mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
a5e47c4c66
commit
3a4049d859
@ -52,21 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://changelog.cpanel.net/?build=&showall=1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://changelog.cpanel.net/?build=&showall=1"
|
||||
},
|
||||
{
|
||||
"name": "http://forums.cpanel.net/showthread.php?t=58134",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://forums.cpanel.net/showthread.php?t=58134"
|
||||
},
|
||||
{
|
||||
"name" : "20163",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20163"
|
||||
},
|
||||
{
|
||||
"name": "1016913",
|
||||
"refsource": "SECTRACK",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "22072",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22072"
|
||||
},
|
||||
{
|
||||
"name": "http://changelog.cpanel.net/?build=&showall=1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://changelog.cpanel.net/?build=&showall=1"
|
||||
},
|
||||
{
|
||||
"name": "20163",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20163"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060922 Squiz MySource Matrix Unauthorised Proxy and Cross Site Scripting",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/446722/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.aushack.com/advisories/200607-mysourcematrix.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.aushack.com/advisories/200607-mysourcematrix.txt"
|
||||
},
|
||||
{
|
||||
"name" : "22060",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22060"
|
||||
"name": "20060922 Squiz MySource Matrix Unauthorised Proxy and Cross Site Scripting",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/446722/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1635",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1635"
|
||||
},
|
||||
{
|
||||
"name": "22060",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22060"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,44 +58,44 @@
|
||||
"url": "http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html"
|
||||
"name": "20588",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20588"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMA02133",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061201",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/449711/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "TA06-291A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-291A.html"
|
||||
},
|
||||
{
|
||||
"name" : "20588",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20588"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4065",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4065"
|
||||
},
|
||||
{
|
||||
"name": "22396",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22396"
|
||||
},
|
||||
{
|
||||
"name": "1017077",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017077"
|
||||
},
|
||||
{
|
||||
"name" : "22396",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22396"
|
||||
"name": "TA06-291A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA06-291A.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,14 +58,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/449467/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061103 Zwahlen Online Shop",
|
||||
"refsource" : "VIM",
|
||||
"url" : "http://attrition.org/pipermail/vim/2006-November/001106.html"
|
||||
},
|
||||
{
|
||||
"name" : "20682",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20682"
|
||||
"name": "zwahlen-article-xss(29753)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29753"
|
||||
},
|
||||
{
|
||||
"name": "1773",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://securityreason.com/securityalert/1773"
|
||||
},
|
||||
{
|
||||
"name" : "zwahlen-article-xss(29753)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29753"
|
||||
"name": "20682",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20682"
|
||||
},
|
||||
{
|
||||
"name": "20061103 Zwahlen Online Shop",
|
||||
"refsource": "VIM",
|
||||
"url": "http://attrition.org/pipermail/vim/2006-November/001106.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061027 TextPattern <=1.19 Remote File Inclusion Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/449907/100/0/threaded"
|
||||
"name": "1794",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1794"
|
||||
},
|
||||
{
|
||||
"name": "20769",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/20769"
|
||||
},
|
||||
{
|
||||
"name" : "1794",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1794"
|
||||
"name": "20061027 TextPattern <=1.19 Remote File Inclusion Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/449907/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,44 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061106 VulnDisco Pack for Metasploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/450728/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz"
|
||||
},
|
||||
{
|
||||
"name" : "http://gleg.net/vulndisco_meta.shtml",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://gleg.net/vulndisco_meta.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.rpath.com/browse/RPL-820",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.rpath.com/browse/RPL-820"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200611-25",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200611-25.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2006:208",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:208"
|
||||
},
|
||||
{
|
||||
"name" : "OpenPKG-SA-2006.033",
|
||||
"refsource" : "OPENPKG",
|
||||
"url" : "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html"
|
||||
"name": "23133",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23133"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2006:072",
|
||||
@ -98,59 +63,14 @@
|
||||
"url": "http://www.novell.com/linux/security/advisories/2006_72_openldap2.html"
|
||||
},
|
||||
{
|
||||
"name" : "2006-0066",
|
||||
"refsource" : "TRUSTIX",
|
||||
"url" : "http://www.trustix.org/errata/2006/0066/"
|
||||
"name": "http://gleg.net/vulndisco_meta.shtml",
|
||||
"refsource": "MISC",
|
||||
"url": "http://gleg.net/vulndisco_meta.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "USN-384-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-384-1"
|
||||
},
|
||||
{
|
||||
"name" : "20939",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20939"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4379",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4379"
|
||||
},
|
||||
{
|
||||
"name" : "1017166",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1017166"
|
||||
},
|
||||
{
|
||||
"name" : "22750",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22750"
|
||||
},
|
||||
{
|
||||
"name" : "22953",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22953"
|
||||
},
|
||||
{
|
||||
"name" : "22996",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22996"
|
||||
},
|
||||
{
|
||||
"name" : "23133",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23133"
|
||||
},
|
||||
{
|
||||
"name" : "23125",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23125"
|
||||
},
|
||||
{
|
||||
"name" : "23152",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23152"
|
||||
"name": "https://issues.rpath.com/browse/RPL-820",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-820"
|
||||
},
|
||||
{
|
||||
"name": "23170",
|
||||
@ -158,14 +78,94 @@
|
||||
"url": "http://secunia.com/advisories/23170"
|
||||
},
|
||||
{
|
||||
"name" : "1831",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1831"
|
||||
"name": "1017166",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017166"
|
||||
},
|
||||
{
|
||||
"name": "2006-0066",
|
||||
"refsource": "TRUSTIX",
|
||||
"url": "http://www.trustix.org/errata/2006/0066/"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:208",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:208"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4379",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4379"
|
||||
},
|
||||
{
|
||||
"name": "20939",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20939"
|
||||
},
|
||||
{
|
||||
"name": "USN-384-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-384-1"
|
||||
},
|
||||
{
|
||||
"name": "openldap-bind-dos(30076)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30076"
|
||||
},
|
||||
{
|
||||
"name": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740"
|
||||
},
|
||||
{
|
||||
"name": "23152",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23152"
|
||||
},
|
||||
{
|
||||
"name": "http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz",
|
||||
"refsource": "MISC",
|
||||
"url": "http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz"
|
||||
},
|
||||
{
|
||||
"name": "22996",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22996"
|
||||
},
|
||||
{
|
||||
"name": "OpenPKG-SA-2006.033",
|
||||
"refsource": "OPENPKG",
|
||||
"url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html"
|
||||
},
|
||||
{
|
||||
"name": "22953",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22953"
|
||||
},
|
||||
{
|
||||
"name": "23125",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23125"
|
||||
},
|
||||
{
|
||||
"name": "20061106 VulnDisco Pack for Metasploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/450728/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1831",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1831"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200611-25",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200611-25.xml"
|
||||
},
|
||||
{
|
||||
"name": "22750",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22750"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/465386/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.umich.edu/~umweb/software/cosign/cosign-vuln-2007-002.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.umich.edu/~umweb/software/cosign/cosign-vuln-2007-002.txt"
|
||||
"name": "24845",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24845"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1359",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1359"
|
||||
},
|
||||
{
|
||||
"name" : "24845",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24845"
|
||||
"name": "http://www.umich.edu/~umweb/software/cosign/cosign-vuln-2007-002.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.umich.edu/~umweb/software/cosign/cosign-vuln-2007-002.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070426 SineCMS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/466965/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "23682",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23682"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1559",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1559"
|
||||
},
|
||||
{
|
||||
"name": "34172",
|
||||
"refsource": "OSVDB",
|
||||
@ -77,15 +62,30 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25014"
|
||||
},
|
||||
{
|
||||
"name": "sinecms-result-xss(33919)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33919"
|
||||
},
|
||||
{
|
||||
"name": "23682",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23682"
|
||||
},
|
||||
{
|
||||
"name": "2649",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2649"
|
||||
},
|
||||
{
|
||||
"name" : "sinecms-result-xss(33919)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33919"
|
||||
"name": "20070426 SineCMS",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/466965/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1559",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1559"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "36452",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36452"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2316",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2316"
|
||||
},
|
||||
{
|
||||
"name": "http://docs.info.apple.com/article.html?artnum=306173",
|
||||
"refsource": "CONFIRM",
|
||||
@ -63,9 +73,9 @@
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2007/Jun/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#289988",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/289988"
|
||||
"name": "1018282",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018282"
|
||||
},
|
||||
{
|
||||
"name": "24599",
|
||||
@ -73,29 +83,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/24599"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2316",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2316"
|
||||
"name": "26287",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26287"
|
||||
},
|
||||
{
|
||||
"name": "VU#289988",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/289988"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2731",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2731"
|
||||
},
|
||||
{
|
||||
"name" : "36452",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36452"
|
||||
},
|
||||
{
|
||||
"name" : "1018282",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018282"
|
||||
},
|
||||
{
|
||||
"name" : "26287",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26287"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2007-2876",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,155 +52,155 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[linux-kernel] 20070608 Linux 2.6.20.13",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=linux-kernel&m=118128610219959&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "[linux-kernel] 20070608 Linux 2.6.21.4",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=linux-kernel&m=118128622431272&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1356",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2007/dsa-1356"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:171",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:196",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0488",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2007-0488.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0705",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0705.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:043",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:051",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_51_kernel.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:053",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_53_kernel.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-486-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-486-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-489-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-489-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-510-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-510-1"
|
||||
},
|
||||
{
|
||||
"name": "24376",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24376"
|
||||
},
|
||||
{
|
||||
"name" : "37112",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37112"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10116",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2105",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2105"
|
||||
},
|
||||
{
|
||||
"name" : "25838",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25838"
|
||||
},
|
||||
{
|
||||
"name" : "25961",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25961"
|
||||
},
|
||||
{
|
||||
"name" : "26133",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26133"
|
||||
},
|
||||
{
|
||||
"name" : "26139",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26139"
|
||||
},
|
||||
{
|
||||
"name" : "26289",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26289"
|
||||
},
|
||||
{
|
||||
"name" : "26450",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26450"
|
||||
},
|
||||
{
|
||||
"name" : "26760",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26760"
|
||||
},
|
||||
{
|
||||
"name" : "26620",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26620"
|
||||
},
|
||||
{
|
||||
"name" : "26664",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26664"
|
||||
},
|
||||
{
|
||||
"name": "27227",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27227"
|
||||
},
|
||||
{
|
||||
"name": "26664",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26664"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:051",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2105",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2105"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:053",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:043",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
|
||||
},
|
||||
{
|
||||
"name": "26289",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26289"
|
||||
},
|
||||
{
|
||||
"name": "25838",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25838"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:171",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"
|
||||
},
|
||||
{
|
||||
"name": "USN-510-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-510-1"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1356",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2007/dsa-1356"
|
||||
},
|
||||
{
|
||||
"name": "26760",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26760"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0705",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html"
|
||||
},
|
||||
{
|
||||
"name": "26620",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26620"
|
||||
},
|
||||
{
|
||||
"name": "USN-489-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-489-1"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:196",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"
|
||||
},
|
||||
{
|
||||
"name": "kernel-sctpnew-dos(34777)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34777"
|
||||
},
|
||||
{
|
||||
"name": "[linux-kernel] 20070608 Linux 2.6.21.4",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=linux-kernel&m=118128622431272&w=2"
|
||||
},
|
||||
{
|
||||
"name": "25961",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25961"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10116",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"
|
||||
},
|
||||
{
|
||||
"name": "USN-486-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-486-1"
|
||||
},
|
||||
{
|
||||
"name": "26450",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26450"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"
|
||||
},
|
||||
{
|
||||
"name": "37112",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37112"
|
||||
},
|
||||
{
|
||||
"name": "[linux-kernel] 20070608 Linux 2.6.20.13",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=linux-kernel&m=118128610219959&w=2"
|
||||
},
|
||||
{
|
||||
"name": "26139",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26139"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0488",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2007-0488.html"
|
||||
},
|
||||
{
|
||||
"name": "26133",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26133"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2007-6438",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,45 +53,75 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080103 rPSA-2008-0004-1 tshark wireshark",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/485792/100/0/threaded"
|
||||
"name": "wireshark-smb-dissector-dos(39178)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39178"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=199958",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=199958"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2007-03.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2007-03.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004"
|
||||
"name": "27777",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27777"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-1975",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-1975"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11785",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11785"
|
||||
},
|
||||
{
|
||||
"name": "29048",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29048"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2007-03.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2007-03.html"
|
||||
},
|
||||
{
|
||||
"name": "28564",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28564"
|
||||
},
|
||||
{
|
||||
"name": "20080103 rPSA-2008-0004-1 tshark wireshark",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/485792/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200712-23",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200712-23.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2008:001",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:001"
|
||||
"name": "28304",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28304"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14734",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14734"
|
||||
},
|
||||
{
|
||||
"name": "28325",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28325"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:1",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:1"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:001",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:001"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0058",
|
||||
"refsource": "REDHAT",
|
||||
@ -102,55 +132,25 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=199958",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=199958"
|
||||
},
|
||||
{
|
||||
"name": "27071",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27071"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11785",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11785"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:14734",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14734"
|
||||
},
|
||||
{
|
||||
"name": "28288",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28288"
|
||||
},
|
||||
{
|
||||
"name" : "27777",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27777"
|
||||
},
|
||||
{
|
||||
"name" : "28304",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28304"
|
||||
},
|
||||
{
|
||||
"name" : "28325",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28325"
|
||||
},
|
||||
{
|
||||
"name" : "28564",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28564"
|
||||
},
|
||||
{
|
||||
"name" : "29048",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29048"
|
||||
},
|
||||
{
|
||||
"name" : "wireshark-smb-dissector-dos(39178)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39178"
|
||||
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071217 ZDI-07-077: Trend Micro ServerProtect StRpcSrv.dll Insecure Method Exposure Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/485250/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-07-077.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-07-077.html"
|
||||
"name": "44318",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/44318"
|
||||
},
|
||||
{
|
||||
"name": "26912",
|
||||
@ -73,19 +63,29 @@
|
||||
"url": "http://www.securityfocus.com/bid/26912"
|
||||
},
|
||||
{
|
||||
"name" : "44318",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/44318"
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-077.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-07-077.html"
|
||||
},
|
||||
{
|
||||
"name" : "26523",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26523"
|
||||
"name": "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt"
|
||||
},
|
||||
{
|
||||
"name": "20071217 ZDI-07-077: Trend Micro ServerProtect StRpcSrv.dll Insecure Method Exposure Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/485250/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "3475",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3475"
|
||||
},
|
||||
{
|
||||
"name": "26523",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26523"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "woltlab-search-sql-injection(39174)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39174"
|
||||
},
|
||||
{
|
||||
"name": "20071220 Woltlab Burning Board 1.0.2 SQL-Injection Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/485408/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "26973",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26973"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-4300",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/4300"
|
||||
},
|
||||
{
|
||||
"name" : "39497",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/39497"
|
||||
},
|
||||
{
|
||||
"name": "28188",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28188"
|
||||
},
|
||||
{
|
||||
"name" : "woltlab-search-sql-injection(39174)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39174"
|
||||
"name": "26973",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26973"
|
||||
},
|
||||
{
|
||||
"name": "39497",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/39497"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2010-0570",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100303 Multiple Vulnerabilities in Cisco Digital Media Manager",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b923.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "38503",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/38503"
|
||||
},
|
||||
{
|
||||
"name": "1023671",
|
||||
"refsource": "SECTRACK",
|
||||
@ -73,14 +63,24 @@
|
||||
"url": "http://secunia.com/advisories/38800"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-0531",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/0531"
|
||||
"name": "20100303 Multiple Vulnerabilities in Cisco Digital Media Manager",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b923.shtml"
|
||||
},
|
||||
{
|
||||
"name": "38503",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38503"
|
||||
},
|
||||
{
|
||||
"name": "cisco-ddm-default-credentials(56634)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56634"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0531",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0531"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/11518"
|
||||
},
|
||||
{
|
||||
"name" : "38344",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/38344"
|
||||
},
|
||||
{
|
||||
"name": "jobboard-newsdesc-sql-injection(56453)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56453"
|
||||
},
|
||||
{
|
||||
"name": "38344",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38344"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "11722",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/11722"
|
||||
},
|
||||
{
|
||||
"name" : "38731",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/38731"
|
||||
"name": "adfreely-commoninc-file-include(56858)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56858"
|
||||
},
|
||||
{
|
||||
"name": "62926",
|
||||
@ -73,9 +68,9 @@
|
||||
"url": "http://secunia.com/advisories/38947"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-0611",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/0611"
|
||||
"name": "11722",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/11722"
|
||||
},
|
||||
{
|
||||
"name": "adboardscript-common-file-include(56865)",
|
||||
@ -83,9 +78,14 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56865"
|
||||
},
|
||||
{
|
||||
"name" : "adfreely-commoninc-file-include(56858)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56858"
|
||||
"name": "38731",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38731"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0611",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0611"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2010-1700",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,29 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "11816",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/11816"
|
||||
},
|
||||
{
|
||||
"name" : "http://4004securityproject.wordpress.com/2010/03/20/pay-per-watch-bid-auktions-system-blind-sql-injection-auktion-php-id_auk/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://4004securityproject.wordpress.com/2010/03/20/pay-per-watch-bid-auktions-system-blind-sql-injection-auktion-php-id_auk/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/1003-exploits/ppwb-sql.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/1003-exploits/ppwb-sql.txt"
|
||||
},
|
||||
{
|
||||
"name" : "38878",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/38878"
|
||||
},
|
||||
{
|
||||
"name" : "63131",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/63131"
|
||||
"name": "ADV-2010-0670",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0670"
|
||||
},
|
||||
{
|
||||
"name": "39059",
|
||||
@ -83,9 +63,29 @@
|
||||
"url": "http://secunia.com/advisories/39059"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-0670",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/0670"
|
||||
"name": "http://packetstormsecurity.org/1003-exploits/ppwb-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/1003-exploits/ppwb-sql.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://4004securityproject.wordpress.com/2010/03/20/pay-per-watch-bid-auktions-system-blind-sql-injection-auktion-php-id_auk/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://4004securityproject.wordpress.com/2010/03/20/pay-per-watch-bid-auktions-system-blind-sql-injection-auktion-php-id_auk/"
|
||||
},
|
||||
{
|
||||
"name": "63131",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/63131"
|
||||
},
|
||||
{
|
||||
"name": "38878",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38878"
|
||||
},
|
||||
{
|
||||
"name": "11816",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/11816"
|
||||
},
|
||||
{
|
||||
"name": "payperwatch-auktion-sql-injection(57055)",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2010-1970",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBMA02553",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02282388"
|
||||
"name": "ADV-2010-1792",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1792"
|
||||
},
|
||||
{
|
||||
"name": "SSRT100184",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://secunia.com/advisories/40553"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1792",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1792"
|
||||
"name": "HPSBMA02553",
|
||||
"refsource": "HP",
|
||||
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02282388"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2010-4431",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
|
||||
"name": "ADV-2011-0158",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0158"
|
||||
},
|
||||
{
|
||||
"name" : "45898",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/45898"
|
||||
"name": "sun-java-system-proxy-info-disclosure(64816)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64816"
|
||||
},
|
||||
{
|
||||
"name": "70565",
|
||||
@ -73,14 +73,14 @@
|
||||
"url": "http://secunia.com/advisories/42991"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0158",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0158"
|
||||
"name": "45898",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/45898"
|
||||
},
|
||||
{
|
||||
"name" : "sun-java-system-proxy-info-disclosure(64816)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64816"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10611",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10611"
|
||||
"name": "juniper-junos-srx-cve20140618-dos(90238)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90238"
|
||||
},
|
||||
{
|
||||
"name": "1029584",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029584"
|
||||
},
|
||||
{
|
||||
"name": "64769",
|
||||
@ -68,14 +73,9 @@
|
||||
"url": "http://osvdb.org/101864"
|
||||
},
|
||||
{
|
||||
"name" : "1029584",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1029584"
|
||||
},
|
||||
{
|
||||
"name" : "juniper-junos-srx-cve20140618-dos(90238)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90238"
|
||||
"name": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10611",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10611"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2014-1533",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-48.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-48.html"
|
||||
"name": "59229",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59229"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0819",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1009952",
|
||||
@ -63,15 +68,110 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1009952"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1011007",
|
||||
"name": "RHSA-2014:0741",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0741.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0824",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name": "59387",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59387"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-48.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1011007"
|
||||
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-48.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=991981",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=991981"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=921622",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=921622"
|
||||
},
|
||||
{
|
||||
"name": "59150",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59150"
|
||||
},
|
||||
{
|
||||
"name": "1030388",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030388"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=988719",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=988719"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=999651",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=999651"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1011007",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1011007"
|
||||
},
|
||||
{
|
||||
"name": "59052",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59052"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0855",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0797",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"
|
||||
},
|
||||
{
|
||||
"name": "59169",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59169"
|
||||
},
|
||||
{
|
||||
"name": "59165",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59165"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201504-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name": "59866",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59866"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name": "http://linux.oracle.com/errata/ELSA-2014-0742.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://linux.oracle.com/errata/ELSA-2014-0742.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0858",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=967354",
|
||||
"refsource": "CONFIRM",
|
||||
@ -83,139 +183,9 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=978811"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=988719",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=988719"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=991981",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=991981"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=992274",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=992274"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=994907",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=994907"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=995679",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=995679"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=996715",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=996715"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=999651",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=999651"
|
||||
},
|
||||
{
|
||||
"name" : "http://linux.oracle.com/errata/ELSA-2014-0741.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://linux.oracle.com/errata/ELSA-2014-0741.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://linux.oracle.com/errata/ELSA-2014-0742.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://linux.oracle.com/errata/ELSA-2014-0742.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2955",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2955"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2960",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2960"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201504-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0741",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0741.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0742",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0742.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0855",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0858",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:0824",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0797",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0819",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2243-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2243-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2250-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2250-1"
|
||||
},
|
||||
{
|
||||
"name" : "67965",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/67965"
|
||||
},
|
||||
{
|
||||
"name" : "1030386",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030386"
|
||||
},
|
||||
{
|
||||
"name" : "1030388",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030388"
|
||||
},
|
||||
{
|
||||
"name" : "58984",
|
||||
"name": "59377",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/58984"
|
||||
},
|
||||
{
|
||||
"name" : "59052",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59052"
|
||||
"url": "http://secunia.com/advisories/59377"
|
||||
},
|
||||
{
|
||||
"name": "59149",
|
||||
@ -223,54 +193,79 @@
|
||||
"url": "http://secunia.com/advisories/59149"
|
||||
},
|
||||
{
|
||||
"name" : "59150",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59150"
|
||||
"name": "RHSA-2014:0742",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0742.html"
|
||||
},
|
||||
{
|
||||
"name" : "59165",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59165"
|
||||
"name": "USN-2243-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2243-1"
|
||||
},
|
||||
{
|
||||
"name" : "59169",
|
||||
"name": "DSA-2960",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2960"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2955",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2955"
|
||||
},
|
||||
{
|
||||
"name": "1030386",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030386"
|
||||
},
|
||||
{
|
||||
"name": "http://linux.oracle.com/errata/ELSA-2014-0741.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://linux.oracle.com/errata/ELSA-2014-0741.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=992274",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=992274"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=995679",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=995679"
|
||||
},
|
||||
{
|
||||
"name": "58984",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59169"
|
||||
"url": "http://secunia.com/advisories/58984"
|
||||
},
|
||||
{
|
||||
"name": "59170",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59170"
|
||||
},
|
||||
{
|
||||
"name": "59425",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59425"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=994907",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=994907"
|
||||
},
|
||||
{
|
||||
"name": "67965",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/67965"
|
||||
},
|
||||
{
|
||||
"name": "59171",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59171"
|
||||
},
|
||||
{
|
||||
"name" : "59229",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59229"
|
||||
},
|
||||
{
|
||||
"name" : "59275",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59275"
|
||||
},
|
||||
{
|
||||
"name" : "59866",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59866"
|
||||
},
|
||||
{
|
||||
"name" : "59377",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59377"
|
||||
},
|
||||
{
|
||||
"name" : "59387",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59387"
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=996715",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=996715"
|
||||
},
|
||||
{
|
||||
"name": "59328",
|
||||
@ -278,9 +273,14 @@
|
||||
"url": "http://secunia.com/advisories/59328"
|
||||
},
|
||||
{
|
||||
"name" : "59425",
|
||||
"name": "59275",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59425"
|
||||
"url": "http://secunia.com/advisories/59275"
|
||||
},
|
||||
{
|
||||
"name": "USN-2250-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2250-1"
|
||||
},
|
||||
{
|
||||
"name": "59486",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-1751",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/531050/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "https://buddypress.org/2014/02/buddypress-1-9-2/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://buddypress.org/2014/02/buddypress-1-9-2/"
|
||||
"name": "buddypress-cve20141889-sec-bypass(91261)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91261"
|
||||
},
|
||||
{
|
||||
"name": "65554",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/65554"
|
||||
},
|
||||
{
|
||||
"name" : "buddypress-cve20141889-sec-bypass(91261)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/91261"
|
||||
"name": "https://buddypress.org/2014/02/buddypress-1-9-2/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://buddypress.org/2014/02/buddypress-1-9-2/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-4103",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1030818",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030818"
|
||||
},
|
||||
{
|
||||
"name": "MS14-052",
|
||||
"refsource": "MS",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/69611"
|
||||
},
|
||||
{
|
||||
"name" : "1030818",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030818"
|
||||
},
|
||||
{
|
||||
"name": "ms-ie-cve20144103-code-exec(95533)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2014-4383",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,26 +57,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT6441"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT6442",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT6442"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2014-09-17-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2014-09-17-2",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
|
||||
},
|
||||
{
|
||||
"name" : "69882",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/69882"
|
||||
},
|
||||
{
|
||||
"name": "69941",
|
||||
"refsource": "BID",
|
||||
@ -91,6 +71,26 @@
|
||||
"name": "appleios-cve20144383-spoofing(96088)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96088"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT6442",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT6442"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-09-17-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
|
||||
},
|
||||
{
|
||||
"name": "69882",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/69882"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-09-17-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "34923",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/34923"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2014/08/13/4"
|
||||
"name": "69216",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/69216"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140812 CVE Request: ro bind mount bypass using user namespaces",
|
||||
@ -68,9 +63,24 @@
|
||||
"url": "http://seclists.org/oss-sec/2014/q3/352"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/128595/Linux-Kernel-3.16.1-FUSE-Privilege-Escalation.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/128595/Linux-Kernel-3.16.1-FUSE-Privilege-Escalation.html"
|
||||
"name": "https://github.com/torvalds/linux/commit/9566d6742852c527bf5af38af5cbb878dad75705",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/torvalds/linux/commit/9566d6742852c527bf5af38af5cbb878dad75705"
|
||||
},
|
||||
{
|
||||
"name": "USN-2318-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2318-1"
|
||||
},
|
||||
{
|
||||
"name": "110055",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/show/osvdb/110055"
|
||||
},
|
||||
{
|
||||
"name": "34923",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/34923"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9566d6742852c527bf5af38af5cbb878dad75705",
|
||||
@ -83,34 +93,24 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129662"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/9566d6742852c527bf5af38af5cbb878dad75705",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/torvalds/linux/commit/9566d6742852c527bf5af38af5cbb878dad75705"
|
||||
"name": "linux-kernel-cve20145207-sec-bypass(95266)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95266"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/128595/Linux-Kernel-3.16.1-FUSE-Privilege-Escalation.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/128595/Linux-Kernel-3.16.1-FUSE-Privilege-Escalation.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/08/13/4"
|
||||
},
|
||||
{
|
||||
"name": "USN-2317-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2317-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2318-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2318-1"
|
||||
},
|
||||
{
|
||||
"name" : "69216",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/69216"
|
||||
},
|
||||
{
|
||||
"name" : "110055",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/show/osvdb/110055"
|
||||
},
|
||||
{
|
||||
"name" : "linux-kernel-cve20145207-sec-bypass(95266)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95266"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=434964",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=434964"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=449894",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=449894"
|
||||
},
|
||||
{
|
||||
"name": "https://codereview.chromium.org/741993002",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://codereview.chromium.org/741993002"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201502-13",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=449894",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=449894"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2016-3092",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,89 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[dev] 20160621 CVE-2016-3092: Apache Commons Fileupload information disclosure vulnerability",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1743480",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1743480"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1743722",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1743722"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1743738",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1743738"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1743742",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1743742"
|
||||
},
|
||||
{
|
||||
"name" : "http://tomcat.apache.org/security-7.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tomcat.apache.org/security-7.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://tomcat.apache.org/security-8.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tomcat.apache.org/security-8.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://tomcat.apache.org/security-9.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tomcat.apache.org/security-9.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1349468",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1349468"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
||||
"name": "JVNDB-2016-000121",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20190212-0001/",
|
||||
@ -143,19 +63,19 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190212-0001/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3611",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3611"
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3614",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3614"
|
||||
"name": "http://svn.apache.org/viewvc?view=revision&revision=1743480",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.apache.org/viewvc?view=revision&revision=1743480"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3609",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3609"
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201705-09",
|
||||
@ -163,69 +83,19 @@
|
||||
"url": "https://security.gentoo.org/glsa/201705-09"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2068",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2068.html"
|
||||
"name": "http://svn.apache.org/viewvc?view=revision&revision=1743738",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.apache.org/viewvc?view=revision&revision=1743738"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2069",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2069.html"
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2070",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2070.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2071",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2071.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2072",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2072.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2599",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2599.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2807",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2807.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2808",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2808.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:0455",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:0455"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:0456",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:0456"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:0457",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0457.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:2252",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3027-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-3027-1"
|
||||
"name": "http://tomcat.apache.org/security-9.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tomcat.apache.org/security-9.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-3024-1",
|
||||
@ -233,39 +103,169 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-3024-1"
|
||||
},
|
||||
{
|
||||
"name" : "JVN#89379547",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/en/jp/JVN89379547/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2016-000121",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121"
|
||||
},
|
||||
{
|
||||
"name" : "91453",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/91453"
|
||||
"name": "RHSA-2016:2069",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2069.html"
|
||||
},
|
||||
{
|
||||
"name": "1037029",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037029"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2068",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2068.html"
|
||||
},
|
||||
{
|
||||
"name": "http://tomcat.apache.org/security-7.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tomcat.apache.org/security-7.html"
|
||||
},
|
||||
{
|
||||
"name": "1036900",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036900"
|
||||
},
|
||||
{
|
||||
"name": "91453",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91453"
|
||||
},
|
||||
{
|
||||
"name": "http://tomcat.apache.org/security-8.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tomcat.apache.org/security-8.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2072",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2072.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.apache.org/viewvc?view=revision&revision=1743722",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.apache.org/viewvc?view=revision&revision=1743722"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3611",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3611"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2807",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2807.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:2252",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name": "JVN#89379547",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN89379547/index.html"
|
||||
},
|
||||
{
|
||||
"name": "1036427",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036427"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2070",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2070.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:0457",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2808",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2808.html"
|
||||
},
|
||||
{
|
||||
"name": "1039606",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039606"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.apache.org/viewvc?view=revision&revision=1743742",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.apache.org/viewvc?view=revision&revision=1743742"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2599",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2599.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3609",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3609"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:0455",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:0455"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3614",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3614"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
},
|
||||
{
|
||||
"name": "[dev] 20160621 CVE-2016-3092: Apache Commons Fileupload information disclosure vulnerability",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:0456",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:0456"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349468",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349468"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2071",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2071.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-3027-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3027-1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2016-3100",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.kde.com/announcements/kde-frameworks-5.23.0.php",
|
||||
"name": "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=dece8fd89979cd1a86c03bcaceef6e9221e8d8cd",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www.kde.com/announcements/kde-frameworks-5.23.0.php"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.kde.org/show_bug.cgi?id=358593",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.kde.org/show_bug.cgi?id=358593"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.kde.org/show_bug.cgi?id=363140",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.kde.org/show_bug.cgi?id=363140"
|
||||
"url": "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=dece8fd89979cd1a86c03bcaceef6e9221e8d8cd"
|
||||
},
|
||||
{
|
||||
"name": "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=72f3702dbe6cf15c06dc13da2c99c864e9022a58",
|
||||
@ -73,14 +63,9 @@
|
||||
"url": "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=72f3702dbe6cf15c06dc13da2c99c864e9022a58"
|
||||
},
|
||||
{
|
||||
"name" : "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=dece8fd89979cd1a86c03bcaceef6e9221e8d8cd",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=dece8fd89979cd1a86c03bcaceef6e9221e8d8cd"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.kde.org/info/security/advisory-20160621-1.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.kde.org/info/security/advisory-20160621-1.txt"
|
||||
"name": "91769",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91769"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1723",
|
||||
@ -88,9 +73,24 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "91769",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/91769"
|
||||
"name": "https://bugs.kde.org/show_bug.cgi?id=358593",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.kde.org/show_bug.cgi?id=358593"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kde.com/announcements/kde-frameworks-5.23.0.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kde.com/announcements/kde-frameworks-5.23.0.php"
|
||||
},
|
||||
{
|
||||
"name": "https://www.kde.org/info/security/advisory-20160621-1.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.kde.org/info/security/advisory-20160621-1.txt"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.kde.org/show_bug.cgi?id=363140",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.kde.org/show_bug.cgi?id=363140"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-3853",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-7017",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1036986",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036986"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "93496",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93496"
|
||||
},
|
||||
{
|
||||
"name" : "1036986",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036986"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201701-17",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201701-17"
|
||||
"name": "SUSE-SU-2016:3148",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
|
||||
},
|
||||
{
|
||||
"name": "MS16-154",
|
||||
@ -68,19 +63,9 @@
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2947",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:3148",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:3160",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
|
||||
"name": "GLSA-201701-17",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-17"
|
||||
},
|
||||
{
|
||||
"name": "94873",
|
||||
@ -91,6 +76,21 @@
|
||||
"name": "1037442",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037442"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2947",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:3160",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-8069",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.talosintelligence.com/reports/TALOS-2016-0210/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.talosintelligence.com/reports/TALOS-2016-0210/"
|
||||
},
|
||||
{
|
||||
"name": "96472",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96472"
|
||||
},
|
||||
{
|
||||
"name": "http://www.talosintelligence.com/reports/TALOS-2016-0210/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0210/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-9611",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-9769",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -61,25 +61,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "106619",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106619"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://security.netapp.com/advisory/ntap-20190118-0002/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20190118-0002/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3867-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3867-1/"
|
||||
},
|
||||
{
|
||||
"name" : "106619",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/106619"
|
||||
"name": "https://security.netapp.com/advisory/ntap-20190118-0002/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -85,15 +85,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
||||
},
|
||||
{
|
||||
"name": "106620",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106620"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user