diff --git "a/STI_CEA/table1023.csv" "b/STI_CEA/table1023.csv" new file mode 100644--- /dev/null +++ "b/STI_CEA/table1023.csv" @@ -0,0 +1,124 @@ +"Name","Status","Description","References","Phase","Votes","Comments" +CVE-2021-3907,Candidate,"OctoRPKI does not escape a URI with a filename containing "".."", this allows a repository to create a file, (ex. rsync://example.org/repo/../../etc/cron.daily/evil.roa), which would then be written to disk outside the base cache folder. This could allow for remote code execution on the host machine OctoRPKI is running on.","DEBIAN:DSA-5033 | URL:https://www.debian.org/security/2021/dsa-5033 | DEBIAN:DSA-5041 | URL:https://www.debian.org/security/2022/dsa-5041 | MISC:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-3jhm-87m6-x959 | URL:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-3jhm-87m6-x959 | MISC:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-cqh2-vc2f-q4fh | URL:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-cqh2-vc2f-q4fh",Assigned (20211026),"None (candidate not yet proposed)","" +CVE-2021-39070,Candidate,"IBM Security Verify Access 10.0.0.0, 10.0.1.0 and 10.0.2.0 with the advanced access control authentication service enabled could allow an attacker to authenticate as any user on the system. IBM X-Force ID: 215353.","CONFIRM:https://www.ibm.com/support/pages/node/6552318 | URL:https://www.ibm.com/support/pages/node/6552318 | XF:ibm-sam-cve202139070-priv-escalation (215353) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215353",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39071,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39072,Candidate,"IBM Security Guardium 11.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 215581.","CONFIRM:https://www.ibm.com/support/pages/node/6573005 | URL:https://www.ibm.com/support/pages/node/6573005 | XF:ibm-guardium-cve202139072-info-disc (215581) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215581",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39073,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39074,Candidate,"IBM Security Guardium 11.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","CONFIRM:https://www.ibm.com/support/pages/node/6598759 | URL:https://www.ibm.com/support/pages/node/6598759 | XF:ibm-guardium-cve202139074-xss (215583) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215583",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39075,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39076,Candidate,"IBM Security Guardium 10.5 and 11.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt sensitive information. IBM X-Force ID: 215585.","CONFIRM:https://www.ibm.com/support/pages/node/6572979 | URL:https://www.ibm.com/support/pages/node/6572979 | XF:ibm-guardium-cve202139076-info-disc (215585) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215585",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39077,Candidate,"IBM Security Guardium 10.5, 10.6, 11.0, 11.1, 11.2, 11.3, and 11.4 stores user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 215587.","MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/215587 | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215587 | MISC:https://www.ibm.com/support/pages/node/6831647 | URL:https://www.ibm.com/support/pages/node/6831647",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39078,Candidate,"IBM Security Guardium 10.5 stores user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 215589.","CONFIRM:https://www.ibm.com/support/pages/node/6572983 | URL:https://www.ibm.com/support/pages/node/6572983 | XF:ibm-guardium-cve202139078-info-disc (215589) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215589",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39079,Candidate,"IBM Cognos Analytics Mobile for Android applications prior to version 1.1.14 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 215592.","CONFIRM:https://www.ibm.com/support/pages/node/6555140 | URL:https://www.ibm.com/support/pages/node/6555140 | XF:ibm-cognos-cve202139079-xss (215592) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215592",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-3908,Candidate,"OctoRPKI does not limit the depth of a certificate chain, allowing for a CA to create children in an ad-hoc fashion, thereby making tree traversal never end.","DEBIAN:DSA-5041 | URL:https://www.debian.org/security/2022/dsa-5041 | MISC:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g5gj-9ggf-9vmq | URL:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g5gj-9ggf-9vmq",Assigned (20211026),"None (candidate not yet proposed)","" +CVE-2021-39080,Candidate,"Due to weak obfuscation, IBM Cognos Analytics Mobile for Android application prior to version 1.1.14 , an attacker could be able to reverse engineer the codebase to gain knowledge about the programming technique, interface, class definitions, algorithms and functions used. IBM X-Force ID: 215593.","CONFIRM:https://www.ibm.com/support/pages/node/6555140 | URL:https://www.ibm.com/support/pages/node/6555140 | XF:ibm-cognos-cve202139080-info-disc (215593) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215593",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39081,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39082,Candidate,"IBM UrbanCode Deploy (UCD) 7.1.1.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.","CONFIRM:https://www.ibm.com/support/pages/node/6576179 | URL:https://www.ibm.com/support/pages/node/6576179 | XF:ibm-ucd-cve202139082-info-disc (215693) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215693",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39083,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39084,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39085,Candidate,"IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 215888.","CONFIRM:https://www.ibm.com/support/pages/node/6612505 | URL:https://www.ibm.com/support/pages/node/6612505 | XF:ibm-sterling-cve202139085-sql-injection (215888) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215888",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39086,Candidate,"IBM Sterling File Gateway 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 215889.","CONFIRM:https://www.ibm.com/support/pages/node/6612537 | URL:https://www.ibm.com/support/pages/node/6612537 | XF:ibm-sterling-cve202139086-info-disc (215889) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215889",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39087,Candidate,"IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 could allow an authenticated user to obtain sensitive information due to improper permission controls. IBM X-Force ID: 216109.","CONFIRM:https://www.ibm.com/support/pages/node/6612541 | URL:https://www.ibm.com/support/pages/node/6612541 | XF:ibm-sterling-cve202139087-info-disc (216109) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/216109",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39088,Candidate,"IBM QRadar SIEM 7.3, 7.4, and 7.5 is vulnerable to local privilege escalation if this could be combined with other unknown vulnerabilities then privilege escalation could be performed. IBM X-Force ID: 216111.","CONFIRM:https://www.ibm.com/support/pages/node/6607129 | URL:https://www.ibm.com/support/pages/node/6607129 | XF:ibm-qradar-cve202139088-priv-escalation (216111) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/216111",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39089,Candidate,"IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.6.0 could allow an authenticated user to obtain sensitive information from a specially crafted HTTP request. IBM X-Force ID: 216387.","MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/216387 | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/216387 | MISC:https://www.ibm.com/support/pages/node/6856405 | URL:https://www.ibm.com/support/pages/node/6856405",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-3909,Candidate,"OctoRPKI does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before a response is returned, but does keep drip feeding new bytes to keep the connection alive.","DEBIAN:DSA-5033 | URL:https://www.debian.org/security/2021/dsa-5033 | DEBIAN:DSA-5041 | URL:https://www.debian.org/security/2022/dsa-5041 | MISC:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8cvr-4rrf-f244 | URL:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8cvr-4rrf-f244",Assigned (20211026),"None (candidate not yet proposed)","" +CVE-2021-39090,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39091,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39092,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39093,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39094,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39095,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39096,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39097,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39098,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39099,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-3910,Candidate,"OctoRPKI crashes when encountering a repository that returns an invalid ROA (just an encoded NUL (\0) character).","DEBIAN:DSA-5041 | URL:https://www.debian.org/security/2022/dsa-5041 | MISC:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-5mxh-2qfv-4g7j | URL:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-5mxh-2qfv-4g7j",Assigned (20211026),"None (candidate not yet proposed)","" +CVE-2021-39100,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39101,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39102,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39103,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39104,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39105,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39106,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39107,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39108,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39109,Candidate,"The renderWidgetResource resource in Atlasian Atlasboard before version 1.1.9 allows remote attackers to read arbitrary files via a path traversal vulnerability.","MISC:https://bitbucket.org/atlassian/atlasboard/commits/9c03df09f09399e2601010466e8ba3a28236eb9c | URL:https://bitbucket.org/atlassian/atlasboard/commits/9c03df09f09399e2601010466e8ba3a28236eb9c",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-3911,Candidate,"If the ROA that a repository returns contains too many bits for the IP address then OctoRPKI will crash.","DEBIAN:DSA-5041 | URL:https://www.debian.org/security/2022/dsa-5041 | MISC:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-w6ww-fmfx-2x22 | URL:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-w6ww-fmfx-2x22",Assigned (20211026),"None (candidate not yet proposed)","" +CVE-2021-39110,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39111,Candidate,"The Editor plugin in Atlassian Jira Server and Data Center before version 8.5.18, from 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the handling of supplied content such as from a PDF when pasted into a field such as the description field.","MISC:https://jira.atlassian.com/browse/JRASERVER-72716 | URL:https://jira.atlassian.com/browse/JRASERVER-72716",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39112,Candidate,"Affected versions of Atlassian Jira Server and Data Center allow remote attackers to redirect users to a malicious URL via a reverse tabnapping vulnerability in the Project Shortcuts feature. The affected versions are before version 8.5.15, from version 8.6.0 before 8.13.7, from version 8.14.0 before 8.17.1, and from version 8.18.0 before 8.18.1.","MISC:https://jira.atlassian.com/browse/JRASERVER-72433 | URL:https://jira.atlassian.com/browse/JRASERVER-72433",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39113,Candidate,"Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to continue to view cached content even after losing permissions, via a Broken Access Control vulnerability in the allowlist feature. The affected versions are before version 8.13.9, and from version 8.14.0 before 8.18.0.","MISC:https://jira.atlassian.com/browse/JRASERVER-72573 | URL:https://jira.atlassian.com/browse/JRASERVER-72573",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39114,Candidate,"Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.","MISC:https://jira.atlassian.com/browse/CONFSERVER-68844 | URL:https://jira.atlassian.com/browse/CONFSERVER-68844",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39115,Candidate,"Affected versions of Atlassian Jira Service Management Server and Data Center allow remote attackers with ""Jira Administrators"" access to execute arbitrary Java code or run arbitrary system commands via a Server_Side Template Injection vulnerability in the Email Template feature. The affected versions are before version 4.13.9, and from version 4.14.0 before 4.18.0.","MISC:https://jira.atlassian.com/browse/JSDSERVER-8665 | URL:https://jira.atlassian.com/browse/JSDSERVER-8665",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39116,Candidate,"Affected versions of Atlassian Jira Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the GIF Image Reader component. The affected versions are before version 8.13.14, and from version 8.14.0 before 8.19.0.","MISC:https://jira.atlassian.com/browse/JRASERVER-72738 | URL:https://jira.atlassian.com/browse/JRASERVER-72738",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39117,Candidate,"The AssociateFieldToScreens page in Atlassian Jira Server and Data Center before version 8.18.0 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability via the name of a custom field.","MISC:https://jira.atlassian.com/browse/JRASERVER-72597 | URL:https://jira.atlassian.com/browse/JRASERVER-72597",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39118,Candidate,"Affected versions of Atlassian Jira Server and Data Center allow remote attackers to discover the usernames and full names of users via an enumeration vulnerability in the /rest/api/1.0/render endpoint. The affected versions are before version 8.19.0.","MISC:https://jira.atlassian.com/browse/JRASERVER-72736 | URL:https://jira.atlassian.com/browse/JRASERVER-72736",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39119,Candidate,"Affected versions of Atlassian Jira Server and Data Center allow users who have watched an issue to continue receiving updates on the issue even after their Jira account is revoked, via a Broken Access Control vulnerability in the issue notification feature. The affected versions are before version 8.19.0.","MISC:https://jira.atlassian.com/browse/JRASERVER-72737 | URL:https://jira.atlassian.com/browse/JRASERVER-72737",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-3912,Candidate,"OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash).","DEBIAN:DSA-5041 | URL:https://www.debian.org/security/2022/dsa-5041 | MISC:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g9wh-3vrx-r7hg | URL:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g9wh-3vrx-r7hg",Assigned (20211026),"None (candidate not yet proposed)","" +CVE-2021-39120,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39121,Candidate,"Affected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to enumerate the keys of private Jira projects via an Information Disclosure vulnerability in the /rest/api/latest/projectvalidate/key endpoint. The affected versions are before version 8.5.18, from version 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2.","MISC:https://jira.atlassian.com/browse/JRASERVER-72715 | URL:https://jira.atlassian.com/browse/JRASERVER-72715",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39122,Candidate,"Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view users' emails via an Information Disclosure vulnerability in the /rest/api/2/search endpoint. The affected versions are before version 8.5.13, from version 8.6.0 before 8.13.5, and from version 8.14.0 before 8.15.1.","MISC:https://jira.atlassian.com/browse/JRASERVER-72293 | URL:https://jira.atlassian.com/browse/JRASERVER-72293",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39123,Candidate,"Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the /rest/gadget/1.0/createdVsResolved/generate endpoint. The affected versions are before version 8.16.0.","MISC:https://jira.atlassian.com/browse/JRASERVER-72237 | URL:https://jira.atlassian.com/browse/JRASERVER-72237",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39124,Candidate,"The Cross-Site Request Forgery (CSRF) failure retry feature of Atlassian Jira Server and Data Center before version 8.16.0 allows remote attackers who are able to trick a user into retrying a request to bypass CSRF protection and replay a crafted request.","MISC:https://jira.atlassian.com/browse/JRASERVER-72761 | URL:https://jira.atlassian.com/browse/JRASERVER-72761",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39125,Candidate,"Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to discover the usernames of users via an enumeration vulnerability in the password reset page. The affected versions are before version 8.5.10, and from version 8.6.0 before 8.13.1.","MISC:https://jira.atlassian.com/browse/JRASERVER-72009 | URL:https://jira.atlassian.com/browse/JRASERVER-72009",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39126,Candidate,"Affected versions of Atlassian Jira Server and Data Center allow remote attackers to modify various resources via a Cross-Site Request Forgery (CSRF) vulnerability, following an Information Disclosure vulnerability in the referrer headers which discloses a user's CSRF token. The affected versions are before version 8.5.10, and from version 8.6.0 before 8.13.1.","MISC:https://jira.atlassian.com/browse/JRASERVER-71806 | URL:https://jira.atlassian.com/browse/JRASERVER-71806",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39127,Candidate,"Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to the query component JQL endpoint via a Broken Access Control vulnerability (BAC) vulnerability. The affected versions are before version 8.5.10, and from version 8.6.0 before 8.13.1.","MISC:https://jira.atlassian.com/browse/JRASERVER-72003 | URL:https://jira.atlassian.com/browse/JRASERVER-72003",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39128,Candidate,"Affected versions of Atlassian Jira Server or Data Center using the Jira Service Management addon allow remote attackers with JIRA Administrators access to execute arbitrary Java code via a server-side template injection vulnerability in the Email Template feature. The affected versions of Jira Server or Data Center are before version 8.13.12, and from version 8.14.0 before 8.19.1.","MISC:https://jira.atlassian.com/browse/JRASERVER-72804 | URL:https://jira.atlassian.com/browse/JRASERVER-72804",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39129,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-3913,Candidate,"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.","",Assigned (20211027),"None (candidate not yet proposed)","" +CVE-2021-39130,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39131,Candidate,"ced detects character encoding using Google’s compact_enc_det library. In ced v0.1.0, passing data types other than `Buffer` causes the Node.js process to crash. The problem has been patched in ced v1.0.0. As a workaround, before passing an argument to ced, verify it’s a `Buffer` using `Buffer.isBuffer(obj)`.","CONFIRM:https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9 | URL:https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9 | MISC:https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3 | URL:https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3 | MISC:https://github.com/sonicdoe/ced/releases/tag/v1.0.0 | URL:https://github.com/sonicdoe/ced/releases/tag/v1.0.0",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39132,Candidate,"Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to version 3.3.14 and version 3.4.3, an authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can make a POST request, that can cause the server to run untrusted code on Rundeck Enterprise Edition. The zip-format plugin issues requires authentication and authorization to these access levels, and affects all Rundeck editions:`admin` level access to the `system` resource type. The ACL Policy yaml file upload issues requires authentication and authorization to these access levels, and affects all Rundeck editions: `create` `update` or `admin` level access to a `project_acl` resource, and/or`create` `update` or `admin` level access to the `system_acl` resource. The unauthorized POST request requires authentication, but no specific authorization, and affects Rundeck Enterprise only. Patches are available in versions 3.4.3, 3.3.14","CONFIRM:https://github.com/rundeck/rundeck/security/advisories/GHSA-q4rf-3fhx-88pf | URL:https://github.com/rundeck/rundeck/security/advisories/GHSA-q4rf-3fhx-88pf | MISC:https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6 | URL:https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39133,Candidate,"Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to version 3.3.14 and version 3.4.3, a user with `admin` access to the `system` resource type is potentially vulnerable to a CSRF attack that could cause the server to run untrusted code on all Rundeck editions. Patches are available in Rundeck versions 3.4.3 and 3.3.14.","CONFIRM:https://github.com/rundeck/rundeck/security/advisories/GHSA-3jmw-c69h-426c | URL:https://github.com/rundeck/rundeck/security/advisories/GHSA-3jmw-c69h-426c | MISC:https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9 | URL:https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39134,Candidate,"`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `""foo"": ""file:/some/path""`. Another package, `pwn-b` could define a dependency such as `FOO: ""file:foo.tgz""`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.","CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | CONFIRM:https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc | URL:https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc | MISC:https://www.npmjs.com/package/@npmcli/arborist | URL:https://www.npmjs.com/package/@npmcli/arborist | MISC:https://www.oracle.com/security-alerts/cpuoct2021.html | URL:https://www.oracle.com/security-alerts/cpuoct2021.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39135,Candidate,"`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.","CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | CONFIRM:https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2 | URL:https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2 | MISC:https://www.npmjs.com/package/@npmcli/arborist | URL:https://www.npmjs.com/package/@npmcli/arborist | MISC:https://www.oracle.com/security-alerts/cpuoct2021.html | URL:https://www.oracle.com/security-alerts/cpuoct2021.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39136,Candidate,"baserCMS is an open source content management system with a focus on Japanese language support. In affected versions there is a cross-site scripting vulnerability in the file upload function of the management system of baserCMS. Users are advised to update as soon as possible. No workaround are available to mitigate this issue.","CONFIRM:https://github.com/baserproject/basercms/security/advisories/GHSA-hgjr-632x-qpp3 | URL:https://github.com/baserproject/basercms/security/advisories/GHSA-hgjr-632x-qpp3 | JVN:JVN#14134801 | URL:http://jvn.jp/en/jp/JVN14134801/index.html | MISC:https://basercms.net/security/JVN_14134801 | URL:https://basercms.net/security/JVN_14134801 | MISC:https://github.com/baserproject/basercms/commit/568d4cab5ba1cdee7bbf0133c676d02a98f6d7bc | URL:https://github.com/baserproject/basercms/commit/568d4cab5ba1cdee7bbf0133c676d02a98f6d7bc",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39137,Candidate,"go-ethereum is the official Go implementation of the Ethereum protocol. In affected versions a consensus-vulnerability in go-ethereum (Geth) could cause a chain split, where vulnerable versions refuse to accept the canonical chain. Further details about the vulnerability will be disclosed at a later date. A patch is included in the upcoming `v1.10.8` release. No workaround are available.","CONFIRM:https://github.com/ethereum/go-ethereum/security/advisories/GHSA-9856-9gg9-qcmq | URL:https://github.com/ethereum/go-ethereum/security/advisories/GHSA-9856-9gg9-qcmq | MISC:https://github.com/ethereum/go-ethereum/releases/tag/v1.10.8 | URL:https://github.com/ethereum/go-ethereum/releases/tag/v1.10.8",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39138,Candidate,"Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Developers can use the REST API to signup users and also allow users to login anonymously. Prior to version 4.5.1, when an anonymous user is first signed up using REST, the server creates session incorrectly. Particularly, the `authProvider` field in `_Session` class under `createdWith` shows the user logged in creating a password. If a developer later depends on the `createdWith` field to provide a different level of access between a password user and anonymous user, the server incorrectly classified the session type as being created with a `password`. The server does not currently use `createdWith` to make decisions about internal functions, so if a developer is not using `createdWith` directly, they are not affected. The vulnerability only affects users who depend on `createdWith` by using it directly. The issue is patched in Parse Server version 4.5.1. As a workaround, do not use the `createdWith` Session field to make decisions if one allows anonymous login.","CONFIRM:https://github.com/parse-community/parse-server/security/advisories/GHSA-23r4-5mxp-c7g5 | URL:https://github.com/parse-community/parse-server/security/advisories/GHSA-23r4-5mxp-c7g5 | MISC:https://github.com/parse-community/parse-server/commit/147bd9a3dc43391e92c36e05d5db860b04ca27db | URL:https://github.com/parse-community/parse-server/commit/147bd9a3dc43391e92c36e05d5db860b04ca27db | MISC:https://github.com/parse-community/parse-server/releases/tag/4.5.1 | URL:https://github.com/parse-community/parse-server/releases/tag/4.5.1",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39139,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44 | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44 | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39139.html | URL:https://x-stream.github.io/CVE-2021-39139.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-3914,Candidate,"It was found that the smallrye health metrics UI component did not properly sanitize some user inputs. An attacker could use this flaw to conduct cross-site scripting attacks.","MISC:https://access.redhat.com/security/cve/CVE-2021-3914 | URL:https://access.redhat.com/security/cve/CVE-2021-3914 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2018015 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2018015",Assigned (20211028),"None (candidate not yet proposed)","" +CVE-2021-39140,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-6wf9-jmg9-vxcc | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-6wf9-jmg9-vxcc | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39140.html | URL:https://x-stream.github.io/CVE-2021-39140.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39141,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-g5w6-mrj7-75h2 | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-g5w6-mrj7-75h2 | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39141.html | URL:https://x-stream.github.io/CVE-2021-39141.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39142,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39143,Candidate,"Spinnaker is an open source, multi-cloud continuous delivery platform. A path traversal vulnerability was discovered in uses of TAR files by AppEngine for deployments. This uses a utility to extract files locally for deployment without validating the paths in that deployment don't override system files. This would allow an attacker to override files on the container, POTENTIALLY introducing a MITM type attack vector by replacing libraries or injecting wrapper files. Users are advised to update as soon as possible. For users unable to update disable Google AppEngine deployments and/or disable artifacts that provide TARs.","CONFIRM:https://github.com/spinnaker/spinnaker/security/advisories/GHSA-34jx-3vmr-56v8 | URL:https://github.com/spinnaker/spinnaker/security/advisories/GHSA-34jx-3vmr-56v8",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39144,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:http://packetstormsecurity.com/files/169859/VMware-NSX-Manager-XStream-Unauthenticated-Remote-Code-Execution.html | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39144.html | URL:https://x-stream.github.io/CVE-2021-39144.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39145,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-8jrj-525p-826v | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-8jrj-525p-826v | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39145.html | URL:https://x-stream.github.io/CVE-2021-39145.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39146,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-p8pq-r894-fm8f | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-p8pq-r894-fm8f | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39146.html | URL:https://x-stream.github.io/CVE-2021-39146.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39147,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-h7v4-7xg3-hxcc | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-h7v4-7xg3-hxcc | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39147.html | URL:https://x-stream.github.io/CVE-2021-39147.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39148,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2 | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2 | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39148.html | URL:https://x-stream.github.io/CVE-2021-39148.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39149,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-3ccq-5vw3-2p6x | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-3ccq-5vw3-2p6x | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39149.html | URL:https://x-stream.github.io/CVE-2021-39149.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-3915,Candidate,"bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type","CONFIRM:https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079 | URL:https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079 | MISC:https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed | URL:https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed",Assigned (20211030),"None (candidate not yet proposed)","" +CVE-2021-39150,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-cxfm-5m4g-x7xp | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-cxfm-5m4g-x7xp | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39150.html | URL:https://x-stream.github.io/CVE-2021-39150.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39151,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4 | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4 | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39151.html | URL:https://x-stream.github.io/CVE-2021-39151.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39152,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2 | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2 | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39152.html | URL:https://x-stream.github.io/CVE-2021-39152.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39153,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39153.html | URL:https://x-stream.github.io/CVE-2021-39153.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39154,Candidate,"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","CONFIRM:https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68 | URL:https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68 | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0003/ | URL:https://security.netapp.com/advisory/ntap-20210923-0003/ | DEBIAN:DSA-5004 | URL:https://www.debian.org/security/2021/dsa-5004 | FEDORA:FEDORA-2021-5e376c0ed9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ | FEDORA:FEDORA-2021-d894ca87dc | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ | FEDORA:FEDORA-2021-fbad11014a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://x-stream.github.io/CVE-2021-39154.html | URL:https://x-stream.github.io/CVE-2021-39154.html | MLIST:[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39155,Candidate,"Istio is an open source platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. According to [RFC 4343](https://datatracker.ietf.org/doc/html/rfc4343), Istio authorization policy should compare the hostname in the HTTP Host header in a case insensitive way, but currently the comparison is case sensitive. The proxy will route the request hostname in a case-insensitive way which means the authorization policy could be bypassed. As an example, the user may have an authorization policy that rejects request with hostname ""httpbin.foo"" for some source IPs, but the attacker can bypass this by sending the request with hostname ""Httpbin.Foo"". Patches are available in Istio 1.11.1, Istio 1.10.4 and Istio 1.9.8. As a work around a Lua filter may be written to normalize Host header before the authorization check. This is similar to the Path normalization presented in the [Security Best Practices](https://istio.io/latest/docs/ops/best-practices/security/#case-normalization) guide.","CONFIRM:https://github.com/istio/istio/security/advisories/GHSA-7774-7vr3-cc8j | URL:https://github.com/istio/istio/security/advisories/GHSA-7774-7vr3-cc8j | MISC:https://datatracker.ietf.org/doc/html/rfc4343 | URL:https://datatracker.ietf.org/doc/html/rfc4343",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39156,Candidate,"Istio is an open source platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. Istio 1.11.0, 1.10.3 and below, and 1.9.7 and below contain a remotely exploitable vulnerability where an HTTP request with `#fragment` in the path may bypass Istio’s URI path based authorization policies. Patches are available in Istio 1.11.1, Istio 1.10.4 and Istio 1.9.8. As a work around a Lua filter may be written to normalize the path.","CONFIRM:https://github.com/istio/istio/security/advisories/GHSA-hqxw-mm44-gc4r | URL:https://github.com/istio/istio/security/advisories/GHSA-hqxw-mm44-gc4r | MISC:https://istio.io/latest/news/security/istio-security-2021-008 | URL:https://istio.io/latest/news/security/istio-security-2021-008",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39157,Candidate,"detect-character-encoding is an open source character encoding inspection library. In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash. The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0). No workaround are available and all users should update to resolve this issue.","CONFIRM:https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-jqfh-8hw5-fqjr | URL:https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-jqfh-8hw5-fqjr | MISC:https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a | URL:https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a | MISC:https://github.com/sonicdoe/detect-character-encoding/issues/15 | URL:https://github.com/sonicdoe/detect-character-encoding/issues/15",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39158,Candidate,"NVCaffe's python required dependencies list used to contain `gfortran`version prior to 0.17.4, entry which does not exist in the repository pypi.org. An attacker could potentially have posted malicious files to pypi.org causing a user to install it within NVCaffe.","CONFIRM:https://github.com/NVIDIA/caffe/security/advisories/GHSA-fmpp-8pwg-vwh9 | URL:https://github.com/NVIDIA/caffe/security/advisories/GHSA-fmpp-8pwg-vwh9",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39159,Candidate,"BinderHub is a kubernetes-based cloud service that allows users to share reproducible interactive computing environments from code repositories. In affected versions a remote code execution vulnerability has been identified in BinderHub, where providing BinderHub with maliciously crafted input could execute code in the BinderHub context, with the potential to egress credentials of the BinderHub deployment, including JupyterHub API tokens, kubernetes service accounts, and docker registry credentials. This may provide the ability to manipulate images and other user created pods in the deployment, with the potential to escalate to the host depending on the underlying kubernetes configuration. Users are advised to update to version 0.2.0-n653. If users are unable to update they may disable the git repo provider by specifying the `BinderHub.repo_providers` as a workaround.","CONFIRM:https://github.com/jupyterhub/binderhub/security/advisories/GHSA-9jjr-qqfp-ppwx | URL:https://github.com/jupyterhub/binderhub/security/advisories/GHSA-9jjr-qqfp-ppwx | MISC:https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182.patch | URL:https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182.patch",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-3916,Candidate,"bookstack is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","CONFIRM:https://huntr.dev/bounties/0be32e6b-7c48-43f0-9cec-433000ad8f64 | URL:https://huntr.dev/bounties/0be32e6b-7c48-43f0-9cec-433000ad8f64 | MISC:https://github.com/bookstackapp/bookstack/commit/43830a372fc51a8793199d04a34c3f4ebdfccc7b | URL:https://github.com/bookstackapp/bookstack/commit/43830a372fc51a8793199d04a34c3f4ebdfccc7b",Assigned (20211031),"None (candidate not yet proposed)","" +CVE-2021-39160,Candidate,"nbgitpuller is a Jupyter server extension to sync a git repository one-way to a local path. Due to unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. This has been resolved in version 0.10.2 and all users are advised to upgrade. No work around exist for users who can not upgrade.","CONFIRM:https://github.com/jupyterhub/nbgitpuller/security/advisories/GHSA-mq5p-2mcr-m52j | URL:https://github.com/jupyterhub/nbgitpuller/security/advisories/GHSA-mq5p-2mcr-m52j | MISC:https://github.com/jupyterhub/nbgitpuller/blob/main/CHANGELOG.md#0102---2021-08-25 | URL:https://github.com/jupyterhub/nbgitpuller/blob/main/CHANGELOG.md#0102---2021-08-25 | MISC:https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481 | URL:https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39161,Candidate,"Discourse is an open source platform for community discussion. In affected versions category names can be used for Cross-site scripting(XSS) attacks. This is mitigated by Discourse's default Content Security Policy and this vulnerability only affects sites which have modified or disabled or changed Discourse's default Content Security Policy have allowed for moderators to modify categories. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks.","CONFIRM:https://github.com/discourse/discourse/security/advisories/GHSA-xhmc-9jwm-wqph | URL:https://github.com/discourse/discourse/security/advisories/GHSA-xhmc-9jwm-wqph",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39162,Candidate,"Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. This can lead to a DoS in the presence of untrusted *upstream* servers. 0.15.1 contains an upgraded envoy binary with this vulnerability patched. If only trusted upstreams are configured, there is not substantial risk of this condition being triggered.","CONFIRM:https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv | URL:https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv | MISC:https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8 | URL:https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8 | MISC:https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ | URL:https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39163,Candidate,"Matrix is an ecosystem for open federated Instant Messaging and Voice over IP. In versions 1.41.0 and prior, unauthorised users can access the name, avatar, topic and number of members of a room if they know the ID of the room. This vulnerability is limited to homeservers where the vulnerable homeserver is in the room and untrusted users are permitted to create groups (communities). By default, only homeserver administrators can create groups. However, homeserver administrators can already access this information in the database or using the admin API. As a result, only homeservers where the configuration setting `enable_group_creation` has been set to `true` are impacted. Server administrators should upgrade to 1.41.1 or higher to patch the vulnerability. There are two potential workarounds. Server administrators can set `enable_group_creation` to `false` in their homeserver configuration (this is the default value) to prevent creation of groups by non-administrators. Administrators that are using a reverse proxy could, with partial loss of group functionality, block the endpoints `/_matrix/client/r0/groups/{group_id}/rooms` and `/_matrix/client/unstable/groups/{group_id}/rooms`.","CONFIRM:https://github.com/matrix-org/synapse/security/advisories/GHSA-jj53-8fmw-f2w2 | URL:https://github.com/matrix-org/synapse/security/advisories/GHSA-jj53-8fmw-f2w2 | FEDORA:FEDORA-2021-2e8ed15b14 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/ | FEDORA:FEDORA-2021-f12fdca1bf | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VHDEPCZ22GJFMZCWA2XZAGPOEV72POF/ | MISC:https://github.com/matrix-org/synapse/commit/cb35df940a | URL:https://github.com/matrix-org/synapse/commit/cb35df940a | MISC:https://github.com/matrix-org/synapse/releases/tag/v1.41.1 | URL:https://github.com/matrix-org/synapse/releases/tag/v1.41.1",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39164,Candidate,"Matrix is an ecosystem for open federated Instant Messaging and Voice over IP. In versions 1.41.0 and prior, unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room. The vulnerability is limited to rooms with `shared` history visibility. Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the room. Server administrators should upgrade to 1.41.1 or later in order to receive the patch. One workaround is available. Administrators of servers that use a reverse proxy could, with potentially unacceptable loss of functionality, block the endpoints: `/_matrix/client/r0/rooms/{room_id}/members` with `at` query parameter, and `/_matrix/client/unstable/rooms/{room_id}/members` with `at` query parameter.","CONFIRM:https://github.com/matrix-org/synapse/security/advisories/GHSA-3x4c-pq33-4w3q | URL:https://github.com/matrix-org/synapse/security/advisories/GHSA-3x4c-pq33-4w3q | FEDORA:FEDORA-2021-2e8ed15b14 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/ | FEDORA:FEDORA-2021-f12fdca1bf | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VHDEPCZ22GJFMZCWA2XZAGPOEV72POF/ | MISC:https://github.com/matrix-org/synapse/commit/cb35df940a | URL:https://github.com/matrix-org/synapse/commit/cb35df940a | MISC:https://github.com/matrix-org/synapse/releases/tag/v1.41.1 | URL:https://github.com/matrix-org/synapse/releases/tag/v1.41.1",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39165,Candidate,"Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. The original repository of Cachet is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected.","CONFIRM:https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc | URL:https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc | MISC:https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6 | URL:https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39166,Candidate,"Pimcore is an open source data & experience management platform. Prior to version 10.1.2, text-values were not properly escaped before printed in the version preview. This allowed XSS by authenticated users with access to the resources. This issue is patched in Pimcore version 10.1.2.","CONFIRM:https://github.com/pimcore/pimcore/security/advisories/GHSA-w6j8-jc36-x5q9 | URL:https://github.com/pimcore/pimcore/security/advisories/GHSA-w6j8-jc36-x5q9 | MISC:https://github.com/pimcore/pimcore/pull/10170 | URL:https://github.com/pimcore/pimcore/pull/10170",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39167,Candidate,"OpenZepplin is a library for smart contract development. In affected versions a vulnerability in TimelockController allowed an actor with the executor role to escalate privileges. Further details about the vulnerability will be disclosed at a later date. As a workaround revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.","CONFIRM:https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-fg47-3c2x-m2wr | URL:https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-fg47-3c2x-m2wr | MISC:https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431 | URL:https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431 | MISC:https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5 | URL:https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39168,Candidate,"OpenZepplin is a library for smart contract development. In affected versions a vulnerability in TimelockController allowed an actor with the executor role to escalate privileges. Further details about the vulnerability will be disclosed at a later date. As a workaround revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.","CONFIRM:https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-vrw4-w73r-6mm8 | URL:https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-vrw4-w73r-6mm8 | MISC:https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431 | URL:https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431 | MISC:https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5 | URL:https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39169,Candidate,"Misskey is a decentralized microblogging platform. In versions of Misskey prior to 12.51.0, malicious actors can use the web client built-in dialog to display a malicious string, leading to cross-site scripting (XSS). XSS could compromise the API request token. This issue has been fixed in version 12.51.0. There are no known workarounds aside from upgrading.","CONFIRM:https://github.com/misskey-dev/misskey/security/advisories/GHSA-pmmv-jwqh-f5ww | URL:https://github.com/misskey-dev/misskey/security/advisories/GHSA-pmmv-jwqh-f5ww | MISC:https://github.com/misskey-dev/misskey/commit/ec203f7f795766f76b55fecc9248168c1cdf6c99 | URL:https://github.com/misskey-dev/misskey/commit/ec203f7f795766f76b55fecc9248168c1cdf6c99",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-3917,Candidate,"A flaw was found in the coreos-installer, where it writes the Ignition config to the target system with world-readable access permissions. This flaw allows a local attacker to have read access to potentially sensitive data. The highest threat from this vulnerability is to confidentiality.","MISC:https://access.redhat.com/security/cve/CVE-2021-3917 | URL:https://access.redhat.com/security/cve/CVE-2021-3917 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2018478 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2018478 | MISC:https://github.com/coreos/coreos-installer/commit/2a36405339c87b16ed6c76e91ad5b76638fbdb0c | URL:https://github.com/coreos/coreos-installer/commit/2a36405339c87b16ed6c76e91ad5b76638fbdb0c | MISC:https://github.com/coreos/fedora-coreos-tracker/issues/889 | URL:https://github.com/coreos/fedora-coreos-tracker/issues/889",Assigned (20211101),"None (candidate not yet proposed)","" +CVE-2021-39170,Candidate,"Pimcore is an open source data & experience management platform. Prior to version 10.1.2, an authenticated user could add XSS code as a value of custom metadata on assets. There is a patch for this issue in Pimcore version 10.1.2. As a workaround, users may apply the patch manually.","CONFIRM:https://github.com/pimcore/pimcore/security/advisories/GHSA-2v88-qq7x-xq5f | URL:https://github.com/pimcore/pimcore/security/advisories/GHSA-2v88-qq7x-xq5f | MISC:https://github.com/pimcore/pimcore/pull/10178 | URL:https://github.com/pimcore/pimcore/pull/10178 | MISC:https://github.com/pimcore/pimcore/pull/10178.patch | URL:https://github.com/pimcore/pimcore/pull/10178.patch | MISC:https://huntr.dev/bounties/e4cb9cd8-89cf-427c-8d2e-37ca40099bf2/ | URL:https://huntr.dev/bounties/e4cb9cd8-89cf-427c-8d2e-37ca40099bf2/",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39171,Candidate,"Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. Prior to version 3.1.0, a malicious SAML payload can require transforms that consume significant system resources to process, thereby resulting in reduced or denied service. This would be an effective way to perform a denial-of-service attack. This has been resolved in version 3.1.0. The resolution is to limit the number of allowable transforms to 2.","CONFIRM:https://github.com/node-saml/passport-saml/security/advisories/GHSA-5379-r78w-42h2 | URL:https://github.com/node-saml/passport-saml/security/advisories/GHSA-5379-r78w-42h2 | MISC:https://github.com/node-saml/passport-saml/pull/595 | URL:https://github.com/node-saml/passport-saml/pull/595",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39172,Candidate,"Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.","CONFIRM:https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6 | URL:https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6 | MISC:https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/ | MISC:https://github.com/fiveai/Cachet/releases/tag/v2.5.1 | URL:https://github.com/fiveai/Cachet/releases/tag/v2.5.1",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39173,Candidate,"Cachet is an open source status page system. Prior to version 2.5.1 authenticated users, regardless of their privileges (User or Admin), can trick Cachet and install the instance again, leading to arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving the middleware `ReadyForUse`, which now performs a stricter validation of the instance name. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.","CONFIRM:https://github.com/fiveai/Cachet/security/advisories/GHSA-r67m-m8c7-jp83 | URL:https://github.com/fiveai/Cachet/security/advisories/GHSA-r67m-m8c7-jp83 | MISC:https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/ | MISC:https://github.com/fiveai/Cachet/releases/tag/v2.5.1 | URL:https://github.com/fiveai/Cachet/releases/tag/v2.5.1",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39174,Candidate,"Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.","CONFIRM:https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688 | URL:https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688 | MISC:https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/ | MISC:https://github.com/fiveai/Cachet/releases/tag/v2.5.1 | URL:https://github.com/fiveai/Cachet/releases/tag/v2.5.1",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39175,Candidate,"HedgeDoc is a platform to write and share markdown. In versions prior to 1.9.0, an unauthenticated attacker can inject arbitrary JavaScript into the speaker-notes of the slide-mode feature by embedding an iframe hosting the malicious code into the slides or by embedding the HedgeDoc instance into another page. The problem is patched in version 1.9.0. There are no known workarounds aside from upgrading.","CONFIRM:https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-j748-779h-9697 | URL:https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-j748-779h-9697 | MISC:https://github.com/hedgedoc/hedgedoc/pull/1369 | URL:https://github.com/hedgedoc/hedgedoc/pull/1369 | MISC:https://github.com/hedgedoc/hedgedoc/pull/1375 | URL:https://github.com/hedgedoc/hedgedoc/pull/1375 | MISC:https://github.com/hedgedoc/hedgedoc/pull/1513 | URL:https://github.com/hedgedoc/hedgedoc/pull/1513",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39176,Candidate,"detect-character-encoding is a package for detecting character encoding using ICU. In detect-character-encoding v0.3.0 and earlier, allocated memory is not released. The problem has been patched in detect-character-encoding v0.3.1.","CONFIRM:https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj | URL:https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj | MISC:https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588 | URL:https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588 | MISC:https://github.com/sonicdoe/detect-character-encoding/pull/6 | URL:https://github.com/sonicdoe/detect-character-encoding/pull/6 | MISC:https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1 | URL:https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39177,Candidate,"Geyser is a bridge between Minecraft: Bedrock Edition and Minecraft: Java Edition. Versions of Geyser prior to 1.4.2-SNAPSHOT allow anyone that can connect to the server to forge a LoginPacket with manipulated JWT token allowing impersonation as any user. Version 1.4.2-SNAPSHOT contains a patch for the issue. There are no known workarounds aside from upgrading.","CONFIRM:https://github.com/GeyserMC/Geyser/security/advisories/GHSA-h77f-xxx7-4858 | URL:https://github.com/GeyserMC/Geyser/security/advisories/GHSA-h77f-xxx7-4858 | MISC:https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6 | URL:https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6 | MISC:https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY | URL:https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39178,Candidate,"Next.js is a React framework. Versions of Next.js between 10.0.0 and 11.0.0 contain a cross-site scripting vulnerability. In order for an instance to be affected by the vulnerability, the `next.config.js` file must have `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default or the instance is deployed on Vercel, the instance is not affected by the vulnerability. The vulnerability is patched in Next.js version 11.1.1.","CONFIRM:https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m | URL:https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m | MISC:https://github.com/vercel/next.js/releases/tag/v11.1.1 | URL:https://github.com/vercel/next.js/releases/tag/v11.1.1",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-39179,Candidate,"DHIS 2 is an information system for data capture, management, validation, analytics and visualization. A SQL Injection vulnerability in the Tracker component in DHIS2 Server allows authenticated remote attackers to execute arbitrary SQL commands via unspecified vectors. This vulnerability affects the `/api/trackedEntityInstances` and `/api/trackedEntityInstances/query` API endpoints in all DHIS2 versions 2.34, 2.35, and 2.36. It also affects versions 2.32 and 2.33 which have reached _end of support_ - exceptional security updates have been added to the latest *end of support* builds for these versions. Versions 2.31 and older are unaffected. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. The vulnerability is not exposed to a non-malicious user - the vulnerability requires a conscious attack to be exploited. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance. There are no known exploits of the security vulnerabilities addressed by these patch releases. Security patches are available in DHIS2 versions 2.32-EOS, 2.33-EOS, 2.34.7, 2.35.7, and 2.36.4. There is no straightforward known workaround for DHIS2 instances using the Tracker functionality other than upgrading the affected DHIS2 server to one of the patches in which this vulnerability has been fixed. For implementations which do NOT use Tracker functionality, it may be possible to block all network access to POST to the `/api/trackedEntityInstances`, and `/api/trackedEntityInstances/query` endpoints as a temporary workaround while waiting to upgrade.","CONFIRM:https://github.com/dhis2/dhis2-core/security/advisories/GHSA-cmpc-frjv-rrmw | URL:https://github.com/dhis2/dhis2-core/security/advisories/GHSA-cmpc-frjv-rrmw | MISC:https://github.com/dhis2/dhis2-core/commit/16674ac75127b0e83691c6b1c9ce745e67ab58b6 | URL:https://github.com/dhis2/dhis2-core/commit/16674ac75127b0e83691c6b1c9ce745e67ab58b6 | MISC:https://github.com/dhis2/dhis2-core/pull/8771 | URL:https://github.com/dhis2/dhis2-core/pull/8771",Assigned (20210816),"None (candidate not yet proposed)","" +CVE-2021-3918,Candidate,"json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')","CONFIRM:https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9 | URL:https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9 | MISC:https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741 | URL:https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741 | MLIST:[debian-lts-announce] 20221206 [SECURITY] [DLA 3228-1] node-json-schema security update | URL:https://lists.debian.org/debian-lts-announce/2022/12/msg00013.html",Assigned (20211102),"None (candidate not yet proposed)","" +CVE-2021-39180,Candidate,"OpenOLAT is a web-based learning management system (LMS). A path traversal vulnerability exists in versions prior to 15.3.18, 15.5.3, and 16.0.0. Using a specially prepared ZIP file, it is possible to overwrite any file that is writable by the application server user (e.g. the tomcat user). Depending on the configuration this can be limited to files of the OpenOlat user data directory, however, if not properly set up, the attack could also be used to overwrite application server config files, java code or even operating system files. The attack could be used to corrupt or modify any OpenOlat file such as course structures, config files or temporary test data. Those attack would require in-depth knowledge of the installation and thus more theoretical. If the app server configuration allows the execution of jsp files and the path to the context is known, it is also possible to execute java code. If the app server runs with the same user that is used to deploy the OpenOlat code or has write permissions on the OpenOlat code files and the path to the context is know, code injection is possible. The attack requires an OpenOlat user account to upload a ZIP file and trigger the unzip method. It can not be exploited by unregistered users. The problem is fixed in versions 15.3.18, 15.5.3 and 16.0.0. There are no known workarounds aside from upgrading.","CONFIRM:https://github.com/OpenOLAT/OpenOLAT/security/advisories/GHSA-x95v-2pgj-9x8j | URL:https://github.com/OpenOLAT/OpenOLAT/security/advisories/GHSA-x95v-2pgj-9x8j | MISC:https://github.com/OpenOLAT/OpenOLAT/commit/2cf73c972e23ccd69cc1e103e43c2c8253571d3e | URL:https://github.com/OpenOLAT/OpenOLAT/commit/2cf73c972e23ccd69cc1e103e43c2c8253571d3e | MISC:https://github.com/OpenOLAT/OpenOLAT/commit/5668a41ab3f1753102a89757be013487544279d5 | URL:https://github.com/OpenOLAT/OpenOLAT/commit/5668a41ab3f1753102a89757be013487544279d5 | MISC:https://github.com/OpenOLAT/OpenOLAT/commit/699490be8e931af0ef1f135c55384db1f4232637 | URL:https://github.com/OpenOLAT/OpenOLAT/commit/699490be8e931af0ef1f135c55384db1f4232637 | MISC:https://jira.openolat.org/browse/OO-5549 | URL:https://jira.openolat.org/browse/OO-5549",Assigned (20210816),"None (candidate not yet proposed)","" \ No newline at end of file