mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
4546162c05
commit
14d3084286
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "19991217 NAV2000 Email Protection DoS",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/38970"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "19991220 Norton Email Protection Remote Overflow (Addendum)",
|
"name": "19991220 Norton Email Protection Remote Overflow (Addendum)",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/39194"
|
"url": "http://www.securityfocus.com/archive/1/39194"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "6267",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/6267"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://service1.symantec.com/SUPPORT/nav.nsf/df0a595864594c86852567ac0063608c/6206f660a1f2516a882568660082c930?OpenDocument&Highlight=0,poproxy",
|
"name": "http://service1.symantec.com/SUPPORT/nav.nsf/df0a595864594c86852567ac0063608c/6206f660a1f2516a882568660082c930?OpenDocument&Highlight=0,poproxy",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://service1.symantec.com/SUPPORT/nav.nsf/df0a595864594c86852567ac0063608c/6206f660a1f2516a882568660082c930?OpenDocument&Highlight=0,poproxy"
|
"url": "http://service1.symantec.com/SUPPORT/nav.nsf/df0a595864594c86852567ac0063608c/6206f660a1f2516a882568660082c930?OpenDocument&Highlight=0,poproxy"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "6267",
|
"name": "19991217 NAV2000 Email Protection DoS",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.osvdb.org/6267"
|
"url": "http://www.securityfocus.com/archive/1/38970"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "19981109 Several new CGI vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/11175"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://lakeweb.com/scripts/",
|
"name": "http://lakeweb.com/scripts/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://lakeweb.com/scripts/"
|
"url": "http://lakeweb.com/scripts/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "19981109 Several new CGI vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/11175"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "cgi-perl-mail-programs(1400)",
|
"name": "cgi-perl-mail-programs(1400)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "19990304 Oracle Plaintext Password",
|
"name": "oracle-passwords(1902)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/12744"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1902"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "19990304 Oracle Plaintext Password",
|
"name": "19990304 Oracle Plaintext Password",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://marc.info/?l=ntbugtraq&m=92056752115116&w=2"
|
"url": "http://marc.info/?l=ntbugtraq&m=92056752115116&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oracle-passwords(1902)",
|
"name": "19990304 Oracle Plaintext Password",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/1902"
|
"url": "http://www.securityfocus.com/archive/1/12744"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "CSSA-1999-029.1",
|
|
||||||
"refsource" : "CALDERA",
|
|
||||||
"url" : "ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-029.1.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1266",
|
"name": "1266",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/1266"
|
"url": "http://www.securityfocus.com/bid/1266"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "CSSA-1999-029.1",
|
||||||
|
"refsource": "CALDERA",
|
||||||
|
"url": "ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-029.1.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0124.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0124.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20000510 Gnapster Vulnerability Compromises User-readable Files",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-05/0127.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FreeBSD-SA-00:18",
|
"name": "FreeBSD-SA-00:18",
|
||||||
"refsource": "FREEBSD",
|
"refsource": "FREEBSD",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "1186",
|
"name": "1186",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/1186"
|
"url": "http://www.securityfocus.com/bid/1186"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20000510 Gnapster Vulnerability Compromises User-readable Files",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0127.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20000705 Novell BorderManager 3.0 EE - Encoded URL rule bypass",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0038.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1432",
|
"name": "1432",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/1432"
|
"url": "http://www.securityfocus.com/bid/1432"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20000705 Novell BorderManager 3.0 EE - Encoded URL rule bypass",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0038.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "pagelog-cgi-dir-traverse(5451)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5451"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20001029 Minor bug in Pagelog.cgi",
|
"name": "20001029 Minor bug in Pagelog.cgi",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "1864",
|
"name": "1864",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/1864"
|
"url": "http://www.securityfocus.com/bid/1864"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "pagelog-cgi-dir-traverse(5451)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5451"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20000919 Cisco PIX Firewall (smtp content filtering hack)",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-09/0222.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20000920 Re: Cisco PIX Firewall (smtp content filtering hack) - Version 4.2(1) not exploitable",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-09/0241.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20001005 Cisco Secure PIX Firewall Mailguard Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://www.cisco.com/warp/public/707/PIXfirewallSMTPfilter-pub.shtml"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1698",
|
"name": "1698",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -76,6 +61,21 @@
|
|||||||
"name": "cisco-pix-smtp-filtering(5277)",
|
"name": "cisco-pix-smtp-filtering(5277)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5277"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5277"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20001005 Cisco Secure PIX Firewall Mailguard Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://www.cisco.com/warp/public/707/PIXfirewallSMTPfilter-pub.shtml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20000920 Re: Cisco PIX Firewall (smtp content filtering hack) - Version 4.2(1) not exploitable",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0241.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20000919 Cisco PIX Firewall (smtp content filtering hack)",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0222.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "2008",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/2008"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20001126 Vulnerablity in PTlink3.5.3ircd + PTlink.Services.1.8.1...",
|
"name": "20001126 Vulnerablity in PTlink3.5.3ircd + PTlink.Services.1.8.1...",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/147115"
|
"url": "http://www.securityfocus.com/archive/1/147115"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "2008",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/2008"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20050620 [Hat-Squad] i-Gallery directory traversal",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=111936111630489&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2005-0825",
|
"name": "ADV-2005-0825",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2005/0825"
|
"url": "http://www.vupen.com/english/advisories/2005/0825"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20050620 [Hat-Squad] i-Gallery directory traversal",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=111936111630489&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20050629 Original imTRBBS(ver1.02) and prior remote command execution",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=112006605026261&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.cgi-club.com/imTRBBS/",
|
"name": "http://www.cgi-club.com/imTRBBS/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.cgi-club.com/imTRBBS/"
|
"url": "http://www.cgi-club.com/imTRBBS/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20050629 Original imTRBBS(ver1.02) and prior remote command execution",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=112006605026261&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,39 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=94584",
|
"name": "SUSE-SA:2005:050",
|
||||||
"refsource" : "MISC",
|
"refsource": "SUSE",
|
||||||
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=94584"
|
"url": "http://www.novell.com/linux/security/advisories/2005_50_kernel.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5",
|
"name": "18056",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5"
|
"url": "http://secunia.com/advisories/18056"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-169-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "https://usn.ubuntu.com/169-1/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "16500",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/16500"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2005:220",
|
||||||
|
"refsource": "MANDRAKE",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18059",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/18059"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SA:2005:068",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/419522/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-922",
|
"name": "DSA-922",
|
||||||
@ -73,64 +98,39 @@
|
|||||||
"url": "http://www.debian.org/security/2005/dsa-921"
|
"url": "http://www.debian.org/security/2005/dsa-921"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDKSA-2005:219",
|
"name": "17826",
|
||||||
"refsource" : "MANDRAKE",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219"
|
"url": "http://secunia.com/advisories/17826"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDKSA-2005:220",
|
"name": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5",
|
||||||
"refsource" : "MANDRAKE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220"
|
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SA:2005:050",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2005_50_kernel.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SA:2005:068",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/419522/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-169-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "https://usn.ubuntu.com/169-1/"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "14720",
|
"name": "14720",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/14720"
|
"url": "http://www.securityfocus.com/bid/14720"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "16355",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/16355/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "16500",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/16500"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "17918",
|
"name": "17918",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/17918"
|
"url": "http://secunia.com/advisories/17918"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "18056",
|
"name": "MDKSA-2005:219",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MANDRAKE",
|
||||||
"url" : "http://secunia.com/advisories/18056"
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "18059",
|
"name": "16355",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/18059"
|
"url": "http://secunia.com/advisories/16355/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "17826",
|
"name": "http://bugs.gentoo.org/show_bug.cgi?id=94584",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url" : "http://secunia.com/advisories/17826"
|
"url": "http://bugs.gentoo.org/show_bug.cgi?id=94584"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20050928 SquirrelMail Address Add Plugin XSS",
|
"name": "ADV-2007-2732",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=112801672520766&w=2"
|
"url": "http://www.vupen.com/english/advisories/2007/2732"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://moritz-naumann.com/adv/0002/sqmadd/0002.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://moritz-naumann.com/adv/0002/sqmadd/0002.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://squirrelmail.org/plugin_view.php?id=101",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://squirrelmail.org/plugin_view.php?id=101"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://docs.info.apple.com/article.html?artnum=306172",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://docs.info.apple.com/article.html?artnum=306172"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2007-07-31",
|
"name": "APPLE-SA-2007-07-31",
|
||||||
@ -82,26 +67,46 @@
|
|||||||
"refsource": "MANDRIVA",
|
"refsource": "MANDRIVA",
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:178"
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:178"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://squirrelmail.org/plugin_view.php?id=101",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://squirrelmail.org/plugin_view.php?id=101"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://moritz-naumann.com/adv/0002/sqmadd/0002.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://moritz-naumann.com/adv/0002/sqmadd/0002.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "14973",
|
"name": "14973",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/14973"
|
"url": "http://www.securityfocus.com/bid/14973"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "25159",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/25159"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-2732",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/2732"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1014988",
|
"name": "1014988",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1014988"
|
"url": "http://securitytracker.com/id?1014988"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://docs.info.apple.com/article.html?artnum=306172",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://docs.info.apple.com/article.html?artnum=306172"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20050928 SquirrelMail Address Add Plugin XSS",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=112801672520766&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "squirrelmail-add-xss(22453)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22453"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25159",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/25159"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "16987",
|
"name": "16987",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -111,11 +116,6 @@
|
|||||||
"name": "26235",
|
"name": "26235",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/26235"
|
"url": "http://secunia.com/advisories/26235"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "squirrelmail-add-xss(22453)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22453"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/",
|
"name": "1015227",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"
|
"url": "http://securitytracker.com/id?1015227"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBUX02076",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/MIMG-6J6QS4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT5979",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/MIMG-6J6QS4"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "HPSBPI02078",
|
"name": "HPSBPI02078",
|
||||||
@ -73,9 +63,14 @@
|
|||||||
"url": "http://www.kb.cert.org/vuls/id/MIMG-6J6QS4"
|
"url": "http://www.kb.cert.org/vuls/id/MIMG-6J6QS4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "HPSBTU02100",
|
"name": "1015229",
|
||||||
"refsource" : "HP",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www2.itrc.hp.com/service/cki/docDisplay.do?admit=-1335382922+1141762289787+28353475&docId=c00602119"
|
"url": "http://securitytracker.com/id?1015229"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-0880",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/0880"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SSRT050979",
|
"name": "SSRT050979",
|
||||||
@ -87,55 +82,20 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"
|
"url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://jvn.jp/niscc/NISCC-273756/index.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://jvn.jp/niscc/NISCC-273756/index.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#226364",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/226364"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "15474",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/15474"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "15471",
|
"name": "15471",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/15471"
|
"url": "http://www.securityfocus.com/bid/15471"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "17030",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/17030"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:5642",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5642"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2005-2462",
|
"name": "ADV-2005-2462",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2005/2462"
|
"url": "http://www.vupen.com/english/advisories/2005/2462"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-0880",
|
"name": "http://jvn.jp/niscc/NISCC-273756/index.html",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0880"
|
"url": "http://jvn.jp/niscc/NISCC-273756/index.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1015227",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1015227"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1015229",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1015229"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1015727",
|
"name": "1015727",
|
||||||
@ -143,14 +103,54 @@
|
|||||||
"url": "http://securitytracker.com/id?1015727"
|
"url": "http://securitytracker.com/id?1015727"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "17598",
|
"name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url" : "http://secunia.com/advisories/17598"
|
"url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "17030",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/17030"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "15474",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/15474"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#226364",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/226364"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBTU02100",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://www2.itrc.hp.com/service/cki/docDisplay.do?admit=-1335382922+1141762289787+28353475&docId=c00602119"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT5979",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/MIMG-6J6QS4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "19174",
|
"name": "19174",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/19174"
|
"url": "http://secunia.com/advisories/19174"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:5642",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5642"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "17598",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/17598"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBUX02076",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/MIMG-6J6QS4"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "17633",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/17633"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2005-2484",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2005/2484"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "15494",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/15494"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://secunia.com/secunia_research/2005-59/advisory/",
|
"name": "http://secunia.com/secunia_research/2005-59/advisory/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -62,25 +77,10 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.mailenable.com/hotfix/"
|
"url": "http://www.mailenable.com/hotfix/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "15494",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/15494"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2005-2484",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/2484"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1015239",
|
"name": "1015239",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1015239"
|
"url": "http://securitytracker.com/id?1015239"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17633",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/17633"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[linux-kernel] 20051112 Re: local denial-of-service with file leases",
|
"name": "RHSA-2006:0140",
|
||||||
"refsource" : "MLIST",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://marc.info/?l=linux-kernel&m=113175851920568&w=2"
|
"url": "http://www.redhat.com/support/errata/RHSA-2006-0140.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[linux-kernel] 20051113 [GIT] Fix memory leak in lease code",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://marc.info/?l=linux-kernel&m=113190437101622&w=2"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174337",
|
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174337",
|
||||||
@ -73,99 +68,89 @@
|
|||||||
"url": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7ed0175a462c4c30f6df6fac1cccac058f997739"
|
"url": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7ed0175a462c4c30f6df6fac1cccac058f997739"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-1017",
|
"name": "19369",
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2006/dsa-1017"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1018",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2006/dsa-1018"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FLSA:157459-1",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/428028/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FLSA:157459-2",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/428058/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FLSA:157459-4",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/427981/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2006:072",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:072"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2006:0101",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0101.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2006:0140",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0140.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060402-01-U",
|
|
||||||
"refsource" : "SGI",
|
|
||||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TSLSA-2005-0070",
|
|
||||||
"refsource" : "TRUSTIX",
|
|
||||||
"url" : "http://www.trustix.org/errata/2005/0070"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-231-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "https://usn.ubuntu.com/231-1/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "15627",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/15627"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:9727",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9727"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2005-2649",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/2649"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17786",
|
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/17786"
|
"url": "http://secunia.com/advisories/19369"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "18203",
|
"name": "18203",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/18203"
|
"url": "http://secunia.com/advisories/18203"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2006:0101",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2006-0101.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1018",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2006/dsa-1018"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:9727",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9727"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "19607",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/19607"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FLSA:157459-2",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[linux-kernel] 20051113 [GIT] Fix memory leak in lease code",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://marc.info/?l=linux-kernel&m=113190437101622&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FLSA:157459-4",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/427981/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "18510",
|
"name": "18510",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/18510"
|
"url": "http://secunia.com/advisories/18510"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "18562",
|
"name": "FLSA:157459-1",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://secunia.com/advisories/18562"
|
"url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "17787",
|
"name": "[linux-kernel] 20051112 Re: local denial-of-service with file leases",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MLIST",
|
||||||
"url" : "http://secunia.com/advisories/17787"
|
"url": "http://marc.info/?l=linux-kernel&m=113175851920568&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TSLSA-2005-0070",
|
||||||
|
"refsource": "TRUSTIX",
|
||||||
|
"url": "http://www.trustix.org/errata/2005/0070"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060402-01-U",
|
||||||
|
"refsource": "SGI",
|
||||||
|
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2006:072",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:072"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "15627",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/15627"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1017",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2006/dsa-1017"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "19374",
|
"name": "19374",
|
||||||
@ -173,14 +158,29 @@
|
|||||||
"url": "http://secunia.com/advisories/19374"
|
"url": "http://secunia.com/advisories/19374"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "19369",
|
"name": "USN-231-1",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://secunia.com/advisories/19369"
|
"url": "https://usn.ubuntu.com/231-1/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "19607",
|
"name": "17787",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/19607"
|
"url": "http://secunia.com/advisories/17787"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "17786",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/17786"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18562",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/18562"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2005-2649",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2005/2649"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://pridels0.blogspot.com/2005/12/extreme-search-corporate-edition-6x.html",
|
"name": "21336",
|
||||||
"refsource" : "MISC",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://pridels0.blogspot.com/2005/12/extreme-search-corporate-edition-6x.html"
|
"url": "http://www.osvdb.org/21336"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "15675",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/15675"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2005-2687",
|
"name": "ADV-2005-2687",
|
||||||
@ -68,14 +63,19 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2005/2687"
|
"url": "http://www.vupen.com/english/advisories/2005/2687"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21336",
|
"name": "15675",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "BID",
|
||||||
"url" : "http://www.osvdb.org/21336"
|
"url": "http://www.securityfocus.com/bid/15675"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "17816",
|
"name": "17816",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/17816"
|
"url": "http://secunia.com/advisories/17816"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://pridels0.blogspot.com/2005/12/extreme-search-corporate-edition-6x.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://pridels0.blogspot.com/2005/12/extreme-search-corporate-edition-6x.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "http://www.astaro.org/showflat.php?Cat=&Number=63958&page=0&view=collapsed&sb=5&o=&fpart=1#63958"
|
"url": "http://www.astaro.org/showflat.php?Cat=&Number=63958&page=0&view=collapsed&sb=5&o=&fpart=1#63958"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "15666",
|
"name": "17838",
|
||||||
"refsource" : "BID",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/bid/15666"
|
"url": "http://secunia.com/advisories/17838"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2005-2678",
|
"name": "ADV-2005-2678",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2005/2678"
|
"url": "http://www.vupen.com/english/advisories/2005/2678"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "17838",
|
"name": "15666",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BID",
|
||||||
"url" : "http://secunia.com/advisories/17838"
|
"url": "http://www.securityfocus.com/bid/15666"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,40 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20071017 Oracle TNS Listener DoS and/or remote memory inspection",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/482423/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-tns-listener/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-tns-listener/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "HPSBMA02133",
|
"name": "20071017 Oracle TNS Listener DoS and/or remote memory inspection",
|
||||||
"refsource" : "HP",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
"url": "http://www.securityfocus.com/archive/1/482423/100/0/threaded"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT061201",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA07-290A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "26103",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/26103"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-3524",
|
"name": "ADV-2007-3524",
|
||||||
@ -97,15 +72,40 @@
|
|||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/3626"
|
"url": "http://www.vupen.com/english/advisories/2007/3626"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "TA07-290A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT061201",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMA02133",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-tns-listener/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-tns-listener/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "26103",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/26103"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1018823",
|
"name": "1018823",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1018823"
|
"url": "http://www.securitytracker.com/id?1018823"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "27251",
|
"name": "3250",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "SREASON",
|
||||||
"url" : "http://secunia.com/advisories/27251"
|
"url": "http://securityreason.com/securityalert/3250"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "27409",
|
"name": "27409",
|
||||||
@ -113,9 +113,9 @@
|
|||||||
"url": "http://secunia.com/advisories/27409"
|
"url": "http://secunia.com/advisories/27409"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3250",
|
"name": "27251",
|
||||||
"refsource" : "SREASON",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://securityreason.com/securityalert/3250"
|
"url": "http://secunia.com/advisories/27251"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "http://arfis.wordpress.com/2007/09/13/rfi-02-galmeta-post/"
|
"url": "http://arfis.wordpress.com/2007/09/13/rfi-02-galmeta-post/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20071018 true: Galmeta Post 0.11 RFI",
|
"name": "galmetapost-uploadconfig-file-include(37412)",
|
||||||
"refsource" : "VIM",
|
"refsource": "XF",
|
||||||
"url" : "http://www.attrition.org/pipermail/vim/2007-October/001836.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37412"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "26329",
|
"name": "26329",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/26329"
|
"url": "http://www.securityfocus.com/bid/26329"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "galmetapost-uploadconfig-file-include(37412)",
|
"name": "20071018 true: Galmeta Post 0.11 RFI",
|
||||||
"refsource" : "XF",
|
"refsource": "VIM",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37412"
|
"url": "http://www.attrition.org/pipermail/vim/2007-October/001836.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2009-2047",
|
"ID": "CVE-2009-2047",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,21 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20090715 Vulnerabilities in Unified Contact Center Express Administration Pages",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "35706",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/35706"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "55936",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/55936"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1022569",
|
"name": "1022569",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
@ -77,6 +62,11 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/35861"
|
"url": "http://secunia.com/advisories/35861"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "35706",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/35706"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-1913",
|
"name": "ADV-2009-1913",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -86,6 +76,16 @@
|
|||||||
"name": "unified-ccx-interface-directory-traversal(51731)",
|
"name": "unified-ccx-interface-directory-traversal(51731)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51731"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51731"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20090715 Vulnerabilities in Unified Contact Center Express Administration Pages",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "55936",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/55936"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html",
|
"name": "directadmin-cmdredirect-xss(51292)",
|
||||||
"refsource" : "MISC",
|
"refsource": "XF",
|
||||||
"url" : "http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51292"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "35450",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/35450"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "35525",
|
"name": "35525",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/35525"
|
"url": "http://secunia.com/advisories/35525"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "35450",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/35450"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-1663",
|
"name": "ADV-2009-1663",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/1663"
|
"url": "http://www.vupen.com/english/advisories/2009/1663"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "directadmin-cmdredirect-xss(51292)",
|
"name": "http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51292"
|
"url": "http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "8756",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/8756"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "35054",
|
"name": "35054",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/35054"
|
"url": "http://www.securityfocus.com/bid/35054"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "35187",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/35187"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "aspinline-activeappointments-sql-injection(50667)",
|
"name": "aspinline-activeappointments-sql-injection(50667)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50667"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50667"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "8756",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "http://www.exploit-db.com/exploits/8756"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35187",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/35187"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2009-2524",
|
"ID": "CVE-2009-2524",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "MS09-059",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-059"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "TA09-286A",
|
"name": "TA09-286A",
|
||||||
"refsource": "CERT",
|
"refsource": "CERT",
|
||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-286A.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA09-286A.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "MS09-059",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-059"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:6263",
|
"name": "oval:org.mitre.oval:def:6263",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
|
@ -53,74 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
|
"name": "oval:org.mitre.oval:def:11115",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "OVAL",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11115"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://java.sun.com/javase/6/webnotes/6u15.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://java.sun.com/javase/6/webnotes/6u15.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2009-09-03-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2009-8329",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2009-8337",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200911-02",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-200911-02.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBUX02476",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=125787273209737&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT090250",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=125787273209737&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2009:209",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2009:1199",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://rhn.redhat.com/errata/RHSA-2009-1199.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2009:1200",
|
"name": "RHSA-2009:1200",
|
||||||
@ -128,54 +63,9 @@
|
|||||||
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
|
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2009:1201",
|
"name": "RHSA-2009:1199",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
|
"url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "263409",
|
|
||||||
"refsource" : "SUNALERT",
|
|
||||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SA:2009:043",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2009:016",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SA:2009:053",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA09-294A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "35943",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/35943"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:11115",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11115"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:8259",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8259"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1022659",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1022659"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "36162",
|
"name": "36162",
|
||||||
@ -183,14 +73,34 @@
|
|||||||
"url": "http://secunia.com/advisories/36162"
|
"url": "http://secunia.com/advisories/36162"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "36176",
|
"name": "ADV-2009-2543",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://secunia.com/advisories/36176"
|
"url": "http://www.vupen.com/english/advisories/2009/2543"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "36180",
|
"name": "sun-jre-socks-info-disclosure(52336)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52336"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "37460",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/36180"
|
"url": "http://secunia.com/advisories/37460"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-200911-02",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBUX02476",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=125787273209737&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "36199",
|
"name": "36199",
|
||||||
@ -202,25 +112,115 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/36248"
|
"url": "http://secunia.com/advisories/36248"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2009:209",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2009-8329",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT090250",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=125787273209737&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://java.sun.com/javase/6/webnotes/6u15.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://java.sun.com/javase/6/webnotes/6u15.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA09-294A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35943",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/35943"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "36180",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/36180"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "263409",
|
||||||
|
"refsource": "SUNALERT",
|
||||||
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "36176",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/36176"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2009-8337",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1022659",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1022659"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2009:016",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "37300",
|
"name": "37300",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/37300"
|
"url": "http://secunia.com/advisories/37300"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2009-09-03-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SA:2009:053",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2009:1201",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SA:2009:043",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "37386",
|
"name": "37386",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/37386"
|
"url": "http://secunia.com/advisories/37386"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "37460",
|
"name": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/37460"
|
"url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2009-2543",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/2543"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-3316",
|
"name": "ADV-2009-3316",
|
||||||
@ -228,9 +228,9 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2009/3316"
|
"url": "http://www.vupen.com/english/advisories/2009/3316"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "sun-jre-socks-info-disclosure(52336)",
|
"name": "oval:org.mitre.oval:def:8259",
|
||||||
"refsource" : "XF",
|
"refsource": "OVAL",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/52336"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8259"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,31 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20091102 NSOADV-2009-001: Symantec ConsoleUtilities ActiveX Control Buffer Overflow",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/507625/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://sotiriu.de/adv/NSOADV-2009-001.txt",
|
"name": "http://sotiriu.de/adv/NSOADV-2009-001.txt",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://sotiriu.de/adv/NSOADV-2009-001.txt"
|
"url": "http://sotiriu.de/adv/NSOADV-2009-001.txt"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://kb.altiris.com/article.asp?article=49389&p=1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://kb.altiris.com/article.asp?article=49389&p=1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://kb.altiris.com/article.asp?article=49568&p=1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://kb.altiris.com/article.asp?article=49568&p=1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "36698",
|
"name": "36698",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -86,6 +66,26 @@
|
|||||||
"name": "ADV-2009-3117",
|
"name": "ADV-2009-3117",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/3117"
|
"url": "http://www.vupen.com/english/advisories/2009/3117"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20091102 NSOADV-2009-001: Symantec ConsoleUtilities ActiveX Control Buffer Overflow",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/507625/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://kb.altiris.com/article.asp?article=49568&p=1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://kb.altiris.com/article.asp?article=49568&p=1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://kb.altiris.com/article.asp?article=49389&p=1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://kb.altiris.com/article.asp?article=49389&p=1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "9480",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/9480"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "36450",
|
"name": "36450",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "superchargedlinking-browse-sql-injection(52693)",
|
"name": "superchargedlinking-browse-sql-injection(52693)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52693"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52693"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "9480",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "http://www.exploit-db.com/exploits/9480"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||||
"ID": "CVE-2009-3997",
|
"ID": "CVE-2009-3997",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,21 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20091217 Secunia Research: Winamp Oktalyzer Parsing Integer Overflow Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/508524/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://secunia.com/secunia_research/2009-57/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://secunia.com/secunia_research/2009-57/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://forums.winamp.com/showthread.php?threadid=315355",
|
"name": "http://forums.winamp.com/showthread.php?threadid=315355",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://forums.winamp.com/showthread.php?threadid=315355"
|
"url": "http://forums.winamp.com/showthread.php?threadid=315355"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20091217 Secunia Research: Winamp Oktalyzer Parsing Integer Overflow Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/508524/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "37374",
|
"name": "37374",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -86,6 +81,11 @@
|
|||||||
"name": "ADV-2009-3575",
|
"name": "ADV-2009-3575",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/3575"
|
"url": "http://www.vupen.com/english/advisories/2009/3575"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://secunia.com/secunia_research/2009-57/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://secunia.com/secunia_research/2009-57/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2015-0379",
|
"ID": "CVE-2015-0379",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "oracle-cpujan2015-cve20150379(100111)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100111"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1031577",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1031577"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,16 +71,6 @@
|
|||||||
"name": "72244",
|
"name": "72244",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/72244"
|
"url": "http://www.securityfocus.com/bid/72244"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1031577",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1031577"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oracle-cpujan2015-cve20150379(100111)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/100111"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2015-0449",
|
"ID": "CVE-2015-0449",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@suse.com",
|
||||||
"ID": "CVE-2015-0779",
|
"ID": "CVE-2015-0779",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,20 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://github.com/rapid7/metasploit-framework/pull/5096",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/rapid7/metasploit-framework/pull/5096"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "36964",
|
"name": "36964",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/36964/"
|
"url": "https://www.exploit-db.com/exploits/36964/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20150407 [CVE-2015-0779]: Novell ZenWorks Configuration Management remote code execution",
|
"name": "https://www.novell.com/support/kb/doc.php?id=7016419",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://seclists.org/fulldisclosure/2015/Apr/21"
|
"url": "https://www.novell.com/support/kb/doc.php?id=7016419"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/rapid7/metasploit-framework/pull/5096",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/rapid7/metasploit-framework/pull/5096"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt",
|
"name": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt"
|
"url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.novell.com/support/kb/doc.php?id=7016419",
|
"name": "20150407 [CVE-2015-0779]: Novell ZenWorks Configuration Management remote code execution",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "FULLDISC",
|
||||||
"url" : "https://www.novell.com/support/kb/doc.php?id=7016419"
|
"url": "http://seclists.org/fulldisclosure/2015/Apr/21"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-4224",
|
"ID": "CVE-2015-4224",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20150625 Cisco Wireless LAN Controller Command Injection Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=39517"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "75415",
|
"name": "75415",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/75415"
|
"url": "http://www.securityfocus.com/bid/75415"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20150625 Cisco Wireless LAN Controller Command Injection Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39517"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1032728",
|
"name": "1032728",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-4329",
|
"ID": "CVE-2015-4329",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20150818 Cisco TelePresence Video Communication Server Expressway Command Injection Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=40523"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "76395",
|
"name": "76395",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "1033329",
|
"name": "1033329",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1033329"
|
"url": "http://www.securitytracker.com/id/1033329"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20150818 Cisco TelePresence Video Communication Server Expressway Command Injection Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40523"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
|
"name": "72957",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2015/04/25/6"
|
"url": "http://www.securityfocus.com/bid/72957"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.drupal.org/node/2445977",
|
"name": "https://www.drupal.org/node/2445977",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://www.drupal.org/node/2445977"
|
"url": "https://www.drupal.org/node/2445977"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "72957",
|
"name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
|
||||||
"refsource" : "BID",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.securityfocus.com/bid/72957"
|
"url": "http://www.openwall.com/lists/oss-security/2015/04/25/6"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "74343",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/74343"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
|
"name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2015/04/25/6"
|
"url": "http://www.openwall.com/lists/oss-security/2015/04/25/6"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.drupal.org/node/2459323",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.drupal.org/node/2459323"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.drupal.org/node/2459031",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.drupal.org/node/2459031"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.drupal.org/node/2459035",
|
"name": "https://www.drupal.org/node/2459035",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www.drupal.org/node/2459035"
|
"url": "https://www.drupal.org/node/2459035"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "74343",
|
"name": "https://www.drupal.org/node/2459031",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/74343"
|
"url": "https://www.drupal.org/node/2459031"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.drupal.org/node/2459323",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.drupal.org/node/2459323"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2015-4751",
|
"ID": "CVE-2015-4751",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,26 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20151106 Re: Review+CVE request: multiple issues in redis EVAL command (lua sandbox)",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2015/11/06/4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20151106 Review+CVE request: multiple issues in redis EVAL command (lua sandbox)",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2015/11/06/2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/antirez/redis/issues/2855",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/antirez/redis/issues/2855"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES",
|
"name": "https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES"
|
"url": "https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:1444",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00126.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:0097",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0097.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES",
|
"name": "https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -82,20 +77,25 @@
|
|||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2015/dsa-3412"
|
"url": "http://www.debian.org/security/2015/dsa-3412"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "GLSA-201702-16",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201702-16"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0095",
|
"name": "RHSA-2016:0095",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0095.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0095.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2016:0097",
|
"name": "[oss-security] 20151106 Review+CVE request: multiple issues in redis EVAL command (lua sandbox)",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "MLIST",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0097.html"
|
"url": "http://www.openwall.com/lists/oss-security/2015/11/06/2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "77507",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/77507"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/antirez/redis/issues/2855",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/antirez/redis/issues/2855"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:0096",
|
"name": "RHSA-2016:0096",
|
||||||
@ -103,14 +103,14 @@
|
|||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0096.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0096.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2016:1444",
|
"name": "GLSA-201702-16",
|
||||||
"refsource" : "SUSE",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00126.html"
|
"url": "https://security.gentoo.org/glsa/201702-16"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "77507",
|
"name": "[oss-security] 20151106 Re: Review+CVE request: multiple issues in redis EVAL command (lua sandbox)",
|
||||||
"refsource" : "BID",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.securityfocus.com/bid/77507"
|
"url": "http://www.openwall.com/lists/oss-security/2015/11/06/4"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:2919",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2919.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "94633",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/94633"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html",
|
"name": "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,16 +76,6 @@
|
|||||||
"name": "GLSA-201612-11",
|
"name": "GLSA-201612-11",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201612-11"
|
"url": "https://security.gentoo.org/glsa/201612-11"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:2919",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2919.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "94633",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/94633"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-2359",
|
"ID": "CVE-2018-2359",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,16 +53,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://launchpad.support.sap.com/#/notes/2707024",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://launchpad.support.sap.com/#/notes/2707024"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699",
|
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699"
|
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://launchpad.support.sap.com/#/notes/2707024",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://launchpad.support.sap.com/#/notes/2707024"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "106157",
|
"name": "106157",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -81,6 +81,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1040694",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1040694"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -90,11 +95,6 @@
|
|||||||
"name": "103873",
|
"name": "103873",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/103873"
|
"url": "http://www.securityfocus.com/bid/103873"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1040694",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1040694"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-7979",
|
"ID": "CVE-2018-7979",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "chrome-cve-admin@google.com",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2019-5755",
|
"ID": "CVE-2019-5755",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -54,19 +54,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://crbug.com/913296",
|
"name": "106767",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "https://crbug.com/913296"
|
"url": "http://www.securityfocus.com/bid/106767"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-4395",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "https://www.debian.org/security/2019/dsa-4395"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2019:0309",
|
"name": "RHSA-2019:0309",
|
||||||
@ -74,9 +64,19 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
|
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "106767",
|
"name": "DSA-4395",
|
||||||
"refsource" : "BID",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://www.securityfocus.com/bid/106767"
|
"url": "https://www.debian.org/security/2019/dsa-4395"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://crbug.com/913296",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://crbug.com/913296"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user