mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
158eaa9c47
commit
42cfb613c0
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "22252",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/22252"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070110 VLC Format String Vulnerability also in XINE",
|
"name": "20070110 VLC Format String Vulnerability also in XINE",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/456523/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/456523/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDKSA-2007:027",
|
"name": "23931",
|
||||||
"refsource" : "MANDRIVA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:027"
|
"url": "http://secunia.com/advisories/23931"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MDKSA-2007:154",
|
"name": "MDKSA-2007:154",
|
||||||
"refsource": "MANDRIVA",
|
"refsource": "MANDRIVA",
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:154"
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:154"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "22252",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/22252"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "31666",
|
"name": "31666",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/31666"
|
"url": "http://osvdb.org/31666"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "23931",
|
"name": "MDKSA-2007:027",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MANDRIVA",
|
||||||
"url" : "http://secunia.com/advisories/23931"
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:027"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,14 @@
|
|||||||
"url": "http://www.securityfocus.com/archive/1/458475/100/100/threaded"
|
"url": "http://www.securityfocus.com/archive/1/458475/100/100/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20070124 Oracle Buffer Overflow in DBMS_LOGMNR.ADD_LOGFILE",
|
"name": "23794",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/458006/100/0/threaded"
|
"url": "http://secunia.com/advisories/23794"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22083",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/22083"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.appsecinc.com/resources/alerts/oracle/2007-01.shtml",
|
"name": "http://www.appsecinc.com/resources/alerts/oracle/2007-01.shtml",
|
||||||
@ -72,35 +77,30 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "TA07-017A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-017A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "22083",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/22083"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "32910",
|
"name": "32910",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/32910"
|
"url": "http://osvdb.org/32910"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1017522",
|
"name": "TA07-017A",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CERT",
|
||||||
"url" : "http://securitytracker.com/id?1017522"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA07-017A.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "23794",
|
"name": "20070124 Oracle Buffer Overflow in DBMS_LOGMNR.ADD_LOGFILE",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://secunia.com/advisories/23794"
|
"url": "http://www.securityfocus.com/archive/1/458006/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oracle-cpu-jan2007(31541)",
|
"name": "oracle-cpu-jan2007(31541)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31541"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31541"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1017522",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1017522"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20070204 Sql injection bugs in Joomla and Mambo",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/459203/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20070118 The vulnerabilities festival !",
|
"name": "20070118 The vulnerabilities festival !",
|
||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html"
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.hackers.ir/advisories/festival.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.hackers.ir/advisories/festival.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "34792",
|
"name": "34792",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/34792"
|
"url": "http://osvdb.org/34792"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070204 Sql injection bugs in Joomla and Mambo",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/459203/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.hackers.ir/advisories/festival.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.hackers.ir/advisories/festival.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "3202",
|
"name": "ADV-2007-0384",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "VUPEN",
|
||||||
"url" : "https://www.exploit-db.com/exploits/3202"
|
"url": "http://www.vupen.com/english/advisories/2007/0384"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "22259",
|
"name": "22259",
|
||||||
@ -63,19 +63,19 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/22259"
|
"url": "http://www.securityfocus.com/bid/22259"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2007-0384",
|
"name": "ains-ainsmain-file-include(31850)",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "XF",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/0384"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31850"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "3202",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/3202"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "36620",
|
"name": "36620",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/36620"
|
"url": "http://osvdb.org/36620"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ains-ainsmain-file-include(31850)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31850"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20070404 Several Windows image viewers vulnerabilities",
|
"name": "23312",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/464726/100/0/threaded"
|
"url": "http://www.securityfocus.com/bid/23312"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html",
|
"name": "http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html",
|
||||||
@ -63,14 +63,9 @@
|
|||||||
"url": "http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html"
|
"url": "http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "23312",
|
"name": "20070404 Several Windows image viewers vulnerabilities",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/23312"
|
"url": "http://www.securityfocus.com/archive/1/464726/100/0/threaded"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34664",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/34664"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "24784",
|
"name": "24784",
|
||||||
@ -81,6 +76,11 @@
|
|||||||
"name": "2558",
|
"name": "2558",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/2558"
|
"url": "http://securityreason.com/securityalert/2558"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34664",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/34664"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20070404 MyBlog: PHP and MySQL Blog/CMS software Cross-Site Scripting Vulnerabilitiy",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/464712/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "2549",
|
"name": "2549",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/2549"
|
"url": "http://securityreason.com/securityalert/2549"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070404 MyBlog: PHP and MySQL Blog/CMS software Cross-Site Scripting Vulnerabilitiy",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/464712/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "3697",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/3697"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-1333",
|
"name": "ADV-2007-1333",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/1333"
|
"url": "http://www.vupen.com/english/advisories/2007/1333"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "hgb-gb-command-execution(33540)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33540"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "24835",
|
"name": "24835",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/24835"
|
"url": "http://secunia.com/advisories/24835"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "hgb-gb-command-execution(33540)",
|
"name": "3697",
|
||||||
"refsource" : "XF",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33540"
|
"url": "https://www.exploit-db.com/exploits/3697"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2007-3099",
|
"ID": "CVE-2007-3099",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,40 +58,15 @@
|
|||||||
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=243719"
|
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=243719"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://svn.berlios.de/viewcvs/open-iscsi?rev=857&view=rev",
|
"name": "25679",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://svn.berlios.de/viewcvs/open-iscsi?rev=857&view=rev"
|
"url": "http://secunia.com/advisories/25679"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.novell.com/techcenter/psdb/187174044e1dbe78726bcf840f7530ed.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.novell.com/techcenter/psdb/187174044e1dbe78726bcf840f7530ed.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1314",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2007/dsa-1314"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2007:0497",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0497.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2007:017",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2007_17_sr.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "24471",
|
"name": "24471",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/24471"
|
"url": "http://www.securityfocus.com/bid/24471"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "37269",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/37269"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:11595",
|
"name": "oval:org.mitre.oval:def:11595",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
@ -103,29 +78,54 @@
|
|||||||
"url": "http://www.securitytracker.com/id?1018246"
|
"url": "http://www.securitytracker.com/id?1018246"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "25679",
|
"name": "37269",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://secunia.com/advisories/25679"
|
"url": "http://osvdb.org/37269"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "25749",
|
"name": "http://support.novell.com/techcenter/psdb/187174044e1dbe78726bcf840f7530ed.html",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/25749"
|
"url": "http://support.novell.com/techcenter/psdb/187174044e1dbe78726bcf840f7530ed.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "26438",
|
"name": "26438",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/26438"
|
"url": "http://secunia.com/advisories/26438"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2007:017",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2007_17_sr.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "26543",
|
"name": "26543",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/26543"
|
"url": "http://secunia.com/advisories/26543"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "25749",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/25749"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://svn.berlios.de/viewcvs/open-iscsi?rev=857&view=rev",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://svn.berlios.de/viewcvs/open-iscsi?rev=857&view=rev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1314",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2007/dsa-1314"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "openiscsi-mgmtipc-dos(34944)",
|
"name": "openiscsi-mgmtipc-dos(34944)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34944"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34944"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2007:0497",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2007-0497.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/475469/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/475469/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "25197",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/25197"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "aceboard-recherche-sql-injection(35793)",
|
"name": "aceboard-recherche-sql-injection(35793)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35793"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35793"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25197",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/25197"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.ampache.org/announce/3_3_3_5.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.ampache.org/announce/3_3_3_5.php"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=189607",
|
"name": "http://bugs.gentoo.org/show_bug.cgi?id=189607",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=189607"
|
"url": "http://bugs.gentoo.org/show_bug.cgi?id=189607"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "27253",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/27253"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.ampache.org/announce/3_3_3_5.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.ampache.org/announce/3_3_3_5.php"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-200710-13",
|
"name": "GLSA-200710-13",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
@ -72,11 +77,6 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/26542"
|
"url": "http://secunia.com/advisories/26542"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "27253",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/27253"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ampache-session-hijacking(36122)",
|
"name": "ampache-session-hijacking(36122)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-4457",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153329.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1032414",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1032414"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20150320 Re: CVE Request: Linux kernel execution in the early microcode loader.",
|
"name": "[oss-security] 20150320 Re: CVE Request: Linux kernel execution in the early microcode loader.",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2015/03/20/18"
|
"url": "http://www.openwall.com/lists/oss-security/2015/03/20/18"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1204722",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1204722"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/torvalds/linux/commit/f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4",
|
"name": "https://github.com/torvalds/linux/commit/f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/torvalds/linux/commit/f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4"
|
"url": "https://github.com/torvalds/linux/commit/f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "FEDORA-2015-4457",
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4",
|
||||||
"refsource" : "FEDORA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153329.html"
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2015:1534",
|
"name": "RHSA-2015:1534",
|
||||||
@ -83,9 +83,9 @@
|
|||||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1534.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1534.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1032414",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1204722",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1032414"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204722"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2015-3062",
|
"ID": "CVE-2015-3062",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-207",
|
"name": "74604",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-207"
|
"url": "http://www.securityfocus.com/bid/74604"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://helpx.adobe.com/security/products/reader/apsb15-10.html",
|
"name": "https://helpx.adobe.com/security/products/reader/apsb15-10.html",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html"
|
"url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "74604",
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-207",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/74604"
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-207"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1032284",
|
"name": "1032284",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-3724",
|
"ID": "CVE-2015-3724",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,9 +58,9 @@
|
|||||||
"url": "http://support.apple.com/kb/HT204941"
|
"url": "http://support.apple.com/kb/HT204941"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2015-06-30-1",
|
"name": "1032761",
|
||||||
"refsource" : "APPLE",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html"
|
"url": "http://www.securitytracker.com/id/1032761"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "75490",
|
"name": "75490",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/75490"
|
"url": "http://www.securityfocus.com/bid/75490"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1032761",
|
"name": "APPLE-SA-2015-06-30-1",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "APPLE",
|
||||||
"url" : "http://www.securitytracker.com/id/1032761"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-6337",
|
"ID": "CVE-2015-6337",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-6348",
|
"ID": "CVE-2015-6348",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20151026 Cisco Secure Access Control Server Role-Based Access Control Weak Protection Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_rbac1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1033970",
|
"name": "1033970",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1033970"
|
"url": "http://www.securitytracker.com/id/1033970"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20151026 Cisco Secure Access Control Server Role-Based Access Control Weak Protection Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_rbac1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-6417",
|
"ID": "CVE-2015-6417",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20151210 Cisco Videoscape Distribution Suite Service Manager Unauthorized Access Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-vdssm"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "78871",
|
"name": "78871",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/78871"
|
"url": "http://www.securityfocus.com/bid/78871"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20151210 Cisco Videoscape Distribution Suite Service Manager Unauthorized Access Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151210-vdssm"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||||
"ID": "CVE-2015-6491",
|
"ID": "CVE-2015-6491",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-6886",
|
"ID": "CVE-2015-6886",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-7041",
|
"ID": "CVE-2015-7041",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -63,44 +63,44 @@
|
|||||||
"url": "https://support.apple.com/HT205637"
|
"url": "https://support.apple.com/HT205637"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/HT205640",
|
"name": "1034344",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://support.apple.com/HT205640"
|
"url": "http://www.securitytracker.com/id/1034344"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205641",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205641"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-12-08-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-12-08-2",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-12-08-3",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2015-12-08-4",
|
"name": "APPLE-SA-2015-12-08-4",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-12-08-3",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "78719",
|
"name": "78719",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/78719"
|
"url": "http://www.securityfocus.com/bid/78719"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1034344",
|
"name": "APPLE-SA-2015-12-08-1",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "APPLE",
|
||||||
"url" : "http://www.securitytracker.com/id/1034344"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205641",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205641"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205640",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205640"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-12-08-2",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2015-7452",
|
"ID": "CVE-2015-7452",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-7591",
|
"ID": "CVE-2015-7591",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2016-0040",
|
"ID": "CVE-2016-0040",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1034985",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1034985"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "44586",
|
"name": "44586",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "MS16-014",
|
"name": "MS16-014",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-014"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-014"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1034985",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1034985"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-0097",
|
"ID": "CVE-2016-0097",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -62,15 +62,15 @@
|
|||||||
"refsource": "AIXAPAR",
|
"refsource": "AIXAPAR",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LO88449"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LO88449"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "LO88451",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1LO88451"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "92471",
|
"name": "92471",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/92471"
|
"url": "http://www.securityfocus.com/bid/92471"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "LO88451",
|
||||||
|
"refsource": "AIXAPAR",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LO88451"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/02/02/3"
|
"url": "http://www.openwall.com/lists/oss-security/2016/02/02/3"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.vapid.dhs.org/advisory.php?v=160",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.vapid.dhs.org/advisory.php?v=160"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "82347",
|
"name": "82347",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/82347"
|
"url": "http://www.securityfocus.com/bid/82347"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.vapid.dhs.org/advisory.php?v=160",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.vapid.dhs.org/advisory.php?v=160"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "dgh@bouncycastle.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"ID": "CVE-2016-1000345",
|
"ID": "CVE-2016-1000345",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -11,18 +11,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "Bouncy Castle JCE Provider",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "1.55 and before"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "The Legion of the Bouncy Castle Inc."
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -44,7 +44,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "CWE-514: Covert Channel"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -58,9 +58,9 @@
|
|||||||
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
|
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098",
|
"name": "RHSA-2018:2669",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20181127-0004/",
|
"name": "https://security.netapp.com/advisory/ntap-20181127-0004/",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
|
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2018:2669",
|
"name": "USN-3727-1",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "UBUNTU",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2669"
|
"url": "https://usn.ubuntu.com/3727-1/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:2927",
|
"name": "RHSA-2018:2927",
|
||||||
@ -78,9 +78,9 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-3727-1",
|
"name": "https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://usn.ubuntu.com/3727-1/"
|
"url": "https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2016-1185",
|
"ID": "CVE-2016-1185",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://support.cybozu.com/ja-jp/article/9479",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.cybozu.com/ja-jp/article/9479"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "JVN#89026267",
|
"name": "JVN#89026267",
|
||||||
"refsource": "JVN",
|
"refsource": "JVN",
|
||||||
"url": "http://jvn.jp/en/jp/JVN89026267/index.html"
|
"url": "http://jvn.jp/en/jp/JVN89026267/index.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "96842",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/96842"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "JVNDB-2016-000055",
|
"name": "JVNDB-2016-000055",
|
||||||
"refsource": "JVNDB",
|
"refsource": "JVNDB",
|
||||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000055"
|
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000055"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "96842",
|
"name": "https://support.cybozu.com/ja-jp/article/9479",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/96842"
|
"url": "https://support.cybozu.com/ja-jp/article/9479"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "44379",
|
"name": "[oss-security] 20160112 Re: CVE Request: Vtiger CRM 6.4 Authenticated Remote Code Execution",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "MLIST",
|
||||||
"url" : "https://www.exploit-db.com/exploits/44379/"
|
"url": "http://www.openwall.com/lists/oss-security/2016/01/12/7"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160112 CVE Request: Vtiger CRM 6.4 Authenticated Remote Code Execution",
|
"name": "[oss-security] 20160112 CVE Request: Vtiger CRM 6.4 Authenticated Remote Code Execution",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/01/12/4"
|
"url": "http://www.openwall.com/lists/oss-security/2016/01/12/4"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20160112 Re: CVE Request: Vtiger CRM 6.4 Authenticated Remote Code Execution",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2016/01/12/7"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://b.fl7.de/2016/01/vtiger-crm-6.4-auth-rce.html",
|
"name": "http://b.fl7.de/2016/01/vtiger-crm-6.4-auth-rce.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://b.fl7.de/2016/01/vtiger-crm-6.4-auth-rce.html"
|
"url": "http://b.fl7.de/2016/01/vtiger-crm-6.4-auth-rce.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "44379",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/44379/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2016-1792",
|
"ID": "CVE-2016-1792",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "39481",
|
"name": "1035095",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://www.exploit-db.com/exploits/39481/"
|
"url": "http://www.securitytracker.com/id/1035095"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20160222 BlackBerry Enterprise Service 12 Self-Service - SQLi and Reflected XSS",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://seclists.org/fulldisclosure/2016/Feb/95"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://security-assessment.com/files/documents/advisory/Blackberry%20BES12%20Self-Service%20Multiple%20Vulnerabilities.pdf",
|
"name": "http://security-assessment.com/files/documents/advisory/Blackberry%20BES12%20Self-Service%20Multiple%20Vulnerabilities.pdf",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://security-assessment.com/files/documents/advisory/Blackberry%20BES12%20Self-Service%20Multiple%20Vulnerabilities.pdf"
|
"url": "http://security-assessment.com/files/documents/advisory/Blackberry%20BES12%20Self-Service%20Multiple%20Vulnerabilities.pdf"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "39481",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/39481/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.blackberry.com/kb/articleDetail?articleNumber=000038033",
|
"name": "http://support.blackberry.com/kb/articleDetail?articleNumber=000038033",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.blackberry.com/kb/articleDetail?articleNumber=000038033"
|
"url": "http://support.blackberry.com/kb/articleDetail?articleNumber=000038033"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1035095",
|
"name": "20160222 BlackBerry Enterprise Service 12 Self-Service - SQLi and Reflected XSS",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "FULLDISC",
|
||||||
"url" : "http://www.securitytracker.com/id/1035095"
|
"url": "http://seclists.org/fulldisclosure/2016/Feb/95"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,50 +52,50 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://github.com/johndyer/mediaelement/blob/master/changelog.md",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/johndyer/mediaelement/blob/master/changelog.md"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160507 CVE Request: wordpress and mediaelement",
|
"name": "[oss-security] 20160507 CVE Request: wordpress and mediaelement",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/05/07/2"
|
"url": "http://www.openwall.com/lists/oss-security/2016/05/07/2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://wpvulndb.com/vulnerabilities/8488",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://wpvulndb.com/vulnerabilities/8488"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://codex.wordpress.org/Version_4.5.2",
|
"name": "https://codex.wordpress.org/Version_4.5.2",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://codex.wordpress.org/Version_4.5.2"
|
"url": "https://codex.wordpress.org/Version_4.5.2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://core.trac.wordpress.org/changeset/37371",
|
"name": "1035818",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://core.trac.wordpress.org/changeset/37371"
|
"url": "http://www.securitytracker.com/id/1035818"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/johndyer/mediaelement/blob/master/changelog.md",
|
"name": "https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url" : "https://github.com/johndyer/mediaelement/blob/master/changelog.md"
|
"url": "https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/johndyer/mediaelement/commit/34834eef8ac830b9145df169ec22016a4350f06e",
|
"name": "https://github.com/johndyer/mediaelement/commit/34834eef8ac830b9145df169ec22016a4350f06e",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/johndyer/mediaelement/commit/34834eef8ac830b9145df169ec22016a4350f06e"
|
"url": "https://github.com/johndyer/mediaelement/commit/34834eef8ac830b9145df169ec22016a4350f06e"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://wpvulndb.com/vulnerabilities/8488",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpvulndb.com/vulnerabilities/8488"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://wordpress.org/news/2016/05/wordpress-4-5-2/",
|
"name": "https://wordpress.org/news/2016/05/wordpress-4-5-2/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://wordpress.org/news/2016/05/wordpress-4-5-2/"
|
"url": "https://wordpress.org/news/2016/05/wordpress-4-5-2/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1035818",
|
"name": "https://core.trac.wordpress.org/changeset/37371",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1035818"
|
"url": "https://core.trac.wordpress.org/changeset/37371"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2016-4868",
|
"ID": "CVE-2016-4868",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,6 +57,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://support.cybozu.com/ja-jp/article/9433"
|
"url": "https://support.cybozu.com/ja-jp/article/9433"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "97713",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/97713"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "JVN#08736331",
|
"name": "JVN#08736331",
|
||||||
"refsource": "JVN",
|
"refsource": "JVN",
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "JVNDB-2016-000190",
|
"name": "JVNDB-2016-000190",
|
||||||
"refsource": "JVNDB",
|
"refsource": "JVNDB",
|
||||||
"url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000190.html"
|
"url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000190.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "97713",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/97713"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20160518 Re: CVE Request: null pointer deref in openslp, can be triggered remotely",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2016/05/18/6"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1329295",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1329295",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "1035916",
|
"name": "1035916",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1035916"
|
"url": "http://www.securitytracker.com/id/1035916"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20160518 Re: CVE Request: null pointer deref in openslp, can be triggered remotely",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2016/05/18/6"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,11 +53,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1309823",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1309823"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.mozilla.org/security/advisories/mfsa2016-87/",
|
"name": "https://www.mozilla.org/security/advisories/mfsa2016-87/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -72,6 +67,11 @@
|
|||||||
"name": "1037077",
|
"name": "1037077",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037077"
|
"url": "http://www.securitytracker.com/id/1037077"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1309823",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1309823"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user