"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-11-15 21:01:09 +00:00
parent 4803a1cdf9
commit fa4ae8f707
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
4 changed files with 18 additions and 97 deletions

View File

@ -1,96 +1,17 @@
{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-7109",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "OpenStack",
"product": {
"product_data": [
{
"product_name": "Swift",
"version": {
"version_data": [
{
"version_value": "As of 2013-12-15"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2013-7109",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenStack Swift as of 2013-12-15 mishandles PYTHON_EGG_CACHE"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "authentication error"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://www.openwall.com/lists/oss-security/2013/12/15/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/12/15/2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/12/15/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/12/15/4"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/12/15/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/12/15/6"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/12/16/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/12/16/2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/12/17/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/12/17/2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/12/17/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/12/17/3"
},
{
"refsource": "MISC",
"name": "https://bugs.launchpad.net/glance/+bug/1192966",
"url": "https://bugs.launchpad.net/glance/+bug/1192966"
},
{
"refsource": "MLIST",
"name": "[druid-commits] 20200309 [GitHub] [druid] ccaominh opened a new pull request #9489: Suppress CVEs for htrace-core4 and openstack-swift",
"url": "https://lists.apache.org/thread.html/rba005288ea3088a7ffb66380df7eec11e767967bec9cba20afacf1cb@%3Ccommits.druid.apache.org%3E"
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
]
}

View File

@ -69,15 +69,15 @@
},
"references": {
"reference_data": [
{
"name": "https://github.com/signalwire/freeswitch/security/advisories/GHSA-jvpq-23v4-gp3m",
"refsource": "CONFIRM",
"url": "https://github.com/signalwire/freeswitch/security/advisories/GHSA-jvpq-23v4-gp3m"
},
{
"name": "https://github.com/signalwire/freeswitch/releases/tag/v1.10.7",
"refsource": "MISC",
"url": "https://github.com/signalwire/freeswitch/releases/tag/v1.10.7"
},
{
"name": "https://github.com/signalwire/freeswitch/security/advisories/GHSA-jvpq-23v4-gp3m",
"refsource": "CONFIRM",
"url": "https://github.com/signalwire/freeswitch/security/advisories/GHSA-jvpq-23v4-gp3m"
}
]
},

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "neoan3-apps/template is a neoan3 minimal template engine. Versions prior to 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously. In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible. Version 1.1.1 has addressed this vulnerability. Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade."
"value": "neoan3-apps/template is a neoan3 minimal template engine. Versions prior to 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously. In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible. Version 1.1.1 has addressed this vulnerability. Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade."
}
]
},

View File

@ -69,16 +69,16 @@
},
"references": {
"reference_data": [
{
"name": "https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87",
"refsource": "CONFIRM",
"url": "https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87"
},
{
"name": "https://github.com/jmrozanec/cron-utils/issues/461",
"refsource": "MISC",
"url": "https://github.com/jmrozanec/cron-utils/issues/461"
},
{
"name": "https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87",
"refsource": "CONFIRM",
"url": "https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87"
},
{
"name": "https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da",
"refsource": "MISC",