mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
e83e543b88
commit
301ff75e2b
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010918 OpenSSH: sftp & bypassing keypair auth restrictions",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-09/0153.html"
|
||||
},
|
||||
{
|
||||
"name" : "CLSA-2001:431",
|
||||
"refsource" : "CONECTIVA",
|
||||
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000431"
|
||||
},
|
||||
{
|
||||
"name": "IMNX-2001-70-034-01",
|
||||
"refsource": "IMMUNIX",
|
||||
@ -72,6 +62,16 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2001-154.html"
|
||||
},
|
||||
{
|
||||
"name": "CLSA-2001:431",
|
||||
"refsource": "CONECTIVA",
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000431"
|
||||
},
|
||||
{
|
||||
"name": "20010918 OpenSSH: sftp & bypassing keypair auth restrictions",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0153.html"
|
||||
},
|
||||
{
|
||||
"name": "openssh-sftp-bypass-restrictions(7634)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20011129 NAI Webshield SMTP for WinNT MIME header vuln that allows BadTrans to pass]",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-11/0294.html"
|
||||
},
|
||||
{
|
||||
"name": "20011130 Re: NAI Webshield SMTP for WinNT MIME header vuln that allows BadTrans to pass]",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "webshield-smtp-mime-attachments(7637)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/7637.php"
|
||||
},
|
||||
{
|
||||
"name": "20011129 NAI Webshield SMTP for WinNT MIME header vuln that allows BadTrans to pass]",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-11/0294.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20011024 Hidden requests to Apache",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-10/0231.html"
|
||||
"name": "apache-hidden-http-request(7363)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/7363.php"
|
||||
},
|
||||
{
|
||||
"name": "http://httpd.apache.org/docs/logs.html",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://httpd.apache.org/docs/logs.html"
|
||||
},
|
||||
{
|
||||
"name" : "apache-hidden-http-request(7363)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/7363.php"
|
||||
"name": "20011024 Hidden requests to Apache",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-10/0231.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060519 Xtremescripts Topsites v1.1",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/434568/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "18055",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18055"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1899",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1899"
|
||||
},
|
||||
{
|
||||
"name" : "25702",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/25702"
|
||||
},
|
||||
{
|
||||
"name" : "20192",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20192"
|
||||
"name": "topsites-stats-join-lostid-xss(26614)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26614"
|
||||
},
|
||||
{
|
||||
"name": "945",
|
||||
@ -83,9 +68,24 @@
|
||||
"url": "http://securityreason.com/securityalert/945"
|
||||
},
|
||||
{
|
||||
"name" : "topsites-stats-join-lostid-xss(26614)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26614"
|
||||
"name": "20060519 Xtremescripts Topsites v1.1",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/434568/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1899",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1899"
|
||||
},
|
||||
{
|
||||
"name": "20192",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20192"
|
||||
},
|
||||
{
|
||||
"name": "25702",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/25702"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/1835"
|
||||
},
|
||||
{
|
||||
"name": "hot-classpath-file-include(26934)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26934"
|
||||
},
|
||||
{
|
||||
"name": "18137",
|
||||
"refsource": "BID",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "20331",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20331"
|
||||
},
|
||||
{
|
||||
"name" : "hot-classpath-file-include(26934)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26934"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,46 +52,156 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "23110",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23110"
|
||||
},
|
||||
{
|
||||
"name": "23269",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23269"
|
||||
},
|
||||
{
|
||||
"name": "23303",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23303"
|
||||
},
|
||||
{
|
||||
"name": "20061127 GnuPG 1.4 and 2.0 buffer overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/452829/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061201 rPSA-2006-0224-1 gnupg",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/453253/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[gnupg-announce] 20061127 GnuPG 1.4 and 2.0 buffer overflow",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.g10code.com/gnupg/issue728",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.g10code.com/gnupg/issue728"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-826",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-826"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm"
|
||||
"name": "gnupg-openfile-bo(30550)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30550"
|
||||
},
|
||||
{
|
||||
"name": "23513",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23513"
|
||||
},
|
||||
{
|
||||
"name": "23284",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23284"
|
||||
},
|
||||
{
|
||||
"name": "23146",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23146"
|
||||
},
|
||||
{
|
||||
"name": "23171",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23171"
|
||||
},
|
||||
{
|
||||
"name": "USN-393-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-393-2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2006:0754",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2006-0754.html"
|
||||
},
|
||||
{
|
||||
"name": "2006-0068",
|
||||
"refsource": "TRUSTIX",
|
||||
"url": "http://www.trustix.org/errata/2006/0068/"
|
||||
},
|
||||
{
|
||||
"name": "1927",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1927"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1231",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1231"
|
||||
},
|
||||
{
|
||||
"name": "23299",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23299"
|
||||
},
|
||||
{
|
||||
"name": "USN-389-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-389-1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.g10code.com/gnupg/issue728",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.g10code.com/gnupg/issue728"
|
||||
},
|
||||
{
|
||||
"name": "1017291",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017291"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200612-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200612-03.xml"
|
||||
},
|
||||
{
|
||||
"name": "[gnupg-announce] 20061127 GnuPG 1.4 and 2.0 buffer overflow",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html"
|
||||
},
|
||||
{
|
||||
"name": "23094",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23094"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2006:075",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm"
|
||||
},
|
||||
{
|
||||
"name": "20061201 rPSA-2006-0224-1 gnupg",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/453253/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "21306",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21306"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4736",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4736"
|
||||
},
|
||||
{
|
||||
"name": "23250",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23250"
|
||||
},
|
||||
{
|
||||
"name": "20061201-01-P",
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc"
|
||||
},
|
||||
{
|
||||
"name": "23161",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23161"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:221",
|
||||
"refsource": "MANDRIVA",
|
||||
@ -102,125 +212,15 @@
|
||||
"refsource": "OPENPKG",
|
||||
"url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2006:0754",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0754.html"
|
||||
},
|
||||
{
|
||||
"name" : "20061201-01-P",
|
||||
"refsource" : "SGI",
|
||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2006:075",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html"
|
||||
},
|
||||
{
|
||||
"name" : "2006-0068",
|
||||
"refsource" : "TRUSTIX",
|
||||
"url" : "http://www.trustix.org/errata/2006/0068/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-389-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-389-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-393-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-393-2"
|
||||
},
|
||||
{
|
||||
"name" : "21306",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21306"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11228",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11228"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4736",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4736"
|
||||
},
|
||||
{
|
||||
"name" : "1017291",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1017291"
|
||||
},
|
||||
{
|
||||
"name" : "23094",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23094"
|
||||
},
|
||||
{
|
||||
"name" : "23110",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23110"
|
||||
},
|
||||
{
|
||||
"name" : "23171",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23171"
|
||||
},
|
||||
{
|
||||
"name" : "23146",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23146"
|
||||
},
|
||||
{
|
||||
"name" : "23161",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23161"
|
||||
},
|
||||
{
|
||||
"name" : "23250",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23250"
|
||||
},
|
||||
{
|
||||
"name" : "23269",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23269"
|
||||
},
|
||||
{
|
||||
"name" : "23299",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23299"
|
||||
},
|
||||
{
|
||||
"name" : "23303",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23303"
|
||||
},
|
||||
{
|
||||
"name" : "23284",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23284"
|
||||
},
|
||||
{
|
||||
"name" : "23513",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23513"
|
||||
},
|
||||
{
|
||||
"name": "24047",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24047"
|
||||
},
|
||||
{
|
||||
"name" : "1927",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1927"
|
||||
},
|
||||
{
|
||||
"name" : "gnupg-openfile-bo(30550)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30550"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://retrogod.altervista.org/filezilla_0921_dos.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://retrogod.altervista.org/filezilla_0921_dos.html"
|
||||
"name": "filezilla-commands-dos(30853)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30853"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=470364&group_id=21558",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=470364&group_id=21558"
|
||||
},
|
||||
{
|
||||
"name": "http://retrogod.altervista.org/filezilla_0921_dos.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://retrogod.altervista.org/filezilla_0921_dos.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4937",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4937"
|
||||
},
|
||||
{
|
||||
"name" : "filezilla-commands-dos(30853)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30853"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "classifiedadsystem-default-xss(30445)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30445"
|
||||
},
|
||||
{
|
||||
"name": "20061119 The Classified Ad System [multiple xss & injection sql]",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/452194/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "21198",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21198"
|
||||
},
|
||||
{
|
||||
"name" : "23289",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23289"
|
||||
},
|
||||
{
|
||||
"name": "2075",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2075"
|
||||
},
|
||||
{
|
||||
"name" : "classifiedadsystem-default-xss(30445)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30445"
|
||||
"name": "23289",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23289"
|
||||
},
|
||||
{
|
||||
"name": "21198",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21198"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-2105",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "reader-acrobat-code-execution(68019)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68019"
|
||||
},
|
||||
{
|
||||
"name": "73067",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/73067"
|
||||
},
|
||||
{
|
||||
"name": "48248",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48248"
|
||||
},
|
||||
{
|
||||
"name": "VU#264729",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/264729"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb11-16.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,35 +82,15 @@
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#264729",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/264729"
|
||||
},
|
||||
{
|
||||
"name" : "48248",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/48248"
|
||||
},
|
||||
{
|
||||
"name" : "73067",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/73067"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:13960",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13960"
|
||||
},
|
||||
{
|
||||
"name": "1025658",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1025658"
|
||||
},
|
||||
{
|
||||
"name" : "reader-acrobat-code-execution(68019)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68019"
|
||||
"name": "oval:org.mitre.oval:def:13960",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13960"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-2135",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:1144",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1144.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2011:033",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2011:0894",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2011:0897",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA11-222A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA11-222A.html"
|
||||
"name": "48308",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48308"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14016",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14016"
|
||||
},
|
||||
{
|
||||
"name": "TA11-222A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16061",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16061"
|
||||
},
|
||||
{
|
||||
"name" : "48308",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48308"
|
||||
"name": "SUSE-SU-2011:0894",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:1144",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-1144.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2011:0897",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2011-2339",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,14 +58,9 @@
|
||||
"url": "http://support.apple.com/kb/HT4981"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4999",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4999"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5000",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5000"
|
||||
"name": "APPLE-SA-2011-10-12-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-10-11-1",
|
||||
@ -73,9 +68,9 @@
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2011-10-12-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
|
||||
"name": "oval:org.mitre.oval:def:17020",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17020"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-10-12-4",
|
||||
@ -88,9 +83,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/50066"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:17020",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17020"
|
||||
"name": "http://support.apple.com/kb/HT4999",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4999"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5000",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5000"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-2429",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-26.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-26.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:1333",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1333.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2011:1063",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00025.html"
|
||||
"name": "48308",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48308"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14096",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14096"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2011:1063",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:1333",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-1333.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16268",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16268"
|
||||
},
|
||||
{
|
||||
"name" : "48308",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48308"
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb11-26.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb11-26.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2011-2866",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "APPLE-SA-2012-03-07-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2012-03-12-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "52363",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/52363"
|
||||
},
|
||||
{
|
||||
"name" : "79957",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/79957"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:17368",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17368"
|
||||
},
|
||||
{
|
||||
"name" : "48274",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48274"
|
||||
},
|
||||
{
|
||||
"name": "48377",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48377"
|
||||
},
|
||||
{
|
||||
"name": "79957",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/79957"
|
||||
},
|
||||
{
|
||||
"name": "itunes-webkit-code-exec(73762)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73762"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-03-12-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "48274",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48274"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-03-07-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-3377",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,20 +57,20 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742515"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:1441",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2011-1441.html"
|
||||
},
|
||||
{
|
||||
"name": "http://dbhole.wordpress.com/2011/11/08/icedtea-web-1-0-6-and-1-1-4-security-releases-released/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://dbhole.wordpress.com/2011/11/08/icedtea-web-1-0-6-and-1-1-4-security-releases-released/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2420",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2420"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:1441",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2011-1441.html"
|
||||
"name": "76940",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/76940"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:0371",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2012-03/msg00028.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1263-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1263-1"
|
||||
"name": "DSA-2420",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2420"
|
||||
},
|
||||
{
|
||||
"name": "50610",
|
||||
@ -88,9 +88,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/50610"
|
||||
},
|
||||
{
|
||||
"name" : "76940",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/76940"
|
||||
"name": "USN-1263-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1263-1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
|
||||
},
|
||||
{
|
||||
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/zikula-1.2.4",
|
||||
"refsource": "MISC",
|
||||
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/zikula-1.2.4"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
|
||||
"refsource": "MISC",
|
||||
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2011-3915",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2011-4385",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2013-0637",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,20 +53,15 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb13-05.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb13-05.html"
|
||||
"name": "SUSE-SU-2013:0296",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0254",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0254.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0296",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0295",
|
||||
"refsource": "SUSE",
|
||||
@ -81,6 +76,11 @@
|
||||
"name": "TA13-043A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb13-05.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb13-05.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-1177",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2013-1443",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[django-developers] 20130914 Set a reasonable upper bound on password length",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.djangoproject.com/weblog/2013/sep/15/security/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.djangoproject.com/weblog/2013/sep/15/security/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2758",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2758"
|
||||
},
|
||||
{
|
||||
"name": "[django-developers] 20130914 Set a reasonable upper bound on password length",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1541",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.djangoproject.com/weblog/2013/sep/15/security/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.djangoproject.com/weblog/2013/sep/15/security/"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1685",
|
||||
"refsource": "SUSE",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play"
|
||||
},
|
||||
{
|
||||
"name": "https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf",
|
||||
"refsource": "MISC",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb",
|
||||
"refsource": "MISC",
|
||||
"url": "https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb"
|
||||
},
|
||||
{
|
||||
"name": "https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play",
|
||||
"refsource": "MISC",
|
||||
"url": "https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2013-1694",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,29 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-56.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-56.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=848535",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=848535"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2716",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2013/dsa-2716"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2720",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2013/dsa-2720"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0981",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0981.html"
|
||||
"name": "USN-1890-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1890-1"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0982",
|
||||
@ -83,44 +63,64 @@
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0982.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:1140",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html"
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=848535",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=848535"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:1141",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html"
|
||||
"name": "oval:org.mitre.oval:def:17405",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17405"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:1142",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html"
|
||||
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-56.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-56.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:1143",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1890-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1890-1"
|
||||
"name": "RHSA-2013:0981",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0981.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-1891-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1891-1"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1141",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2716",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2716"
|
||||
},
|
||||
{
|
||||
"name": "60776",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/60776"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:17405",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17405"
|
||||
"name": "openSUSE-SU-2013:1142",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1140",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2720",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2720"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1143",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2013-5332",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://helpx.adobe.com/security/products/flash-player/apsb13-28.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://helpx.adobe.com/security/products/flash-player/apsb13-28.html"
|
||||
"name": "openSUSE-SU-2013:1898",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00075.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1818",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:1898",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-12/msg00075.html"
|
||||
"name": "http://helpx.adobe.com/security/products/flash-player/apsb13-28.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://helpx.adobe.com/security/products/flash-player/apsb13-28.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-5445",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21667626",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21667626"
|
||||
},
|
||||
{
|
||||
"name": "ibm-cognos-cve20135445-info-disc(87821)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87821"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21667626",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21667626"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2013-5589",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,15 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://bugs.cacti.net/view.php?id=2383",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.cacti.net/view.php?id=2383"
|
||||
"name": "54652",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/54652"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2747",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2747"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.cacti.net/view.php?id=2383",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.cacti.net/view.php?id=2383"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0479",
|
||||
"refsource": "SUSE",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "62005",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/62005"
|
||||
},
|
||||
{
|
||||
"name" : "54652",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/54652"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-5798",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20140224 Re: CVE request: XSS in MODX Revolution before 2.2.11",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2014/q1/431"
|
||||
},
|
||||
{
|
||||
"name" : "http://modx.com/blog/2014/01/21/revolution-2.2.11%E2%80%94security-fixes-and-prevent-change-loss",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://modx.com/blog/2014/01/21/revolution-2.2.11%E2%80%94security-fixes-and-prevent-change-loss"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/modxcms/revolution/commit/77463eb6a8090f474b04fdc1b72225cb93c558ea",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/modxcms/revolution/commit/77463eb6a8090f474b04fdc1b72225cb93c558ea"
|
||||
},
|
||||
{
|
||||
"name": "65755",
|
||||
"refsource": "BID",
|
||||
@ -76,6 +61,21 @@
|
||||
"name": "57038",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/57038"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/modxcms/revolution/commit/77463eb6a8090f474b04fdc1b72225cb93c558ea",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/modxcms/revolution/commit/77463eb6a8090f474b04fdc1b72225cb93c558ea"
|
||||
},
|
||||
{
|
||||
"name": "http://modx.com/blog/2014/01/21/revolution-2.2.11%E2%80%94security-fixes-and-prevent-change-loss",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://modx.com/blog/2014/01/21/revolution-2.2.11%E2%80%94security-fixes-and-prevent-change-loss"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140224 Re: CVE request: XSS in MODX Revolution before 2.2.11",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q1/431"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-2801",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,11 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037"
|
||||
},
|
||||
{
|
||||
"name": "59775",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59775"
|
||||
},
|
||||
{
|
||||
"name": "68383",
|
||||
"refsource": "BID",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "1030532",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030532"
|
||||
},
|
||||
{
|
||||
"name" : "59775",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59775"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0398",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0508",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||
},
|
||||
{
|
||||
"name" : "96952",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/96952"
|
||||
},
|
||||
{
|
||||
"name": "1037968",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037968"
|
||||
},
|
||||
{
|
||||
"name": "96952",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96952"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0552",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,9 +62,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://android.googlesource.com/platform/external/libavc/+/9a00f562a612d56e7b2b989d168647db900ba6cf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://android.googlesource.com/platform/external/libavc/+/9a00f562a612d56e7b2b989d168647db900ba6cf"
|
||||
"name": "97336",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97336"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2017-04-01",
|
||||
@ -72,9 +72,9 @@
|
||||
"url": "https://source.android.com/security/bulletin/2017-04-01"
|
||||
},
|
||||
{
|
||||
"name" : "97336",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/97336"
|
||||
"name": "https://android.googlesource.com/platform/external/libavc/+/9a00f562a612d56e7b2b989d168647db900ba6cf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/external/libavc/+/9a00f562a612d56e7b2b989d168647db900ba6cf"
|
||||
},
|
||||
{
|
||||
"name": "1038201",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2017-11-06T00:00:00",
|
||||
"ID": "CVE-2017-0832",
|
||||
"STATE": "PUBLIC"
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-05-06T20:43:28.298672",
|
||||
"ID": "CVE-2017-1000051",
|
||||
"REQUESTER": "martin.gubri@framasoft.org",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "CryptPad",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.1.0 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "XWiki labs"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Cross Site Scripting (XSS)"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-12-29",
|
||||
"ID": "CVE-2017-1000486",
|
||||
"REQUESTER": "bjoern@schuette.se",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Primefaces",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "<5.2.21, 5.3.0-5.3.7"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Primetek"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Remote Code Execution"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -55,14 +55,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "43733",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/43733/"
|
||||
},
|
||||
{
|
||||
"name" : "http://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html"
|
||||
"name": "https://github.com/primefaces/primefaces/issues/1152",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/primefaces/primefaces/issues/1152"
|
||||
},
|
||||
{
|
||||
"name": "https://cryptosense.com/weak-encryption-flaw-in-primefaces/",
|
||||
@ -70,9 +65,14 @@
|
||||
"url": "https://cryptosense.com/weak-encryption-flaw-in-primefaces/"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/primefaces/primefaces/issues/1152",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/primefaces/primefaces/issues/1152"
|
||||
"name": "http://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html"
|
||||
},
|
||||
{
|
||||
"name": "43733",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/43733/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/simple-npm-registry",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/simple-npm-registry"
|
||||
},
|
||||
{
|
||||
"name": "https://nodesecurity.io/advisories/452",
|
||||
"refsource": "MISC",
|
||||
"url": "https://nodesecurity.io/advisories/452"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/simple-npm-registry",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/simple-npm-registry"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "101566",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101566"
|
||||
},
|
||||
{
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/129892",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "https://www.ibm.com/support/docview.wss?uid=swg22009633",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.ibm.com/support/docview.wss?uid=swg22009633"
|
||||
},
|
||||
{
|
||||
"name" : "101566",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/101566"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4329",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4593",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4749",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4825",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,15 +53,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2018-11/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2018-11/"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1451908",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1451908"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-11/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-11/"
|
||||
"name": "1040896",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040896"
|
||||
},
|
||||
{
|
||||
"name": "USN-3645-1",
|
||||
@ -72,11 +77,6 @@
|
||||
"name": "104139",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104139"
|
||||
},
|
||||
{
|
||||
"name" : "1040896",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040896"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user