- Synchronized data.

This commit is contained in:
CVE Team 2017-12-13 08:03:10 -05:00
parent f5dd473451
commit 829e98cfac
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56
202 changed files with 5416 additions and 208 deletions

View File

@ -79,6 +79,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3268"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "http://lists.opensuse.org/opensuse-updates/2017-01/msg00174.html"
},

View File

@ -85,6 +85,12 @@
{
"url" : "https://security.gentoo.org/glsa/201701-56"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html"
},

View File

@ -88,6 +88,12 @@
{
"url" : "https://security.gentoo.org/glsa/201701-56"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html"
},

View File

@ -85,6 +85,12 @@
{
"url" : "https://security.gentoo.org/glsa/201701-56"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html"
},

View File

@ -85,6 +85,12 @@
{
"url" : "https://security.gentoo.org/glsa/201701-56"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html"
},

View File

@ -66,6 +66,9 @@
{
"url" : "https://robotattack.org/"
},
{
"url" : "https://www.debian.org/security/2017/dsa-4057"
},
{
"url" : "https://www.kb.cert.org/vuls/id/144389"
}

View File

@ -66,6 +66,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101402"
},

View File

@ -59,6 +59,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101424"
},

View File

@ -59,6 +59,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101433"
},

View File

@ -66,6 +66,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101337"
},

View File

@ -73,6 +73,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101390"
},

View File

@ -89,6 +89,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101333"
},

View File

@ -66,6 +66,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101441"
},

View File

@ -66,6 +66,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101316"
},

View File

@ -98,6 +98,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101378"
},

View File

@ -66,6 +66,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101420"
},

View File

@ -59,6 +59,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101385"
},

View File

@ -98,6 +98,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101319"
},

View File

@ -66,6 +66,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101397"
},

View File

@ -74,6 +74,12 @@
{
"url" : "https://security.gentoo.org/glsa/201710-31"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101338"
},

View File

@ -66,6 +66,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101444"
},

View File

@ -98,6 +98,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101384"
},

View File

@ -59,6 +59,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101373"
},

View File

@ -59,6 +59,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101446"
},

View File

@ -59,6 +59,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101448"
},

View File

@ -66,6 +66,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101314"
},

View File

@ -59,6 +59,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101410"
},

View File

@ -98,6 +98,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101396"
},

View File

@ -98,6 +98,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101315"
},

View File

@ -98,6 +98,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101382"
},

View File

@ -98,6 +98,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101354"
},

View File

@ -98,6 +98,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101348"
},

View File

@ -94,6 +94,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "http://www.securityfocus.com/bid/101341"
},

View File

@ -98,6 +98,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101369"
},

View File

@ -98,6 +98,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101413"
},

View File

@ -98,6 +98,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101355"
},

View File

@ -59,6 +59,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101429"
},

View File

@ -73,6 +73,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101375"
},

View File

@ -73,6 +73,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101415"
},

View File

@ -65,6 +65,9 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"url" : "http://www.securityfocus.com/bid/101406"
},

View File

@ -98,6 +98,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3046"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3047"
},
{
"url" : "http://www.securityfocus.com/bid/101321"
},

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/aspb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11885"
},
{
"url" : "http://www.securityfocus.com/bid/102055"
},
{
"url" : "http://www.securitytracker.com/id/1039987"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11886"
},
{
"url" : "http://www.securityfocus.com/bid/102062"
},
{
"url" : "http://www.securitytracker.com/id/1039991"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11887"
},
{
"url" : "http://www.securityfocus.com/bid/102063"
},
{
"url" : "http://www.securitytracker.com/id/1039993"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11888"
},
{
"url" : "http://www.securityfocus.com/bid/102065"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11889"
},
{
"url" : "http://www.securityfocus.com/bid/102080"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11890"
},
{
"url" : "http://www.securityfocus.com/bid/102082"
},
{
"url" : "http://www.securitytracker.com/id/1039991"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11893"
},
{
"url" : "http://www.securityfocus.com/bid/102081"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
}
]
}

View File

@ -55,6 +55,15 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11894"
},
{
"url" : "http://www.securityfocus.com/bid/102053"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
},
{
"url" : "http://www.securitytracker.com/id/1039991"
}
]
}

View File

@ -55,6 +55,15 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11895"
},
{
"url" : "http://www.securityfocus.com/bid/102054"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
},
{
"url" : "http://www.securitytracker.com/id/1039991"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11899"
},
{
"url" : "http://www.securityfocus.com/bid/102077"
},
{
"url" : "http://www.securitytracker.com/id/1039992"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11901"
},
{
"url" : "http://www.securityfocus.com/bid/102046"
},
{
"url" : "http://www.securitytracker.com/id/1039991"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11903"
},
{
"url" : "http://www.securityfocus.com/bid/102047"
},
{
"url" : "http://www.securitytracker.com/id/1039991"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11905"
},
{
"url" : "http://www.securityfocus.com/bid/102050"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11906"
},
{
"url" : "http://www.securityfocus.com/bid/102078"
},
{
"url" : "http://www.securitytracker.com/id/1039993"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11907"
},
{
"url" : "http://www.securityfocus.com/bid/102045"
},
{
"url" : "http://www.securitytracker.com/id/1039991"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11908"
},
{
"url" : "http://www.securityfocus.com/bid/102052"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11909"
},
{
"url" : "http://www.securityfocus.com/bid/102085"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11910"
},
{
"url" : "http://www.securityfocus.com/bid/102086"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11911"
},
{
"url" : "http://www.securityfocus.com/bid/102087"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
}
]
}

View File

@ -55,6 +55,15 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11912"
},
{
"url" : "http://www.securityfocus.com/bid/102092"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
},
{
"url" : "http://www.securitytracker.com/id/1039991"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11913"
},
{
"url" : "http://www.securityfocus.com/bid/102091"
},
{
"url" : "http://www.securitytracker.com/id/1039991"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11914"
},
{
"url" : "http://www.securityfocus.com/bid/102088"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
}
]
}

View File

@ -55,6 +55,9 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11916"
},
{
"url" : "http://www.securityfocus.com/bid/102090"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11918"
},
{
"url" : "http://www.securityfocus.com/bid/102089"
},
{
"url" : "http://www.securitytracker.com/id/1039990"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11919"
},
{
"url" : "http://www.securityfocus.com/bid/102093"
},
{
"url" : "http://www.securitytracker.com/id/1039993"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11927"
},
{
"url" : "http://www.securityfocus.com/bid/102095"
},
{
"url" : "http://www.securitytracker.com/id/1039997"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11930"
},
{
"url" : "http://www.securityfocus.com/bid/102058"
},
{
"url" : "http://www.securitytracker.com/id/1039991"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11932"
},
{
"url" : "http://www.securityfocus.com/bid/102060"
},
{
"url" : "http://www.securitytracker.com/id/1039996"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11934"
},
{
"url" : "http://www.securityfocus.com/bid/102064"
},
{
"url" : "http://www.securitytracker.com/id/1039998"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11935"
},
{
"url" : "http://www.securityfocus.com/bid/102067"
},
{
"url" : "http://www.securitytracker.com/id/1039989"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11936"
},
{
"url" : "http://www.securityfocus.com/bid/102068"
},
{
"url" : "http://www.securitytracker.com/id/1039995"
}
]
}

View File

@ -55,6 +55,12 @@
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11939"
},
{
"url" : "http://www.securityfocus.com/bid/102105"
},
{
"url" : "http://www.securitytracker.com/id/1039994"
}
]
}

View File

@ -88,6 +88,12 @@
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3244"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3451"
},
{
"url" : "https://access.redhat.com/errata/RHSA-2017:3452"
},
{
"url" : "http://www.securityfocus.com/bid/101261"
}

View File

@ -55,6 +55,9 @@
"reference_data" : [
{
"url" : "https://support.kaspersky.com/vulnerability.aspx?el=12430#091017"
},
{
"url" : "http://www.securityfocus.com/bid/102141"
}
]
}

View File

@ -1,84 +1,87 @@
{
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"DATE_PUBLIC": "2017-12-12T00:00:00.000Z",
"ID": "CVE-2017-13098",
"STATE": "PUBLIC",
"TITLE": "BouncyCastle JCE TLS Bleichenbacher/ROBOT"
"CVE_data_meta" : {
"ASSIGNER" : "cert@cert.org",
"DATE_PUBLIC" : "2017-12-12T00:00:00.000Z",
"ID" : "CVE-2017-13098",
"STATE" : "PUBLIC",
"TITLE" : "BouncyCastle JCE TLS Bleichenbacher/ROBOT"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "BouncyCastle TLS",
"version": {
"version_data": [
"product_name" : "BouncyCastle TLS",
"version" : {
"version_data" : [
{
"platform": "all",
"version_value": "<1.0.3"
"platform" : "all",
"version_value" : "<1.0.3"
}
]
}
}
]
},
"vendor_name": "Legion of the Bouncy Castle"
"vendor_name" : "Legion of the Bouncy Castle"
}
]
}
},
"credit": [
"credit" : [
""
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as \"ROBOT.\""
"lang" : "eng",
"value" : "BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as \"ROBOT.\""
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
"impact" : {
"cvss" : {
"attackComplexity" : "LOW",
"attackVector" : "NETWORK",
"availabilityImpact" : "NONE",
"baseScore" : 7.5,
"baseSeverity" : "HIGH",
"confidentialityImpact" : "HIGH",
"integrityImpact" : "NONE",
"privilegesRequired" : "NONE",
"scope" : "UNCHANGED",
"userInteraction" : "NONE",
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "CWE-203"
"lang" : "eng",
"value" : "CWE-203"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"url": "https://github.com/bcgit/bc-java/commit/a00b684465b38d722ca9a3543b8af8568e6bad5c"
"url" : "https://robotattack.org/"
},
{
"url": "http://www.kb.cert.org/vuls/id/144389"
"url" : "https://github.com/bcgit/bc-java/commit/a00b684465b38d722ca9a3543b8af8568e6bad5c"
},
{
"url" : "http://www.kb.cert.org/vuls/id/144389"
}
]
}

View File

@ -1,84 +1,87 @@
{
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"DATE_PUBLIC": "2017-12-12",
"ID": "CVE-2017-13099",
"STATE": "PUBLIC",
"TITLE": "wolfSSL Bleichenbacher/ROBOT"
"CVE_data_meta" : {
"ASSIGNER" : "cert@cert.org",
"DATE_PUBLIC" : "2017-12-12",
"ID" : "CVE-2017-13099",
"STATE" : "PUBLIC",
"TITLE" : "wolfSSL Bleichenbacher/ROBOT"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "wolfSSL",
"version": {
"version_data": [
"product_name" : "wolfSSL",
"version" : {
"version_data" : [
{
"platform": "all",
"version_value": "<3.12.2"
"platform" : "all",
"version_value" : "<3.12.2"
}
]
}
}
]
},
"vendor_name": "wolfSSL"
"vendor_name" : "wolfSSL"
}
]
}
},
"credit": [
"credit" : [
""
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as \"ROBOT.\""
"lang" : "eng",
"value" : "wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as \"ROBOT.\""
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
"impact" : {
"cvss" : {
"attackComplexity" : "LOW",
"attackVector" : "NETWORK",
"availabilityImpact" : "NONE",
"baseScore" : 7.5,
"baseSeverity" : "HIGH",
"confidentialityImpact" : "HIGH",
"integrityImpact" : "NONE",
"privilegesRequired" : "NONE",
"scope" : "UNCHANGED",
"userInteraction" : "NONE",
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "CWE-203"
"lang" : "eng",
"value" : "CWE-203"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"url": "https://github.com/wolfSSL/wolfssl/pull/1229"
"url" : "https://robotattack.org/"
},
{
"url": "http://www.kb.cert.org/vuls/id/144389"
"url" : "https://github.com/wolfSSL/wolfssl/pull/1229"
},
{
"url" : "http://www.kb.cert.org/vuls/id/144389"
}
]
}

View File

@ -1,82 +1,82 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2017-11-17T22:00:00.000Z",
"ID": "CVE-2017-14361",
"STATE": "PUBLIC",
"TITLE": "MFSBGN03793 rev.1 - Project and Portfolio Management Center, Multiple vulnerabilities"
"CVE_data_meta" : {
"ASSIGNER" : "security@suse.com",
"DATE_PUBLIC" : "2017-11-17T22:00:00.000Z",
"ID" : "CVE-2017-14361",
"STATE" : "PUBLIC",
"TITLE" : "MFSBGN03793 rev.1 - Project and Portfolio Management Center, Multiple vulnerabilities"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "Project and Portfolio Management Center",
"version": {
"version_data": [
"product_name" : "Project and Portfolio Management Center",
"version" : {
"version_data" : [
{
"version_value": "9.32"
"version_value" : "9.32"
}
]
}
}
]
},
"vendor_name": "Micro Focus"
"vendor_name" : "Micro Focus"
}
]
}
},
"credit": [
"credit" : [
"Micro Focus would like to thank Xiaoran Wang for reporting this issue to security-alert@hpe.com"
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "Man-In-The-Middle vulnerability in Micro Focus Project and Portfolio Management Center, version 9.32. This vulnerability could be exploited to allow a Man-in-the-middle attack."
"lang" : "eng",
"value" : "Man-In-The-Middle vulnerability in Micro Focus Project and Portfolio Management Center, version 9.32. This vulnerability could be exploited to allow a Man-in-the-middle attack."
}
]
},
"exploit": "Man-In-The-Middle attack (MitM)",
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
"exploit" : "Man-In-The-Middle attack (MitM)",
"impact" : {
"cvss" : {
"attackComplexity" : "HIGH",
"attackVector" : "NETWORK",
"availabilityImpact" : "NONE",
"baseScore" : 7.4,
"baseSeverity" : "HIGH",
"confidentialityImpact" : "HIGH",
"integrityImpact" : "HIGH",
"privilegesRequired" : "NONE",
"scope" : "UNCHANGED",
"userInteraction" : "NONE",
"vectorString" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "Man-In-The-Middle attack (MitM)"
"lang" : "eng",
"value" : "Man-In-The-Middle attack (MitM)"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03014426"
"url" : "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03014426"
}
]
}
}
}

View File

@ -1,82 +1,82 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2017-11-17T22:00:00.000Z",
"ID": "CVE-2017-14362",
"STATE": "PUBLIC",
"TITLE": "MFSBGN03793 rev.1 - Project and Portfolio Management Center, Multiple vulnerabilities"
"CVE_data_meta" : {
"ASSIGNER" : "security@suse.com",
"DATE_PUBLIC" : "2017-11-17T22:00:00.000Z",
"ID" : "CVE-2017-14362",
"STATE" : "PUBLIC",
"TITLE" : "MFSBGN03793 rev.1 - Project and Portfolio Management Center, Multiple vulnerabilities"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "Project and Portfolio Management Center",
"version": {
"version_data": [
"product_name" : "Project and Portfolio Management Center",
"version" : {
"version_data" : [
{
"version_value": "9.32"
"version_value" : "9.32"
}
]
}
}
]
},
"vendor_name": "Micro Focus"
"vendor_name" : "Micro Focus"
}
]
}
},
"credit": [
"credit" : [
"Micro Focus would like to thank Xiaoran Wang for reporting this issue to security-alert@hpe.com"
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "Cross-Site Request Forgery vulnerability in Micro Focus Project and Portfolio Management Center, version 9.32. This vulnerability could be exploited to allow a Cross-Site Forgery attack."
"lang" : "eng",
"value" : "Cross-Site Request Forgery vulnerability in Micro Focus Project and Portfolio Management Center, version 9.32. This vulnerability could be exploited to allow a Cross-Site Forgery attack."
}
]
},
"exploit": "Cross-Site Request Forgery (CSRF)",
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
"exploit" : "Cross-Site Request Forgery (CSRF)",
"impact" : {
"cvss" : {
"attackComplexity" : "LOW",
"attackVector" : "NETWORK",
"availabilityImpact" : "LOW",
"baseScore" : 7.3,
"baseSeverity" : "HIGH",
"confidentialityImpact" : "LOW",
"integrityImpact" : "LOW",
"privilegesRequired" : "NONE",
"scope" : "UNCHANGED",
"userInteraction" : "NONE",
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "Cross-Site Request Forgery (CSRF)"
"lang" : "eng",
"value" : "Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03014426"
"url" : "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03014426"
}
]
}
}
}

View File

@ -70,6 +70,9 @@
"reference_data" : [
{
"url" : "https://lists.apache.org/thread.html/77f2accf240d25d91b47033e2f8ebec84ffbc6e6627112b2f98b66c9@%3Cdev.synapse.apache.org%3E"
},
{
"url" : "http://www.securityfocus.com/bid/102154"
}
]
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

View File

@ -55,6 +55,9 @@
{
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
},
{
"url" : "http://www.securityfocus.com/bid/102140"
},
{
"url" : "http://www.securitytracker.com/id/1039791"
}

Some files were not shown because too many files have changed in this diff Show More