mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
222d68dec9
commit
0e2b0ad7c6
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0093.html"
|
||||
},
|
||||
{
|
||||
"name" : "20001210 KTH upgrade and FIX",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-12/0105.html"
|
||||
},
|
||||
{
|
||||
"name": "kerberos4-user-config(5738)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5738"
|
||||
},
|
||||
{
|
||||
"name": "20001210 KTH upgrade and FIX",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0105.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20001218",
|
||||
"refsource" : "OPENBSD",
|
||||
"url" : "http://www.openbsd.org/advisories/ftpd_replydirname.txt"
|
||||
},
|
||||
{
|
||||
"name": "NetBSD-SA2000-018",
|
||||
"refsource": "NETBSD",
|
||||
"url": "ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-018.txt.asc"
|
||||
},
|
||||
{
|
||||
"name": "bsd-ftpd-replydirname-bo(5776)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5776"
|
||||
},
|
||||
{
|
||||
"name": "20001218 Trustix Security Advisory - ed, tcsh, and ftpd-BSD",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0275.html"
|
||||
},
|
||||
{
|
||||
"name": "20001218",
|
||||
"refsource": "OPENBSD",
|
||||
"url": "http://www.openbsd.org/advisories/ftpd_replydirname.txt"
|
||||
},
|
||||
{
|
||||
"name": "2124",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2124"
|
||||
},
|
||||
{
|
||||
"name" : "bsd-ftpd-replydirname-bo(5776)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5776"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "dhcp-format-string(5953)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5953"
|
||||
},
|
||||
{
|
||||
"name": "CSSA-2001-003.0",
|
||||
"refsource": "CALDERA",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "2215",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2215"
|
||||
},
|
||||
{
|
||||
"name" : "dhcp-format-string(5953)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5953"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "A043001-1",
|
||||
"refsource" : "ATSTAKE",
|
||||
"url" : "http://www.atstake.com/research/advisories/2001/a043001-1.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/projects/bugzilla/security2_12.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1199",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1199"
|
||||
},
|
||||
{
|
||||
"name": "A043001-1",
|
||||
"refsource": "ATSTAKE",
|
||||
"url": "http://www.atstake.com/research/advisories/2001/a043001-1.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010503 Vulnerabilities in CrushFTP Server ",
|
||||
"name": "crushftp-directory-traversal(6495)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6495"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20010503 Vulnerabilities in CrushFTP Server",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-05/0036.html"
|
||||
},
|
||||
{
|
||||
"name": "VU#110803",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/110803"
|
||||
},
|
||||
{
|
||||
"name" : "crushftp-directory-traversal(6495)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6495"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=28226",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=28226"
|
||||
},
|
||||
{
|
||||
"name" : "CLA-2001:409",
|
||||
"refsource" : "CONECTIVA",
|
||||
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000409"
|
||||
"name": "MDKSA-2002:060",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:060"
|
||||
},
|
||||
{
|
||||
"name": "tcltk-insecure-library-search(6869)",
|
||||
@ -68,9 +63,9 @@
|
||||
"url": "http://www.iss.net/security_center/static/6869.php"
|
||||
},
|
||||
{
|
||||
"name" : "3073",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/3073"
|
||||
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=28226",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=28226"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2002:148",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2002-148.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2002:060",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:060"
|
||||
"name": "3073",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3073"
|
||||
},
|
||||
{
|
||||
"name": "CLA-2001:409",
|
||||
"refsource": "CONECTIVA",
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000409"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010410 multiple vulnerabilities in Alcatel Speed Touch DSL modems",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/175229"
|
||||
"name": "VU#243592",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/243592"
|
||||
},
|
||||
{
|
||||
"name": "http://security.sdsc.edu/self-help/alcatel/alcatel-bugs.html",
|
||||
@ -63,14 +63,14 @@
|
||||
"url": "http://security.sdsc.edu/self-help/alcatel/alcatel-bugs.html"
|
||||
},
|
||||
{
|
||||
"name" : "CA-2001-08",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.cert.org/advisories/CA-2001-08.html"
|
||||
"name": "alcatel-expert-account(6354)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6354"
|
||||
},
|
||||
{
|
||||
"name" : "VU#243592",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/243592"
|
||||
"name": "20010410 multiple vulnerabilities in Alcatel Speed Touch DSL modems",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/175229"
|
||||
},
|
||||
{
|
||||
"name": "2568",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/2568"
|
||||
},
|
||||
{
|
||||
"name" : "alcatel-expert-account(6354)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6354"
|
||||
"name": "CA-2001-08",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.cert.org/advisories/CA-2001-08.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010702 Xvt 2.1 vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-07/0024.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-082",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2001/dsa-082"
|
||||
},
|
||||
{
|
||||
"name": "2955",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2955"
|
||||
},
|
||||
{
|
||||
"name": "20010702 Xvt 2.1 vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-07/0024.html"
|
||||
},
|
||||
{
|
||||
"name": "2964",
|
||||
"refsource": "BID",
|
||||
@ -76,6 +71,11 @@
|
||||
"name": "xvt-command-line-bo(6781)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/6781.php"
|
||||
},
|
||||
{
|
||||
"name": "DSA-082",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2001/dsa-082"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060525 Docebo LMS 2.05 Remote File Include",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/435110/30/4710/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1828",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/1828"
|
||||
},
|
||||
{
|
||||
"name" : "18110",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18110"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1978",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1978"
|
||||
},
|
||||
{
|
||||
"name" : "1016159",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016159"
|
||||
},
|
||||
{
|
||||
"name": "20298",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20298"
|
||||
},
|
||||
{
|
||||
"name": "20060525 Docebo LMS 2.05 Remote File Include",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435110/30/4710/threaded"
|
||||
},
|
||||
{
|
||||
"name": "docebolms-multiple-file-inclusion(26685)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26685"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1978",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1978"
|
||||
},
|
||||
{
|
||||
"name": "18110",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18110"
|
||||
},
|
||||
{
|
||||
"name": "1016159",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016159"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "1896",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/1896"
|
||||
},
|
||||
{
|
||||
"name": "18370",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18370"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-2274",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/2274"
|
||||
"name": "aepartner-designinc-file-include(27050)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27050"
|
||||
},
|
||||
{
|
||||
"name": "20588",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://secunia.com/advisories/20588"
|
||||
},
|
||||
{
|
||||
"name" : "aepartner-designinc-file-include(27050)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27050"
|
||||
"name": "1896",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/1896"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2274",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2274"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081009 PR08-24: Proxim Tsunami MP.11 2411 vulnerable to SNMP Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/497182/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-24",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-24"
|
||||
},
|
||||
{
|
||||
"name": "20081009 PR08-24: Proxim Tsunami MP.11 2411 vulnerable to SNMP Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/497182/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "4884",
|
||||
"refsource": "SREASON",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "4897",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4897"
|
||||
},
|
||||
{
|
||||
"name": "6734",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31733"
|
||||
},
|
||||
{
|
||||
"name" : "4897",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4897"
|
||||
},
|
||||
{
|
||||
"name": "minipub-sdir-directory-traversal(45829)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-2178",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[libvirt] 20110531 [PATCH] security: plug regression introduced in disk probe logic",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://www.redhat.com/archives/libvir-list/2011-May/msg01935.html"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=709775",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709775"
|
||||
},
|
||||
{
|
||||
"name": "http://libvirt.org/news.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://libvirt.org/news.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-2178.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-2178.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=709769",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709769"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=709775",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=709775"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2011-9091",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2011:0643",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2011-06/msg00030.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-9091",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html"
|
||||
},
|
||||
{
|
||||
"name": "[libvirt] 20110531 [PATCH] security: plug regression introduced in disk probe logic",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://www.redhat.com/archives/libvir-list/2011-May/msg01935.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-1152-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1152-1"
|
||||
},
|
||||
{
|
||||
"name": "http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-2178.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-2178.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2011-2249",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
|
||||
},
|
||||
{
|
||||
"name": "TA11-201A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-2500",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[linux-nfs] 20110622 [PATCH] nfs: fix host_reliable_addrinfo (try #2)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=linux-nfs&m=130875695821953&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=716949",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/"
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=716949"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils-1.2.4/download",
|
||||
@ -68,14 +63,19 @@
|
||||
"url": "http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils-1.2.4/download"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=716949",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=716949"
|
||||
"name": "[linux-nfs] 20110622 [PATCH] nfs: fix host_reliable_addrinfo (try #2)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=linux-nfs&m=130875695821953&w=2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:1534",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2011-1534.html"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/mac/1111/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/mac/1111/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/unix/1111/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "http://www.opera.com/docs/changelogs/windows/1111/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/windows/1111/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/mac/1111/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/mac/1111/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "49236",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49236"
|
||||
},
|
||||
{
|
||||
"name": "http://support.novell.com/security/cve/CVE-2011-2647.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,11 +72,6 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "49236",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/49236"
|
||||
},
|
||||
{
|
||||
"name": "kiwi-archive-code-execution(69282)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5117031.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5117031.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.novell.com/show_bug.cgi?id=707730",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.novell.com/show_bug.cgi?id=707730"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-11-309/",
|
||||
"refsource": "MISC",
|
||||
@ -62,20 +72,10 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5117030.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5117031.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5117031.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.novell.com/support/viewContent.do?externalId=7009676",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.novell.com/support/viewContent.do?externalId=7009676"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=707730",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=707730"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.tibco.com/multimedia/mft-slingshot_advisory_20110913_tcm8-14340.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.tibco.com/multimedia/mft-slingshot_advisory_20110913_tcm8-14340.txt"
|
||||
"name": "45976",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45976"
|
||||
},
|
||||
{
|
||||
"name": "http://www.tibco.com/services/support/advisories/mft-slingshot-advisory_20110913.jsp",
|
||||
@ -63,14 +63,9 @@
|
||||
"url": "http://www.tibco.com/services/support/advisories/mft-slingshot-advisory_20110913.jsp"
|
||||
},
|
||||
{
|
||||
"name" : "49619",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/49619"
|
||||
},
|
||||
{
|
||||
"name" : "75396",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/75396"
|
||||
"name": "http://www.tibco.com/multimedia/mft-slingshot_advisory_20110913_tcm8-14340.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.tibco.com/multimedia/mft-slingshot_advisory_20110913_tcm8-14340.txt"
|
||||
},
|
||||
{
|
||||
"name": "1026051",
|
||||
@ -78,14 +73,19 @@
|
||||
"url": "http://securitytracker.com/id?1026051"
|
||||
},
|
||||
{
|
||||
"name" : "45976",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/45976"
|
||||
"name": "49619",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49619"
|
||||
},
|
||||
{
|
||||
"name": "managed-file-unspecified-xss(69806)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69806"
|
||||
},
|
||||
{
|
||||
"name": "75396",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/75396"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
|
||||
},
|
||||
{
|
||||
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/b2evolution-3.3.3",
|
||||
"refsource": "MISC",
|
||||
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/b2evolution-3.3.3"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
|
||||
"refsource": "MISC",
|
||||
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2011-3879",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=95374",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=95374"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:13246",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13246"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/chromium/issues/detail?id=95374",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=95374"
|
||||
},
|
||||
{
|
||||
"name": "google-chrome-scheme-spoofing(70957)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70957"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2013-0137",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf",
|
||||
"name": "http://www.kb.cert.org/vuls/id/AAMN-98MUK2",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf"
|
||||
"url": "http://www.kb.cert.org/vuls/id/AAMN-98MUK2"
|
||||
},
|
||||
{
|
||||
"name": "VU#662676",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/662676"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kb.cert.org/vuls/id/AAMN-98MU7H",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kb.cert.org/vuls/id/AAMN-98MU7H"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kb.cert.org/vuls/id/AAMN-98MUK2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/AAMN-98MUK2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.monroe-electronics.com/MONROE_ELECTRONICS_PDF/130604-Monroe-Security-PR.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.monroe-electronics.com/MONROE_ELECTRONICS_PDF/130604-Monroe-Security-PR.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "VU#662676",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/662676"
|
||||
"name": "http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-0171",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2013-0792",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-39.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-39.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=722831",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=722831"
|
||||
"name": "SUSE-SU-2013:0850",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0630",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0645",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html"
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=722831",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=722831"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:17021",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17021"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0631",
|
||||
@ -78,19 +78,19 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0850",
|
||||
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-39.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-39.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0645",
|
||||
"refsource": "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html"
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0875",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:17021",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17021"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2013-0795",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,39 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-36.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-36.html"
|
||||
"name": "SUSE-SU-2013:0850",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=825697",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=825697"
|
||||
"name": "USN-1791-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1791-1"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2699",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2699"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0696",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0696.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0697",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0697.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0630",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0645",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html"
|
||||
"name": "RHSA-2013:0696",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0696.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0631",
|
||||
@ -93,20 +83,30 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0850",
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=825697",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=825697"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0697",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0697.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0645",
|
||||
"refsource": "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html"
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-36.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-36.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0875",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1791-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1791-1"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16842",
|
||||
"refsource": "OVAL",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2013-1014",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:17605",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17605"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5766",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "APPLE-SA-2013-05-16-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2013/May/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:17605",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17605"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-1125",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-1232",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-1568",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-1954",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,31 +57,31 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=136593191416152&w=2"
|
||||
},
|
||||
{
|
||||
"name": "59793",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59793"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130416 Re: CVE Request: VLC Buffer Overflow in ASF Demuxer",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=136610343501731&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=b31ce523331aa3a6e620b68cdfe3f161d519631e",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=b31ce523331aa3a6e620b68cdfe3f161d519631e"
|
||||
},
|
||||
{
|
||||
"name": "http://trac.videolan.org/vlc/ticket/8024",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://trac.videolan.org/vlc/ticket/8024"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.videolan.org/security/sa1302.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.videolan.org/security/sa1302.html"
|
||||
},
|
||||
{
|
||||
"name": "57333",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/57333"
|
||||
},
|
||||
{
|
||||
"name": "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=b31ce523331aa3a6e620b68cdfe3f161d519631e",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=b31ce523331aa3a6e620b68cdfe3f161d519631e"
|
||||
},
|
||||
{
|
||||
"name": "89598",
|
||||
"refsource": "OSVDB",
|
||||
@ -93,9 +93,9 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17023"
|
||||
},
|
||||
{
|
||||
"name" : "59793",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59793"
|
||||
"name": "http://www.videolan.org/security/sa1302.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.videolan.org/security/sa1302.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@symantec.com",
|
||||
"ID": "CVE-2013-5009",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140109_00",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140109_00"
|
||||
},
|
||||
{
|
||||
"name": "64128",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/64128"
|
||||
},
|
||||
{
|
||||
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140109_00",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140109_00"
|
||||
},
|
||||
{
|
||||
"name": "symantec-endpoint-cve20135009-priv-esc(90224)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-5053",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2013-5127",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5934",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5934"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT6001",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT6001"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2013-09-18-2",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2013-10-22-2",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Oct/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2013-10-22-8",
|
||||
"refsource": "APPLE",
|
||||
@ -82,10 +62,30 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029054"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT6001",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT6001"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2013-10-22-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "54886",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/54886"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5934",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5934"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2013-09-18-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2013-5180",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://codex.wordpress.org/Version_3.6.1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://codex.wordpress.org/Version_3.6.1"
|
||||
"name": "DSA-2757",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2757"
|
||||
},
|
||||
{
|
||||
"name": "http://core.trac.wordpress.org/changeset/25322",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://core.trac.wordpress.org/changeset/25322"
|
||||
},
|
||||
{
|
||||
"name": "http://codex.wordpress.org/Version_3.6.1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://codex.wordpress.org/Version_3.6.1"
|
||||
},
|
||||
{
|
||||
"name": "http://wordpress.org/news/2013/09/wordpress-3-6-1/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wordpress.org/news/2013/09/wordpress-3-6-1/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2757",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2013/dsa-2757"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-5811",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "41655",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/41655/"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0128",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0128"
|
||||
},
|
||||
{
|
||||
"name": "1037992",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037992"
|
||||
},
|
||||
{
|
||||
"name": "96675",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96675"
|
||||
},
|
||||
{
|
||||
"name" : "1037992",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1037992"
|
||||
"name": "41655",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/41655/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2017-04-01.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2017-04-01.html"
|
||||
"name": "97333",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97333"
|
||||
},
|
||||
{
|
||||
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
|
||||
},
|
||||
{
|
||||
"name" : "97333",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/97333"
|
||||
"name": "https://source.android.com/security/bulletin/2017-04-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-04-01.html"
|
||||
},
|
||||
{
|
||||
"name": "1038201",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0482",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -66,15 +66,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||
},
|
||||
{
|
||||
"name" : "96733",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/96733"
|
||||
},
|
||||
{
|
||||
"name": "1037968",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037968"
|
||||
},
|
||||
{
|
||||
"name": "96733",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96733"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-1000184",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,15 +1,12 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"DATE_ASSIGNED" : "2017-12-29",
|
||||
"ID" : "CVE-2017-1000441",
|
||||
"REQUESTER" : "luanjunchao@163.com",
|
||||
"STATE" : "REJECT",
|
||||
"STATE_DETAIL" : "DUPLICATE of CVE-2017-14931"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2017-1000441",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,16 +53,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/08/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0455",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0455"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4248",
|
||||
"refsource": "DEBIAN",
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00019.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:3269",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3269"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876511",
|
||||
"refsource": "MISC",
|
||||
@ -67,11 +72,6 @@
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2017/dsa-4041"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:3269",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3269"
|
||||
},
|
||||
{
|
||||
"name": "1039844",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4353",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4468",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-21.html"
|
||||
},
|
||||
{
|
||||
"name" : "104701",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/104701"
|
||||
},
|
||||
{
|
||||
"name": "1041250",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041250"
|
||||
},
|
||||
{
|
||||
"name": "104701",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104701"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user