mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
95b3c7e69c
commit
29782714e8
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20041129 CuteFTP 6.0 Professional Remote Buffer Overflow Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=110182983622642&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "cuteftp-reply-bo(18309)",
|
"name": "cuteftp-reply-bo(18309)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18309"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18309"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20041129 CuteFTP 6.0 Professional Remote Buffer Overflow Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=110182983622642&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20080103 securityvulns.com russian vulnerabilities digest",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/485786/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20080103 securityvulns.com russian vulnerabilities digest",
|
"name": "20080103 securityvulns.com russian vulnerabilities digest",
|
||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html"
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://securityvulns.ru/Sdocument625.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://securityvulns.ru/Sdocument625.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://websecurity.com.ua/1442/",
|
"name": "http://websecurity.com.ua/1442/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -77,10 +67,20 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/27138"
|
"url": "http://www.securityfocus.com/bid/27138"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20080103 securityvulns.com russian vulnerabilities digest",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/485786/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "3539",
|
"name": "3539",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/3539"
|
"url": "http://securityreason.com/securityalert/3539"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://securityvulns.ru/Sdocument625.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://securityvulns.ru/Sdocument625.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "BEA08-188.00",
|
"name": "1019452",
|
||||||
"refsource" : "BEA",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://dev2dev.bea.com/pub/advisory/261"
|
"url": "http://www.securitytracker.com/id?1019452"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-0613",
|
"name": "ADV-2008-0613",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/0613"
|
"url": "http://www.vupen.com/english/advisories/2008/0613"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1019452",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1019452"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "29041",
|
"name": "29041",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/29041"
|
"url": "http://secunia.com/advisories/29041"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "BEA08-188.00",
|
||||||
|
"refsource": "BEA",
|
||||||
|
"url": "http://dev2dev.bea.com/pub/advisory/261"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "6018",
|
"name": "neutrino-index-code-execution(43616)",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "XF",
|
||||||
"url" : "https://www.exploit-db.com/exploits/6018"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43616"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "30123",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/30123"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "30950",
|
"name": "30950",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://secunia.com/advisories/30950"
|
"url": "http://secunia.com/advisories/30950"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "neutrino-index-code-execution(43616)",
|
"name": "30123",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43616"
|
"url": "http://www.securityfocus.com/bid/30123"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "6018",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/6018"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "31239",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/31239"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20080728 [DSECRG-08-033] Local File Include Vulnerability in Pixelpost 1.7.1",
|
"name": "20080728 [DSECRG-08-033] Local File Include Vulnerability in Pixelpost 1.7.1",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/494817/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/494817/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "pixelpost-languagefull-file-include(44031)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44031"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "4062",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/4062"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "6150",
|
"name": "6150",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -67,30 +82,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.pixelpost.org/blog/2008/07/27/pixelpost-171-security-patch"
|
"url": "http://www.pixelpost.org/blog/2008/07/27/pixelpost-171-security-patch"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "30397",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/30397"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-2207",
|
"name": "ADV-2008-2207",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/2207/references"
|
"url": "http://www.vupen.com/english/advisories/2008/2207/references"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "31239",
|
"name": "30397",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BID",
|
||||||
"url" : "http://secunia.com/advisories/31239"
|
"url": "http://www.securityfocus.com/bid/30397"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "4062",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/4062"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "pixelpost-languagefull-file-include(44031)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44031"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "6572",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/6572"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "6574",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/6574"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "31409",
|
"name": "31409",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -72,10 +62,20 @@
|
|||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/2691"
|
"url": "http://www.vupen.com/english/advisories/2008/2691"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "6572",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/6572"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "atomicphotoalbum-album-sql-injection(45433)",
|
"name": "atomicphotoalbum-album-sql-injection(45433)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45433"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45433"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "6574",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/6574"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "6411",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/6411"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "31085",
|
"name": "31085",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/4330"
|
"url": "http://securityreason.com/securityalert/4330"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "6411",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/6411"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "photoalbum-pics-sql-injection(45017)",
|
"name": "photoalbum-pics-sql-injection(45017)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://forums.xaos-ia.com/?topic=765",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://forums.xaos-ia.com/?topic=765"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "30656",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/30656"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "31439",
|
"name": "31439",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -71,6 +61,16 @@
|
|||||||
"name": "icebb-skin-sql-injection(44403)",
|
"name": "icebb-skin-sql-injection(44403)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44403"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44403"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://forums.xaos-ia.com/?topic=765",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://forums.xaos-ia.com/?topic=765"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "30656",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/30656"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "6912",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/6912"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "32030",
|
"name": "32030",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/32030"
|
"url": "http://www.securityfocus.com/bid/32030"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "32519",
|
"name": "6912",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://secunia.com/advisories/32519"
|
"url": "https://www.exploit-db.com/exploits/6912"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "articlepublisherpro-admin-sql-injection(46373)",
|
"name": "articlepublisherpro-admin-sql-injection(46373)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46373"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46373"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "32519",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/32519"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2013-2169",
|
"ID": "CVE-2013-2169",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-2184",
|
"ID": "CVE-2013-2184",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20130613 CVE request: MovableType before 5.2.6",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://seclists.org/oss-sec/2013/q2/560"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130614 Re: CVE request: MovableType before 5.2.6",
|
"name": "[oss-security] 20130614 Re: CVE request: MovableType before 5.2.6",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://movabletype.org/documentation/appendices/release-notes/movable-type-526-release-notes.html"
|
"url": "https://movabletype.org/documentation/appendices/release-notes/movable-type-526-release-notes.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20130613 CVE request: MovableType before 5.2.6",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://seclists.org/oss-sec/2013/q2/560"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3183",
|
"name": "DSA-3183",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "hp-security-alert@hp.com",
|
||||||
"ID": "CVE-2013-6213",
|
"ID": "CVE-2013-6213",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,12 +53,12 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "HPSBMU02935",
|
"name": "SSRT101357",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437"
|
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SSRT101357",
|
"name": "HPSBMU02935",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437"
|
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437"
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-6310",
|
"ID": "CVE-2013-6310",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-6375",
|
"ID": "CVE-2013-6375",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20131120 Xen Security Advisory 78 - Insufficient TLB flushing in VT-d (iommu) code",
|
"name": "GLSA-201407-03",
|
||||||
"refsource" : "MLIST",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2013/11/20/3"
|
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20131121 Re: Xen Security Advisory 78 - Insufficient TLB flushing in VT-d (iommu) code",
|
"name": "[oss-security] 20131121 Re: Xen Security Advisory 78 - Insufficient TLB flushing in VT-d (iommu) code",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.openwall.com/lists/oss-security/2013/11/21/1"
|
"url": "http://www.openwall.com/lists/oss-security/2013/11/21/1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201407-03",
|
"name": "1029369",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-201407-03.xml"
|
"url": "http://www.securitytracker.com/id/1029369"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1876",
|
"name": "openSUSE-SU-2013:1876",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1029369",
|
"name": "[oss-security] 20131120 Xen Security Advisory 78 - Insufficient TLB flushing in VT-d (iommu) code",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.securitytracker.com/id/1029369"
|
"url": "http://www.openwall.com/lists/oss-security/2013/11/20/3"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2013-7176",
|
"ID": "CVE-2013-7176",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821",
|
"name": "VU#686662",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "CERT-VN",
|
||||||
"url" : "https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821"
|
"url": "http://www.kb.cert.org/vuls/id/686662"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2979",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2979"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2014:0348",
|
"name": "openSUSE-SU-2014:0348",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#686662",
|
"name": "DSA-2979",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/686662"
|
"url": "http://www.debian.org/security/2014/dsa-2979"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,86 +52,96 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2013/12/31/7"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1039845",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1039845"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2113-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2113-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2117-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2117-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2109-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2109-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2110-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2110-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2128-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2128-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2129-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2129-1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-2135-1",
|
"name": "USN-2135-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2135-1"
|
"url": "http://www.ubuntu.com/usn/USN-2135-1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "USN-2136-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2136-1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-2138-1",
|
"name": "USN-2138-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2138-1"
|
"url": "http://www.ubuntu.com/usn/USN-2138-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-2139-1",
|
"name": "USN-2113-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2139-1"
|
"url": "http://www.ubuntu.com/usn/USN-2113-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2141-1",
|
"name": "USN-2141-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2141-1"
|
"url": "http://www.ubuntu.com/usn/USN-2141-1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1039845",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039845"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2110-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2110-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2129-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2129-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2136-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2136-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2128-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2128-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "linux-kernel-cve20137270-info-disc(90131)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90131"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2139-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2139-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2117-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2117-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "56036",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/56036"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2109-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2109-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/12/31/7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "64744",
|
"name": "64744",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -141,16 +151,6 @@
|
|||||||
"name": "55882",
|
"name": "55882",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/55882"
|
"url": "http://secunia.com/advisories/55882"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "56036",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/56036"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "linux-kernel-cve20137270-info-disc(90131)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90131"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -54,24 +54,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
"name": "99797",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
"url": "http://www.securityfocus.com/bid/99797"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20170720-0001/",
|
"name": "https://security.netapp.com/advisory/ntap-20170720-0001/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
|
"url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "99797",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/99797"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1038931",
|
"name": "1038931",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1038931"
|
"url": "http://www.securitytracker.com/id/1038931"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[debian-lts-announce] 20180430 [SECURITY] [DLA 1368-1] libvorbis security update",
|
"name": "USN-3569-1",
|
||||||
"refsource" : "MLIST",
|
"refsource": "UBUNTU",
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00033.html"
|
"url": "https://usn.ubuntu.com/3569-1/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://gitlab.xiph.org/xiph/vorbis/issues/2329",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://gitlab.xiph.org/xiph/vorbis/issues/2329"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-4113",
|
"name": "DSA-4113",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "https://www.debian.org/security/2018/dsa-4113"
|
"url": "https://www.debian.org/security/2018/dsa-4113"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-3569-1",
|
"name": "https://gitlab.xiph.org/xiph/vorbis/issues/2329",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url" : "https://usn.ubuntu.com/3569-1/"
|
"url": "https://gitlab.xiph.org/xiph/vorbis/issues/2329"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20180430 [SECURITY] [DLA 1368-1] libvorbis security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00033.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/restlet/restlet-framework-java/issues/1286",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/restlet/restlet-framework-java/issues/1286"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements",
|
"name": "https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "https://lgtm.com/blog/restlet_CVE-2017-14868",
|
"name": "https://lgtm.com/blog/restlet_CVE-2017-14868",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://lgtm.com/blog/restlet_CVE-2017-14868"
|
"url": "https://lgtm.com/blog/restlet_CVE-2017-14868"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/restlet/restlet-framework-java/issues/1286",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/restlet/restlet-framework-java/issues/1286"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://openwall.com/lists/oss-security/2017/10/04/9",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://openwall.com/lists/oss-security/2017/10/04/9"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0",
|
"name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0"
|
"url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524",
|
"name": "http://openwall.com/lists/oss-security/2017/10/04/9",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524"
|
"url": "http://openwall.com/lists/oss-security/2017/10/04/9"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://kanboard.net/news/version-1.0.47",
|
"name": "https://kanboard.net/news/version-1.0.47",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://kanboard.net/news/version-1.0.47"
|
"url": "https://kanboard.net/news/version-1.0.47"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00027.html"
|
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00027.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[debian-lts-announce] 20180705 [SECURITY] [DLA 1414-1] mercurial security update",
|
"name": "https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.4.1_.282017-11-07.29",
|
||||||
"refsource" : "MLIST",
|
"refsource": "MISC",
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html"
|
"url": "https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.4.1_.282017-11-07.29"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1414-2] mercurial regression update",
|
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1414-2] mercurial regression update",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00041.html"
|
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00041.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bz.mercurial-scm.org/show_bug.cgi?id=5730",
|
"name": "[debian-lts-announce] 20180705 [SECURITY] [DLA 1414-1] mercurial security update",
|
||||||
"refsource" : "MISC",
|
"refsource": "MLIST",
|
||||||
"url" : "https://bz.mercurial-scm.org/show_bug.cgi?id=5730"
|
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-November/107333.html",
|
"name": "https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-November/107333.html",
|
||||||
@ -78,19 +78,19 @@
|
|||||||
"url": "https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-November/107333.html"
|
"url": "https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-November/107333.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.4.1_.282017-11-07.29",
|
"name": "102926",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/102926"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bz.mercurial-scm.org/show_bug.cgi?id=5730",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.4.1_.282017-11-07.29"
|
"url": "https://bz.mercurial-scm.org/show_bug.cgi?id=5730"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html",
|
"name": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html"
|
"url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "102926",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/102926"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.opensuse.org/show_bug.cgi?id=1071709",
|
"name": "https://www.fossil-scm.org/xfer/info/1f63db591c77108c",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://bugzilla.opensuse.org/show_bug.cgi?id=1071709"
|
"url": "https://www.fossil-scm.org/xfer/info/1f63db591c77108c"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.fossil-scm.org/xfer/doc/trunk/www/changes.wiki#v2_4",
|
"name": "https://www.fossil-scm.org/xfer/doc/trunk/www/changes.wiki#v2_4",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://www.fossil-scm.org/xfer/doc/trunk/www/changes.wiki#v2_4"
|
"url": "https://www.fossil-scm.org/xfer/doc/trunk/www/changes.wiki#v2_4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.fossil-scm.org/xfer/info/1f63db591c77108c",
|
"name": "https://bugzilla.opensuse.org/show_bug.cgi?id=1071709",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://www.fossil-scm.org/xfer/info/1f63db591c77108c"
|
"url": "https://bugzilla.opensuse.org/show_bug.cgi?id=1071709"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-pcpt1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-pcpt1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "103145",
|
"name": "103145",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "1040409",
|
"name": "1040409",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1040409"
|
"url": "http://www.securitytracker.com/id/1040409"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-pcpt1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-pcpt1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://p3.support.panasonic.com/faq/show/5017?&site_domain=p3",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://p3.support.panasonic.com/faq/show/5017?&site_domain=p3"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "JVN#65082538",
|
"name": "JVN#65082538",
|
||||||
"refsource": "JVN",
|
"refsource": "JVN",
|
||||||
"url": "https://jvn.jp/en/jp/JVN65082538/index.html"
|
"url": "https://jvn.jp/en/jp/JVN65082538/index.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://p3.support.panasonic.com/faq/show/5017?&site_domain=p3",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://p3.support.panasonic.com/faq/show/5017?&site_domain=p3"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,11 +53,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0804",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0804"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "102457",
|
"name": "102457",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"name": "1040153",
|
"name": "1040153",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1040153"
|
"url": "http://www.securitytracker.com/id/1040153"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0804",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0804"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "Secure@Microsoft.com",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2018-0979",
|
"ID": "CVE-2018-0979",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -92,11 +92,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0979",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0979"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "103625",
|
"name": "103625",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -106,6 +101,11 @@
|
|||||||
"name": "1040650",
|
"name": "1040650",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1040650"
|
"url": "http://www.securitytracker.com/id/1040650"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0979",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0979"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2/23/2018 11:20:58",
|
"DATE_ASSIGNED": "2/23/2018 11:20:58",
|
||||||
"ID": "CVE-2018-1000132",
|
"ID": "CVE-2018-1000132",
|
||||||
"REQUESTER": "gregory.szorc@gmail.com",
|
"REQUESTER": "gregory.szorc@gmail.com",
|
||||||
@ -13,18 +13,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "Mercurial",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "4.5 and earlier"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "Mercurial"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -46,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "Incorrect Access Control (CWE-285)"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "kurt@seifried.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2018-05-18T21:46:02.318830",
|
"DATE_ASSIGNED": "2018-05-18T21:46:02.318830",
|
||||||
"DATE_REQUESTED": "2018-04-03T08:28:21",
|
"DATE_REQUESTED": "2018-04-03T08:28:21",
|
||||||
"ID": "CVE-2018-1000155",
|
"ID": "CVE-2018-1000155",
|
||||||
@ -14,18 +14,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "OpenFlow",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "1.0 onwards"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "OpenFlow"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -47,7 +47,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "Denial of Service and Improper authorization"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "kurt@seifried.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2018-12-28T04:34:37.680270",
|
"DATE_ASSIGNED": "2018-12-28T04:34:37.680270",
|
||||||
"ID": "CVE-2018-1000413",
|
"ID": "CVE-2018-1000413",
|
||||||
"REQUESTER": "ml@beckweb.net",
|
"REQUESTER": "ml@beckweb.net",
|
||||||
@ -13,18 +13,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "Jenkins Config File Provider Plugin",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "3.1 and earlier"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "Jenkins project"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -46,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "CWE-79"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -54,15 +54,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1080",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1080"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "106532",
|
"name": "106532",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/106532"
|
"url": "http://www.securityfocus.com/bid/106532"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1080",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1080"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "kurt@seifried.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2018-07-08T15:52:41.203289",
|
"DATE_ASSIGNED": "2018-07-08T15:52:41.203289",
|
||||||
"DATE_REQUESTED": "2018-07-06T20:31:25",
|
"DATE_REQUESTED": "2018-07-06T20:31:25",
|
||||||
"ID": "CVE-2018-1000622",
|
"ID": "CVE-2018-1000622",
|
||||||
@ -14,18 +14,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "rustdoc",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "Between 0.8 and 1.27.0"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "The Rust Programming Language"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -47,7 +47,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "CWE-427: Uncontrolled Search Path Element"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -55,15 +55,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://groups.google.com/forum/#!topic/rustlang-security-announcements/4ybxYLTtXuM",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://groups.google.com/forum/#!topic/rustlang-security-announcements/4ybxYLTtXuM"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201812-11",
|
"name": "GLSA-201812-11",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201812-11"
|
"url": "https://security.gentoo.org/glsa/201812-11"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://groups.google.com/forum/#!topic/rustlang-security-announcements/4ybxYLTtXuM",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://groups.google.com/forum/#!topic/rustlang-security-announcements/4ybxYLTtXuM"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20181120 CVE-2018-19364 Qemu: 9pfs: Use-after-free due to race condition while updating fid path",
|
"name": "[debian-lts-announce] 20190129 [SECURITY] [DLA 1646-1] qemu security update",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2018/11/20/1"
|
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00023.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[qemu-devel] 20181107 [PATCH] 9p: write lock path in v9fs_co_open2()",
|
"name": "[qemu-devel] 20181107 [PATCH] 9p: write lock path in v9fs_co_open2()",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg01139.html"
|
"url": "https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg01139.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "[qemu-devel] 20181115 [PATCH] 9p: take write lock on fid path updates",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg02795.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[debian-lts-announce] 20190129 [SECURITY] [DLA 1646-1] qemu security update",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00023.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-3826-1",
|
"name": "USN-3826-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "https://usn.ubuntu.com/3826-1/"
|
"url": "https://usn.ubuntu.com/3826-1/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20181120 CVE-2018-19364 Qemu: 9pfs: Use-after-free due to race condition while updating fid path",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2018/11/20/1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[qemu-devel] 20181115 [PATCH] 9p: take write lock on fid path updates",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg02795.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://seclists.org/fulldisclosure/2018/Dec/20"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html",
|
"name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html"
|
"url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2018/Dec/20"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "104175",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/104175"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1040920",
|
"name": "1040920",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1040920"
|
"url": "http://www.securitytracker.com/id/1040920"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "104175",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/104175"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user