mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
9bf91cd491
commit
f818f3d613
@ -108,6 +108,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[activemq-issues] 20210104 [jira] [Resolved] (AMQ-8107) Does ActiveMQ use the affected functionality within Xstream libraries for CVE-2020-26217",
|
||||
"url": "https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0004/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4828",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4828"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0005/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0005/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4828",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4828"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0005/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0005/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -19,6 +19,11 @@
|
||||
"title": "X-Force Vulnerability Report",
|
||||
"name": "ibm-db2-cve20204976-file-write (192469)",
|
||||
"refsource": "XF"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -25,6 +25,11 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/193660",
|
||||
"refsource": "XF",
|
||||
"name": "ibm-db2-cve20205024-dos (193660)"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -12,6 +12,11 @@
|
||||
"name": "ibm-db2-cve20205025-bo (193661)",
|
||||
"title": "X-Force Vulnerability Report",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/193661"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,6 +53,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://lore.kernel.org/bpf/CACAyw99bEYWJCSGqfLiJ9Jp5YE1ZsZSiJxb4RFUTwbofipf0dA@mail.gmail.com/T/#m8929643e99bea9c18ed490a7bc2591145eac6444",
|
||||
"url": "https://lore.kernel.org/bpf/CACAyw99bEYWJCSGqfLiJ9Jp5YE1ZsZSiJxb4RFUTwbofipf0dA@mail.gmail.com/T/#m8929643e99bea9c18ed490a7bc2591145eac6444"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0006/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -118,6 +118,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210316 [SECURITY] [DLA 2596-1] tomcat8 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0002/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -119,6 +119,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210316 [SECURITY] [DLA 2596-1] tomcat8 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0002/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -86,6 +86,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20210305 Xen Security Advisory 369 v2 (CVE-2021-28039) - Linux: special config may crash when trying to map foreign pages",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2021/03/05/2"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2021/3xxx/CVE-2021-3488.json
Normal file
18
2021/3xxx/CVE-2021-3488.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-3488",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user