mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
dd45627e10
commit
fc6fdd6bd4
@ -54,13 +54,13 @@
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "19991125 Oracle Web Listener",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=94359982417686&w=2"
|
||||
"refsource": "NTBUGTRAQ",
|
||||
"url": "http://marc.info/?l=ntbugtraq&m=94390053530890&w=2"
|
||||
},
|
||||
{
|
||||
"name": "19991125 Oracle Web Listener",
|
||||
"refsource" : "NTBUGTRAQ",
|
||||
"url" : "http://marc.info/?l=ntbugtraq&m=94390053530890&w=2"
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=94359982417686&w=2"
|
||||
},
|
||||
{
|
||||
"name": "841",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS99-060",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-060"
|
||||
},
|
||||
{
|
||||
"name": "Q249082",
|
||||
"refsource": "MSKB",
|
||||
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q249082"
|
||||
},
|
||||
{
|
||||
"name": "MS99-060",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-060"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "Q247869",
|
||||
"refsource": "MSKB",
|
||||
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q247869"
|
||||
},
|
||||
{
|
||||
"name": "934",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/934"
|
||||
},
|
||||
{
|
||||
"name": "20000113 Local Promotion Vulnerability in Windows NT 4",
|
||||
"refsource": "BINDVIEW",
|
||||
@ -62,20 +72,10 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-003"
|
||||
},
|
||||
{
|
||||
"name" : "Q247869",
|
||||
"refsource" : "MSKB",
|
||||
"url" : "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q247869"
|
||||
},
|
||||
{
|
||||
"name": "nt-spoofed-lpc-port",
|
||||
"refsource": "XF",
|
||||
"url": "http://xforce.iss.net/search.php3?type=2&pattern=nt-spoofed-lpc-port"
|
||||
},
|
||||
{
|
||||
"name" : "934",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/934"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20000424 Solaris 7 x86 lp exploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-04/0191.html"
|
||||
},
|
||||
{
|
||||
"name": "1143",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1143"
|
||||
},
|
||||
{
|
||||
"name": "20000424 Solaris 7 x86 lp exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0191.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=15769.990928@tomcat.ru"
|
||||
},
|
||||
{
|
||||
"name" : "19991018 Incorrect directory name handling in mirror",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/1999/19991018"
|
||||
"name": "681",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/681"
|
||||
},
|
||||
{
|
||||
"name": "19991001 Security hole in mirror",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.novell.com/linux/security/advisories/suse_security_announce_22.html"
|
||||
},
|
||||
{
|
||||
"name" : "681",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/681"
|
||||
"name": "19991018 Incorrect directory name handling in mirror",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/1999/19991018"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20000524 HP Web JetAdmin Version 6.0 Remote DoS attack Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-05/0277.html"
|
||||
},
|
||||
{
|
||||
"name": "1246",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1246"
|
||||
},
|
||||
{
|
||||
"name": "20000524 HP Web JetAdmin Version 6.0 Remote DoS attack Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0277.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "20001004 Re: OpenBSD Security Advisory",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=97068555106135&w=2"
|
||||
},
|
||||
{
|
||||
"name": "1744",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1744"
|
||||
},
|
||||
{
|
||||
"name": "20001003 A format string vulnerability exists in the pw_error(3) function.",
|
||||
"refsource": "OPENBSD",
|
||||
@ -67,16 +77,6 @@
|
||||
"refsource": "FREEBSD",
|
||||
"url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:58.chpass.asc"
|
||||
},
|
||||
{
|
||||
"name" : "20001004 Re: OpenBSD Security Advisory",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=97068555106135&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "1744",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/1744"
|
||||
},
|
||||
{
|
||||
"name": "bsd-libutil-format(5339)",
|
||||
"refsource": "XF",
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/453330/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://echo.or.id/adv/adv19-theday-2005.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://echo.or.id/adv/adv19-theday-2005.txt"
|
||||
},
|
||||
{
|
||||
"name": "duforum-messages-forums-sql-injection(30668)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30668"
|
||||
},
|
||||
{
|
||||
"name": "http://echo.or.id/adv/adv19-theday-2005.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://echo.or.id/adv/adv19-theday-2005.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050805 Vulnerability in ePing and eTrace plugins of e107",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=112328161319148&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://e107plugins.co.uk/news.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://e107plugins.co.uk/news.php"
|
||||
},
|
||||
{
|
||||
"name": "20050805 Vulnerability in ePing and eTrace plugins of e107",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=112328161319148&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060119 [security bulletin] SSRT5971 rev.1 - HP-UX Running ftpd Remote Denial of Service (DoS)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/422391/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-018.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-018.htm"
|
||||
},
|
||||
{
|
||||
"name": "HPSBTU01227",
|
||||
"refsource": "HP",
|
||||
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01227"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT5971",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01227"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02092",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/422391/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "16316",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16316"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:5709",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5709"
|
||||
"name": "18569",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18569"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-1801",
|
||||
@ -93,14 +73,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2005/1801"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0264",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0264"
|
||||
},
|
||||
{
|
||||
"name" : "1015506",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015506"
|
||||
"name": "oval:org.mitre.oval:def:5709",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5709"
|
||||
},
|
||||
{
|
||||
"name": "18543",
|
||||
@ -108,14 +83,39 @@
|
||||
"url": "http://secunia.com/advisories/18543"
|
||||
},
|
||||
{
|
||||
"name" : "18569",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18569"
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-018.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-018.htm"
|
||||
},
|
||||
{
|
||||
"name": "20060119 [security bulletin] SSRT5971 rev.1 - HP-UX Running ftpd Remote Denial of Service (DoS)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/422391/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "16316",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16316"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0264",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0264"
|
||||
},
|
||||
{
|
||||
"name": "360",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/360"
|
||||
},
|
||||
{
|
||||
"name": "SSRT5971",
|
||||
"refsource": "HP",
|
||||
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01227"
|
||||
},
|
||||
{
|
||||
"name": "1015506",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015506"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "19973",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/19973"
|
||||
},
|
||||
{
|
||||
"name": "15075",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15075"
|
||||
},
|
||||
{
|
||||
"name": "20051010 versatileBulletinBoard V1.0.0 RC2 (possibly prior versions)",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -62,16 +72,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://rgod.altervista.org/versatile100RC2.html"
|
||||
},
|
||||
{
|
||||
"name" : "15075",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/15075"
|
||||
},
|
||||
{
|
||||
"name" : "19973",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/19973"
|
||||
},
|
||||
{
|
||||
"name": "17174",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://felinemenace.org/advisories/bmv_advisory.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://felinemenace.org/advisories/bmv_advisory.txt"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-981",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-981"
|
||||
},
|
||||
{
|
||||
"name" : "15153",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/15153"
|
||||
},
|
||||
{
|
||||
"name": "20118",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/20118"
|
||||
},
|
||||
{
|
||||
"name" : "1015086",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015086"
|
||||
},
|
||||
{
|
||||
"name" : "17266",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/17266"
|
||||
},
|
||||
{
|
||||
"name": "19029",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19029"
|
||||
},
|
||||
{
|
||||
"name": "http://felinemenace.org/advisories/bmv_advisory.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://felinemenace.org/advisories/bmv_advisory.txt"
|
||||
},
|
||||
{
|
||||
"name": "bmv-openpsfile-overflow(22815)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22815"
|
||||
},
|
||||
{
|
||||
"name": "15153",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15153"
|
||||
},
|
||||
{
|
||||
"name": "17266",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17266"
|
||||
},
|
||||
{
|
||||
"name": "1015086",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015086"
|
||||
},
|
||||
{
|
||||
"name": "DSA-981",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-981"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20051025 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=113026417802703&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.securityelf.org/magicbyteadv.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.securityelf.org/magicbyteadv.html"
|
||||
"name": "15189",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15189"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securityelf.org/magicbyte.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securityelf.org/magicbyte.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securityelf.org/magicbyteadv.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securityelf.org/magicbyteadv.html"
|
||||
},
|
||||
{
|
||||
"name": "20051025 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=113026417802703&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securityelf.org/updmagic.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securityelf.org/updmagic.html"
|
||||
},
|
||||
{
|
||||
"name" : "15189",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/15189"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "IY78241",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www-1.ibm.com/support/docview.wss?uid=isg1IY78241"
|
||||
"name": "1015122",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015122"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-2253",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2253"
|
||||
},
|
||||
{
|
||||
"name": "17380",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17380"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:5470",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5470"
|
||||
},
|
||||
{
|
||||
"name": "261",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/261"
|
||||
},
|
||||
{
|
||||
"name": "IY78253",
|
||||
@ -68,29 +88,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/15247"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:5470",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5470"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-2253",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/2253"
|
||||
},
|
||||
{
|
||||
"name" : "1015122",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015122"
|
||||
},
|
||||
{
|
||||
"name" : "17380",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/17380"
|
||||
},
|
||||
{
|
||||
"name" : "261",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/261"
|
||||
"name": "IY78241",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY78241"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070912 0DAY: QuickTime pwns Firefox",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/479179/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox"
|
||||
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-28.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-28.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=395942",
|
||||
@ -68,30 +63,15 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=395942"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-28.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2007/mfsa2007-28.html"
|
||||
"name": "20070912 0DAY: QuickTime pwns Firefox",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/479179/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02153",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061181",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name" : "201516",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:057",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_57_mozilla.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:5896",
|
||||
"refsource": "OVAL",
|
||||
@ -102,10 +82,30 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3197"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:057",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_57_mozilla.html"
|
||||
},
|
||||
{
|
||||
"name": "26881",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26881"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061181",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name": "http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox"
|
||||
},
|
||||
{
|
||||
"name": "201516",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "9068",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/9068"
|
||||
},
|
||||
{
|
||||
"name": "55676",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/55676"
|
||||
},
|
||||
{
|
||||
"name": "9068",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/9068"
|
||||
},
|
||||
{
|
||||
"name": "55695",
|
||||
"refsource": "OSVDB",
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141414-01-1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141414-01-1"
|
||||
"name": "1022574",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1022574"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1914",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1914"
|
||||
},
|
||||
{
|
||||
"name": "253608",
|
||||
@ -63,9 +68,14 @@
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-253608-1"
|
||||
},
|
||||
{
|
||||
"name" : "55875",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/55875"
|
||||
"name": "35873",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35873"
|
||||
},
|
||||
{
|
||||
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141414-01-1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141414-01-1"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:6349",
|
||||
@ -73,19 +83,9 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6349"
|
||||
},
|
||||
{
|
||||
"name" : "1022574",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1022574"
|
||||
},
|
||||
{
|
||||
"name" : "35873",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/35873"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-1914",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/1914"
|
||||
"name": "55875",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/55875"
|
||||
},
|
||||
{
|
||||
"name": "solaris-sctp-packets-dos(51740)",
|
||||
|
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "38731",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38731"
|
||||
},
|
||||
{
|
||||
"name": "20100301 ZDI-10-023: Multiple Vendor librpc.dll Signedness Error Remote Code Execution Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/509793/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-023",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-023"
|
||||
},
|
||||
{
|
||||
"name" : "http://knowledgebase.emc.com/emcice/login.do?sType=ax1990&sName=1204&id=emc183834",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://knowledgebase.emc.com/emcice/login.do?sType=ax1990&sName=1204&id=emc183834"
|
||||
"name": "ADV-2010-0508",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0508"
|
||||
},
|
||||
{
|
||||
"name": "IC55329",
|
||||
@ -78,19 +78,14 @@
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg1IC55330"
|
||||
},
|
||||
{
|
||||
"name" : "38472",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/38472"
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-023",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-023"
|
||||
},
|
||||
{
|
||||
"name" : "38731",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38731"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-0508",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/0508"
|
||||
"name": "ibm-ids-portmap-bo(56586)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56586"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0509",
|
||||
@ -98,9 +93,14 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0509"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-ids-portmap-bo(56586)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56586"
|
||||
"name": "http://knowledgebase.emc.com/emcice/login.do?sType=ax1990&sName=1204&id=emc183834",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://knowledgebase.emc.com/emcice/login.do?sType=ax1990&sName=1204&id=emc183834"
|
||||
},
|
||||
{
|
||||
"name": "38472",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38472"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2009-3135",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20091110 Microsoft Word FIB Processing Stack Buffer Overflow Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=831"
|
||||
},
|
||||
{
|
||||
"name" : "MS09-068",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-068"
|
||||
},
|
||||
{
|
||||
"name" : "TA09-314A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-314A.html"
|
||||
"name": "ADV-2009-3194",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3194"
|
||||
},
|
||||
{
|
||||
"name": "36950",
|
||||
@ -77,6 +67,16 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/59857"
|
||||
},
|
||||
{
|
||||
"name": "MS09-068",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-068"
|
||||
},
|
||||
{
|
||||
"name": "TA09-314A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-314A.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:6555",
|
||||
"refsource": "OVAL",
|
||||
@ -87,15 +87,15 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1023158"
|
||||
},
|
||||
{
|
||||
"name": "20091110 Microsoft Word FIB Processing Stack Buffer Overflow Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=831"
|
||||
},
|
||||
{
|
||||
"name": "37277",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37277"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-3194",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/3194"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2009-3401",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
|
||||
"name": "36768",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36768"
|
||||
},
|
||||
{
|
||||
"name": "TA09-294A",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
|
||||
},
|
||||
{
|
||||
"name" : "36768",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/36768"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
|
||||
},
|
||||
{
|
||||
"name": "1023059",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2015-0057",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2015-0346",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201504-07",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201504-07"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:0813",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0813.html"
|
||||
"name": "openSUSE-SU-2015:0718",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:0722",
|
||||
@ -73,19 +63,24 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:0723",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html"
|
||||
"name": "GLSA-201504-07",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201504-07"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0718",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html"
|
||||
"name": "1032105",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032105"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0725",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html"
|
||||
"name": "RHSA-2015:0813",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html"
|
||||
},
|
||||
{
|
||||
"name": "74067",
|
||||
@ -93,9 +88,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/74067"
|
||||
},
|
||||
{
|
||||
"name" : "1032105",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032105"
|
||||
"name": "openSUSE-SU-2015:0725",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:0723",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2015-0475",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"ID": "CVE-2015-0784",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-149",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-149"
|
||||
"name": "1032166",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032166"
|
||||
},
|
||||
{
|
||||
"name": "https://www.novell.com/support/kb/doc.php?id=7016431",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/74289"
|
||||
},
|
||||
{
|
||||
"name" : "1032166",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032166"
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-149",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-149"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2015-0899",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-EN",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-EN"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20180629-0006/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20180629-0006/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3536",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3536"
|
||||
"name": "JVNDB-2015-000042",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000042"
|
||||
},
|
||||
{
|
||||
"name": "JVN#86448949",
|
||||
@ -78,9 +68,19 @@
|
||||
"url": "http://jvn.jp/en/jp/JVN86448949/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2015-000042",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000042"
|
||||
"name": "DSA-3536",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3536"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-EN",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-EN"
|
||||
},
|
||||
{
|
||||
"name": "74423",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2015-4488",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,40 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-90.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-90.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1176270",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1176270"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3410",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3410"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3333",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3333"
|
||||
"name": "SUSE-SU-2015:2081",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201605-06",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201605-06"
|
||||
"name": "USN-2712-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2712-1"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:1586",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1586.html"
|
||||
"name": "openSUSE-SU-2015:1454",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2702-3",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2702-3"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1682",
|
||||
@ -97,30 +87,25 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1390",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:2081",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:1449",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1453",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1454",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html"
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1176270",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1176270"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1586",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1586.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:1528",
|
||||
@ -128,9 +113,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2702-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2702-1"
|
||||
"name": "1033247",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033247"
|
||||
},
|
||||
{
|
||||
"name": "USN-2702-2",
|
||||
@ -138,14 +123,14 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-2702-2"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2702-3",
|
||||
"name": "USN-2702-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2702-3"
|
||||
"url": "http://www.ubuntu.com/usn/USN-2702-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2712-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2712-1"
|
||||
"name": "GLSA-201605-06",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201605-06"
|
||||
},
|
||||
{
|
||||
"name": "1033372",
|
||||
@ -153,9 +138,24 @@
|
||||
"url": "http://www.securitytracker.com/id/1033372"
|
||||
},
|
||||
{
|
||||
"name" : "1033247",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033247"
|
||||
"name": "SUSE-SU-2015:1449",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3333",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3333"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2015/mfsa2015-90.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-90.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1390",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2015-4756",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,26 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
|
||||
},
|
||||
{
|
||||
"name": "1032911",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032911"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1646",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1646.html"
|
||||
},
|
||||
{
|
||||
"name": "75785",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75785"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1629",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201610-06",
|
||||
"refsource": "GENTOO",
|
||||
@ -66,26 +86,6 @@
|
||||
"name": "RHSA-2015:1630",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1630.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:1646",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1646.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1629",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html"
|
||||
},
|
||||
{
|
||||
"name" : "75785",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/75785"
|
||||
},
|
||||
{
|
||||
"name" : "1032911",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032911"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2015-4777",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2015-4780",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,41 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.ntp.org/bin/view/Main/NtpBug2947",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.ntp.org/bin/view/Main/NtpBug2947"
|
||||
},
|
||||
{
|
||||
"name" : "https://bto.bluecoat.com/security-advisory/sa113",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bto.bluecoat.com/security-advisory/sa113"
|
||||
},
|
||||
{
|
||||
"name": "20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd"
|
||||
},
|
||||
{
|
||||
"name" : "FreeBSD-SA-16:09",
|
||||
"refsource" : "FREEBSD",
|
||||
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201607-15",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201607-15"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1175",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1177",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html"
|
||||
},
|
||||
{
|
||||
"name": "1034782",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034782"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1292",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name": "VU#718152",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "https://www.kb.cert.org/vuls/id/718152"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1247",
|
||||
"refsource": "SUSE",
|
||||
@ -98,9 +88,24 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1292",
|
||||
"name": "SUSE-SU-2016:1175",
|
||||
"refsource": "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html"
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.ntp.org/bin/view/Main/NtpBug2947",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.ntp.org/bin/view/Main/NtpBug2947"
|
||||
},
|
||||
{
|
||||
"name": "FreeBSD-SA-16:09",
|
||||
"refsource": "FREEBSD",
|
||||
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc"
|
||||
},
|
||||
{
|
||||
"name": "https://bto.bluecoat.com/security-advisory/sa113",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bto.bluecoat.com/security-advisory/sa113"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1423",
|
||||
@ -108,14 +113,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#718152",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "https://www.kb.cert.org/vuls/id/718152"
|
||||
},
|
||||
{
|
||||
"name" : "1034782",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1034782"
|
||||
"name": "GLSA-201607-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201607-15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2017-06-05T00:00:00",
|
||||
"ID": "CVE-2015-9014",
|
||||
"STATE": "PUBLIC"
|
||||
|
@ -54,29 +54,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1247239",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1247239"
|
||||
"name": "94337",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94337"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-44/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-44/"
|
||||
},
|
||||
{
|
||||
"name": "1037298",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037298"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2016-89/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2016-89/"
|
||||
},
|
||||
{
|
||||
"name" : "94337",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94337"
|
||||
},
|
||||
{
|
||||
"name" : "1037298",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1037298"
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1247239",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1247239"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,25 +55,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201702-08",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201702-08"
|
||||
},
|
||||
{
|
||||
"name": "1037638",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037638"
|
||||
},
|
||||
{
|
||||
"name": "95590",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95590"
|
||||
},
|
||||
{
|
||||
"name" : "1037638",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1037638"
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-2291",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -69,15 +69,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/"
|
||||
},
|
||||
{
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2525222",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2525222"
|
||||
},
|
||||
{
|
||||
"name": "https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201805-08",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201805-08"
|
||||
},
|
||||
{
|
||||
"name" : "103860",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/103860"
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name": "1040707",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040707"
|
||||
},
|
||||
{
|
||||
"name": "103860",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103860"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -98,15 +98,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
||||
},
|
||||
{
|
||||
"name" : "104778",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/104778"
|
||||
},
|
||||
{
|
||||
"name": "1041307",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041307"
|
||||
},
|
||||
{
|
||||
"name": "104778",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104778"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cybersecurity@se.com",
|
||||
"ASSIGNER": "cybersecurity@schneider-electric.com",
|
||||
"ID": "CVE-2018-7244",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180406 [SECURITY] [DLA 1340-1] sam2p security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00004.html"
|
||||
"name": "https://github.com/pts/sam2p/issues/32",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/pts/sam2p/issues/32"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891527",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891527"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/pts/sam2p/issues/32",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/pts/sam2p/issues/32"
|
||||
"name": "[debian-lts-announce] 20180406 [SECURITY] [DLA 1340-1] sam2p security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00004.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-7909",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
Loading…
x
Reference in New Issue
Block a user