You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@trafficcontrol.apache.org by zr...@apache.org on 2021/11/09 22:54:25 UTC
[trafficcontrol-website] branch asf-site updated: CVE-2021-43350
This is an automated email from the ASF dual-hosted git repository.
zrhoffman pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/trafficcontrol-website.git
The following commit(s) were added to refs/heads/asf-site by this push:
new 5d4eeb5 CVE-2021-43350
5d4eeb5 is described below
commit 5d4eeb51b118e62b39ec4e83f8cd3f14aeebe60a
Author: Zach Hoffman <zr...@apache.org>
AuthorDate: Tue Nov 9 15:54:10 2021 -0700
CVE-2021-43350
---
security/index.html | 2 ++
1 file changed, 2 insertions(+)
diff --git a/security/index.html b/security/index.html
index b2c6621..dd5b33c 100644
--- a/security/index.html
+++ b/security/index.html
@@ -103,6 +103,8 @@
<div class="card-body">
<h4 class="card-title">Past Vulnerabilities</h4>
<ul>
+ <li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43350">CVE-2021-43350: Apache Traffic
+ Control: LDAP filter injection vulnerability in Traffic Ops</a></li>
<li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42009">CVE-2021-42009: Apache Traffic
Control Email Injection Vulnerability</a></li>
<li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17522">CVE-2020-17522: Apache Traffic