"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-07-21 15:02:04 +00:00
parent 8faf1b8b32
commit efe424c745
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
57 changed files with 451 additions and 170 deletions

View File

@ -326,6 +326,21 @@
"refsource": "MLIST",
"name": "[iotdb-commits] 20210328 [iotdb] branch master updated: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088 (#2906)",
"url": "https://lists.apache.org/thread.html/r9e25496608036573736cee484d8d03dae400f09e443b0000b6adc042@%3Ccommits.iotdb.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[flink-dev] 20210720 [jira] [Created] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
"url": "https://lists.apache.org/thread.html/r99a6552e45ca6ba1082031421f51799a4a665eda905ab2c2aa9d6ffa@%3Cdev.flink.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[flink-issues] 20210720 [jira] [Created] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
"url": "https://lists.apache.org/thread.html/r573eb577a67503e72181eee637d9b0ac042197e632bcdfce76af06a3@%3Cissues.flink.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[flink-issues] 20210721 [jira] [Commented] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
"url": "https://lists.apache.org/thread.html/r891761d5014f9ffd79d9737482de832462de538b6c4bdcef21aad729@%3Cissues.flink.apache.org%3E"
}
]
}

View File

@ -60,7 +60,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -95,7 +95,9 @@
"url": "https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -250,7 +250,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -95,7 +95,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -44,11 +44,6 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212",
"url": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-f80e5c0d65",
@ -60,7 +55,14 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"refsource": "MISC",
"name": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212",
"url": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212"
}
]
},

View File

@ -393,7 +393,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -103,7 +103,9 @@
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -168,7 +168,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -175,7 +175,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -100,7 +100,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -93,7 +93,9 @@
"url": "https://security.gentoo.org/glsa/202101-29"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -118,7 +118,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -44,36 +44,6 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/746733",
"url": "https://hackerone.com/reports/746733"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0573",
@ -109,18 +79,50 @@
"name": "GLSA-202003-48",
"url": "https://security.gentoo.org/glsa/202003-48"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4669",
"url": "https://www.debian.org/security/2020/dsa-4669"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/746733",
"url": "https://hackerone.com/reports/746733"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
}
]
},

View File

@ -44,46 +44,16 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/735748",
"url": "https://hackerone.com/reports/735748"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-3838c8ea98",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLB676PDU4RJQLWQUA277YNGYYNEYGWO/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-47efc31973",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CT3WTR4P5VAJ3GJGKPYEDUPTNZ3IEDUR/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0573",
@ -134,18 +104,50 @@
"name": "GLSA-202003-48",
"url": "https://security.gentoo.org/glsa/202003-48"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4669",
"url": "https://www.debian.org/security/2020/dsa-4669"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
},
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/735748",
"url": "https://hackerone.com/reports/735748"
}
]
},

View File

@ -44,36 +44,6 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/730779",
"url": "https://hackerone.com/reports/730779"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0573",
@ -109,18 +79,50 @@
"name": "GLSA-202003-48",
"url": "https://security.gentoo.org/glsa/202003-48"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4669",
"url": "https://www.debian.org/security/2020/dsa-4669"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
},
{
"refsource": "CONFIRM",
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
},
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/730779",
"url": "https://hackerone.com/reports/730779"
}
]
},

View File

@ -193,7 +193,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -183,7 +183,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -113,7 +113,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -143,7 +143,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -138,7 +138,9 @@
"url": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb",
"refsource": "MISC",
"name": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20191109 [SECURITY] [DLA 1984-1] gdal security update",
@ -83,7 +73,19 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB7RRPCQP253XA5MYUOLHLRPKNGKVZNT/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"url": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb",
"refsource": "MISC",
"name": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178"
}
]
}

View File

@ -70,7 +70,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -213,7 +213,9 @@
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -87,7 +87,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -82,7 +82,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -82,7 +82,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -78,7 +78,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -55,7 +55,9 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -60,7 +60,9 @@
"url": "https://github.com/opencv/opencv/issues/15857"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -133,7 +133,9 @@
"name": "https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -103,7 +103,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -128,7 +128,9 @@
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4941",
"url": "https://www.debian.org/security/2021/dsa-4941"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again",
"url": "http://www.openwall.com/lists/oss-security/2021/07/21/4"
}
]
},

View File

@ -48,24 +48,29 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439",
"name": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/pires/go-proxyproto/releases/tag/v0.6.0"
"refsource": "MISC",
"url": "https://github.com/pires/go-proxyproto/releases/tag/v0.6.0",
"name": "https://github.com/pires/go-proxyproto/releases/tag/v0.6.0"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/pires/go-proxyproto/issues/65"
"refsource": "MISC",
"url": "https://github.com/pires/go-proxyproto/issues/65",
"name": "https://github.com/pires/go-proxyproto/issues/65"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/pires/go-proxyproto/pull/74"
"refsource": "MISC",
"url": "https://github.com/pires/go-proxyproto/pull/74",
"name": "https://github.com/pires/go-proxyproto/pull/74"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346"
"refsource": "MISC",
"url": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346",
"name": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346"
}
]
},
@ -73,7 +78,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package github.com/pires/go-proxyproto before 0.6.0 are vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header.\n"
"value": "The package github.com/pires/go-proxyproto before 0.6.0 are vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header."
}
]
},

View File

@ -81,6 +81,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4941",
"url": "https://www.debian.org/security/2021/dsa-4941"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "GENTOO",
"name": "GLSA-202107-48",
"url": "https://security.gentoo.org/glsa/202107-48"
},
{
"refsource": "DEBIAN",
"name": "DSA-4942",
"url": "https://www.debian.org/security/2021/dsa-4942"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4941",
"url": "https://www.debian.org/security/2021/dsa-4941"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://vuln.ryotak.me/advisories/55",
"url": "https://vuln.ryotak.me/advisories/55"
},
{
"refsource": "JVN",
"name": "JVN#53278122",
"url": "http://jvn.jp/en/jp/JVN53278122/index.html"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37143",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37144",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37145",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37146",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37147",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37148",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37149",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37150",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-a95108d156",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/"
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-3656",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}