mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 14:08:13 +00:00
- Synchronized data.
This commit is contained in:
parent
f5dd473451
commit
829e98cfac
@ -79,6 +79,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3268"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2017-01/msg00174.html"
|
||||
},
|
||||
|
@ -85,6 +85,12 @@
|
||||
{
|
||||
"url" : "https://security.gentoo.org/glsa/201701-56"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html"
|
||||
},
|
||||
|
@ -88,6 +88,12 @@
|
||||
{
|
||||
"url" : "https://security.gentoo.org/glsa/201701-56"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html"
|
||||
},
|
||||
|
@ -85,6 +85,12 @@
|
||||
{
|
||||
"url" : "https://security.gentoo.org/glsa/201701-56"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html"
|
||||
},
|
||||
|
@ -85,6 +85,12 @@
|
||||
{
|
||||
"url" : "https://security.gentoo.org/glsa/201701-56"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html"
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
{
|
||||
"url" : "https://robotattack.org/"
|
||||
},
|
||||
{
|
||||
"url" : "https://www.debian.org/security/2017/dsa-4057"
|
||||
},
|
||||
{
|
||||
"url" : "https://www.kb.cert.org/vuls/id/144389"
|
||||
}
|
||||
|
@ -66,6 +66,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101402"
|
||||
},
|
||||
|
@ -59,6 +59,9 @@
|
||||
{
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101424"
|
||||
},
|
||||
|
@ -59,6 +59,9 @@
|
||||
{
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101433"
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101337"
|
||||
},
|
||||
|
@ -73,6 +73,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101390"
|
||||
},
|
||||
|
@ -89,6 +89,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101333"
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101441"
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101316"
|
||||
},
|
||||
|
@ -98,6 +98,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101378"
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101420"
|
||||
},
|
||||
|
@ -59,6 +59,9 @@
|
||||
{
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101385"
|
||||
},
|
||||
|
@ -98,6 +98,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101319"
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101397"
|
||||
},
|
||||
|
@ -74,6 +74,12 @@
|
||||
{
|
||||
"url" : "https://security.gentoo.org/glsa/201710-31"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101338"
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101444"
|
||||
},
|
||||
|
@ -98,6 +98,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101384"
|
||||
},
|
||||
|
@ -59,6 +59,9 @@
|
||||
{
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101373"
|
||||
},
|
||||
|
@ -59,6 +59,9 @@
|
||||
{
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101446"
|
||||
},
|
||||
|
@ -59,6 +59,9 @@
|
||||
{
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101448"
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101314"
|
||||
},
|
||||
|
@ -59,6 +59,9 @@
|
||||
{
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101410"
|
||||
},
|
||||
|
@ -98,6 +98,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101396"
|
||||
},
|
||||
|
@ -98,6 +98,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101315"
|
||||
},
|
||||
|
@ -98,6 +98,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101382"
|
||||
},
|
||||
|
@ -98,6 +98,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101354"
|
||||
},
|
||||
|
@ -98,6 +98,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101348"
|
||||
},
|
||||
|
@ -94,6 +94,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101341"
|
||||
},
|
||||
|
@ -98,6 +98,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101369"
|
||||
},
|
||||
|
@ -98,6 +98,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101413"
|
||||
},
|
||||
|
@ -98,6 +98,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101355"
|
||||
},
|
||||
|
@ -59,6 +59,9 @@
|
||||
{
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101429"
|
||||
},
|
||||
|
@ -73,6 +73,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101375"
|
||||
},
|
||||
|
@ -73,6 +73,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101415"
|
||||
},
|
||||
|
@ -65,6 +65,9 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101406"
|
||||
},
|
||||
|
@ -98,6 +98,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101321"
|
||||
},
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/aspb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11885"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102055"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039987"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11886"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102062"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039991"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11887"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102063"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039993"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11888"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102065"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11889"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102080"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11890"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102082"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039991"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11893"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102081"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,15 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11894"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102053"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039991"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,15 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11895"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102054"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039991"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11899"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102077"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039992"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11901"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102046"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039991"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11903"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102047"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039991"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11905"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102050"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11906"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102078"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039993"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11907"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102045"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039991"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11908"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102052"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11909"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102085"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11910"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102086"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11911"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102087"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,15 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11912"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102092"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039991"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11913"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102091"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039991"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11914"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102088"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11916"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102090"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11918"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102089"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11919"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102093"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039993"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11927"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102095"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039997"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11930"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102058"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039991"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11932"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102060"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039996"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11934"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102064"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039998"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11935"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102067"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039989"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11936"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102068"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039995"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11939"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102105"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039994"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -88,6 +88,12 @@
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3244"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3451"
|
||||
},
|
||||
{
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3452"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/101261"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://support.kaspersky.com/vulnerability.aspx?el=12430#091017"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102141"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,84 +1,87 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"DATE_PUBLIC": "2017-12-12T00:00:00.000Z",
|
||||
"ID": "CVE-2017-13098",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "BouncyCastle JCE TLS Bleichenbacher/ROBOT"
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cert@cert.org",
|
||||
"DATE_PUBLIC" : "2017-12-12T00:00:00.000Z",
|
||||
"ID" : "CVE-2017-13098",
|
||||
"STATE" : "PUBLIC",
|
||||
"TITLE" : "BouncyCastle JCE TLS Bleichenbacher/ROBOT"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name": "BouncyCastle TLS",
|
||||
"version": {
|
||||
"version_data": [
|
||||
"product_name" : "BouncyCastle TLS",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"platform": "all",
|
||||
"version_value": "<1.0.3"
|
||||
"platform" : "all",
|
||||
"version_value" : "<1.0.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Legion of the Bouncy Castle"
|
||||
"vendor_name" : "Legion of the Bouncy Castle"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"credit": [
|
||||
"credit" : [
|
||||
""
|
||||
],
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as \"ROBOT.\""
|
||||
"lang" : "eng",
|
||||
"value" : "BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as \"ROBOT.\""
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"version": "3.0"
|
||||
"impact" : {
|
||||
"cvss" : {
|
||||
"attackComplexity" : "LOW",
|
||||
"attackVector" : "NETWORK",
|
||||
"availabilityImpact" : "NONE",
|
||||
"baseScore" : 7.5,
|
||||
"baseSeverity" : "HIGH",
|
||||
"confidentialityImpact" : "HIGH",
|
||||
"integrityImpact" : "NONE",
|
||||
"privilegesRequired" : "NONE",
|
||||
"scope" : "UNCHANGED",
|
||||
"userInteraction" : "NONE",
|
||||
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"version" : "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description": [
|
||||
"description" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-203"
|
||||
"lang" : "eng",
|
||||
"value" : "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url": "https://github.com/bcgit/bc-java/commit/a00b684465b38d722ca9a3543b8af8568e6bad5c"
|
||||
"url" : "https://robotattack.org/"
|
||||
},
|
||||
{
|
||||
"url": "http://www.kb.cert.org/vuls/id/144389"
|
||||
"url" : "https://github.com/bcgit/bc-java/commit/a00b684465b38d722ca9a3543b8af8568e6bad5c"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.kb.cert.org/vuls/id/144389"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,84 +1,87 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"DATE_PUBLIC": "2017-12-12",
|
||||
"ID": "CVE-2017-13099",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "wolfSSL Bleichenbacher/ROBOT"
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cert@cert.org",
|
||||
"DATE_PUBLIC" : "2017-12-12",
|
||||
"ID" : "CVE-2017-13099",
|
||||
"STATE" : "PUBLIC",
|
||||
"TITLE" : "wolfSSL Bleichenbacher/ROBOT"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name": "wolfSSL",
|
||||
"version": {
|
||||
"version_data": [
|
||||
"product_name" : "wolfSSL",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"platform": "all",
|
||||
"version_value": "<3.12.2"
|
||||
"platform" : "all",
|
||||
"version_value" : "<3.12.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "wolfSSL"
|
||||
"vendor_name" : "wolfSSL"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"credit": [
|
||||
"credit" : [
|
||||
""
|
||||
],
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as \"ROBOT.\""
|
||||
"lang" : "eng",
|
||||
"value" : "wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as \"ROBOT.\""
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"version": "3.0"
|
||||
"impact" : {
|
||||
"cvss" : {
|
||||
"attackComplexity" : "LOW",
|
||||
"attackVector" : "NETWORK",
|
||||
"availabilityImpact" : "NONE",
|
||||
"baseScore" : 7.5,
|
||||
"baseSeverity" : "HIGH",
|
||||
"confidentialityImpact" : "HIGH",
|
||||
"integrityImpact" : "NONE",
|
||||
"privilegesRequired" : "NONE",
|
||||
"scope" : "UNCHANGED",
|
||||
"userInteraction" : "NONE",
|
||||
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"version" : "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description": [
|
||||
"description" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-203"
|
||||
"lang" : "eng",
|
||||
"value" : "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url": "https://github.com/wolfSSL/wolfssl/pull/1229"
|
||||
"url" : "https://robotattack.org/"
|
||||
},
|
||||
{
|
||||
"url": "http://www.kb.cert.org/vuls/id/144389"
|
||||
"url" : "https://github.com/wolfSSL/wolfssl/pull/1229"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.kb.cert.org/vuls/id/144389"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,82 +1,82 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@microfocus.com",
|
||||
"DATE_PUBLIC": "2017-11-17T22:00:00.000Z",
|
||||
"ID": "CVE-2017-14361",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "MFSBGN03793 rev.1 - Project and Portfolio Management Center, Multiple vulnerabilities"
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "security@suse.com",
|
||||
"DATE_PUBLIC" : "2017-11-17T22:00:00.000Z",
|
||||
"ID" : "CVE-2017-14361",
|
||||
"STATE" : "PUBLIC",
|
||||
"TITLE" : "MFSBGN03793 rev.1 - Project and Portfolio Management Center, Multiple vulnerabilities"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name": "Project and Portfolio Management Center",
|
||||
"version": {
|
||||
"version_data": [
|
||||
"product_name" : "Project and Portfolio Management Center",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value": "9.32"
|
||||
"version_value" : "9.32"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Micro Focus"
|
||||
"vendor_name" : "Micro Focus"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"credit": [
|
||||
"credit" : [
|
||||
"Micro Focus would like to thank Xiaoran Wang for reporting this issue to security-alert@hpe.com"
|
||||
],
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Man-In-The-Middle vulnerability in Micro Focus Project and Portfolio Management Center, version 9.32. This vulnerability could be exploited to allow a Man-in-the-middle attack."
|
||||
"lang" : "eng",
|
||||
"value" : "Man-In-The-Middle vulnerability in Micro Focus Project and Portfolio Management Center, version 9.32. This vulnerability could be exploited to allow a Man-in-the-middle attack."
|
||||
}
|
||||
]
|
||||
},
|
||||
"exploit": "Man-In-The-Middle attack (MitM)",
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"attackComplexity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"version": "3.0"
|
||||
"exploit" : "Man-In-The-Middle attack (MitM)",
|
||||
"impact" : {
|
||||
"cvss" : {
|
||||
"attackComplexity" : "HIGH",
|
||||
"attackVector" : "NETWORK",
|
||||
"availabilityImpact" : "NONE",
|
||||
"baseScore" : 7.4,
|
||||
"baseSeverity" : "HIGH",
|
||||
"confidentialityImpact" : "HIGH",
|
||||
"integrityImpact" : "HIGH",
|
||||
"privilegesRequired" : "NONE",
|
||||
"scope" : "UNCHANGED",
|
||||
"userInteraction" : "NONE",
|
||||
"vectorString" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"version" : "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description": [
|
||||
"description" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Man-In-The-Middle attack (MitM)"
|
||||
"lang" : "eng",
|
||||
"value" : "Man-In-The-Middle attack (MitM)"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03014426"
|
||||
"url" : "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03014426"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -1,82 +1,82 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@microfocus.com",
|
||||
"DATE_PUBLIC": "2017-11-17T22:00:00.000Z",
|
||||
"ID": "CVE-2017-14362",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "MFSBGN03793 rev.1 - Project and Portfolio Management Center, Multiple vulnerabilities"
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "security@suse.com",
|
||||
"DATE_PUBLIC" : "2017-11-17T22:00:00.000Z",
|
||||
"ID" : "CVE-2017-14362",
|
||||
"STATE" : "PUBLIC",
|
||||
"TITLE" : "MFSBGN03793 rev.1 - Project and Portfolio Management Center, Multiple vulnerabilities"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name": "Project and Portfolio Management Center",
|
||||
"version": {
|
||||
"version_data": [
|
||||
"product_name" : "Project and Portfolio Management Center",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value": "9.32"
|
||||
"version_value" : "9.32"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Micro Focus"
|
||||
"vendor_name" : "Micro Focus"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"credit": [
|
||||
"credit" : [
|
||||
"Micro Focus would like to thank Xiaoran Wang for reporting this issue to security-alert@hpe.com"
|
||||
],
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Cross-Site Request Forgery vulnerability in Micro Focus Project and Portfolio Management Center, version 9.32. This vulnerability could be exploited to allow a Cross-Site Forgery attack."
|
||||
"lang" : "eng",
|
||||
"value" : "Cross-Site Request Forgery vulnerability in Micro Focus Project and Portfolio Management Center, version 9.32. This vulnerability could be exploited to allow a Cross-Site Forgery attack."
|
||||
}
|
||||
]
|
||||
},
|
||||
"exploit": "Cross-Site Request Forgery (CSRF)",
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"version": "3.0"
|
||||
"exploit" : "Cross-Site Request Forgery (CSRF)",
|
||||
"impact" : {
|
||||
"cvss" : {
|
||||
"attackComplexity" : "LOW",
|
||||
"attackVector" : "NETWORK",
|
||||
"availabilityImpact" : "LOW",
|
||||
"baseScore" : 7.3,
|
||||
"baseSeverity" : "HIGH",
|
||||
"confidentialityImpact" : "LOW",
|
||||
"integrityImpact" : "LOW",
|
||||
"privilegesRequired" : "NONE",
|
||||
"scope" : "UNCHANGED",
|
||||
"userInteraction" : "NONE",
|
||||
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"version" : "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description": [
|
||||
"description" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Cross-Site Request Forgery (CSRF)"
|
||||
"lang" : "eng",
|
||||
"value" : "Cross-Site Request Forgery (CSRF)"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03014426"
|
||||
"url" : "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03014426"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -70,6 +70,9 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://lists.apache.org/thread.html/77f2accf240d25d91b47033e2f8ebec84ffbc6e6627112b2f98b66c9@%3Cdev.synapse.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102154"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
@ -55,6 +55,9 @@
|
||||
{
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102140"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user