mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 11:06:39 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5b84967f91
commit
c9ee1affdc
@ -52,11 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:1912",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#718152",
|
"name": "VU#718152",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "https://www.kb.cert.org/vuls/id/718152"
|
"url": "https://www.kb.cert.org/vuls/id/718152"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"name": "USN-2783-1",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2783-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:1247",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "77284",
|
"name": "77284",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -77,11 +92,21 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit"
|
"url": "http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:1311",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.cs.bu.edu/~goldbe/NTPattack.html",
|
"name": "https://www.cs.bu.edu/~goldbe/NTPattack.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://www.cs.bu.edu/~goldbe/NTPattack.html"
|
"url": "https://www.cs.bu.edu/~goldbe/NTPattack.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:2094",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://eprint.iacr.org/2015/1020.pdf",
|
"name": "https://eprint.iacr.org/2015/1020.pdf",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -102,6 +127,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.ntp.org/bin/view/Main/NtpBug2901"
|
"url": "http://support.ntp.org/bin/view/Main/NtpBug2901"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "openSUSE-SU-2016:1423",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201607-15",
|
"name": "GLSA-201607-15",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
@ -112,6 +142,71 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20171004-0001/"
|
"url": "https://security.netapp.com/advisory/ntap-20171004-0001/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "openSUSE-SU-2016:1329",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"name": "20151021 Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-ntp"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:1471",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://bto.bluecoat.com/security-advisory/sa103",
|
||||||
|
"url": "https://bto.bluecoat.com/security-advisory/sa103"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:1291",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:1568",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "openSUSE-SU-2015:2016",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:1278",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20151029 [slackware-security] ntp (SSA:2015-302-03)",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/536796/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20151029 [slackware-security] ntp (SSA:2015-302-03)",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/archive/1/536796/100/100/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20151022 Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/536737/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20151022 Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/archive/1/536737/100/100/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf",
|
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf",
|
||||||
@ -126,6 +221,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
|
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
|
||||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11",
|
||||||
|
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,21 +57,51 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.ntp.org/bin/view/Main/NtpBug2920"
|
"url": "http://support.ntp.org/bin/view/Main/NtpBug2920"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:1912",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"name": "USN-2783-1",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2783-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:1247",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1033951",
|
"name": "1033951",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1033951"
|
"url": "http://www.securitytracker.com/id/1033951"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:1311",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1274262",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1274262",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1274262"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1274262"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:2094",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "77273",
|
"name": "77273",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/77273"
|
"url": "http://www.securityfocus.com/bid/77273"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "openSUSE-SU-2016:1423",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201607-15",
|
"name": "GLSA-201607-15",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
@ -82,10 +112,85 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20171004-0001/"
|
"url": "https://security.netapp.com/advisory/ntap-20171004-0001/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/134082/FreeBSD-Security-Advisory-ntp-Authentication-Bypass.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/134082/FreeBSD-Security-Advisory-ntp-Authentication-Bypass.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"name": "20151021 Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-ntp"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://bto.bluecoat.com/security-advisory/sa103",
|
||||||
|
"url": "https://bto.bluecoat.com/security-advisory/sa103"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20151104 FreeBSD Security Advisory FreeBSD-SA-15:25.ntp [REVISED]",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/536833/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://www.talosintel.com/vulnerability-reports/",
|
||||||
|
"url": "http://www.talosintel.com/vulnerability-reports/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "openSUSE-SU-2015:2016",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20151104 FreeBSD Security Advisory FreeBSD-SA-15:25.ntp [REVISED]",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/archive/1/536833/100/100/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20151026 FreeBSD Security Advisory FreeBSD-SA-15:25.ntp",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/536760/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20151026 FreeBSD Security Advisory FreeBSD-SA-15:25.ntp",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/archive/1/536760/100/100/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20151029 [slackware-security] ntp (SSA:2015-302-03)",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/536796/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20151029 [slackware-security] ntp (SSA:2015-302-03)",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/archive/1/536796/100/100/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20151022 Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/536737/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20151022 Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/archive/1/536737/100/100/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
|
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
|
||||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11",
|
||||||
|
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -72,6 +72,11 @@
|
|||||||
"refsource": "FREEBSD",
|
"refsource": "FREEBSD",
|
||||||
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc"
|
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:1912",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us",
|
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -97,6 +102,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:2094",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#321640",
|
"name": "VU#321640",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
@ -127,6 +137,61 @@
|
|||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201607-15"
|
"url": "https://security.gentoo.org/glsa/201607-15"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"name": "20160603 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: June 2016",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160603-ntpd"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/540683/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "SUSE-SU-2016:1568",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20160604 [slackware-security] ntp (SSA:2016-155-01)",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/538599/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/archive/1/540683/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/538600/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"name": "VU#321640",
|
||||||
|
"url": "https://www.kb.cert.org/vuls/id/321640"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20160604 [slackware-security] ntp (SSA:2016-155-01)",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/archive/1/538599/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/archive/1/538600/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf",
|
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf",
|
||||||
@ -141,6 +206,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
|
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
|
||||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11",
|
||||||
|
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -107,10 +107,75 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.ntp.org/bin/view/Main/NtpBug3067"
|
"url": "http://support.ntp.org/bin/view/Main/NtpBug3067"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20170310 [security bulletin] HPESBUX03706 rev.1 - HP-UX NTP service running ntpd, Multiple Vulnerabilities",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/540254/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20170310 [security bulletin] HPESBUX03706 rev.1 - HP-UX NTP service running ntpd, Multiple Vulnerabilities",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/archive/1/540254/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "openSUSE-SU-2016:3280",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"name": "USN-3349-1",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-3349-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"name": "FEDORA-2016-e8a8561ee7",
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PABKEYX6ABBFJZGMXKH57X756EJUDS3C/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"name": "FEDORA-2016-7209ab4e02",
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5E3XBBCK5IXOLDAH2E4M3QKIYIHUMMP/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-ntpd-en",
|
||||||
|
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-ntpd-en"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"name": "FEDORA-2016-c198d15316",
|
||||||
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ILMSYVQMMF37MANYEO7KBHOPSC74EKGN/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-227/",
|
||||||
|
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-227/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20161222 FreeBSD Security Advisory FreeBSD-SA-16:39.ntp",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/539955/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-227",
|
||||||
|
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-227"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20161222 FreeBSD Security Advisory FreeBSD-SA-16:39.ntp",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/archive/1/539955/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
|
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
|
||||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11",
|
||||||
|
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -97,6 +97,11 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"name": "[jackrabbit-dev] 20210716 [GitHub] [jackrabbit-oak] nit0906 opened a new pull request #326: OAK-9496 | Update zookeeper version to handle CVE-2018-8012",
|
"name": "[jackrabbit-dev] 20210716 [GitHub] [jackrabbit-oak] nit0906 opened a new pull request #326: OAK-9496 | Update zookeeper version to handle CVE-2018-8012",
|
||||||
"url": "https://lists.apache.org/thread.html/r8f0d920805af93033c488af89104e2d682662bacfb8406db865d5e14@%3Cdev.jackrabbit.apache.org%3E"
|
"url": "https://lists.apache.org/thread.html/r8f0d920805af93033c488af89104e2d682662bacfb8406db865d5e14@%3Cdev.jackrabbit.apache.org%3E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"name": "[jackrabbit-dev] 20210716 [GitHub] [jackrabbit-oak] nit0906 commented on pull request #326: OAK-9496 | Update zookeeper version to handle CVE-2018-8012",
|
||||||
|
"url": "https://lists.apache.org/thread.html/rc5bc4ddb0deabf8cfb69378cecee56fcdc76929bea9e6373cb863870@%3Cdev.jackrabbit.apache.org%3E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -156,6 +156,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"name": "https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS",
|
"name": "https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS",
|
||||||
"url": "https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS"
|
"url": "https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"name": "[flink-user] 20210716 Flink 1.13.1 - Vulnerabilities CVE-2019-12900 for librocksdbjni",
|
||||||
|
"url": "https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -36,7 +36,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "\r A vulnerability in the software cryptography module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker or an unauthenticated attacker in a man-in-the-middle position to cause an unexpected reload of the device that results in a denial of service (DoS) condition.\r The vulnerability is due to a logic error in how the software cryptography module handles specific types of decryption errors. An attacker could exploit this vulnerability by sending malicious packets over an established IPsec connection. A successful exploit could cause the device to crash, forcing it to reload. Important: Successful exploitation of this vulnerability would not cause a compromise of any encrypted data.\r Note: This vulnerability affects only Cisco ASA Software Release 9.16.1 and Cisco FTD Software Release 7.0.0.\r "
|
"value": "A vulnerability in the software cryptography module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker or an unauthenticated attacker in a man-in-the-middle position to cause an unexpected reload of the device that results in a denial of service (DoS) condition. The vulnerability is due to a logic error in how the software cryptography module handles specific types of decryption errors. An attacker could exploit this vulnerability by sending malicious packets over an established IPsec connection. A successful exploit could cause the device to crash, forcing it to reload. Important: Successful exploitation of this vulnerability would not cause a compromise of any encrypted data. Note: This vulnerability affects only Cisco ASA Software Release 9.16.1 and Cisco FTD Software Release 7.0.0."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -83,4 +83,4 @@
|
|||||||
],
|
],
|
||||||
"discovery": "INTERNAL"
|
"discovery": "INTERNAL"
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,17 +1,71 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2021-28114",
|
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "RESERVED"
|
"ID": "CVE-2021-28114",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_version": "4.0",
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "Froala WYSIWYG Editor 3.2.6-1 is affected by XSS due to a namespace confusion during parsing."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://labs.bishopfox.com/advisories",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://labs.bishopfox.com/advisories"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://froala.com/wysiwyg-editor/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://froala.com/wysiwyg-editor/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://labs.bishopfox.com/advisories/froala-editor-v3.2.6",
|
||||||
|
"url": "https://labs.bishopfox.com/advisories/froala-editor-v3.2.6"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user