diff --git "a/STI_CEA/table1024.csv" "b/STI_CEA/table1024.csv"
deleted file mode 100644--- "a/STI_CEA/table1024.csv"
+++ /dev/null
@@ -1,124 +0,0 @@
-Name,Status,Description,References,Phase,Votes,Comments
-CVE-2021-39181,,"OpenOlat is a web-based learning management system (LMS). Prior to version 15.3.18, 15.5.3, and 16.0.0, using a prepared import XML file (e.g. a course) any class on the Java classpath can be instantiated, including spring AOP bean factories. This can be used to execute code arbitrary code by the attacker. The attack requires an OpenOlat user account with the authoring role. It can not be exploited by unregistered users. The problem is fixed in versions 15.3.18, 15.5.3, and 16.0.0. There are no known workarounds aside from upgrading.",CONFIRM:https://github.com/OpenOLAT/OpenOLAT/security/advisories/GHSA-596v-3gwh-2m9w | URL:https://github.com/OpenOLAT/OpenOLAT/security/advisories/GHSA-596v-3gwh-2m9w | MISC:https://github.com/OpenOLAT/OpenOLAT/commit/3f219ac457afde82e3be57bc614352ab92c05684 | URL:https://github.com/OpenOLAT/OpenOLAT/commit/3f219ac457afde82e3be57bc614352ab92c05684 | MISC:https://jira.openolat.org/browse/OO-5548 | URL:https://jira.openolat.org/browse/OO-5548,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39182,Candidate,"EnroCrypt is a Python module for encryption and hashing. Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. The vulnerability is patched in v1.1.4 of the product. As a workaround, users can remove the `MD5` hashing function from the file `hashing.py`.",CONFIRM:https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783 | URL:https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783 | MISC:https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce | URL:https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39183,Candidate,"Owncast is an open source, self-hosted live video streaming and chat server. In affected versions inline scripts are executed when Javascript is parsed via a paste action. This issue is patched in 0.0.9 by blocking unsafe-inline Content Security Policy and specifying the script-src. The worker-src is required to be set to blob for the video player.",CONFIRM:https://github.com/owncast/owncast/security/advisories/GHSA-2hfj-cxw7-g45p | URL:https://github.com/owncast/owncast/security/advisories/GHSA-2hfj-cxw7-g45p,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39184,Candidate,"Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a ""thumbnail"" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.",CONFIRM:https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4 | URL:https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4 | MISC:https://github.com/electron/electron/pull/30728 | URL:https://github.com/electron/electron/pull/30728,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39185,Candidate,"Http4s is a minimal, idiomatic Scala interface for HTTP services. In http4s versions 0.21.26 and prior, 0.22.0 through 0.22.2, 0.23.0, 0.23.1, and 1.0.0-M1 through 1.0.0-M24, the default CORS configuration is vulnerable to an origin reflection attack. The middleware is also susceptible to a Null Origin Attack. The problem is fixed in 0.21.27, 0.22.3, 0.23.2, and 1.0.0-M25. The original `CORS` implementation and `CORSConfig` are deprecated. See the GitHub GHSA for more information, including code examples and workarounds.",CONFIRM:https://github.com/http4s/http4s/security/advisories/GHSA-52cf-226f-rhr6 | URL:https://github.com/http4s/http4s/security/advisories/GHSA-52cf-226f-rhr6 | MISC:https://github.com/http4s/http4s/releases/tag/v0.23.2 | URL:https://github.com/http4s/http4s/releases/tag/v0.23.2,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39186,Candidate,"GlobalNewFiles is a MediaWiki extension maintained by Miraheze. Prior to commit number cee254e1b158cdb0ddbea716b1d3edc31fa4fb5d, the username column of the GlobalNewFiles special page is vulnerable to a stored XSS. Commit number cee254e1b158cdb0ddbea716b1d3edc31fa4fb5d contains a patch. As a workaround, one may disallow <,> (or other characters required to insert html/js) from being used in account names so an XSS is not possible.",CONFIRM:https://github.com/miraheze/GlobalNewFiles/security/advisories/GHSA-57p5-hqjq-h7vg | URL:https://github.com/miraheze/GlobalNewFiles/security/advisories/GHSA-57p5-hqjq-h7vg | MISC:https://github.com/miraheze/GlobalNewFiles/commit/cee254e1b158cdb0ddbea716b1d3edc31fa4fb5d | URL:https://github.com/miraheze/GlobalNewFiles/commit/cee254e1b158cdb0ddbea716b1d3edc31fa4fb5d | MISC:https://phabricator.miraheze.org/T7935 | URL:https://phabricator.miraheze.org/T7935,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-3918,Candidate,"Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to version 4.10.3, Parse Server crashes when if a query request contains an invalid value for the `explain` option. This is due to a bug in the MongoDB Node.js driver which throws an exception that Parse Server cannot catch. There is a patch for this issue in version 4.10.3. No workarounds aside from upgrading are known to exist.",CONFIRM:https://github.com/parse-community/parse-server/security/advisories/GHSA-xqp8-w826-hh6x | URL:https://github.com/parse-community/parse-server/security/advisories/GHSA-xqp8-w826-hh6x | MISC:https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec | URL:https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec | MISC:https://github.com/parse-community/parse-server/releases/tag/4.10.3 | URL:https://github.com/parse-community/parse-server/releases/tag/4.10.3 | MISC:https://jira.mongodb.org/browse/NODE-3463 | URL:https://jira.mongodb.org/browse/NODE-3463,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39188,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39189,,"Pimcore is an open source data & experience management platform. In versions prior to 10.1.3, it is possible to enumerate usernames via the forgot password functionality. This issue is fixed in version 10.1.3. As a workaround, one may apply the available patch manually.",CONFIRM:https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9 | URL:https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9 | MISC:https://github.com/pimcore/pimcore/pull/10223.patch | URL:https://github.com/pimcore/pimcore/pull/10223.patch | MISC:https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce | URL:https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce | MISC:https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/ | URL:https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-3919,Cadidate,A potential security vulnerability has been identified in OMEN Gaming Hub and in HP Command Center which may allow escalation of privilege and/or denial of service. HP has released software updates to mitigate the potential vulnerability.,MISC:https://support.hp.com/us-en/document/ish_5481136-5481162-16/hpsbgn03761 | URL:https://support.hp.com/us-en/document/ish_5481136-5481162-16/hpsbgn03761,Assigned (20211102),None (candidate not yet proposed),
-CVE-2021-39190,Candidate,"The SCCM plugin for GLPI is a plugin to synchronize computers from SCCM (version 1802) to GLPI. In versions prior to 2.3.0, the Configuration page is publicly accessible in read-only mode. This issue is patched in version 2.3.0. No known workarounds exist.",CONFIRM:https://github.com/pluginsGLPI/sccm/security/advisories/GHSA-3324-57w6-jxcq | URL:https://github.com/pluginsGLPI/sccm/security/advisories/GHSA-3324-57w6-jxcq | MISC:https://github.com/pluginsGLPI/sccm/commit/29a7f92d32a0cf9aa3f22c52c50b738274d2813e | URL:https://github.com/pluginsGLPI/sccm/commit/29a7f92d32a0cf9aa3f22c52c50b738274d2813e,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39191,Candidate,"mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.",CONFIRM:https://github.com/zmartzone/mod_auth_openidc/security/advisories/GHSA-2pgf-8h6h-gqg2 | URL:https://github.com/zmartzone/mod_auth_openidc/security/advisories/GHSA-2pgf-8h6h-gqg2 | FEDORA:FEDORA-2021-8d9aca2ded | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/32RGPW5LZDLDTB7MKZIGAHPSLFOUNWR5/ | FEDORA:FEDORA-2022-814ee0c43b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RHXO4O4G2UQS7X6OQJCVZKHZAQ7SAIFB/ | MISC:https://github.com/zmartzone/mod_auth_openidc/commit/03e6bfb446f4e3f27c003d30d6a433e5dd8e2b3d | URL:https://github.com/zmartzone/mod_auth_openidc/commit/03e6bfb446f4e3f27c003d30d6a433e5dd8e2b3d | MISC:https://github.com/zmartzone/mod_auth_openidc/issues/672 | URL:https://github.com/zmartzone/mod_auth_openidc/issues/672 | MISC:https://github.com/zmartzone/mod_auth_openidc/releases/tag/v2.4.9.4 | URL:https://github.com/zmartzone/mod_auth_openidc/releases/tag/v2.4.9.4,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39192,Candidate,"Ghost is a Node.js content management system. An error in the implementation of the limits service between versions 4.0.0 and 4.9.4 allows all authenticated users (including contributors) to view admin-level API keys via the integrations API endpoint, leading to a privilege escalation vulnerability. This issue is patched in Ghost version 4.10.0. As a workaround, disable all non-Administrator accounts to prevent API access. It is highly recommended to regenerate all API keys after patching or applying the workaround.",CONFIRM:https://github.com/TryGhost/Ghost/security/advisories/GHSA-j5c2-hm46-wp5c | URL:https://github.com/TryGhost/Ghost/security/advisories/GHSA-j5c2-hm46-wp5c | MISC:https://github.com/TryGhost/Ghost/releases/tag/v4.10.0 | URL:https://github.com/TryGhost/Ghost/releases/tag/v4.10.0,Assigned (20210816),None (candidate not yet proposed),
-,Candidate,"Frontier is Substrate's Ethereum compatibility layer. Prior to commit number 0b962f218f0cdd796dadfe26c3f09e68f7861b26, a bug in `pallet-ethereum` can cause invalid transactions to be included in the Ethereum block state in `pallet-ethereum` due to not validating the input data size. Any invalid transactions included this way have no possibility to alter the internal Ethereum or Substrate state. The transaction will appear to have be included, but is of no effect as it is rejected by the EVM engine. The impact is further limited by Substrate extrinsic size constraints. A patch is available in commit number 0b962f218f0cdd796dadfe26c3f09e68f7861b26. There are no workarounds aside from applying the patch.",CONFIRM:https://github.com/paritytech/frontier/security/advisories/GHSA-hw4v-5x4h-c3xm | URL:https://github.com/paritytech/frontier/security/advisories/GHSA-hw4v-5x4h-c3xm | MISC:https://github.com/paritytech/frontier/commit/0b962f218f0cdd796dadfe26c3f09e68f7861b26 | URL:https://github.com/paritytech/frontier/commit/0b962f218f0cdd796dadfe26c3f09e68f7861b26 | MISC:https://github.com/paritytech/frontier/pull/465 | URL:https://github.com/paritytech/frontier/pull/465 | MISC:https://github.com/paritytech/frontier/pull/465/commits/8a2b890a2fb477d5fedd0e4335b00623832849ae | URL:https://github.com/paritytech/frontier/pull/465/commits/8a2b890a2fb477d5fedd0e4335b00623832849ae,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39194,Candidate,kaml is an open source implementation of the YAML format with support for kotlinx.serialization. In affected versions attackers that could provide arbitrary YAML input to an application that uses kaml could cause the application to endlessly loop while parsing the input. This could result in resource starvation and denial of service. This only affects applications that use polymorphic serialization with the default tagged polymorphism style. Applications using the property polymorphism style are not affected. YAML input for a polymorphic type that provided a tag but no value for the object would trigger the issue. Version 0.35.3 or later contain the fix for this issue.,CONFIRM:https://github.com/charleskorn/kaml/security/advisories/GHSA-fmm9-3gv8-58f4 | URL:https://github.com/charleskorn/kaml/security/advisories/GHSA-fmm9-3gv8-58f4 | MISC:https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a | URL:https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a | MISC:https://github.com/charleskorn/kaml/issues/179 | URL:https://github.com/charleskorn/kaml/issues/179,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39195,Ca%ndid$ate@,"Misskey is an open source, decentralized microblogging platform. In affected versions a Server-Side Request Forgery vulnerability exists in ""Upload from URL"" and remote attachment handling. This could result in the disclosure of non-public information within the internal network. This has been fixed in 12.90.0. However, if you are using a proxy, you will need to take additional measures. As a workaround this exploit may be avoided by appropriately restricting access to private networks from the host where the application is running.",CONFIRM:https://github.com/misskey-dev/misskey/security/advisories/GHSA-mqv7-gxh4-r5vf | URL:https://github.com/misskey-dev/misskey/security/advisories/GHSA-mqv7-gxh4-r5vf | MISC:https://github.com/misskey-dev/misskey/blob/develop/CHANGELOG.md#12900-20210904 | URL:https://github.com/misskey-dev/misskey/blob/develop/CHANGELOG.md#12900-20210904 | MISC:https://github.com/misskey-dev/misskey/commit/e1a8b158e04ad567d92d8daf3cc0898ee18f1a2e | URL:https://github.com/misskey-dev/misskey/commit/e1a8b158e04ad567d92d8daf3cc0898ee18f1a2e,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39196,Candidate,"pcapture is an open source dumpcap web service interface . In affected versions this vulnerability allows an authenticated but unprivileged user to use the REST API to capture and download packets with no capture filter and without adequate permissions. This is important because the capture filters can effectively limit the scope of information that a user can see in the data captures. If no filter is present, then all data on the local network segment where the program is running can be captured and downloaded. v3.12 fixes this problem. There is no workaround, you must upgrade to v3.12 or greater.",CONFIRM:https://github.com/jdhwpgmbca/pcapture/security/advisories/GHSA-3r67-fxpr-p2qx | URL:https://github.com/jdhwpgmbca/pcapture/security/advisories/GHSA-3r67-fxpr-p2qx | MISC:https://github.com/jdhwpgmbca/pcapture/commit/0f74f431e0970a2e5784dbd955cfa4760e3b1ef7 | URL:https://github.com/jdhwpgmbca/pcapture/commit/0f74f431e0970a2e5784dbd955cfa4760e3b1ef7 | MISC:https://github.com/jdhwpgmbca/pcapture/issues/7 | URL:https://github.com/jdhwpgmbca/pcapture/issues/7,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39197,Candidate,"better_errors is an open source replacement for the standard Rails error page with more information rich error pages. It is also usable outside of Rails in any Rack app as Rack middleware. better_errors prior to 2.8.0 did not implement CSRF protection for its internal requests. It also did not enforce the correct ""Content-Type"" header for these requests, which allowed a cross-origin ""simple request"" to be made without CORS protection. These together left an application with better_errors enabled open to cross-origin attacks. As a developer tool, better_errors documentation strongly recommends addition only to the `development` bundle group, so this vulnerability should only affect development environments. Please ensure that your project limits better_errors to the `development` group (or the non-Rails equivalent). Starting with release 2.8.x, CSRF protection is enforced. It is recommended that you upgrade to the latest release, or minimally to ""~> 2.8.3"". There are no known workarounds to mitigate the risk of using older releases of better_errors.",CONFIRM:https://github.com/BetterErrors/better_errors/security/advisories/GHSA-w3j4-76qw-wwjm | URL:https://github.com/BetterErrors/better_errors/security/advisories/GHSA-w3j4-76qw-wwjm | MISC:https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0 | URL:https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0 | MISC:https://github.com/BetterErrors/better_errors/discussions/507 | URL:https://github.com/BetterErrors/better_errors/discussions/507 | MISC:https://github.com/BetterErrors/better_errors/pull/474 | URL:https://github.com/BetterErrors/better_errors/pull/474,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39198,Candidate,OroCRM is an open source Client Relationship Management (CRM) application. Affected versions we found to suffer from a vulnerability which could an attacker is able to disqualify any Lead with a Cross-Site Request Forgery (CSRF) attack. There are no workarounds that address this vulnerability and all users are advised to update their package.,CONFIRM:https://github.com/oroinc/crm/security/advisories/GHSA-vf7h-6246-hm43 | URL:https://github.com/oroinc/crm/security/advisories/GHSA-vf7h-6246-hm43,Assigned (20210816),None (candidate not yet proposed),
-,Candidate,"remark-html is an open source nodejs library which compiles Markdown to HTML. In affected versions the documentation of remark-html has mentioned that it was safe by default. In practice the default was never safe and had to be opted into. That is, user input was not sanitized. This means arbitrary HTML can be passed through leading to potential XSS attacks. The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation. On older affected versions, pass `sanitize: true` if you cannot update.",CONFIRM:https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m | URL:https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m | MISC:https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1 | URL:https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1 | MISC:https://github.com/remarkjs/remark-html/releases/tag/14.0.1 | URL:https://github.com/remarkjs/remark-html/releases/tag/14.0.1 | MISC:https://www.npmjs.com/package/remark-html | URL:https://www.npmjs.com/package/remark-html,Assigned (20210816),None (candidate not yet proposed),
-CVE%2021-3920,,grav-plugin-admin is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/ab564760-90c6-4e1d-80c2-852f45034cd1 | URL:https://huntr.dev/bounties/ab564760-90c6-4e1d-80c2-852f45034cd1 | MISC:https://github.com/getgrav/grav-plugin-admin/commit/6463135bf046d8131189c163158cd5db8f7a9675 | URL:https://github.com/getgrav/grav-plugin-admin/commit/6463135bf046d8131189c163158cd5db8f7a9675,Assigned (20211102),None (candidate not yet proposed),
-CVE-2021-39200,Candidate,"WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions output data of the function wp_die() can be leaked under certain conditions, which can include data like nonces. It can then be used to perform actions on your behalf. This has been patched in WordPress 5.8.1, along with any older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.",CONFIRM:https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m9hc-7v5q-x8q5 | URL:https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m9hc-7v5q-x8q5 | DEBIAN:DSA-4985 | URL:https://www.debian.org/security/2021/dsa-4985 | MISC:https://hackerone.com/reports/1142140 | URL:https://hackerone.com/reports/1142140,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39201,Candidate,"WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. ### Impact The issue allows an authenticated but low-privileged user (like contributor/author) to execute XSS in the editor. This bypasses the restrictions imposed on users who do not have the permission to post `unfiltered_html`. ### Patches This has been patched in WordPress 5.8, and will be pushed to older versions via minor releases (automatic updates). It's strongly recommended that you keep auto-updates enabled to receive the fix. ### References https://wordpress.org/news/category/releases/ https://hackerone.com/reports/1142140 ### For more information If you have any questions or comments about this advisory: * Open an issue in [HackerOne](https://hackerone.com/wordpress)",CONFIRM:https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-wh69-25hr-h94v | URL:https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-wh69-25hr-h94v | DEBIAN:DSA-4985 | URL:https://www.debian.org/security/2021/dsa-4985 | MISC:https://hackerone.com/reports/1142140 | URL:https://hackerone.com/reports/1142140,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39202,Candidate,WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions the widgets editor introduced in WordPress 5.8 beta 1 has improper handling of HTML input in the Custom HTML feature. This leads to stored XSS in the custom HTML widget. This has been patched in WordPress 5.8. It was only present during the testing/beta phase of WordPress 5.8.,CONFIRM:https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-fr6h-3855-j297 | URL:https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-fr6h-3855-j297 | MISC:https://hackerone.com/reports/1222797 | URL:https://hackerone.com/reports/1222797,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39203,Candidate,WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions authenticated users who don't have permission to view private post types/data can bypass restrictions in the block editor under certain conditions. This affected WordPress 5.8 beta during the testing period. It's fixed in the final 5.8 release.,CONFIRM:https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-qxvw-qxm9-qvg6 | URL:https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-qxvw-qxm9-qvg6 | MISC:https://hackerone.com/reports/1225282 | URL:https://hackerone.com/reports/1225282,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39204,Candidate,"Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.",CONFIRM:https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r | URL:https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r | MISC:https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc | URL:https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc | MISC:https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ | URL:https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39205,Candidate,Jitsi Meet is an open source video conferencing application. Versions prior to 2.0.6173 are vulnerable to client-side cross-site scripting via injecting properties into JSON objects that were not properly escaped. There are no known incidents related to this vulnerability being exploited in the wild. This issue is fixed in Jitsi Meet version 2.0.6173. There are no known workarounds aside from upgrading.,CONFIRM:https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg | URL:https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg | MISC:https://github.com/jitsi/jitsi-meet/pull/9320 | URL:https://github.com/jitsi/jitsi-meet/pull/9320 | MISC:https://github.com/jitsi/jitsi-meet/pull/9404 | URL:https://github.com/jitsi/jitsi-meet/pull/9404 | MISC:https://hackerone.com/reports/1214493 | URL:https://hackerone.com/reports/1214493,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39206,Candidate,"Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium. Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched. This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation.",CONFIRM:https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm | URL:https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm | MISC:https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h | URL:https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h | MISC:https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9 | URL:https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9 | MISC:https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ | URL:https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39207,Ca?n|did@a!te,parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users should update to version above v1.1.0. If upgrading is not possible then users can change the Loader used to SafeLoader as a workaround. See commit 507d066ef432ea27d3e201da08009872a2f37725 for details.,CONFIRM:https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg | URL:https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg | MISC:https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879 | URL:https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879 | MISC:https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725 | URL:https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39208,Candidate,"SharpCompress is a fully managed C# library to deal with many compression types and formats. Versions prior to 0.29.0 are vulnerable to partial path traversal. SharpCompress recreates a hierarchy of directories under destinationDirectory if ExtractFullPath is set to true in options. In order to prevent extraction outside the destination directory the destinationFileName path is verified to begin with fullDestinationDirectoryPath. However, prior to version 0.29.0, it is not enforced that fullDestinationDirectoryPath ends with slash. If the destinationDirectory is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints the arbitrary file creation impact is limited and depends on the use case. This issue is fixed in SharpCompress version 0.29.0.",CONFIRM:https://github.com/adamhathcock/sharpcompress/security/advisories/GHSA-jp7f-grcv-6mjf | URL:https://github.com/adamhathcock/sharpcompress/security/advisories/GHSA-jp7f-grcv-6mjf | MISC:https://github.com/adamhathcock/sharpcompress/pull/614 | URL:https://github.com/adamhathcock/sharpcompress/pull/614 | MISC:https://github.com/adamhathcock/sharpcompress/releases/tag/0.29.0 | URL:https://github.com/adamhathcock/sharpcompress/releases/tag/0.29.0,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39209,Candidate,"GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, a user who is logged in to GLPI can bypass Cross-Site Request Forgery (CSRF) protection in many places. This could allow a malicious actor to perform many actions on GLPI. This issue is fixed in version 9.5.6. There are no workarounds aside from upgrading.",CONFIRM:https://github.com/glpi-project/glpi/security/advisories/GHSA-5qpf-32w7-c56p | URL:https://github.com/glpi-project/glpi/security/advisories/GHSA-5qpf-32w7-c56p | MISC:https://github.com/glpi-project/glpi/releases/tag/9.5.6 | URL:https://github.com/glpi-project/glpi/releases/tag/9.5.6,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-3921,Candidate,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5 | URL:https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5 | MISC:https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684 | URL:https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684,Assigned (20211102),None (candidate not yet proposed),
-CVE-2021-39210,Candidate,"GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, the cookie used to store the autologin cookie (when a user uses the ""remember me"" feature) is accessible by scripts. A malicious plugin that could steal this cookie would be able to use it to autologin. This issue is fixed in version 9.5.6. As a workaround, one may avoid using the ""remember me"" feature.",CONFIRM:https://github.com/glpi-project/glpi/security/advisories/GHSA-hwxq-4c5f-m4v2 | URL:https://github.com/glpi-project/glpi/security/advisories/GHSA-hwxq-4c5f-m4v2 | MISC:https://github.com/glpi-project/glpi/releases/tag/9.5.6 | URL:https://github.com/glpi-project/glpi/releases/tag/9.5.6 | MISC:https://huntr.dev/bounties/b2e99a41-b904-419f-a274-ae383e4925f2/ | URL:https://huntr.dev/bounties/b2e99a41-b904-419f-a274-ae383e4925f2/,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39211,,"GLPI is a free Asset and IT management software package. Starting in version 9.2 and prior to version 9.5.6, the telemetry endpoint discloses GLPI and server information. This issue is fixed in version 9.5.6. As a workaround, remove the file `ajax/telemetry.php`, which is not needed for usual functions of GLPI.",CONFIRM:https://github.com/glpi-project/glpi/security/advisories/GHSA-xx66-v3g5-w825 | URL:https://github.com/glpi-project/glpi/security/advisories/GHSA-xx66-v3g5-w825 | MISC:https://github.com/glpi-project/glpi/releases/tag/9.5.6 | URL:https://github.com/glpi-project/glpi/releases/tag/9.5.6,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39212,Candidate,"ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. . The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: .",CONFIRM:https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr | URL:https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr | MISC:https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68 | URL:https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68 | MISC:https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e | URL:https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39213,Candidate,"GLPI is a free Asset and IT management software package. Starting in version 9.1 and prior to version 9.5.6, GLPI with API Rest enabled is vulnerable to API bypass with custom header injection. This issue is fixed in version 9.5.6. One may disable API Rest as a workaround.",CONFIRM:https://github.com/glpi-project/glpi/security/advisories/GHSA-6w9f-2m6g-5777 | URL:https://github.com/glpi-project/glpi/security/advisories/GHSA-6w9f-2m6g-5777 | MISC:https://github.com/glpi-project/glpi/releases/tag/9.5.6 | URL:https://github.com/glpi-project/glpi/releases/tag/9.5.6,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39214,Candidate,"mitmproxy is an interactive, SSL/TLS-capable intercepting proxy. In mitmproxy 7.0.2 and below, a malicious client or server is able to perform HTTP request smuggling attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While a smuggled request is still captured as part of another request's body, it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization. Unless one uses mitmproxy to protect an HTTP/1 service, no action is required. The vulnerability has been fixed in mitmproxy 7.0.3 and above.",CONFIRM:https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-22gh-3r9q-xf38 | URL:https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-22gh-3r9q-xf38,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39215,Candidate,"Jitsi Meet is an open source video conferencing application. In versions prior to 2.0.5963, a Prosody module allows the use of symmetrical algorithms to validate JSON web tokens. This means that tokens generated by arbitrary sources can be used to gain authorization to protected rooms. This issue is fixed in Jitsi Meet 2.0.5963. There are no known workarounds aside from updating.",CONFIRM:https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-45ff-37jm-xjfx | URL:https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-45ff-37jm-xjfx | MISC:https://github.com/jitsi/jitsi-meet/pull/9319 | URL:https://github.com/jitsi/jitsi-meet/pull/9319,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39216,Candidate,"Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.19.0 and before version 0.30.0 there was a use-after-free bug when passing `externref`s from the host to guest Wasm content. To trigger the bug, you have to explicitly pass multiple `externref`s from the host to a Wasm instance at the same time, either by passing multiple `externref`s as arguments from host code to a Wasm function, or returning multiple `externref`s to Wasm from a multi-value return function defined in the host. If you do not have host code that matches one of these shapes, then you are not impacted. If Wasmtime's `VMExternRefActivationsTable` became filled to capacity after passing the first `externref` in, then passing in the second `externref` could trigger a garbage collection. However the first `externref` is not rooted until we pass control to Wasm, and therefore could be reclaimed by the collector if nothing else was holding a reference to it or otherwise keeping it alive. Then, when control was passed to Wasm after the garbage collection, Wasm could use the first `externref`, which at this point has already been freed. We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare. The bug has been fixed, and users should upgrade to Wasmtime 0.30.0. If you cannot upgrade Wasmtime yet, you can avoid the bug by disabling reference types support in Wasmtime by passing `false` to `wasmtime::Config::wasm_reference_types`.",CONFIRM:https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-v4cp-h94r-m7xf | URL:https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-v4cp-h94r-m7xf | FEDORA:FEDORA-2021-1805eacb48 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/ | FEDORA:FEDORA-2021-68713440cb | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/ | MISC:https://crates.io/crates/wasmtime | URL:https://crates.io/crates/wasmtime | MISC:https://github.com/bytecodealliance/wasmtime/commit/101998733b74624cbd348a2366d05760b40181f3 | URL:https://github.com/bytecodealliance/wasmtime/commit/101998733b74624cbd348a2366d05760b40181f3,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39217,Candidate,"OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Custom Layout enabled admin users to execute arbitrary commands via block methods. Versions 19.4.22 and 20.0.19 contain patches for this issue.",MISC:https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f | URL:https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f | MISC:https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | URL:https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | MISC:https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | URL:https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | MISC:https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7 | URL:https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39218,Candidate,"Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.26.0 and before version 0.30.0 is affected by a memory unsoundness vulnerability. There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime. To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm frame on the stack that is at a GC safepoint where there are no live references at this safepoint, and there is a safepoint with live references earlier in this frame's function. Under this scenario, Wasmtime would incorrectly use the GC stack map for the safepoint from earlier in the function instead of the empty safepoint. This would result in Wasmtime treating arbitrary stack slots as `externref`s that needed to be rooted for GC. At the *next* GC, it would be determined that nothing was referencing these bogus `externref`s (because nothing could ever reference them, because they are not really `externref`s) and then Wasmtime would deallocate them and run `::drop` on them. This results in a free of memory that is not necessarily on the heap (and shouldn't be freed at this moment even if it was), as well as potential out-of-bounds reads and writes. Even though support for `externref`s (via the reference types proposal) is enabled by default, unless you are creating non-null `externref`s in your host code or explicitly triggering GCs, you cannot be affected by this bug. We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare. This bug has been patched and users should upgrade to Wasmtime version 0.30.0. If you cannot upgrade Wasmtime at this time, you can avoid this bug by disabling the reference types proposal by passing `false` to `wasmtime::Config::wasm_reference_types`.",CONFIRM:https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-4873-36h9-wv49 | URL:https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-4873-36h9-wv49 | FEDORA:FEDORA-2021-1805eacb48 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/ | FEDORA:FEDORA-2021-68713440cb | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/ | MISC:https://crates.io/crates/wasmtime | URL:https://crates.io/crates/wasmtime | MISC:https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c | URL:https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c,Assigned (20210816),None (candidate not yet proposed),
-,,"Wasmtime is an open source runtime for WebAssembly & WASI. Wasmtime before version 0.30.0 is affected by a type confusion vulnerability. As a Rust library the `wasmtime` crate clearly marks which functions are safe and which are `unsafe`, guaranteeing that if consumers never use `unsafe` then it should not be possible to have memory unsafety issues in their embeddings of Wasmtime. An issue was discovered in the safe API of `Linker::func_*` APIs. These APIs were previously not sound when one `Engine` was used to create the `Linker` and then a different `Engine` was used to create a `Store` and then the `Linker` was used to instantiate a module into that `Store`. Cross-`Engine` usage of functions is not supported in Wasmtime and this can result in type confusion of function pointers, resulting in being able to safely call a function with the wrong type. Triggering this bug requires using at least two `Engine` values in an embedding and then additionally using two different values with a `Linker` (one at the creation time of the `Linker` and another when instantiating a module with the `Linker`). It's expected that usage of more-than-one `Engine` in an embedding is relatively rare since an `Engine` is intended to be a globally shared resource, so the expectation is that the impact of this issue is relatively small. The fix implemented is to change this behavior to `panic!()` in Rust instead of silently allowing it. Using different `Engine` instances with a `Linker` is a programmer bug that `wasmtime` catches at runtime. This bug has been patched and users should upgrade to Wasmtime version 0.30.0. If you cannot upgrade Wasmtime and are using more than one `Engine` in your embedding it's recommended to instead use only one `Engine` for the entire program if possible. An `Engine` is designed to be a globally shared resource that is suitable to have only one for the lifetime of an entire process. If using multiple `Engine`s is required then code should be audited to ensure that `Linker` is only used with one `Engine`.",CONFIRM:https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-q879-9g95-56mx | URL:https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-q879-9g95-56mx | FEDORA:FEDORA-2021-1805eacb48 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/ | FEDORA:FEDORA-2021-68713440cb | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/ | MISC:https://crates.io/crates/wasmtime | URL:https://crates.io/crates/wasmtime | MISC:https://github.com/bytecodealliance/wasmtime/commit/b39f087414f27ae40c44449ed5d1154e03449bff | URL:https://github.com/bytecodealliance/wasmtime/commit/b39f087414f27ae40c44449ed5d1154e03449bff,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-3922,Candidate,"A race condition vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, prior to version 1.1.20.3 that could allow a local attacker to connect and interact with the IMController child process' named pipe.",MISC:https://support.lenovo.com/us/en/product_security/LEN-75210 | URL:https://support.lenovo.com/us/en/product_security/LEN-75210,Assigned (20211102),None (candidate not yet proposed),
-CVE-2021-39220,Candidate,"Nextcloud is an open-source, self-hosted productivity platform The Nextcloud Mail application prior to versions 1.10.4 and 1.11.0 does by default not render images in emails to not leak the read state or user IP. The privacy filter failed to filter images with a relative protocol. It is recommended that the Nextcloud Mail application is upgraded to 1.10.4 or 1.11.0. There are no known workarounds aside from upgrading.",CONFIRM:https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6q9v-wm8r-rcv5 | URL:https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6q9v-wm8r-rcv5 | MISC:https://github.com/nextcloud/mail/pull/5470 | URL:https://github.com/nextcloud/mail/pull/5470 | MISC:https://hackerone.com/reports/1308147 | URL:https://hackerone.com/reports/1308147,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39221,Candidate,"Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Contacts application prior to version 4.0.3 was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Contacts application is upgraded to 4.0.3. As a workaround, one may use a browser that has support for Content-Security-Policy.",CONFIRM:https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j6cx-mxqf-f9vc | URL:https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j6cx-mxqf-f9vc | MISC:https://github.com/nextcloud/contacts/pull/2407 | URL:https://github.com/nextcloud/contacts/pull/2407,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39222,Candidate,"Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. As a workaround, use a browser that has support for Content-Security-Policy.",CONFIRM:https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhxq-f4vg-jw5g | URL:https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhxq-f4vg-jw5g | MISC:https://github.com/nextcloud/spreed/pull/542 | URL:https://github.com/nextcloud/spreed/pull/542 | MISC:https://hackerone.com/reports/1135481 | URL:https://hackerone.com/reports/1135481,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39223,Can?didate|@!,"Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Richdocuments application prior to versions 3.8.6 and 4.2.3 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the Richdocuments application is upgraded to 3.8.6 or 4.2.3. As a workaround, disable the Richdocuments application in the app settings.",CONFIRM:https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rjcc-4cgj-6v93 | URL:https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rjcc-4cgj-6v93 | MISC:https://github.com/nextcloud/richdocuments/pull/1760 | URL:https://github.com/nextcloud/richdocuments/pull/1760 | MISC:https://hackerone.com/reports/1253460 | URL:https://hackerone.com/reports/1253460,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39224,Candidate,"Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud OfficeOnline application prior to version 1.1.1 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the OfficeOnline application is upgraded to 1.1.1. As a workaround, one may disable the OfficeOnline application in the app settings.",CONFIRM:https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56wm-r6jm-3v9h | URL:https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56wm-r6jm-3v9h | MISC:https://github.com/nextcloud/officeonline/pull/204 | URL:https://github.com/nextcloud/officeonline/pull/204,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-9225,Candidate,"Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading.",CONFIRM:https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72 | URL:https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72 | MISC:https://github.com/nextcloud/deck/pull/3316 | URL:https://github.com/nextcloud/deck/pull/3316 | MISC:https://hackerone.com/reports/1331728 | URL:https://hackerone.com/reports/1331728,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39226,Candidate,"Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot ""public_mode"" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot ""public_mode"" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.",CONFIRM:https://security.netapp.com/advisory/ntap-20211029-0008/ | CONFIRM:https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9 | URL:https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9 | FEDORA:FEDORA-2021-01588ab0bf | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCKBFUSY6V4VU5AQUYWKISREZX5NLQJT/ | FEDORA:FEDORA-2021-dd83dc8b0b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6ANHRDBXQT6TURLP2THM26ZPDINFBEG/ | MISC:https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269 | URL:https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269 | MISC:https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/ | URL:https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/ | MISC:https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/ | URL:https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/ | MLIST:[oss-security] 20211005 CVE-2021-39226 Grafana snapshot authentication bypass | URL:http://www.openwall.com/lists/oss-security/2021/10/05/4,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39227,Candidate,"ZRender is a lightweight graphic library providing 2d draw for Apache ECharts. In versions prior to 5.2.1, using `merge` and `clone` helper methods in the `src/core/util.ts` module results in prototype pollution. It affects the popular data visualization library Apache ECharts, which uses and exports these two methods directly. The GitHub Security Advisory page for this vulnerability contains a proof of concept. This issue is patched in ZRender version 5.2.1. One workaround is available: Check if there is `__proto__` in the object keys. Omit it before using it as an parameter in these affected methods. Or in `echarts.util.merge` and `setOption` if project is using ECharts.",CONFIRM:https://github.com/ecomfe/zrender/security/advisories/GHSA-fhv8-fx5f-7fxf | URL:https://github.com/ecomfe/zrender/security/advisories/GHSA-fhv8-fx5f-7fxf | MISC:https://github.com/ecomfe/zrender/pull/826 | URL:https://github.com/ecomfe/zrender/pull/826 | MISC:https://github.com/ecomfe/zrender/releases/tag/5.2.1 | URL:https://github.com/ecomfe/zrender/releases/tag/5.2.1,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39228,,"Tremor is an event processing system for unstructured data. A vulnerability exists between versions 0.7.2 and 0.11.6. This vulnerability is a memory safety Issue when using `patch` or `merge` on `state` and assign the result back to `state`. In this case, affected versions of Tremor and the tremor-script crate maintains references to memory that might have been freed already. And these memory regions can be accessed by retrieving the `state`, e.g. send it over TCP or HTTP. This requires the Tremor server (or any other program using tremor-script) to execute a tremor-script script that uses the mentioned language construct. The issue has been patched in version 0.11.6 by removing the optimization and always cloning the target expression of a Merge or Patch. If an upgrade is not possible, a possible workaround is to avoid the optimization by introducing a temporary variable and not immediately reassigning to `state`.",CONFIRM:https://github.com/tremor-rs/tremor-runtime/security/advisories/GHSA-mc22-5q92-8v85 | URL:https://github.com/tremor-rs/tremor-runtime/security/advisories/GHSA-mc22-5q92-8v85 | MISC:https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e | URL:https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e | MISC:https://github.com/tremor-rs/tremor-runtime/pull/1217 | URL:https://github.com/tremor-rs/tremor-runtime/pull/1217 | MISC:https://github.com/tremor-rs/tremor-runtime/releases/tag/v0.11.6 | URL:https://github.com/tremor-rs/tremor-runtime/releases/tag/v0.11.6,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39229,C%a#nd$ida*te,Apprise is an open source library which allows you to send a notification to almost all of the most popular notification services available. In affected versions users who use Apprise granting them access to the IFTTT plugin (which just comes out of the box) are subject to a denial of service attack on an inefficient regular expression. The vulnerable regular expression is [here](https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359). The problem has been patched in release version 0.9.5.1. Users who are unable to upgrade are advised to remove `apprise/plugins/NotifyIFTTT.py` to eliminate the service.,CONFIRM:https://github.com/caronc/apprise/security/advisories/GHSA-qhmp-h54x-38qr | URL:https://github.com/caronc/apprise/security/advisories/GHSA-qhmp-h54x-38qr | MISC:https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359 | URL:https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359 | MISC:https://github.com/caronc/apprise/pull/436 | URL:https://github.com/caronc/apprise/pull/436,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-3923,Candidate,"A flaw was found in the Linux kernel's implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2019643 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2019643 | MISC:https://lore.kernel.org/all/20220204100036.GA12348@kili/ | URL:https://lore.kernel.org/all/20220204100036.GA12348@kili/,Assigned (20211103),None (candidate not yet proposed),
-CVE-2021-39230,Candidate,Butter is a system usability utility. Due to a kernel error the JPNS kernel is being discontinued. Affected users are recommend to update to the Trinity kernel. There are no workarounds.,CONFIRM:https://github.com/FrankEnderman/Butter/security/advisories/GHSA-4538-4g86-xf6j | URL:https://github.com/FrankEnderman/Butter/security/advisories/GHSA-4538-4g86-xf6j | MISC:https://github.com/FrankEnderman/Butter/commit/a4fd717e848306f04f2823ea5f617e4da9f5bbdb | URL:https://github.com/FrankEnderman/Butter/commit/a4fd717e848306f04f2823ea5f617e4da9f5bbdb,Assigned (20210816),None (candidate not yet proposed),
-CVE-2021-39231,Candidate,"In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.",MISC:https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C110cd117-75ed-364b-cd38-3effd20f2183%40apache.org%3E | URL:https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C110cd117-75ed-364b-cd38-3effd20f2183%40apache.org%3E | MLIST:[oss-security] 20211118 CVE-2021-39231: Apache Ozone: Missing authentication/authorization on internal RPC endpoints | URL:http://www.openwall.com/lists/oss-security/2021/11/19/2,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39232,Candidate,"In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins.",MISC:https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C3c30a7f2-13a4-345e-6c8a-c23a2b937041%40apache.org%3E | URL:https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C3c30a7f2-13a4-345e-6c8a-c23a2b937041%40apache.org%3E | MLIST:[oss-security] 20211118 CVE-2021-39232: Apache Ozone: Missing admin check for SCM related admin commands | URL:http://www.openwall.com/lists/oss-security/2021/11/19/3,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39233,Candidate,"In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client.",MISC:https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C394a9a73-44dd-b5db-84d8-607c3226eb00%40apache.org%3E | URL:https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C394a9a73-44dd-b5db-84d8-607c3226eb00%40apache.org%3E | MLIST:[oss-security] 20211118 CVE-2021-39233: Apache Ozone: Container-related datanode operations can be called without authorization | URL:http://www.openwall.com/lists/oss-security/2021/11/19/4,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39234,Candidate,"In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL.",MISC:https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C97d65498-7f8c-366f-1bea-5a74b6378f0d%40apache.org%3E | URL:https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C97d65498-7f8c-366f-1bea-5a74b6378f0d%40apache.org%3E | MLIST:[oss-security] 20211118 CVE-2021-39234: Apache Ozone: Raw block data can be read bypassing ACL/authorization | URL:http://www.openwall.com/lists/oss-security/2021/11/19/5,Assigned (20210817),None (candidate not yet proposed),
-,Candidate,"In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.",MISC:https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E | URL:https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E | MLIST:[oss-security] 20211118 CVE-2021-39235: Apache Ozone: Access mode of block tokens are not enforced | URL:http://www.openwall.com/lists/oss-security/2021/11/19/6,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39236,Candidate,"In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user.",MISC:https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C0fd74baa-88a0-39a2-8f3a-b982acb25d5a%40apache.org%3E | URL:https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C0fd74baa-88a0-39a2-8f3a-b982acb25d5a%40apache.org%3E | MLIST:[oss-security] 20211118 CVE-2021-39236: Apache Ozone: Owners of the S3 tokens are not validated | URL:http://www.openwall.com/lists/oss-security/2021/11/19/7,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39237,Candidate,"Certain HP LaserJet, HP LaserJet Managed, HP PageWide, and HP PageWide Managed printers may be vulnerable to potential information disclosure.",MISC:https://support.hp.com/us-en/document/ish_5000124-5000148-16 | URL:https://support.hp.com/us-en/document/ish_5000124-5000148-16,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39238,Candidate,"Certain HP Enterprise LaserJet, HP LaserJet Managed, HP Enterprise PageWide, HP PageWide Managed products may be vulnerable to potential buffer overflow.",MISC:https://support.hp.com/us-en/document/ish_5000383-5000409-16 | URL:https://support.hp.com/us-en/document/ish_5000383-5000409-16,Assigned (20210817),None (candidate not yet proposed),
-|VE-2021-39239,Candidate,"A vulnerability in XML processing in Apache Jena, in versions up to 4.1.0, may allow an attacker to execute XML External Entities (XXE), including exposing the contents of local files to a remote server.",MISC:https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d%40%3Cusers.jena.apache.org%3E | URL:https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d%40%3Cusers.jena.apache.org%3E | MLIST:[announce] 20210916 CVE-2021-39239: Apache Jena: XML External Entity (XXE) vulnerability | URL:https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d@%3Cannounce.apache.org%3E | MLIST:[jena-dev] 20210921 CVE-2021-39239 notifications for Jena 4.2.0 | URL:https://lists.apache.org/thread.html/rce5241b228a1f0e5880f6b2bfdb7ae9ee420e94cb692738a0bbfed9d@%3Cdev.jena.apache.org%3E | MLIST:[jena-dev] 20210921 Re: CVE-2021-39239 notifications for Jena 4.2.0 | URL:https://lists.apache.org/thread.html/r0f03ae7e102c3e8587fdd36531fc167309335738156dfbd7d9c1bf45@%3Cdev.jena.apache.org%3E,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-3924,Candidate,grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),CONFIRM:https://huntr.dev/bounties/7ca13522-d0c9-4eff-a7dd-6fd1a7f205a2 | URL:https://huntr.dev/bounties/7ca13522-d0c9-4eff-a7dd-6fd1a7f205a2 | MISC:https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce | URL:https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce,Assigned (20211103),None (candidate not yet proposed),
-CVE-20@1-39240,Candida@*,"An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It does not ensure that the scheme and path portions of a URI have the expected characters. For example, the authority field (as observed on a target HTTP/2 server) might differ from what the routing rules were intended to achieve.",DEBIAN:DSA-4960 | URL:https://www.debian.org/security/2021/dsa-4960 | FEDORA:FEDORA-2021-3ab4512c98 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ALECUZDIMT5FYGP6V6PVSI4BKVZTZWN/ | FEDORA:FEDORA-2021-e6557245e8 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPNY4WZIQUAUOCLIMUPC37AQWNXTWIQM/ | MISC:https://git.haproxy.org/?p=haproxy.git;a=commit;h=4b8852c70d8c4b7e225e24eb58258a15eb54c26e | MISC:https://git.haproxy.org/?p=haproxy.git;a=commit;h=a495e0d94876c9d39763db319f609351907a31e8 | MISC:https://www.mail-archive.com/haproxy@formilux.org/msg41041.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39241,Candidate,"An issue was discovered in HAProxy 2.0 before 2.0.24, 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. An HTTP method name may contain a space followed by the name of a protected resource. It is possible that a server would interpret this as a request for that protected resource, such as in the ""GET /admin? HTTP/1.1 /static/images HTTP/1.1"" example.",DEBIAN:DSA-4960 | URL:https://www.debian.org/security/2021/dsa-4960 | FEDORA:FEDORA-2021-3ab4512c98 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ALECUZDIMT5FYGP6V6PVSI4BKVZTZWN/ | FEDORA:FEDORA-2021-e6557245e8 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPNY4WZIQUAUOCLIMUPC37AQWNXTWIQM/ | MISC:https://git.haproxy.org/?p=haproxy.git;a=commit;h=89265224d314a056d77d974284802c1b8a0dc97f | MISC:https://www.mail-archive.com/haproxy@formilux.org/msg41041.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39242,Candidate,"An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It can lead to a situation with an attacker-controlled HTTP Host header, because a mismatch between Host and authority is mishandled.",DEBIAN:DSA-4960 | URL:https://www.debian.org/security/2021/dsa-4960 | FEDORA:FEDORA-2021-3ab4512c98 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ALECUZDIMT5FYGP6V6PVSI4BKVZTZWN/ | FEDORA:FEDORA-2021-e6557245e8 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPNY4WZIQUAUOCLIMUPC37AQWNXTWIQM/ | MISC:https://git.haproxy.org/?p=haproxy.git;a=commit;h=b5d2b9e154d78e4075db163826c5e0f6d31b2ab1 | MISC:https://www.mail-archive.com/haproxy@formilux.org/msg41041.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39243,Candidate,"Cross-Site Request Forgery (CSRF) exists on Altus Nexto, Nexto Xpress, and Hadron Xtorm devices via any CGI endpoint. This affects Nexto NX3003 1.8.11.0, Nexto NX3004 1.8.11.0, Nexto NX3005 1.8.11.0, Nexto NX3010 1.8.3.0, Nexto NX3020 1.8.3.0, Nexto NX3030 1.8.3.0, Nexto NX5100 1.8.11.0, Nexto NX5101 1.8.11.0, Nexto NX5110 1.1.2.8, Nexto NX5210 1.1.2.8, Nexto Xpress XP300 1.8.11.0, Nexto Xpress XP315 1.8.11.0, Nexto Xpress XP325 1.8.11.0, Nexto Xpress XP340 1.8.11.0, and Hadron Xtorm HX3040 1.7.58.0.",MISC:http://seclists.org/fulldisclosure/2021/Aug/21 | MISC:https://www.altus.com.br/,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39244,Candidate,"Authenticated Semi-Blind Command Injection (via Parameter Injection) exists on Altus Nexto, Nexto Xpress, and Hadron Xtorm devices via the getlogs.cgi tcpdump feature. This affects Nexto NX3003 1.8.11.0, Nexto NX3004 1.8.11.0, Nexto NX3005 1.8.11.0, Nexto NX3010 1.8.3.0, Nexto NX3020 1.8.3.0, Nexto NX3030 1.8.3.0, Nexto NX5100 1.8.11.0, Nexto NX5101 1.8.11.0, Nexto NX5110 1.1.2.8, Nexto NX5210 1.1.2.8, Nexto Xpress XP300 1.8.11.0, Nexto Xpress XP315 1.8.11.0, Nexto Xpress XP325 1.8.11.0, Nexto Xpress XP340 1.8.11.0, and Hadron Xtorm HX3040 1.7.58.0.",MISC:https://seclists.org/fulldisclosure/2021/Aug/21 | MISC:https://www.altus.com.br/,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39245,Candidate,"Hardcoded .htaccess Credentials for getlogs.cgi exist on Altus Nexto, Nexto Xpress, and Hadron Xtorm devices. This affects Nexto NX3003 1.8.11.0, Nexto NX3004 1.8.11.0, Nexto NX3005 1.8.11.0, Nexto NX3010 1.8.3.0, Nexto NX3020 1.8.3.0, Nexto NX3030 1.8.3.0, Nexto NX5100 1.8.11.0, Nexto NX5101 1.8.11.0, Nexto NX5110 1.1.2.8, Nexto NX5210 1.1.2.8, Nexto Xpress XP300 1.8.11.0, Nexto Xpress XP315 1.8.11.0, Nexto Xpress XP325 1.8.11.0, Nexto Xpress XP340 1.8.11.0, and Hadron Xtorm HX3040 1.7.58.0.",MISC:https://seclists.org/fulldisclosure/2021/Aug/21 | MISC:https://www.altus.com.br/,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39246,Candidate,"Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).",MISC:https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-111.md | MISC:https://gitlab.torproject.org/tpo/core/tor/-/commit/80c404c4b79f3bcba3fc4585d4c62a62a04f3ed9 | MISC:https://gitlab.torproject.org/tpo/core/tor/-/merge_requests/434 | MISC:https://sick.codes/sick-2021-111 | MISC:https://www.privacyaffairs.com/cve-2021-39246-tor-vulnerability,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39247,Candidate,"Zint Barcode Generator before 2.10.0 has a one-byte buffer over-read, related to is_last_single_ascii in code1.c, and rs_encode_uint in reedsol.c.",MISC:https://sourceforge.net/p/zint/code/ci/9b02cd52214e80f945bff41fc94bc1e17e15810c/ | MISC:https://sourceforge.net/p/zint/tickets/232/,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39248,Candidat,Open edX through Lilac.1 allows XSS in common/static/common/js/discussion/utils.js via crafted LaTeX content within a discussion.,MISC:https://github.com/edx/edx-platform/pull/28379,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39249,Candidate,Invision Community (aka IPS Community Suite or IP-Board) before 4.6.5.1 allows reflected XSS because the filenames of uploaded files become predictable through a brute-force attack against the PHP mt_rand function.,MISC:https://invisioncommunity.com/release-notes/4651-r102/ | MISC:https://ssd-disclosure.com/ssd-advisory-ip-board-stored-xss-to-rce-chain/,Assigned (20210817),None (candidate not yet proposed),
-C%V$E-2021*#-3925,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211103),None (candidate not yet proposed),
-CVE-2021-39250,Candidate,"Invision Community (aka IPS Community Suite or IP-Board) before 4.6.5.1 allows stored XSS, with resultant code execution, because an uploaded file can be placed in an IFRAME element within user-generated content. For code execution, the attacker can rely on the ability of an admin to install widgets, disclosure of the admin session ID in a Referer header, and the ability of an admin to use the templating engine (e.g., Edit HTML).",MISC:https://invisioncommunity.com/release-notes/4651-r102/ | MISC:https://ssd-disclosure.com/ssd-advisory-ip-board-stored-xss-to-rce-chain/,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39251,Candidate,A crafted NTFS image can cause a NULL pointer dereference in ntfs_extent_inode_open in NTFS-3G < 2021.8.22.,DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | FEDORA:FEDORA-2021-5b1dac797b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSEKTKHO5HFZHWZNJNBJZA56472KRUZI/ | FEDORA:FEDORA-2021-e7c8ba6301 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/766ISTT3KCARKFUIQT7N6WV6T63XOKG3/ | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:http://www.openwall.com/lists/oss-security/2021/08/30/1 | MISC:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988386 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2001649 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39252,Candidate,A crafted NTFS image can cause an out-of-bounds read in ntfs_ie_lookup in NTFS-3G < 2021.8.22.,DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | FEDORA:FEDORA-2021-5b1dac797b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSEKTKHO5HFZHWZNJNBJZA56472KRUZI/ | FEDORA:FEDORA-2021-e7c8ba6301 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/766ISTT3KCARKFUIQT7N6WV6T63XOKG3/ | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39253,Candidate,A crafted NTFS image can cause an out-of-bounds read in ntfs_runlists_merge_i in NTFS-3G < 2021.8.22.,DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | FEDORA:FEDORA-2021-5b1dac797b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSEKTKHO5HFZHWZNJNBJZA56472KRUZI/ | FEDORA:FEDORA-2021-e7c8ba6301 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/766ISTT3KCARKFUIQT7N6WV6T63XOKG3/ | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39254,Candidate,"A crafted NTFS image can cause an integer overflow in memmove, leading to a heap-based buffer overflow in the function ntfs_attr_record_resize, in NTFS-3G < 2021.8.22.",DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | FEDORA:FEDORA-2021-5b1dac797b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSEKTKHO5HFZHWZNJNBJZA56472KRUZI/ | FEDORA:FEDORA-2021-e7c8ba6301 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/766ISTT3KCARKFUIQT7N6WV6T63XOKG3/ | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39255,Candidate,"A crafted NTFS image can trigger an out-of-bounds read, caused by an invalid attribute in ntfs_attr_find_in_attrdef, in NTFS-3G < 2021.8.22.",DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39256,Candidate,A crafted NTFS image can cause a heap-based buffer overflow in ntfs_inode_lookup_by_name in NTFS-3G < 2021.8.22.,DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39257,Candidate,"A crafted NTFS image with an unallocated bitmap can lead to a endless recursive function call chain (starting from ntfs_attr_pwrite), causing stack consumption in NTFS-3G < 2021.8.22.",DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39258,Candidate,A crafted NTFS image can cause out-of-bounds reads in ntfs_attr_find and ntfs_external_attr_find in NTFS-3G < 2021.8.22.,DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39259,Candidate,"A crafted NTFS image can trigger an out-of-bounds access, caused by an unsanitized attribute length in ntfs_inode_lookup_by_name, in NTFS-3G < 2021.8.22.",DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-3926,Canidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211103),None (candidate not yet proposed),
-CVE-2021-39260,Candidate,A crafted NTFS image can cause an out-of-bounds access in ntfs_inode_sync_standard_information in NTFS-3G < 2021.8.22.,DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39261,Candidate,A crafted NTFS image can cause a heap-based buffer overflow in ntfs_compressed_pwrite in NTFS-3G < 2021.8.22.,DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39262,Candidate,A crafted NTFS image can cause an out-of-bounds access in ntfs_decompress in NTFS-3G < 2021.8.22.,DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39263,Cadidate,"A crafted NTFS image can trigger a heap-based buffer overflow, caused by an unsanitized attribute in ntfs_get_attribute_value, in NTFS-3G < 2021.8.22.",DEBIAN:DSA-4971 | URL:https://www.debian.org/security/2021/dsa-4971 | GENTOO:GLSA-202301-01 | URL:https://security.gentoo.org/glsa/202301-01 | MISC:https://github.com/tuxera/ntfs-3g/releases | MISC:https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | MLIST:[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html,Assigned (20210817),None (candidate not yet proposed),
-CVE-2021-39264,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39265,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39266,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39267,Candidate,"Persistent cross-site scripting (XSS) in the web interface of SuiteCRM before 7.11.19 allows a remote attacker to introduce arbitrary JavaScript via a Content-Type Filter bypass to upload malicious files. This occurs because text/html is blocked, but other types that allow JavaScript execution (such as text/xml) are not blocked.",MISC:https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_19 | MISC:https://github.com/salesagility/SuiteCRM | MISC:https://thanhlocpanda.wordpress.com/2021/07/31/file-upload-bypass-suitecrm-7-11-18/,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39268,Candidate,Persistent cross-site scripting (XSS) in the web interface of SuiteCRM before 7.11.19 allows a remote attacker to introduce arbitrary JavaScript via malicious SVG files. This occurs because the clean_file_output protection mechanism can be bypassed.,MISC:https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_19 | MISC:https://github.com/salesagility/SuiteCRM | MISC:https://thanhlocpanda.wordpress.com/2021/07/31/stored-xss-via-svg-on-suitecrm/,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39269,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-3927,Candidate,vim is vulnerable to Heap-based Buffer Overflow,CONFIRM:https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0 | URL:https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0 | FEDORA:FEDORA-2021-58ab85548d | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ | FEDORA:FEDORA-2021-b0ac29efb1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ | FEDORA:FEDORA-2021-cfadac570a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ | GENTOO:GLSA-202208-32 | URL:https://security.gentoo.org/glsa/202208-32 | MISC:https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e | URL:https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e | MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html | MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html | MLIST:[oss-security] 20220114 Re: 3 new CVE's in vim | URL:http://www.openwall.com/lists/oss-security/2022/01/15/1,Assigned (20211104),None (candidate not yet proposed),
-CVE-2021-39270,Candidate,"In Ping Identity RSA SecurID Integration Kit before 3.2, user impersonation can occur.",CONFIRM:https://docs.pingidentity.com/bundle/integrations/page/yqq1563995045546.html | URL:https://docs.pingidentity.com/bundle/integrations/page/yqq1563995045546.html | MISC:https://www.pingidentity.com/en/resources/downloads/pingfederate.html | URL:https://www.pingidentity.com/en/resources/downloads/pingfederate.html,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39271,Candidate,"OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.",MISC:http://packetstormsecurity.com/files/163989/BSCW-Server-Remote-Code-Execution.html | MISC:https://seclists.org/fulldisclosure/2021/Aug/24 | MISC:https://www.bscw.de/en/company/,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39272,Candidate,"Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.",FEDORA:FEDORA-2021-9998719311 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/ | FEDORA:FEDORA-2021-ddefbdbb46 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/ | FEDORA:FEDORA-2021-e61a978fef | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/ | GENTOO:GLSA-202209-14 | URL:https://security.gentoo.org/glsa/202209-14 | MISC:http://www.openwall.com/lists/oss-security/2021/08/27/3 | MISC:https://nostarttls.secvuln.info/ | MISC:https://www.fetchmail.info/security.html,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39273,Candidate,"In XeroSecurity Sn1per 9.0 (free version), insecure permissions (0777) are set upon application execution, allowing an unprivileged user to modify the application, modules, and configuration files. This leads to arbitrary code execution with root privileges.",MISC:https://github.com/1N3/Sn1per/issues/358 | MISC:https://github.com/1N3/Sn1per/releases | MISC:https://github.com/nikip72/CVE-2021-39273-CVE-2021-39274,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39274,Candidate,"In XeroSecurity Sn1per 9.0 (free version), insecure directory permissions (0777) are set during installation, allowing an unprivileged user to modify the main application and the application configuration file. This results in arbitrary code execution with root privileges.",MISC:https://github.com/1N3/Sn1per/issues/357 | MISC:https://github.com/1N3/Sn1per/releases | MISC:https://github.com/nikip72/CVE-2021-39273-CVE-2021-39274,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39275,C#*andidate$,"ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.",CISCO:20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021 | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ | CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf | CONFIRM:https://security.netapp.com/advisory/ntap-20211008-0004/ | URL:https://security.netapp.com/advisory/ntap-20211008-0004/ | DEBIAN:DSA-4982 | URL:https://www.debian.org/security/2021/dsa-4982 | FEDORA:FEDORA-2021-dce7e7738e | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ | FEDORA:FEDORA-2021-e3f6dd670d | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ | GENTOO:GLSA-202208-20 | URL:https://security.gentoo.org/glsa/202208-20 | MISC:https://httpd.apache.org/security/vulnerabilities_24.html | URL:https://httpd.apache.org/security/vulnerabilities_24.html | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MLIST:[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update | URL:https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html | MLIST:[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info | URL:https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E | MLIST:[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info | URL:https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E | MLIST:[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info | URL:https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E | MLIST:[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info | URL:https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39276,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210818),None (candidate not yet proposed),
-,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39278,Candidate,"Certain MOXA devices allow reflected XSS via the Config Import menu. This affects WAC-2004 1.7, WAC-1001 2.1, WAC-1001-T 2.1, OnCell G3470A-LTE-EU 1.7, OnCell G3470A-LTE-EU-T 1.7, TAP-323-EU-CT-T 1.3, TAP-323-US-CT-T 1.3, TAP-323-JP-CT-T 1.3, WDR-3124A-EU 2.3, WDR-3124A-EU-T 2.3, WDR-3124A-US 2.3, and WDR-3124A-US-T 2.3.",MISC:http://packetstormsecurity.com/files/164014,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39279,Candidate,"Certain MOXA devices allow Authenticated Command Injection via /forms/web_importTFTP. This affects WAC-2004 1.7, WAC-1001 2.1, WAC-1001-T 2.1, OnCell G3470A-LTE-EU 1.7, OnCell G3470A-LTE-EU-T 1.7, TAP-323-EU-CT-T 1.3, TAP-323-US-CT-T 1.3, TAP-323-JP-CT-T 1.3, WDR-3124A-EU 2.3, WDR-3124A-EU-T 2.3, WDR-3124A-US 2.3, and WDR-3124A-US-T 2.3.",MISC:https://www.moxa.com,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-3928,Candidate,vim is vulnerable to Use of Uninitialized Variable,CONFIRM:https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd | URL:https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd | FEDORA:FEDORA-2021-58ab85548d | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ | FEDORA:FEDORA-2021-b0ac29efb1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ | FEDORA:FEDORA-2021-cfadac570a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ | GENTOO:GLSA-202208-32 | URL:https://security.gentoo.org/glsa/202208-32 | MISC:https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732 | URL:https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732 | MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html | MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html | MLIST:[oss-security] 20220114 Re: 3 new CVE's in vim | URL:http://www.openwall.com/lists/oss-security/2022/01/15/1,Assigned (20211104),None (candidate not yet proposed),
-CVE-2021-39280,Candidate,"Certain Korenix JetWave devices allow authenticated users to execute arbitrary code as root via /syscmd.asp. This affects 2212X before 1.9.1, 2212S before 1.9.1, 2212G before 1.8, 3220 V3 before 1.5.1, 3420 V3 before 1.5.1, and 2311 through 2022-01-31.",MISC:http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html | MISC:https://www.korenix.com/en/product/search.aspx?kw=JetWave,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39281,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39282,Candidate,Live555 through 1.08 has a memory leak in AC3AudioStreamParser for AC3 files.,MISC:http://lists.live555.com/pipermail/live-devel/2021-August/021970.html | MISC:http://www.live555.com/liveMedia/public/changelog.txt#[2021.08.13],Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39283,Candidate,liveMedia/FramedSource.cpp in Live555 through 1.08 allows an assertion failure and application exit via multiple SETUP and PLAY commands.,MISC:http://lists.live555.com/pipermail/live-devel/2021-August/021969.html | MISC:http://www.live555.com/liveMedia/public/changelog.txt#[2021.08.13],Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39284,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-3985,Candidate,A XSS vulnerability exists in Versa Director Release: 16.1R2 Build: S8. An attacker can use the administration web interface URL to create a XSS based attack.,MISC:https://github.com/pbgt/CVEs/blob/main/CVE-2021-39285.md | MISC:https://versa-networks.com,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39286,Candidate,Webrecorder pywb before 2.6.0 allows XSS because it does not ensure that Jinja2 templates are autoescaped.,MISC:https://github.com/webrecorder/pywb/commit/f7bd84cdacdd665ff73ae8d09a202f60be2ebae9 | MISC:https://github.com/webrecorder/pywb/compare/v-2.5.0...v-2.6.0,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39287,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39288,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39289,Candidate,"Certain NetModule devices have Insecure Password Handling (cleartext or reversible encryption), These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.",CONFIRM:http://seclists.org/fulldisclosure/2021/Aug/22 | MISC:https://www.netmodule.com,Assigned (20210818),None (candidate not yet proposed),
-%%CVE-2@021-39?29,Candidate,"A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.",FEDORA:FEDORA-2022-f0a2695054 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHNN7QJCEQH7AQG5AQP2GEFAQE6K635I/ | MISC:https://access.redhat.com/security/cve/CVE-2021-3929 | URL:https://access.redhat.com/security/cve/CVE-2021-3929 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2020298 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2020298 | MISC:https://gitlab.com/qemu-project/qemu/-/commit/736b01642d85be832385 | URL:https://gitlab.com/qemu-project/qemu/-/commit/736b01642d85be832385 | MISC:https://gitlab.com/qemu-project/qemu/-/issues/556 | URL:https://gitlab.com/qemu-project/qemu/-/issues/556 | MISC:https://gitlab.com/qemu-project/qemu/-/issues/782 | URL:https://gitlab.com/qemu-project/qemu/-/issues/782,Assigned (20211105),None (candidate not yet proposed),
-CVE-2021-39290,Candidate,"Certain NetModule devices allow Limited Session Fixation via PHPSESSID. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.",MISC:https://seclists.org/fulldisclosure/2021/Aug/22 | MISC:https://www.netmodule.com,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39291,Candidate,"Certain NetModule devices allow credentials via GET parameters to CLI-PHP. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.",MISC:https://seclists.org/fulldisclosure/2021/Aug/22 | MISC:https://www.netmodule.com,Assigned (20210818),None (candidate not yet proposed),
-CVE-2021-39292,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210819),None (candidate not yet proposed),