mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
ce63486340
commit
2f69dc0fcc
@ -52,30 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060109 [eVuln] Foxrum BBCode XSS Vulnerabilty",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/421277/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://evuln.com/vulns/20",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://evuln.com/vulns/20"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "16172",
|
"name": "16172",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/16172"
|
"url": "http://www.securityfocus.com/bid/16172"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-0121",
|
"name": "http://evuln.com/vulns/20",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0121"
|
"url": "http://evuln.com/vulns/20"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18386",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/18386"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "325",
|
"name": "325",
|
||||||
@ -86,6 +71,21 @@
|
|||||||
"name": "foxrum-bbcode-xss(24043)",
|
"name": "foxrum-bbcode-xss(24043)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24043"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24043"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-0121",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/0121"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060109 [eVuln] Foxrum BBCode XSS Vulnerabilty",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/421277/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18386",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/18386"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060110 SUID root overflows in UNICOS and partial shellcode",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0343.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "16205",
|
"name": "16205",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "unicos-ftp-format-string(24277)",
|
"name": "unicos-ftp-format-string(24277)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24277"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24277"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060110 SUID root overflows in UNICOS and partial shellcode",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0343.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060107 Xoops Pool Module IMG Tag Cross Site Scripting",
|
"name": "xoops-pool-imagetag-xss(24091)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/421325/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24091"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.xoops.org/modules/newbb/viewtopic.php?topic_id=45637&forum=2&post_id=200481",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.xoops.org/modules/newbb/viewtopic.php?topic_id=45637&forum=2&post_id=200481"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "16189",
|
"name": "16189",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/16189"
|
"url": "http://www.securityfocus.com/bid/16189"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "xoops-pool-imagetag-xss(24091)",
|
"name": "http://www.xoops.org/modules/newbb/viewtopic.php?topic_id=45637&forum=2&post_id=200481",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24091"
|
"url": "http://www.xoops.org/modules/newbb/viewtopic.php?topic_id=45637&forum=2&post_id=200481"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060107 Xoops Pool Module IMG Tag Cross Site Scripting",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/421325/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,45 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060220 Secunia Research: NJStar Word Processor Font Name Buffer Overflow",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/425498/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://secunia.com/secunia_research/2006-5/advisory/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://secunia.com/secunia_research/2006-5/advisory/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.njstar.com/njstar/chinese/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.njstar.com/njstar/chinese/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.njstar.com/njstar/japanese/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.njstar.com/njstar/japanese/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "16737",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/16737"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-0670",
|
"name": "ADV-2006-0670",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/0670"
|
"url": "http://www.vupen.com/english/advisories/2006/0670"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "23354",
|
"name": "njstar-font-name-bo(24773)",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "XF",
|
||||||
"url" : "http://www.osvdb.org/23354"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24773"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1015649",
|
"name": "http://www.njstar.com/njstar/chinese/",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://securitytracker.com/id?1015649"
|
"url": "http://www.njstar.com/njstar/chinese/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "18702",
|
"name": "18702",
|
||||||
@ -103,9 +78,34 @@
|
|||||||
"url": "http://securityreason.com/securityalert/461"
|
"url": "http://securityreason.com/securityalert/461"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "njstar-font-name-bo(24773)",
|
"name": "http://www.njstar.com/njstar/japanese/",
|
||||||
"refsource" : "XF",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24773"
|
"url": "http://www.njstar.com/njstar/japanese/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "16737",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/16737"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23354",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/23354"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://secunia.com/secunia_research/2006-5/advisory/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://secunia.com/secunia_research/2006-5/advisory/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060220 Secunia Research: NJStar Word Processor Font Name Buffer Overflow",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/425498/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1015649",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1015649"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060306 Multiple vulnerabilities in Sauerbraten engine 2006_02_28",
|
"name": "sauerbraten-engineserver-dos(25087)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/426865/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25087"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "16986",
|
"name": "16986",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/16986"
|
"url": "http://www.securityfocus.com/bid/16986"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-0848",
|
"name": "20060306 Multiple vulnerabilities in Sauerbraten engine 2006_02_28",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0848"
|
"url": "http://www.securityfocus.com/archive/1/426865/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "550",
|
"name": "550",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://securityreason.com/securityalert/550"
|
"url": "http://securityreason.com/securityalert/550"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "sauerbraten-engineserver-dos(25087)",
|
"name": "ADV-2006-0848",
|
||||||
"refsource" : "XF",
|
"refsource": "VUPEN",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25087"
|
"url": "http://www.vupen.com/english/advisories/2006/0848"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060309 txtForum: Multiple XSS Vulnerabilities",
|
"name": "23957",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/427186/100/0/threaded"
|
"url": "http://www.osvdb.org/23957"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.seclab.tuwien.ac.at/advisories/TUVSA-0603-003.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.seclab.tuwien.ac.at/advisories/TUVSA-0603-003.txt"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "17054",
|
"name": "17054",
|
||||||
@ -73,29 +68,34 @@
|
|||||||
"url": "http://www.osvdb.org/23953"
|
"url": "http://www.osvdb.org/23953"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "23954",
|
"name": "23956",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.osvdb.org/23954"
|
"url": "http://www.osvdb.org/23956"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.seclab.tuwien.ac.at/advisories/TUVSA-0603-003.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.seclab.tuwien.ac.at/advisories/TUVSA-0603-003.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "23955",
|
"name": "23955",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/23955"
|
"url": "http://www.osvdb.org/23955"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "23956",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/23956"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "23957",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/23957"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "txtforum-multiple-xss(25132)",
|
"name": "txtforum-multiple-xss(25132)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25132"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25132"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23954",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/23954"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060309 txtForum: Multiple XSS Vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/427186/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://pridels0.blogspot.com/2006/03/blankol-xss-vuln.html",
|
"name": "blankol-bol-xss(25488)",
|
||||||
"refsource" : "MISC",
|
"refsource": "XF",
|
||||||
"url" : "http://pridels0.blogspot.com/2006/03/blankol-xss-vuln.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25488"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17265",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/17265"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-1111",
|
"name": "ADV-2006-1111",
|
||||||
@ -78,9 +73,14 @@
|
|||||||
"url": "http://secunia.com/advisories/19387"
|
"url": "http://secunia.com/advisories/19387"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "blankol-bol-xss(25488)",
|
"name": "17265",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25488"
|
"url": "http://www.securityfocus.com/bid/17265"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://pridels0.blogspot.com/2006/03/blankol-xss-vuln.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://pridels0.blogspot.com/2006/03/blankol-xss-vuln.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060411 SAXoPRESS - directory traversal",
|
"name": "ADV-2006-1327",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/430707/100/0/threaded"
|
"url": "http://www.vupen.com/english/advisories/2006/1327"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20060412 Re: SAXoPRESS - directory traversal aka Saxotech Online",
|
"name": "20060412 Re: SAXoPRESS - directory traversal aka Saxotech Online",
|
||||||
@ -67,11 +67,6 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/17474"
|
"url": "http://www.securityfocus.com/bid/17474"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2006-1327",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/1327"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "19566",
|
"name": "19566",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -81,6 +76,11 @@
|
|||||||
"name": "saxopress-pbcs-directory-traversal(25768)",
|
"name": "saxopress-pbcs-directory-traversal(25768)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25768"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25768"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060411 SAXoPRESS - directory traversal",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/430707/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=133988",
|
"name": "18794",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=133988"
|
"url": "http://www.securityfocus.com/bid/18794"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-200607-01",
|
"name": "GLSA-200607-01",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://security.gentoo.org/glsa/glsa-200607-01.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-200607-01.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "18794",
|
"name": "http://bugs.gentoo.org/show_bug.cgi?id=133988",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/18794"
|
"url": "http://bugs.gentoo.org/show_bug.cgi?id=133988"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20937",
|
"name": "20937",
|
||||||
|
@ -52,65 +52,65 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060913 Cisco IOS VTP issues",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/445896/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060913 Re: Cisco IOS VTP issues",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/445938/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.phenoelit.de/stuff/CiscoVTP.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.phenoelit.de/stuff/CiscoVTP.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060913 Cisco VLAN Trunking Protocol Vulnerabilities",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#542108",
|
"name": "VU#542108",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/542108"
|
"url": "http://www.kb.cert.org/vuls/id/542108"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "19998",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/19998"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-3600",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/3600"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-3601",
|
"name": "ADV-2006-3601",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/3601"
|
"url": "http://www.vupen.com/english/advisories/2006/3601"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "28777",
|
"name": "http://www.phenoelit.de/stuff/CiscoVTP.txt",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.osvdb.org/28777"
|
"url": "http://www.phenoelit.de/stuff/CiscoVTP.txt"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1016843",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1016843"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "21896",
|
"name": "21896",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/21896"
|
"url": "http://secunia.com/advisories/21896"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "19998",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/19998"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060913 Cisco VLAN Trunking Protocol Vulnerabilities",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1016843",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1016843"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060913 Re: Cisco IOS VTP issues",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/445938/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "28777",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/28777"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "cisco-ios-vtp-vlan-name-bo(28927)",
|
"name": "cisco-ios-vtp-vlan-name-bo(28927)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28927"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28927"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-3600",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/3600"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060913 Cisco IOS VTP issues",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/445896/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,26 +57,26 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/2605"
|
"url": "https://www.exploit-db.com/exploits/2605"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20654",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/20654"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-4146",
|
"name": "ADV-2006-4146",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/4146"
|
"url": "http://www.vupen.com/english/advisories/2006/4146"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20654",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/20654"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22496",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/22496"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "29935",
|
"name": "29935",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/29935"
|
"url": "http://www.osvdb.org/29935"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "29936",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/29936"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "29937",
|
"name": "29937",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -88,9 +88,9 @@
|
|||||||
"url": "http://www.osvdb.org/29938"
|
"url": "http://www.osvdb.org/29938"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22496",
|
"name": "29936",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://secunia.com/advisories/22496"
|
"url": "http://www.osvdb.org/29936"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "rssonate-project-file-include(29703)",
|
"name": "rssonate-project-file-include(29703)",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2010-2053",
|
"ID": "CVE-2010-2053",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,56 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2010-9692",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042699.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2010-9679",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042725.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "39945",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/39945"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20100529 Fwd: emesene preditable temporary filename",
|
"name": "[oss-security] 20100529 Fwd: emesene preditable temporary filename",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://marc.info/?l=oss-security&m=127514641525366&w=2"
|
"url": "http://marc.info/?l=oss-security&m=127514641525366&w=2"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "40115",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/40115"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "emesene-emsnpic-symlink(59045)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59045"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "40455",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/40455"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2010-1423",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2010/1423"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2010-9696",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042683.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "65018",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/65018"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://forum.emesene.org/index.php?topic=3441.0",
|
"name": "http://forum.emesene.org/index.php?topic=3441.0",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,51 +111,6 @@
|
|||||||
"name": "http://www.emesene.org/",
|
"name": "http://www.emesene.org/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.emesene.org/"
|
"url": "http://www.emesene.org/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2010-9679",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042725.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2010-9692",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042699.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2010-9696",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042683.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "40455",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/40455"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "65018",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/65018"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "39945",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/39945"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "40115",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/40115"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2010-1423",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2010/1423"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "emesene-emsnpic-symlink(59045)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/59045"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,49 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20100610 CVE request for new wireshark vulnerabilities",
|
"name": "SUSE-SR:2011:001",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2010/06/11/1"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.wireshark.org/security/wnpa-sec-2010-05.html",
|
"name": "http://www.wireshark.org/security/wnpa-sec-2010-05.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.wireshark.org/security/wnpa-sec-2010-05.html"
|
"url": "http://www.wireshark.org/security/wnpa-sec-2010-05.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "43068",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/43068"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2011-0212",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2011/0212"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.wireshark.org/security/wnpa-sec-2010-06.html",
|
"name": "http://www.wireshark.org/security/wnpa-sec-2010-06.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.wireshark.org/security/wnpa-sec-2010-06.html"
|
"url": "http://www.wireshark.org/security/wnpa-sec-2010-06.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDVSA-2010:113",
|
"name": "[oss-security] 20100610 CVE request for new wireshark vulnerabilities",
|
||||||
"refsource" : "MANDRIVA",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:113"
|
"url": "http://www.openwall.com/lists/oss-security/2010/06/11/1"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2011:001",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2011:002",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "40728",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/40728"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:11488",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11488"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "40112",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/40112"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "42877",
|
"name": "42877",
|
||||||
@ -103,14 +88,9 @@
|
|||||||
"url": "http://secunia.com/advisories/42877"
|
"url": "http://secunia.com/advisories/42877"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "43068",
|
"name": "SUSE-SR:2011:002",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "SUSE",
|
||||||
"url" : "http://secunia.com/advisories/43068"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2010-1418",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2010/1418"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2011-0076",
|
"name": "ADV-2011-0076",
|
||||||
@ -118,9 +98,29 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2011/0076"
|
"url": "http://www.vupen.com/english/advisories/2011/0076"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2011-0212",
|
"name": "40112",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/40112"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "40728",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/40728"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2010-1418",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0212"
|
"url": "http://www.vupen.com/english/advisories/2010/1418"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:11488",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11488"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2010:113",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:113"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "ADV-2010-1411",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2010/1411"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "PM10270",
|
"name": "PM10270",
|
||||||
"refsource": "AIXAPAR",
|
"refsource": "AIXAPAR",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM10270"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM10270"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "PM15830",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PM15830"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "65439",
|
"name": "65439",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/65439"
|
"url": "http://www.osvdb.org/65439"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "PM15830",
|
||||||
|
"refsource": "AIXAPAR",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM15830"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "40096",
|
"name": "40096",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/40096"
|
"url": "http://secunia.com/advisories/40096"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2010-1411",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2010/1411"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,6 +57,16 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/13970"
|
"url": "http://www.exploit-db.com/exploits/13970"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "videocommportal-video-sql-injection(59638)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59638"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "65810",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/65810"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.org/1006-exploits/2daybizvcp-sql.txt",
|
"name": "http://packetstormsecurity.org/1006-exploits/2daybizvcp-sql.txt",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,16 +76,6 @@
|
|||||||
"name": "41022",
|
"name": "41022",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/41022"
|
"url": "http://www.securityfocus.com/bid/41022"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "65810",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/65810"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "videocommportal-video-sql-injection(59638)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/59638"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2010-2484",
|
"ID": "CVE-2010-2484",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,46 +52,46 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.php.net/releases/5_2_14.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.php.net/releases/5_2_14.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=619324",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=619324"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT4312",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT4312"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT4435",
|
"name": "http://support.apple.com/kb/HT4435",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.apple.com/kb/HT4435"
|
"url": "http://support.apple.com/kb/HT4435"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2010-08-24-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2010-11-10-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "HPSBOV02763",
|
"name": "HPSBOV02763",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.php.net/releases/5_2_14.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.php.net/releases/5_2_14.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2010-11-10-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2010-08-24-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=619324",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=619324"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "SSRT100826",
|
"name": "SSRT100826",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT4312",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT4312"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SR:2010:018",
|
"name": "SUSE-SR:2010:018",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
|
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "SUSE-SR:2011:001",
|
"name": "SUSE-SR:2011:001",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2011:002",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:12047",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12047"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "42877",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/42877"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "43068",
|
"name": "43068",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/43068"
|
"url": "http://secunia.com/advisories/43068"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2011-0212",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2011/0212"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "42877",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/42877"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2011:002",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2011-0076",
|
"name": "ADV-2011-0076",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2011/0076"
|
"url": "http://www.vupen.com/english/advisories/2011/0076"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2011-0212",
|
"name": "oval:org.mitre.oval:def:12047",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "OVAL",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0212"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12047"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2010-3039",
|
"ID": "CVE-2010-3039",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,21 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20101105 nSense-2010-003: Cisco Unified Communications Manager",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/514668/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20101105 nSense-2010-003: Cisco Unified Communications Manager",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://seclists.org/fulldisclosure/2010/Nov/40"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.nsense.fi/advisories/nsense_2010_003.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.nsense.fi/advisories/nsense_2010_003.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21656",
|
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21656",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -77,16 +62,31 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/44672"
|
"url": "http://www.securityfocus.com/bid/44672"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20101105 nSense-2010-003: Cisco Unified Communications Manager",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/514668/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1024694",
|
"name": "1024694",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1024694"
|
"url": "http://www.securitytracker.com/id?1024694"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.nsense.fi/advisories/nsense_2010_003.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.nsense.fi/advisories/nsense_2010_003.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "42129",
|
"name": "42129",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/42129"
|
"url": "http://secunia.com/advisories/42129"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20101105 nSense-2010-003: Cisco Unified Communications Manager",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2010/Nov/40"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2010-2915",
|
"name": "ADV-2010-2915",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
|
@ -52,6 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "43291",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/43291"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2010-2425",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2010/2425"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ibm-db2-sql-security-bypass(61873)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61873"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "41444",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/41444"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg21446455",
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg21446455",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -62,11 +82,6 @@
|
|||||||
"refsource": "AIXAPAR",
|
"refsource": "AIXAPAR",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC70406"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC70406"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "43291",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/43291"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "68122",
|
"name": "68122",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -81,21 +96,6 @@
|
|||||||
"name": "1024458",
|
"name": "1024458",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1024458"
|
"url": "http://www.securitytracker.com/id?1024458"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "41444",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/41444"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2010-2425",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2010/2425"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ibm-db2-sql-security-bypass(61873)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/61873"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2010-3651",
|
"ID": "CVE-2010-3651",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2010-4238",
|
"ID": "CVE-2010-4238",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://bugs.centos.org/bug_view_advanced_page.php?bug_id=4517",
|
"name": "http://bugs.centos.org/bug_view_advanced_page.php?bug_id=4517",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -68,9 +63,9 @@
|
|||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=655623"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=655623"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
|
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
|
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2011:0017",
|
"name": "RHSA-2011:0017",
|
||||||
@ -78,9 +73,14 @@
|
|||||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "45795",
|
"name": "46397",
|
||||||
"refsource" : "BID",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/bid/45795"
|
"url": "http://secunia.com/advisories/46397"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "42884",
|
"name": "42884",
|
||||||
@ -88,9 +88,9 @@
|
|||||||
"url": "http://secunia.com/advisories/42884"
|
"url": "http://secunia.com/advisories/42884"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "46397",
|
"name": "45795",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BID",
|
||||||
"url" : "http://secunia.com/advisories/46397"
|
"url": "http://www.securityfocus.com/bid/45795"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "xen-vdbcreate-dos(64698)",
|
"name": "xen-vdbcreate-dos(64698)",
|
||||||
|
@ -53,9 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.facebook.com/note.php?note_id=477865030928",
|
"name": "40820",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/40820"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.novell.com/show_bug.cgi?id=638646",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.facebook.com/note.php?note_id=477865030928"
|
"url": "https://bugzilla.novell.com/show_bug.cgi?id=638646"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.novell.com/support/viewContent.do?externalId=7007156&sliceId=1",
|
"name": "http://www.novell.com/support/viewContent.do?externalId=7007156&sliceId=1",
|
||||||
@ -68,14 +73,9 @@
|
|||||||
"url": "https://bugzilla.novell.com/show_bug.cgi?id=638644"
|
"url": "https://bugzilla.novell.com/show_bug.cgi?id=638644"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=638646",
|
"name": "http://www.facebook.com/note.php?note_id=477865030928",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=638646"
|
"url": "http://www.facebook.com/note.php?note_id=477865030928"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "40820",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/40820"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,36 +52,36 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20101126 [eVuln.com] SQL injection Auth Bypass in Easy Banner Free",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/514908/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://evuln.com/vulns/147/summary.html",
|
"name": "http://evuln.com/vulns/147/summary.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://evuln.com/vulns/147/summary.html"
|
"url": "http://evuln.com/vulns/147/summary.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.org/files/view/96153/easybannerfree-sql.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.org/files/view/96153/easybannerfree-sql.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "45066",
|
"name": "45066",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/45066"
|
"url": "http://www.securityfocus.com/bid/45066"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "69511",
|
"name": "20101126 [eVuln.com] SQL injection Auth Bypass in Easy Banner Free",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.osvdb.org/69511"
|
"url": "http://www.securityfocus.com/archive/1/514908/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "42316",
|
"name": "42316",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/42316"
|
"url": "http://secunia.com/advisories/42316"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.org/files/view/96153/easybannerfree-sql.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.org/files/view/96153/easybannerfree-sql.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "69511",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/69511"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "8184",
|
"name": "8184",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "15232",
|
"name": "orangehrm-index-file-include(62388)",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "XF",
|
||||||
"url" : "http://www.exploit-db.com/exploits/15232"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62388"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "43905",
|
"name": "43905",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/43905"
|
"url": "http://www.securityfocus.com/bid/43905"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "orangehrm-index-file-include(62388)",
|
"name": "15232",
|
||||||
"refsource" : "XF",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62388"
|
"url": "http://www.exploit-db.com/exploits/15232"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,34 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://packetstormsecurity.org/1011-exploits/wpvodpod-xss.txt",
|
"name": "42195",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://packetstormsecurity.org/1011-exploits/wpvodpod-xss.txt"
|
"url": "http://secunia.com/advisories/42195"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "vodpod-gid-xss(63057)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63057"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.johnleitch.net/Vulnerabilities/WordPress.Vodpod.Video.Gallery.3.1.5.Reflected.Cross-site.Scripting/58",
|
"name": "http://www.johnleitch.net/Vulnerabilities/WordPress.Vodpod.Video.Gallery.3.1.5.Reflected.Cross-site.Scripting/58",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.johnleitch.net/Vulnerabilities/WordPress.Vodpod.Video.Gallery.3.1.5.Reflected.Cross-site.Scripting/58"
|
"url": "http://www.johnleitch.net/Vulnerabilities/WordPress.Vodpod.Video.Gallery.3.1.5.Reflected.Cross-site.Scripting/58"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "69084",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/69084"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "42195",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/42195"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "8431",
|
"name": "8431",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/8431"
|
"url": "http://securityreason.com/securityalert/8431"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "vodpod-gid-xss(63057)",
|
"name": "http://packetstormsecurity.org/1011-exploits/wpvodpod-xss.txt",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/63057"
|
"url": "http://packetstormsecurity.org/1011-exploits/wpvodpod-xss.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "69084",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/69084"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-1002",
|
"ID": "CVE-2011-1002",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,134 +53,49 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20110218 CVE request: avahi daemon remote denial of service by sending NULL UDP",
|
"name": "RHSA-2011:0779",
|
||||||
"refsource" : "MLIST",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://openwall.com/lists/oss-security/2011/02/18/1"
|
"url": "http://www.redhat.com/support/errata/RHSA-2011-0779.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20110218 Re: CVE request: avahi daemon remote denial of service by sending NULL UDP",
|
"name": "avahi-udp-packet-dos(65525)",
|
||||||
"refsource" : "MLIST",
|
"refsource": "XF",
|
||||||
"url" : "http://openwall.com/lists/oss-security/2011/02/18/4"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65525"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20110222 Re: [oss-security] CVE request: avahi daemon remote denial of service by sending NULL UDP",
|
"name": "[oss-security] 20110222 Re: [oss-security] CVE request: avahi daemon remote denial of service by sending NULL UDP",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2011/02/22/9"
|
"url": "http://www.openwall.com/lists/oss-security/2011/02/22/9"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://avahi.org/ticket/325",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://avahi.org/ticket/325"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://git.0pointer.de/?p=avahi.git;a=commit;h=46109dfec75534fe270c0ab902576f685d5ab3a6",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.0pointer.de/?p=avahi.git;a=commit;h=46109dfec75534fe270c0ab902576f685d5ab3a6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=667187",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=667187"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2174",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2011/dsa-2174"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2011-3033",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2011:037",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:037"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2011:040",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:040"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2011:0436",
|
"name": "RHSA-2011:0436",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0436.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2011-0436.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2011:0779",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0779.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2011:005",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-1084-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://ubuntu.com/usn/usn-1084-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "46446",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/46446"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "70948",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/70948"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "43361",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/43361"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "43465",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/43465"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "43605",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/43605"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "43673",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/43673"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "44131",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/44131"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2011-0448",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0448"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2011-0499",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0499"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2011-0511",
|
"name": "ADV-2011-0511",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2011/0511"
|
"url": "http://www.vupen.com/english/advisories/2011/0511"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2011-0565",
|
"name": "[oss-security] 20110218 CVE request: avahi daemon remote denial of service by sending NULL UDP",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0565"
|
"url": "http://openwall.com/lists/oss-security/2011/02/18/1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "43605",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/43605"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "43465",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/43465"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "43673",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/43673"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2011-0601",
|
"name": "ADV-2011-0601",
|
||||||
@ -188,9 +103,9 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2011/0601"
|
"url": "http://www.vupen.com/english/advisories/2011/0601"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2011-0670",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=667187",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0670"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=667187"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2011-0969",
|
"name": "ADV-2011-0969",
|
||||||
@ -203,9 +118,94 @@
|
|||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65524"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65524"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "avahi-udp-packet-dos(65525)",
|
"name": "44131",
|
||||||
"refsource" : "XF",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65525"
|
"url": "http://secunia.com/advisories/44131"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2011:040",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:040"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "46446",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/46446"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2011:037",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:037"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2011-0448",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2011/0448"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2011:005",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-2174",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2011/dsa-2174"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2011-0499",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2011/0499"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "70948",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/70948"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "43361",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/43361"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2011-0670",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2011/0670"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://avahi.org/ticket/325",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://avahi.org/ticket/325"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2011-3033",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2011-0565",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2011/0565"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.0pointer.de/?p=avahi.git;a=commit;h=46109dfec75534fe270c0ab902576f685d5ab3a6",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.0pointer.de/?p=avahi.git;a=commit;h=46109dfec75534fe270c0ab902576f685d5ab3a6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-1084-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://ubuntu.com/usn/usn-1084-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20110218 Re: CVE request: avahi daemon remote denial of service by sending NULL UDP",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://openwall.com/lists/oss-security/2011/02/18/4"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,20 +52,60 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681054",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681054"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
|
"name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "46397",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/46397"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "44353",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/44353"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1025450",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1025450"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "gnuclibrary-fnmatch-dos(66819)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66819"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2011:178",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://code.google.com/p/chromium/issues/detail?id=48733",
|
"name": "http://code.google.com/p/chromium/issues/detail?id=48733",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://code.google.com/p/chromium/issues/detail?id=48733"
|
"url": "http://code.google.com/p/chromium/issues/detail?id=48733"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html",
|
"name": "MDVSA-2011:179",
|
||||||
"refsource" : "MISC",
|
"refsource": "MANDRIVA",
|
||||||
"url" : "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=12583",
|
"name": "http://sourceware.org/bugzilla/show_bug.cgi?id=12583",
|
||||||
@ -76,46 +116,6 @@
|
|||||||
"name": "http://sourceware.org/git/?p=glibc.git;a=commit;h=8126d90480fa3e0c5c5cd0d02cb1c93174b45485",
|
"name": "http://sourceware.org/git/?p=glibc.git;a=commit;h=8126d90480fa3e0c5c5cd0d02cb1c93174b45485",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://sourceware.org/git/?p=glibc.git;a=commit;h=8126d90480fa3e0c5c5cd0d02cb1c93174b45485"
|
"url": "http://sourceware.org/git/?p=glibc.git;a=commit;h=8126d90480fa3e0c5c5cd0d02cb1c93174b45485"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=681054",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=681054"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2011:178",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2011:179",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1025450",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1025450"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "44353",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/44353"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "46397",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/46397"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "gnuclibrary-fnmatch-dos(66819)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66819"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,36 +52,36 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-02.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-02.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.citect.com/citectscada-batch",
|
"name": "http://www.citect.com/citectscada-batch",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.citect.com/citectscada-batch"
|
"url": "http://www.citect.com/citectscada-batch"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://my.mitsubishi-automation.com/downloads_show.php?portal_id=1&doc_type=safety&scat=2&sstr=MX4,SCADA",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://my.mitsubishi-automation.com/downloads_show.php?portal_id=1&doc_type=safety&scat=2&sstr=MX4,SCADA"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "76937",
|
"name": "76937",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/76937"
|
"url": "http://www.osvdb.org/76937"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1026306",
|
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-02.pdf",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securitytracker.com/id?1026306"
|
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-02.pdf"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "46779",
|
"name": "46779",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/46779"
|
"url": "http://secunia.com/advisories/46779"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1026306",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1026306"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://my.mitsubishi-automation.com/downloads_show.php?portal_id=1&doc_type=safety&scat=2&sstr=MX4,SCADA",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://my.mitsubishi-automation.com/downloads_show.php?portal_id=1&doc_type=safety&scat=2&sstr=MX4,SCADA"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "46786",
|
"name": "46786",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2014-3347",
|
"ID": "CVE-2014-3347",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "cisco-isr-cve20143347-dos(95558)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95558"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35453",
|
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35453",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35453"
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35453"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1030772",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1030772"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20140827 Cisco 1800 Series ISR ISDN Basic Rate Interface Denial of Service Vulnerability",
|
"name": "20140827 Cisco 1800 Series ISR ISDN Basic Rate Interface Denial of Service Vulnerability",
|
||||||
"refsource": "CISCO",
|
"refsource": "CISCO",
|
||||||
@ -66,16 +76,6 @@
|
|||||||
"name": "69439",
|
"name": "69439",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/69439"
|
"url": "http://www.securityfocus.com/bid/69439"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1030772",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1030772"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "cisco-isr-cve20143347-dos(95558)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95558"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2014-3403",
|
"ID": "CVE-2014-3403",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,21 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20140514 Xen Security Advisory 95 - input handling vulnerabilities loading guest kernel on ARM",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2014/05/14/4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20140515 Re: Xen Security Advisory 95 - input handling vulnerabilities loading guest kernel on ARM",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2014/05/15/6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20140516 Xen Security Advisory 95 (CVE-2014-3714,CVE-2014-3715,CVE-2014-3716,CVE-2014-3717) - input handling vulnerabilities loading guest kernel on ARM",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2014/05/16/1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://xenbits.xen.org/xsa/advisory-95.html",
|
"name": "http://xenbits.xen.org/xsa/advisory-95.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -76,6 +61,21 @@
|
|||||||
"name": "1030252",
|
"name": "1030252",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1030252"
|
"url": "http://www.securitytracker.com/id/1030252"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140514 Xen Security Advisory 95 - input handling vulnerabilities loading guest kernel on ARM",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2014/05/14/4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140516 Xen Security Advisory 95 (CVE-2014-3714,CVE-2014-3715,CVE-2014-3716,CVE-2014-3717) - input handling vulnerabilities loading guest kernel on ARM",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2014/05/16/1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140515 Re: Xen Security Advisory 95 - input handling vulnerabilities loading guest kernel on ARM",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2014/05/15/6"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-7454",
|
"ID": "CVE-2014-7454",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
"name": "VU#709217",
|
||||||
"refsource" : "MISC",
|
"refsource": "CERT-VN",
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
"url": "http://www.kb.cert.org/vuls/id/709217"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#709217",
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/709217"
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2014-8057",
|
"ID": "CVE-2014-8057",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2014-8200",
|
"ID": "CVE-2014-8200",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://networks.unify.com/security/advisories/OBSO-1501-02.pdf",
|
"name": "https://networks.unify.com/security/advisories/OBSO-1501-02.pdf",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://networks.unify.com/security/advisories/OBSO-1501-02.pdf"
|
"url": "https://networks.unify.com/security/advisories/OBSO-1501-02.pdf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,36 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "113110",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/113110"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "croogo-multiple-post-xss(96991)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96991"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "34959",
|
"name": "34959",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/34959"
|
"url": "http://www.exploit-db.com/exploits/34959"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://packetstormsecurity.com/files/128639/Croogo-2.0.0-Cross-Site-Scripting.html",
|
"name": "113113",
|
||||||
"refsource" : "MISC",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://packetstormsecurity.com/files/128639/Croogo-2.0.0-Cross-Site-Scripting.html"
|
"url": "http://www.osvdb.org/113113"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php",
|
"name": "http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php"
|
"url": "http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/128639/Croogo-2.0.0-Cross-Site-Scripting.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/128639/Croogo-2.0.0-Cross-Site-Scripting.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://blog.croogo.org/blog/croogo-210-released",
|
"name": "http://blog.croogo.org/blog/croogo-210-released",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -77,25 +92,10 @@
|
|||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/113109"
|
"url": "http://www.osvdb.org/113109"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "113110",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/113110"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "113111",
|
"name": "113111",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/113111"
|
"url": "http://www.osvdb.org/113111"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "113113",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/113113"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "croogo-multiple-post-xss(96991)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/96991"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://wordpress.org/plugins/cart66-lite/changelog/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://wordpress.org/plugins/cart66-lite/changelog/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://research.g0blin.co.uk/g0blin-00021/",
|
"name": "https://research.g0blin.co.uk/g0blin-00021/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "https://plugins.trac.wordpress.org/changeset/1052064/cart66-lite",
|
"name": "https://plugins.trac.wordpress.org/changeset/1052064/cart66-lite",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://plugins.trac.wordpress.org/changeset/1052064/cart66-lite"
|
"url": "https://plugins.trac.wordpress.org/changeset/1052064/cart66-lite"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://wordpress.org/plugins/cart66-lite/changelog/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://wordpress.org/plugins/cart66-lite/changelog/"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,19 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20150318 Multiple Cross-Site Scripting vulnerabilities in Websense Reporting",
|
"name": "https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/534915/100/0/threaded"
|
"url": "https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20150318 Cross-Site Scripting vulnerability in Websense Explorer report scheduler",
|
"name": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/534917/100/0/threaded"
|
"url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20150318 Multiple Cross-Site Scripting vulnerabilities in Websense Reporting",
|
"name": "https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "MISC",
|
||||||
"url" : "http://seclists.org/fulldisclosure/2015/Mar/110"
|
"url": "https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.websense.com/support/article/kbarticle/v7-8-3-About-Hotfix-02-for-Web-Security-Solutions",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.websense.com/support/article/kbarticle/v7-8-3-About-Hotfix-02-for-Web-Security-Solutions"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20150318 Cross-Site Scripting vulnerability in Websense Explorer report scheduler",
|
"name": "20150318 Cross-Site Scripting vulnerability in Websense Explorer report scheduler",
|
||||||
@ -77,35 +82,30 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/130905/Websense-Reporting-Cross-Site-Scripting.html"
|
"url": "http://packetstormsecurity.com/files/130905/Websense-Reporting-Cross-Site-Scripting.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/130903/Websense-Explorer-Report-Scheduler-Cross-Site-Scripting.html",
|
"name": "http://packetstormsecurity.com/files/130903/Websense-Explorer-Report-Scheduler-Cross-Site-Scripting.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/130903/Websense-Explorer-Report-Scheduler-Cross-Site-Scripting.html"
|
"url": "http://packetstormsecurity.com/files/130903/Websense-Explorer-Report-Scheduler-Cross-Site-Scripting.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
|
"name": "20150318 Multiple Cross-Site Scripting vulnerabilities in Websense Reporting",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "FULLDISC",
|
||||||
"url" : "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"
|
"url": "http://seclists.org/fulldisclosure/2015/Mar/110"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.websense.com/support/article/kbarticle/v7-8-3-About-Hotfix-02-for-Web-Security-Solutions",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.websense.com/support/article/kbarticle/v7-8-3-About-Hotfix-02-for-Web-Security-Solutions"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-01-for-Web-Security-Solutions",
|
"name": "http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-01-for-Web-Security-Solutions",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-01-for-Web-Security-Solutions"
|
"url": "http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-01-for-Web-Security-Solutions"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20150318 Cross-Site Scripting vulnerability in Websense Explorer report scheduler",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/534917/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20150318 Multiple Cross-Site Scripting vulnerabilities in Websense Reporting",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/534915/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,26 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://github.com/inverse-inc/sogo/commit/80a09407652ec04e8c9fb6cb48e1029e69a15765",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/inverse-inc/sogo/commit/80a09407652ec04e8c9fb6cb48e1029e69a15765"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160709 Re: CVE request: several SOGo issues (DOS, XSS, information leakage)",
|
"name": "[oss-security] 20160709 Re: CVE request: several SOGo issues (DOS, XSS, information leakage)",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/07/09/3"
|
"url": "http://www.openwall.com/lists/oss-security/2016/07/09/3"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://github.com/inverse-inc/sogo/commit/1a7fc2a0e90a19dfb1fce292ae5ff53aa513ade9",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/inverse-inc/sogo/commit/1a7fc2a0e90a19dfb1fce292ae5ff53aa513ade9"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/inverse-inc/sogo/commit/3a5e44e7eb8b390b67a8f8a83030b49606956501",
|
"name": "https://github.com/inverse-inc/sogo/commit/3a5e44e7eb8b390b67a8f8a83030b49606956501",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/inverse-inc/sogo/commit/3a5e44e7eb8b390b67a8f8a83030b49606956501"
|
"url": "https://github.com/inverse-inc/sogo/commit/3a5e44e7eb8b390b67a8f8a83030b49606956501"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://github.com/inverse-inc/sogo/commit/80a09407652ec04e8c9fb6cb48e1029e69a15765",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/inverse-inc/sogo/commit/80a09407652ec04e8c9fb6cb48e1029e69a15765"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/inverse-inc/sogo/commit/c94595ea7f0f843c2d7abf25df039b2bbe707625",
|
"name": "https://github.com/inverse-inc/sogo/commit/c94595ea7f0f843c2d7abf25df039b2bbe707625",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -81,6 +76,11 @@
|
|||||||
"name": "https://sogo.nu/bugs/view.php?id=2598",
|
"name": "https://sogo.nu/bugs/view.php?id=2598",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://sogo.nu/bugs/view.php?id=2598"
|
"url": "https://sogo.nu/bugs/view.php?id=2598"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/inverse-inc/sogo/commit/1a7fc2a0e90a19dfb1fce292ae5ff53aa513ade9",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/inverse-inc/sogo/commit/1a7fc2a0e90a19dfb1fce292ae5ff53aa513ade9"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||||
"ID": "CVE-2016-2295",
|
"ID": "CVE-2016-2295",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2016-2445",
|
"ID": "CVE-2016-2445",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2016-7014",
|
"ID": "CVE-2016-7014",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1036986",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1036986"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "93496",
|
"name": "93496",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/93496"
|
"url": "http://www.securityfocus.com/bid/93496"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1036986",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1036986"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-7326",
|
"ID": "CVE-2016-7326",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,49 +53,49 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-622",
|
"name": "SUSE-SU-2016:3148",
|
||||||
"refsource" : "MISC",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-622"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201701-17",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201701-17"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MS16-154",
|
"name": "MS16-154",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:2947",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:3148",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:3160",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "94871",
|
"name": "94871",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/94871"
|
"url": "http://www.securityfocus.com/bid/94871"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201701-17",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201701-17"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1037442",
|
"name": "1037442",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037442"
|
"url": "http://www.securitytracker.com/id/1037442"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-622",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-622"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:2947",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:3160",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-7897",
|
"ID": "CVE-2016-7897",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html",
|
"name": "GLSA-201709-15",
|
||||||
"refsource" : "MISC",
|
"refsource": "GENTOO",
|
||||||
"url" : "https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html"
|
"url": "https://security.gentoo.org/glsa/201709-15"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://crbug.com/740803",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://crbug.com/740803"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3926",
|
"name": "DSA-3926",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://www.debian.org/security/2017/dsa-3926"
|
"url": "http://www.debian.org/security/2017/dsa-3926"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201709-15",
|
"name": "https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "MISC",
|
||||||
"url" : "https://security.gentoo.org/glsa/201709-15"
|
"url": "https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "99950",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/99950"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:1833",
|
"name": "RHSA-2017:1833",
|
||||||
@ -78,9 +78,9 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2017:1833"
|
"url": "https://access.redhat.com/errata/RHSA-2017:1833"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "99950",
|
"name": "https://crbug.com/740803",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/99950"
|
"url": "https://crbug.com/740803"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user