mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
069b76be52
commit
298b4d2ae5
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -71,6 +66,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1423",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1423"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -71,6 +66,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1423",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1423"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -71,6 +66,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1423",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1423"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-976",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-976"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "107628",
|
||||
"url": "http://www.securityfocus.com/bid/107628"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-976",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-976"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -71,6 +66,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787",
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -71,6 +66,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787",
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(2)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(2)"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -71,6 +66,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0846",
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0846"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(2)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(2)"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108540",
|
||||
"url": "http://www.securityfocus.com/bid/108540"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1373",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1373"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108540",
|
||||
"url": "http://www.securityfocus.com/bid/108540"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1373",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1373"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1391",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1391"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108540",
|
||||
"url": "http://www.securityfocus.com/bid/108540"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1391",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1391"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1409",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1409"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108540",
|
||||
"url": "http://www.securityfocus.com/bid/108540"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1409",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1409"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -76,6 +71,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1636",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1636"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1403",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1403"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108540",
|
||||
"url": "http://www.securityfocus.com/bid/108540"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1403",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1403"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108540",
|
||||
"url": "http://www.securityfocus.com/bid/108540"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108747",
|
||||
"url": "http://www.securityfocus.com/bid/108747"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108747",
|
||||
"url": "http://www.securityfocus.com/bid/108747"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(2)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(2)"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108747",
|
||||
"url": "http://www.securityfocus.com/bid/108747"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(2)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(2)"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1411",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1411"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108747",
|
||||
"url": "http://www.securityfocus.com/bid/108747"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1411",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1411"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108747",
|
||||
"url": "http://www.securityfocus.com/bid/108747"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1420",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1420"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108747",
|
||||
"url": "http://www.securityfocus.com/bid/108747"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1420",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1420"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -76,6 +71,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1851",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1851"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108747",
|
||||
"url": "http://www.securityfocus.com/bid/108747"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "108747",
|
||||
"url": "http://www.securityfocus.com/bid/108747"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "109156",
|
||||
"url": "http://www.securityfocus.com/bid/109156"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "109156",
|
||||
"url": "http://www.securityfocus.com/bid/109156"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1400",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1400"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "109156",
|
||||
"url": "http://www.securityfocus.com/bid/109156"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1400",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1400"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1419",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1419"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "109156",
|
||||
"url": "http://www.securityfocus.com/bid/109156"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1419",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1419"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-775",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-775"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "109156",
|
||||
"url": "http://www.securityfocus.com/bid/109156"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-775",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-775"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1438",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1438"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -71,6 +66,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-19-837/",
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-837/"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1438",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1438"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1177",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1177"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -71,6 +66,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "109156",
|
||||
"url": "http://www.securityfocus.com/bid/109156"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1177",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1177"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1441",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1441"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -71,6 +66,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-19-838/",
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-838/"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1441",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1441"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1437",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1437"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -71,6 +66,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-19-836/",
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-836/"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1437",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1437"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-1424",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-1424"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.tenable.com/security/research/tra-2019-35",
|
||||
@ -81,6 +76,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2548",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2548"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-1424",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-1424"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-626",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-626"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190717 Multiple vulnerabilities in Jenkins",
|
||||
@ -76,6 +71,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2548",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2548"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-626",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-626"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-534",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-534"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190717 Multiple vulnerabilities in Jenkins",
|
||||
@ -76,6 +71,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2548",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2548"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-534",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-534"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -76,6 +71,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2662",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2662"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -76,6 +71,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2662",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2662"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY1422",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY1422"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -76,6 +71,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2662",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2662"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY1422",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY1422"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-713",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-713"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-713",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-713"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1435",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1435"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-19-835/",
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-835/"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1435",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1435"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-673",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-673"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-673",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-673"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1429",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1429"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-19-833/",
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-833/"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1429",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1429"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1497",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1497"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1497",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1497"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-157",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-157"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-157",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-157"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-795",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-795"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-795",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-795"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-796",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-796"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-796",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-796"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-879",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-879"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-879",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-879"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-142",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-142"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-142",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-142"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-751",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-751"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-751",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-751"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1099",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1099"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1099",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1099"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-19-839/",
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-839/"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-591",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-591"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-591",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-591"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-922",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-922"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-922",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-931",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-931"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-931",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-931"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1376",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1376"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1376",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1376"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1453",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1453"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190828 Multiple vulnerabilities in Jenkins and Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/28/4"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1453",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1453"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190828 Multiple vulnerabilities in Jenkins and Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/28/4"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1430",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1430"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
@ -66,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-19-834/",
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-834/"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1430",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1430"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1294",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1294"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190828 Multiple vulnerabilities in Jenkins and Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/28/4"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1294",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1294"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1512",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1512"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190828 Multiple vulnerabilities in Jenkins and Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/08/28/4"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1512",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1512"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -54,7 +54,7 @@
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1534",
|
||||
"refsource": "CONFIRM",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1534"
|
||||
},
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/09/12/2"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/09/12/2"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1476",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1476"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/09/12/2"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1476",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1476"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1489",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1489"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/09/12/2"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1489",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1489"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURTY-1509",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURTY-1509"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/09/12/2"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURTY-1509",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURTY-1509"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1545",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1545"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/09/12/2"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1545",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1545"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/09/12/2"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/09/12/2"
|
||||
},
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,146 +1,103 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@atlassian.com",
|
||||
"DATE_PUBLIC": "2018-09-18T00:00:00",
|
||||
"ID": "CVE-2019-14994",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Jira Service Desk Server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "3.9.16",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "3.10.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "3.16.8",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "4.0.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "4.1.3",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.5",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "4.3.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "4.3.4",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "4.4.0",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Jira Service Desk Data Center",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "3.9.16",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "3.10.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "3.16.8",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "4.0.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "4.1.3",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "4.2.5",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "4.3.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "4.3.4",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "4.4.0",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Atlassian"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The Customer Context Filter in Atlassian Jira Service Desk Server and Jira Service Desk Data Center before version 3.9.16, from version 3.10.0 before version 3.16.8, from version 4.0.0 before version 4.1.3, from version 4.2.0 before version 4.2.5, from version 4.3.0 before version 4.3.4, and version 4.4.0 allows remote attackers with portal access to view arbitrary issues in Jira Service Desk projects via a path traversal vulnerability. Note that when the 'Anyone can email the service desk or raise a request in the portal' setting is enabled, an attacker can grant themselves portal access, allowing them to exploit the vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Path Traversal"
|
||||
}
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@atlassian.com",
|
||||
"DATE_PUBLIC": "2018-09-18T00:00:00",
|
||||
"ID": "CVE-2019-14994",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Atlassian",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Jira Service Desk Server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "before version 3.9.16"
|
||||
},
|
||||
{
|
||||
"version_value": "from version 3.10.0 before version 3.16.8"
|
||||
},
|
||||
{
|
||||
"version_value": "from version 4.0.0 before version 4.1.3"
|
||||
},
|
||||
{
|
||||
"version_value": "from version 4.2.0 before version 4.2.5"
|
||||
},
|
||||
{
|
||||
"version_value": "from version 4.3.0 before version 4.3.4"
|
||||
},
|
||||
{
|
||||
"version_value": "version 4.4.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Jira Service Desk Data Center",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "before version 3.9.16"
|
||||
},
|
||||
{
|
||||
"version_value": "from version 3.10.0 before version 3.16.8"
|
||||
},
|
||||
{
|
||||
"version_value": "from version 4.0.0 before version 4.1.3"
|
||||
},
|
||||
{
|
||||
"version_value": "from version 4.2.0 before version 4.2.5"
|
||||
},
|
||||
{
|
||||
"version_value": "from version 4.3.0 before version 4.3.4"
|
||||
},
|
||||
{
|
||||
"version_value": "version 4.4.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://confluence.atlassian.com/jira/jira-service-desk-security-advisory-2019-09-11-976171274.html",
|
||||
"url": "https://jira.atlassian.com/browse/JSDSERVER-6517"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The Customer Context Filter in Atlassian Jira Service Desk Server and Jira Service Desk Data Center before version 3.9.16, from version 3.10.0 before version 3.16.8, from version 4.0.0 before version 4.1.3, from version 4.2.0 before version 4.2.5, from version 4.3.0 before version 4.3.4, and version 4.4.0 allows remote attackers with portal access to view arbitrary issues in Jira Service Desk projects via a path traversal vulnerability. Note that when the 'Anyone can email the service desk or raise a request in the portal' setting is enabled, an attacker can grant themselves portal access, allowing them to exploit the vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Path Traversal"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/JSDSERVER-6517",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.atlassian.com/browse/JSDSERVER-6517"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -1,169 +1,109 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@atlassian.com",
|
||||
"DATE_PUBLIC": "2019-09-18T00:00:00",
|
||||
"ID": "CVE-2019-15000",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Bitbucket Server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "5.16.10",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "6.0.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "6.0.10",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "6.1.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "6.1.8",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "6.2.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "6.2.6",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "6.3.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "6.3.5",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "6.4.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "6.4.3",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "6.5.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "6.5.2",
|
||||
"version_affected": "<"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Bitbucket Data Center",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "5.16.10",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "6.0.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "6.0.10",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "6.1.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "6.1.8",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "6.2.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "6.2.6",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "6.3.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "6.3.5",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "6.4.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "6.4.3",
|
||||
"version_affected": "<"
|
||||
},
|
||||
{
|
||||
"version_value": "6.5.0",
|
||||
"version_affected": ">="
|
||||
},
|
||||
{
|
||||
"version_value": "6.5.2",
|
||||
"version_affected": "<"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Atlassian"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6.3.5 (the fixed version for 6.3.x), from 6.4.0 before 6.4.3 (the fixed version for 6.4.x), and from 6.5.0 before 6.5.2 (the fixed version for 6.5.x) allows remote attackers who have permission to access a repository, if public access is enabled for a project or repository then attackers are able to exploit this issue anonymously, to read the contents of arbitrary files on the system and execute commands via injecting additional arguments into git commands."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Argument Injection"
|
||||
}
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@atlassian.com",
|
||||
"DATE_PUBLIC": "2019-09-18T00:00:00",
|
||||
"ID": "CVE-2019-15000",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Atlassian",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Bitbucket Server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "before 5.16.10"
|
||||
},
|
||||
{
|
||||
"version_value": "from 6.0.0 before 6.0.10"
|
||||
},
|
||||
{
|
||||
"version_value": "from 6.1.0 before 6.1.8"
|
||||
},
|
||||
{
|
||||
"version_value": "from 6.2.0 before 6.2.6"
|
||||
},
|
||||
{
|
||||
"version_value": "from 6.3.0 before 6.3.5"
|
||||
},
|
||||
{
|
||||
"version_value": "from 6.4.0 before 6.4.3"
|
||||
},
|
||||
{
|
||||
"version_value": "from 6.5.0 before 6.5.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Bitbucket Data Center",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "before 5.16.10"
|
||||
},
|
||||
{
|
||||
"version_value": "from 6.0.0 before 6.0.10"
|
||||
},
|
||||
{
|
||||
"version_value": "from 6.1.0 before 6.1.8"
|
||||
},
|
||||
{
|
||||
"version_value": "from 6.2.0 before 6.2.6"
|
||||
},
|
||||
{
|
||||
"version_value": "from 6.3.0 before 6.3.5"
|
||||
},
|
||||
{
|
||||
"version_value": "from 6.4.0 before 6.4.3"
|
||||
},
|
||||
{
|
||||
"version_value": "from 6.5.0 before 6.5.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/BSERV-11947"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6.3.5 (the fixed version for 6.3.x), from 6.4.0 before 6.4.3 (the fixed version for 6.4.x), and from 6.5.0 before 6.5.2 (the fixed version for 6.5.x) allows remote attackers who have permission to access a repository, if public access is enabled for a project or repository then attackers are able to exploit this issue anonymously, to read the contents of arbitrary files on the system and execute commands via injecting additional arguments into git commands."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Argument Injection"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/BSERV-11947",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.atlassian.com/browse/BSERV-11947"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -9,6 +9,7 @@
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Atlassian",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
@ -16,52 +17,22 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "7.0.10"
|
||||
"version_value": "from version with 7.0.10 before 7.6.16"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "7.6.16"
|
||||
"version_value": "from 7.7.0 before 7.13.8"
|
||||
},
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "7.7.0"
|
||||
"version_value": "from 8.1.0 before 8.1.3"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "7.13.8"
|
||||
"version_value": "from 8.2.0 before 8.2.5"
|
||||
},
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "8.1.0"
|
||||
"version_value": "from 8.3.0 before 8.3.4"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "8.1.3"
|
||||
},
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "8.2.0"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "8.2.5"
|
||||
},
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "8.3.0"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "8.3.4"
|
||||
},
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "8.4.0"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "8.4.1"
|
||||
"version_value": "from 8.4.0 before 8.4.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,59 +42,28 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "7.0.10"
|
||||
"version_value": "from version with 7.0.10 before 7.6.16"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "7.6.16"
|
||||
"version_value": "from 7.7.0 before 7.13.8"
|
||||
},
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "7.7.0"
|
||||
"version_value": "from 8.1.0 before 8.1.3"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "7.13.8"
|
||||
"version_value": "from 8.2.0 before 8.2.5"
|
||||
},
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "8.1.0"
|
||||
"version_value": "from 8.3.0 before 8.3.4"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "8.1.3"
|
||||
},
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "8.2.0"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "8.2.5"
|
||||
},
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "8.3.0"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "8.3.4"
|
||||
},
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_value": "8.4.0"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "8.4.1"
|
||||
"version_value": "from 8.4.0 before 8.4.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Atlassian"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -154,8 +94,10 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/JRASERVER-69933"
|
||||
"url": "https://jira.atlassian.com/browse/JRASERVER-69933",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jira.atlassian.com/browse/JRASERVER-69933"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
62
2019/16xxx/CVE-2019-16398.json
Normal file
62
2019/16xxx/CVE-2019-16398.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-16398",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "On Keeper K5 20.1.0.25 and 20.1.0.63 devices, remote code execution can occur by inserting an SD card containing a file named zskj_script_run.sh that executes a reverse shell."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.com/crypt0crc/cve-2019-16398",
|
||||
"url": "https://gitlab.com/crypt0crc/cve-2019-16398"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user