From 53f1294fc2794e64f5b3be31f9eefcb16f876047 Mon Sep 17 00:00:00 2001 From: Joseph Bisch Date: Sat, 20 May 2017 00:43:12 -0400 Subject: add CVE data for 2016 and 2017 --- _data/security/CVE-2016-7044.yml | 11 +++++++++++ _data/security/CVE-2016-7045.yml | 11 +++++++++++ _data/security/CVE-2016-7553.yml | 12 ++++++++++++ _data/security/CVE-2017-5193.yml | 11 +++++++++++ _data/security/CVE-2017-5194.yml | 11 +++++++++++ _data/security/CVE-2017-5195.yml | 11 +++++++++++ _data/security/CVE-2017-5196.yml | 11 +++++++++++ _data/security/CVE-2017-5356.yml | 11 +++++++++++ _data/security/CVE-2017-7191.yml | 11 +++++++++++ 9 files changed, 100 insertions(+) create mode 100644 _data/security/CVE-2016-7044.yml create mode 100644 _data/security/CVE-2016-7045.yml create mode 100644 _data/security/CVE-2016-7553.yml create mode 100644 _data/security/CVE-2017-5193.yml create mode 100644 _data/security/CVE-2017-5194.yml create mode 100644 _data/security/CVE-2017-5195.yml create mode 100644 _data/security/CVE-2017-5196.yml create mode 100644 _data/security/CVE-2017-5356.yml create mode 100644 _data/security/CVE-2017-7191.yml (limited to '_data') diff --git a/_data/security/CVE-2016-7044.yml b/_data/security/CVE-2016-7044.yml new file mode 100644 index 0000000..fb2ad98 --- /dev/null +++ b/_data/security/CVE-2016-7044.yml @@ -0,0 +1,11 @@ +external_links: + - id: CVE-2016-7044 + url: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7044 + - id: IRSSI-SA-2016 + url: https://irssi.org/security/irssi_sa_2016.txt +exploitable_by: client +affected_versions: 0.8.17-beta up to and including 0.8.19 up to 0.8.19-219-g52fedea (but only versions compiled with true-color enabled) +fixed_version: 0.8.20 +release_date: Sept 14, 2016 +git_commit: 295a4b77f07f14602eeaa371f00ddbf09910c82b +credit: Gabriel Campana and Adrien Guinet from Quarkslab diff --git a/_data/security/CVE-2016-7045.yml b/_data/security/CVE-2016-7045.yml new file mode 100644 index 0000000..ce141ea --- /dev/null +++ b/_data/security/CVE-2016-7045.yml @@ -0,0 +1,11 @@ +external_links: + - id: CVE-2016-7045 + url: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7045 + - id: IRSSI-SA-2016 + url: https://irssi.org/security/irssi_sa_2016.txt +exploitable_by: client +affected_versions: 0.8.17-beta up to and including 0.8.19 up to 0.8.19-219-g52fedea +fixed_version: 0.8.20 +release_date: Sept 14, 2016 +git_commit: 295a4b77f07f14602eeaa371f00ddbf09910c82b +credit: Gabriel Campana and Adrien Guinet from Quarkslab diff --git a/_data/security/CVE-2016-7553.yml b/_data/security/CVE-2016-7553.yml new file mode 100644 index 0000000..2becb1f --- /dev/null +++ b/_data/security/CVE-2016-7553.yml @@ -0,0 +1,12 @@ +external_links: + - id: CVE-2016-7553 + url: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7553 + - id: BUF-PL-SA-2016 + url: https://irssi.org/security/buf_pl_sa_2016.txt +exploitable_by: local users +affected_versions: all buf.pl script versions up to 2.13 +fixed_version: buf.pl 2.20 +release_date: Sept 9, 2016 +repo: scripts.irssi.org +git_commit: f1b1eb154baa684fad5d65bf4dff79c8ded8b65a +credit: Juerd Waalboer diff --git a/_data/security/CVE-2017-5193.yml b/_data/security/CVE-2017-5193.yml new file mode 100644 index 0000000..f714489 --- /dev/null +++ b/_data/security/CVE-2017-5193.yml @@ -0,0 +1,11 @@ +external_links: + - id: CVE-2017-5193 + url: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5193 + - id: IRSSI-SA-2017-01 + url: https://irssi.org/security/irssi_sa_2017_01.txt +exploitable_by: server +affected_versions: all observable versions prior to 0.8.21 +fixed_version: 0.8.21 +release_date: Jan 5, 2017 +git_commit: 6c6c42e3d1b49d90aacc0b67f8540471cae02a1d +credit: Joseph Bisch diff --git a/_data/security/CVE-2017-5194.yml b/_data/security/CVE-2017-5194.yml new file mode 100644 index 0000000..8ade5bb --- /dev/null +++ b/_data/security/CVE-2017-5194.yml @@ -0,0 +1,11 @@ +external_links: + - id: CVE-2017-5194 + url: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5194 + - id: IRSSI-SA-2017-01 + url: https://irssi.org/security/irssi_sa_2017_01.txt +exploitable_by: server +affected_versions: all observable versions prior to 0.8.21 +fixed_version: 0.8.21 +release_date: Jan 5, 2017 +git_commit: 6c6c42e3d1b49d90aacc0b67f8540471cae02a1d +credit: diff --git a/_data/security/CVE-2017-5195.yml b/_data/security/CVE-2017-5195.yml new file mode 100644 index 0000000..dd5538a --- /dev/null +++ b/_data/security/CVE-2017-5195.yml @@ -0,0 +1,11 @@ +external_links: + - id: CVE-2017-5195 + url: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5195 + - id: IRSSI-SA-2017-01 + url: https://irssi.org/security/irssi_sa_2017_01.txt +exploitable_by: client +affected_versions: 0.8.17 through 0.8.20 +fixed_version: 0.8.21 +release_date: Jan 5, 2017 +git_commit: 6c6c42e3d1b49d90aacc0b67f8540471cae02a1d +credit: Joseph Bisch diff --git a/_data/security/CVE-2017-5196.yml b/_data/security/CVE-2017-5196.yml new file mode 100644 index 0000000..0d454c7 --- /dev/null +++ b/_data/security/CVE-2017-5196.yml @@ -0,0 +1,11 @@ +external_links: + - id: CVE-2017-5196 + url: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5196 + - id: IRSSI-SA-2017-01 + url: https://irssi.org/security/irssi_sa_2017_01.txt +exploitable_by: server +affected_versions: 0.8.18 through 0.8.20 +fixed_version: 0.8.21 +release_date: Jan 5, 2017 +git_commit: 6c6c42e3d1b49d90aacc0b67f8540471cae02a1d +credit: Hanno Böck and independently by Joseph Bisch diff --git a/_data/security/CVE-2017-5356.yml b/_data/security/CVE-2017-5356.yml new file mode 100644 index 0000000..93b48ac --- /dev/null +++ b/_data/security/CVE-2017-5356.yml @@ -0,0 +1,11 @@ +external_links: + - id: CVE-2017-5356 + url: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5356 + - id: IRSSI-SA-2017-01 + url: https://irssi.org/security/irssi_sa_2017_01.txt +exploitable_by: server +affected_versions: all observable versions prior to 0.8.21 +fixed_version: 0.8.21 +release_date: Jan 5, 2017 +git_commit: 6c6c42e3d1b49d90aacc0b67f8540471cae02a1d +credit: Hanno Böck diff --git a/_data/security/CVE-2017-7191.yml b/_data/security/CVE-2017-7191.yml new file mode 100644 index 0000000..bc076be --- /dev/null +++ b/_data/security/CVE-2017-7191.yml @@ -0,0 +1,11 @@ +external_links: + - id: CVE-2017-7191 + url: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7191 + - id: IRSSI-SA-2017-03 + url: https://irssi.org/security/irssi_sa_2017_03.txt + exploitable_by: server +affected_versions: all observable versions prior to 1.0.2 (we believe 0.8.21 and prior are not affected) +fixed_version: 1.0.2 +release_date: Mar 10, 2017 +git_commit: 77b2631c78461965bc9a7414aae206b5c514e1b3 +credit: APic -- cgit v1.2.3