mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 22:18:26 +00:00
- Synchronized data.
This commit is contained in:
parent
aca1ef8770
commit
31b56c536d
@ -55,9 +55,18 @@
|
|||||||
{
|
{
|
||||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/499099/100/0/threaded"
|
"url" : "http://www.securityfocus.com/archive/1/archive/1/499099/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://www.exploit-db.com/exploits/18595"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://packetstormsecurity.org/files/110772/Maxs-Guestbook-1.0-Local-File-Inclusion-Path-Disclosure.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url" : "http://www.securityfocus.com/bid/32763"
|
"url" : "http://www.securityfocus.com/bid/32763"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://www.securityfocus.com/bid/52471"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url" : "http://osvdb.org/50654"
|
"url" : "http://osvdb.org/50654"
|
||||||
},
|
},
|
||||||
@ -66,6 +75,9 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47250"
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47250"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/74011"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -55,11 +55,17 @@
|
|||||||
{
|
{
|
||||||
"url" : "http://www.exploit-db.com/exploits/8895"
|
"url" : "http://www.exploit-db.com/exploits/8895"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://packetstormsecurity.org/files/110437/Interlogy-Profile-Manager-Basic-Insecure-Cookie-Handling.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/1529"
|
"url" : "http://www.vupen.com/english/advisories/2009/1529"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50992"
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50992"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73691"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -100,6 +100,9 @@
|
|||||||
{
|
{
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1400-1"
|
"url" : "http://www.ubuntu.com/usn/USN-1400-1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://www.securityfocus.com/bid/52465"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14170"
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14170"
|
||||||
},
|
},
|
||||||
|
@ -69,6 +69,9 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url" : "http://secunia.com/advisories/48377"
|
"url" : "http://secunia.com/advisories/48377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73871"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -55,8 +55,20 @@
|
|||||||
{
|
{
|
||||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb12-06.html"
|
"url" : "http://www.adobe.com/support/security/bulletins/apsb12-06.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://helpx.adobe.com/coldfusion/kb/coldfusion-security-hotfix.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://osvdb.org/80008"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url" : "http://www.securitytracker.com/id?1026830"
|
"url" : "http://www.securitytracker.com/id?1026830"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://secunia.com/advisories/48393"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73955"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -54,6 +54,9 @@
|
|||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1478-vulnerability-in-UCMobileBloveStorm.html"
|
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1478-vulnerability-in-UCMobileBloveStorm.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/74024"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -54,6 +54,9 @@
|
|||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1479-vulnerability-in-AContact.html"
|
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1479-vulnerability-in-AContact.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/74025"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -54,6 +54,9 @@
|
|||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1480-vulnerability-in-PansiSMS.html"
|
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1480-vulnerability-in-PansiSMS.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73963"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -54,6 +54,9 @@
|
|||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1481-vulnerability-in-Textdroid.html"
|
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1481-vulnerability-in-Textdroid.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://www.securityfocus.com/bid/52490"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -54,6 +54,9 @@
|
|||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1482-vulnerability-in-TouchPalContacts.html"
|
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1482-vulnerability-in-TouchPalContacts.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://www.securityfocus.com/bid/52491"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -54,6 +54,9 @@
|
|||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1483-vulnerability-in-MessageForwarder.html"
|
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1483-vulnerability-in-MessageForwarder.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://www.securityfocus.com/bid/52492"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -54,6 +54,9 @@
|
|||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1484-vulnerability-in-WaliSMSCN.html"
|
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1484-vulnerability-in-WaliSMSCN.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://www.securityfocus.com/bid/52495"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -55,6 +55,9 @@
|
|||||||
{
|
{
|
||||||
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1485-vulnerability-in-NetFrontLifeBrowser.html"
|
"url" : "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1485-vulnerability-in-NetFrontLifeBrowser.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url" : "http://www.securityfocus.com/bid/52480"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url" : "http://secunia.com/advisories/48557"
|
"url" : "http://secunia.com/advisories/48557"
|
||||||
}
|
}
|
||||||
|
@ -35,7 +35,7 @@
|
|||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang" : "eng",
|
"lang" : "eng",
|
||||||
"value" : "Manipulation of SafeSwitch Image data can result in Heap overflow."
|
"value" : "In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, manipulation of SafeSwitch Image data can result in Heap overflow."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -35,7 +35,7 @@
|
|||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang" : "eng",
|
"lang" : "eng",
|
||||||
"value" : "A LayerStack can be destroyed in between Validate and Commit by the application resulting in a Use After Free condition."
|
"value" : "In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a LayerStack can be destroyed in between Validate and Commit by the application resulting in a Use After Free condition."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
Loading…
x
Reference in New Issue
Block a user