mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5e5da33835
commit
0d83dde74f
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060116 Digital Armaments Security Advisory 01.16.2006: CMU SNMP utilities snmptrad Format String Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/422086/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.digitalarmaments.com/2006040164883273.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.digitalarmaments.com/2006040164883273.html"
|
||||
},
|
||||
{
|
||||
"name": "16267",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16267"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0234",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0234"
|
||||
},
|
||||
{
|
||||
"name": "22493",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/22493"
|
||||
},
|
||||
{
|
||||
"name": "http://www.digitalarmaments.com/2006040164883273.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.digitalarmaments.com/2006040164883273.html"
|
||||
},
|
||||
{
|
||||
"name": "18525",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18525"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0234",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0234"
|
||||
},
|
||||
{
|
||||
"name": "cmusnmp-snmpinput-format-string(24178)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24178"
|
||||
},
|
||||
{
|
||||
"name": "20060116 Digital Armaments Security Advisory 01.16.2006: CMU SNMP utilities snmptrad Format String Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/422086/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,30 +57,30 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.dslreports.com/forum/remark,15601404~days=9999~start=20"
|
||||
},
|
||||
{
|
||||
"name": "19284",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19284"
|
||||
},
|
||||
{
|
||||
"name": "http://forum.avast.com/index.php?topic=19862.0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://forum.avast.com/index.php?topic=19862.0"
|
||||
},
|
||||
{
|
||||
"name" : "17158",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/17158"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1011",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1011"
|
||||
},
|
||||
{
|
||||
"name" : "19284",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19284"
|
||||
},
|
||||
{
|
||||
"name": "avast-default-insecure-permissions(25336)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25336"
|
||||
},
|
||||
{
|
||||
"name": "17158",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17158"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060417 [eVuln] Wire Plastik wpBlog SQL Injection Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/431186/100/0/threaded"
|
||||
"name": "24385",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/24385"
|
||||
},
|
||||
{
|
||||
"name" : "http://evuln.com/vulns/119/summary.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://evuln.com/vulns/119/summary.html"
|
||||
"name": "wpblog-index-sql-injection(25628)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25628"
|
||||
},
|
||||
{
|
||||
"name": "17381",
|
||||
@ -72,20 +72,15 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1238"
|
||||
},
|
||||
{
|
||||
"name" : "24385",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/24385"
|
||||
},
|
||||
{
|
||||
"name": "1015951",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015951"
|
||||
},
|
||||
{
|
||||
"name" : "19538",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19538"
|
||||
"name": "http://evuln.com/vulns/119/summary.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://evuln.com/vulns/119/summary.html"
|
||||
},
|
||||
{
|
||||
"name": "734",
|
||||
@ -93,9 +88,14 @@
|
||||
"url": "http://securityreason.com/securityalert/734"
|
||||
},
|
||||
{
|
||||
"name" : "wpblog-index-sql-injection(25628)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25628"
|
||||
"name": "19538",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19538"
|
||||
},
|
||||
{
|
||||
"name": "20060417 [eVuln] Wire Plastik wpBlog SQL Injection Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/431186/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060722 Microsoft Internet Explorer DOS Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-07/0379.html"
|
||||
"name": "29129",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/29129"
|
||||
},
|
||||
{
|
||||
"name": "ie-wininet-dos(27900)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27900"
|
||||
},
|
||||
{
|
||||
"name": "2039",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2039"
|
||||
},
|
||||
{
|
||||
"name" : "19092",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19092"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2917",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2917"
|
||||
},
|
||||
{
|
||||
"name" : "29129",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/29129"
|
||||
"name": "20060722 Microsoft Internet Explorer DOS Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0379.html"
|
||||
},
|
||||
{
|
||||
"name": "19092",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19092"
|
||||
},
|
||||
{
|
||||
"name": "1683",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1683"
|
||||
},
|
||||
{
|
||||
"name" : "ie-wininet-dos(27900)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27900"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,20 +53,15 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061014 patchlodel-0.7.3 - Remote File Include Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=116104206220783&w=2"
|
||||
"name": "ADV-2006-4082",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4082"
|
||||
},
|
||||
{
|
||||
"name": "20551",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20551"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4082",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4082"
|
||||
},
|
||||
{
|
||||
"name": "22429",
|
||||
"refsource": "SECUNIA",
|
||||
@ -76,6 +71,11 @@
|
||||
"name": "patchlodel-calcul-file-include(29606)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29606"
|
||||
},
|
||||
{
|
||||
"name": "20061014 patchlodel-0.7.3 - Remote File Include Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=116104206220783&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2006-5993",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2010-0240",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2010-0476",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS10-020",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-020"
|
||||
},
|
||||
{
|
||||
"name" : "TA10-103A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-103A.html"
|
||||
},
|
||||
{
|
||||
"name": "39336",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/39336"
|
||||
},
|
||||
{
|
||||
"name": "39372",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/39372"
|
||||
},
|
||||
{
|
||||
"name": "MS10-020",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-020"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:6918",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6918"
|
||||
},
|
||||
{
|
||||
"name" : "39372",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/39372"
|
||||
"name": "TA10-103A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA10-103A.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "40375",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/40375"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/mac/1060/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/mac/1060/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/windows/1060/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/windows/1060/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/support/search/view/957/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/support/search/view/957/"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11856",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11856"
|
||||
},
|
||||
{
|
||||
"name" : "40375",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/40375"
|
||||
"name": "http://www.opera.com/support/search/view/957/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/support/search/view/957/"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1664",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1664"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/windows/1060/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/windows/1060/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://barnowl.mit.edu/wiki/release-notes/1.6.2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://barnowl.mit.edu/wiki/release-notes/1.6.2"
|
||||
},
|
||||
{
|
||||
"name": "http://github.com/barnowl/barnowl/blob/barnowl-1.6.2/ChangeLog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://github.com/barnowl/barnowl/blob/barnowl-1.6.2/ChangeLog"
|
||||
},
|
||||
{
|
||||
"name": "http://barnowl.mit.edu/wiki/release-notes/1.6.2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://barnowl.mit.edu/wiki/release-notes/1.6.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2010-3334",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,41 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1024705",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1024705"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11439",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11439"
|
||||
},
|
||||
{
|
||||
"name": "42144",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42144"
|
||||
},
|
||||
{
|
||||
"name": "20101109 Secunia Research: Microsoft Office Drawing Shape Container Parsing Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/514699/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "38521",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38521"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-2923",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/2923"
|
||||
},
|
||||
{
|
||||
"name": "44656",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/44656"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2010-4/",
|
||||
"refsource": "MISC",
|
||||
@ -71,36 +101,6 @@
|
||||
"name": "TA10-313A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA10-313A.html"
|
||||
},
|
||||
{
|
||||
"name" : "44656",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/44656"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11439",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11439"
|
||||
},
|
||||
{
|
||||
"name" : "1024705",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1024705"
|
||||
},
|
||||
{
|
||||
"name" : "38521",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38521"
|
||||
},
|
||||
{
|
||||
"name" : "42144",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42144"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-2923",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/2923"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-3704",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,180 +52,120 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "FEDORA-2010-16662",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101004 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/10/04/6"
|
||||
},
|
||||
{
|
||||
"name" : "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch"
|
||||
},
|
||||
{
|
||||
"name" : "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=638960",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=638960"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2119",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2010/dsa-2119"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2135",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2010/dsa-2135"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-15857",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2010-15911",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2010-15981",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2010-16662",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2010-16705",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2010-16744",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2010:228",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2010:229",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2010:230",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2010:231",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2012:144",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2010:0749",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0749.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2010:0751",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0751.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2010:0752",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0752.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2010:0753",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0753.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2010:0859",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1201",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
|
||||
},
|
||||
{
|
||||
"name" : "SSA:2010-324-01",
|
||||
"refsource" : "SLACKWARE",
|
||||
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2010:022",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2010:024",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1005-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1005-1"
|
||||
},
|
||||
{
|
||||
"name" : "43841",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/43841"
|
||||
},
|
||||
{
|
||||
"name" : "42141",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42141"
|
||||
},
|
||||
{
|
||||
"name" : "42397",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42397"
|
||||
},
|
||||
{
|
||||
"name": "42357",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42357"
|
||||
},
|
||||
{
|
||||
"name" : "42691",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42691"
|
||||
"name": "MDVSA-2010:228",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228"
|
||||
},
|
||||
{
|
||||
"name" : "43079",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43079"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-2897",
|
||||
"name": "ADV-2011-0230",
|
||||
"refsource": "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/2897"
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0230"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2010:0752",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=638960",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2010:230",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2010:022",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473"
|
||||
},
|
||||
{
|
||||
"name": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1201",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2010:231",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-16705",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html"
|
||||
},
|
||||
{
|
||||
"name": "SSA:2010-324-01",
|
||||
"refsource": "SLACKWARE",
|
||||
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2010:0751",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html"
|
||||
},
|
||||
{
|
||||
"name": "42397",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42397"
|
||||
},
|
||||
{
|
||||
"name": "42141",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42141"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-15911",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:144",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-3097",
|
||||
@ -233,9 +173,69 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2010/3097"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0230",
|
||||
"name": "USN-1005-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1005-1"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2010:0749",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-15981",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-16744",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-2897",
|
||||
"refsource": "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0230"
|
||||
"url": "http://www.vupen.com/english/advisories/2010/2897"
|
||||
},
|
||||
{
|
||||
"name": "42691",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42691"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2119",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2010/dsa-2119"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2010:024",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2010:229",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229"
|
||||
},
|
||||
{
|
||||
"name": "43841",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/43841"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2135",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2010/dsa-2135"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2010:0753",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html"
|
||||
},
|
||||
{
|
||||
"name": "43079",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43079"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-3849",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20101207 Linux kernel exploit",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2010/11/30/1"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fa0e846494792e722d817b9d3d625a4ef4896c96",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fa0e846494792e722d817b9d3d625a4ef4896c96"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
|
||||
"name": "43056",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43056"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=644156",
|
||||
@ -78,9 +63,29 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=644156"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2126",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2010/dsa-2126"
|
||||
"name": "20101207 Linux kernel exploit",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2011:007",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/11/30/1"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0298",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0298"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2010:257",
|
||||
@ -93,14 +98,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2011:007",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2011:008",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
|
||||
"name": "ADV-2011-0375",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0375"
|
||||
},
|
||||
{
|
||||
"name": "USN-1023-1",
|
||||
@ -108,9 +108,9 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-1023-1"
|
||||
},
|
||||
{
|
||||
"name" : "43056",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43056"
|
||||
"name": "SUSE-SA:2011:008",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "43291",
|
||||
@ -123,14 +123,14 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0213"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0298",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0298"
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fa0e846494792e722d817b9d3d625a4ef4896c96",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fa0e846494792e722d817b9d3d625a4ef4896c96"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0375",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0375"
|
||||
"name": "DSA-2126",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2010/dsa-2126"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2010-4009",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4447",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4447"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4581",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4581"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2010-12-07-1",
|
||||
"refsource": "APPLE",
|
||||
@ -77,10 +67,20 @@
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16218"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4447",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4447"
|
||||
},
|
||||
{
|
||||
"name": "1024830",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1024830"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4581",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4581"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2010-4134",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "15646",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/15646"
|
||||
"name": "http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226"
|
||||
},
|
||||
{
|
||||
"name": "45115",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/45115"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/files/view/96230/dynpg-lfisqldisclose.txt",
|
||||
@ -67,20 +72,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.htbridge.ch/advisory/sql_injection_in_dynpg.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226"
|
||||
},
|
||||
{
|
||||
"name" : "45115",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/45115"
|
||||
},
|
||||
{
|
||||
"name": "69631",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/69631"
|
||||
},
|
||||
{
|
||||
"name": "15646",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/15646"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-3371",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20140514 CVE request: Pyplate multiple vulnerabilities",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2014/05/14/3"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140523 Re: CVE request: Pyplate multiple vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/05/23/1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140514 CVE request: Pyplate multiple vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/05/14/3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "33804",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/33804"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/127133/Ubisoft-Rayman-Legends-1.2.103716-Buffer-Overflow.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/127133/Ubisoft-Rayman-Legends-1.2.103716-Buffer-Overflow.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5187.php",
|
||||
"refsource": "MISC",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "68080",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68080"
|
||||
},
|
||||
{
|
||||
"name": "33804",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/33804"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/127133/Ubisoft-Rayman-Legends-1.2.103716-Buffer-Overflow.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/127133/Ubisoft-Rayman-Legends-1.2.103716-Buffer-Overflow.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2014-4398",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=32",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=32"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT6443",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT6443"
|
||||
"name": "macosx-cve20144398-code-exec(96058)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96058"
|
||||
},
|
||||
{
|
||||
"name": "69894",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/69894"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/google-security-research/issues/detail?id=32",
|
||||
"refsource": "MISC",
|
||||
"url": "https://code.google.com/p/google-security-research/issues/detail?id=32"
|
||||
},
|
||||
{
|
||||
"name": "1030868",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030868"
|
||||
},
|
||||
{
|
||||
"name" : "macosx-cve20144398-code-exec(96058)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/96058"
|
||||
"name": "http://support.apple.com/kb/HT6443",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT6443"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-4867",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-8374",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2014-8451",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "35129",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/35129"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/129102/Whos-Who-Script-Cross-Site-Request-Forgery.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/129102/Whos-Who-Script-Cross-Site-Request-Forgery.html"
|
||||
},
|
||||
{
|
||||
"name": "35129",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/35129"
|
||||
},
|
||||
{
|
||||
"name": "whoswhoscript-multiple-csrf(98631)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-14-402/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-14-402/"
|
||||
},
|
||||
{
|
||||
"name": "http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-14-402/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-14-402/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "62101",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62101"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q4/867"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mantisbt.org/bugs/view.php?id=17874",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mantisbt.org/bugs/view.php?id=17874"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT",
|
||||
"refsource": "MLIST",
|
||||
@ -72,20 +82,10 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/mantisbt/mantisbt/commit/9fb8cf36f"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.mantisbt.org/bugs/view.php?id=17874",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.mantisbt.org/bugs/view.php?id=17874"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3120",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3120"
|
||||
},
|
||||
{
|
||||
"name" : "62101",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62101"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "61396",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/61396"
|
||||
},
|
||||
{
|
||||
"name": "20141224 Reflecting XSS Vulnerability in CMS Contenido 4.9.x-4.9.5",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -72,20 +77,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/129713/CMS-Contenido-4.9.5-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.contenido.org/de/cms/CONTENIDO/News/index-c-2044-3.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.contenido.org/de/cms/CONTENIDO/News/index-c-2044-3.html"
|
||||
},
|
||||
{
|
||||
"name" : "61396",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/61396"
|
||||
},
|
||||
{
|
||||
"name": "contenido-frontcontent-xss(99497)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99497"
|
||||
},
|
||||
{
|
||||
"name": "http://www.contenido.org/de/cms/CONTENIDO/News/index-c-2044-3.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.contenido.org/de/cms/CONTENIDO/News/index-c-2044-3.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"ID": "CVE-2014-9770",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20160408 CVE Request: systemd / journald created world readable journal files",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/04/08/14"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160408 Re: CVE Request: systemd / journald created world readable journal files",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/04/08/15"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=972612",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=972612"
|
||||
"name": "[oss-security] 20160408 CVE Request: systemd / journald created world readable journal files",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/04/08/14"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1414",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1101",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1414",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html"
|
||||
"name": "https://bugzilla.suse.com/show_bug.cgi?id=972612",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=972612"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2014-9867",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://source.android.com/security/bulletin/2016-08-01.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=322c518689a7f820165ca4c5d6b750b02ac34665",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=322c518689a7f820165ca4c5d6b750b02ac34665"
|
||||
},
|
||||
{
|
||||
"name": "92219",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92219"
|
||||
},
|
||||
{
|
||||
"name": "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=322c518689a7f820165ca4c5d6b750b02ac34665",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=322c518689a7f820165ca4c5d6b750b02ac34665"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-2484",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://source.android.com/security/bulletin/2016-06-01.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://source.android.com/security/bulletin/2016-06-01.html"
|
||||
},
|
||||
{
|
||||
"name": "https://android.googlesource.com/platform/frameworks/av/+/7cea5cb64b83d690fe02bc210bbdf08f5a87636f",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/7cea5cb64b83d690fe02bc210bbdf08f5a87636f"
|
||||
},
|
||||
{
|
||||
"name": "http://source.android.com/security/bulletin/2016-06-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://source.android.com/security/bulletin/2016-06-01.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2016-2834",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,89 +53,89 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-61.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-61.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1206283",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1206283"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1221620",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1221620"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1241034",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1241034"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1241037",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1241037"
|
||||
},
|
||||
{
|
||||
"name" : "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
"name": "1036057",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036057"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3688",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3688"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2779",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2779.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1552",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1557",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1691",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html"
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241034",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241034"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2993-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2993-1"
|
||||
"name": "RHSA-2016:2779",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2779.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-61.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-61.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221620",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221620"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes"
|
||||
},
|
||||
{
|
||||
"name": "USN-3029-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3029-1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206283",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1206283"
|
||||
},
|
||||
{
|
||||
"name": "91072",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91072"
|
||||
},
|
||||
{
|
||||
"name" : "1036057",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036057"
|
||||
"name": "openSUSE-SU-2016:1552",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2993-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2993-1"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1691",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241037",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1241037"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2016-3114",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-3861",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "40354",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/40354/"
|
||||
"name": "https://android.googlesource.com/platform/frameworks/native/+/1f4b49e64adf4623eefda503bca61e253597b9bf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/frameworks/native/+/1f4b49e64adf4623eefda503bca61e253597b9bf"
|
||||
},
|
||||
{
|
||||
"name": "http://source.android.com/security/bulletin/2016-09-01.html",
|
||||
@ -67,30 +67,30 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/3944c65637dfed14a5a895685edfa4bacaf9f76e"
|
||||
},
|
||||
{
|
||||
"name" : "https://android.googlesource.com/platform/frameworks/base/+/866dc26ad4a98cc835d075b627326e7d7e52ffa1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://android.googlesource.com/platform/frameworks/base/+/866dc26ad4a98cc835d075b627326e7d7e52ffa1"
|
||||
},
|
||||
{
|
||||
"name" : "https://android.googlesource.com/platform/frameworks/native/+/1f4b49e64adf4623eefda503bca61e253597b9bf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://android.googlesource.com/platform/frameworks/native/+/1f4b49e64adf4623eefda503bca61e253597b9bf"
|
||||
},
|
||||
{
|
||||
"name": "https://android.googlesource.com/platform/system/core/+/ecf5fd58a8f50362ce9e8d4245a33d56f29f142b",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/system/core/+/ecf5fd58a8f50362ce9e8d4245a33d56f29f142b"
|
||||
},
|
||||
{
|
||||
"name": "1036763",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036763"
|
||||
},
|
||||
{
|
||||
"name": "92811",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92811"
|
||||
},
|
||||
{
|
||||
"name" : "1036763",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036763"
|
||||
"name": "https://android.googlesource.com/platform/frameworks/base/+/866dc26ad4a98cc835d075b627326e7d7e52ffa1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/866dc26ad4a98cc835d075b627326e7d7e52ffa1"
|
||||
},
|
||||
{
|
||||
"name": "40354",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/40354/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2016-6161",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "openSUSE-SU-2016:2117",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/libgd/libgd/issues/209",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/libgd/libgd/issues/209"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:2363",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160705 CVE Request: libgd: global out of bounds read when encoding gif from malformed input with gd2togif",
|
||||
"refsource": "MLIST",
|
||||
@ -62,26 +77,11 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/07/05/7"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/libgd/libgd/issues/209",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/libgd/libgd/issues/209"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3619",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3619"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:2363",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:2117",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-3030-1",
|
||||
"refsource": "UBUNTU",
|
||||
|
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[help-libidn] 20160720 Libidn 1.33 released",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/07/20/6"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/07/21/4"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3658",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3658"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1924",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:2135",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3068-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-3068-1"
|
||||
"name": "[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/07/20/6"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1924",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "92070",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92070"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3658",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3658"
|
||||
},
|
||||
{
|
||||
"name": "[help-libidn] 20160720 Libidn 1.33 released",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name": "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555"
|
||||
},
|
||||
{
|
||||
"name": "USN-3068-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3068-1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user