/",
"url": "https://security.netapp.com/advisory/ntap-20210219-0009/"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-03",
"url": "https://www.tenable.com/security/tns-2021-03"
},
{
"refsource": "GENTOO",
"name": "GLSA-202103-03",
"url": "https://security.gentoo.org/glsa/202103-03"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-10",
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-09",
@ -112,11 +112,13 @@
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-10",
"url": "https://www.tenable.com/security/tns-2021-10"
"name": "https://security.netapp.com/advisory/ntap-20210219-0009/",
"url": "https://security.netapp.com/advisory/ntap-20210219-0009/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-03",
"url": "https://www.tenable.com/security/tns-2021-03"
}
]
}

View File

@ -90,46 +90,11 @@
"name": "DSA-4855",
"url": "https://www.debian.org/security/2021/dsa-4855"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210219-0009/",
"url": "https://security.netapp.com/advisory/ntap-20210219-0009/"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-03",
"url": "https://www.tenable.com/security/tns-2021-03"
},
{
"refsource": "GENTOO",
"name": "GLSA-202103-03",
"url": "https://security.gentoo.org/glsa/202103-03"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-09",
"url": "https://www.tenable.com/security/tns-2021-09"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212529",
"url": "https://support.apple.com/kb/HT212529"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212528",
"url": "https://support.apple.com/kb/HT212528"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212534",
"url": "https://support.apple.com/kb/HT212534"
},
{
"refsource": "FULLDISC",
"name": "20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4",
@ -146,7 +111,44 @@
"url": "http://seclists.org/fulldisclosure/2021/May/67"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-09",
"url": "https://www.tenable.com/security/tns-2021-09"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210219-0009/",
"url": "https://security.netapp.com/advisory/ntap-20210219-0009/"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-03",
"url": "https://www.tenable.com/security/tns-2021-03"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212529",
"url": "https://support.apple.com/kb/HT212529"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212528",
"url": "https://support.apple.com/kb/HT212528"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212534",
"url": "https://support.apple.com/kb/HT212534"
}
]
}

View File

@ -95,11 +95,6 @@
"name": "[activemq-commits] 20210208 [activemq-website] branch master updated: Publish CVE-2020-13947",
"url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210304-0008/",
"url": "https://security.netapp.com/advisory/ntap-20210304-0008/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210305 [SECURITY] [DLA 2583-1] activemq security update",
@ -161,7 +156,14 @@
"url": "https://lists.apache.org/thread.html/ra255ddfc8b613b80e9fa22ff3e106168b245f38a22316bfb54d21159@%3Cissues.activemq.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210304-0008/",
"url": "https://security.netapp.com/advisory/ntap-20210304-0008/"
}
]
},

View File

@ -56,6 +56,11 @@
"url": "https://gist.github.com/0xx7/58943bb6e9ef77a09d3c7eb00dcafdc7",
"refsource": "MISC",
"name": "https://gist.github.com/0xx7/58943bb6e9ef77a09d3c7eb00dcafdc7"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html",
"url": "http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://gist.github.com/0xx7/7e9f1b725f7ff98b9239d3cb027b7dc8",
"refsource": "MISC",
"name": "https://gist.github.com/0xx7/7e9f1b725f7ff98b9239d3cb027b7dc8"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163115/Accela-Civic-Platform-21.1-Cross-Site-Scripting-Open-Redirection.html",
"url": "http://packetstormsecurity.com/files/163115/Accela-Civic-Platform-21.1-Cross-Site-Scripting-Open-Redirection.html"
}
]
}

View File

@ -87,16 +87,6 @@
"name": "DSA-4875",
"url": "https://www.debian.org/security/2021/dsa-4875"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210326-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210326-0006/"
},
{
"refsource": "MISC",
"name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
@ -122,25 +112,20 @@
"name": "GLSA-202103-03",
"url": "https://security.gentoo.org/glsa/202103-03"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-06",
"url": "https://www.tenable.com/security/tns-2021-06"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-05",
"url": "https://www.tenable.com/security/tns-2021-05"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-cbf14ab8f9",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356"
"name": "https://www.tenable.com/security/tns-2021-10",
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"refsource": "CONFIRM",
@ -154,11 +139,28 @@
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-10",
"url": "https://www.tenable.com/security/tns-2021-10"
"name": "https://security.netapp.com/advisory/ntap-20210326-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210326-0006/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"refsource": "MISC",
"name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-06",
"url": "https://www.tenable.com/security/tns-2021-06"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-05",
"url": "https://www.tenable.com/security/tns-2021-05"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356"
}
]
}

View File

@ -72,31 +72,21 @@
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
},
{
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b"
},
{
"name": "https://www.openssl.org/news/secadv/20210325.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
},
{
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b"
},
{
"refsource": "CISCO",
"name": "20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210326-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210326-0006/"
},
{
"refsource": "MISC",
"name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
@ -122,30 +112,15 @@
"name": "GLSA-202103-03",
"url": "https://security.gentoo.org/glsa/202103-03"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-05",
"url": "https://www.tenable.com/security/tns-2021-05"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-cbf14ab8f9",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-08",
"url": "https://www.tenable.com/security/tns-2021-08"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html",
"url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html"
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
@ -153,7 +128,34 @@
"url": "https://www.tenable.com/security/tns-2021-09"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210326-0006/",
"url": "https://security.netapp.com/advisory/ntap-20210326-0006/"
},
{
"refsource": "MISC",
"name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-05",
"url": "https://www.tenable.com/security/tns-2021-05"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-08",
"url": "https://www.tenable.com/security/tns-2021-08"
},
{
"refsource": "MISC",
"name": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html",
"url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html"
}
]
}