Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit 121f67d

Browse files
committed
"-Synchronized-Data."
1 parent 61fa67f commit 121f67d

File tree

9 files changed

+217
-15
lines changed

9 files changed

+217
-15
lines changed

2017/4xxx/CVE-2017-4965.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"CVE_data_meta": {
3-
"ASSIGNER": "security_alert@emc.com",
3+
"ASSIGNER": "secure@dell.com",
44
"ID": "CVE-2017-4965",
55
"STATE": "PUBLIC"
66
},
@@ -61,6 +61,11 @@
6161
"name": "https://pivotal.io/security/cve-2017-4965",
6262
"refsource": "CONFIRM",
6363
"url": "https://pivotal.io/security/cve-2017-4965"
64+
},
65+
{
66+
"refsource": "MLIST",
67+
"name": "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
68+
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html"
6469
}
6570
]
6671
}

2017/4xxx/CVE-2017-4966.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"CVE_data_meta": {
3-
"ASSIGNER": "security_alert@emc.com",
3+
"ASSIGNER": "secure@dell.com",
44
"ID": "CVE-2017-4966",
55
"STATE": "PUBLIC"
66
},
@@ -56,6 +56,11 @@
5656
"name": "https://pivotal.io/security/cve-2017-4966",
5757
"refsource": "CONFIRM",
5858
"url": "https://pivotal.io/security/cve-2017-4966"
59+
},
60+
{
61+
"refsource": "MLIST",
62+
"name": "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
63+
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html"
5964
}
6065
]
6166
}

2017/4xxx/CVE-2017-4967.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"CVE_data_meta": {
3-
"ASSIGNER": "security_alert@emc.com",
3+
"ASSIGNER": "secure@dell.com",
44
"ID": "CVE-2017-4967",
55
"STATE": "PUBLIC"
66
},
@@ -56,6 +56,11 @@
5656
"name": "https://pivotal.io/security/cve-2017-4965",
5757
"refsource": "CONFIRM",
5858
"url": "https://pivotal.io/security/cve-2017-4965"
59+
},
60+
{
61+
"refsource": "MLIST",
62+
"name": "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
63+
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html"
5964
}
6065
]
6166
}

2019/11xxx/CVE-2019-11281.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,11 @@
9292
"refsource": "REDHAT",
9393
"name": "RHSA-2020:0078",
9494
"url": "https://access.redhat.com/errata/RHSA-2020:0078"
95+
},
96+
{
97+
"refsource": "MLIST",
98+
"name": "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
99+
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html"
95100
}
96101
]
97102
},

2019/11xxx/CVE-2019-11287.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,11 @@
105105
"refsource": "MISC",
106106
"name": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin",
107107
"url": "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin"
108+
},
109+
{
110+
"refsource": "MLIST",
111+
"name": "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
112+
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html"
108113
}
109114
]
110115
},

2021/22xxx/CVE-2021-22116.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,11 @@
4848
"refsource": "MISC",
4949
"name": "https://tanzu.vmware.com/security/cve-2021-22116",
5050
"url": "https://tanzu.vmware.com/security/cve-2021-22116"
51+
},
52+
{
53+
"refsource": "MLIST",
54+
"name": "[debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update",
55+
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html"
5156
}
5257
]
5358
},

2021/31xxx/CVE-2021-31590.json

Lines changed: 60 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,71 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
6-
"ID": "CVE-2021-31590",
73
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
4+
"ID": "CVE-2021-31590",
5+
"STATE": "PUBLIC"
96
},
7+
"affects": {
8+
"vendor": {
9+
"vendor_data": [
10+
{
11+
"product": {
12+
"product_data": [
13+
{
14+
"product_name": "n/a",
15+
"version": {
16+
"version_data": [
17+
{
18+
"version_value": "n/a"
19+
}
20+
]
21+
}
22+
}
23+
]
24+
},
25+
"vendor_name": "n/a"
26+
}
27+
]
28+
}
29+
},
30+
"data_format": "MITRE",
31+
"data_type": "CVE",
32+
"data_version": "4.0",
1033
"description": {
1134
"description_data": [
1235
{
1336
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
37+
"value": "PwnDoc through 2021-04-22 has incorrect JSON Webtoken handling, leading to incorrect access control. With a valid JSON Webtoken that is used for authentication and authorization, a user can keep his admin privileges even if he is downgraded to the \"user\" privilege. Even after a user's account is deleted, the user can still access the administration panel (and add or delete users) and has complete access to the system."
38+
}
39+
]
40+
},
41+
"problemtype": {
42+
"problemtype_data": [
43+
{
44+
"description": [
45+
{
46+
"lang": "eng",
47+
"value": "n/a"
48+
}
49+
]
50+
}
51+
]
52+
},
53+
"references": {
54+
"reference_data": [
55+
{
56+
"url": "https://github.com/pwndoc/pwndoc/security/advisories",
57+
"refsource": "MISC",
58+
"name": "https://github.com/pwndoc/pwndoc/security/advisories"
59+
},
60+
{
61+
"refsource": "MISC",
62+
"name": "https://github.com/pwndoc/pwndoc/pull/128",
63+
"url": "https://github.com/pwndoc/pwndoc/pull/128"
64+
},
65+
{
66+
"refsource": "MISC",
67+
"name": "https://github.com/pwndoc/pwndoc/pull/74",
68+
"url": "https://github.com/pwndoc/pwndoc/pull/74"
1569
}
1670
]
1771
}

2021/34xxx/CVE-2021-34617.json

Lines changed: 59 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,70 @@
44
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2021-34617",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
9+
},
10+
"affects": {
11+
"vendor": {
12+
"vendor_data": [
13+
{
14+
"vendor_name": "n/a",
15+
"product": {
16+
"product_data": [
17+
{
18+
"product_name": "Aruba Instant Access Points",
19+
"version": {
20+
"version_data": [
21+
{
22+
"version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.13 and below"
23+
},
24+
{
25+
"version_value": "Aruba Instant 6.5.x: 6.5.4.13 and below"
26+
},
27+
{
28+
"version_value": "Aruba Instant 8.3.x: 8.3.0.7 and below"
29+
},
30+
{
31+
"version_value": "Aruba Instant 8.4.x: 8.4.0.5 and below"
32+
},
33+
{
34+
"version_value": "Aruba Instant 8.5.x: 8.5.0.0 and below"
35+
}
36+
]
37+
}
38+
}
39+
]
40+
}
41+
}
42+
]
43+
}
44+
},
45+
"problemtype": {
46+
"problemtype_data": [
47+
{
48+
"description": [
49+
{
50+
"lang": "eng",
51+
"value": "remote cross-site scripting (XSS)"
52+
}
53+
]
54+
}
55+
]
56+
},
57+
"references": {
58+
"reference_data": [
59+
{
60+
"refsource": "MISC",
61+
"name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
62+
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
63+
}
64+
]
965
},
1066
"description": {
1167
"description_data": [
1268
{
1369
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
70+
"value": "A remote cross-site scripting (XSS) vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.13 and below; Aruba Instant 6.5.x: 6.5.4.13 and below; Aruba Instant 8.3.x: 8.3.0.7 and below; Aruba Instant 8.4.x: 8.4.0.5 and below; Aruba Instant 8.5.x: 8.5.0.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
1571
}
1672
]
1773
}

2021/34xxx/CVE-2021-34618.json

Lines changed: 65 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,76 @@
44
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2021-34618",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
9+
},
10+
"affects": {
11+
"vendor": {
12+
"vendor_data": [
13+
{
14+
"vendor_name": "n/a",
15+
"product": {
16+
"product_data": [
17+
{
18+
"product_name": "Aruba Instant Access Points",
19+
"version": {
20+
"version_data": [
21+
{
22+
"version_value": "Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and below"
23+
},
24+
{
25+
"version_value": "Aruba Instant 6.5.x: 6.5.4.18 and below"
26+
},
27+
{
28+
"version_value": "Aruba Instant 8.3.x: 8.3.0.14 and below"
29+
},
30+
{
31+
"version_value": "Aruba Instant 8.4.x: All versions"
32+
},
33+
{
34+
"version_value": "Aruba Instant 8.5.x: 8.5.0.11 and below"
35+
},
36+
{
37+
"version_value": "Aruba Instant 8.6.x: 8.6.0.7 and below"
38+
},
39+
{
40+
"version_value": "Aruba Instant 8.7.x: 8.7.1.1 and below"
41+
}
42+
]
43+
}
44+
}
45+
]
46+
}
47+
}
48+
]
49+
}
50+
},
51+
"problemtype": {
52+
"problemtype_data": [
53+
{
54+
"description": [
55+
{
56+
"lang": "eng",
57+
"value": "remote denial of service (DoS)"
58+
}
59+
]
60+
}
61+
]
62+
},
63+
"references": {
64+
"reference_data": [
65+
{
66+
"refsource": "MISC",
67+
"name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt",
68+
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt"
69+
}
70+
]
971
},
1072
"description": {
1173
"description_data": [
1274
{
1375
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
76+
"value": "A remote denial of service (DoS) vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.4.x: All versions; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability."
1577
}
1678
]
1779
}

0 commit comments

Comments
 (0)