mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
ef8522925e
commit
031179c9e1
@ -58,9 +58,14 @@
|
||||
"url": "http://pridels0.blogspot.com/2006/03/adman-v10x-sql-vuln.html"
|
||||
},
|
||||
{
|
||||
"name" : "17208",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/17208"
|
||||
"name": "adman-viewstatement-sql-injection(25403)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25403"
|
||||
},
|
||||
{
|
||||
"name": "19351",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19351"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1071",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "http://www.osvdb.org/24064"
|
||||
},
|
||||
{
|
||||
"name" : "19351",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19351"
|
||||
},
|
||||
{
|
||||
"name" : "adman-viewstatement-sql-injection(25403)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25403"
|
||||
"name": "17208",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17208"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "26932",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/26932"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2006-06-27",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2006/Jun/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#652196",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/652196"
|
||||
},
|
||||
{
|
||||
"name": "18686",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18686"
|
||||
},
|
||||
{
|
||||
"name" : "18728",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18728"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-2566",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/2566"
|
||||
},
|
||||
{
|
||||
"name" : "26932",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/26932"
|
||||
},
|
||||
{
|
||||
"name": "1016396",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016396"
|
||||
},
|
||||
{
|
||||
"name": "VU#652196",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/652196"
|
||||
},
|
||||
{
|
||||
"name": "macosx-openldap-directory-dos(27480)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27480"
|
||||
},
|
||||
{
|
||||
"name": "18728",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18728"
|
||||
},
|
||||
{
|
||||
"name": "20877",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20877"
|
||||
},
|
||||
{
|
||||
"name" : "macosx-openldap-directory-dos(27480)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27480"
|
||||
"name": "ADV-2006-2566",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2566"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-004_e/index-e.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-004_e/index-e.html"
|
||||
},
|
||||
{
|
||||
"name": "17329",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17329"
|
||||
},
|
||||
{
|
||||
"name" : "24309",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/24309"
|
||||
},
|
||||
{
|
||||
"name": "19472",
|
||||
"refsource": "SECUNIA",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "xfits-data-dos(25567)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25567"
|
||||
},
|
||||
{
|
||||
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS06-004_e/index-e.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-004_e/index-e.html"
|
||||
},
|
||||
{
|
||||
"name": "24309",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/24309"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060407 [KAPDA::#38] - MyBB 1.1.0~functions_post.php~XSS Attack",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/430344/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://kapda.ir/advisory-305.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://kapda.ir/advisory-305.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://myimei.com/security/2006-03-12/mybb-110functions_postphpxss-attack.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://myimei.com/security/2006-03-12/mybb-110functions_postphpxss-attack.html"
|
||||
},
|
||||
{
|
||||
"name": "17413",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17413"
|
||||
},
|
||||
{
|
||||
"name" : "24375",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/24375"
|
||||
"name": "http://kapda.ir/advisory-305.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://kapda.ir/advisory-305.html"
|
||||
},
|
||||
{
|
||||
"name": "19516",
|
||||
@ -86,6 +71,21 @@
|
||||
"name": "mybb-email-img-bbcode-xss(25615)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25615"
|
||||
},
|
||||
{
|
||||
"name": "24375",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/24375"
|
||||
},
|
||||
{
|
||||
"name": "http://myimei.com/security/2006-03-12/mybb-110functions_postphpxss-attack.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://myimei.com/security/2006-03-12/mybb-110functions_postphpxss-attack.html"
|
||||
},
|
||||
{
|
||||
"name": "20060407 [KAPDA::#38] - MyBB 1.1.0~functions_post.php~XSS Attack",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/430344/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,65 +52,65 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2006-090826.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2006-090826.html"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMA02113",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/432267/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061148",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/432267/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "VU#619194",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/619194"
|
||||
},
|
||||
{
|
||||
"name" : "VU#824833",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/824833"
|
||||
},
|
||||
{
|
||||
"name" : "17590",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/17590"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1397",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1397"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1571",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1571"
|
||||
},
|
||||
{
|
||||
"name" : "1015961",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015961"
|
||||
},
|
||||
{
|
||||
"name": "19712",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19712"
|
||||
},
|
||||
{
|
||||
"name": "oracle-ebusiness-multiple-unspecifed(26058)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26058"
|
||||
},
|
||||
{
|
||||
"name": "19859",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19859"
|
||||
},
|
||||
{
|
||||
"name" : "oracle-ebusiness-multiple-unspecifed(26058)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26058"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2006-090826.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2006-090826.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1571",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1571"
|
||||
},
|
||||
{
|
||||
"name": "VU#824833",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/824833"
|
||||
},
|
||||
{
|
||||
"name": "VU#619194",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/619194"
|
||||
},
|
||||
{
|
||||
"name": "17590",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17590"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061148",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/432267/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1397",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1397"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMA02113",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/432267/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1015961",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015961"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "2430",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2430"
|
||||
"name": "22113",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22113"
|
||||
},
|
||||
{
|
||||
"name": "84255",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/84255"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3774",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3774"
|
||||
},
|
||||
{
|
||||
"name" : "22113",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22113"
|
||||
},
|
||||
{
|
||||
"name": "importal-functions-file-include(29146)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29146"
|
||||
},
|
||||
{
|
||||
"name": "2430",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2430"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3774",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3774"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20212",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20212"
|
||||
},
|
||||
{
|
||||
"name": "33676",
|
||||
"refsource": "OSVDB",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "33677",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/33677"
|
||||
},
|
||||
{
|
||||
"name": "20212",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20212"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060926 net2ftp: a web based FTP client :) <= Remote File Inclusion",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/447156/100/0/threaded"
|
||||
"name": "http://www.net2ftp.org/forums/viewtopic.php?pid=6689",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.net2ftp.org/forums/viewtopic.php?pid=6689"
|
||||
},
|
||||
{
|
||||
"name": "20061002 Re: net2ftp: a web based FTP client :) <= Remote File Inclusion",
|
||||
@ -63,14 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/447535/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061006 Re: net2ftp Remote File Inclusion - bogus report",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/447916/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061009 Re: net2ftp: a web based FTP client :) <= Remote File Inclusion",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/448037/100/0/threaded"
|
||||
"name": "http://www.net2ftp.org/forums/viewtopic.php?pid=6676",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.net2ftp.org/forums/viewtopic.php?pid=6676"
|
||||
},
|
||||
{
|
||||
"name": "http://www.net2ftp.org/forums/viewtopic.php?pid=6687",
|
||||
@ -78,9 +73,9 @@
|
||||
"url": "http://www.net2ftp.org/forums/viewtopic.php?pid=6687"
|
||||
},
|
||||
{
|
||||
"name" : "20061009 net2ftp: a web based FTP client :) <= Remote File Inclusion (fwd)",
|
||||
"refsource" : "VIM",
|
||||
"url" : "http://www.attrition.org/pipermail/vim/2006-October/001076.html"
|
||||
"name": "20061009 Re: net2ftp: a web based FTP client :) <= Remote File Inclusion",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/448037/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20061009 net2ftp: a web based FTP client :) <= Remote File Inclusion (fwd)",
|
||||
@ -88,14 +83,14 @@
|
||||
"url": "http://www.attrition.org/pipermail/vim/2006-October/001077.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.net2ftp.org/forums/viewtopic.php?pid=6676",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.net2ftp.org/forums/viewtopic.php?pid=6676"
|
||||
"name": "20061006 Re: net2ftp Remote File Inclusion - bogus report",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/447916/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.net2ftp.org/forums/viewtopic.php?pid=6689",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.net2ftp.org/forums/viewtopic.php?pid=6689"
|
||||
"name": "net2ftp-index-file-include(29203)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29203"
|
||||
},
|
||||
{
|
||||
"name": "1655",
|
||||
@ -103,9 +98,14 @@
|
||||
"url": "http://securityreason.com/securityalert/1655"
|
||||
},
|
||||
{
|
||||
"name" : "net2ftp-index-file-include(29203)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29203"
|
||||
"name": "20060926 net2ftp: a web based FTP client :) <= Remote File Inclusion",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/447156/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20061009 net2ftp: a web based FTP client :) <= Remote File Inclusion (fwd)",
|
||||
"refsource": "VIM",
|
||||
"url": "http://www.attrition.org/pipermail/vim/2006-October/001076.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20417"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3958",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3958"
|
||||
},
|
||||
{
|
||||
"name": "22310",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22310"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3958",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3958"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,25 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugs.freedesktop.org/show_bug.cgi?id=8699",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.freedesktop.org/show_bug.cgi?id=8699"
|
||||
},
|
||||
{
|
||||
"name" : "http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git;a=commit;h=686bb8b35acf6cecae80fe89b2b5853f5816ce19",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git;a=commit;h=686bb8b35acf6cecae80fe89b2b5853f5816ce19"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2006:199",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:199"
|
||||
"name": "22749",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22749"
|
||||
},
|
||||
{
|
||||
"name": "20845",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20845"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=8699",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=8699"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4289",
|
||||
"refsource": "VUPEN",
|
||||
@ -83,9 +78,14 @@
|
||||
"url": "http://secunia.com/advisories/22642"
|
||||
},
|
||||
{
|
||||
"name" : "22749",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22749"
|
||||
"name": "http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git;a=commit;h=686bb8b35acf6cecae80fe89b2b5853f5816ce19",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git;a=commit;h=686bb8b35acf6cecae80fe89b2b5853f5816ce19"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:199",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:199"
|
||||
},
|
||||
{
|
||||
"name": "libx11-xinput-information-disclosure(29956)",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "24842",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24842"
|
||||
},
|
||||
{
|
||||
"name": "3702",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "ADV-2007-1345",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1345"
|
||||
},
|
||||
{
|
||||
"name" : "24842",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24842"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3717",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3717"
|
||||
},
|
||||
{
|
||||
"name" : "23451",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23451"
|
||||
"name": "35747",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35747"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1385",
|
||||
@ -68,14 +63,19 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1385"
|
||||
},
|
||||
{
|
||||
"name" : "35747",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35747"
|
||||
"name": "23451",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23451"
|
||||
},
|
||||
{
|
||||
"name": "webkalk2-engine-file-include(33598)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33598"
|
||||
},
|
||||
{
|
||||
"name": "3717",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3717"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=508650",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=508650"
|
||||
"name": "36174",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36174"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1692",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1692"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=508650",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=508650"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1841",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1841"
|
||||
},
|
||||
{
|
||||
"name" : "36174",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36174"
|
||||
},
|
||||
{
|
||||
"name": "25299",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25299"
|
||||
},
|
||||
{
|
||||
"name" : "33265",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33265"
|
||||
},
|
||||
{
|
||||
"name": "xajax-xajaxinc-xss(34323)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34323"
|
||||
},
|
||||
{
|
||||
"name": "33265",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33265"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2007-6017",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2007-101/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secunia.com/secunia_research/2007-101/"
|
||||
"name": "http://support.veritas.com/docs/300471",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.veritas.com/docs/300471"
|
||||
},
|
||||
{
|
||||
"name": "1019525",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1019525"
|
||||
},
|
||||
{
|
||||
"name": "http://www.symantec.com/avcenter/security/Content/2008.02.29.html",
|
||||
@ -68,9 +73,9 @@
|
||||
"url": "http://seer.entsupport.symantec.com/docs/300471.htm"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.veritas.com/docs/300471",
|
||||
"name": "http://seer.support.veritas.com/docs/308669.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://support.veritas.com/docs/300471"
|
||||
"url": "http://seer.support.veritas.com/docs/308669.htm"
|
||||
},
|
||||
{
|
||||
"name": "http://www.symantec.com/avcenter/security/Content/2008.02.28.html",
|
||||
@ -78,34 +83,29 @@
|
||||
"url": "http://www.symantec.com/avcenter/security/Content/2008.02.28.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://seer.support.veritas.com/docs/308669.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://seer.support.veritas.com/docs/308669.htm"
|
||||
"name": "ADV-2008-0718",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0718"
|
||||
},
|
||||
{
|
||||
"name": "27885",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27885"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2007-101/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2007-101/"
|
||||
},
|
||||
{
|
||||
"name": "28008",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28008"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0718",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0718"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2672",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2672"
|
||||
},
|
||||
{
|
||||
"name" : "1019525",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1019525"
|
||||
},
|
||||
{
|
||||
"name" : "27885",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27885"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "18564",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/18564/"
|
||||
},
|
||||
{
|
||||
"name" : "http://drupal.org/node/144538",
|
||||
"name": "http://ivanobinetti.blogspot.it/2012/03/drupal-cms-712-latest-stable-release.html",
|
||||
"refsource": "MISC",
|
||||
"url" : "http://drupal.org/node/144538"
|
||||
"url": "http://ivanobinetti.blogspot.it/2012/03/drupal-cms-712-latest-stable-release.html"
|
||||
},
|
||||
{
|
||||
"name": "http://groups.drupal.org/node/216314",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://groups.drupal.org/node/216314"
|
||||
},
|
||||
{
|
||||
"name" : "http://ivanobinetti.blogspot.it/2012/03/drupal-cms-712-latest-stable-release.html",
|
||||
"name": "http://drupal.org/node/144538",
|
||||
"refsource": "MISC",
|
||||
"url" : "http://ivanobinetti.blogspot.it/2012/03/drupal-cms-712-latest-stable-release.html"
|
||||
"url": "http://drupal.org/node/144538"
|
||||
},
|
||||
{
|
||||
"name": "18564",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/18564/"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/files/110404/drupal712-xsrf.txt",
|
||||
|
@ -52,26 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=32915",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=32915"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs"
|
||||
},
|
||||
{
|
||||
"name": "38177",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38177"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/chromium/issues/detail?id=32915",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=32915"
|
||||
},
|
||||
{
|
||||
"name": "62320",
|
||||
"refsource": "OSVDB",
|
||||
@ -82,25 +72,35 @@
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14256"
|
||||
},
|
||||
{
|
||||
"name": "http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs"
|
||||
},
|
||||
{
|
||||
"name": "googlechrome-sandbox-code-exec(56217)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56217"
|
||||
},
|
||||
{
|
||||
"name": "1023583",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1023583"
|
||||
},
|
||||
{
|
||||
"name" : "38545",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38545"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0361",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0361"
|
||||
},
|
||||
{
|
||||
"name" : "googlechrome-sandbox-code-exec(56217)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56217"
|
||||
"name": "http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name": "38545",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38545"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-0731",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,36 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "RHSA-2010:0167",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0167.html"
|
||||
},
|
||||
{
|
||||
"name": "39127",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/39127"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2010:089",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:089"
|
||||
},
|
||||
{
|
||||
"name": "38959",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38959"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0713",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0713"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9759",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9759"
|
||||
},
|
||||
{
|
||||
"name": "http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/4230",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,41 +92,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=573028"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2010:089",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:089"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2010:0167",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0167.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2010:014",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "38959",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/38959"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:9759",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9759"
|
||||
},
|
||||
{
|
||||
"name" : "39127",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/39127"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-0713",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/0713"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1054",
|
||||
"refsource": "VUPEN",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2010-0884",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "TA10-103B",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA10-103B.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html"
|
||||
},
|
||||
{
|
||||
"name": "osps-cluster-unspecified-var1(57760)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57760"
|
||||
},
|
||||
{
|
||||
"name": "1021808",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021808.1-1"
|
||||
},
|
||||
{
|
||||
"name" : "TA10-103B",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-103B.html"
|
||||
},
|
||||
{
|
||||
"name": "39464",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/39464"
|
||||
},
|
||||
{
|
||||
"name" : "osps-cluster-unspecified-var1(57760)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57760"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,35 +53,35 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[MediaWiki-announce] 20100303 MediaWiki security update: 1.15.2",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-March/000088.html"
|
||||
"name": "39656",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/39656"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2022",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2010/dsa-2022"
|
||||
},
|
||||
{
|
||||
"name": "[MediaWiki-announce] 20100303 MediaWiki security update: 1.15.2",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-March/000088.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2010:010",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "39022",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/39022"
|
||||
},
|
||||
{
|
||||
"name" : "39656",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/39656"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0685",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0685"
|
||||
},
|
||||
{
|
||||
"name": "39022",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/39022"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1001",
|
||||
"refsource": "VUPEN",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2010-1818",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:7523",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7523"
|
||||
},
|
||||
{
|
||||
"name": "https://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb"
|
||||
},
|
||||
{
|
||||
"name": "http://reversemode.com/index.php?option=com_content&task=view&id=69&Itemid=1",
|
||||
"refsource": "MISC",
|
||||
@ -62,11 +72,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://threatpost.com/en_us/blogs/new-remote-flaw-apple-quicktime-bypasses-aslr-and-dep-083010"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/ht4339",
|
||||
"refsource": "CONFIRM",
|
||||
@ -76,11 +81,6 @@
|
||||
"name": "APPLE-SA-2010-09-15-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2010/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:7523",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7523"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/12063"
|
||||
},
|
||||
{
|
||||
"name" : "39233",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/39233"
|
||||
},
|
||||
{
|
||||
"name": "63558",
|
||||
"refsource": "OSVDB",
|
||||
@ -76,6 +71,11 @@
|
||||
"name": "fpbs-phpincdir-file-include(57560)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57560"
|
||||
},
|
||||
{
|
||||
"name": "39233",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/39233"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "68882",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/68882"
|
||||
},
|
||||
{
|
||||
"name": "41978",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41978"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.gentoo.org/342687",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.gentoo.org/342687"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vuxml.org/freebsd/96e776c7-e75c-11df-8f26-00151735203a.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.vuxml.org/freebsd/96e776c7-e75c-11df-8f26-00151735203a.html"
|
||||
},
|
||||
{
|
||||
"name": "http://otrs.org/advisory/OSA-2010-03-en/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "68882",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/68882"
|
||||
},
|
||||
{
|
||||
"name" : "41978",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/41978"
|
||||
"name": "http://www.vuxml.org/freebsd/96e776c7-e75c-11df-8f26-00151735203a.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.vuxml.org/freebsd/96e776c7-e75c-11df-8f26-00151735203a.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,30 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20101013 Directory Traversal Vulnerability in AnyConnect",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=128699692209082&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/1010-exploits/anyconnect-traversal.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/1010-exploits/anyconnect-traversal.txt"
|
||||
"name": "68666",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/68666"
|
||||
},
|
||||
{
|
||||
"name": "http://www.htbridge.ch/advisory/directory_traversal_vulnerability_in_anyconnect.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.htbridge.ch/advisory/directory_traversal_vulnerability_in_anyconnect.html"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/1010-exploits/anyconnect-traversal.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/1010-exploits/anyconnect-traversal.txt"
|
||||
},
|
||||
{
|
||||
"name": "20101013 Directory Traversal Vulnerability in AnyConnect",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=128699692209082&w=2"
|
||||
},
|
||||
{
|
||||
"name": "44076",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/44076"
|
||||
},
|
||||
{
|
||||
"name" : "68666",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/68666"
|
||||
},
|
||||
{
|
||||
"name": "41802",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-4258",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,175 +52,75 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20101207 Linux kernel exploit",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html"
|
||||
},
|
||||
{
|
||||
"name" : "[linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lkml.org/lkml/2010/12/1/543"
|
||||
},
|
||||
{
|
||||
"name" : "[linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=linux-kernel&m=129117048916957&w=2"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101202 CVE request: kernel: failure to revert address limit override in OOPS error path",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/12/02/2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2010/12/02/7"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2010/12/02/4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2010/12/02/3"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2010/12/08/9"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2010/12/08/4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2010/12/08/5"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2010/12/09/4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2010/12/09/14"
|
||||
},
|
||||
{
|
||||
"name" : "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=659567",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=659567"
|
||||
},
|
||||
{
|
||||
"name" : "http://code.google.com/p/chromium-os/issues/detail?id=10234",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/chromium-os/issues/detail?id=10234"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2010-18983",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2011:029",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2011:001",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2011:002",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2011:004",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2011:005",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2011:007",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2011:008",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "42745",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42745"
|
||||
},
|
||||
{
|
||||
"name" : "42778",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42778"
|
||||
},
|
||||
{
|
||||
"name" : "42801",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42801"
|
||||
},
|
||||
{
|
||||
"name" : "42932",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42932"
|
||||
},
|
||||
{
|
||||
"name": "43056",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43056"
|
||||
},
|
||||
{
|
||||
"name" : "43291",
|
||||
"name": "SUSE-SA:2011:004",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "42778",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43291"
|
||||
"url": "http://secunia.com/advisories/42778"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-3321",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/3321"
|
||||
"name": "[oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/12/02/3"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0012",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0012"
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177"
|
||||
},
|
||||
{
|
||||
"name": "42801",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42801"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2011:002",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/12/09/4"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-18983",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2011:001",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "42932",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42932"
|
||||
},
|
||||
{
|
||||
"name": "20101207 Linux kernel exploit",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0124",
|
||||
@ -228,19 +128,119 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0124"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0213",
|
||||
"name": "[linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=linux-kernel&m=129117048916957&w=2"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2011:007",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-3321",
|
||||
"refsource": "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0213"
|
||||
"url": "http://www.vupen.com/english/advisories/2010/3321"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/12/08/9"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0298",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0298"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/12/09/14"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2011:005",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/chromium-os/issues/detail?id=10234",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium-os/issues/detail?id=10234"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0375",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0375"
|
||||
},
|
||||
{
|
||||
"name": "[linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lkml.org/lkml/2010/12/1/543"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0012",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0012"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2011:008",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/12/02/4"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:029",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"
|
||||
},
|
||||
{
|
||||
"name": "42745",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42745"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/12/02/7"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/12/08/5"
|
||||
},
|
||||
{
|
||||
"name": "43291",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43291"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0213",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0213"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=659567",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=659567"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/12/08/4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/15627"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/files/view/96148/site2nitebigtruck-sql.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/files/view/96148/site2nitebigtruck-sql.txt"
|
||||
},
|
||||
{
|
||||
"name": "42383",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42383"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/files/view/96148/site2nitebigtruck-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/files/view/96148/site2nitebigtruck-sql.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21454745",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21454745"
|
||||
},
|
||||
{
|
||||
"name" : "IC69150",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IC69150"
|
||||
},
|
||||
{
|
||||
"name": "1024901",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1024901"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-3251",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/3251"
|
||||
},
|
||||
{
|
||||
"name": "42639",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42639"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-3251",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/3251"
|
||||
"name": "IC69150",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC69150"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg21454745",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg21454745"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2014-0061",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,56 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://wiki.postgresql.org/wiki/20140220securityrelease",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://wiki.postgresql.org/wiki/20140220securityrelease"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.postgresql.org/about/news/1506/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.postgresql.org/about/news/1506/"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT6448",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT6448"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/kb/HT6536",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/kb/HT6536"
|
||||
},
|
||||
{
|
||||
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2014-10-16-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2864",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2864"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2865",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2865"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0469",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0469.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0211",
|
||||
"refsource": "REDHAT",
|
||||
@ -112,26 +62,76 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0221.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT6448",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT6448"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0469",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0469.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-10-16-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html"
|
||||
},
|
||||
{
|
||||
"name": "http://wiki.postgresql.org/wiki/20140220securityrelease",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.postgresql.org/wiki/20140220securityrelease"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2864",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2864"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0249",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0249.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.postgresql.org/about/news/1506/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.postgresql.org/about/news/1506/"
|
||||
},
|
||||
{
|
||||
"name": "USN-2120-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2120-1"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/kb/HT6536",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT6536"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2865",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2865"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0345",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0368",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2120-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2120-1"
|
||||
},
|
||||
{
|
||||
"name": "61307",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2014-0182",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "RHSA-2014:0743",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
|
||||
},
|
||||
{
|
||||
"name": "[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc"
|
||||
"name": "RHSA-2014:0744",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2014-6288",
|
||||
@ -68,14 +73,9 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0743",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0744",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
|
||||
"name": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2014-0498",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://helpx.adobe.com/security/products/flash-player/apsb14-07.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://helpx.adobe.com/security/products/flash-player/apsb14-07.html"
|
||||
"name": "openSUSE-SU-2014:0278",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201405-04",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201405-04.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://helpx.adobe.com/security/products/flash-player/apsb14-07.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-07.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0196",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0196.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0277",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0278",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0290",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0277",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2014-0769",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2014-0961",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ibm-sim-cve20140961-csrf(92747)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92747"
|
||||
},
|
||||
{
|
||||
"name": "59080",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59080"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21674754",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "67909",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/67909"
|
||||
},
|
||||
{
|
||||
"name" : "59080",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59080"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-sim-cve20140961-csrf(92747)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/92747"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-4062",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS14-046",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-046"
|
||||
"name": "1030721",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030721"
|
||||
},
|
||||
{
|
||||
"name": "69145",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/69145"
|
||||
},
|
||||
{
|
||||
"name" : "1030721",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030721"
|
||||
"name": "MS14-046",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2014-4232",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
||||
},
|
||||
{
|
||||
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
|
||||
@ -68,19 +68,19 @@
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
||||
},
|
||||
{
|
||||
"name" : "68606",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/68606"
|
||||
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||
},
|
||||
{
|
||||
"name": "oracle-cpujul2014-cve20144232(94614)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94614"
|
||||
},
|
||||
{
|
||||
"name": "68606",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68606"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2014-9207",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "71846",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/71846"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774321",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774321"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20141231 cve request: miniunzip directory traversal",
|
||||
"refsource": "MLIST",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "[oss-security] 20150103 Re: cve request: miniunzip directory traversal",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/01/03/16"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774321",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774321"
|
||||
},
|
||||
{
|
||||
"name" : "71846",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/71846"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150113 Reflecting XSS vulnerability in filemanager of CMS b2evolution v. 5.2.0",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Jan/48"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/129940/CMS-b2evolution-5.2.0-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/129940/CMS-b2evolution-5.2.0-Cross-Site-Scripting.html"
|
||||
"name": "http://b2evolution.net/downloads/5-2-1-stable",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://b2evolution.net/downloads/5-2-1-stable"
|
||||
},
|
||||
{
|
||||
"name": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-09.html",
|
||||
@ -68,20 +63,20 @@
|
||||
"url": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-09.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2014-09.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2014-09.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://b2evolution.net/downloads/5-2-1-stable",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://b2evolution.net/downloads/5-2-1-stable"
|
||||
"name": "20150113 Reflecting XSS vulnerability in filemanager of CMS b2evolution v. 5.2.0",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Jan/48"
|
||||
},
|
||||
{
|
||||
"name": "https://twitter.com/SecLists/status/554937224366546944",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://twitter.com/SecLists/status/554937224366546944"
|
||||
},
|
||||
{
|
||||
"name": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2014-09.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2014-09.html"
|
||||
},
|
||||
{
|
||||
"name": "72052",
|
||||
"refsource": "BID",
|
||||
@ -91,6 +86,11 @@
|
||||
"name": "b2evolution-fmfilter-xss(99891)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99891"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/129940/CMS-b2evolution-5.2.0-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/129940/CMS-b2evolution-5.2.0-Cross-Site-Scripting.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2014-9635",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,26 +62,26 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://issues.jenkins-ci.org/browse/JENKINS-25019"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1185151",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185151"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710"
|
||||
},
|
||||
{
|
||||
"name": "https://jenkins.io/changelog-old/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/changelog-old/"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710"
|
||||
},
|
||||
{
|
||||
"name": "72054",
|
||||
"refsource": "BID",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2016-3204",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS16-084",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-084"
|
||||
},
|
||||
{
|
||||
"name" : "MS16-086",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-086"
|
||||
"name": "1036283",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036283"
|
||||
},
|
||||
{
|
||||
"name": "91584",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://www.securitytracker.com/id/1036282"
|
||||
},
|
||||
{
|
||||
"name" : "1036283",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036283"
|
||||
"name": "MS16-086",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-086"
|
||||
},
|
||||
{
|
||||
"name": "MS16-084",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-084"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2016-3215",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-370",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-370"
|
||||
},
|
||||
{
|
||||
"name" : "MS16-068",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-068"
|
||||
},
|
||||
{
|
||||
"name": "MS16-080",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-080"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-370",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-370"
|
||||
},
|
||||
{
|
||||
"name": "1036099",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036099"
|
||||
},
|
||||
{
|
||||
"name": "MS16-068",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-068"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-3555",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
||||
},
|
||||
{
|
||||
"name": "1036402",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036402"
|
||||
},
|
||||
{
|
||||
"name": "91787",
|
||||
"refsource": "BID",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "91997",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91997"
|
||||
},
|
||||
{
|
||||
"name" : "1036402",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036402"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-3873",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://source.android.com/security/bulletin/2016-09-01.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
|
||||
},
|
||||
{
|
||||
"name": "1036763",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036763"
|
||||
},
|
||||
{
|
||||
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20160724 Re: Fwd: CVE for PHP 5.5.38 issues",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2016/07/24/2"
|
||||
},
|
||||
{
|
||||
"name": "http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4",
|
||||
"refsource": "MISC",
|
||||
@ -72,6 +67,11 @@
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-58"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160724 Re: Fwd: CVE for PHP 5.5.38 issues",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2016/07/24/2"
|
||||
},
|
||||
{
|
||||
"name": "92127",
|
||||
"refsource": "BID",
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "43390",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/43390/"
|
||||
"name": "102278",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102278"
|
||||
},
|
||||
{
|
||||
"name": "20171223 [CVE-2016-6914] Ubiquiti UniFi Video v3.7.3 (Windows) Local Privileges Escalation via Insecure Directory Permissions",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Dec/83"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/145533/Ubiquiti-UniFi-Video-3.7.3-Windows-Local-Privilege-Escalation.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/145533/Ubiquiti-UniFi-Video-3.7.3-Windows-Local-Privilege-Escalation.html"
|
||||
},
|
||||
{
|
||||
"name": "https://hackerone.com/reports/140793",
|
||||
"refsource": "MISC",
|
||||
"url": "https://hackerone.com/reports/140793"
|
||||
},
|
||||
{
|
||||
"name" : "102278",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/102278"
|
||||
"name": "43390",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/43390/"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/145533/Ubiquiti-UniFi-Video-3.7.3-Windows-Local-Privilege-Escalation.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/145533/Ubiquiti-UniFi-Video-3.7.3-Windows-Local-Privilege-Escalation.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-130"
|
||||
},
|
||||
{
|
||||
"name" : "94021",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94021"
|
||||
},
|
||||
{
|
||||
"name": "1037241",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037241"
|
||||
},
|
||||
{
|
||||
"name": "94021",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94021"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,60 +52,60 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://nwtime.org/ntp428p9_release/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://nwtime.org/ntp428p9_release/"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.ntp.org/bin/view/Main/NtpBug3067",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.ntp.org/bin/view/Main/NtpBug3067"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name" : "https://bto.bluecoat.com/security-advisory/sa139",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bto.bluecoat.com/security-advisory/sa139"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name" : "FreeBSD-SA-16:39",
|
||||
"refsource" : "FREEBSD",
|
||||
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:0252",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0252.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name": "http://nwtime.org/ntp428p9_release/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://nwtime.org/ntp428p9_release/"
|
||||
},
|
||||
{
|
||||
"name": "VU#633847",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "https://www.kb.cert.org/vuls/id/633847"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "1037354",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037354"
|
||||
},
|
||||
{
|
||||
"name": "https://bto.bluecoat.com/security-advisory/sa139",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bto.bluecoat.com/security-advisory/sa139"
|
||||
},
|
||||
{
|
||||
"name": "94455",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94455"
|
||||
},
|
||||
{
|
||||
"name" : "1037354",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1037354"
|
||||
"name": "FreeBSD-SA-16:39",
|
||||
"refsource": "FREEBSD",
|
||||
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
|
||||
},
|
||||
{
|
||||
"name": "http://support.ntp.org/bin/view/Main/NtpBug3067",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.ntp.org/bin/view/Main/NtpBug3067"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "93102",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93102"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160921 Re: libav: divide-by-zero in sbr_make_f_master (aacsbr.c)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/09/21/9"
|
||||
},
|
||||
{
|
||||
"name" : "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/"
|
||||
},
|
||||
{
|
||||
"name": "https://git.libav.org/?p=libav.git;a=blobdiff;f=libavcodec/aacsbr.c;h=7d156e525b40b197c38db17acf16730845b91e56;hp=dbfb1677813ce6c531e4362d0be7ccf9fdfdd28e;hb=a50a5ff29ec5a8243499769e2bb9b5509ce9fd52;hpb=f55e3ff5891daf3d538b4d9176371960200d68fa",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://git.libav.org/?p=libav.git;a=blobdiff;f=libavcodec/aacsbr.c;h=7d156e525b40b197c38db17acf16730845b91e56;hp=dbfb1677813ce6c531e4362d0be7ccf9fdfdd28e;hb=a50a5ff29ec5a8243499769e2bb9b5509ce9fd52;hpb=f55e3ff5891daf3d538b4d9176371960200d68fa"
|
||||
},
|
||||
{
|
||||
"name" : "93102",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/93102"
|
||||
"name": "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blogs.gentoo.org/ago/2016/09/21/libav-divide-by-zero-in-sbr_make_f_master-aacsbr-c/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207421",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207421"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207422",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207422"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207424",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207424"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207427",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207427"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201706-15",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201706-15"
|
||||
},
|
||||
{
|
||||
"name": "94907",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94907"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207421",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207421"
|
||||
},
|
||||
{
|
||||
"name": "1037459",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037459"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207422",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207422"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201706-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201706-15"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207424",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207424"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00061&languageid=en-fr",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00061&languageid=en-fr"
|
||||
},
|
||||
{
|
||||
"name": "93482",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93482"
|
||||
},
|
||||
{
|
||||
"name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00061&languageid=en-fr",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00061&languageid=en-fr"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-8396",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user