mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
12d52b8218
commit
048abb5526
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060124 [eVuln] miniBloggie Authentication Bypass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/423126/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://evuln.com/vulns/47/summary.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://evuln.com/vulns/47/summary.html"
|
||||
"name": "ADV-2006-0310",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0310"
|
||||
},
|
||||
{
|
||||
"name": "16367",
|
||||
@ -68,29 +63,34 @@
|
||||
"url": "http://www.securityfocus.com/bid/16367"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0310",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0310"
|
||||
"name": "http://evuln.com/vulns/47/summary.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://evuln.com/vulns/47/summary.html"
|
||||
},
|
||||
{
|
||||
"name": "22729",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/22729"
|
||||
},
|
||||
{
|
||||
"name" : "1015534",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015534"
|
||||
},
|
||||
{
|
||||
"name": "18604",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18604"
|
||||
},
|
||||
{
|
||||
"name": "1015534",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015534"
|
||||
},
|
||||
{
|
||||
"name": "minibloggie-login-sql-injection(24280)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24280"
|
||||
},
|
||||
{
|
||||
"name": "20060124 [eVuln] miniBloggie Authentication Bypass",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/423126/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[Dailydave] 20060203 ProtoVer vs Lotus Domino Server 7.0",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.immunitysec.com/pipermail/dailydave/2006-February/002896.html"
|
||||
},
|
||||
{
|
||||
"name": "16523",
|
||||
"refsource": "BID",
|
||||
@ -68,9 +63,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0458"
|
||||
},
|
||||
{
|
||||
"name" : "1015592",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015592"
|
||||
"name": "lotus-domino-ldap-dos(24518)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24518"
|
||||
},
|
||||
{
|
||||
"name": "18738",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "http://secunia.com/advisories/18738"
|
||||
},
|
||||
{
|
||||
"name" : "lotus-domino-ldap-dos(24518)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24518"
|
||||
"name": "1015592",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015592"
|
||||
},
|
||||
{
|
||||
"name": "[Dailydave] 20060203 ProtoVer vs Lotus Domino Server 7.0",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.immunitysec.com/pipermail/dailydave/2006-February/002896.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,35 +57,35 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/427321/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0759",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0759"
|
||||
},
|
||||
{
|
||||
"name": "freeforum-func-xss(24925)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24925"
|
||||
},
|
||||
{
|
||||
"name": "http://evuln.com/vulns/89/summary.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://evuln.com/vulns/89/summary.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://soft.zoneo.net/freeForum/changes.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://soft.zoneo.net/freeForum/changes.php"
|
||||
},
|
||||
{
|
||||
"name": "16877",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16877"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0759",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0759"
|
||||
"name": "http://soft.zoneo.net/freeForum/changes.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://soft.zoneo.net/freeForum/changes.php"
|
||||
},
|
||||
{
|
||||
"name": "19020",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19020"
|
||||
},
|
||||
{
|
||||
"name" : "freeforum-func-xss(24925)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24925"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060306 histhost v1.0.0 xss and possible rmdir",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/426931/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060314 Re: histhost v1.0.0 xss and possible rmdir",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/427631/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "19155",
|
||||
"refsource": "SECUNIA",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "hithost-deleteuser-directory-deletion(25106)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25106"
|
||||
},
|
||||
{
|
||||
"name": "20060306 histhost v1.0.0 xss and possible rmdir",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/426931/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20060314 Re: histhost v1.0.0 xss and possible rmdir",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/427631/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security-info@sgi.com",
|
||||
"ID": "CVE-2006-1342",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,95 +52,95 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/451419/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/451426/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[linux-netdev] 20060304 BUG: Small information leak in SO_ORIGINAL_DST (2.4 and 2.6) and",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=linux-netdev&m=114148078223594&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=09d3b3dcfa80c9094f1748c1be064b9326c9ef2b",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=09d3b3dcfa80c9094f1748c1be064b9326c9ef2b"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/download/esx/esx-202-200610-patch.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/download/esx/esx-202-200610-patch.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/download/esx/esx-213-200610-patch.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/download/esx/esx-254-200610-patch.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/download/esx/esx-254-200610-patch.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2006:0579",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0579.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2006:0580",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0580.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2006:028",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2006-05-31.html"
|
||||
},
|
||||
{
|
||||
"name" : "17203",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/17203"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4502",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4502"
|
||||
},
|
||||
{
|
||||
"name" : "19357",
|
||||
"name": "RHSA-2006:0579",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2006-0579.html"
|
||||
},
|
||||
{
|
||||
"name": "22875",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19357"
|
||||
"url": "http://secunia.com/advisories/22875"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/download/esx/esx-202-200610-patch.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html"
|
||||
},
|
||||
{
|
||||
"name": "20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "21035",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21035"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/download/esx/esx-213-200610-patch.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2006:028",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2006-05-31.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2006:0580",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2006-0580.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/download/esx/esx-254-200610-patch.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/download/esx/esx-254-200610-patch.html"
|
||||
},
|
||||
{
|
||||
"name": "19357",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19357"
|
||||
},
|
||||
{
|
||||
"name": "20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20398",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20398"
|
||||
},
|
||||
{
|
||||
"name" : "22875",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22875"
|
||||
"name": "20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "17203",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17203"
|
||||
},
|
||||
{
|
||||
"name": "20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/451419/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "[linux-netdev] 20060304 BUG: Small information leak in SO_ORIGINAL_DST (2.4 and 2.6) and",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=linux-netdev&m=114148078223594&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "PQ62144",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg21053738"
|
||||
"name": "websphere-http-header-dos(25619)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25619"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1214",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://securitytracker.com/id?1015857"
|
||||
},
|
||||
{
|
||||
"name" : "websphere-http-header-dos(25619)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25619"
|
||||
"name": "PQ62144",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21053738"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060929 Sql injection in PostNuke [Admin section]",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/447361/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://community.postnuke.com/index.php?name=News&file=article&sid=2783",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://community.postnuke.com/index.php?name=News&file=article&sid=2783"
|
||||
},
|
||||
{
|
||||
"name" : "20317",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20317"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3886",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3886"
|
||||
},
|
||||
{
|
||||
"name" : "22197",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22197"
|
||||
"name": "postnuke-admin-sql-injection(29271)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29271"
|
||||
},
|
||||
{
|
||||
"name": "1669",
|
||||
@ -83,9 +63,29 @@
|
||||
"url": "http://securityreason.com/securityalert/1669"
|
||||
},
|
||||
{
|
||||
"name" : "postnuke-admin-sql-injection(29271)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29271"
|
||||
"name": "http://community.postnuke.com/index.php?name=News&file=article&sid=2783",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://community.postnuke.com/index.php?name=News&file=article&sid=2783"
|
||||
},
|
||||
{
|
||||
"name": "22197",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22197"
|
||||
},
|
||||
{
|
||||
"name": "20317",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20317"
|
||||
},
|
||||
{
|
||||
"name": "20060929 Sql injection in PostNuke [Admin section]",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/447361/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3886",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3886"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20509",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20509"
|
||||
},
|
||||
{
|
||||
"name": "22081",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22081"
|
||||
},
|
||||
{
|
||||
"name": "20509",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20509"
|
||||
},
|
||||
{
|
||||
"name": "safeword-login-signer-information-disclosure(29515)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061012 news defilante horizontale <= 4.1.1 Remote File Include Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/448655/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "2545",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2545"
|
||||
},
|
||||
{
|
||||
"name" : "20233",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20233"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4079",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4079"
|
||||
},
|
||||
{
|
||||
"name": "newsdefilante-functionsnewshr-file-include(29570)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29570"
|
||||
},
|
||||
{
|
||||
"name": "20233",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20233"
|
||||
},
|
||||
{
|
||||
"name": "22434",
|
||||
"refsource": "SECUNIA",
|
||||
@ -83,9 +83,9 @@
|
||||
"url": "http://securityreason.com/securityalert/1749"
|
||||
},
|
||||
{
|
||||
"name" : "newsdefilante-functionsnewshr-file-include(29570)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29570"
|
||||
"name": "20061012 news defilante horizontale <= 4.1.1 Remote File Include Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/448655/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,41 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061110 ZDI-06-039: Marshal MailMarshal ARJ Extraction Directory Traversal Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/451143/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-06-039.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-06-039.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.marshal.com/kb/article.aspx?id=11450",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.marshal.com/kb/article.aspx?id=11450"
|
||||
},
|
||||
{
|
||||
"name" : "20999",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20999"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4457",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4457"
|
||||
},
|
||||
{
|
||||
"name" : "1017209",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1017209"
|
||||
},
|
||||
{
|
||||
"name" : "22806",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22806"
|
||||
},
|
||||
{
|
||||
"name": "1857",
|
||||
"refsource": "SREASON",
|
||||
@ -96,6 +61,41 @@
|
||||
"name": "mailmarshal-arj-code-execution(30188)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30188"
|
||||
},
|
||||
{
|
||||
"name": "22806",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22806"
|
||||
},
|
||||
{
|
||||
"name": "20999",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20999"
|
||||
},
|
||||
{
|
||||
"name": "1017209",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017209"
|
||||
},
|
||||
{
|
||||
"name": "20061110 ZDI-06-039: Marshal MailMarshal ARJ Extraction Directory Traversal Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/451143/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4457",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4457"
|
||||
},
|
||||
{
|
||||
"name": "http://www.marshal.com/kb/article.aspx?id=11450",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.marshal.com/kb/article.aspx?id=11450"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-039.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-039.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3831",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3831"
|
||||
},
|
||||
{
|
||||
"name" : "23757",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23757"
|
||||
"name": "pstruhcz-download-directory-traversal(34005)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34005"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1629",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1629"
|
||||
},
|
||||
{
|
||||
"name": "23757",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23757"
|
||||
},
|
||||
{
|
||||
"name": "38458",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38458"
|
||||
},
|
||||
{
|
||||
"name" : "pstruhcz-download-directory-traversal(34005)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34005"
|
||||
"name": "3831",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3831"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://isc.sans.org/diary.html?storyid=2823",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://isc.sans.org/diary.html?storyid=2823"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/support/search/view/860/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/support/search/view/860/"
|
||||
},
|
||||
{
|
||||
"name" : "24080",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24080"
|
||||
},
|
||||
{
|
||||
"name" : "36229",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36229"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1888",
|
||||
"refsource": "VUPEN",
|
||||
@ -82,11 +62,31 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1018089"
|
||||
},
|
||||
{
|
||||
"name": "http://isc.sans.org/diary.html?storyid=2823",
|
||||
"refsource": "MISC",
|
||||
"url": "http://isc.sans.org/diary.html?storyid=2823"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/support/search/view/860/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/support/search/view/860/"
|
||||
},
|
||||
{
|
||||
"name": "36229",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36229"
|
||||
},
|
||||
{
|
||||
"name": "25278",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25278"
|
||||
},
|
||||
{
|
||||
"name": "24080",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24080"
|
||||
},
|
||||
{
|
||||
"name": "opera-bittorrent-bo(34470)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2007-2930",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,85 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070827 BIND 8 EOL and BIND 8 DNS Cache Poisoning (Amit Klein, Trusteer)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/477870/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20071001 Re: BIND 8 EOL and BIND 8 DNS Cache Poisoning (Amit Klein, Trusteer)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/481424/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20071006 Re: BIND 8 EOL and BIND 8 DNS Cache Poisoning (Amit Klein, Trusteer)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/481659/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.trusteer.com/docs/bind8dns.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.trusteer.com/docs/bind8dns.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.isc.org/index.pl?/sw/bind/bind8-eol.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.isc.org/index.pl?/sw/bind/bind8-eol.php"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=653968",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=653968"
|
||||
},
|
||||
{
|
||||
"name" : "http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2007/43/022954-01.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2007/43/022954-01.pdf"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-448.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-448.htm"
|
||||
},
|
||||
{
|
||||
"name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3975",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3975"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02289",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01283837"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT071461",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01283837"
|
||||
},
|
||||
{
|
||||
"name" : "103063",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103063-1"
|
||||
},
|
||||
{
|
||||
"name": "200859",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200859-1"
|
||||
},
|
||||
{
|
||||
"name" : "VU#927905",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/927905"
|
||||
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=653968",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=653968"
|
||||
},
|
||||
{
|
||||
"name" : "R-333",
|
||||
"refsource" : "CIAC",
|
||||
"url" : "http://www.ciac.org/ciac/bulletins/r-333.shtml"
|
||||
"name": "ADV-2007-3936",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3936"
|
||||
},
|
||||
{
|
||||
"name" : "25459",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25459"
|
||||
"name": "27433",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27433"
|
||||
},
|
||||
{
|
||||
"name": "20071001 Re: BIND 8 EOL and BIND 8 DNS Cache Poisoning (Amit Klein, Trusteer)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/481424/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3192",
|
||||
@ -143,29 +93,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2991"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3639",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3639"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3668",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3668"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3936",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3936"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:2154",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2154"
|
||||
},
|
||||
{
|
||||
"name" : "1018615",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018615"
|
||||
"name": "HPSBUX02289",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01283837"
|
||||
},
|
||||
{
|
||||
"name": "26629",
|
||||
@ -173,14 +103,14 @@
|
||||
"url": "http://secunia.com/advisories/26629"
|
||||
},
|
||||
{
|
||||
"name" : "26858",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26858"
|
||||
"name": "1018615",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018615"
|
||||
},
|
||||
{
|
||||
"name" : "27433",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27433"
|
||||
"name": "http://www.trusteer.com/docs/bind8dns.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.trusteer.com/docs/bind8dns.html"
|
||||
},
|
||||
{
|
||||
"name": "27459",
|
||||
@ -188,14 +118,84 @@
|
||||
"url": "http://secunia.com/advisories/27459"
|
||||
},
|
||||
{
|
||||
"name" : "27465",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27465"
|
||||
"name": "25459",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25459"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3668",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3668"
|
||||
},
|
||||
{
|
||||
"name": "27696",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27696"
|
||||
},
|
||||
{
|
||||
"name": "http://www.isc.org/index.pl?/sw/bind/bind8-eol.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.isc.org/index.pl?/sw/bind/bind8-eol.php"
|
||||
},
|
||||
{
|
||||
"name": "20070827 BIND 8 EOL and BIND 8 DNS Cache Poisoning (Amit Klein, Trusteer)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/477870/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "27465",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27465"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3639",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3639"
|
||||
},
|
||||
{
|
||||
"name": "http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2007/43/022954-01.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2007/43/022954-01.pdf"
|
||||
},
|
||||
{
|
||||
"name": "26858",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26858"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:2154",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2154"
|
||||
},
|
||||
{
|
||||
"name": "VU#927905",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/927905"
|
||||
},
|
||||
{
|
||||
"name": "103063",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103063-1"
|
||||
},
|
||||
{
|
||||
"name": "SSRT071461",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01283837"
|
||||
},
|
||||
{
|
||||
"name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3975",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3975"
|
||||
},
|
||||
{
|
||||
"name": "R-333",
|
||||
"refsource": "CIAC",
|
||||
"url": "http://www.ciac.org/ciac/bulletins/r-333.shtml"
|
||||
},
|
||||
{
|
||||
"name": "20071006 Re: BIND 8 EOL and BIND 8 DNS Cache Poisoning (Amit Klein, Trusteer)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/481659/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "scp-cliproxy-activex-bo(56355)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56355"
|
||||
},
|
||||
{
|
||||
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_02",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_02"
|
||||
},
|
||||
{
|
||||
"name": "20100219 [DSECRG-09-039] Symantec Antivirus 10.0 ActiveX - buffer Overflow.",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -63,29 +73,19 @@
|
||||
"url": "http://dsecrg.com/pages/vul/show.php?id=139"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_02",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_02"
|
||||
"name": "38651",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38651"
|
||||
},
|
||||
{
|
||||
"name": "38222",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38222"
|
||||
},
|
||||
{
|
||||
"name" : "38651",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38651"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0412",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0412"
|
||||
},
|
||||
{
|
||||
"name" : "scp-cliproxy-activex-bo(56355)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56355"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100912 MVSA-10-007 / CVE-2010-0152 - IBM Proventia Mail Security System - Multiple persistent and reflected XSS vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/513629/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ventuneac.net/security-advisories/MVSA-10-007",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.ventuneac.net/security-advisories/MVSA-10-007"
|
||||
},
|
||||
{
|
||||
"name": "20100912 MVSA-10-007 / CVE-2010-0152 - IBM Proventia Mail Security System - Multiple persistent and reflected XSS vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/513629/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,110 +52,110 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100402 ZDI-10-046: Mozilla Firefox Web Worker Array Remote Code Execution Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/510533/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-046",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-046"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2010/mfsa2010-02.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2010/mfsa2010-02.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=531222",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=531222"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=533000",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=533000"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=534051",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=534051"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1999",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2010/dsa-1999"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2010-1727",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035426.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2010-1932",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035346.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2010-1936",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035367.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2010:042",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:042"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2010:0112",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0112.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2010:015",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-895-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-895-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-896-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-896-1"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11166",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11166"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:8465",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8465"
|
||||
},
|
||||
{
|
||||
"name" : "37242",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37242"
|
||||
"name": "mozilla-webworkers-code-execution(56360)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56360"
|
||||
},
|
||||
{
|
||||
"name": "38847",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38847"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2010:015",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2010:042",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:042"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-1936",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035367.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2010:0112",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0112.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-1932",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035346.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:8465",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8465"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1999",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2010/dsa-1999"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=534051",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=534051"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-1727",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035426.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2010/mfsa2010-02.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2010/mfsa2010-02.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-896-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-896-1"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0405",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0405"
|
||||
},
|
||||
{
|
||||
"name" : "mozilla-webworkers-code-execution(56360)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56360"
|
||||
"name": "37242",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37242"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=533000",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=533000"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11166",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11166"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=531222",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=531222"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-046",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-046"
|
||||
},
|
||||
{
|
||||
"name": "20100402 ZDI-10-046: Mozilla Firefox Web Worker Array Remote Code Execution Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/510533/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2010-0255",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,60 +57,60 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/509345/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://isc.sans.org/diary.html?n&storyid=8152",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://isc.sans.org/diary.html?n&storyid=8152"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag"
|
||||
},
|
||||
{
|
||||
"name" : "http://blogs.technet.com/msrc/archive/2010/02/03/security-advisory-980088-released.aspx",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://blogs.technet.com/msrc/archive/2010/02/03/security-advisory-980088-released.aspx"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.microsoft.com/technet/security/advisory/980088.mspx",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.microsoft.com/technet/security/advisory/980088.mspx"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/css/P8/documents/100089747",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/css/P8/documents/100089747"
|
||||
},
|
||||
{
|
||||
"name" : "MS10-035",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035"
|
||||
},
|
||||
{
|
||||
"name" : "TA10-159B",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
|
||||
},
|
||||
{
|
||||
"name" : "38055",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/38055"
|
||||
},
|
||||
{
|
||||
"name" : "38056",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/38056"
|
||||
},
|
||||
{
|
||||
"name": "62156",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/62156"
|
||||
},
|
||||
{
|
||||
"name": "38055",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38055"
|
||||
},
|
||||
{
|
||||
"name": "http://www.microsoft.com/technet/security/advisory/980088.mspx",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.microsoft.com/technet/security/advisory/980088.mspx"
|
||||
},
|
||||
{
|
||||
"name": "MS10-035",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035"
|
||||
},
|
||||
{
|
||||
"name": "http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag"
|
||||
},
|
||||
{
|
||||
"name": "TA10-159B",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
|
||||
},
|
||||
{
|
||||
"name": "http://isc.sans.org/diary.html?n&storyid=8152",
|
||||
"refsource": "MISC",
|
||||
"url": "http://isc.sans.org/diary.html?n&storyid=8152"
|
||||
},
|
||||
{
|
||||
"name": "http://blogs.technet.com/msrc/archive/2010/02/03/security-advisory-980088-released.aspx",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blogs.technet.com/msrc/archive/2010/02/03/security-advisory-980088-released.aspx"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:7145",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7145"
|
||||
},
|
||||
{
|
||||
"name": "38056",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38056"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "38494",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38494"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/1002-exploits/audistats-sql.txt",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "11334",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/11334"
|
||||
},
|
||||
{
|
||||
"name" : "38494",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38494"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "67689",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/67689"
|
||||
},
|
||||
{
|
||||
"name": "14838",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -63,19 +68,14 @@
|
||||
"url": "http://packetstormsecurity.org/1008-exploits/seagull-sql.txt"
|
||||
},
|
||||
{
|
||||
"name" : "67689",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/67689"
|
||||
"name": "seagull-index-sql-injection(61469)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61469"
|
||||
},
|
||||
{
|
||||
"name": "41169",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41169"
|
||||
},
|
||||
{
|
||||
"name" : "seagull-index-sql-injection(61469)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/61469"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2010-3335",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,36 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1024705",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1024705"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11739",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11739"
|
||||
},
|
||||
{
|
||||
"name": "42144",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42144"
|
||||
},
|
||||
{
|
||||
"name": "44659",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/44659"
|
||||
},
|
||||
{
|
||||
"name": "38521",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38521"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-2923",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/2923"
|
||||
},
|
||||
{
|
||||
"name": "MS10-087",
|
||||
"refsource": "MS",
|
||||
@ -61,36 +91,6 @@
|
||||
"name": "TA10-313A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA10-313A.html"
|
||||
},
|
||||
{
|
||||
"name" : "44659",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/44659"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11739",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11739"
|
||||
},
|
||||
{
|
||||
"name" : "1024705",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1024705"
|
||||
},
|
||||
{
|
||||
"name" : "38521",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38521"
|
||||
},
|
||||
{
|
||||
"name" : "42144",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42144"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-2923",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/2923"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2010-3824",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,60 +52,60 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4455",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4455"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4456",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4456"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2010-11-18-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2010-11-22-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2011:002",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:12300",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12300"
|
||||
},
|
||||
{
|
||||
"name" : "42314",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42314"
|
||||
},
|
||||
{
|
||||
"name": "43068",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43068"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-3046",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/3046"
|
||||
"name": "http://support.apple.com/kb/HT4455",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4455"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0212",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0212"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-3046",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/3046"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2011:002",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2010-11-18-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "42314",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42314"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4456",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4456"
|
||||
},
|
||||
{
|
||||
"name": "safari-use-elements-code-execution(63363)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63363"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2010-11-22-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2010-3940",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS10-098",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-098"
|
||||
},
|
||||
{
|
||||
"name": "TA10-348A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA10-348A.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:12194",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12194"
|
||||
"name": "MS10-098",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-098"
|
||||
},
|
||||
{
|
||||
"name": "1024880",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1024880"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:12194",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12194"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[linux-kernel] 20100915 [PATCH] drivers/char/amiserial.c: prevent reading uninitialized stack memory",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lkml.org/lkml/2010/9/15/389"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/09/25/2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2010/10/07/1"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2010/10/06/6"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2010/10/25/3"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d281da7ff6f70efca0553c288bb883e8605b3862",
|
||||
"refsource": "MISC",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d281da7ff6f70efca0553c288bb883e8605b3862"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/10/06/6"
|
||||
},
|
||||
{
|
||||
"name": "[linux-kernel] 20100915 [PATCH] drivers/char/amiserial.c: prevent reading uninitialized stack memory",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lkml.org/lkml/2010/9/15/389"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=648661",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=648661"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/10/07/1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/10/25/3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2010-4085",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1024664",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1024664"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "oval:org.mitre.oval:def:11518",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518"
|
||||
},
|
||||
{
|
||||
"name" : "1024664",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1024664"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2010-4444",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,21 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
|
||||
},
|
||||
{
|
||||
"name": "45884",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/45884"
|
||||
},
|
||||
{
|
||||
"name" : "70579",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/70579"
|
||||
},
|
||||
{
|
||||
"name": "70580",
|
||||
"refsource": "OSVDB",
|
||||
@ -78,14 +68,24 @@
|
||||
"url": "http://secunia.com/advisories/42986"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0153",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0153"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
|
||||
},
|
||||
{
|
||||
"name": "oracle-sso-java-unauth-access(64811)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64811"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0153",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0153"
|
||||
},
|
||||
{
|
||||
"name": "70579",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/70579"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "ftp://public.dhe.ibm.com/software/rational/clearquest/7.1.1/7.1.1.4-RATL-RCQ/7.1.1.4-RATL-RCQ.ux.readme",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "ftp://public.dhe.ibm.com/software/rational/clearquest/7.1.1/7.1.1.4-RATL-RCQ/7.1.1.4-RATL-RCQ.ux.readme"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21125139",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21125139"
|
||||
"name": "clearquest-back-reference-sec-bypass(64439)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64439"
|
||||
},
|
||||
{
|
||||
"name": "PM22186",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM22186"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21125139",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21125139"
|
||||
},
|
||||
{
|
||||
"name": "ftp://public.dhe.ibm.com/software/rational/clearquest/7.1.1/7.1.1.4-RATL-RCQ/7.1.1.4-RATL-RCQ.ux.readme",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "ftp://public.dhe.ibm.com/software/rational/clearquest/7.1.1/7.1.1.4-RATL-RCQ/7.1.1.4-RATL-RCQ.ux.readme"
|
||||
},
|
||||
{
|
||||
"name": "45648",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/45648"
|
||||
},
|
||||
{
|
||||
"name" : "clearquest-back-reference-sec-bypass(64439)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64439"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2014-0054",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "66148",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/66148"
|
||||
},
|
||||
{
|
||||
"name": "https://jira.spring.io/browse/SPR-11376",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,11 +72,6 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0400.html"
|
||||
},
|
||||
{
|
||||
"name" : "66148",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/66148"
|
||||
},
|
||||
{
|
||||
"name": "57915",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2014-0207",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,60 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[file] 20140612 file-5.19 is now available",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://mx.gw.com/pipermail/file/2014/001553.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.php.net/ChangeLog-5.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.php.net/ChangeLog-5.php"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.php.net/bug.php?id=67326",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.php.net/bug.php?id=67326"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1091842",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091842"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/file/file/commit/6d209c1c489457397a5763bca4b28e43aac90391",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/file/file/commit/6d209c1c489457397a5763bca4b28e43aac90391"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT6443",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT6443"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT204659",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT204659"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||
"name": "68243",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68243"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-04-08-2",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2974",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2974"
|
||||
"name": "RHSA-2014:1766",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3021",
|
||||
@ -118,39 +83,74 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101681",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:1765",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:1766",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:1236",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
|
||||
},
|
||||
{
|
||||
"name" : "68243",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/68243"
|
||||
"name": "DSA-2974",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2974"
|
||||
},
|
||||
{
|
||||
"name": "59794",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59794"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php.net/ChangeLog-5.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.php.net/ChangeLog-5.php"
|
||||
},
|
||||
{
|
||||
"name": "[file] 20140612 file-5.19 is now available",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://mx.gw.com/pipermail/file/2014/001553.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/file/file/commit/6d209c1c489457397a5763bca4b28e43aac90391",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/file/file/commit/6d209c1c489457397a5763bca4b28e43aac90391"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.php.net/bug.php?id=67326",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.php.net/bug.php?id=67326"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-04-08-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT6443",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT6443"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:1765",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101681",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
|
||||
},
|
||||
{
|
||||
"name": "59831",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59831"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:1236",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-0265",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,6 +52,66 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "SUSE-SU-2014:1316",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "59134",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59134"
|
||||
},
|
||||
{
|
||||
"name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1108744",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108744"
|
||||
},
|
||||
{
|
||||
"name": "USN-2335-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2335-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2334-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2334-1"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:1319",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "60564",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60564"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc"
|
||||
},
|
||||
{
|
||||
"name": "59777",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59777"
|
||||
},
|
||||
{
|
||||
"name": "61310",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/61310"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140611 Re: CVE request: Linux kernel / target information leak",
|
||||
"refsource": "MLIST",
|
||||
@ -61,66 +121,6 @@
|
||||
"name": "[target-devel] 20140616 [PATCH] target: Explicitly clear ramdisk_mcp backend pages",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1108744",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1108744"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:1316",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:1319",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2334-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2334-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2335-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2335-1"
|
||||
},
|
||||
{
|
||||
"name" : "59777",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59777"
|
||||
},
|
||||
{
|
||||
"name" : "60564",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/60564"
|
||||
},
|
||||
{
|
||||
"name" : "61310",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/61310"
|
||||
},
|
||||
{
|
||||
"name" : "59134",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59134"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/126984/WebTitan-4.01-Build-68-SQL-Injection-Command-Execution.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/126984/WebTitan-4.01-Build-68-SQL-Injection-Command-Execution.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140606-0_WebTitan_Multiple_Vulnerabilities_v10.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140606-0_WebTitan_Multiple_Vulnerabilities_v10.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/126984/WebTitan-4.01-Build-68-SQL-Injection-Command-Execution.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/126984/WebTitan-4.01-Build-68-SQL-Injection-Command-Execution.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2014-4489",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/HT204244",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/HT204244"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/HT204245",
|
||||
"refsource": "CONFIRM",
|
||||
@ -68,24 +63,29 @@
|
||||
"url": "http://support.apple.com/HT204246"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-01-27-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html"
|
||||
"name": "1031650",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031650"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-01-27-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/HT204244",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/HT204244"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-01-27-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-01-27-4",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "1031650",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1031650"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security_alert@emc.com",
|
||||
"ID": "CVE-2014-4633",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2014-8639",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,160 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2015-04.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2015-04.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1095859",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1095859"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://linux.oracle.com/errata/ELSA-2015-0046.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://linux.oracle.com/errata/ELSA-2015-0046.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://linux.oracle.com/errata/ELSA-2015-0047.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://linux.oracle.com/errata/ELSA-2015-0047.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3127",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3127"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3132",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3132"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201504-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:0046",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0046.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:0047",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0047.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0133",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0077",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0192",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:0171",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:0173",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:0180",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1266",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2460-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2460-1"
|
||||
},
|
||||
{
|
||||
"name" : "72046",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/72046"
|
||||
},
|
||||
{
|
||||
"name" : "1031533",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1031533"
|
||||
},
|
||||
{
|
||||
"name" : "1031534",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1031534"
|
||||
},
|
||||
{
|
||||
"name" : "62237",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62237"
|
||||
},
|
||||
{
|
||||
"name": "62242",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62242"
|
||||
},
|
||||
{
|
||||
"name" : "62250",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62250"
|
||||
"name": "1031533",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031533"
|
||||
},
|
||||
{
|
||||
"name" : "62446",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62446"
|
||||
"name": "USN-2460-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2460-1"
|
||||
},
|
||||
{
|
||||
"name" : "62657",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62657"
|
||||
},
|
||||
{
|
||||
"name" : "62790",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62790"
|
||||
},
|
||||
{
|
||||
"name" : "62253",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62253"
|
||||
},
|
||||
{
|
||||
"name" : "62273",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62273"
|
||||
},
|
||||
{
|
||||
"name" : "62274",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62274"
|
||||
},
|
||||
{
|
||||
"name" : "62293",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62293"
|
||||
"name": "openSUSE-SU-2015:0192",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "62304",
|
||||
@ -213,19 +83,9 @@
|
||||
"url": "http://secunia.com/advisories/62304"
|
||||
},
|
||||
{
|
||||
"name" : "62313",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62313"
|
||||
},
|
||||
{
|
||||
"name" : "62315",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62315"
|
||||
},
|
||||
{
|
||||
"name" : "62316",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62316"
|
||||
"name": "http://linux.oracle.com/errata/ELSA-2015-0047.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://linux.oracle.com/errata/ELSA-2015-0047.html"
|
||||
},
|
||||
{
|
||||
"name": "62259",
|
||||
@ -233,19 +93,159 @@
|
||||
"url": "http://secunia.com/advisories/62259"
|
||||
},
|
||||
{
|
||||
"name" : "62283",
|
||||
"name": "62250",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62283"
|
||||
"url": "http://secunia.com/advisories/62250"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:0173",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html"
|
||||
},
|
||||
{
|
||||
"name": "62237",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62237"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0077",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name": "62418",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62418"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:0171",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html"
|
||||
},
|
||||
{
|
||||
"name": "62316",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62316"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3132",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3132"
|
||||
},
|
||||
{
|
||||
"name": "62274",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62274"
|
||||
},
|
||||
{
|
||||
"name": "firefox-cve20148639-session-hijacking(99959)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99959"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201504-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name": "62313",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62313"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:0047",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0047.html"
|
||||
},
|
||||
{
|
||||
"name": "62790",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62790"
|
||||
},
|
||||
{
|
||||
"name": "62293",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62293"
|
||||
},
|
||||
{
|
||||
"name": "62283",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62283"
|
||||
},
|
||||
{
|
||||
"name": "62446",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62446"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
|
||||
},
|
||||
{
|
||||
"name": "62657",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62657"
|
||||
},
|
||||
{
|
||||
"name": "62273",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62273"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2014/mfsa2015-04.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2014/mfsa2015-04.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0133",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1266",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3127",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3127"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:0180",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html"
|
||||
},
|
||||
{
|
||||
"name": "62315",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62315"
|
||||
},
|
||||
{
|
||||
"name": "http://linux.oracle.com/errata/ELSA-2015-0046.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://linux.oracle.com/errata/ELSA-2015-0046.html"
|
||||
},
|
||||
{
|
||||
"name": "62253",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62253"
|
||||
},
|
||||
{
|
||||
"name": "1031534",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031534"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1095859",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1095859"
|
||||
},
|
||||
{
|
||||
"name": "72046",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,55 +52,55 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20141125 CVE Request: Graphviz format string vuln",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2014/q4/784"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20141201 Re: Re: CVE Request: Graphviz format string vuln",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2014/q4/872"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081"
|
||||
},
|
||||
{
|
||||
"name" : "http://advisories.mageia.org/MGASA-2014-0520.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://advisories.mageia.org/MGASA-2014-0520.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3098",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-3098"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2014:248",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:248"
|
||||
},
|
||||
{
|
||||
"name": "graphviz-format-sting(98949)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98949"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2015:187",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:187"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20141201 Re: Re: CVE Request: Graphviz format string vuln",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q4/872"
|
||||
},
|
||||
{
|
||||
"name": "http://advisories.mageia.org/MGASA-2014-0520.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://advisories.mageia.org/MGASA-2014-0520.html"
|
||||
},
|
||||
{
|
||||
"name": "71283",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/71283"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3098",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-3098"
|
||||
},
|
||||
{
|
||||
"name": "60166",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60166"
|
||||
},
|
||||
{
|
||||
"name" : "graphviz-format-sting(98949)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98949"
|
||||
"name": "[oss-security] 20141125 CVE Request: Graphviz format string vuln",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q4/784"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20151125 Slider Revolution/Showbiz Pro shell upload exploit",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Nov/78"
|
||||
"name": "https://wpvulndb.com/vulnerabilities/7954",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpvulndb.com/vulnerabilities/7954"
|
||||
},
|
||||
{
|
||||
"name": "https://blog.sucuri.net/2014/12/revslider-vulnerability-leads-to-massive-wordpress-soaksoak-compromise.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blog.sucuri.net/2014/12/revslider-vulnerability-leads-to-massive-wordpress-soaksoak-compromise.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.themepunch.com/products/old-revolution-slider-pre-4-2-vulnerabilty-explained/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.themepunch.com/products/old-revolution-slider-pre-4-2-vulnerabilty-explained/"
|
||||
},
|
||||
{
|
||||
"name": "20151125 Slider Revolution/Showbiz Pro shell upload exploit",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Nov/78"
|
||||
},
|
||||
{
|
||||
"name": "71306",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/71306"
|
||||
},
|
||||
{
|
||||
"name": "https://plugins.trac.wordpress.org/browser/patch-for-revolution-slider/trunk/revsliderpatch.php",
|
||||
"refsource": "MISC",
|
||||
@ -71,21 +86,6 @@
|
||||
"name": "https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "https://wpvulndb.com/vulnerabilities/7954",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://wpvulndb.com/vulnerabilities/7954"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.themepunch.com/products/old-revolution-slider-pre-4-2-vulnerabilty-explained/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.themepunch.com/products/old-revolution-slider-pre-4-2-vulnerabilty-explained/"
|
||||
},
|
||||
{
|
||||
"name" : "71306",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/71306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1833",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2017:0023",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160602 Re: ImageMagick CVEs",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/02/13"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1343507",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1343507"
|
||||
"name": "openSUSE-SU-2016:1748",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1784",
|
||||
@ -72,25 +82,15 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1748",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1833",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2017:0023",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-3131-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3131-1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343507",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343507"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/8.7.0"
|
||||
},
|
||||
{
|
||||
"name" : "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"
|
||||
},
|
||||
{
|
||||
"name": "95896",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95896"
|
||||
},
|
||||
{
|
||||
"name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-3835",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3882",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2017/dsa-3882"
|
||||
},
|
||||
{
|
||||
"name": "99375",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99375"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3882",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3882"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,31 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/07/19/7"
|
||||
},
|
||||
{
|
||||
"name": "92055",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92055"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201706-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201706-02"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/shadow-maint/shadow/issues/27",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/shadow-maint/shadow/issues/27"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.suse.com/show_bug.cgi?id=979282",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=979282"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160725 Re: Re: [Pkg-shadow-devel] subuid security patches for shadow package",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/07/25/7"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160719 subuid security patches for shadow package",
|
||||
"refsource": "MLIST",
|
||||
@ -67,35 +92,10 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/07/20/2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20160725 Re: Re: [Pkg-shadow-devel] subuid security patches for shadow package",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/07/25/7"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=979282",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=979282"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/shadow-maint/shadow/issues/27",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/shadow-maint/shadow/issues/27"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3793",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3793"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201706-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201706-02"
|
||||
},
|
||||
{
|
||||
"name" : "92055",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/92055"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161116-asr"
|
||||
},
|
||||
{
|
||||
"name" : "94361",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94361"
|
||||
},
|
||||
{
|
||||
"name": "1037308",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037308"
|
||||
},
|
||||
{
|
||||
"name": "94361",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94361"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.phpmyadmin.net/security/PMASA-2016-44/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.phpmyadmin.net/security/PMASA-2016-44/"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "95914",
|
||||
"refsource": "BID",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-7013",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1036986",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036986"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "93496",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93496"
|
||||
},
|
||||
{
|
||||
"name" : "1036986",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036986"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-7309",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207421",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207421"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207422",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207422"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207424",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207424"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207427",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207427"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201706-15",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201706-15"
|
||||
},
|
||||
{
|
||||
"name": "94907",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94907"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207421",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207421"
|
||||
},
|
||||
{
|
||||
"name": "1037459",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037459"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207422",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207422"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201706-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201706-15"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207424",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207424"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-7691",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20161001 Re: GraphicsMagick CVE request: 8BIM/8BIMW unsigned underflow leads to heap overflow",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/10/01/7"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1381148",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1381148"
|
||||
},
|
||||
{
|
||||
"name": "https://sourceforge.net/p/graphicsmagick/code/ci/5c7b6d6094a25e99c57f8b18343914ebfd8213ef/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://sourceforge.net/p/graphicsmagick/code/ci/5c7b6d6094a25e99c57f8b18343914ebfd8213ef/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3746",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3746"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:2641",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:2644",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html"
|
||||
},
|
||||
{
|
||||
"name" : "96135",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/96135"
|
||||
"name": "[oss-security] 20161001 Re: GraphicsMagick CVE request: 8BIM/8BIMW unsigned underflow leads to heap overflow",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/10/01/7"
|
||||
},
|
||||
{
|
||||
"name": "93262",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93262"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3746",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3746"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:2644",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1381148",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381148"
|
||||
},
|
||||
{
|
||||
"name": "96135",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96135"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-8251",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-8470",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user