You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@trafficcontrol.apache.org by zr...@apache.org on 2021/11/09 22:54:25 UTC

[trafficcontrol-website] branch asf-site updated: CVE-2021-43350

This is an automated email from the ASF dual-hosted git repository.

zrhoffman pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/trafficcontrol-website.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 5d4eeb5  CVE-2021-43350
5d4eeb5 is described below

commit 5d4eeb51b118e62b39ec4e83f8cd3f14aeebe60a
Author: Zach Hoffman <zr...@apache.org>
AuthorDate: Tue Nov 9 15:54:10 2021 -0700

    CVE-2021-43350
---
 security/index.html | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/security/index.html b/security/index.html
index b2c6621..dd5b33c 100644
--- a/security/index.html
+++ b/security/index.html
@@ -103,6 +103,8 @@
                     <div class="card-body">
                         <h4 class="card-title">Past Vulnerabilities</h4>
                         <ul>
+                            <li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43350">CVE-2021-43350: Apache Traffic
+                                    Control: LDAP filter injection vulnerability in Traffic Ops</a></li>
                             <li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42009">CVE-2021-42009: Apache Traffic
                                     Control Email Injection Vulnerability</a></li>
                             <li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17522">CVE-2020-17522: Apache Traffic