"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-09-22 00:00:58 +00:00
parent 6bb5dd3b66
commit ee53033769
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
22 changed files with 380 additions and 30 deletions

View File

@ -111,6 +111,36 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212815",
"url": "https://support.apple.com/kb/HT212815"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Sep/33"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-2 watchOS 8",
"url": "http://seclists.org/fulldisclosure/2021/Sep/34"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/Sep/40"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-3 tvOS 15",
"url": "http://seclists.org/fulldisclosure/2021/Sep/35"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
"url": "http://seclists.org/fulldisclosure/2021/Sep/38"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
"url": "http://seclists.org/fulldisclosure/2021/Sep/39"
}
]
}

View File

@ -101,6 +101,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212818",
"url": "https://support.apple.com/kb/HT212818"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13",
"url": "http://seclists.org/fulldisclosure/2021/Sep/36"
}
]
}

View File

@ -101,6 +101,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212818",
"url": "https://support.apple.com/kb/HT212818"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13",
"url": "http://seclists.org/fulldisclosure/2021/Sep/36"
}
]
}

View File

@ -101,6 +101,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212818",
"url": "https://support.apple.com/kb/HT212818"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13",
"url": "http://seclists.org/fulldisclosure/2021/Sep/36"
}
]
}

View File

@ -82,6 +82,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212818",
"url": "https://support.apple.com/kb/HT212818"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13",
"url": "http://seclists.org/fulldisclosure/2021/Sep/36"
}
]
}

View File

@ -119,6 +119,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212818",
"url": "https://support.apple.com/kb/HT212818"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13",
"url": "http://seclists.org/fulldisclosure/2021/Sep/36"
}
]
}

View File

@ -114,6 +114,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212818",
"url": "https://support.apple.com/kb/HT212818"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13",
"url": "http://seclists.org/fulldisclosure/2021/Sep/36"
}
]
}

View File

@ -129,6 +129,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212818",
"url": "https://support.apple.com/kb/HT212818"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13",
"url": "http://seclists.org/fulldisclosure/2021/Sep/36"
}
]
}

View File

@ -171,6 +171,11 @@
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"refsource": "MLIST",
"name": "[kafka-commits] 20210921 [kafka-site] branch asf-site updated: Add CVE-2021-38153 (#375)",
"url": "https://lists.apache.org/thread.html/rda253155601968331b5cf0da4f273813bbd91843c2568a8495d1c662@%3Ccommits.kafka.apache.org%3E"
}
]
},

View File

@ -101,6 +101,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212818",
"url": "https://support.apple.com/kb/HT212818"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13",
"url": "http://seclists.org/fulldisclosure/2021/Sep/36"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-23266",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-23266",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in gpac 0.8.0. The OD_ReadUTF8String function in odf_code.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/gpac/gpac/issues/1481",
"refsource": "MISC",
"name": "https://github.com/gpac/gpac/issues/1481"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-23267",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-23267",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in gpac 0.8.0. The gf_hinter_track_process function in isom_hinter_track_process.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/gpac/gpac/issues/1479",
"refsource": "MISC",
"name": "https://github.com/gpac/gpac/issues/1479"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-23269",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-23269",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in gpac 0.8.0. The stbl_GetSampleSize function in isomedia/stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/gpac/gpac/issues/1482",
"refsource": "MISC",
"name": "https://github.com/gpac/gpac/issues/1482"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-23273",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-23273",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Heap-buffer overflow in the randomize_iparp function in edit_packet.c. of Tcpreplay v4.3.2 allows attackers to cause a denial of service (DOS) via a crafted pcap."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/appneta/tcpreplay/issues/579",
"refsource": "MISC",
"name": "https://github.com/appneta/tcpreplay/issues/579"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "CONFIRM",
"name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203",
"url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html",
"url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html"
}
]
}

View File

@ -68,6 +68,16 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212804",
"url": "https://support.apple.com/kb/HT212804"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/Sep/40"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
"url": "http://seclists.org/fulldisclosure/2021/Sep/39"
}
]
},

View File

@ -54,6 +54,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212805",
"url": "https://support.apple.com/kb/HT212805"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/Sep/40"
}
]
},

View File

@ -86,6 +86,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212805",
"url": "https://support.apple.com/kb/HT212805"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/Sep/40"
}
]
},

View File

@ -90,6 +90,16 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-c00e45b6c0",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
"url": "http://seclists.org/fulldisclosure/2021/Sep/38"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
"url": "http://seclists.org/fulldisclosure/2021/Sep/39"
}
]
},

View File

@ -117,6 +117,21 @@
"refsource": "FULLDISC",
"name": "20210917 APPLE-SA-2021-09-13-2 watchOS 7.6.2",
"url": "http://seclists.org/fulldisclosure/2021/Sep/26"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/Sep/40"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
"url": "http://seclists.org/fulldisclosure/2021/Sep/38"
},
{
"refsource": "FULLDISC",
"name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
"url": "http://seclists.org/fulldisclosure/2021/Sep/39"
}
]
},

View File

@ -56,6 +56,11 @@
"refsource": "MISC",
"name": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329",
"url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125329"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html",
"url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-41382",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-41382",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Plastic SCM before 10.0.16.5622 mishandles the WebAdmin server management interface."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.plasticscm.com/download/releasenotes/10.0.16.5622",
"refsource": "MISC",
"name": "https://www.plasticscm.com/download/releasenotes/10.0.16.5622"
}
]
}