mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
aae41c1f0d
commit
41b6c772b3
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1927",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1927"
|
||||
},
|
||||
{
|
||||
"name": "19981226 bnc exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "bnc-proxy-bo(1546)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1546"
|
||||
},
|
||||
{
|
||||
"name" : "1927",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/1927"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "CA-1991-11",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.cert.org/advisories/CA-1991-11.html"
|
||||
},
|
||||
{
|
||||
"name" : "B-36",
|
||||
"refsource" : "CIAC",
|
||||
"url" : "http://ciac.llnl.gov/ciac/bulletins/b-36.shtml"
|
||||
},
|
||||
{
|
||||
"name": "26",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "ultrix-telnet(584)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/584"
|
||||
},
|
||||
{
|
||||
"name": "CA-1991-11",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.cert.org/advisories/CA-1991-11.html"
|
||||
},
|
||||
{
|
||||
"name": "B-36",
|
||||
"refsource": "CIAC",
|
||||
"url": "http://ciac.llnl.gov/ciac/bulletins/b-36.shtml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "Q163875",
|
||||
"refsource" : "MSKB",
|
||||
"url" : "http://support.microsoft.com/support/kb/articles/q163/8/75.asp"
|
||||
},
|
||||
{
|
||||
"name": "nt-group-policy-longname(7401)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/7401.php"
|
||||
},
|
||||
{
|
||||
"name": "Q163875",
|
||||
"refsource": "MSKB",
|
||||
"url": "http://support.microsoft.com/support/kb/articles/q163/8/75.asp"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "19991223 FYI, SCO Security patches available.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=94606167110764&w=2"
|
||||
"name": "6310",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/6310"
|
||||
},
|
||||
{
|
||||
"name": "876",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/876"
|
||||
},
|
||||
{
|
||||
"name" : "6310",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/6310"
|
||||
"name": "19991223 FYI, SCO Security patches available.",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=94606167110764&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20000821 [HackersLab bugpaper] HP-UX net.init rc script",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-08/0261.html"
|
||||
"name": "hp-netinit-symlink(5131)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5131"
|
||||
},
|
||||
{
|
||||
"name": "1602",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/1602"
|
||||
},
|
||||
{
|
||||
"name" : "hp-netinit-symlink(5131)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5131"
|
||||
"name": "20000821 [HackersLab bugpaper] HP-UX net.init rc script",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0261.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20000815 OS/2 Warp 4.5 FTP Server DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-08/0166.html"
|
||||
},
|
||||
{
|
||||
"name": "ftp://ftp.software.ibm.com/ps/products/tcpip/fixes/v4.3os2/ic27721/README",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1582",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1582"
|
||||
},
|
||||
{
|
||||
"name": "20000815 OS/2 Warp 4.5 FTP Server DoS",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0166.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20000926 ld.so bug - LD_DEBUG_OUTPUT follows symlinks",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/85028"
|
||||
},
|
||||
{
|
||||
"name": "1719",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "glibc-unset-symlink(5299)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5299"
|
||||
},
|
||||
{
|
||||
"name": "20000926 ld.so bug - LD_DEBUG_OUTPUT follows symlinks",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/85028"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20001020 [ Hackerslab bug_paper ] Linux ORACLE 8.1.5 vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-10/0294.html"
|
||||
},
|
||||
{
|
||||
"name": "oracle-home-bo(5390)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5390"
|
||||
},
|
||||
{
|
||||
"name": "20001020 [ Hackerslab bug_paper ] Linux ORACLE 8.1.5 vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0294.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS00-088",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-088"
|
||||
},
|
||||
{
|
||||
"name": "1958",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "ms-exchange-username-pwd(5537)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5537"
|
||||
},
|
||||
{
|
||||
"name": "MS00-088",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-088"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "VU#17566",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/17566"
|
||||
},
|
||||
{
|
||||
"name": "aix-sysback-elevate-privileges(6432)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6432"
|
||||
},
|
||||
{
|
||||
"name": "VU#17566",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/17566"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "101768",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101768-1"
|
||||
},
|
||||
{
|
||||
"name" : "13968",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/13968"
|
||||
},
|
||||
{
|
||||
"name": "1014218",
|
||||
"refsource": "SECTRACK",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "15723",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15723"
|
||||
},
|
||||
{
|
||||
"name": "101768",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101768-1"
|
||||
},
|
||||
{
|
||||
"name": "13968",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13968"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "20032",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/20032"
|
||||
},
|
||||
{
|
||||
"name": "http://lostmon.blogspot.com/2005/10/comersus-backoffice-plus-cross-site.html",
|
||||
"refsource": "MISC",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15118"
|
||||
},
|
||||
{
|
||||
"name" : "20032",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/20032"
|
||||
},
|
||||
{
|
||||
"name": "1015064",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/20250"
|
||||
},
|
||||
{
|
||||
"name" : "20251",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/20251"
|
||||
},
|
||||
{
|
||||
"name": "20252",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/20252"
|
||||
},
|
||||
{
|
||||
"name": "20251",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/20251"
|
||||
},
|
||||
{
|
||||
"name": "1015088",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.thebillygoatcurse.com/advisories/eyeOS_0.8.4_Multiple.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.thebillygoatcurse.com/advisories/eyeOS_0.8.4_Multiple.pdf"
|
||||
"name": "eyeos-usrinfo-information-disclosure(22938)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22938"
|
||||
},
|
||||
{
|
||||
"name": "15256",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/15256"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-2259",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/2259"
|
||||
"name": "http://www.thebillygoatcurse.com/advisories/eyeOS_0.8.4_Multiple.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.thebillygoatcurse.com/advisories/eyeOS_0.8.4_Multiple.pdf"
|
||||
},
|
||||
{
|
||||
"name": "20411",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://secunia.com/advisories/17105"
|
||||
},
|
||||
{
|
||||
"name" : "eyeos-usrinfo-information-disclosure(22938)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22938"
|
||||
"name": "ADV-2005-2259",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2259"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://rgod.altervista.org/cute141.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://rgod.altervista.org/cute141.html"
|
||||
},
|
||||
{
|
||||
"name" : "15295",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/15295"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-2296",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/2296"
|
||||
},
|
||||
{
|
||||
"name" : "20472",
|
||||
"name": "20474",
|
||||
"refsource": "OSVDB",
|
||||
"url" : "http://www.osvdb.org/20472"
|
||||
"url": "http://www.osvdb.org/20474"
|
||||
},
|
||||
{
|
||||
"name": "20473",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/20473"
|
||||
},
|
||||
{
|
||||
"name" : "20474",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/20474"
|
||||
},
|
||||
{
|
||||
"name": "17435",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17435"
|
||||
},
|
||||
{
|
||||
"name": "20472",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/20472"
|
||||
},
|
||||
{
|
||||
"name": "http://rgod.altervista.org/cute141.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://rgod.altervista.org/cute141.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-2296",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2296"
|
||||
},
|
||||
{
|
||||
"name": "15295",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15295"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2005-3624",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "16143",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16143"
|
||||
},
|
||||
{
|
||||
"name": "DSA-932",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2005/dsa-932"
|
||||
},
|
||||
{
|
||||
"name": "18349",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18349"
|
||||
},
|
||||
{
|
||||
"name": "18147",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18147"
|
||||
},
|
||||
{
|
||||
"name": "SCOSA-2006.15",
|
||||
"refsource": "SCO",
|
||||
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://scary.beasts.org/security/CESA-2005-003.txt",
|
||||
"refsource": "MISC",
|
||||
@ -62,85 +87,50 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kde.org/info/security/advisory-20051207-2.txt"
|
||||
},
|
||||
{
|
||||
"name": "18679",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18679"
|
||||
},
|
||||
{
|
||||
"name": "18312",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18312"
|
||||
},
|
||||
{
|
||||
"name": "18644",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18644"
|
||||
},
|
||||
{
|
||||
"name": "USN-236-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/236-1/"
|
||||
},
|
||||
{
|
||||
"name": "18425",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18425"
|
||||
},
|
||||
{
|
||||
"name": "18373",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18373"
|
||||
},
|
||||
{
|
||||
"name": "18303",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18303"
|
||||
},
|
||||
{
|
||||
"name": "DSA-931",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2005/dsa-931"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-932",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2005/dsa-932"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-937",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2005/dsa-937"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-938",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2005/dsa-938"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-940",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2005/dsa-940"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-936",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-936"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-950",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-950"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-961",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-961"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-962",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-962"
|
||||
},
|
||||
{
|
||||
"name" : "FLSA:175404",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/427990/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2005-025",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2005-026",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name" : "FLSA-2006:176751",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/427053/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200601-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200601-17",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2006:010",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"
|
||||
"name": "18554",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18554"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:003",
|
||||
@ -148,24 +138,14 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2006:004",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"
|
||||
"name": "19230",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19230"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2006:005",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2006:006",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2006:008",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"
|
||||
"name": "102972",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:012",
|
||||
@ -173,19 +153,9 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2006:011",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2006:0177",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2006-0177.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2006:0160",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0160.html"
|
||||
"name": "DSA-962",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-962"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2006:0163",
|
||||
@ -193,9 +163,69 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html"
|
||||
},
|
||||
{
|
||||
"name" : "SCOSA-2006.15",
|
||||
"refsource" : "SCO",
|
||||
"url" : "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"
|
||||
"name": "DSA-937",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2005/dsa-937"
|
||||
},
|
||||
{
|
||||
"name": "18398",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18398"
|
||||
},
|
||||
{
|
||||
"name": "FLSA-2006:176751",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "2006-0002",
|
||||
"refsource": "TRUSTIX",
|
||||
"url": "http://www.trustix.org/errata/2006/0002/"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2006:001",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-936",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-936"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2005-026",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name": "18329",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18329"
|
||||
},
|
||||
{
|
||||
"name": "18463",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18463"
|
||||
},
|
||||
{
|
||||
"name": "18642",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18642"
|
||||
},
|
||||
{
|
||||
"name": "18674",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18674"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:005",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"
|
||||
},
|
||||
{
|
||||
"name": "18313",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18313"
|
||||
},
|
||||
{
|
||||
"name": "20051201-01-U",
|
||||
@ -207,260 +237,230 @@
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"
|
||||
},
|
||||
{
|
||||
"name" : "20060201-01-U",
|
||||
"refsource" : "SGI",
|
||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"
|
||||
},
|
||||
{
|
||||
"name" : "SSA:2006-045-04",
|
||||
"refsource" : "SLACKWARE",
|
||||
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"
|
||||
},
|
||||
{
|
||||
"name" : "SSA:2006-045-09",
|
||||
"refsource" : "SLACKWARE",
|
||||
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"
|
||||
},
|
||||
{
|
||||
"name" : "102972",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2006:001",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"
|
||||
},
|
||||
{
|
||||
"name" : "2006-0002",
|
||||
"refsource" : "TRUSTIX",
|
||||
"url" : "http://www.trustix.org/errata/2006/0002/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-236-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/236-1/"
|
||||
},
|
||||
{
|
||||
"name" : "16143",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16143"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:9437",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0047",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0047"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2280",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2280"
|
||||
},
|
||||
{
|
||||
"name" : "18303",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18303"
|
||||
},
|
||||
{
|
||||
"name" : "18312",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18312"
|
||||
},
|
||||
{
|
||||
"name" : "18313",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18313"
|
||||
},
|
||||
{
|
||||
"name" : "18329",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18329"
|
||||
},
|
||||
{
|
||||
"name" : "18332",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18332"
|
||||
},
|
||||
{
|
||||
"name" : "18334",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18334"
|
||||
},
|
||||
{
|
||||
"name" : "18387",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18387"
|
||||
},
|
||||
{
|
||||
"name" : "18416",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18416"
|
||||
},
|
||||
{
|
||||
"name" : "18338",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18338"
|
||||
},
|
||||
{
|
||||
"name" : "18349",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18349"
|
||||
},
|
||||
{
|
||||
"name" : "18375",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18375"
|
||||
},
|
||||
{
|
||||
"name" : "18385",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18385"
|
||||
},
|
||||
{
|
||||
"name" : "18389",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18389"
|
||||
},
|
||||
{
|
||||
"name" : "18423",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18423"
|
||||
},
|
||||
{
|
||||
"name": "18448",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18448"
|
||||
},
|
||||
{
|
||||
"name" : "18398",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18398"
|
||||
},
|
||||
{
|
||||
"name" : "18407",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18407"
|
||||
},
|
||||
{
|
||||
"name" : "18534",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18534"
|
||||
},
|
||||
{
|
||||
"name" : "18582",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18582"
|
||||
},
|
||||
{
|
||||
"name" : "18517",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18517"
|
||||
},
|
||||
{
|
||||
"name" : "18554",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18554"
|
||||
},
|
||||
{
|
||||
"name" : "18642",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18642"
|
||||
},
|
||||
{
|
||||
"name" : "18644",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18644"
|
||||
},
|
||||
{
|
||||
"name" : "18674",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18674"
|
||||
},
|
||||
{
|
||||
"name" : "18675",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18675"
|
||||
},
|
||||
{
|
||||
"name" : "18679",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18679"
|
||||
},
|
||||
{
|
||||
"name" : "18908",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18908"
|
||||
},
|
||||
{
|
||||
"name" : "18913",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18913"
|
||||
},
|
||||
{
|
||||
"name" : "19230",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19230"
|
||||
},
|
||||
{
|
||||
"name" : "19377",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19377"
|
||||
},
|
||||
{
|
||||
"name" : "18425",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18425"
|
||||
},
|
||||
{
|
||||
"name" : "18463",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18463"
|
||||
},
|
||||
{
|
||||
"name" : "18147",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18147"
|
||||
},
|
||||
{
|
||||
"name" : "18373",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18373"
|
||||
},
|
||||
{
|
||||
"name" : "18380",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18380"
|
||||
},
|
||||
{
|
||||
"name" : "18414",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18414"
|
||||
},
|
||||
{
|
||||
"name" : "18428",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18428"
|
||||
},
|
||||
{
|
||||
"name": "18436",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18436"
|
||||
},
|
||||
{
|
||||
"name": "18428",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18428"
|
||||
},
|
||||
{
|
||||
"name": "18380",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18380"
|
||||
},
|
||||
{
|
||||
"name": "18423",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18423"
|
||||
},
|
||||
{
|
||||
"name": "18416",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18416"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2006:0177",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2280",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2280"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200601-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"
|
||||
},
|
||||
{
|
||||
"name": "18407",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18407"
|
||||
},
|
||||
{
|
||||
"name": "18332",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18332"
|
||||
},
|
||||
{
|
||||
"name": "18517",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18517"
|
||||
},
|
||||
{
|
||||
"name": "18582",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18582"
|
||||
},
|
||||
{
|
||||
"name": "18534",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18534"
|
||||
},
|
||||
{
|
||||
"name": "SSA:2006-045-09",
|
||||
"refsource": "SLACKWARE",
|
||||
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"
|
||||
},
|
||||
{
|
||||
"name": "18908",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18908"
|
||||
},
|
||||
{
|
||||
"name": "25729",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25729"
|
||||
},
|
||||
{
|
||||
"name": "18414",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18414"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:006",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"
|
||||
},
|
||||
{
|
||||
"name": "18338",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18338"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:008",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"
|
||||
},
|
||||
{
|
||||
"name": "20060201-01-U",
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2006:0160",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:010",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"
|
||||
},
|
||||
{
|
||||
"name": "DSA-940",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2005/dsa-940"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:004",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0047",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0047"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200601-17",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml"
|
||||
},
|
||||
{
|
||||
"name": "xpdf-ccitt-faxstream-bo(24022)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022"
|
||||
},
|
||||
{
|
||||
"name": "18389",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18389"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9437",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437"
|
||||
},
|
||||
{
|
||||
"name": "SSA:2006-045-04",
|
||||
"refsource": "SLACKWARE",
|
||||
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"
|
||||
},
|
||||
{
|
||||
"name": "19377",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19377"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2005-025",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html"
|
||||
},
|
||||
{
|
||||
"name": "FLSA:175404",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "DSA-961",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-961"
|
||||
},
|
||||
{
|
||||
"name": "18675",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18675"
|
||||
},
|
||||
{
|
||||
"name": "18913",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18913"
|
||||
},
|
||||
{
|
||||
"name": "DSA-938",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2005/dsa-938"
|
||||
},
|
||||
{
|
||||
"name": "18334",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18334"
|
||||
},
|
||||
{
|
||||
"name": "18375",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18375"
|
||||
},
|
||||
{
|
||||
"name": "DSA-950",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-950"
|
||||
},
|
||||
{
|
||||
"name": "18387",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18387"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:011",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"
|
||||
},
|
||||
{
|
||||
"name": "18385",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18385"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20051208 PGP Wipe Free Space, Lyris ListManager Flaws, Windows Timestamps, Sam Juicer",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0349.html"
|
||||
"name": "21550",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21550"
|
||||
},
|
||||
{
|
||||
"name": "20051209 PGP Wipe Free Space, Lyris ListManager Flaws, Windows Timestamps, Sam Juicer",
|
||||
@ -67,20 +67,20 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://metasploit.com/research/vulns/lyris_listmanager/"
|
||||
},
|
||||
{
|
||||
"name" : "15788",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/15788"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-2820",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2820"
|
||||
},
|
||||
{
|
||||
"name" : "21550",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/21550"
|
||||
"name": "20051208 PGP Wipe Free Space, Lyris ListManager Flaws, Windows Timestamps, Sam Juicer",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0349.html"
|
||||
},
|
||||
{
|
||||
"name": "15788",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15788"
|
||||
},
|
||||
{
|
||||
"name": "17943",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20051210 Flatnuke 2.5.6 privilege escalation / remote commands execution exploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/419107"
|
||||
"name": "flatnuke-multiple-obtain-information(22159)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22159"
|
||||
},
|
||||
{
|
||||
"name": "http://cvs.sourceforge.net/viewcvs.py/flatnuke/flatnuke/Changelog?rev=1.78&view=markup",
|
||||
@ -67,15 +67,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15796"
|
||||
},
|
||||
{
|
||||
"name": "20051210 Flatnuke 2.5.6 privilege escalation / remote commands execution exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/419107"
|
||||
},
|
||||
{
|
||||
"name": "1015339",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015339"
|
||||
},
|
||||
{
|
||||
"name" : "flatnuke-multiple-obtain-information(22159)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22159"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/8891"
|
||||
},
|
||||
{
|
||||
"name" : "35257",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/35257"
|
||||
},
|
||||
{
|
||||
"name": "joomla-comschool-classid-sql-injection(50988)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50988"
|
||||
},
|
||||
{
|
||||
"name": "35257",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/35257"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/9000"
|
||||
},
|
||||
{
|
||||
"name": "rscms-key-sql-injection(51304)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51304"
|
||||
},
|
||||
{
|
||||
"name": "55325",
|
||||
"refsource": "OSVDB",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "ADV-2009-1658",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1658"
|
||||
},
|
||||
{
|
||||
"name" : "rscms-key-sql-injection(51304)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51304"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2009-2414",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,69 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
||||
"name": "USN-815-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-815-1"
|
||||
},
|
||||
{
|
||||
"name" : "[debian-bugs-dist] 20090810 Bug#540865: libxml2: CVE-2009-2414, CVE-2009-2416 pointer-user-after-free and stack overflow because of function recursion",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg678527.html"
|
||||
"name": "FEDORA-2009-8491",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00537.html"
|
||||
},
|
||||
{
|
||||
"name": "36631",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36631"
|
||||
},
|
||||
{
|
||||
"name": "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.openoffice.org/security/cves/CVE-2009-2414-2416.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.openoffice.org/security/cves/CVE-2009-2414-2416.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2009-11-11-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-3217",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3217"
|
||||
},
|
||||
{
|
||||
"name": "37471",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37471"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4225",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4225"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-2420",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/2420"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2009-8580",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00642.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
||||
},
|
||||
{
|
||||
"name": "36417",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36417"
|
||||
},
|
||||
{
|
||||
"name": "http://www.cert.fi/en/reports/2009/vulnerability2009085.html",
|
||||
@ -73,24 +128,9 @@
|
||||
"url": "http://www.codenomicon.com/labs/xml/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=515195",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=515195"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3937",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3937"
|
||||
"name": "SUSE-SR:2009:015",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3949",
|
||||
@ -98,69 +138,9 @@
|
||||
"url": "http://support.apple.com/kb/HT3949"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4225",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4225"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.openoffice.org/security/cves/CVE-2009-2414-2416.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.openoffice.org/security/cves/CVE-2009-2414-2416.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://git.gnome.org/browse/libxml2/commit/?id=489f9671e71cc44a97b23111b3126ac8a1e21a59",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://git.gnome.org/browse/libxml2/commit/?id=489f9671e71cc44a97b23111b3126ac8a1e21a59"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2009-11-09-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2009-11-11-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Nov/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2010-06-21-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1859",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2009/dsa-1859"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2009-8491",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00537.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2009-8498",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00547.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2009-8580",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00642.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2009:015",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-815-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-815-1"
|
||||
"name": "[debian-bugs-dist] 20090810 Bug#540865: libxml2: CVE-2009-2414, CVE-2009-2416 pointer-user-after-free and stack overflow because of function recursion",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg678527.html"
|
||||
},
|
||||
{
|
||||
"name": "36010",
|
||||
@ -168,39 +148,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/36010"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10129",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10129"
|
||||
"name": "http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:8639",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8639"
|
||||
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "36338",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/36338"
|
||||
},
|
||||
{
|
||||
"name" : "36207",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/36207"
|
||||
},
|
||||
{
|
||||
"name" : "36417",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/36417"
|
||||
},
|
||||
{
|
||||
"name" : "37471",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37471"
|
||||
},
|
||||
{
|
||||
"name" : "37346",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37346"
|
||||
"name": "https://git.gnome.org/browse/libxml2/commit/?id=489f9671e71cc44a97b23111b3126ac8a1e21a59",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://git.gnome.org/browse/libxml2/commit/?id=489f9671e71cc44a97b23111b3126ac8a1e21a59"
|
||||
},
|
||||
{
|
||||
"name": "35036",
|
||||
@ -208,29 +168,69 @@
|
||||
"url": "http://secunia.com/advisories/35036"
|
||||
},
|
||||
{
|
||||
"name" : "36631",
|
||||
"name": "36338",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/36631"
|
||||
"url": "http://secunia.com/advisories/36338"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-2420",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/2420"
|
||||
"name": "FEDORA-2009-8498",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00547.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:8639",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8639"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10129",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10129"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=515195",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515195"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-3184",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3184"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1859",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2009/dsa-1859"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2009-11-09-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2010-06-21-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "37346",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37346"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-3316",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3316"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-3217",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/3217"
|
||||
"name": "http://support.apple.com/kb/HT3937",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3937"
|
||||
},
|
||||
{
|
||||
"name": "36207",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36207"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2009-2515",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/0907-exploits/ezarticles-xss.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/0907-exploits/ezarticles-xss.txt"
|
||||
},
|
||||
{
|
||||
"name": "56002",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/56002"
|
||||
},
|
||||
{
|
||||
"name": "ezarticles-articles-xss(51858)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51858"
|
||||
},
|
||||
{
|
||||
"name": "35924",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35924"
|
||||
},
|
||||
{
|
||||
"name" : "ezarticles-articles-xss(51858)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51858"
|
||||
"name": "http://packetstormsecurity.org/0907-exploits/ezarticles-xss.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0907-exploits/ezarticles-xss.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "9269",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/9269"
|
||||
},
|
||||
{
|
||||
"name" : "56573",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/56573"
|
||||
},
|
||||
{
|
||||
"name": "35972",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35972"
|
||||
},
|
||||
{
|
||||
"name": "9269",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/9269"
|
||||
},
|
||||
{
|
||||
"name": "phppaid4mail-home-file-include(52015)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52015"
|
||||
},
|
||||
{
|
||||
"name": "56573",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/56573"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2009-3414",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1023017",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1023017"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/0909-exploits/achievo134-rfi.txt",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://www.achievo.org/download/releasenotes/1_4_0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.achievo.org/download/releasenotes/1_4_0"
|
||||
},
|
||||
{
|
||||
"name" : "1023017",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1023017"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2009-3797",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb09-19.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb09-19.html"
|
||||
"name": "RHSA-2009:1657",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2009-1657.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=543857",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=543857"
|
||||
"name": "1023307",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1023307"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4004",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4004"
|
||||
},
|
||||
{
|
||||
"name": "1021716",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021716.1-1"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2010-01-19-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2009:1657",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1657.html"
|
||||
},
|
||||
{
|
||||
"name" : "1021716",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021716.1-1"
|
||||
"name": "ADV-2009-3456",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3456"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2009:062",
|
||||
@ -88,39 +88,14 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA09-343A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-343A.html"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=543857",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=543857"
|
||||
},
|
||||
{
|
||||
"name" : "37199",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/37199"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:7140",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7140"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:8350",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8350"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:15795",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15795"
|
||||
},
|
||||
{
|
||||
"name" : "1023306",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1023306"
|
||||
},
|
||||
{
|
||||
"name" : "1023307",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1023307"
|
||||
"name": "flash-air-corruption-code-execution(54633)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54633"
|
||||
},
|
||||
{
|
||||
"name": "37584",
|
||||
@ -132,25 +107,50 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37902"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:7140",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7140"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb09-19.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb09-19.html"
|
||||
},
|
||||
{
|
||||
"name": "1023306",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1023306"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:8350",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8350"
|
||||
},
|
||||
{
|
||||
"name": "TA09-343A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-343A.html"
|
||||
},
|
||||
{
|
||||
"name": "38241",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38241"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-3456",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/3456"
|
||||
"name": "37199",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/37199"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:15795",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15795"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0173",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0173"
|
||||
},
|
||||
{
|
||||
"name" : "flash-air-corruption-code-execution(54633)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54633"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141481-03-1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141481-03-1"
|
||||
"name": "vdi-authentication-unauth-access(54136)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54136"
|
||||
},
|
||||
{
|
||||
"name": "268328",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-268328-1"
|
||||
},
|
||||
{
|
||||
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141481-03-1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141481-03-1"
|
||||
},
|
||||
{
|
||||
"name": "36917",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36917"
|
||||
},
|
||||
{
|
||||
"name" : "vdi-authentication-unauth-access(54136)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54136"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-0598",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150305 Cisco IOS Software and Cisco IOS XE Software Crafted RADIUS Packet Denial of Service Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0598"
|
||||
},
|
||||
{
|
||||
"name": "1031842",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031842"
|
||||
},
|
||||
{
|
||||
"name": "20150305 Cisco IOS Software and Cisco IOS XE Software Crafted RADIUS Packet Denial of Service Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0598"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-0639",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150325 Multiple Vulnerabilities in Cisco IOS XE Software for Cisco ASR 1000 Series, Cisco ISR 4400 Series, and Cisco Cloud Services 1000v Series Routers",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe"
|
||||
},
|
||||
{
|
||||
"name": "1031981",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031981"
|
||||
},
|
||||
{
|
||||
"name": "20150325 Multiple Vulnerabilities in Cisco IOS XE Software for Cisco ASR 1000 Series, Cisco ISR 4400 Series, and Cisco Cloud Services 1000v Series Routers",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -67,15 +67,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.fortiguard.com/advisory/FG-IR-15-002/"
|
||||
},
|
||||
{
|
||||
"name" : "72383",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/72383"
|
||||
},
|
||||
{
|
||||
"name": "61661",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/61661"
|
||||
},
|
||||
{
|
||||
"name": "72383",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72383"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2015-1657",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS15-032",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032"
|
||||
},
|
||||
{
|
||||
"name": "1032108",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032108"
|
||||
},
|
||||
{
|
||||
"name": "MS15-032",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2015-1788",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,54 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/openssl/openssl/commit/4924b37ee01f71ae19c94a8934b80eeb2f677932",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/openssl/openssl/commit/4924b37ee01f71ae19c94a8934b80eeb2f677932"
|
||||
"name": "SUSE-SU-2015:1184",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.openssl.org/news/secadv_20150611.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.openssl.org/news/secadv_20150611.txt"
|
||||
"name": "SSRT102180",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=143880121627664&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/kb/HT205031",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/kb/HT205031"
|
||||
"name": "DSA-3287",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3287"
|
||||
},
|
||||
{
|
||||
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694",
|
||||
"name": "SUSE-SU-2015:1150",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html"
|
||||
},
|
||||
{
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10122",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694"
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10122"
|
||||
},
|
||||
{
|
||||
"name": "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMU03409",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2"
|
||||
},
|
||||
{
|
||||
"name": "75158",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75158"
|
||||
},
|
||||
{
|
||||
"name": "https://openssl.org/news/secadv/20150611.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://openssl.org/news/secadv/20150611.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
|
||||
@ -83,19 +113,9 @@
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763"
|
||||
"name": "SUSE-SU-2015:1182",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888",
|
||||
@ -103,9 +123,9 @@
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"
|
||||
"name": "SUSE-SU-2015:1143",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351",
|
||||
@ -117,40 +137,20 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:0640",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery"
|
||||
},
|
||||
{
|
||||
"name" : "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015"
|
||||
},
|
||||
{
|
||||
"name" : "https://openssl.org/news/secadv/20150611.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://openssl.org/news/secadv/20150611.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015"
|
||||
},
|
||||
{
|
||||
"name" : "https://bto.bluecoat.com/security-advisory/sa98",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bto.bluecoat.com/security-advisory/sa98"
|
||||
"name": "1032564",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032564"
|
||||
},
|
||||
{
|
||||
"name": "http://www-304.ibm.com/support/docview.wss?uid=swg21960041",
|
||||
@ -158,129 +158,129 @@
|
||||
"url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960041"
|
||||
},
|
||||
{
|
||||
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10122",
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10122"
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"name": "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
"url": "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.citrix.com/article/CTX216642",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.citrix.com/article/CTX216642"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-08-13-2",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3287",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3287"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201506-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201506-02"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX03388",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=143880121627664&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT102180",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=143880121627664&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMU03409",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=144050155601375&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "NetBSD-SA2015-008",
|
||||
"refsource" : "NETBSD",
|
||||
"url" : "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:0640",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1277",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:1143",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:1150",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:1181",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:1182",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html"
|
||||
"name": "https://github.com/openssl/openssl/commit/4924b37ee01f71ae19c94a8934b80eeb2f677932",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/openssl/openssl/commit/4924b37ee01f71ae19c94a8934b80eeb2f677932"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:1184",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html"
|
||||
"name": "http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1139",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:1185",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html"
|
||||
"name": "APPLE-SA-2015-08-13-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2639-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2639-1"
|
||||
},
|
||||
{
|
||||
"name": "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201506-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201506-02"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044"
|
||||
},
|
||||
{
|
||||
"name": "91787",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91787"
|
||||
},
|
||||
{
|
||||
"name" : "75158",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/75158"
|
||||
"name": "HPSBUX03388",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=143880121627664&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "1032564",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032564"
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/kb/HT205031",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT205031"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.citrix.com/article/CTX216642",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.citrix.com/article/CTX216642"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:1185",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1139",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bto.bluecoat.com/security-advisory/sa98",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bto.bluecoat.com/security-advisory/sa98"
|
||||
},
|
||||
{
|
||||
"name": "NetBSD-SA2015-008",
|
||||
"refsource": "NETBSD",
|
||||
"url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc"
|
||||
},
|
||||
{
|
||||
"name": "https://www.openssl.org/news/secadv_20150611.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.openssl.org/news/secadv_20150611.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2015-4054",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150522 Re: CVE Request: pgbouncer: DoS/remote crash: invalid packet order causes lookup of NULL pointer",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/05/22/5"
|
||||
"name": "https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5",
|
||||
@ -63,9 +63,14 @@
|
||||
"url": "https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573",
|
||||
"name": "https://pgbouncer.github.io/changelog.html#pgbouncer-15x",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573"
|
||||
"url": "https://pgbouncer.github.io/changelog.html#pgbouncer-15x"
|
||||
},
|
||||
{
|
||||
"name": "74751",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/74751"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/pgbouncer/pgbouncer/issues/42",
|
||||
@ -73,19 +78,14 @@
|
||||
"url": "https://github.com/pgbouncer/pgbouncer/issues/42"
|
||||
},
|
||||
{
|
||||
"name" : "https://pgbouncer.github.io/changelog.html#pgbouncer-15x",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://pgbouncer.github.io/changelog.html#pgbouncer-15x"
|
||||
"name": "[oss-security] 20150522 Re: CVE Request: pgbouncer: DoS/remote crash: invalid packet order causes lookup of NULL pointer",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/05/22/5"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-24",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-24"
|
||||
},
|
||||
{
|
||||
"name" : "74751",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/74751"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-4207",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150622 Cisco WebEx Meetings Meeting Access Number Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=39457"
|
||||
},
|
||||
{
|
||||
"name": "75350",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75350"
|
||||
},
|
||||
{
|
||||
"name": "20150622 Cisco WebEx Meetings Meeting Access Number Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39457"
|
||||
},
|
||||
{
|
||||
"name": "1032705",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/04/25/6"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/node/2446065",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.drupal.org/node/2446065"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.drupal.org/node/2373143",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.drupal.org/node/2373143"
|
||||
"name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/04/25/6"
|
||||
},
|
||||
{
|
||||
"name": "72946",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72946"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/node/2373147",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "https://www.drupal.org/node/2373147"
|
||||
},
|
||||
{
|
||||
"name" : "72946",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/72946"
|
||||
"name": "https://www.drupal.org/node/2373143",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.drupal.org/node/2373143"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
|
||||
"name": "https://www.nowsecure.com/keyboard-vulnerability/",
|
||||
"refsource": "MISC",
|
||||
"url" : "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/nowsecure/samsung-ime-rce-poc/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/nowsecure/samsung-ime-rce-poc/"
|
||||
"url": "https://www.nowsecure.com/keyboard-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/",
|
||||
@ -68,19 +63,24 @@
|
||||
"url": "https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.nowsecure.com/keyboard-vulnerability/",
|
||||
"name": "https://github.com/nowsecure/samsung-ime-rce-poc/",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://www.nowsecure.com/keyboard-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "VU#155412",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/155412"
|
||||
"url": "https://github.com/nowsecure/samsung-ime-rce-poc/"
|
||||
},
|
||||
{
|
||||
"name": "75347",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75347"
|
||||
},
|
||||
{
|
||||
"name": "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/"
|
||||
},
|
||||
{
|
||||
"name": "VU#155412",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/155412"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2015-4992",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.huawei.com/en/psirt/security-advisories/hw-460347",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.huawei.com/en/psirt/security-advisories/hw-460347"
|
||||
},
|
||||
{
|
||||
"name": "77560",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/77560"
|
||||
},
|
||||
{
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/hw-460347",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-460347"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,20 +57,20 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/537264/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "[gdcm-developers] 20151204 [Gdcm2] GDCM <2.6.1 two vulnerabilites",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://sourceforge.net/p/gdcm/mailman/message/34670701/"
|
||||
},
|
||||
{
|
||||
"name": "39229",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/39229/"
|
||||
},
|
||||
{
|
||||
"name" : "20160111 CVE-2015-8396: GDCM buffer overflow in ImageRegionReader::ReadIntoBuffer",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Jan/29"
|
||||
},
|
||||
{
|
||||
"name" : "[gdcm-developers] 20151204 [Gdcm2] GDCM <2.6.1 two vulnerabilites",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://sourceforge.net/p/gdcm/mailman/message/34670701/"
|
||||
"name": "http://sourceforge.net/p/gdcm/gdcm/ci/e547b1ded3fd21e0b0ad149f13045aa12d4b9b7c/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/p/gdcm/gdcm/ci/e547b1ded3fd21e0b0ad149f13045aa12d4b9b7c/"
|
||||
},
|
||||
{
|
||||
"name": "[gdcm-developers] 20151221 Re: [Gdcm2] GDCM <2.6.1 two vulnerabilites",
|
||||
@ -82,15 +82,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://census-labs.com/news/2016/01/11/gdcm-buffer-overflow-imageregionreaderreadintobuffer/"
|
||||
},
|
||||
{
|
||||
"name": "20160111 CVE-2015-8396: GDCM buffer overflow in ImageRegionReader::ReadIntoBuffer",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2016/Jan/29"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/135205/GDCM-2.6.0-2.6.1-Integer-Overflow.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/135205/GDCM-2.6.0-2.6.1-Integer-Overflow.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/p/gdcm/gdcm/ci/e547b1ded3fd21e0b0ad149f13045aa12d4b9b7c/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/p/gdcm/gdcm/ci/e547b1ded3fd21e0b0ad149f13045aa12d4b9b7c/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/mpv-player/mpv/commit/e6e6b0dcc7e9b0dbf35154a179b3dc1fcfcaff43"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201805-05",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201805-05"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/mpv-player/mpv/issues/5456",
|
||||
"refsource": "MISC",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "DSA-4105",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4105"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201805-05",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201805-05"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cybersecurity@se.com",
|
||||
"ASSIGNER": "cybersecurity@schneider-electric.com",
|
||||
"DATE_PUBLIC": "2018-04-05T00:00:00",
|
||||
"ID": "CVE-2018-7764",
|
||||
"STATE": "PUBLIC"
|
||||
|
Loading…
x
Reference in New Issue
Block a user