mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
35434e0113
commit
0d5f7ed9e8
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20010410 multiple vulnerabilities in Alcatel Speed Touch DSL modems",
|
"name": "2566",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/175229"
|
"url": "http://www.securityfocus.com/bid/2566"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "CA-2001-08",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.cert.org/advisories/CA-2001-08.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#490344",
|
"name": "VU#490344",
|
||||||
@ -68,14 +63,19 @@
|
|||||||
"url": "http://www.kb.cert.org/vuls/id/490344"
|
"url": "http://www.kb.cert.org/vuls/id/490344"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "2566",
|
"name": "20010410 multiple vulnerabilities in Alcatel Speed Touch DSL modems",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/2566"
|
"url": "http://www.securityfocus.com/archive/1/175229"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "alcatel-tftp-lan-access(6336)",
|
"name": "alcatel-tftp-lan-access(6336)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6336"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6336"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "CA-2001-08",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.cert.org/advisories/CA-2001-08.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060423 Buffer-overflow and crash in Fenice OMS 1.10",
|
"name": "19770",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/431870/100/0/threaded"
|
"url": "http://secunia.com/advisories/19770"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060607 Re: Buffer-overflow and crash in Fenice OMS 1.10",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/436256/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060425 Fenice - Open Media Streaming Server remote BOF exploit",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/432002/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://aluigi.altervista.org/adv/fenicex-adv.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://aluigi.altervista.org/adv/fenicex-adv.txt"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "17678",
|
"name": "17678",
|
||||||
@ -78,20 +63,35 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/17678"
|
"url": "http://www.securityfocus.com/bid/17678"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-1491",
|
"name": "http://aluigi.altervista.org/adv/fenicex-adv.txt",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/1491"
|
"url": "http://aluigi.altervista.org/adv/fenicex-adv.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "19770",
|
"name": "20060423 Buffer-overflow and crash in Fenice OMS 1.10",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://secunia.com/advisories/19770"
|
"url": "http://www.securityfocus.com/archive/1/431870/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "794",
|
"name": "794",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/794"
|
"url": "http://securityreason.com/securityalert/794"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20060425 Fenice - Open Media Streaming Server remote BOF exploit",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/432002/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-1491",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/1491"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060607 Re: Buffer-overflow and crash in Fenice OMS 1.10",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/436256/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "fenice-parseurl-bo(26078)",
|
"name": "fenice-parseurl-bo(26078)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "19659",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/19659"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://pridels0.blogspot.com/2006/04/phpmyadmin-xss-vuln.html",
|
"name": "http://pridels0.blogspot.com/2006/04/phpmyadmin-xss-vuln.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -62,11 +67,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-2"
|
"url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "19659",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/19659"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "phpmyadmin-index-xss(25954)",
|
"name": "phpmyadmin-index-xss(25954)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/432576/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/432576/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.planetc.de/download/planetgallery/planetgallery.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.planetc.de/download/planetgallery/planetgallery.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "17753",
|
"name": "17753",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "825",
|
"name": "825",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/825"
|
"url": "http://securityreason.com/securityalert/825"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.planetc.de/download/planetgallery/planetgallery.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.planetc.de/download/planetgallery/planetgallery.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,20 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060429 I-RATER Platinum Remote File Inclusion exploit Cod3d by R@1D3N",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/432596/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20060428 [Kurdish Secure Advisory #1] I-RATER Platinum \"Admin/configsettings.tpl.php\" Remote File Include Vulnerability",
|
"name": "20060428 [Kurdish Secure Advisory #1] I-RATER Platinum \"Admin/configsettings.tpl.php\" Remote File Include Vulnerability",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/432404/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/432404/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "17731",
|
"name": "irater-configsettingtpl-file-include(26203)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/17731"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26203"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060429 I-RATER Platinum Remote File Inclusion exploit Cod3d by R@1D3N",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/432596/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "824",
|
"name": "824",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://securityreason.com/securityalert/824"
|
"url": "http://securityreason.com/securityalert/824"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "irater-configsettingtpl-file-include(26203)",
|
"name": "17731",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26203"
|
"url": "http://www.securityfocus.com/bid/17731"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://drupal.org/node/62406",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://drupal.org/node/62406"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "17885",
|
"name": "17885",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/17885"
|
"url": "http://www.securityfocus.com/bid/17885"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "drupal-projectmodule-xss(26358)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26358"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-1697",
|
"name": "ADV-2006-1697",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://secunia.com/advisories/19997"
|
"url": "http://secunia.com/advisories/19997"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "drupal-projectmodule-xss(26358)",
|
"name": "http://drupal.org/node/62406",
|
||||||
"refsource" : "XF",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26358"
|
"url": "http://drupal.org/node/62406"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2006-3126",
|
"ID": "CVE-2006-3126",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,19 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474",
|
"name": "19801",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474"
|
"url": "http://www.securityfocus.com/bid/19801"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-1165",
|
"name": "21726",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.debian.org/security/2006/dsa-1165"
|
"url": "http://secunia.com/advisories/21726"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200610-05",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-200610-05.xml"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SR:2007:004",
|
"name": "SUSE-SR:2007:004",
|
||||||
@ -73,9 +68,9 @@
|
|||||||
"url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
|
"url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "19801",
|
"name": "22450",
|
||||||
"refsource" : "BID",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/bid/19801"
|
"url": "http://secunia.com/advisories/22450"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-3430",
|
"name": "ADV-2006-3430",
|
||||||
@ -88,14 +83,19 @@
|
|||||||
"url": "http://secunia.com/advisories/21722"
|
"url": "http://secunia.com/advisories/21722"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21726",
|
"name": "GLSA-200610-05",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://secunia.com/advisories/21726"
|
"url": "http://security.gentoo.org/glsa/glsa-200610-05.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22450",
|
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url" : "http://secunia.com/advisories/22450"
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1165",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2006/dsa-1165"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,35 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060711 VBZooM \"sendmail.php\" SQL Injection",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/440133/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060711 VBZooM <=V1.11 \" ignore-pm.php\" SQL Injection",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/440145/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060711 VBZooM <=V1.11 \" reply.php\" SQL Injection",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/440141/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060711 VBZooM <=V1.11 \"sub-join.php\" SQL Injection",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/440114/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20080507 VBZooM <=V1.11 \"reply.php\" SQL Injection Vulnerability",
|
"name": "20080507 VBZooM <=V1.11 \"reply.php\" SQL Injection Vulnerability",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/491770/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/491770/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "18937",
|
"name": "20060711 VBZooM \"sendmail.php\" SQL Injection",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/18937"
|
"url": "http://www.securityfocus.com/archive/1/440133/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "vbzoom-userid-sql-injection(42254)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42254"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "28254",
|
"name": "28254",
|
||||||
@ -93,9 +78,24 @@
|
|||||||
"url": "http://securityreason.com/securityalert/1244"
|
"url": "http://securityreason.com/securityalert/1244"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "vbzoom-userid-sql-injection(42254)",
|
"name": "18937",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42254"
|
"url": "http://www.securityfocus.com/bid/18937"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060711 VBZooM <=V1.11 \" reply.php\" SQL Injection",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/440141/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060711 VBZooM <=V1.11 \" ignore-pm.php\" SQL Injection",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/440145/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060711 VBZooM <=V1.11 \"sub-join.php\" SQL Injection",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/440114/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,20 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20061124 Cahier de texte V2.0 SQL Code Execution Exploit",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/452600/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://acid-root.new.fr/poc/15061124.txt",
|
"name": "http://acid-root.new.fr/poc/15061124.txt",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://acid-root.new.fr/poc/15061124.txt"
|
"url": "http://acid-root.new.fr/poc/15061124.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21283",
|
"name": "1961",
|
||||||
"refsource" : "BID",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/bid/21283"
|
"url": "http://securityreason.com/securityalert/1961"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-4701",
|
"name": "ADV-2006-4701",
|
||||||
@ -78,9 +73,14 @@
|
|||||||
"url": "http://secunia.com/advisories/23122"
|
"url": "http://secunia.com/advisories/23122"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1961",
|
"name": "20061124 Cahier de texte V2.0 SQL Code Execution Exploit",
|
||||||
"refsource" : "SREASON",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://securityreason.com/securityalert/1961"
|
"url": "http://www.securityfocus.com/archive/1/452600/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21283",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/21283"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20061129 New report on Teredo security",
|
"name": "http://www.symantec.com/avcenter/reference/Teredo_Security.pdf",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/452989/100/0/threaded"
|
"url": "http://www.symantec.com/avcenter/reference/Teredo_Security.pdf"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20061129 Re: [Full-disclosure] New report on Teredo security",
|
"name": "20061129 Re: [Full-disclosure] New report on Teredo security",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/archive/1/452996/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/452996/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.symantec.com/avcenter/reference/Teredo_Security.pdf",
|
"name": "20061129 New report on Teredo security",
|
||||||
"refsource" : "MISC",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.symantec.com/avcenter/reference/Teredo_Security.pdf"
|
"url": "http://www.securityfocus.com/archive/1/452989/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,29 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
|
"name": "1017276",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
|
"url": "http://securitytracker.com/id?1017276"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://secunia.com/secunia_research/2006-71/advisory/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://secunia.com/secunia_research/2006-71/advisory/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.mailenable.com/hotfix/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.mailenable.com/hotfix/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21362",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/21362"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-4673",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/4673"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-4778",
|
"name": "ADV-2006-4778",
|
||||||
@ -83,29 +63,49 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2006/4778"
|
"url": "http://www.vupen.com/english/advisories/2006/4778"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1017276",
|
"name": "23080",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://securitytracker.com/id?1017276"
|
"url": "http://secunia.com/advisories/23080"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21362",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/21362"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1017319",
|
"name": "1017319",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1017319"
|
"url": "http://securitytracker.com/id?1017319"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.mailenable.com/hotfix/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.mailenable.com/hotfix/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-4673",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/4673"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "23047",
|
"name": "23047",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/23047"
|
"url": "http://secunia.com/advisories/23047"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "23080",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/23080"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "mailenable-meimaps-bo(30614)",
|
"name": "mailenable-meimaps-bo(30614)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://secunia.com/secunia_research/2006-71/advisory/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://secunia.com/secunia_research/2006-71/advisory/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "21461",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/21461"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20061206 Multiple Vendor Unusual MIME Encoding Content Filter Bypass",
|
"name": "20061206 Multiple Vendor Unusual MIME Encoding Content Filter Bypass",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "http://www.quantenblog.net/security/virus-scanner-bypass",
|
"name": "http://www.quantenblog.net/security/virus-scanner-bypass",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.quantenblog.net/security/virus-scanner-bypass"
|
"url": "http://www.quantenblog.net/security/virus-scanner-bypass"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21461",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/21461"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.firebirdsql.org/rlsnotes/Firebird-2.0-ReleaseNotes.pdf"
|
"url": "http://www.firebirdsql.org/rlsnotes/Firebird-2.0-ReleaseNotes.pdf"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-1529",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2008/dsa-1529"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "28474",
|
"name": "28474",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "29501",
|
"name": "29501",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/29501"
|
"url": "http://secunia.com/advisories/29501"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1529",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2008/dsa-1529"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2011-0145",
|
"ID": "CVE-2011-0145",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT4554",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT4554"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT4564",
|
"name": "http://support.apple.com/kb/HT4564",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -77,6 +72,11 @@
|
|||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
|
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT4554",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT4554"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2011-03-09-2",
|
"name": "APPLE-SA-2011-03-09-2",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2011-0182",
|
"ID": "CVE-2011-0182",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT4581",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT4581"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2011-03-21-1",
|
"name": "APPLE-SA-2011-03-21-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "8402",
|
"name": "8402",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/8402"
|
"url": "http://securityreason.com/securityalert/8402"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT4581",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT4581"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=67100",
|
"name": "chrome-pdf-pages-code-execution(64666)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=67100"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64666"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html",
|
"name": "http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html"
|
"url": "http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.srware.net/forum/viewtopic.php?f=18&t=2054",
|
"name": "70458",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.srware.net/forum/viewtopic.php?f=18&t=2054"
|
"url": "http://osvdb.org/70458"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "45788",
|
"name": "45788",
|
||||||
@ -73,9 +73,14 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/45788"
|
"url": "http://www.securityfocus.com/bid/45788"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "70458",
|
"name": "http://www.srware.net/forum/viewtopic.php?f=18&t=2054",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://osvdb.org/70458"
|
"url": "http://www.srware.net/forum/viewtopic.php?f=18&t=2054"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://code.google.com/p/chromium/issues/detail?id=67100",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://code.google.com/p/chromium/issues/detail?id=67100"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:14606",
|
"name": "oval:org.mitre.oval:def:14606",
|
||||||
@ -86,11 +91,6 @@
|
|||||||
"name": "42951",
|
"name": "42951",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/42951"
|
"url": "http://secunia.com/advisories/42951"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "chrome-pdf-pages-code-execution(64666)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64666"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-3369",
|
"ID": "CVE-2011-3369",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,20 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20110919 CVE Request? etherape remote crash (denial of service)",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2011/09/19/4"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20110922 Re: CVE Request? etherape remote crash (denial of service)",
|
"name": "[oss-security] 20110922 Re: CVE Request? etherape remote crash (denial of service)",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2011/09/22/1"
|
"url": "http://www.openwall.com/lists/oss-security/2011/09/22/1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://etherape.sourceforge.net/NEWS.html",
|
"name": "45989",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://etherape.sourceforge.net/NEWS.html"
|
"url": "http://secunia.com/advisories/45989"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20110919 CVE Request? etherape remote crash (denial of service)",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2011/09/19/4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://sourceforge.net/tracker/?func=detail&aid=3309061&group_id=2712&atid=102712",
|
"name": "http://sourceforge.net/tracker/?func=detail&aid=3309061&group_id=2712&atid=102712",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://sourceforge.net/tracker/?func=detail&aid=3309061&group_id=2712&atid=102712"
|
"url": "http://sourceforge.net/tracker/?func=detail&aid=3309061&group_id=2712&atid=102712"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "45989",
|
"name": "http://etherape.sourceforge.net/NEWS.html",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/45989"
|
"url": "http://etherape.sourceforge.net/NEWS.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2011-3409",
|
"ID": "CVE-2011-3409",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb",
|
"name": "FEDORA-2011-13633",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://puppet.com/security/cve/cve-2011-3869",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://puppet.com/security/cve/cve-2011-3869"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2314",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2011/dsa-2314"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2011-13623",
|
"name": "FEDORA-2011-13623",
|
||||||
@ -73,15 +63,25 @@
|
|||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "FEDORA-2011-13633",
|
"name": "DSA-2314",
|
||||||
"refsource" : "FEDORA",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html"
|
"url": "http://www.debian.org/security/2011/dsa-2314"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "46458",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/46458"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2011-13636",
|
"name": "FEDORA-2011-13636",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1223-1",
|
"name": "USN-1223-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
@ -93,9 +93,9 @@
|
|||||||
"url": "http://www.ubuntu.com/usn/USN-1223-2"
|
"url": "http://www.ubuntu.com/usn/USN-1223-2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "46458",
|
"name": "https://puppet.com/security/cve/cve-2011-3869",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/46458"
|
"url": "https://puppet.com/security/cve/cve-2011-3869"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-4324",
|
"ID": "CVE-2011-4324",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20120206 Re: CVE-2011-4324 kernel: nfsv4: mknod(2) DoS",
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9",
|
||||||
"refsource" : "MLIST",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2012/02/06/3"
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29",
|
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29"
|
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9",
|
"name": "[oss-security] 20120206 Re: CVE-2011-4324 kernel: nfsv4: mknod(2) DoS",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MLIST",
|
||||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9"
|
"url": "http://www.openwall.com/lists/oss-security/2012/02/06/3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=755440",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=755440",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-4622",
|
"ID": "CVE-2011-4622",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[kvm] 20111214 [PATCH 1/2] KVM: x86: Prevent starting PIT timers in the absence of irqchip support",
|
"name": "RHSA-2012:0051",
|
||||||
"refsource" : "MLIST",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://permalink.gmane.org/gmane.comp.emulators.kvm.devel/83564"
|
"url": "http://www.redhat.com/support/errata/RHSA-2012-0051.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20111221 Re: kernel: kvm: pit timer with no irqchip crashes the system",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2011/12/21/7"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=769721",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=769721",
|
||||||
@ -68,14 +63,19 @@
|
|||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769721"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769721"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2012:0051",
|
"name": "51172",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "BID",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2012-0051.html"
|
"url": "http://www.securityfocus.com/bid/51172"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2013:0925",
|
"name": "[oss-security] 20111221 Re: kernel: kvm: pit timer with no irqchip crashes the system",
|
||||||
"refsource" : "SUSE",
|
"refsource": "MLIST",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
|
"url": "http://www.openwall.com/lists/oss-security/2011/12/21/7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[kvm] 20111214 [PATCH 1/2] KVM: x86: Prevent starting PIT timers in the absence of irqchip support",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://permalink.gmane.org/gmane.comp.emulators.kvm.devel/83564"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2012:0616",
|
"name": "SUSE-SU-2012:0616",
|
||||||
@ -83,9 +83,9 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "51172",
|
"name": "openSUSE-SU-2013:0925",
|
||||||
"refsource" : "BID",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.securityfocus.com/bid/51172"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1026559",
|
"name": "1026559",
|
||||||
|
@ -53,44 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20111130 Sql injection in SugarCRM",
|
"name": "sugarcrm-index-sql-injection(71586)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/520685/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71586"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47839",
|
"name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47839",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47839"
|
"url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47839"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.htbridge.ch/advisory/sql_injection_in_sugarcrm.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "77459",
|
"name": "77459",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/77459"
|
"url": "http://www.osvdb.org/77459"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1026369",
|
"name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://securitytracker.com/id?1026369"
|
"url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47805"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "47011",
|
"name": "47011",
|
||||||
@ -98,9 +83,24 @@
|
|||||||
"url": "http://secunia.com/advisories/47011"
|
"url": "http://secunia.com/advisories/47011"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "sugarcrm-index-sql-injection(71586)",
|
"name": "1026369",
|
||||||
"refsource" : "XF",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71586"
|
"url": "http://securitytracker.com/id?1026369"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47806"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.sugarcrm.com/crm/support/bugs.html#issue_47800"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20111130 Sql injection in SugarCRM",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/520685/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-4947",
|
"ID": "CVE-2011-4947",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,25 +57,25 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2012/03/28/4"
|
"url": "http://www.openwall.com/lists/oss-security/2012/03/28/4"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20120328 Re: CVE-request: e107 HTB23004",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2012/03/29/3"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.htbridge.com/advisory/multiple_vulnerabilities_in_e107_1.html",
|
"name": "https://www.htbridge.com/advisory/multiple_vulnerabilities_in_e107_1.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://www.htbridge.com/advisory/multiple_vulnerabilities_in_e107_1.html"
|
"url": "https://www.htbridge.com/advisory/multiple_vulnerabilities_in_e107_1.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://e107.org/svn_changelog.php?version=0.7.26",
|
"name": "http://e107.org/svn_changelog.php?version=0.7.26",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://e107.org/svn_changelog.php?version=0.7.26"
|
"url": "http://e107.org/svn_changelog.php?version=0.7.26"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306",
|
"name": "[oss-security] 20120328 Re: CVE-request: e107 HTB23004",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MLIST",
|
||||||
"url" : "http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306"
|
"url": "http://www.openwall.com/lists/oss-security/2012/03/29/3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "e107-usersextended-xss(68062)",
|
"name": "e107-usersextended-xss(68062)",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2013-5806",
|
"ID": "CVE-2013-5806",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201406-32",
|
"name": "GLSA-201406-32",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "HPSBUX02944",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2013:1666",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2013:1663",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-2089-1",
|
"name": "USN-2089-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2089-1"
|
"url": "http://www.ubuntu.com/usn/USN-2089-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "63122",
|
"name": "HPSBUX02944",
|
||||||
"refsource" : "BID",
|
"refsource": "HP",
|
||||||
"url" : "http://www.securityfocus.com/bid/63122"
|
"url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2013:1663",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2013:1666",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:18501",
|
"name": "oval:org.mitre.oval:def:18501",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18501"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18501"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "63122",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/63122"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2013-5883",
|
"ID": "CVE-2013-5883",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "64758",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/64758"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "64862",
|
"name": "64862",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -76,6 +66,16 @@
|
|||||||
"name": "oracle-cpujan2014-cve20135883(90363)",
|
"name": "oracle-cpujan2014-cve20135883(90363)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90363"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90363"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "64758",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/64758"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20130828 Drupal Node View Permissions module and Flag module Vulnerabilities",
|
"name": "https://drupal.org/node/2031621",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-08/0184.html"
|
"url": "https://drupal.org/node/2031621"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130911 Re: CVE request for Drupal contrib modules",
|
"name": "[oss-security] 20130911 Re: CVE request for Drupal contrib modules",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/09/11/9"
|
"url": "http://www.openwall.com/lists/oss-security/2013/09/11/9"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://drupal.org/node/2076315",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://drupal.org/node/2076315"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://drupal.org/node/2031621",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://drupal.org/node/2031621"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "54550",
|
"name": "54550",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/54550"
|
"url": "http://secunia.com/advisories/54550"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20130828 Drupal Node View Permissions module and Flag module Vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0184.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://drupal.org/node/2076315",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://drupal.org/node/2076315"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||||
"ID": "CVE-2014-2349",
|
"ID": "CVE-2014-2349",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||||
"ID": "CVE-2014-2355",
|
"ID": "CVE-2014-2355",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2014-2766",
|
"ID": "CVE-2014-2766",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "MS14-035",
|
"name": "1030370",
|
||||||
"refsource" : "MS",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
|
"url": "http://www.securitytracker.com/id/1030370"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "67850",
|
"name": "67850",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/67850"
|
"url": "http://www.securityfocus.com/bid/67850"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1030370",
|
"name": "MS14-035",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MS",
|
||||||
"url" : "http://www.securitytracker.com/id/1030370"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "GLSA-201812-10",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201812-10"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://launchpad.net/bugs/1186676",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://launchpad.net/bugs/1186676"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://savannah.nongnu.org/bugs/?40023",
|
"name": "http://savannah.nongnu.org/bugs/?40023",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,16 +71,6 @@
|
|||||||
"name": "https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu",
|
"name": "https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu"
|
"url": "https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://launchpad.net/bugs/1186676",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://launchpad.net/bugs/1186676"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201812-10",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201812-10"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2014-6146",
|
"ID": "CVE-2014-6146",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "62190",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/62190"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21689082",
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21689082",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -62,11 +67,6 @@
|
|||||||
"refsource": "AIXAPAR",
|
"refsource": "AIXAPAR",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04337"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04337"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "62190",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/62190"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ibm-sterling-cve20146146-info-disc(96916)",
|
"name": "ibm-sterling-cve20146146-info-disc(96916)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://typo3.org/extensions/repository/view/cwt_feedit",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://typo3.org/extensions/repository/view/cwt_feedit"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "69562",
|
"name": "69562",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -72,10 +62,20 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/60888"
|
"url": "http://secunia.com/advisories/60888"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://typo3.org/extensions/repository/view/cwt_feedit",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://typo3.org/extensions/repository/view/cwt_feedit"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "cwtfeedit-unspecified-code-exec(95700)",
|
"name": "cwtfeedit-unspecified-code-exec(95700)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95700"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95700"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/34861"
|
"url": "http://www.exploit-db.com/exploits/34861"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20141001 CVE-2014-6389 - Remote Command Execution in PHPCompta/NOALYSS",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://seclists.org/fulldisclosure/2014/Oct/7"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/128526/PHPCompta-NOALYSS-6.7.1-5638-Remote-Command-Execution.html",
|
"name": "http://packetstormsecurity.com/files/128526/PHPCompta-NOALYSS-6.7.1-5638-Remote-Command-Execution.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "phpcompta-cve20146389-command-exec(96791)",
|
"name": "phpcompta-cve20146389-command-exec(96791)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96791"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96791"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20141001 CVE-2014-6389 - Remote Command Execution in PHPCompta/NOALYSS",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2014/Oct/7"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2014-6478",
|
"ID": "CVE-2014-6478",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
|
"name": "70489",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
|
"url": "http://www.securityfocus.com/bid/70489"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
|
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698"
|
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2015:0743",
|
"name": "SUSE-SU-2015:0743",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "70489",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/70489"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-7375",
|
"ID": "CVE-2014-7375",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "VU#582497",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "VU#281889",
|
"name": "VU#281889",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/281889"
|
"url": "http://www.kb.cert.org/vuls/id/281889"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#582497",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/582497"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2017-0455",
|
"ID": "CVE-2017-0455",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://source.android.com/security/bulletin/2017-03-01",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.android.com/security/bulletin/2017-03-01"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "96812",
|
"name": "96812",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/96812"
|
"url": "http://www.securityfocus.com/bid/96812"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.android.com/security/bulletin/2017-03-01",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1037968",
|
"name": "1037968",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037968"
|
"url": "http://www.securitytracker.com/id/1037968"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2017-0550",
|
"ID": "CVE-2017-0550",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -62,9 +62,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51",
|
"name": "97336",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51"
|
"url": "http://www.securityfocus.com/bid/97336"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.android.com/security/bulletin/2017-04-01",
|
"name": "https://source.android.com/security/bulletin/2017-04-01",
|
||||||
@ -72,9 +72,9 @@
|
|||||||
"url": "https://source.android.com/security/bulletin/2017-04-01"
|
"url": "https://source.android.com/security/bulletin/2017-04-01"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "97336",
|
"name": "https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/97336"
|
"url": "https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1038201",
|
"name": "1038201",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2017-0636",
|
"ID": "CVE-2017-0636",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"DATE_PUBLIC": "2017-10-02T00:00:00",
|
"DATE_PUBLIC": "2017-10-02T00:00:00",
|
||||||
"ID": "CVE-2017-0825",
|
"ID": "CVE-2017-0825",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2017-12-29",
|
"DATE_ASSIGNED": "2017-12-29",
|
||||||
"ID": "CVE-2017-1000466",
|
"ID": "CVE-2017-1000466",
|
||||||
"REQUESTER": "sajeeb.lohani@bulletproof.sh",
|
"REQUESTER": "sajeeb.lohani@bulletproof.sh",
|
||||||
@ -13,18 +13,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "invoiceninja",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "<= invoiceninja v3.8.1"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "invoiceninja"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -46,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "CWE-79"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -59,6 +59,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "101663",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/101663"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/122200",
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/122200",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -68,11 +73,6 @@
|
|||||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg21997685",
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg21997685",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg21997685"
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg21997685"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "101663",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/101663"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-1822",
|
"ID": "CVE-2017-1822",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4070",
|
"ID": "CVE-2017-4070",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4311",
|
"ID": "CVE-2017-4311",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4434",
|
"ID": "CVE-2017-4434",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.securityfocus.com/archive/1/540338/30/0/threaded",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/540338/30/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "97222",
|
"name": "97222",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/97222"
|
"url": "http://www.securityfocus.com/bid/97222"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.securityfocus.com/archive/1/540338/30/0/threaded",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/540338/30/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user