mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
c229d62842
commit
06741a5133
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010107 Cgisecurity.com Advisory #3.1",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=97905792214999&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.extropia.com/hacks/bbs_security.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.extropia.com/hacks/bbs_security.html"
|
||||
},
|
||||
{
|
||||
"name": "3546",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/3546"
|
||||
},
|
||||
{
|
||||
"name": "20010107 Cgisecurity.com Advisory #3.1",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=97905792214999&w=2"
|
||||
},
|
||||
{
|
||||
"name": "2177",
|
||||
"refsource": "BID",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "http-cgi-bbs-forum(5906)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5906"
|
||||
},
|
||||
{
|
||||
"name" : "3546",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/3546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010125 ecepass - proof of concept code for FreeBSD ipfw bypass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.security-express.com/archives/bugtraq/2001-01/0424.html"
|
||||
},
|
||||
{
|
||||
"name" : "FreeBSD-SA-01:08",
|
||||
"refsource" : "FREEBSD",
|
||||
"url" : "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:08.ipfw.asc"
|
||||
"name": "2293",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2293"
|
||||
},
|
||||
{
|
||||
"name": "L-029",
|
||||
@ -68,19 +63,24 @@
|
||||
"url": "http://www.ciac.org/ciac/bulletins/l-029.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "2293",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/2293"
|
||||
},
|
||||
{
|
||||
"name" : "1743",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/1743"
|
||||
"name": "20010125 ecepass - proof of concept code for FreeBSD ipfw bypass",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.security-express.com/archives/bugtraq/2001-01/0424.html"
|
||||
},
|
||||
{
|
||||
"name": "ipfw-bypass-firewall(5998)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5998"
|
||||
},
|
||||
{
|
||||
"name": "FreeBSD-SA-01:08",
|
||||
"refsource": "FREEBSD",
|
||||
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:08.ipfw.asc"
|
||||
},
|
||||
{
|
||||
"name": "1743",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/1743"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "IMNX-2001-70-034-01",
|
||||
"refsource": "IMMUNIX",
|
||||
"url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-034-01"
|
||||
},
|
||||
{
|
||||
"name": "openssh-symlink-file-deletion(6676)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6676"
|
||||
},
|
||||
{
|
||||
"name": "20010612",
|
||||
"refsource": "OPENBSD",
|
||||
"url": "http://www.openbsd.org/errata29.html"
|
||||
},
|
||||
{
|
||||
"name": "20010604 SSH allows deletion of other users files...",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -82,35 +97,20 @@
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/655259"
|
||||
},
|
||||
{
|
||||
"name" : "20010612",
|
||||
"refsource" : "OPENBSD",
|
||||
"url" : "http://www.openbsd.org/errata29.html"
|
||||
},
|
||||
{
|
||||
"name" : "IMNX-2001-70-034-01",
|
||||
"refsource" : "IMMUNIX",
|
||||
"url" : "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-034-01"
|
||||
},
|
||||
{
|
||||
"name" : "CLA-2001:431",
|
||||
"refsource" : "CONECTIVA",
|
||||
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000431"
|
||||
},
|
||||
{
|
||||
"name": "2825",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2825"
|
||||
},
|
||||
{
|
||||
"name" : "openssh-symlink-file-deletion(6676)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6676"
|
||||
},
|
||||
{
|
||||
"name": "1853",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/1853"
|
||||
},
|
||||
{
|
||||
"name": "CLA-2001:431",
|
||||
"refsource": "CONECTIVA",
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000431"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "CSSA-2001-026.0",
|
||||
"refsource" : "CALDERA",
|
||||
"url" : "http://www.calderasystems.com/support/security/advisories/CSSA-2001-026.0.txt"
|
||||
},
|
||||
{
|
||||
"name": "docview-httpd-command-execution(6854)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6854"
|
||||
},
|
||||
{
|
||||
"name": "CSSA-2001-026.0",
|
||||
"refsource": "CALDERA",
|
||||
"url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-026.0.txt"
|
||||
},
|
||||
{
|
||||
"name": "3052",
|
||||
"refsource": "BID",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "ADV-2006-1515",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1515"
|
||||
},
|
||||
{
|
||||
"name": "19801",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19801"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1515",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1515"
|
||||
},
|
||||
{
|
||||
"name": "phpwebgallery-picture-bypass-security(26079)",
|
||||
"refsource": "XF",
|
||||
|
@ -63,19 +63,9 @@
|
||||
"url": "http://www.aria-security.net/hm/neomail.txt"
|
||||
},
|
||||
{
|
||||
"name" : "17728",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/17728"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1590",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1590"
|
||||
},
|
||||
{
|
||||
"name" : "19906",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19906"
|
||||
"name": "neomail-sessionid-xss(26127)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26127"
|
||||
},
|
||||
{
|
||||
"name": "827",
|
||||
@ -83,9 +73,19 @@
|
||||
"url": "http://securityreason.com/securityalert/827"
|
||||
},
|
||||
{
|
||||
"name" : "neomail-sessionid-xss(26127)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26127"
|
||||
"name": "17728",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17728"
|
||||
},
|
||||
{
|
||||
"name": "19906",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19906"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1590",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1590"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2006-2449",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,39 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060614 [KDE Security Advisory] KDM symlink attack vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/437133/100/0/threaded"
|
||||
"name": "21662",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21662"
|
||||
},
|
||||
{
|
||||
"name" : "20060615 rPSA-2006-0106-1 kdebase",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/437322/100/0/threaded"
|
||||
"name": "20890",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20890"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kde.org/info/security/advisory-20060614-1.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kde.org/info/security/advisory-20060614-1.txt"
|
||||
"name": "20674",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20674"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1156",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1156"
|
||||
"name": "26511",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/26511"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200606-23",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2006:105",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:105"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2006:106",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:106"
|
||||
"name": "20702",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20702"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2006:0548",
|
||||
@ -93,14 +83,14 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2006-0548.html"
|
||||
},
|
||||
{
|
||||
"name" : "SSA:2006-178-01",
|
||||
"refsource" : "SLACKWARE",
|
||||
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467"
|
||||
"name": "1016297",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016297"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2006:039",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2006_39_kdm.html"
|
||||
"name": "MDKSA-2006:106",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:106"
|
||||
},
|
||||
{
|
||||
"name": "USN-301-1",
|
||||
@ -108,9 +98,19 @@
|
||||
"url": "https://usn.ubuntu.com/301-1/"
|
||||
},
|
||||
{
|
||||
"name" : "18431",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18431"
|
||||
"name": "20602",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20602"
|
||||
},
|
||||
{
|
||||
"name": "kde-kdm-symlink(27181)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27181"
|
||||
},
|
||||
{
|
||||
"name": "20869",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20869"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9844",
|
||||
@ -122,35 +122,40 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2355"
|
||||
},
|
||||
{
|
||||
"name" : "26511",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/26511"
|
||||
},
|
||||
{
|
||||
"name" : "1016297",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016297"
|
||||
},
|
||||
{
|
||||
"name" : "20602",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20602"
|
||||
},
|
||||
{
|
||||
"name": "20660",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20660"
|
||||
},
|
||||
{
|
||||
"name" : "20674",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20674"
|
||||
"name": "DSA-1156",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1156"
|
||||
},
|
||||
{
|
||||
"name" : "20702",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20702"
|
||||
"name": "20060614 [KDE Security Advisory] KDM symlink attack vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/437133/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2006:039",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2006_39_kdm.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kde.org/info/security/advisory-20060614-1.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kde.org/info/security/advisory-20060614-1.txt"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200606-23",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml"
|
||||
},
|
||||
{
|
||||
"name": "SSA:2006-178-01",
|
||||
"refsource": "SLACKWARE",
|
||||
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467"
|
||||
},
|
||||
{
|
||||
"name": "20785",
|
||||
@ -158,24 +163,19 @@
|
||||
"url": "http://secunia.com/advisories/20785"
|
||||
},
|
||||
{
|
||||
"name" : "20869",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20869"
|
||||
"name": "MDKSA-2006:105",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:105"
|
||||
},
|
||||
{
|
||||
"name" : "20890",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20890"
|
||||
"name": "20060615 rPSA-2006-0106-1 kdebase",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/437322/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "21662",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21662"
|
||||
},
|
||||
{
|
||||
"name" : "kde-kdm-symlink(27181)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27181"
|
||||
"name": "18431",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18431"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2006-2482",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,41 +52,41 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2006-50/advisory/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secunia.com/secunia_research/2006-50/advisory/"
|
||||
},
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2006-72/advisory/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secunia.com/secunia_research/2006-72/advisory/"
|
||||
},
|
||||
{
|
||||
"name": "19884",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19884"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3495",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3495"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0235",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0235"
|
||||
},
|
||||
{
|
||||
"name" : "20270",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20270"
|
||||
"name": "ADV-2006-3495",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3495"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2006-50/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2006-50/advisory/"
|
||||
},
|
||||
{
|
||||
"name": "21458",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21458"
|
||||
},
|
||||
{
|
||||
"name": "20270",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20270"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2006-72/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2006-72/advisory/"
|
||||
},
|
||||
{
|
||||
"name": "tziptv-arj-header-bo(28785)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "1809",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/1809"
|
||||
},
|
||||
{
|
||||
"name": "18076",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18076"
|
||||
},
|
||||
{
|
||||
"name": "1809",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/1809"
|
||||
},
|
||||
{
|
||||
"name": "calogic-reconfig-srxclr-file-include(26590)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,46 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060523 Nucleus CMS <= 3.22 arbitrary remote inclusion",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/434837/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://retrogod.altervista.org/nucleus_322_incl_xpl.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://retrogod.altervista.org/nucleus_322_incl_xpl.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.nucleuscms.org/item/3038",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.nucleuscms.org/item/3038"
|
||||
},
|
||||
{
|
||||
"name" : "http://forum.nucleuscms.org/viewtopic.php?t=12304",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://forum.nucleuscms.org/viewtopic.php?t=12304"
|
||||
},
|
||||
{
|
||||
"name" : "18097",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18097"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1936",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1936"
|
||||
},
|
||||
{
|
||||
"name" : "25749",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/25749"
|
||||
},
|
||||
{
|
||||
"name" : "1016146",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016146"
|
||||
},
|
||||
{
|
||||
"name": "20219",
|
||||
"refsource": "SECUNIA",
|
||||
@ -102,10 +62,50 @@
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/951"
|
||||
},
|
||||
{
|
||||
"name": "http://www.nucleuscms.org/item/3038",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.nucleuscms.org/item/3038"
|
||||
},
|
||||
{
|
||||
"name": "20060523 Nucleus CMS <= 3.22 arbitrary remote inclusion",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/434837/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://retrogod.altervista.org/nucleus_322_incl_xpl.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://retrogod.altervista.org/nucleus_322_incl_xpl.html"
|
||||
},
|
||||
{
|
||||
"name": "nucleus-dirlibs-file-include(26606)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26606"
|
||||
},
|
||||
{
|
||||
"name": "1016146",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016146"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1936",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1936"
|
||||
},
|
||||
{
|
||||
"name": "18097",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18097"
|
||||
},
|
||||
{
|
||||
"name": "http://forum.nucleuscms.org/viewtopic.php?t=12304",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://forum.nucleuscms.org/viewtopic.php?t=12304"
|
||||
},
|
||||
{
|
||||
"name": "25749",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/25749"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081203 [HACKATTACK Advisory 20081203]Pro Clan Manager 0.4.2 - Session Fixation",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/498864/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "32606",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32606"
|
||||
},
|
||||
{
|
||||
"name" : "4752",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4752"
|
||||
"name": "20081203 [HACKATTACK Advisory 20081203]Pro Clan Manager 0.4.2 - Session Fixation",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/498864/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "proclanmanager-phpsessid-session-hijacking(47036)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47036"
|
||||
},
|
||||
{
|
||||
"name": "4752",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4752"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ntinternals.org/ntiadv0807/ntiadv0807.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.ntinternals.org/ntiadv0807/ntiadv0807.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.eset.com/joomla/index.php?option=com_content&task=view&id=4113&Itemid=5",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.eset.com/joomla/index.php?option=com_content&task=view&id=4113&Itemid=5"
|
||||
},
|
||||
{
|
||||
"name" : "32917",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/32917"
|
||||
"name": "33210",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33210"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ntinternals.org/ntiadv0807/ntiadv0807.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.ntinternals.org/ntiadv0807/ntiadv0807.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-3456",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3456"
|
||||
},
|
||||
{
|
||||
"name" : "33210",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33210"
|
||||
"name": "32917",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32917"
|
||||
},
|
||||
{
|
||||
"name": "smart-security-epfw-privilege-escalation(47477)",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-2119",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2011-2300",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201204-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201204-01.xml"
|
||||
"name": "oval:org.mitre.oval:def:13148",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13148"
|
||||
},
|
||||
{
|
||||
"name": "TA11-201A",
|
||||
@ -68,19 +63,24 @@
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:13148",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13148"
|
||||
},
|
||||
{
|
||||
"name" : "1025805",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1025805"
|
||||
"name": "GLSA-201204-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201204-01.xml"
|
||||
},
|
||||
{
|
||||
"name": "48755",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48755"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
|
||||
},
|
||||
{
|
||||
"name": "1025805",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1025805"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "73885",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/73885"
|
||||
},
|
||||
{
|
||||
"name": "http://otrs.org/advisory/OSA-2011-02-en/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://otrs.org/advisory/OSA-2011-02-en/"
|
||||
},
|
||||
{
|
||||
"name": "otrs-iphonehandle-priv-escalation(68558)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68558"
|
||||
},
|
||||
{
|
||||
"name": "48678",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48678"
|
||||
},
|
||||
{
|
||||
"name" : "73885",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/73885"
|
||||
},
|
||||
{
|
||||
"name": "45227",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45227"
|
||||
},
|
||||
{
|
||||
"name" : "otrs-iphonehandle-priv-escalation(68558)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68558"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-2481",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1137753",
|
||||
"name": "http://tomcat.apache.org/security-7.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1137753"
|
||||
"url": "http://tomcat.apache.org/security-7.html"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.apache.org/viewvc?view=revision&revision=1138788",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://svn.apache.org/viewvc?view=revision&revision=1138788"
|
||||
},
|
||||
{
|
||||
"name" : "http://tomcat.apache.org/security-7.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tomcat.apache.org/security-7.html"
|
||||
"name": "1025924",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1025924"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=51395",
|
||||
@ -73,9 +73,14 @@
|
||||
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=51395"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBST02955",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
|
||||
"name": "57126",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/57126"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.apache.org/viewvc?view=revision&revision=1137753",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.apache.org/viewvc?view=revision&revision=1137753"
|
||||
},
|
||||
{
|
||||
"name": "49147",
|
||||
@ -83,14 +88,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/49147"
|
||||
},
|
||||
{
|
||||
"name" : "1025924",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1025924"
|
||||
},
|
||||
{
|
||||
"name" : "57126",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/57126"
|
||||
"name": "HPSBST02955",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/mac/1150/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/mac/1150/"
|
||||
"name": "opera-data-uris-xss(68322)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68322"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/unix/1150/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/unix/1150/"
|
||||
"name": "48500",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48500"
|
||||
},
|
||||
{
|
||||
"name": "45060",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45060"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/windows/1150/",
|
||||
@ -72,25 +77,20 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/support/kb/view/995/"
|
||||
},
|
||||
{
|
||||
"name" : "48500",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/48500"
|
||||
},
|
||||
{
|
||||
"name": "73485",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/73485"
|
||||
},
|
||||
{
|
||||
"name" : "45060",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/45060"
|
||||
"name": "http://www.opera.com/docs/changelogs/unix/1150/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/unix/1150/"
|
||||
},
|
||||
{
|
||||
"name" : "opera-data-uris-xss(68322)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68322"
|
||||
"name": "http://www.opera.com/docs/changelogs/mac/1150/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/mac/1150/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-2684",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,9 +58,9 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/02/08/5"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.openwall.com/lists/oss-security/2011/07/06/10",
|
||||
"name": "https://bugs.launchpad.net/ubuntu/+source/foo2zjs/+bug/805370",
|
||||
"refsource": "MISC",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/07/06/10"
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/foo2zjs/+bug/805370"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633870",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633870"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.launchpad.net/ubuntu/+source/foo2zjs/+bug/805370",
|
||||
"name": "http://www.openwall.com/lists/oss-security/2011/07/06/10",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://bugs.launchpad.net/ubuntu/+source/foo2zjs/+bug/805370"
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/07/06/10"
|
||||
},
|
||||
{
|
||||
"name": "https://security-tracker.debian.org/tracker/CVE-2011-2684/",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
|
||||
},
|
||||
{
|
||||
"name": "http://trac.osgeo.org/mapserver/ticket/3939",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://trac.osgeo.org/mapserver/ticket/3939"
|
||||
},
|
||||
{
|
||||
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-3227",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5002",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5002"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-10-12-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5002",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5002"
|
||||
},
|
||||
{
|
||||
"name": "50085",
|
||||
"refsource": "BID",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-3252",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5130",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5130"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4981",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4981"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5130",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5130"
|
||||
"name": "oval:org.mitre.oval:def:16784",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16784"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-10-11-1",
|
||||
@ -76,11 +81,6 @@
|
||||
"name": "76381",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/76381"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16784",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16784"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,30 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.computerworld.com/s/article/9219669/Mac_OS_X_can_t_properly_revoke_dodgy_digital_certificates",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.computerworld.com/s/article/9219669/Mac_OS_X_can_t_properly_revoke_dodgy_digital_certificates"
|
||||
"name": "49429",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49429"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5130",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5130"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2012-02-01-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "49429",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/49429"
|
||||
},
|
||||
{
|
||||
"name": "1026002",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1026002"
|
||||
},
|
||||
{
|
||||
"name": "http://www.computerworld.com/s/article/9219669/Mac_OS_X_can_t_properly_revoke_dodgy_digital_certificates",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.computerworld.com/s/article/9219669/Mac_OS_X_can_t_properly_revoke_dodgy_digital_certificates"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-02-01-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "macos-keychain-sec-bypass(69556)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[xorg] 20111018 X.Org security advisory: xserver locking code issues",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.freedesktop.org/archives/xorg/2011-October/053680.html"
|
||||
},
|
||||
{
|
||||
"name": "http://cgit.freedesktop.org/xorg/xserver/commit/?id=6ba44b91e37622ef8c146d8f2ac92d708a18ed34",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cgit.freedesktop.org/xorg/xserver/commit/?id=6ba44b91e37622ef8c146d8f2ac92d708a18ed34"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:0939",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0939.html"
|
||||
"name": "[xorg] 20111018 X.Org security advisory: xserver locking code issues",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.freedesktop.org/archives/xorg/2011-October/053680.html"
|
||||
},
|
||||
{
|
||||
"name": "46460",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/46460"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:0939",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-0939.html"
|
||||
},
|
||||
{
|
||||
"name": "49579",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-0162",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=892806"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0544",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0544.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0548",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0544",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-0337",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20130221 Re: CVE request: nginx world-readable logdir",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/02/22/1"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20130221 nginx world-readable logdir",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/02/21/15"
|
||||
"name": "55181",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55181"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130224 nginx CVE-2013-0337 world-readable logs",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/02/24/1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130221 Re: CVE request: nginx world-readable logdir",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/02/22/1"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201310-04",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201310-04.xml"
|
||||
},
|
||||
{
|
||||
"name" : "55181",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/55181"
|
||||
"name": "[oss-security] 20130221 nginx world-readable logdir",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-0595",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-1800",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917236",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917236"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
|
||||
"name": "52897",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/52897"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.novell.com/show_bug.cgi?id=804721",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.novell.com/show_bug.cgi?id=804721"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=917236",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=917236"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0615",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "52897",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/52897"
|
||||
"name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately",
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,24 +58,24 @@
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0079.html"
|
||||
},
|
||||
{
|
||||
"name" : "28409",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/28409"
|
||||
"name": "http://sourceforge.net/projects/vtigercrm/files/vtiger%20CRM%205.4.0/Core%20Product/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/projects/vtigercrm/files/vtiger%20CRM%205.4.0/Core%20Product/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.htbridge.com/advisory/HTB23168",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.htbridge.com/advisory/HTB23168"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/projects/vtigercrm/files/vtiger%20CRM%205.4.0/Core%20Product/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/projects/vtigercrm/files/vtiger%20CRM%205.4.0/Core%20Product/"
|
||||
},
|
||||
{
|
||||
"name": "76138",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/76138"
|
||||
},
|
||||
{
|
||||
"name": "28409",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/28409"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor"
|
||||
},
|
||||
{
|
||||
"name" : "61407",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/61407"
|
||||
"name": "wp-downloadmonitor-cve20133262-admin-xss(85921)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921"
|
||||
},
|
||||
{
|
||||
"name": "53116",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://secunia.com/advisories/53116"
|
||||
},
|
||||
{
|
||||
"name" : "wp-downloadmonitor-cve20133262-admin-xss(85921)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921"
|
||||
"name": "61407",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/61407"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2013-5605",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,110 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=934016",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=934016"
|
||||
},
|
||||
{
|
||||
"name" : "https://developer.mozilla.org/docs/NSS/NSS_3.14.5_release_notes",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://developer.mozilla.org/docs/NSS/NSS_3.14.5_release_notes"
|
||||
},
|
||||
{
|
||||
"name" : "https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-103.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-103.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2800",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2013/dsa-2800"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201406-19",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201406-19.xml"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201504-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1840",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1840.html"
|
||||
},
|
||||
{
|
||||
"name": "https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=934016",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=934016"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1841",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1841.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1791",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1791.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1829",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1829.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0041",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0041.html"
|
||||
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1730",
|
||||
@ -163,14 +98,19 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00078.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:1807",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00000.html"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:1732",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00080.html"
|
||||
"name": "GLSA-201504-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201406-19",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201406-19.xml"
|
||||
},
|
||||
{
|
||||
"name": "USN-2030-1",
|
||||
@ -187,10 +127,70 @@
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2032-1"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1791",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1791.html"
|
||||
},
|
||||
{
|
||||
"name": "https://developer.mozilla.org/docs/NSS/NSS_3.14.5_release_notes",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://developer.mozilla.org/docs/NSS/NSS_3.14.5_release_notes"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1807",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"
|
||||
},
|
||||
{
|
||||
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2800",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2800"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
|
||||
},
|
||||
{
|
||||
"name": "63738",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/63738"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-103.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-103.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1732",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00080.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0041",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0041.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1829",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1829.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://player.gomlab.com/eng/download/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://player.gomlab.com/eng/download/"
|
||||
},
|
||||
{
|
||||
"name": "http://player.gomlab.com/eng/notice/view.gom?intseq=239",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://player.gomlab.com/eng/notice/view.gom?intseq=239"
|
||||
},
|
||||
{
|
||||
"name": "http://player.gomlab.com/eng/download/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://player.gomlab.com/eng/download/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-5887",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,49 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02972",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02973",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101454",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101455",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0030",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0134",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0134.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0135",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0135.html"
|
||||
"name": "oracle-cpujan2014-cve20135887(90345)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90345"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0414",
|
||||
@ -103,44 +63,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:0246",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html"
|
||||
"name": "SSRT101455",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:0266",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:0451",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html"
|
||||
},
|
||||
{
|
||||
"name" : "64758",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/64758"
|
||||
},
|
||||
{
|
||||
"name" : "64875",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/64875"
|
||||
},
|
||||
{
|
||||
"name" : "102013",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/102013"
|
||||
},
|
||||
{
|
||||
"name" : "1029608",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1029608"
|
||||
},
|
||||
{
|
||||
"name" : "56485",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/56485"
|
||||
"name": "RHSA-2014:0135",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0135.html"
|
||||
},
|
||||
{
|
||||
"name": "56535",
|
||||
@ -148,9 +78,79 @@
|
||||
"url": "http://secunia.com/advisories/56535"
|
||||
},
|
||||
{
|
||||
"name" : "oracle-cpujan2014-cve20135887(90345)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90345"
|
||||
"name": "RHSA-2014:0030",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
|
||||
},
|
||||
{
|
||||
"name": "56485",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/56485"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101454",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777"
|
||||
},
|
||||
{
|
||||
"name": "102013",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/102013"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02972",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0451",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02973",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
|
||||
},
|
||||
{
|
||||
"name": "1029608",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029608"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0266",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name": "64875",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/64875"
|
||||
},
|
||||
{
|
||||
"name": "64758",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/64758"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0246",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0134",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0134.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2014-2117",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33642"
|
||||
},
|
||||
{
|
||||
"name": "1030019",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030019"
|
||||
},
|
||||
{
|
||||
"name": "20140403 Cisco Emergency Responder Open Redirect Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "66634",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/66634"
|
||||
},
|
||||
{
|
||||
"name" : "1030019",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030019"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2014-2629",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBNS03082",
|
||||
"refsource" : "HP",
|
||||
"url" : "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=c04391893"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101655",
|
||||
"refsource" : "HP",
|
||||
"url" : "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=c04391893"
|
||||
"name": "1030697",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030697"
|
||||
},
|
||||
{
|
||||
"name": "69147",
|
||||
@ -68,14 +63,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/69147"
|
||||
},
|
||||
{
|
||||
"name" : "1030697",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030697"
|
||||
"name": "SSRT101655",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=c04391893"
|
||||
},
|
||||
{
|
||||
"name": "59981",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59981"
|
||||
},
|
||||
{
|
||||
"name": "HPSBNS03082",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=c04391893"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-2794",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,9 +58,9 @@
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037"
|
||||
},
|
||||
{
|
||||
"name" : "68378",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/68378"
|
||||
"name": "59775",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59775"
|
||||
},
|
||||
{
|
||||
"name": "1030532",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securitytracker.com/id/1030532"
|
||||
},
|
||||
{
|
||||
"name" : "59775",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59775"
|
||||
"name": "68378",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68378"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.htbridge.com/advisory/HTB23211",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.htbridge.com/advisory/HTB23211"
|
||||
},
|
||||
{
|
||||
"name": "67291",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "58539",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/58539"
|
||||
},
|
||||
{
|
||||
"name": "https://www.htbridge.com/advisory/HTB23211",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.htbridge.com/advisory/HTB23211"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -60,6 +60,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "GLSA-201702-10",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201702-10"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3780",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2017/dsa-3780"
|
||||
},
|
||||
{
|
||||
"name": "41240",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -70,6 +80,11 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/41356/"
|
||||
},
|
||||
{
|
||||
"name": "95987",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95987"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
|
||||
"refsource": "MLIST",
|
||||
@ -79,21 +94,6 @@
|
||||
"name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/02/04/1"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3780",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2017/dsa-3780"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201702-10",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201702-10"
|
||||
},
|
||||
{
|
||||
"name" : "95987",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/95987"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0519",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||
},
|
||||
{
|
||||
"name" : "96950",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/96950"
|
||||
},
|
||||
{
|
||||
"name": "1037968",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037968"
|
||||
},
|
||||
{
|
||||
"name": "96950",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96950"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.319911",
|
||||
"ID": "CVE-2017-1000105",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins Blue Ocean Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.1.5 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins Blue Ocean Plugin"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Incorrect Access Control"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[announce] 20171023 Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Released",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://mail-archives.apache.org/mod_mbox/apr-dev/201710.mbox/%3CCACsi252POs4toeJJciwg09_eu2cO3XFg%3DUqsPjXsfjDoeC3-UQ%40mail.gmail.com%3E"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20171106 [SECURITY] [DLA 1163-1] apr-util security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "101558",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/101558"
|
||||
},
|
||||
{
|
||||
"name": "1042004",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1042004"
|
||||
},
|
||||
{
|
||||
"name": "[announce] 20171023 Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Released",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://mail-archives.apache.org/mod_mbox/apr-dev/201710.mbox/%3CCACsi252POs4toeJJciwg09_eu2cO3XFg%3DUqsPjXsfjDoeC3-UQ%40mail.gmail.com%3E"
|
||||
},
|
||||
{
|
||||
"name": "101558",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101558"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx"
|
||||
},
|
||||
{
|
||||
"name": "https://nodesecurity.io/advisories/478",
|
||||
"refsource": "MISC",
|
||||
"url": "https://nodesecurity.io/advisories/478"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4197",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4598",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4722",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4793",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4968",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -54,29 +54,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1417405",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1417405"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-02/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-02/"
|
||||
"name": "1040270",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040270"
|
||||
},
|
||||
{
|
||||
"name": "USN-3544-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3544-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1417405",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1417405"
|
||||
},
|
||||
{
|
||||
"name": "102786",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102786"
|
||||
},
|
||||
{
|
||||
"name" : "1040270",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040270"
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2018-02/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2018-02/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/d4wner/Vulnerabilities-Report/blob/master/Add-Link-to-Facebook.md",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/d4wner/Vulnerabilities-Report/blob/master/Add-Link-to-Facebook.md"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/support/topic/stored-xss-bug-at-the-latest-version-of-add-link-to-facebook/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wordpress.org/support/topic/stored-xss-bug-at-the-latest-version-of-add-link-to-facebook/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/d4wner/Vulnerabilities-Report/blob/master/Add-Link-to-Facebook.md",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/d4wner/Vulnerabilities-Report/blob/master/Add-Link-to-Facebook.md"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user