You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jun 10, 2025. It is now read-only.
"value": "The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.\r\n\r\n"
76
+
"value": "The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object."
Copy file name to clipboardExpand all lines: 2021/27xxx/CVE-2021-27577.json
+5-4Lines changed: 5 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@
36
36
"description_data": [
37
37
{
38
38
"lang": "eng",
39
-
"value": "Incorrect handling of url fragment vulnerability of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1."
39
+
"value": "Incorrect handling of url fragment vulnerability of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1."
"value": "See XSA-305 for details of susceptibility to TAA.\n\nOnly systems which are susceptible to TAA and have the XSA-305 fix are\nvulnerable. Only systems which support S3 suspend/resume are vulnerable.\n\nThe vulnerability is only exposed if S3 suspend/resume is used."
66
+
}
67
+
]
68
+
}
69
+
}
70
+
},
71
+
"credit": {
72
+
"credit_data": {
73
+
"description": {
74
+
"description_data": [
75
+
{
76
+
"lang": "eng",
77
+
"value": "This issue was discovered by Andrew Cooper of Citrix."
78
+
}
79
+
]
80
+
}
81
+
}
82
+
},
83
+
"data_format": "MITRE",
84
+
"data_type": "CVE",
85
+
"data_version": "4.0",
86
+
"description": {
87
+
"description_data": [
9
88
{
10
-
"product" : {
11
-
"product_data" : [
12
-
{
13
-
"product_name" : "xen",
14
-
"version" : {
15
-
"version_data" : [
16
-
{
17
-
"version_affected" : "?<",
18
-
"version_value" : "4.12"
19
-
},
20
-
{
21
-
"version_affected" : ">=",
22
-
"version_value" : "4.13.x"
23
-
},
24
-
{
25
-
"version_affected" : "!>",
26
-
"version_value" : "xen-unstable"
27
-
}
28
-
]
29
-
}
30
-
},
31
-
{
32
-
"product_name" : "xen",
33
-
"version" : {
34
-
"version_data" : [
35
-
{
36
-
"version_value" : "4.12.x"
37
-
}
38
-
]
39
-
}
40
-
},
41
-
{
42
-
"product_name" : "xen",
43
-
"version" : {
44
-
"version_data" : [
45
-
{
46
-
"version_value" : "4.11.x"
47
-
}
48
-
]
49
-
}
50
-
}
51
-
]
52
-
},
53
-
"vendor_name" : "Xen"
89
+
"lang": "eng",
90
+
"value": "x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details. Mitigating TAA by disabling TSX (the default and preferred option) requires selecting a non-default setting in MSR_TSX_CTRL. This setting isn't restored after S3 suspend."
54
91
}
55
-
]
56
-
}
57
-
},
58
-
"configuration" : {
59
-
"configuration_data" : {
60
-
"description" : {
61
-
"description_data" : [
62
-
{
63
-
"lang" : "eng",
64
-
"value" : "See XSA-305 for details of susceptibility to TAA.\n\nOnly systems which are susceptible to TAA and have the XSA-305 fix are\nvulnerable. Only systems which support S3 suspend/resume are vulnerable.\n\nThe vulnerability is only exposed if S3 suspend/resume is used."
65
-
}
66
-
]
67
-
}
68
-
}
69
-
},
70
-
"credit" : {
71
-
"credit_data" : {
72
-
"description" : {
73
-
"description_data" : [
74
-
{
75
-
"lang" : "eng",
76
-
"value" : "This issue was discovered by Andrew Cooper of Citrix."
77
-
}
78
-
]
79
-
}
80
-
}
81
-
},
82
-
"data_format" : "MITRE",
83
-
"data_type" : "CVE",
84
-
"data_version" : "4.0",
85
-
"description" : {
86
-
"description_data" : [
87
-
{
88
-
"lang" : "eng",
89
-
"value" : "x86: TSX Async Abort protections not restored after S3\n\nThis issue relates to the TSX Async Abort speculative security vulnerability.\nPlease see https://xenbits.xen.org/xsa/advisory-305.html for details.\n\nMitigating TAA by disabling TSX (the default and preferred option) requires\nselecting a non-default setting in MSR_TSX_CTRL. This setting isn't restored\nafter S3 suspend."
90
-
}
91
-
]
92
-
},
93
-
"impact" : {
94
-
"impact_data" : {
95
-
"description" : {
96
-
"description_data" : [
97
-
{
98
-
"lang" : "eng",
99
-
"value" : "After using S3 suspend at least once, CPU0 remains vulnerable to TAA.\n\nThis is an information leak. For full details of the impact, see\nXSA-305."
"value" : "Not using S3 suspend/resume avoids the vulnerability."
131
-
}
132
-
]
133
-
}
134
-
}
135
-
}
136
-
}
92
+
]
93
+
},
94
+
"impact": {
95
+
"impact_data": {
96
+
"description": {
97
+
"description_data": [
98
+
{
99
+
"lang": "eng",
100
+
"value": "After using S3 suspend at least once, CPU0 remains vulnerable to TAA.\n\nThis is an information leak. For full details of the impact, see\nXSA-305."
0 commit comments