mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
b35c538208
commit
37e4eadec7
@ -53,59 +53,59 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "MS05-040",
|
"name": "oval:org.mitre.oval:def:1297",
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-040"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "14518",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/14518"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:100084",
|
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100084"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1297"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:100085",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100085"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:100086",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100086"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:100088",
|
"name": "oval:org.mitre.oval:def:100088",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100088"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100088"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "14518",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/14518"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:1075",
|
"name": "oval:org.mitre.oval:def:1075",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1075"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1075"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:1213",
|
"name": "MS05-040",
|
||||||
"refsource" : "OVAL",
|
"refsource": "MS",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1213"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-040"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:1297",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1297"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1014639",
|
"name": "1014639",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1014639"
|
"url": "http://securitytracker.com/id?1014639"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:100086",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100086"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "16354",
|
"name": "16354",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/16354/"
|
"url": "http://secunia.com/advisories/16354/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:100084",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100084"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:1213",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1213"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:100085",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100085"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "linksys-psus4-dos(19222)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19222"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20050203 [ RSTACK Public Security Advisory ] Remote DOS against Linksys PSUS4",
|
"name": "20050203 [ RSTACK Public Security Advisory ] Remote DOS against Linksys PSUS4",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "14136",
|
"name": "14136",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/14136"
|
"url": "http://secunia.com/advisories/14136"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "linksys-psus4-dos(19222)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19222"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "HPSBUX01117",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=110805105200470&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:5690",
|
"name": "oval:org.mitre.oval:def:5690",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5690"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5690"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "hpux-bind-dos(19276)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19276"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "14220",
|
"name": "14220",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/14220/"
|
"url": "http://secunia.com/advisories/14220/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "hpux-bind-dos(19276)",
|
"name": "HPSBUX01117",
|
||||||
"refsource" : "XF",
|
"refsource": "HP",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19276"
|
"url": "http://marc.info/?l=bugtraq&m=110805105200470&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20050222 [SCAN Associates Security Advisory] vbulletin 3.0.6 and below php code injection",
|
"name": "14326",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=110910899415763&w=2"
|
"url": "http://secunia.com/advisories/14326"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.vbulletin.com/forum/showthread.php?postid=819562",
|
"name": "http://www.vbulletin.com/forum/showthread.php?postid=819562",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.vbulletin.com/forum/showthread.php?postid=819562"
|
"url": "http://www.vbulletin.com/forum/showthread.php?postid=819562"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20050222 [SCAN Associates Security Advisory] vbulletin 3.0.6 and below php code injection",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=110910899415763&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "12622",
|
"name": "12622",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/12622"
|
"url": "http://www.securityfocus.com/bid/12622"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "14326",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/14326"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2005:059",
|
||||||
|
"refsource": "MANDRAKE",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:059"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://bugzilla.ximian.com/show_bug.cgi?id=72609",
|
"name": "http://bugzilla.ximian.com/show_bug.cgi?id=72609",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://bugzilla.ximian.com/show_bug.cgi?id=72609"
|
"url": "http://bugzilla.ximian.com/show_bug.cgi?id=72609"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDKSA-2005:059",
|
"name": "oval:org.mitre.oval:def:10532",
|
||||||
"refsource" : "MANDRAKE",
|
"refsource": "OVAL",
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:059"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10532"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2005:397",
|
"name": "RHSA-2005:397",
|
||||||
@ -71,11 +76,6 @@
|
|||||||
"name": "USN-166-1",
|
"name": "USN-166-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "https://usn.ubuntu.com/166-1/"
|
"url": "https://usn.ubuntu.com/166-1/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:10532",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10532"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2005-1155",
|
"ID": "CVE-2005-1155",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,29 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.mikx.de/firelinking/",
|
"name": "oval:org.mitre.oval:def:10655",
|
||||||
"refsource" : "MISC",
|
"refsource": "OVAL",
|
||||||
"url" : "http://www.mikx.de/firelinking/"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10655"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.mozilla.org/security/announce/mfsa2005-37.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.mozilla.org/security/announce/mfsa2005-37.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=290036",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=290036"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200504-18",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2005:383",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-383.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2005:386",
|
"name": "RHSA-2005:386",
|
||||||
@ -83,9 +63,9 @@
|
|||||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-386.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-386.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2005:384",
|
"name": "14992",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-384.html"
|
"url": "http://secunia.com/advisories/14992"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SCOSA-2005.49",
|
"name": "SCOSA-2005.49",
|
||||||
@ -93,19 +73,9 @@
|
|||||||
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt"
|
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#973309",
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=290036",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/973309"
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=290036"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "15495",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/15495"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "13216",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/13216"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:100021",
|
"name": "oval:org.mitre.oval:def:100021",
|
||||||
@ -113,9 +83,24 @@
|
|||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100021"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100021"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:10655",
|
"name": "http://www.mikx.de/firelinking/",
|
||||||
"refsource" : "OVAL",
|
"refsource": "MISC",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10655"
|
"url": "http://www.mikx.de/firelinking/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "15495",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/15495"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#973309",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/973309"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-200504-18",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "14938",
|
"name": "14938",
|
||||||
@ -123,9 +108,24 @@
|
|||||||
"url": "http://secunia.com/advisories/14938"
|
"url": "http://secunia.com/advisories/14938"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "14992",
|
"name": "RHSA-2005:384",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://secunia.com/advisories/14992"
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-384.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.mozilla.org/security/announce/mfsa2005-37.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.mozilla.org/security/announce/mfsa2005-37.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "13216",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/13216"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2005:383",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-383.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,16 +57,16 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/396628"
|
"url": "http://www.securityfocus.com/archive/1/396628"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.venera.com/downloads/Canonicalization_problems_in_iSeries_FTP_security.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.venera.com/downloads/Canonicalization_problems_in_iSeries_FTP_security.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "13312",
|
"name": "13312",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/13312"
|
"url": "http://www.securityfocus.com/bid/13312"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.venera.com/downloads/Canonicalization_problems_in_iSeries_FTP_security.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.venera.com/downloads/Canonicalization_problems_in_iSeries_FTP_security.pdf"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "multiple-vendor-security-bypass(20260)",
|
"name": "multiple-vendor-security-bypass(20260)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.under9round.com/avn13.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.under9round.com/avn13.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1013933",
|
"name": "1013933",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1013933"
|
"url": "http://securitytracker.com/id?1013933"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.under9round.com/avn13.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.under9round.com/avn13.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "18136",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/18136"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "16054",
|
"name": "16054",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/16054"
|
"url": "http://www.securityfocus.com/bid/16054"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2005-3062",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/3062"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "22035",
|
"name": "22035",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/22035"
|
"url": "http://www.osvdb.org/22035"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "18136",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/18136"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "shopengine-search-xss(23841)",
|
"name": "shopengine-search-xss(23841)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23841"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23841"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2005-3062",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2005/3062"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://projects.edgewall.com/trac/ticket/2473",
|
"name": "18555",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://projects.edgewall.com/trac/ticket/2473"
|
"url": "http://secunia.com/advisories/18555"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://trac.edgewall.org/ticket/2473",
|
"name": "http://trac.edgewall.org/ticket/2473",
|
||||||
@ -63,19 +63,9 @@
|
|||||||
"url": "http://trac.edgewall.org/ticket/2473"
|
"url": "http://trac.edgewall.org/ticket/2473"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-951",
|
"name": "trac-html-xss(24183)",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "XF",
|
||||||
"url" : "http://www.debian.org/security/2006/dsa-951"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "16198",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/16198"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-0226",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0226"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "18465",
|
"name": "18465",
|
||||||
@ -83,14 +73,24 @@
|
|||||||
"url": "http://secunia.com/advisories/18465"
|
"url": "http://secunia.com/advisories/18465"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "18555",
|
"name": "http://projects.edgewall.com/trac/ticket/2473",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/18555"
|
"url": "http://projects.edgewall.com/trac/ticket/2473"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "trac-html-xss(24183)",
|
"name": "ADV-2006-0226",
|
||||||
"refsource" : "XF",
|
"refsource": "VUPEN",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
|
"url": "http://www.vupen.com/english/advisories/2006/0226"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "16198",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/16198"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-951",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2006/dsa-951"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2009-0087",
|
"ID": "CVE-2009-0087",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "MS09-010",
|
"name": "1022043",
|
||||||
"refsource" : "MS",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010"
|
"url": "http://www.securitytracker.com/id?1022043"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "TA09-104A",
|
"name": "TA09-104A",
|
||||||
"refsource": "CERT",
|
"refsource": "CERT",
|
||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-104A.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA09-104A.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "53662",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/53662"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:5799",
|
"name": "oval:org.mitre.oval:def:5799",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5799"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5799"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1022043",
|
"name": "53662",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.securitytracker.com/id?1022043"
|
"url": "http://osvdb.org/53662"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS09-010",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-1024",
|
"name": "ADV-2009-1024",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2009-0093",
|
"ID": "CVE-2009-0093",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:6138",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6138"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA09-069A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA09-069A.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://blog.ncircle.com/blogs/vert/archives/2009/03/successful_exploit_renders_mic.html",
|
"name": "http://blog.ncircle.com/blogs/vert/archives/2009/03/successful_exploit_renders_mic.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://blog.ncircle.com/blogs/vert/archives/2009/03/successful_exploit_renders_mic.html"
|
"url": "http://blog.ncircle.com/blogs/vert/archives/2009/03/successful_exploit_renders_mic.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx",
|
"name": "ADV-2009-0661",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx"
|
"url": "http://www.vupen.com/english/advisories/2009/0661"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34217",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/34217"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "52519",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/52519"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33989",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/33989"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm",
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm",
|
||||||
@ -72,40 +97,15 @@
|
|||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "TA09-069A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-069A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33989",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/33989"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "52519",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/52519"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:6138",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6138"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1021830",
|
"name": "1021830",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1021830"
|
"url": "http://www.securitytracker.com/id?1021830"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "34217",
|
"name": "http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/34217"
|
"url": "http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2009-0661",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/0661"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "8020",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/8020"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33704",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/33704"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33862",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/33862"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-0383",
|
"name": "ADV-2009-0383",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -76,6 +61,21 @@
|
|||||||
"name": "yanocc-checklang-file-include(48608)",
|
"name": "yanocc-checklang-file-include(48608)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48608"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48608"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33704",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/33704"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "8020",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/8020"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33862",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/33862"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2009-0620",
|
"ID": "CVE-2009-0620",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2009-1016",
|
"ID": "CVE-2009-1016",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,24 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://secunia.com/secunia_research/2009-23/",
|
"name": "oracle-bea-ssl-bo(64934)",
|
||||||
"refsource" : "MISC",
|
"refsource": "XF",
|
||||||
"url" : "http://secunia.com/secunia_research/2009-23/"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64934"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA09-105A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-105A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34461",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/34461"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1022059",
|
"name": "1022059",
|
||||||
@ -78,9 +63,24 @@
|
|||||||
"url": "http://www.securitytracker.com/id?1022059"
|
"url": "http://www.securitytracker.com/id?1022059"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oracle-bea-ssl-bo(64934)",
|
"name": "34461",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64934"
|
"url": "http://www.securityfocus.com/bid/34461"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA09-105A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA09-105A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://secunia.com/secunia_research/2009-23/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://secunia.com/secunia_research/2009-23/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,16 +57,16 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/502256/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/502256/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20090330 Check Point Firewall-1 PKI Web Service HTTP Header Remote Overflow",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0463.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "8313",
|
"name": "8313",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/8313"
|
"url": "https://www.exploit-db.com/exploits/8313"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20090330 Check Point Firewall-1 PKI Web Service HTTP Header Remote Overflow",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0463.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "34286",
|
"name": "34286",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -53,9 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20090616 ZDI-09-043: Apple Java CColorUIResource Pointer Derference Code Execution Vulnerability",
|
"name": "APPLE-SA-2009-06-15-1",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "APPLE",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/504364/100/0/threaded"
|
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00003.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35401",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/35401"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-09-043",
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-09-043",
|
||||||
@ -63,14 +68,9 @@
|
|||||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-043"
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-043"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://support.apple.com/kb/HT3632",
|
"name": "20090616 ZDI-09-043: Apple Java CColorUIResource Pointer Derference Code Execution Vulnerability",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://support.apple.com/kb/HT3632"
|
"url": "http://www.securityfocus.com/archive/1/504364/100/0/threaded"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2009-06-15-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Jun/msg00003.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "35381",
|
"name": "35381",
|
||||||
@ -78,9 +78,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/35381"
|
"url": "http://www.securityfocus.com/bid/35381"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "35401",
|
"name": "http://support.apple.com/kb/HT3632",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/35401"
|
"url": "http://support.apple.com/kb/HT3632"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "hotspot-ccolouruiresource-code-execution(51185)",
|
"name": "hotspot-ccolouruiresource-code-execution(51185)",
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.org/0908-exploits/egoldgame-sql.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.org/0908-exploits/egoldgame-sql.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "36488",
|
"name": "36488",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "ADV-2009-2442",
|
"name": "ADV-2009-2442",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/2442"
|
"url": "http://www.vupen.com/english/advisories/2009/2442"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.org/0908-exploits/egoldgame-sql.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.org/0908-exploits/egoldgame-sql.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://companionway.net/files/myphile/",
|
"name": "myphile-password-security-bypass(54350)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://companionway.net/files/myphile/"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54350"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "37322",
|
"name": "37322",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/37322"
|
"url": "http://secunia.com/advisories/37322"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://companionway.net/files/myphile/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://companionway.net/files/myphile/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-3289",
|
"name": "ADV-2009-3289",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/3289"
|
"url": "http://www.vupen.com/english/advisories/2009/3289"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "myphile-password-security-bypass(54350)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54350"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.net-security.org/secworld.php?id=8527",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.net-security.org/secworld.php?id=8527"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://addons.mozilla.org/en-US/firefox/addons/versions/1833#version-6.1.1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://addons.mozilla.org/en-US/firefox/addons/versions/1833#version-6.1.1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "37123",
|
"name": "37123",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/37123"
|
"url": "http://www.securityfocus.com/bid/37123"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "37468",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/37468"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-3326",
|
"name": "ADV-2009-3326",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/3326"
|
"url": "http://www.vupen.com/english/advisories/2009/3326"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://addons.mozilla.org/en-US/firefox/addons/versions/1833#version-6.1.1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://addons.mozilla.org/en-US/firefox/addons/versions/1833#version-6.1.1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "yoonoo-domevent-xss(54417)",
|
"name": "yoonoo-domevent-xss(54417)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54417"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54417"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.net-security.org/secworld.php?id=8527",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.net-security.org/secworld.php?id=8527"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "37468",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/37468"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.suspekt.org/2009/11/28/shocking-news-in-php-exploitation/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.suspekt.org/2009/11/28/shocking-news-in-php-exploitation/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf",
|
"name": "http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf"
|
"url": "http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.suspekt.org/2009/11/28/shocking-news-in-php-exploitation/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.suspekt.org/2009/11/28/shocking-news-in-php-exploitation/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1023387",
|
"name": "1023387",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1023387"
|
"url": "http://securitytracker.com/id?1023387"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ms-iis-colon-security-bypass(55308)",
|
"name": "ms-iis-colon-security-bypass(55308)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "kwebkitpart-webkitpart-xss(60878)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60878"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://websvn.kde.org/?view=rev&revision=1059140",
|
"name": "http://websvn.kde.org/?view=rev&revision=1059140",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "https://bugs.kde.org/show_bug.cgi?id=217464",
|
"name": "https://bugs.kde.org/show_bug.cgi?id=217464",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugs.kde.org/show_bug.cgi?id=217464"
|
"url": "https://bugs.kde.org/show_bug.cgi?id=217464"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "kwebkitpart-webkitpart-xss(60878)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/60878"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2012-2241",
|
"ID": "CVE-2012-2241",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,30 +53,30 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=0fd15bdec07b085f9ef438dacd18e159ac60b810",
|
"name": "55564",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=0fd15bdec07b085f9ef438dacd18e159ac60b810"
|
"url": "http://www.securityfocus.com/bid/55564"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-2549",
|
"name": "DSA-2549",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2012/dsa-2549"
|
"url": "http://www.debian.org/security/2012/dsa-2549"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "USN-1593-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1593-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "55564",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/55564"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "50600",
|
"name": "50600",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/50600"
|
"url": "http://secunia.com/advisories/50600"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=0fd15bdec07b085f9ef438dacd18e159ac60b810",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=0fd15bdec07b085f9ef438dacd18e159ac60b810"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-1593-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-1593-1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "devscripts-file-deletion(78977)",
|
"name": "devscripts-file-deletion(78977)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -53,40 +53,55 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20120418 TC-SA-2012-01: Multiple web-vulnerabilities in ownCloud 3.0.0",
|
"name": "81210",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-04/0127.html"
|
"url": "http://osvdb.org/81210"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20120810 ownCloud - matching CVEs to fix information and vice versa",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2012/08/11/1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20120901 Re: CVE - ownCloud",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2012/09/02/2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.tele-consulting.com/advisories/TC-SA-2012-01.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.tele-consulting.com/advisories/TC-SA-2012-01.txt"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://owncloud.org/security/advisories/CVE-2012-2269/",
|
"name": "http://owncloud.org/security/advisories/CVE-2012-2269/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://owncloud.org/security/advisories/CVE-2012-2269/"
|
"url": "http://owncloud.org/security/advisories/CVE-2012-2269/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "53145",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/53145"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "81206",
|
"name": "81206",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/81206"
|
"url": "http://osvdb.org/81206"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.tele-consulting.com/advisories/TC-SA-2012-01.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.tele-consulting.com/advisories/TC-SA-2012-01.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20120810 ownCloud - matching CVEs to fix information and vice versa",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2012/08/11/1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20120418 TC-SA-2012-01: Multiple web-vulnerabilities in ownCloud 3.0.0",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0127.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20120901 Re: CVE - ownCloud",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2012/09/02/2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "48850",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/48850"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "81209",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/81209"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "53145",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/53145"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "81207",
|
"name": "81207",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -97,21 +112,6 @@
|
|||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/81208"
|
"url": "http://osvdb.org/81208"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "81209",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/81209"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "81210",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/81210"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "48850",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/48850"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "owncloud-multiple1-xss(75028)",
|
"name": "owncloud-multiple1-xss(75028)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2012-2486",
|
"ID": "CVE-2012-2486",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
|
"name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
|
||||||
"refsource": "CISCO",
|
"refsource": "CISCO",
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
|
"name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
|
"name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
|
||||||
"refsource": "CISCO",
|
"refsource": "CISCO",
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
|
"name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2012-2749",
|
"ID": "CVE-2012-2749",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,40 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=833737",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=833737"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201308-06",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2013:150",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2012:1462",
|
"name": "RHSA-2012:1462",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "53372",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/53372"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:0180",
|
"name": "RHSA-2013:0180",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "55120",
|
"name": "GLSA-201308-06",
|
||||||
"refsource" : "BID",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://www.securityfocus.com/bid/55120"
|
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=833737",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "51309",
|
"name": "51309",
|
||||||
@ -93,9 +83,19 @@
|
|||||||
"url": "http://secunia.com/advisories/51309"
|
"url": "http://secunia.com/advisories/51309"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "53372",
|
"name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/53372"
|
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2013:150",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "55120",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/55120"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2012-2791",
|
"ID": "CVE-2012-2791",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,46 +52,46 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2012/08/31/3"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
|
"name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
|
"url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://ffmpeg.org/security.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://ffmpeg.org/security.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0846719dd11ab3f7a7caee13e7af71f71d913389",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0846719dd11ab3f7a7caee13e7af71f71d913389"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://libav.org/releases/libav-0.7.7.changelog",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://libav.org/releases/libav-0.7.7.changelog"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://libav.org/releases/libav-0.8.5.changelog",
|
"name": "http://libav.org/releases/libav-0.8.5.changelog",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://libav.org/releases/libav-0.8.5.changelog"
|
"url": "http://libav.org/releases/libav-0.8.5.changelog"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "USN-1705-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1705-1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "55355",
|
"name": "55355",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/55355"
|
"url": "http://www.securityfocus.com/bid/55355"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://ffmpeg.org/security.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://ffmpeg.org/security.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://libav.org/releases/libav-0.7.7.changelog",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://libav.org/releases/libav-0.7.7.changelog"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0846719dd11ab3f7a7caee13e7af71f71d913389",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0846719dd11ab3f7a7caee13e7af71f71d913389"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-1705-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-1705-1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "50468",
|
"name": "50468",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2012-2825",
|
"ID": "CVE-2012-2825",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,26 +57,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://code.google.com/p/chromium/issues/detail?id=127417"
|
"url": "http://code.google.com/p/chromium/issues/detail?id=127417"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT5934",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT5934"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT6001",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT6001"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2013-09-18-2",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2013-10-22-8",
|
"name": "APPLE-SA-2013-10-22-8",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
@ -92,6 +72,16 @@
|
|||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html"
|
"url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT6001",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT6001"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2013:1656",
|
"name": "SUSE-SU-2013:1656",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
@ -101,6 +91,16 @@
|
|||||||
"name": "54886",
|
"name": "54886",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/54886"
|
"url": "http://secunia.com/advisories/54886"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT5934",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT5934"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2013-09-18-2",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[Xen-announce] 20120905 Xen Security Advisory 15 (CVE-2012-3497) - multiple TMEM hypercall vulnerabilities",
|
"name": "55082",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html"
|
"url": "http://secunia.com/advisories/55082"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20120905 Xen Security Advisory 15 (CVE-2012-3497) - multiple TMEM hypercall vulnerabilities",
|
"name": "1027482",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2012/09/05/8"
|
"url": "http://www.securitytracker.com/id?1027482"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities",
|
"name": "http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities",
|
||||||
@ -72,25 +72,30 @@
|
|||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "GLSA-201604-03",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201604-03"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "55410",
|
"name": "55410",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/55410"
|
"url": "http://www.securityfocus.com/bid/55410"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20120905 Xen Security Advisory 15 (CVE-2012-3497) - multiple TMEM hypercall vulnerabilities",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2012/09/05/8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "xen-tmem-priv-esc(78268)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78268"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "85199",
|
"name": "85199",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/85199"
|
"url": "http://osvdb.org/85199"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1027482",
|
"name": "[Xen-announce] 20120905 Xen Security Advisory 15 (CVE-2012-3497) - multiple TMEM hypercall vulnerabilities",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.securitytracker.com/id?1027482"
|
"url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "50472",
|
"name": "50472",
|
||||||
@ -98,14 +103,9 @@
|
|||||||
"url": "http://secunia.com/advisories/50472"
|
"url": "http://secunia.com/advisories/50472"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "55082",
|
"name": "GLSA-201604-03",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://secunia.com/advisories/55082"
|
"url": "https://security.gentoo.org/glsa/201604-03"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "xen-tmem-priv-esc(78268)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/78268"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20150122 CVE-2015-1178-xss-x-cart-ecommerce",
|
"name": "72275",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/534529/100/0/threaded"
|
"url": "http://www.securityfocus.com/bid/72275"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/130061/X-CART-e-Commerce-5.1.8-Cross-Site-Scripting.html",
|
"name": "http://packetstormsecurity.com/files/130061/X-CART-e-Commerce-5.1.8-Cross-Site-Scripting.html",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://packetstormsecurity.com/files/130061/X-CART-e-Commerce-5.1.8-Cross-Site-Scripting.html"
|
"url": "http://packetstormsecurity.com/files/130061/X-CART-e-Commerce-5.1.8-Cross-Site-Scripting.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "72275",
|
"name": "20150122 CVE-2015-1178-xss-x-cart-ecommerce",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/72275"
|
"url": "http://www.securityfocus.com/archive/1/534529/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2015-1704",
|
"ID": "CVE-2015-1704",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "MS15-043",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "74521",
|
"name": "74521",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "1032282",
|
"name": "1032282",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1032282"
|
"url": "http://www.securitytracker.com/id/1032282"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS15-043",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "hp-security-alert@hp.com",
|
||||||
"ID": "CVE-2015-5426",
|
"ID": "CVE-2015-5426",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-408",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-408"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04692147",
|
"name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04692147",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "1033561",
|
"name": "1033561",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1033561"
|
"url": "http://www.securitytracker.com/id/1033561"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-408",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-408"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-5942",
|
"ID": "CVE-2015-5942",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,34 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/HT205370",
|
"name": "APPLE-SA-2015-10-21-4",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "APPLE",
|
||||||
"url" : "https://support.apple.com/HT205370"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205375",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205375"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205378",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205378"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2015-10-21-1",
|
"name": "APPLE-SA-2015-10-21-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205375",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205375"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2015-10-21-2",
|
"name": "APPLE-SA-2015-10-21-2",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00003.html"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00003.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2015-10-21-4",
|
"name": "https://support.apple.com/HT205370",
|
||||||
"refsource" : "APPLE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
|
"url": "https://support.apple.com/HT205370"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205378",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205378"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1033929",
|
"name": "1033929",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@suse.com",
|
||||||
"ID": "CVE-2015-5969",
|
"ID": "CVE-2015-5969",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.suse.com/957174",
|
"name": "openSUSE-SU-2016:0367",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "https://bugzilla.suse.com/957174"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2016:0296",
|
"name": "SUSE-SU-2016:0296",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
|
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2016:0367",
|
"name": "openSUSE-SU-2016:0379",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00050.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:0368",
|
"name": "openSUSE-SU-2016:0368",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2016:0379",
|
"name": "https://bugzilla.suse.com/957174",
|
||||||
"refsource" : "SUSE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00050.html"
|
"url": "https://bugzilla.suse.com/957174"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -60,6 +60,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://pivotal.io/security/cve-2018-11039",
|
"name": "https://pivotal.io/security/cve-2018-11039",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -69,11 +74,6 @@
|
|||||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "105598",
|
"name": "105598",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "1041891",
|
"name": "1041891",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1041891"
|
"url": "http://www.securitytracker.com/id/1041891"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[debian-lts-announce] 20180330 [SECURITY] [DLA 1332-1] libvncserver security update",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/03/msg00035.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.openwall.com/lists/oss-security/2018/02/18/1",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2018/02/18/1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/LibVNC/libvncserver/issues/218",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/LibVNC/libvncserver/issues/218"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-4221",
|
"name": "DSA-4221",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "https://www.debian.org/security/2018/dsa-4221"
|
"url": "https://www.debian.org/security/2018/dsa-4221"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2018:1055",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1055"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-3618-1",
|
"name": "USN-3618-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "https://usn.ubuntu.com/3618-1/"
|
"url": "https://usn.ubuntu.com/3618-1/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/LibVNC/libvncserver/issues/218",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/LibVNC/libvncserver/issues/218"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20180330 [SECURITY] [DLA 1332-1] libvncserver security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00035.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "103107",
|
"name": "103107",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/103107"
|
"url": "http://www.securityfocus.com/bid/103107"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.openwall.com/lists/oss-security/2018/02/18/1",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2018/02/18/1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2018:1055",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2018:1055"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://gist.github.com/anonymous/cfc3f3419804b22ee9e82ee8d16a661d",
|
"name": "https://github.com/VerSprite/research/blob/master/advisories/VS-2018-004.md",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://gist.github.com/anonymous/cfc3f3419804b22ee9e82ee8d16a661d"
|
"url": "https://github.com/VerSprite/research/blob/master/advisories/VS-2018-004.md"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/VerSprite/research/blob/eba22c8b506be6f7128ef5356281915d5667bfff/advisories/VS-2018-004.md",
|
"name": "https://github.com/VerSprite/research/blob/eba22c8b506be6f7128ef5356281915d5667bfff/advisories/VS-2018-004.md",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://github.com/VerSprite/research/blob/eba22c8b506be6f7128ef5356281915d5667bfff/advisories/VS-2018-004.md"
|
"url": "https://github.com/VerSprite/research/blob/eba22c8b506be6f7128ef5356281915d5667bfff/advisories/VS-2018-004.md"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/VerSprite/research/blob/master/advisories/VS-2018-004.md",
|
"name": "https://gist.github.com/anonymous/cfc3f3419804b22ee9e82ee8d16a661d",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://github.com/VerSprite/research/blob/master/advisories/VS-2018-004.md"
|
"url": "https://gist.github.com/anonymous/cfc3f3419804b22ee9e82ee8d16a661d"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://blog.npmjs.org/post/171169301000/v571",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://blog.npmjs.org/post/171169301000/v571"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/npm/npm/commit/74e149da6efe6ed89477faa81fef08eee7999ad0",
|
"name": "https://github.com/npm/npm/commit/74e149da6efe6ed89477faa81fef08eee7999ad0",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "https://github.com/npm/npm/issues/19883",
|
"name": "https://github.com/npm/npm/issues/19883",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/npm/npm/issues/19883"
|
"url": "https://github.com/npm/npm/issues/19883"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://blog.npmjs.org/post/171169301000/v571",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://blog.npmjs.org/post/171169301000/v571"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "Secure@Microsoft.com",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2018-8539",
|
"ID": "CVE-2018-8539",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -68,11 +68,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8539",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8539"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "105835",
|
"name": "105835",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -82,6 +77,11 @@
|
|||||||
"name": "1042112",
|
"name": "1042112",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1042112"
|
"url": "http://www.securitytracker.com/id/1042112"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8539",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8539"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user