mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
8158d91995
commit
0ba4ad95c5
@ -52,65 +52,65 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060621 Bypassing of web filters by using ASCII",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/437948/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060621 Re: Bypassing of web filters by using ASCII",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/438049/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20060621 Re: Bypassing of web filters by using ASCII",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/438051/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060622 Re: Bypassing of web filters by using ASCII",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/438066/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060623 RE: Bypassing of web filters by using ASCII",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/438154/100/0/threaded"
|
||||
"name": "ie-ascii-encoded-web-filter-bypass(27288)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27288"
|
||||
},
|
||||
{
|
||||
"name": "20060623 Re: Bypassing of web filters by using ASCII",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/438163/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060626 RE: Bypassing of web filters by using ASCII",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/438359/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20060626 Re: Bypassing of web filters by using ASCII",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/438358/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20060622 Re: Bypassing of web filters by using ASCII",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/438066/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20060621 Bypassing of web filters by using ASCII",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/437948/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2",
|
||||
"refsource": "MISC",
|
||||
"url": "http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2"
|
||||
},
|
||||
{
|
||||
"name": "20060621 Re: Bypassing of web filters by using ASCII",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/438049/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/"
|
||||
},
|
||||
{
|
||||
"name": "20060623 RE: Bypassing of web filters by using ASCII",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/438154/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20060626 RE: Bypassing of web filters by using ASCII",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/438359/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "28376",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28376"
|
||||
},
|
||||
{
|
||||
"name" : "ie-ascii-encoded-web-filter-bypass(27288)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27288"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060721 SYMSA-2006-008:Password Safe - Lock Password Database Configuration Not Enforced",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/441040/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.symantec.com/enterprise/research/SYMSA-2006-008.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.symantec.com/enterprise/research/SYMSA-2006-008.txt"
|
||||
},
|
||||
{
|
||||
"name": "19078",
|
||||
"refsource": "BID",
|
||||
@ -77,10 +67,20 @@
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1308"
|
||||
},
|
||||
{
|
||||
"name": "http://www.symantec.com/enterprise/research/SYMSA-2006-008.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.symantec.com/enterprise/research/SYMSA-2006-008.txt"
|
||||
},
|
||||
{
|
||||
"name": "passwordsafe-lock-weak-security(27933)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27933"
|
||||
},
|
||||
{
|
||||
"name": "20060721 SYMSA-2006-008:Password Safe - Lock Password Database Configuration Not Enforced",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/441040/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://myimei.com/security/2006-06-24/mybb104archive-modelight-parameter-extractionvarable-overwriting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://myimei.com/security/2006-06-24/mybb104archive-modelight-parameter-extractionvarable-overwriting.html"
|
||||
},
|
||||
{
|
||||
"name": "http://community.mybboard.net/showthread.php?tid=10115",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,20 +62,25 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mybboard.com/archive.php?nid=15"
|
||||
},
|
||||
{
|
||||
"name": "mybb-index-sql-injection(27445)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27445"
|
||||
},
|
||||
{
|
||||
"name": "26809",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/26809"
|
||||
},
|
||||
{
|
||||
"name": "http://myimei.com/security/2006-06-24/mybb104archive-modelight-parameter-extractionvarable-overwriting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://myimei.com/security/2006-06-24/mybb104archive-modelight-parameter-extractionvarable-overwriting.html"
|
||||
},
|
||||
{
|
||||
"name": "20873",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20873"
|
||||
},
|
||||
{
|
||||
"name" : "mybb-index-sql-injection(27445)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27445"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2006-3894",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,44 +58,9 @@
|
||||
"url": "http://jvn.jp/cert/JVNVU%23754281/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://secure-support.novell.com/KanisaPlatform/Publishing/97/3590033_f.SAL_Public.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://secure-support.novell.com/KanisaPlatform/Publishing/97/3590033_f.SAL_Public.html"
|
||||
},
|
||||
{
|
||||
"name" : "20070522 Vulnerability In Crypto Library",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080847c5d.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "VU#754281",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/754281"
|
||||
},
|
||||
{
|
||||
"name" : "24104",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24104"
|
||||
},
|
||||
{
|
||||
"name" : "35338",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35338"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:5778",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5778"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1908",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1908"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1909",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1909"
|
||||
"name": "25364",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25364"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1945",
|
||||
@ -103,14 +68,39 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1945"
|
||||
},
|
||||
{
|
||||
"name" : "1018095",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018095"
|
||||
"name": "25343",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25343"
|
||||
},
|
||||
{
|
||||
"name" : "25364",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25364"
|
||||
"name": "oval:org.mitre.oval:def:5778",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5778"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1909",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1909"
|
||||
},
|
||||
{
|
||||
"name": "20070522 Vulnerability In Crypto Library",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080847c5d.shtml"
|
||||
},
|
||||
{
|
||||
"name": "24104",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24104"
|
||||
},
|
||||
{
|
||||
"name": "VU#754281",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/754281"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1908",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1908"
|
||||
},
|
||||
{
|
||||
"name": "25399",
|
||||
@ -118,9 +108,19 @@
|
||||
"url": "http://secunia.com/advisories/25399"
|
||||
},
|
||||
{
|
||||
"name" : "25343",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25343"
|
||||
"name": "1018095",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018095"
|
||||
},
|
||||
{
|
||||
"name": "https://secure-support.novell.com/KanisaPlatform/Publishing/97/3590033_f.SAL_Public.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://secure-support.novell.com/KanisaPlatform/Publishing/97/3590033_f.SAL_Public.html"
|
||||
},
|
||||
{
|
||||
"name": "35338",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35338"
|
||||
},
|
||||
{
|
||||
"name": "multiple-crypto-asn1-dos(34430)",
|
||||
|
@ -58,19 +58,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/443193/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.protect-me.com/dl/whatsnew.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.protect-me.com/dl/whatsnew.html"
|
||||
},
|
||||
{
|
||||
"name" : "19500",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19500"
|
||||
},
|
||||
{
|
||||
"name" : "21494",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21494"
|
||||
"name": "devicelock-acl-security-bypass(28384)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28384"
|
||||
},
|
||||
{
|
||||
"name": "1392",
|
||||
@ -78,9 +68,19 @@
|
||||
"url": "http://securityreason.com/securityalert/1392"
|
||||
},
|
||||
{
|
||||
"name" : "devicelock-acl-security-bypass(28384)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28384"
|
||||
"name": "http://www.protect-me.com/dl/whatsnew.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.protect-me.com/dl/whatsnew.html"
|
||||
},
|
||||
{
|
||||
"name": "21494",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21494"
|
||||
},
|
||||
{
|
||||
"name": "19500",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19500"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060907 SL_Site <= 1.0 [spaw_root] Remote File Include Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/445520/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "2317",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2317"
|
||||
},
|
||||
{
|
||||
"name" : "http://spaw.cvs.sourceforge.net/spaw/spaw/docs/ChangeLog.txt?view=markup",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://spaw.cvs.sourceforge.net/spaw/spaw/docs/ChangeLog.txt?view=markup"
|
||||
"name": "slsite-spaw-file-include(28783)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28783"
|
||||
},
|
||||
{
|
||||
"name": "20060907 SL_Site <= 1.0 [spaw_root] Remote File Include Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/445520/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://spaw.cvs.sourceforge.net/spaw/spaw/spaw_control.class.php?r1=1.19&r2=1.20",
|
||||
@ -73,29 +73,29 @@
|
||||
"url": "http://spaw.cvs.sourceforge.net/spaw/spaw/spaw_control.class.php?r1=1.19&r2=1.20"
|
||||
},
|
||||
{
|
||||
"name" : "http://spaw.cvs.sourceforge.net/spaw/spaw/spaw_control.class.php?r1=1.25&r2=1.26",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://spaw.cvs.sourceforge.net/spaw/spaw/spaw_control.class.php?r1=1.25&r2=1.26"
|
||||
"name": "1522",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1522"
|
||||
},
|
||||
{
|
||||
"name": "19892",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19892"
|
||||
},
|
||||
{
|
||||
"name": "http://spaw.cvs.sourceforge.net/spaw/spaw/spaw_control.class.php?r1=1.25&r2=1.26",
|
||||
"refsource": "MISC",
|
||||
"url": "http://spaw.cvs.sourceforge.net/spaw/spaw/spaw_control.class.php?r1=1.25&r2=1.26"
|
||||
},
|
||||
{
|
||||
"name": "http://spaw.cvs.sourceforge.net/spaw/spaw/docs/ChangeLog.txt?view=markup",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://spaw.cvs.sourceforge.net/spaw/spaw/docs/ChangeLog.txt?view=markup"
|
||||
},
|
||||
{
|
||||
"name": "1016814",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016814"
|
||||
},
|
||||
{
|
||||
"name" : "1522",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1522"
|
||||
},
|
||||
{
|
||||
"name" : "slsite-spaw-file-include(28783)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28783"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://italk.sourceforge.net/italk-sa-1.txt"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-5014",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/5014"
|
||||
"name": "italkplus-unspecifiedbo(30900)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30900"
|
||||
},
|
||||
{
|
||||
"name": "23374",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://secunia.com/advisories/23374"
|
||||
},
|
||||
{
|
||||
"name" : "italkplus-unspecifiedbo(30900)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30900"
|
||||
"name": "ADV-2006-5014",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/5014"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,14 +58,9 @@
|
||||
"url": "https://www.exploit-db.com/exploits/3013"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.eeye.com/Resources/Security-Center/Research/Zero-Day-Tracker/2005/20051116",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.eeye.com/Resources/Security-Center/Research/Zero-Day-Tracker/2005/20051116"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-5142",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/5142"
|
||||
"name": "23487",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23487"
|
||||
},
|
||||
{
|
||||
"name": "1017441",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://securitytracker.com/id?1017441"
|
||||
},
|
||||
{
|
||||
"name" : "23487",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23487"
|
||||
"name": "ADV-2006-5142",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/5142"
|
||||
},
|
||||
{
|
||||
"name": "http://www.eeye.com/Resources/Security-Center/Research/Zero-Day-Tracker/2005/20051116",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.eeye.com/Resources/Security-Center/Research/Zero-Day-Tracker/2005/20051116"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "myphpnuke-display-file-include(31136)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31136"
|
||||
},
|
||||
{
|
||||
"name": "http://cyber-security.org/DataDetayAll.asp?Data_id=586",
|
||||
"refsource": "MISC",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "21744",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21744"
|
||||
},
|
||||
{
|
||||
"name" : "myphpnuke-display-file-include(31136)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31136"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://freshmeat.net/projects/ed/?branch_id=17855&release_id=240890",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://freshmeat.net/projects/ed/?branch_id=17855&release_id=240890"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.rpath.com/browse/RPL-962",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.rpath.com/browse/RPL-962"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2007-099",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://fedoranews.org/cms/node/2449"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2007-100",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://fedoranews.org/cms/node/2450"
|
||||
"name": "gnued-opensbuf-symlink(30374)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30374"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:023",
|
||||
@ -82,40 +67,55 @@
|
||||
"refsource": "TRUSTIX",
|
||||
"url": "http://www.trustix.org/errata/2007/0005"
|
||||
},
|
||||
{
|
||||
"name" : "22129",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22129"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4573",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4573"
|
||||
},
|
||||
{
|
||||
"name": "23832",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23832"
|
||||
},
|
||||
{
|
||||
"name" : "23848",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23848"
|
||||
},
|
||||
{
|
||||
"name": "23857",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23857"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2007-099",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://fedoranews.org/cms/node/2449"
|
||||
},
|
||||
{
|
||||
"name": "23848",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23848"
|
||||
},
|
||||
{
|
||||
"name": "22129",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22129"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2007-100",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://fedoranews.org/cms/node/2450"
|
||||
},
|
||||
{
|
||||
"name": "24054",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24054"
|
||||
},
|
||||
{
|
||||
"name" : "gnued-opensbuf-symlink(30374)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30374"
|
||||
"name": "ADV-2006-4573",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4573"
|
||||
},
|
||||
{
|
||||
"name": "http://freshmeat.net/projects/ed/?branch_id=17855&release_id=240890",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://freshmeat.net/projects/ed/?branch_id=17855&release_id=240890"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-962",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-962"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2010-2168",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100630 VUPEN Security Research - Adobe Acrobat and Reader \"newfunction\" Memory Corruption Vulnerability (CVE-2010-2168)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/512096"
|
||||
"name": "ADV-2010-1636",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1636"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb10-15.html",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/41236"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:7167",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7167"
|
||||
"name": "20100630 VUPEN Security Research - Adobe Acrobat and Reader \"newfunction\" Memory Corruption Vulnerability (CVE-2010-2168)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/512096"
|
||||
},
|
||||
{
|
||||
"name": "1024159",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://www.securitytracker.com/id?1024159"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1636",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1636"
|
||||
"name": "oval:org.mitre.oval:def:7167",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7167"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2010-2383",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2010-2434",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ponsoftware.com/archiver/bug.htm#lzh_bufover",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ponsoftware.com/archiver/bug.htm#lzh_bufover"
|
||||
},
|
||||
{
|
||||
"name" : "JVN#34729123",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/en/jp/JVN34729123/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2010-000026",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000026.html"
|
||||
"name": "65666",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/65666"
|
||||
},
|
||||
{
|
||||
"name": "41025",
|
||||
@ -73,19 +63,29 @@
|
||||
"url": "http://www.securityfocus.com/bid/41025"
|
||||
},
|
||||
{
|
||||
"name" : "65666",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/65666"
|
||||
"name": "http://www.ponsoftware.com/archiver/bug.htm#lzh_bufover",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ponsoftware.com/archiver/bug.htm#lzh_bufover"
|
||||
},
|
||||
{
|
||||
"name": "40324",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/40324"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2010-000026",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000026.html"
|
||||
},
|
||||
{
|
||||
"name": "explzh-lhaprocessing-bo(59624)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59624"
|
||||
},
|
||||
{
|
||||
"name": "JVN#34729123",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN34729123/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-2498",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[freetype] 20100712 FreeType 2.4.0 has been released",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
|
||||
"name": "USN-963-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-963-1"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100713 Multiple bugs in freetype",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=127905701201340&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100714 Re: Multiple bugs in freetype",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=127909326909362&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2",
|
||||
"name": "http://support.apple.com/kb/HT4435",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2"
|
||||
"url": "http://support.apple.com/kb/HT4435"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613160",
|
||||
@ -83,24 +73,39 @@
|
||||
"url": "https://savannah.nongnu.org/bugs/?30106"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4435",
|
||||
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4435"
|
||||
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2"
|
||||
},
|
||||
{
|
||||
"name": "[freetype] 20100712 FreeType 2.4.0 has been released",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2010-11-10-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100714 Re: Multiple bugs in freetype",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2070",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2010/dsa-2070"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2010:137",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
|
||||
"name": "[oss-security] 20100713 Multiple bugs in freetype",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
|
||||
},
|
||||
{
|
||||
"name": "1024266",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1024266"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2010:0578",
|
||||
@ -108,14 +113,9 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-963-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-963-1"
|
||||
},
|
||||
{
|
||||
"name" : "1024266",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1024266"
|
||||
"name": "MDVSA-2010:137",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
|
||||
},
|
||||
{
|
||||
"name": "48951",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-0190",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4581",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4581"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-03-21-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4581",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4581"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security_alert@emc.com",
|
||||
"ID": "CVE-2011-0322",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20110315 ESA-2011-009: RSA, The Security Division of EMC, announces a fix for potential security vulnerability in RSA Access Manager Server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/517023/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "46875",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/46875"
|
||||
},
|
||||
{
|
||||
"name" : "1025214",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1025214"
|
||||
},
|
||||
{
|
||||
"name": "43796",
|
||||
"refsource": "SECUNIA",
|
||||
@ -77,6 +62,21 @@
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/8142"
|
||||
},
|
||||
{
|
||||
"name": "1025214",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1025214"
|
||||
},
|
||||
{
|
||||
"name": "46875",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/46875"
|
||||
},
|
||||
{
|
||||
"name": "20110315 ESA-2011-009: RSA, The Security Division of EMC, announces a fix for potential security vulnerability in RSA Access Manager Server",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/517023/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0676",
|
||||
"refsource": "VUPEN",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2011-0664",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS11-039",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-039"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:12105",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12105"
|
||||
},
|
||||
{
|
||||
"name": "MS11-039",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-039"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,20 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=74675"
|
||||
},
|
||||
{
|
||||
"name": "46785",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/46785"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html"
|
||||
},
|
||||
{
|
||||
"name" : "46785",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/46785"
|
||||
"name": "google-memory-info-discloure(65970)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65970"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14455",
|
||||
@ -76,11 +81,6 @@
|
||||
"name": "ADV-2011-0628",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0628"
|
||||
},
|
||||
{
|
||||
"name" : "google-memory-info-discloure(65970)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65970"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,69 +53,69 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20140214 ESA-2014-009: RSA BSAFE SSL-J Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-02/0061.html"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110708 SSL renegotiation DoS CVE-2011-1473",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/07/08/2"
|
||||
},
|
||||
{
|
||||
"name" : "[tls] 20110315 Re: SSL Renegotiation DOS",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.ietf.org/mail-archive/web/tls/current/msg07564.html"
|
||||
"name": "http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html"
|
||||
},
|
||||
{
|
||||
"name": "[tls] 20110315 Re: SSL Renegotiation DOS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.ietf.org/mail-archive/web/tls/current/msg07567.html"
|
||||
},
|
||||
{
|
||||
"name" : "[tls] 20110315 SSL Renegotiation DOS",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.ietf.org/mail-archive/web/tls/current/msg07553.html"
|
||||
},
|
||||
{
|
||||
"name" : "[tls] 20110318 Re: SSL Renegotiation DOS",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.ietf.org/mail-archive/web/tls/current/msg07576.html"
|
||||
},
|
||||
{
|
||||
"name": "[tls] 20110318 Re: SSL Renegotiation DOS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.ietf.org/mail-archive/web/tls/current/msg07577.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://orchilles.com/2011/03/ssl-renegotiation-dos.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://orchilles.com/2011/03/ssl-renegotiation-dos.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=707065",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=707065"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMU02776",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
|
||||
"name": "20140214 ESA-2014-009: RSA BSAFE SSL-J Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-02/0061.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110708 SSL renegotiation DoS CVE-2011-1473",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/07/08/2"
|
||||
},
|
||||
{
|
||||
"name": "SSRT100852",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
|
||||
},
|
||||
{
|
||||
"name": "[tls] 20110318 Re: SSL Renegotiation DOS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.ietf.org/mail-archive/web/tls/current/msg07576.html"
|
||||
},
|
||||
{
|
||||
"name": "http://orchilles.com/2011/03/ssl-renegotiation-dos.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://orchilles.com/2011/03/ssl-renegotiation-dos.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMU02776",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
|
||||
},
|
||||
{
|
||||
"name": "[tls] 20110315 SSL Renegotiation DOS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.ietf.org/mail-archive/web/tls/current/msg07553.html"
|
||||
},
|
||||
{
|
||||
"name": "[tls] 20110315 Re: SSL Renegotiation DOS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.ietf.org/mail-archive/web/tls/current/msg07564.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2011-1962",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20140321 CVE request for vulnerability in OpenStack Nova",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2014/03/21/1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140321 Re: CVE request for vulnerability in OpenStack Nova",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/03/21/2"
|
||||
},
|
||||
{
|
||||
"name": "57498",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/57498"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.launchpad.net/nova/+bug/1269418",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.launchpad.net/nova/+bug/1269418"
|
||||
},
|
||||
{
|
||||
"name" : "57498",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/57498"
|
||||
"name": "[oss-security] 20140321 CVE request for vulnerability in OpenStack Nova",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/03/21/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-2786",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS14-037",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037"
|
||||
},
|
||||
{
|
||||
"name": "68371",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68371"
|
||||
},
|
||||
{
|
||||
"name" : "1030532",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030532"
|
||||
"name": "MS14-037",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037"
|
||||
},
|
||||
{
|
||||
"name": "59775",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59775"
|
||||
},
|
||||
{
|
||||
"name": "1030532",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030532"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2014-3045",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2014-3275",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=34328",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=34328"
|
||||
"name": "67555",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/67555"
|
||||
},
|
||||
{
|
||||
"name": "20140521 Cisco ISE Blind SQL Injection Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3275"
|
||||
},
|
||||
{
|
||||
"name" : "67555",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/67555"
|
||||
},
|
||||
{
|
||||
"name": "1030273",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030273"
|
||||
},
|
||||
{
|
||||
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34328",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34328"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2014-3393",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2014-6538",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
|
||||
},
|
||||
{
|
||||
"name": "70495",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/70495"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-6919",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "VU#542369",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/542369"
|
||||
},
|
||||
{
|
||||
"name" : "VU#582497",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/582497"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7041",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#373233",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7176/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7176/"
|
||||
},
|
||||
{
|
||||
"name": "35098",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -62,21 +67,6 @@
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Oct/119"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7176/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7176/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.tuleap.org/recent-vulnerabilities",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.tuleap.org/recent-vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name": "70773",
|
||||
"refsource": "BID",
|
||||
@ -86,6 +76,16 @@
|
||||
"name": "tuleap-cve20147176-sql-injection(98307)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98307"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tuleap.org/recent-vulnerabilities",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tuleap.org/recent-vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7633",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#371913",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7670",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#237713",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-7790",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2016-2791",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,116 +52,51 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-37.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-37.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1243473",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1243473"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3510",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3510"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3515",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3515"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3520",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3520"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201605-06",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201605-06"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201701-63",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201701-63"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0894",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1767",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1769",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1778",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:0909",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:0727",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:0777",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:0731",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:0733",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html"
|
||||
"name": "84222",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/84222"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:0820",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1767",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0731",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:0727",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1778",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0876",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2917-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2917-2"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2917-3",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2917-3"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2934-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2934-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2917-1",
|
||||
"refsource": "UBUNTU",
|
||||
@ -173,14 +108,79 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-2927-1"
|
||||
},
|
||||
{
|
||||
"name" : "84222",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/84222"
|
||||
"name": "DSA-3520",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3520"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1769",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:0909",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3510",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3510"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0733",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-37.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-37.html"
|
||||
},
|
||||
{
|
||||
"name": "1035215",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035215"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:0777",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201605-06",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201605-06"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3515",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3515"
|
||||
},
|
||||
{
|
||||
"name": "USN-2934-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2934-1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1243473",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1243473"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-63",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-63"
|
||||
},
|
||||
{
|
||||
"name": "USN-2917-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2917-2"
|
||||
},
|
||||
{
|
||||
"name": "USN-2917-3",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2917-3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-1838",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-1911",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-1974",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://crbug.com/713686",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://crbug.com/713686"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201706-20",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201706-20"
|
||||
"name": "98861",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/98861"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1399",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1399"
|
||||
},
|
||||
{
|
||||
"name" : "98861",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/98861"
|
||||
},
|
||||
{
|
||||
"name": "1038622",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038622"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201706-20",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201706-20"
|
||||
},
|
||||
{
|
||||
"name": "https://crbug.com/713686",
|
||||
"refsource": "MISC",
|
||||
"url": "https://crbug.com/713686"
|
||||
},
|
||||
{
|
||||
"name": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-010-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-010-01"
|
||||
},
|
||||
{
|
||||
"name": "95355",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95355"
|
||||
},
|
||||
{
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-010-01",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-010-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,16 +53,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03727en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03727en_us"
|
||||
},
|
||||
{
|
||||
"name": "97386",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97386"
|
||||
},
|
||||
{
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03727en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03727en_us"
|
||||
},
|
||||
{
|
||||
"name": "1038176",
|
||||
"refsource": "SECTRACK",
|
||||
|
Loading…
x
Reference in New Issue
Block a user