mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5220e34cf2
commit
05fba406a6
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=103134154721846&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "zmerge-admindb-script-access(10057)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/10057.php"
|
||||
},
|
||||
{
|
||||
"name": "5101",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5101"
|
||||
},
|
||||
{
|
||||
"name": "zmerge-admindb-script-access(10057)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10057.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS02-041",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-041"
|
||||
},
|
||||
{
|
||||
"name": "5422",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5422"
|
||||
},
|
||||
{
|
||||
"name": "MS02-041",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-041"
|
||||
},
|
||||
{
|
||||
"name": "mcms-resource-sql-injection(9785)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "DSA-163",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2002/dsa-163"
|
||||
},
|
||||
{
|
||||
"name": "20020418 MHonArc v2.5.2 Script Filtering Bypass Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -63,19 +68,14 @@
|
||||
"url": "http://www.mhonarc.org/MHonArc/CHANGES"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-163",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2002/dsa-163"
|
||||
"name": "4546",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4546"
|
||||
},
|
||||
{
|
||||
"name": "mhonarc-script-filtering-bypass(8894)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/8894.php"
|
||||
},
|
||||
{
|
||||
"name" : "4546",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020916 iDEFENSE Security Advisory 09.16.2002: FreeBSD Ports libkvm Security Vulnerabilities",
|
||||
"refsource" : "VULNWATCH",
|
||||
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0115.html"
|
||||
},
|
||||
{
|
||||
"name": "20020916 iDEFENSE Security Advisory 09.16.2002: FreeBSD Ports libkvm Security Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=103228135413310&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "FreeBSD-SA-02:39",
|
||||
"refsource" : "FREEBSD",
|
||||
"url" : "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:39.libkvm.asc"
|
||||
},
|
||||
{
|
||||
"name" : "bsd-libkvm-descriptor-leak(10109)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/10109.php"
|
||||
},
|
||||
{
|
||||
"name" : "5714",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/5714"
|
||||
},
|
||||
{
|
||||
"name" : "5716",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/5716"
|
||||
},
|
||||
{
|
||||
"name" : "5718",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/5718"
|
||||
},
|
||||
{
|
||||
"name": "5719",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5719"
|
||||
},
|
||||
{
|
||||
"name": "5718",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5718"
|
||||
},
|
||||
{
|
||||
"name": "FreeBSD-SA-02:39",
|
||||
"refsource": "FREEBSD",
|
||||
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:39.libkvm.asc"
|
||||
},
|
||||
{
|
||||
"name": "5714",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5714"
|
||||
},
|
||||
{
|
||||
"name": "bsd-libkvm-descriptor-leak(10109)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10109.php"
|
||||
},
|
||||
{
|
||||
"name": "5720",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5720"
|
||||
},
|
||||
{
|
||||
"name": "20020916 iDEFENSE Security Advisory 09.16.2002: FreeBSD Ports libkvm Security Vulnerabilities",
|
||||
"refsource": "VULNWATCH",
|
||||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0115.html"
|
||||
},
|
||||
{
|
||||
"name": "5716",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5716"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20021104 iDEFENSE Security Advisory 11.04.02b: Denial of Service Vulnerability in Xeneo Web Server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=103642597302308&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.idefense.com/advisory/11.04.02b.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.idefense.com/advisory/11.04.02b.txt"
|
||||
},
|
||||
{
|
||||
"name": "6098",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/6098"
|
||||
},
|
||||
{
|
||||
"name": "xeneo-php-dos(10534)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10534.php"
|
||||
},
|
||||
{
|
||||
"name" : "6098",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/6098"
|
||||
"name": "20021104 iDEFENSE Security Advisory 11.04.02b: Denial of Service Vulnerability in Xeneo Web Server",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=103642597302308&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ircit-invite-bo(9340)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/9340.php"
|
||||
},
|
||||
{
|
||||
"name": "20020612 Remote Hole in IRC Client and Stuff",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "4998",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4998"
|
||||
},
|
||||
{
|
||||
"name" : "ircit-invite-bo(9340)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/9340.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20021121 [LSD] Java and JVM security vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=103798147613151&w=2"
|
||||
"name": "6222",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/6222"
|
||||
},
|
||||
{
|
||||
"name": "http://www.lsd-pl.net/documents/javasecurity-1.0.0.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.lsd-pl.net/documents/javasecurity-1.0.0.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "6222",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/6222"
|
||||
},
|
||||
{
|
||||
"name": "symantec-jit-bypass-security(10711)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10711"
|
||||
},
|
||||
{
|
||||
"name": "20021121 [LSD] Java and JVM security vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=103798147613151&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20030612 BAZARR THUG LIFE , DONT READ OR VIRUS INFECT YOU",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=105553002105111&w=2"
|
||||
},
|
||||
{
|
||||
"name": "DSA-322",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2003/dsa-322"
|
||||
},
|
||||
{
|
||||
"name": "20030612 BAZARR THUG LIFE , DONT READ OR VIRUS INFECT YOU",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=105553002105111&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,20 +53,45 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.uniras.gov.uk/vuls/2003/006489/smime.htm",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.uniras.gov.uk/vuls/2003/006489/smime.htm"
|
||||
},
|
||||
{
|
||||
"name" : "VU#428230",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/428230"
|
||||
"name": "RHSA-2004:110",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-110.html"
|
||||
},
|
||||
{
|
||||
"name": "FLSA:2089",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://marc.info/?l=bugtraq&m=109900315219363&w=2"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11462",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11462"
|
||||
},
|
||||
{
|
||||
"name": "http://www.uniras.gov.uk/vuls/2003/006489/smime.htm",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.uniras.gov.uk/vuls/2003/006489/smime.htm"
|
||||
},
|
||||
{
|
||||
"name": "8981",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/8981"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2004:112",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-112.html"
|
||||
},
|
||||
{
|
||||
"name": "smime-asn1-bo(13603)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13603"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:872",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A872"
|
||||
},
|
||||
{
|
||||
"name": "SSRT4722",
|
||||
"refsource": "HP",
|
||||
@ -77,45 +102,20 @@
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:021"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:110",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2004-110.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:112",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2004-112.html"
|
||||
},
|
||||
{
|
||||
"name": "20040402-01-U",
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20040402-01-U.asc"
|
||||
},
|
||||
{
|
||||
"name" : "8981",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/8981"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:872",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A872"
|
||||
"name": "VU#428230",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/428230"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:914",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A914"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11462",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11462"
|
||||
},
|
||||
{
|
||||
"name" : "smime-asn1-bo(13603)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/13603"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.securiteam.com/windowsntfocus/5RP0M1PAUM.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.securiteam.com/windowsntfocus/5RP0M1PAUM.html"
|
||||
},
|
||||
{
|
||||
"name": "20030901 Security Vulnerability in Tellurian TftpdNT (Long Filename)",
|
||||
"refsource": "VULNWATCH",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "20030901 Security Vulnerability in Tellurian TftpdNT (Long Filename)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=106252411425545&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securiteam.com/windowsntfocus/5RP0M1PAUM.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securiteam.com/windowsntfocus/5RP0M1PAUM.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/352462"
|
||||
},
|
||||
{
|
||||
"name" : "9187",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/9187"
|
||||
"name": "cisco-acns-password-bo(13945)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13945"
|
||||
},
|
||||
{
|
||||
"name": "10409",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://secunia.com/advisories/10409"
|
||||
},
|
||||
{
|
||||
"name" : "cisco-acns-password-bo(13945)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/13945"
|
||||
"name": "9187",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/9187"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ie-input-type-dos(13029)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13029"
|
||||
},
|
||||
{
|
||||
"name": "MS03-032",
|
||||
"refsource": "MS",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "VU#813208",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/813208"
|
||||
},
|
||||
{
|
||||
"name" : "ie-input-type-dos(13029)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/13029"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,44 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=718573",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=718573"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2457",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2457"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2458",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2458"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2464",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2464"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2012:066",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2012:081",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
|
||||
},
|
||||
{
|
||||
"name" : "53229",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/53229"
|
||||
"name": "48922",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48922"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16889",
|
||||
@ -98,34 +63,69 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16889"
|
||||
},
|
||||
{
|
||||
"name" : "48972",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48972"
|
||||
"name": "firefox-iso2022kr-xss(75154)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75154"
|
||||
},
|
||||
{
|
||||
"name" : "49047",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/49047"
|
||||
"name": "53229",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53229"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html"
|
||||
},
|
||||
{
|
||||
"name": "49055",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/49055"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2458",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2458"
|
||||
},
|
||||
{
|
||||
"name": "48920",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48920"
|
||||
},
|
||||
{
|
||||
"name" : "48922",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48922"
|
||||
"name": "DSA-2457",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2457"
|
||||
},
|
||||
{
|
||||
"name" : "firefox-iso2022kr-xss(75154)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75154"
|
||||
"name": "DSA-2464",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2464"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:081",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
|
||||
},
|
||||
{
|
||||
"name": "48972",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48972"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:066",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
|
||||
},
|
||||
{
|
||||
"name": "49047",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/49047"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2012-0579",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:150",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||
},
|
||||
{
|
||||
"name": "53109",
|
||||
"refsource": "BID",
|
||||
@ -72,6 +62,16 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1026953"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:150",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||
},
|
||||
{
|
||||
"name": "48831",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2012-0717",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2012-0734",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21592188",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21592188"
|
||||
},
|
||||
{
|
||||
"name" : "53247",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/53247"
|
||||
},
|
||||
{
|
||||
"name": "48967",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48967"
|
||||
},
|
||||
{
|
||||
"name": "ae-importjob-info-disclosure(74557)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74557"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg21592188",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg21592188"
|
||||
},
|
||||
{
|
||||
"name": "48968",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48968"
|
||||
},
|
||||
{
|
||||
"name" : "ae-importjob-info-disclosure(74557)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/74557"
|
||||
"name": "53247",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53247"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2012-1619",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2012-1695",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "48864",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48864"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:150",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||
},
|
||||
{
|
||||
"name": "1026948",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1026948"
|
||||
},
|
||||
{
|
||||
"name" : "48864",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48864"
|
||||
"name": "MDVSA-2013:150",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2012-3334",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ids-setcollation-bo(78277)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78277"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg21611800",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg21611800"
|
||||
},
|
||||
{
|
||||
"name" : "55668",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/55668"
|
||||
},
|
||||
{
|
||||
"name": "85736",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/85736"
|
||||
},
|
||||
{
|
||||
"name" : "ids-setcollation-bo(78277)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/78277"
|
||||
"name": "55668",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/55668"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2012-3641",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5400",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5400"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5485",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5485"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-09-19-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5503",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5503"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2012-07-25-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-09-12-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2012-09-19-1",
|
||||
"name": "APPLE-SA-2012-07-25-1",
|
||||
"refsource": "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5400",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5400"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://kb.isc.org/article/AA-00737",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kb.isc.org/article/AA-00737"
|
||||
"name": "1027300",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1027300"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2516",
|
||||
@ -63,49 +63,49 @@
|
||||
"url": "http://www.debian.org/security/2012/dsa-2516"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2519",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2519"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201301-06",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201301-06.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2012:115",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115"
|
||||
"name": "RHSA-2012:1141",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1141.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:116",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:116"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1141",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1141.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:1006",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:115",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2519",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2519"
|
||||
},
|
||||
{
|
||||
"name": "USN-1519-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1519-1"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.isc.org/article/AA-00737",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.isc.org/article/AA-00737"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201301-06",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
|
||||
},
|
||||
{
|
||||
"name": "54665",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/54665"
|
||||
},
|
||||
{
|
||||
"name" : "1027300",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1027300"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2012/mfsa2012-88.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2012/mfsa2012-88.html"
|
||||
"name": "firefox-freetype-code-execution(79208)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79208"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=790139",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=790139"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-88.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-88.html"
|
||||
},
|
||||
{
|
||||
"name": "1027653",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1027653"
|
||||
},
|
||||
{
|
||||
"name" : "firefox-freetype-code-execution(79208)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/79208"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-4461",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,60 +52,60 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20121106 CVE-2012-4461 -- kernel: kvm: invalid opcode oops on SET_SREGS with OSXSAVE bit set",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/11/06/14"
|
||||
},
|
||||
{
|
||||
"name" : "http://article.gmane.org/gmane.comp.emulators.kvm.devel/100742",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://article.gmane.org/gmane.comp.emulators.kvm.devel/100742"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=6d1068b3a98519247d8ba4ec85cd40ac136dbdf9",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=6d1068b3a98519247d8ba4ec85cd40ac136dbdf9"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.9",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.9"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=862900",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=862900"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0223",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0223.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0882",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0882.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:1679",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0925",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "56414",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/56414"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=862900",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=862900"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0882",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0882.html"
|
||||
},
|
||||
{
|
||||
"name": "51160",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51160"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=6d1068b3a98519247d8ba4ec85cd40ac136dbdf9",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=6d1068b3a98519247d8ba4ec85cd40ac136dbdf9"
|
||||
},
|
||||
{
|
||||
"name": "http://article.gmane.org/gmane.comp.emulators.kvm.devel/100742",
|
||||
"refsource": "MISC",
|
||||
"url": "http://article.gmane.org/gmane.comp.emulators.kvm.devel/100742"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:1679",
|
||||
"refsource": "SUSE",
|
||||
"url": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20121106 CVE-2012-4461 -- kernel: kvm: invalid opcode oops on SET_SREGS with OSXSAVE bit set",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/11/06/14"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.9",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.9"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0925",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-4505",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,34 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20121012 Re: libproxy PAC downloading buffer overflows",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/10/12/5"
|
||||
"name": "openSUSE-SU-2012:1375",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00065.html"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20121012 libproxy PAC downloading buffer overflows",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/10/12/1"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20121016 Re: libproxy PAC downloading buffer overflows",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/10/16/3"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=864612",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=864612"
|
||||
},
|
||||
{
|
||||
"name" : "https://groups.google.com/forum/?fromgroups=#!topic/libproxy/VxZ8No7mT0E",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://groups.google.com/forum/?fromgroups=#!topic/libproxy/VxZ8No7mT0E"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2571",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2571"
|
||||
"name": "51048",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51048"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1461",
|
||||
@ -88,9 +68,9 @@
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1461.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2012:1375",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2012-10/msg00065.html"
|
||||
"name": "https://groups.google.com/forum/?fromgroups=#!topic/libproxy/VxZ8No7mT0E",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://groups.google.com/forum/?fromgroups=#!topic/libproxy/VxZ8No7mT0E"
|
||||
},
|
||||
{
|
||||
"name": "USN-1629-1",
|
||||
@ -98,14 +78,19 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-1629-1"
|
||||
},
|
||||
{
|
||||
"name" : "55910",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/55910"
|
||||
"name": "[oss-security] 20121012 libproxy PAC downloading buffer overflows",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/10/12/1"
|
||||
},
|
||||
{
|
||||
"name" : "51048",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51048"
|
||||
"name": "[oss-security] 20121012 Re: libproxy PAC downloading buffer overflows",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/10/12/5"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2571",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2571"
|
||||
},
|
||||
{
|
||||
"name": "51180",
|
||||
@ -116,6 +101,21 @@
|
||||
"name": "51308",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51308"
|
||||
},
|
||||
{
|
||||
"name": "55910",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/55910"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20121016 Re: libproxy PAC downloading buffer overflows",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/10/16/3"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=864612",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=864612"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security_alert@emc.com",
|
||||
"ID": "CVE-2012-4611",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,21 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20121126 ESA-2012-054: RSA Adaptive Authentication (On-Premise) Cross-Site Scripting Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-11/0096.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/118381/RSA-Adaptive-Authentication-On-Premise-6.x-XSS.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/118381/RSA-Adaptive-Authentication-On-Premise-6.x-XSS.html"
|
||||
},
|
||||
{
|
||||
"name": "56699",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/56699"
|
||||
},
|
||||
{
|
||||
"name": "20121126 ESA-2012-054: RSA Adaptive Authentication (On-Premise) Cross-Site Scripting Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-11/0096.html"
|
||||
},
|
||||
{
|
||||
"name": "87876",
|
||||
"refsource": "OSVDB",
|
||||
@ -81,6 +76,11 @@
|
||||
"name": "51394",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51394"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/118381/RSA-Adaptive-Authentication-On-Premise-6.x-XSS.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/118381/RSA-Adaptive-Authentication-On-Premise-6.x-XSS.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www7a.biglobe.ne.jp/~schezo/JVN57842148.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www7a.biglobe.ne.jp/~schezo/JVN57842148.html"
|
||||
},
|
||||
{
|
||||
"name": "JVN#57842148",
|
||||
"refsource": "JVN",
|
||||
"url": "https://jvn.jp/en/jp/JVN57842148/index.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www7a.biglobe.ne.jp/~schezo/JVN57842148.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www7a.biglobe.ne.jp/~schezo/JVN57842148.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -134,6 +134,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1038903",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038903"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.juniper.net/JSA10793",
|
||||
"refsource": "CONFIRM",
|
||||
@ -143,11 +148,6 @@
|
||||
"name": "99567",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99567"
|
||||
},
|
||||
{
|
||||
"name" : "1038903",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038903"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207798",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207798"
|
||||
"name": "1038487",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038487"
|
||||
},
|
||||
{
|
||||
"name": "98474",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/98474"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207804",
|
||||
@ -68,14 +73,9 @@
|
||||
"url": "https://security.gentoo.org/glsa/201706-15"
|
||||
},
|
||||
{
|
||||
"name" : "98474",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/98474"
|
||||
},
|
||||
{
|
||||
"name" : "1038487",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038487"
|
||||
"name": "https://support.apple.com/HT207798",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207798"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-prime",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-prime"
|
||||
},
|
||||
{
|
||||
"name": "99457",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99457"
|
||||
},
|
||||
{
|
||||
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-prime",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-prime"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp"
|
||||
},
|
||||
{
|
||||
"name": "99345",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1038808",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038808"
|
||||
},
|
||||
{
|
||||
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -75,16 +75,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1354443%2C1368576%2C1366903%2C1369913%2C1371424%2C1346590%2C1371890%2C1372985%2C1362924%2C1368105%2C1369994%2C1371283%2C1368362%2C1378826%2C1380426%2C1368030%2C1373220%2C1321384%2C1383002",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1354443%2C1368576%2C1366903%2C1369913%2C1371424%2C1346590%2C1371890%2C1372985%2C1362924%2C1368105%2C1369994%2C1371283%2C1368362%2C1378826%2C1380426%2C1368030%2C1373220%2C1321384%2C1383002"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-18/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-18/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2017-19/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -95,20 +85,20 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2017-20/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3928",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2017/dsa-3928"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3968",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2017/dsa-3968"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201803-14",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201803-14"
|
||||
"name": "100201",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/100201"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2017-18/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2017-18/"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2456",
|
||||
@ -120,15 +110,25 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2534"
|
||||
},
|
||||
{
|
||||
"name" : "100201",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/100201"
|
||||
},
|
||||
{
|
||||
"name": "1039124",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039124"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1354443%2C1368576%2C1366903%2C1369913%2C1371424%2C1346590%2C1371890%2C1372985%2C1362924%2C1368105%2C1369994%2C1371283%2C1368362%2C1378826%2C1380426%2C1368030%2C1373220%2C1321384%2C1383002",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1354443%2C1368576%2C1366903%2C1369913%2C1371424%2C1346590%2C1371890%2C1372985%2C1362924%2C1368105%2C1369994%2C1371283%2C1368362%2C1378826%2C1380426%2C1368030%2C1373220%2C1321384%2C1383002"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201803-14",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201803-14"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3928",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2017/dsa-3928"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-10156",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "45716",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/45716/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.secureauth.com/labs/advisories/asrock-drivers-elevation-privilege-vulnerabilities",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.secureauth.com/labs/advisories/asrock-drivers-elevation-privilege-vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name": "45716",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45716/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-14915",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1188/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1188/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
|
||||
},
|
||||
{
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-18-1188/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-18-1188/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://cnonce.github.io/2018/03/29/IBOS-4-4-3%E5%AD%98%E5%82%A8%E5%9E%8Bxss/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://cnonce.github.io/2018/03/29/IBOS-4-4-3%E5%AD%98%E5%82%A8%E5%9E%8Bxss/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/cnonce/IBOS_4.4.3/blob/master/Cross%20Site%20Scripting.md",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/cnonce/IBOS_4.4.3/blob/master/Cross%20Site%20Scripting.md"
|
||||
},
|
||||
{
|
||||
"name": "https://cnonce.github.io/2018/03/29/IBOS-4-4-3%E5%AD%98%E5%82%A8%E5%9E%8Bxss/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://cnonce.github.io/2018/03/29/IBOS-4-4-3%E5%AD%98%E5%82%A8%E5%9E%8Bxss/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user