Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-27919 (GCVE-0-2021-27919)
Vulnerability from cvelistv5
Published
2021-03-11 00:00
Modified
2024-08-03 21:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:33:17.224Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" }, { "name": "FEDORA-2021-6a3024b3fd", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/" }, { "name": "FEDORA-2021-e71b05ba7b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/" }, { "name": "GLSA-202208-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-04T15:11:53", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" }, { "name": "FEDORA-2021-6a3024b3fd", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/" }, { "name": "FEDORA-2021-e71b05ba7b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/" }, { "name": "GLSA-202208-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-27919", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" }, { "name": "FEDORA-2021-6a3024b3fd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/" }, { "name": "FEDORA-2021-e71b05ba7b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-27919", "datePublished": "2021-03-11T00:00:13", "dateReserved": "2021-03-03T00:00:00", "dateUpdated": "2024-08-03T21:33:17.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-27919\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-03-11T00:15:12.093\",\"lastModified\":\"2024-11-21T05:58:48.960\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename.\"},{\"lang\":\"es\",\"value\":\"archive/zip en Go versiones 1.16.x anteriores a 1.16.1, permite a atacantes causar una denegaci\u00f3n de servicio (p\u00e1nico) al intentar usar la API Reader.Open para un archivo ZIP en el que ../ aparece al principio de cualquier nombre de archivo\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.16.0\",\"versionEndExcluding\":\"1.16.1\",\"matchCriteriaId\":\"23643AC7-98B9-465F-B10B-C7AD4C59F77E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}],\"references\":[{\"url\":\"https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202208-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
wid-sec-w-2023-2229
Vulnerability from csaf_certbund
Published
2023-08-30 22:00
Modified
2024-08-12 22:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuführen, einen 'Denial of Service'-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2024-0718 vom 2024-07-02", "url": "https://advisory.splunk.com/advisories/SVD-2024-0718" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2024-0801 vom 2024-08-12", "url": "https://advisory.splunk.com//advisories/SVD-2024-0801" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-08-12T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:57:53.670+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-07-01T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Splunk-SVD aufgenommen" }, { "date": "2024-08-12T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Splunk-SVD aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Splunk Splunk Enterprise", "product": { "name": "Splunk Splunk Enterprise", "product_id": "T008911", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:-" } } }, { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634" } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635" } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636" } }, { "category": "product_version_range", "name": "\u003c9.2.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.2.1", "product_id": "T033705" } }, { "category": "product_version_range", "name": "\u003c9.1.4", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.4", "product_id": "T033718" } }, { "category": "product_version_range", "name": "\u003c9.0.9", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.9", "product_id": "T033720" } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40598" } ] }
fkie_cve-2021-27919
Vulnerability from fkie_nvd
Published
2021-03-11 00:15
Modified
2024-11-21 05:58
Severity ?
Summary
archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw | Mailing List, Vendor Advisory | |
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/ | ||
cve@mitre.org | https://security.gentoo.org/glsa/202208-02 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202208-02 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
golang | go | * | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "matchCriteriaId": "23643AC7-98B9-465F-B10B-C7AD4C59F77E", "versionEndExcluding": "1.16.1", "versionStartIncluding": "1.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename." }, { "lang": "es", "value": "archive/zip en Go versiones 1.16.x anteriores a 1.16.1, permite a atacantes causar una denegaci\u00f3n de servicio (p\u00e1nico) al intentar usar la API Reader.Open para un archivo ZIP en el que ../ aparece al principio de cualquier nombre de archivo" } ], "id": "CVE-2021-27919", "lastModified": "2024-11-21T05:58:48.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-11T00:15:12.093", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2024:10809-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
go1.16-1.16.8-1.1 on GA media
Notes
Title of the patch
go1.16-1.16.8-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.16-1.16.8-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10809
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "go1.16-1.16.8-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the go1.16-1.16.8-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10809", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10809-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2021-27918 page", "url": "https://www.suse.com/security/cve/CVE-2021-27918/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-27919 page", "url": "https://www.suse.com/security/cve/CVE-2021-27919/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-31525 page", "url": "https://www.suse.com/security/cve/CVE-2021-31525/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33195 page", "url": "https://www.suse.com/security/cve/CVE-2021-33195/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33196 page", "url": "https://www.suse.com/security/cve/CVE-2021-33196/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33197 page", "url": "https://www.suse.com/security/cve/CVE-2021-33197/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33198 page", "url": "https://www.suse.com/security/cve/CVE-2021-33198/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-34558 page", "url": "https://www.suse.com/security/cve/CVE-2021-34558/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-36221 page", "url": "https://www.suse.com/security/cve/CVE-2021-36221/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39293 page", "url": "https://www.suse.com/security/cve/CVE-2021-39293/" } ], "title": "go1.16-1.16.8-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10809-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.16-1.16.8-1.1.aarch64", "product": { "name": "go1.16-1.16.8-1.1.aarch64", "product_id": "go1.16-1.16.8-1.1.aarch64" } }, { "category": "product_version", "name": "go1.16-doc-1.16.8-1.1.aarch64", "product": { "name": "go1.16-doc-1.16.8-1.1.aarch64", "product_id": "go1.16-doc-1.16.8-1.1.aarch64" } }, { "category": "product_version", "name": "go1.16-race-1.16.8-1.1.aarch64", "product": { "name": "go1.16-race-1.16.8-1.1.aarch64", "product_id": "go1.16-race-1.16.8-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.16-1.16.8-1.1.ppc64le", "product": { "name": "go1.16-1.16.8-1.1.ppc64le", "product_id": "go1.16-1.16.8-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.16-doc-1.16.8-1.1.ppc64le", "product": { "name": "go1.16-doc-1.16.8-1.1.ppc64le", "product_id": "go1.16-doc-1.16.8-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.16-race-1.16.8-1.1.ppc64le", "product": { "name": "go1.16-race-1.16.8-1.1.ppc64le", "product_id": "go1.16-race-1.16.8-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.16-1.16.8-1.1.s390x", "product": { "name": "go1.16-1.16.8-1.1.s390x", "product_id": "go1.16-1.16.8-1.1.s390x" } }, { "category": "product_version", "name": "go1.16-doc-1.16.8-1.1.s390x", "product": { "name": "go1.16-doc-1.16.8-1.1.s390x", "product_id": "go1.16-doc-1.16.8-1.1.s390x" } }, { "category": "product_version", "name": "go1.16-race-1.16.8-1.1.s390x", "product": { "name": "go1.16-race-1.16.8-1.1.s390x", "product_id": "go1.16-race-1.16.8-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.16-1.16.8-1.1.x86_64", "product": { "name": "go1.16-1.16.8-1.1.x86_64", "product_id": "go1.16-1.16.8-1.1.x86_64" } }, { "category": "product_version", "name": "go1.16-doc-1.16.8-1.1.x86_64", "product": { "name": "go1.16-doc-1.16.8-1.1.x86_64", "product_id": "go1.16-doc-1.16.8-1.1.x86_64" } }, { "category": "product_version", "name": "go1.16-race-1.16.8-1.1.x86_64", "product": { "name": "go1.16-race-1.16.8-1.1.x86_64", "product_id": "go1.16-race-1.16.8-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.16-1.16.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64" }, "product_reference": "go1.16-1.16.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-1.16.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le" }, "product_reference": "go1.16-1.16.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-1.16.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x" }, "product_reference": "go1.16-1.16.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-1.16.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64" }, "product_reference": "go1.16-1.16.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-doc-1.16.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64" }, "product_reference": "go1.16-doc-1.16.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-doc-1.16.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le" }, "product_reference": "go1.16-doc-1.16.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-doc-1.16.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x" }, "product_reference": "go1.16-doc-1.16.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-doc-1.16.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64" }, "product_reference": "go1.16-doc-1.16.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-race-1.16.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64" }, "product_reference": "go1.16-race-1.16.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-race-1.16.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le" }, "product_reference": "go1.16-race-1.16.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-race-1.16.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x" }, "product_reference": "go1.16-race-1.16.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-race-1.16.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" }, "product_reference": "go1.16-race-1.16.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-27918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-27918" } ], "notes": [ { "category": "general", "text": "encoding/xml in Go before 1.15.9 and 1.16.x before 1.16.1 has an infinite loop if a custom TokenReader (for xml.NewTokenDecoder) returns EOF in the middle of an element. This can occur in the Decode, DecodeElement, or Skip method.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-27918", "url": "https://www.suse.com/security/cve/CVE-2021-27918" }, { "category": "external", "summary": "SUSE Bug 1183333 for CVE-2021-27918", "url": "https://bugzilla.suse.com/1183333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-27919" } ], "notes": [ { "category": "general", "text": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-27919", "url": "https://www.suse.com/security/cve/CVE-2021-27919" }, { "category": "external", "summary": "SUSE Bug 1183334 for CVE-2021-27919", "url": "https://bugzilla.suse.com/1183334" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-27919" }, { "cve": "CVE-2021-31525", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-31525" } ], "notes": [ { "category": "general", "text": "net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-31525", "url": "https://www.suse.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "SUSE Bug 1185790 for CVE-2021-31525", "url": "https://bugzilla.suse.com/1185790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-31525" }, { "cve": "CVE-2021-33195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33195" } ], "notes": [ { "category": "general", "text": "Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers, and thus a return value may contain an unsafe injection (e.g., XSS) that does not conform to the RFC1035 format.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33195", "url": "https://www.suse.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "SUSE Bug 1187443 for CVE-2021-33195", "url": "https://bugzilla.suse.com/1187443" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33196" } ], "notes": [ { "category": "general", "text": "In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive\u0027s header) can cause a NewReader or OpenReader panic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33196", "url": "https://www.suse.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "SUSE Bug 1186622 for CVE-2021-33196", "url": "https://bugzilla.suse.com/1186622" }, { "category": "external", "summary": "SUSE Bug 1190589 for CVE-2021-33196", "url": "https://bugzilla.suse.com/1190589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33197" } ], "notes": [ { "category": "general", "text": "In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33197", "url": "https://www.suse.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "SUSE Bug 1187444 for CVE-2021-33197", "url": "https://bugzilla.suse.com/1187444" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33198" } ], "notes": [ { "category": "general", "text": "In Go before 1.15.13 and 1.16.x before 1.16.5, there can be a panic for a large exponent to the math/big.Rat SetString or UnmarshalText method.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33198", "url": "https://www.suse.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "SUSE Bug 1187445 for CVE-2021-33198", "url": "https://bugzilla.suse.com/1187445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-34558" } ], "notes": [ { "category": "general", "text": "The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-34558", "url": "https://www.suse.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "SUSE Bug 1188229 for CVE-2021-34558", "url": "https://bugzilla.suse.com/1188229" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-34558" }, { "cve": "CVE-2021-36221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-36221" } ], "notes": [ { "category": "general", "text": "Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-36221", "url": "https://www.suse.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "SUSE Bug 1189162 for CVE-2021-36221", "url": "https://bugzilla.suse.com/1189162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-36221" }, { "cve": "CVE-2021-39293", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39293" } ], "notes": [ { "category": "general", "text": "In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39293", "url": "https://www.suse.com/security/cve/CVE-2021-39293" }, { "category": "external", "summary": "SUSE Bug 1190589 for CVE-2021-39293", "url": "https://bugzilla.suse.com/1190589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.16-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-doc-1.16.8-1.1.x86_64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.aarch64", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.ppc64le", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.s390x", "openSUSE Tumbleweed:go1.16-race-1.16.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-39293" } ] }
ghsa-v7gg-6p99-5jxq
Vulnerability from github
Published
2022-05-24 17:44
Modified
2022-08-05 00:00
Severity ?
VLAI Severity ?
Details
archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename.
{ "affected": [], "aliases": [ "CVE-2021-27919" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-03-11T00:15:00Z", "severity": "MODERATE" }, "details": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename.", "id": "GHSA-v7gg-6p99-5jxq", "modified": "2022-08-05T00:00:28Z", "published": "2022-05-24T17:44:26Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27919" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202208-02" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2021-27919
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-27919", "description": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename.", "id": "GSD-2021-27919", "references": [ "https://www.suse.com/security/cve/CVE-2021-27919.html", "https://security.archlinux.org/CVE-2021-27919" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-27919" ], "details": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename.", "id": "GSD-2021-27919", "modified": "2023-12-13T01:23:35.425518Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-27919", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" }, { "name": "FEDORA-2021-6a3024b3fd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/" }, { "name": "FEDORA-2021-e71b05ba7b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-02" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.16.1", "versionStartIncluding": "1.16.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-27919" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", "refsource": "MISC", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" }, { "name": "FEDORA-2021-6a3024b3fd", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/" }, { "name": "FEDORA-2021-e71b05ba7b", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2022-12-13T16:31Z", "publishedDate": "2021-03-11T00:15Z" } } }
suse-su-2021:0937-1
Vulnerability from csaf_suse
Published
2021-03-24 11:22
Modified
2021-03-24 11:22
Summary
Security update for go1.16
Notes
Title of the patch
Security update for go1.16
Description of the patch
This update for go1.16 fixes the following issues:
- go1.16.2 (released 2021-03-11) (bsc#1182345)
- go1.16.1 (released 2021-03-10) (bsc#1182345)
- CVE-2021-27918: Fixed an infinite loop when using xml.NewTokenDecoder with a custom TokenReader (bsc#1183333).
- CVE-2021-27919: Fixed an issue where archive/zip: can panic when calling Reader.Open (bsc#1183334).
Patchnames
SUSE-2021-937,SUSE-SLE-Module-Development-Tools-15-SP2-2021-937
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.16", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.16 fixes the following issues:\n\n- go1.16.2 (released 2021-03-11) (bsc#1182345) \n- go1.16.1 (released 2021-03-10) (bsc#1182345) \n - CVE-2021-27918: Fixed an infinite loop when using xml.NewTokenDecoder with a custom TokenReader (bsc#1183333).\n - CVE-2021-27919: Fixed an issue where archive/zip: can panic when calling Reader.Open (bsc#1183334).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-937,SUSE-SLE-Module-Development-Tools-15-SP2-2021-937", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0937-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:0937-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210937-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:0937-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008547.html" }, { "category": "self", "summary": "SUSE Bug 1182345", "url": "https://bugzilla.suse.com/1182345" }, { "category": "self", "summary": "SUSE Bug 1183333", "url": "https://bugzilla.suse.com/1183333" }, { "category": "self", "summary": "SUSE Bug 1183334", "url": "https://bugzilla.suse.com/1183334" }, { "category": "self", "summary": "SUSE CVE CVE-2021-27918 page", "url": "https://www.suse.com/security/cve/CVE-2021-27918/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-27919 page", "url": "https://www.suse.com/security/cve/CVE-2021-27919/" } ], "title": "Security update for go1.16", "tracking": { "current_release_date": "2021-03-24T11:22:26Z", "generator": { "date": "2021-03-24T11:22:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:0937-1", "initial_release_date": "2021-03-24T11:22:26Z", "revision_history": [ { "date": "2021-03-24T11:22:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.16-1.16.2-1.8.1.aarch64", "product": { "name": "go1.16-1.16.2-1.8.1.aarch64", "product_id": "go1.16-1.16.2-1.8.1.aarch64" } }, { "category": "product_version", "name": "go1.16-doc-1.16.2-1.8.1.aarch64", "product": { "name": "go1.16-doc-1.16.2-1.8.1.aarch64", "product_id": "go1.16-doc-1.16.2-1.8.1.aarch64" } }, { "category": "product_version", "name": "go1.16-race-1.16.2-1.8.1.aarch64", "product": { "name": "go1.16-race-1.16.2-1.8.1.aarch64", "product_id": "go1.16-race-1.16.2-1.8.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.16-1.16.2-1.8.1.i586", "product": { "name": "go1.16-1.16.2-1.8.1.i586", "product_id": "go1.16-1.16.2-1.8.1.i586" } }, { "category": "product_version", "name": "go1.16-doc-1.16.2-1.8.1.i586", "product": { "name": "go1.16-doc-1.16.2-1.8.1.i586", "product_id": "go1.16-doc-1.16.2-1.8.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.16-1.16.2-1.8.1.ppc64le", "product": { "name": "go1.16-1.16.2-1.8.1.ppc64le", "product_id": "go1.16-1.16.2-1.8.1.ppc64le" } }, { "category": "product_version", "name": "go1.16-doc-1.16.2-1.8.1.ppc64le", "product": { "name": "go1.16-doc-1.16.2-1.8.1.ppc64le", "product_id": "go1.16-doc-1.16.2-1.8.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.16-1.16.2-1.8.1.s390x", "product": { "name": "go1.16-1.16.2-1.8.1.s390x", "product_id": "go1.16-1.16.2-1.8.1.s390x" } }, { "category": "product_version", "name": "go1.16-doc-1.16.2-1.8.1.s390x", "product": { "name": "go1.16-doc-1.16.2-1.8.1.s390x", "product_id": "go1.16-doc-1.16.2-1.8.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.16-1.16.2-1.8.1.x86_64", "product": { "name": "go1.16-1.16.2-1.8.1.x86_64", "product_id": "go1.16-1.16.2-1.8.1.x86_64" } }, { "category": "product_version", "name": "go1.16-doc-1.16.2-1.8.1.x86_64", "product": { "name": "go1.16-doc-1.16.2-1.8.1.x86_64", "product_id": "go1.16-doc-1.16.2-1.8.1.x86_64" } }, { "category": "product_version", "name": "go1.16-race-1.16.2-1.8.1.x86_64", "product": { "name": "go1.16-race-1.16.2-1.8.1.x86_64", "product_id": "go1.16-race-1.16.2-1.8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.16-1.16.2-1.8.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.aarch64" }, "product_reference": "go1.16-1.16.2-1.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-1.16.2-1.8.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.ppc64le" }, "product_reference": "go1.16-1.16.2-1.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-1.16.2-1.8.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.s390x" }, "product_reference": "go1.16-1.16.2-1.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-1.16.2-1.8.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.x86_64" }, "product_reference": "go1.16-1.16.2-1.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-doc-1.16.2-1.8.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.aarch64" }, "product_reference": "go1.16-doc-1.16.2-1.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-doc-1.16.2-1.8.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.ppc64le" }, "product_reference": "go1.16-doc-1.16.2-1.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-doc-1.16.2-1.8.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.s390x" }, "product_reference": "go1.16-doc-1.16.2-1.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-doc-1.16.2-1.8.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.x86_64" }, "product_reference": "go1.16-doc-1.16.2-1.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-race-1.16.2-1.8.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.aarch64" }, "product_reference": "go1.16-race-1.16.2-1.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "go1.16-race-1.16.2-1.8.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.x86_64" }, "product_reference": "go1.16-race-1.16.2-1.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-27918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-27918" } ], "notes": [ { "category": "general", "text": "encoding/xml in Go before 1.15.9 and 1.16.x before 1.16.1 has an infinite loop if a custom TokenReader (for xml.NewTokenDecoder) returns EOF in the middle of an element. This can occur in the Decode, DecodeElement, or Skip method.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-27918", "url": "https://www.suse.com/security/cve/CVE-2021-27918" }, { "category": "external", "summary": "SUSE Bug 1183333 for CVE-2021-27918", "url": "https://bugzilla.suse.com/1183333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-03-24T11:22:26Z", "details": "important" } ], "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-27919" } ], "notes": [ { "category": "general", "text": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-27919", "url": "https://www.suse.com/security/cve/CVE-2021-27919" }, { "category": "external", "summary": "SUSE Bug 1183334 for CVE-2021-27919", "url": "https://bugzilla.suse.com/1183334" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-1.16.2-1.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-doc-1.16.2-1.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:go1.16-race-1.16.2-1.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-03-24T11:22:26Z", "details": "moderate" } ], "title": "CVE-2021-27919" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…