mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
2a68a8fa9b
commit
169a19604c
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "ADV-2006-3569",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3569"
|
||||
"name": "21862",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21862"
|
||||
},
|
||||
{
|
||||
"name": "28809",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28809"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3569",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3569"
|
||||
},
|
||||
{
|
||||
"name": "28810",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28810"
|
||||
},
|
||||
{
|
||||
"name" : "21862",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21862"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "24842",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24842"
|
||||
},
|
||||
{
|
||||
"name": "3702",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "ADV-2007-1345",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1345"
|
||||
},
|
||||
{
|
||||
"name" : "24842",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24842"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3935",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3935"
|
||||
"name": "25303",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25303"
|
||||
},
|
||||
{
|
||||
"name": "24009",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24009"
|
||||
},
|
||||
{
|
||||
"name" : "35520",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35520"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1852",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1852"
|
||||
},
|
||||
{
|
||||
"name" : "25303",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25303"
|
||||
},
|
||||
{
|
||||
"name": "glossword-customvars-file-include(34330)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34330"
|
||||
},
|
||||
{
|
||||
"name": "35520",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35520"
|
||||
},
|
||||
{
|
||||
"name": "3935",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3935"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2007-2918",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,31 @@
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/330289"
|
||||
},
|
||||
{
|
||||
"name": "36821",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36821"
|
||||
},
|
||||
{
|
||||
"name": "25514",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25514"
|
||||
},
|
||||
{
|
||||
"name": "36820",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36820"
|
||||
},
|
||||
{
|
||||
"name": "36824",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36824"
|
||||
},
|
||||
{
|
||||
"name": "logitech-multiple-activex-bo(34658)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34658"
|
||||
},
|
||||
{
|
||||
"name": "24254",
|
||||
"refsource": "BID",
|
||||
@ -67,16 +92,6 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2018"
|
||||
},
|
||||
{
|
||||
"name" : "36820",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36820"
|
||||
},
|
||||
{
|
||||
"name" : "36821",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36821"
|
||||
},
|
||||
{
|
||||
"name": "36822",
|
||||
"refsource": "OSVDB",
|
||||
@ -86,21 +101,6 @@
|
||||
"name": "36823",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36823"
|
||||
},
|
||||
{
|
||||
"name" : "36824",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36824"
|
||||
},
|
||||
{
|
||||
"name" : "25514",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25514"
|
||||
},
|
||||
{
|
||||
"name" : "logitech-multiple-activex-bo(34658)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34658"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4081",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4081"
|
||||
},
|
||||
{
|
||||
"name": "24546",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24546"
|
||||
},
|
||||
{
|
||||
"name" : "37068",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37068"
|
||||
},
|
||||
{
|
||||
"name" : "37069",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37069"
|
||||
"name": "jasminecms-news-sql-injection(34936)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34936"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2264",
|
||||
@ -82,15 +72,25 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25737"
|
||||
},
|
||||
{
|
||||
"name": "37069",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37069"
|
||||
},
|
||||
{
|
||||
"name": "4081",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4081"
|
||||
},
|
||||
{
|
||||
"name": "37068",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37068"
|
||||
},
|
||||
{
|
||||
"name": "jasminecms-login-code-execution(34937)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34937"
|
||||
},
|
||||
{
|
||||
"name" : "jasminecms-news-sql-injection(34936)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34936"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4089",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4089"
|
||||
},
|
||||
{
|
||||
"name" : "24581",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24581"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2291",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2291"
|
||||
},
|
||||
{
|
||||
"name": "36324",
|
||||
"refsource": "OSVDB",
|
||||
@ -77,10 +62,25 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25680"
|
||||
},
|
||||
{
|
||||
"name": "4089",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4089"
|
||||
},
|
||||
{
|
||||
"name": "serweb-loadlang-file-include(34973)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34973"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2291",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2291"
|
||||
},
|
||||
{
|
||||
"name": "24581",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24581"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,84 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2007-02.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2007-02.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.rpath.com/browse/RPL-1498",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.rpath.com/browse/RPL-1498"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1322",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2007/dsa-1322"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200708-12",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200708-12.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:145",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:145"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0710",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0710.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0709",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0709.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0059",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0059.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2007:015",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
|
||||
},
|
||||
{
|
||||
"name" : "24662",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24662"
|
||||
},
|
||||
{
|
||||
"name" : "37639",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37639"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11010",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11010"
|
||||
},
|
||||
{
|
||||
"name" : "22588",
|
||||
"name": "25833",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22588/"
|
||||
"url": "http://secunia.com/advisories/25833"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2353",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2353"
|
||||
},
|
||||
{
|
||||
"name" : "1018315",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018315"
|
||||
"name": "wireshark-dhcpbootp-dos(35113)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35113"
|
||||
},
|
||||
{
|
||||
"name": "25877",
|
||||
@ -138,34 +68,104 @@
|
||||
"url": "http://secunia.com/advisories/25877"
|
||||
},
|
||||
{
|
||||
"name" : "26004",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26004"
|
||||
"name": "RHSA-2008:0059",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0059.html"
|
||||
},
|
||||
{
|
||||
"name" : "25833",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25833"
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2007-02.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2007-02.html"
|
||||
},
|
||||
{
|
||||
"name" : "25987",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25987"
|
||||
"name": "RHSA-2007:0710",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0710.html"
|
||||
},
|
||||
{
|
||||
"name": "26499",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26499"
|
||||
},
|
||||
{
|
||||
"name": "25987",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25987"
|
||||
},
|
||||
{
|
||||
"name": "26004",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26004"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200708-12",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200708-12.xml"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0709",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0709.html"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:145",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:145"
|
||||
},
|
||||
{
|
||||
"name": "22588",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22588/"
|
||||
},
|
||||
{
|
||||
"name": "1018315",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018315"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-1498",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-1498"
|
||||
},
|
||||
{
|
||||
"name": "24662",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24662"
|
||||
},
|
||||
{
|
||||
"name": "28583",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28583"
|
||||
},
|
||||
{
|
||||
"name" : "wireshark-dhcpbootp-dos(35113)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35113"
|
||||
"name": "http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html"
|
||||
},
|
||||
{
|
||||
"name": "37639",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37639"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2353",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2353"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1322",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2007/dsa-1322"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2007:015",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11010",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11010"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,99 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070719 Multiple Vendor Multiple Product URI Handler Input Validation Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=565"
|
||||
},
|
||||
{
|
||||
"name" : "20070710 Internet Explorer 0day exploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/473276/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070710 Internet Explorer 0day exploit",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0160.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://larholm.com/2007/07/10/internet-explorer-0day-exploit/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://larholm.com/2007/07/10/internet-explorer-0day-exploit/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/"
|
||||
},
|
||||
{
|
||||
"name" : "http://msinfluentials.com/blogs/jesper/archive/2007/07/10/blocking-the-firefox-gt-ie-0-day.aspx",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://msinfluentials.com/blogs/jesper/archive/2007/07/10/blocking-the-firefox-gt-ie-0-day.aspx"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.virusbtn.com/news/virus_news/2007/07_11.xml",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.virusbtn.com/news/virus_news/2007/07_11.xml"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-23.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2007/mfsa2007-23.html"
|
||||
},
|
||||
{
|
||||
"name" : "ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-40.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2007/mfsa2007-40.html"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02153",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02156",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061181",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061236",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:152",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:152"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:049",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_49_mozilla.html"
|
||||
"name": "ADV-2007-2473",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2473"
|
||||
},
|
||||
{
|
||||
"name": "USN-503-1",
|
||||
@ -153,44 +63,9 @@
|
||||
"url": "http://www.ubuntu.com/usn/usn-503-1"
|
||||
},
|
||||
{
|
||||
"name" : "TA07-199A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-199A.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#358017",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/358017"
|
||||
},
|
||||
{
|
||||
"name" : "24837",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24837"
|
||||
},
|
||||
{
|
||||
"name" : "38017",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/38017"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2473",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2473"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2565",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2565"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-4272",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/4272"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0082",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0082"
|
||||
"name": "1018360",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018360"
|
||||
},
|
||||
{
|
||||
"name": "1018351",
|
||||
@ -198,9 +73,24 @@
|
||||
"url": "http://www.securitytracker.com/id?1018351"
|
||||
},
|
||||
{
|
||||
"name" : "1018360",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018360"
|
||||
"name": "HPSBUX02156",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02153",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:152",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:152"
|
||||
},
|
||||
{
|
||||
"name": "25984",
|
||||
@ -208,54 +98,164 @@
|
||||
"url": "http://secunia.com/advisories/25984"
|
||||
},
|
||||
{
|
||||
"name" : "26096",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26096"
|
||||
"name": "ie-firefoxurl-command-execution(35346)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35346"
|
||||
},
|
||||
{
|
||||
"name" : "26149",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26149"
|
||||
},
|
||||
{
|
||||
"name" : "26216",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26216"
|
||||
},
|
||||
{
|
||||
"name" : "26204",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26204"
|
||||
},
|
||||
{
|
||||
"name" : "26271",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26271"
|
||||
},
|
||||
{
|
||||
"name" : "26258",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26258"
|
||||
},
|
||||
{
|
||||
"name" : "26572",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26572"
|
||||
"name": "TA07-199A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-199A.html"
|
||||
},
|
||||
{
|
||||
"name": "28179",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28179"
|
||||
},
|
||||
{
|
||||
"name": "24837",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24837"
|
||||
},
|
||||
{
|
||||
"name": "http://msinfluentials.com/blogs/jesper/archive/2007/07/10/blocking-the-firefox-gt-ie-0-day.aspx",
|
||||
"refsource": "MISC",
|
||||
"url": "http://msinfluentials.com/blogs/jesper/archive/2007/07/10/blocking-the-firefox-gt-ie-0-day.aspx"
|
||||
},
|
||||
{
|
||||
"name": "26216",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26216"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061236",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
|
||||
},
|
||||
{
|
||||
"name": "http://www.virusbtn.com/news/virus_news/2007/07_11.xml",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.virusbtn.com/news/virus_news/2007/07_11.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/"
|
||||
},
|
||||
{
|
||||
"name": "20070719 Multiple Vendor Multiple Product URI Handler Input Validation Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=565"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2565",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2565"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-40.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-40.html"
|
||||
},
|
||||
{
|
||||
"name": "26149",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26149"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0082",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0082"
|
||||
},
|
||||
{
|
||||
"name": "38017",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38017"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-23.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-23.html"
|
||||
},
|
||||
{
|
||||
"name": "VU#358017",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/358017"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-4272",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/4272"
|
||||
},
|
||||
{
|
||||
"name": "http://larholm.com/2007/07/10/internet-explorer-0day-exploit/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://larholm.com/2007/07/10/internet-explorer-0day-exploit/"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:049",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_49_mozilla.html"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061181",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
|
||||
},
|
||||
{
|
||||
"name": "ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt"
|
||||
},
|
||||
{
|
||||
"name": "20070710 Internet Explorer 0day exploit",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0160.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html"
|
||||
},
|
||||
{
|
||||
"name": "26258",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26258"
|
||||
},
|
||||
{
|
||||
"name": "28363",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28363"
|
||||
},
|
||||
{
|
||||
"name" : "ie-firefoxurl-command-execution(35346)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35346"
|
||||
"name": "20070710 Internet Explorer 0day exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/473276/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "26271",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26271"
|
||||
},
|
||||
{
|
||||
"name": "26204",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26204"
|
||||
},
|
||||
{
|
||||
"name": "26572",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26572"
|
||||
},
|
||||
{
|
||||
"name": "26096",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26096"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4214",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4214"
|
||||
},
|
||||
{
|
||||
"name": "25025",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "36714",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36714"
|
||||
},
|
||||
{
|
||||
"name": "4214",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4214"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071126 Tilde CMS <= v. 4.x \"aarstal\" parameter of \"yeardetail\" SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/484206/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "26591",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26591"
|
||||
"name": "tildecms-aarstal-sql-injection(38647)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38647"
|
||||
},
|
||||
{
|
||||
"name": "3402",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://securityreason.com/securityalert/3402"
|
||||
},
|
||||
{
|
||||
"name" : "tildecms-aarstal-sql-injection(38647)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38647"
|
||||
"name": "26591",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26591"
|
||||
},
|
||||
{
|
||||
"name": "20071126 Tilde CMS <= v. 4.x \"aarstal\" parameter of \"yeardetail\" SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/484206/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "webmeetme-play-directory-traversal(38772)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38772"
|
||||
},
|
||||
{
|
||||
"name": "4676",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "26641",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26641"
|
||||
},
|
||||
{
|
||||
"name" : "webmeetme-play-directory-traversal(38772)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38772"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071204 PR07-39: Multiple vulnerabilities on Absolute News Manager.NET",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=119678724111351&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.procheckup.com/Vulnerability_PR07-39.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.procheckup.com/Vulnerability_PR07-39.php"
|
||||
},
|
||||
{
|
||||
"name": "40575",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/40575"
|
||||
},
|
||||
{
|
||||
"name": "26692",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26692"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xigla.com/news/default.aspx",
|
||||
"refsource": "MISC",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "http://www.xigla.com/security/ANMNET51-SecurityUpdate20071128.zip"
|
||||
},
|
||||
{
|
||||
"name" : "26692",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26692"
|
||||
},
|
||||
{
|
||||
"name" : "40575",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/40575"
|
||||
"name": "20071204 PR07-39: Multiple vulnerabilities on Absolute News Manager.NET",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=119678724111351&w=2"
|
||||
},
|
||||
{
|
||||
"name": "27923",
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBTU02300",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01310389"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT071452",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01310389"
|
||||
},
|
||||
{
|
||||
"name" : "26964",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26964"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-4293",
|
||||
"refsource": "VUPEN",
|
||||
@ -82,10 +67,25 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28192"
|
||||
},
|
||||
{
|
||||
"name": "HPSBTU02300",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01310389"
|
||||
},
|
||||
{
|
||||
"name": "26964",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26964"
|
||||
},
|
||||
{
|
||||
"name": "hp-ffm-dos(39172)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39172"
|
||||
},
|
||||
{
|
||||
"name": "SSRT071452",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01310389"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.tibco.com/mk/advisory.jsp",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.tibco.com/mk/advisory.jsp"
|
||||
},
|
||||
{
|
||||
"name": "http://www.tibco.com/multimedia/security_advisory_runtime_agent_20100113_tcm8-10392.txt",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,15 +62,20 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/37805"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0128",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0128"
|
||||
},
|
||||
{
|
||||
"name": "38191",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38191"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-0128",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/0128"
|
||||
"name": "http://www.tibco.com/mk/advisory.jsp",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.tibco.com/mk/advisory.jsp"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,36 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27004980",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27004980"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014463"
|
||||
},
|
||||
{
|
||||
"name": "PM18909",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM18909"
|
||||
},
|
||||
{
|
||||
"name" : "PM23874",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PM23874"
|
||||
},
|
||||
{
|
||||
"name" : "43875",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/43875"
|
||||
},
|
||||
{
|
||||
"name": "41722",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41722"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg27004980",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27004980"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-2595",
|
||||
"refsource": "VUPEN",
|
||||
@ -91,6 +76,21 @@
|
||||
"name": "was-admin-console-csrf(62949)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62949"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463"
|
||||
},
|
||||
{
|
||||
"name": "PM23874",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM23874"
|
||||
},
|
||||
{
|
||||
"name": "43875",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/43875"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "62622",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/62622"
|
||||
},
|
||||
{
|
||||
"name": "http://bbs.wolvez.org/topic/125/",
|
||||
"refsource": "MISC",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38469"
|
||||
},
|
||||
{
|
||||
"name" : "62622",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/62622"
|
||||
},
|
||||
{
|
||||
"name": "38790",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2014-0082",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,36 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20140218 Denial of Service Vulnerability in Action View when using render :text (CVE-2014-0082)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2014/02/18/10"
|
||||
},
|
||||
{
|
||||
"name": "[rubyonrails-security] 20140218 Denial of Service Vulnerability in Action View when using render :text (CVE-2014-0082)",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
|
||||
},
|
||||
{
|
||||
"name" : "https://puppet.com/security/cve/cve-2014-0082",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://puppet.com/security/cve/cve-2014-0082"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0215",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html"
|
||||
},
|
||||
{
|
||||
"name": "57836",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/57836"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0306",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0306.html"
|
||||
},
|
||||
{
|
||||
"name": "https://puppet.com/security/cve/cve-2014-0082",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://puppet.com/security/cve/cve-2014-0082"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0295",
|
||||
"refsource": "SUSE",
|
||||
@ -93,9 +88,14 @@
|
||||
"url": "http://secunia.com/advisories/57376"
|
||||
},
|
||||
{
|
||||
"name" : "57836",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/57836"
|
||||
"name": "[oss-security] 20140218 Denial of Service Vulnerability in Action View when using render :text (CVE-2014-0082)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2014/02/18/10"
|
||||
},
|
||||
{
|
||||
"name": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2014-0467",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,21 +52,41 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mutt.org/doc/devel/ChangeLog",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mutt.org/doc/devel/ChangeLog"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2874",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2874"
|
||||
},
|
||||
{
|
||||
"name": "USN-2147-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2147-1"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0304",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0304.html"
|
||||
},
|
||||
{
|
||||
"name": "66165",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/66165"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mutt.org/doc/devel/ChangeLog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mutt.org/doc/devel/ChangeLog"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0471",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "1029919",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029919"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0434",
|
||||
"refsource": "SUSE",
|
||||
@ -76,26 +96,6 @@
|
||||
"name": "openSUSE-SU-2014:0436",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00085.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:0471",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2147-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2147-1"
|
||||
},
|
||||
{
|
||||
"name" : "66165",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/66165"
|
||||
},
|
||||
{
|
||||
"name" : "1029919",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1029919"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security_alert@emc.com",
|
||||
"ID": "CVE-2014-0640",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "rsaarcher-cve20140640-info-disc(95362)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95362"
|
||||
},
|
||||
{
|
||||
"name": "20140819 ESA-2014-071: RSA Archer GRC Platform Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-08/0097.html"
|
||||
},
|
||||
{
|
||||
"name" : "69288",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/69288"
|
||||
},
|
||||
{
|
||||
"name": "1030738",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030738"
|
||||
},
|
||||
{
|
||||
"name" : "rsaarcher-cve20140640-info-disc(95362)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95362"
|
||||
"name": "69288",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/69288"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2014-0862",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21664566",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21664566"
|
||||
},
|
||||
{
|
||||
"name": "ibm-rationalclm-cve20140862-rce(90895)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90895"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21664566",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21664566"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2014-1311",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/kb/HT6537",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/kb/HT6537"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2014-04-01-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-04-22-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-04/0136.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/kb/HT6537",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT6537"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-04-22-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-04/0135.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-04-01-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2014-1489",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,29 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-10.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-10.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=959531",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=959531"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201504-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:0248",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html"
|
||||
"name": "102874",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/102874"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0212",
|
||||
@ -83,14 +63,14 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2102-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2102-1"
|
||||
"name": "1029717",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029717"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2102-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2102-2"
|
||||
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-10.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-10.html"
|
||||
},
|
||||
{
|
||||
"name": "65329",
|
||||
@ -98,14 +78,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/65329"
|
||||
},
|
||||
{
|
||||
"name" : "102874",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/102874"
|
||||
"name": "USN-2102-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2102-2"
|
||||
},
|
||||
{
|
||||
"name" : "1029717",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1029717"
|
||||
"name": "GLSA-201504-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name": "56888",
|
||||
@ -116,6 +101,21 @@
|
||||
"name": "firefox-cve20141489-sec-bypass(90888)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90888"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0248",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=959531",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=959531"
|
||||
},
|
||||
{
|
||||
"name": "USN-2102-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2102-1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2014-1510",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=982906",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=982906"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2881",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2881"
|
||||
"name": "RHSA-2014:0310",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0310.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2911",
|
||||
@ -82,35 +67,15 @@
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0310",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0310.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0316",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0316.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0418",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0419",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0448",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0584",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2151-1",
|
||||
@ -121,6 +86,41 @@
|
||||
"name": "66206",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/66206"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2881",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2881"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=982906",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=982906"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0419",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0316",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0316.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0584",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0448",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-29.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2014-4214",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
||||
},
|
||||
{
|
||||
"name": "oracle-cpujul2014-cve20144214(94627)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94627"
|
||||
},
|
||||
{
|
||||
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
||||
"name": "1030578",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030578"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:1072",
|
||||
@ -83,19 +83,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/68607"
|
||||
},
|
||||
{
|
||||
"name" : "1030578",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030578"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
|
||||
},
|
||||
{
|
||||
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||
},
|
||||
{
|
||||
"name": "60425",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60425"
|
||||
},
|
||||
{
|
||||
"name" : "oracle-cpujul2014-cve20144214(94627)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/94627"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "59772",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59772"
|
||||
},
|
||||
{
|
||||
"name": "[announce] 20140707 [SECURITY] Horde Groupware Webmail Edition 5.1.5 (final)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.horde.org/archives/announce/2014/001025.html"
|
||||
},
|
||||
{
|
||||
"name" : "[announce] 20140707 [SECURITY] IMP 6.1.8 (final)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.horde.org/archives/announce/2014/001019.html"
|
||||
"name": "59770",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59770"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/horde/horde/blob/4513649810f13a32f1193bdeed76f7d85a5efa05/bundles/webmail/docs/CHANGES",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "https://github.com/horde/horde/blob/c0144ac03814a8c2cf6fc5ac0d1af2653e9ee139/imp/docs/CHANGES"
|
||||
},
|
||||
{
|
||||
"name" : "59770",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59770"
|
||||
},
|
||||
{
|
||||
"name" : "59772",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59772"
|
||||
"name": "[announce] 20140707 [SECURITY] IMP 6.1.8 (final)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.horde.org/archives/announce/2014/001019.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://xenbits.xen.org/xsa/advisory-102.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://xenbits.xen.org/xsa/advisory-102.html"
|
||||
},
|
||||
{
|
||||
"name": "1030724",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030724"
|
||||
},
|
||||
{
|
||||
"name": "http://xenbits.xen.org/xsa/advisory-102.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://xenbits.xen.org/xsa/advisory-102.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2016-3057",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21989578",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21989578"
|
||||
"name": "94389",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94389"
|
||||
},
|
||||
{
|
||||
"name": "IT15790",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT15790"
|
||||
},
|
||||
{
|
||||
"name" : "94389",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94389"
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21989578",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21989578"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-3921",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -56,34 +56,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1774161",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20180614-0002/",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1774161"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1774166",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1774166"
|
||||
},
|
||||
{
|
||||
"name" : "http://tomcat.apache.org/security-8.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tomcat.apache.org/security-8.html"
|
||||
"url": "https://security.netapp.com/advisory/ntap-20180614-0002/"
|
||||
},
|
||||
{
|
||||
"name": "http://tomcat.apache.org/security-9.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tomcat.apache.org/security-9.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://security.netapp.com/advisory/ntap-20180614-0002/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20180614-0002/"
|
||||
},
|
||||
{
|
||||
"name": "96895",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96895"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.apache.org/viewvc?view=revision&revision=1774161",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.apache.org/viewvc?view=revision&revision=1774161"
|
||||
},
|
||||
{
|
||||
"name": "http://tomcat.apache.org/security-8.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tomcat.apache.org/security-8.html"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.apache.org/viewvc?view=revision&revision=1774166",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.apache.org/viewvc?view=revision&revision=1774166"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,15 +56,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://nifi.apache.org/security.html#CVE-2016-8748",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://nifi.apache.org/security.html#CVE-2016-8748"
|
||||
},
|
||||
{
|
||||
"name": "95621",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95621"
|
||||
},
|
||||
{
|
||||
"name": "https://nifi.apache.org/security.html#CVE-2016-8748",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://nifi.apache.org/security.html#CVE-2016-8748"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20161022 Re: jasper: memory allocation failure in jas_malloc (jas_malloc.c)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/10/23/2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20161025 Re: Re: jasper: memory allocation failure in jas_malloc (jas_malloc.c)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/10/25/11"
|
||||
"name": "FEDORA-2016-6c789ba91d",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22FCKKHQCQ3S6TZY5G44EFDTMWOJXJRD/"
|
||||
},
|
||||
{
|
||||
"name": "https://blogs.gentoo.org/ago/2016/10/18/jasper-memory-allocation-failure-in-jas_malloc-jas_malloc-c",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blogs.gentoo.org/ago/2016/10/18/jasper-memory-allocation-failure-in-jas_malloc-jas_malloc-c"
|
||||
},
|
||||
{
|
||||
"name": "93839",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93839"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20161025 Re: Re: jasper: memory allocation failure in jas_malloc (jas_malloc.c)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/10/25/11"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1388880",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388880"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2016-6c789ba91d",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22FCKKHQCQ3S6TZY5G44EFDTMWOJXJRD/"
|
||||
"name": "[oss-security] 20161022 Re: jasper: memory allocation failure in jas_malloc (jas_malloc.c)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/10/23/2"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2016-e0f0d48142",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EGI2FZQLOTSZI3VA4ECJERI74SMNQDL4/"
|
||||
},
|
||||
{
|
||||
"name" : "93839",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/93839"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/python-pillow/Pillow/issues/2105",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/python-pillow/Pillow/issues/2105"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3710",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3710"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201612-52",
|
||||
"refsource": "GENTOO",
|
||||
@ -81,6 +61,26 @@
|
||||
"name": "94234",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94234"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/python-pillow/Pillow/issues/2105",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/python-pillow/Pillow/issues/2105"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3710",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3710"
|
||||
},
|
||||
{
|
||||
"name": "http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
|
||||
},
|
||||
{
|
||||
"name": "94732",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94732"
|
||||
},
|
||||
{
|
||||
"name": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user