mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
8faf1b8b32
commit
efe424c745
@ -326,6 +326,21 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[iotdb-commits] 20210328 [iotdb] branch master updated: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088 (#2906)",
|
||||
"url": "https://lists.apache.org/thread.html/r9e25496608036573736cee484d8d03dae400f09e443b0000b6adc042@%3Ccommits.iotdb.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[flink-dev] 20210720 [jira] [Created] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
|
||||
"url": "https://lists.apache.org/thread.html/r99a6552e45ca6ba1082031421f51799a4a665eda905ab2c2aa9d6ffa@%3Cdev.flink.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[flink-issues] 20210720 [jira] [Created] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
|
||||
"url": "https://lists.apache.org/thread.html/r573eb577a67503e72181eee637d9b0ac042197e632bcdfce76af06a3@%3Cissues.flink.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[flink-issues] 20210721 [jira] [Commented] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
|
||||
"url": "https://lists.apache.org/thread.html/r891761d5014f9ffd79d9737482de832462de538b6c4bdcef21aad729@%3Cissues.flink.apache.org%3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -60,7 +60,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -95,7 +95,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -250,7 +250,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -95,7 +95,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,11 +44,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-f80e5c0d65",
|
||||
@ -60,7 +55,14 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -393,7 +393,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -103,7 +103,9 @@
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -168,7 +168,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -175,7 +175,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -100,7 +100,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,7 +93,9 @@
|
||||
"url": "https://security.gentoo.org/glsa/202101-29"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,7 +118,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -44,36 +44,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackerone.com/reports/746733",
|
||||
"url": "https://hackerone.com/reports/746733"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
|
||||
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0573",
|
||||
@ -109,18 +79,50 @@
|
||||
"name": "GLSA-202003-48",
|
||||
"url": "https://security.gentoo.org/glsa/202003-48"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4669",
|
||||
"url": "https://www.debian.org/security/2020/dsa-4669"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackerone.com/reports/746733",
|
||||
"url": "https://hackerone.com/reports/746733"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
|
||||
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,46 +44,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackerone.com/reports/735748",
|
||||
"url": "https://hackerone.com/reports/735748"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-3838c8ea98",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLB676PDU4RJQLWQUA277YNGYYNEYGWO/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
|
||||
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-47efc31973",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CT3WTR4P5VAJ3GJGKPYEDUPTNZ3IEDUR/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0573",
|
||||
@ -134,18 +104,50 @@
|
||||
"name": "GLSA-202003-48",
|
||||
"url": "https://security.gentoo.org/glsa/202003-48"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4669",
|
||||
"url": "https://www.debian.org/security/2020/dsa-4669"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
|
||||
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackerone.com/reports/735748",
|
||||
"url": "https://hackerone.com/reports/735748"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,36 +44,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackerone.com/reports/730779",
|
||||
"url": "https://hackerone.com/reports/730779"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
|
||||
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0573",
|
||||
@ -109,18 +79,50 @@
|
||||
"name": "GLSA-202003-48",
|
||||
"url": "https://security.gentoo.org/glsa/202003-48"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4669",
|
||||
"url": "https://www.debian.org/security/2020/dsa-4669"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v13.8.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v13.8.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/",
|
||||
"url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v10.19.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v10.19.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://nodejs.org/en/blog/release/v12.15.0/",
|
||||
"url": "https://nodejs.org/en/blog/release/v12.15.0/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200221-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200221-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackerone.com/reports/730779",
|
||||
"url": "https://hackerone.com/reports/730779"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -193,7 +193,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -183,7 +183,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -113,7 +113,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -143,7 +143,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -138,7 +138,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20191109 [SECURITY] [DLA 1984-1] gdal security update",
|
||||
@ -83,7 +73,19 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB7RRPCQP253XA5MYUOLHLRPKNGKVZNT/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -70,7 +70,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -213,7 +213,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -87,7 +87,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -82,7 +82,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -82,7 +82,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -78,7 +78,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -55,7 +55,9 @@
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -60,7 +60,9 @@
|
||||
"url": "https://github.com/opencv/opencv/issues/15857"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -133,7 +133,9 @@
|
||||
"name": "https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -103,7 +103,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -128,7 +128,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4941",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4941"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -68,6 +68,11 @@
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2021/07/21/4"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,24 +48,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439"
|
||||
"refsource": "MISC",
|
||||
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439",
|
||||
"name": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/pires/go-proxyproto/releases/tag/v0.6.0"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/pires/go-proxyproto/releases/tag/v0.6.0",
|
||||
"name": "https://github.com/pires/go-proxyproto/releases/tag/v0.6.0"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/pires/go-proxyproto/issues/65"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/pires/go-proxyproto/issues/65",
|
||||
"name": "https://github.com/pires/go-proxyproto/issues/65"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/pires/go-proxyproto/pull/74"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/pires/go-proxyproto/pull/74",
|
||||
"name": "https://github.com/pires/go-proxyproto/pull/74"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346",
|
||||
"name": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -73,7 +78,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The package github.com/pires/go-proxyproto before 0.6.0 are vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header.\n"
|
||||
"value": "The package github.com/pires/go-proxyproto before 0.6.0 are vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4941",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4941"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202107-48",
|
||||
"url": "https://security.gentoo.org/glsa/202107-48"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4942",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4942"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4941",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4941"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuln.ryotak.me/advisories/55",
|
||||
"url": "https://vuln.ryotak.me/advisories/55"
|
||||
},
|
||||
{
|
||||
"refsource": "JVN",
|
||||
"name": "JVN#53278122",
|
||||
"url": "http://jvn.jp/en/jp/JVN53278122/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2021/37xxx/CVE-2021-37143.json
Normal file
18
2021/37xxx/CVE-2021-37143.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-37143",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/37xxx/CVE-2021-37144.json
Normal file
18
2021/37xxx/CVE-2021-37144.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-37144",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/37xxx/CVE-2021-37145.json
Normal file
18
2021/37xxx/CVE-2021-37145.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-37145",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/37xxx/CVE-2021-37146.json
Normal file
18
2021/37xxx/CVE-2021-37146.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-37146",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/37xxx/CVE-2021-37147.json
Normal file
18
2021/37xxx/CVE-2021-37147.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-37147",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/37xxx/CVE-2021-37148.json
Normal file
18
2021/37xxx/CVE-2021-37148.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-37148",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/37xxx/CVE-2021-37149.json
Normal file
18
2021/37xxx/CVE-2021-37149.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-37149",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/37xxx/CVE-2021-37150.json
Normal file
18
2021/37xxx/CVE-2021-37150.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-37150",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -53,6 +53,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
|
||||
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-a95108d156",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
18
2021/3xxx/CVE-2021-3656.json
Normal file
18
2021/3xxx/CVE-2021-3656.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-3656",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user