mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
39b2d1d704
commit
451dffe4d3
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "legato-nsrd-log-plaintext(7898)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "http://www.iss.net/security_center/static/7898.php"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20020110 Legato Vulnerable",
|
"name": "20020110 Legato Vulnerable",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "3842",
|
"name": "3842",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/3842"
|
"url": "http://www.securityfocus.com/bid/3842"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "legato-nsrd-log-plaintext(7898)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "http://www.iss.net/security_center/static/7898.php"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20020613 wp-02-0007: Microsoft SQLXML ISAPI Overflow and Cross Site Scripting",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=102397345410856&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20020613 [VulnWatch] wp-02-0007: Microsoft SQLXML ISAPI Overflow and Cross Site Scripting",
|
"name": "20020613 [VulnWatch] wp-02-0007: Microsoft SQLXML ISAPI Overflow and Cross Site Scripting",
|
||||||
"refsource": "VULNWATCH",
|
"refsource": "VULNWATCH",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "MS02-030",
|
"name": "MS02-030",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-030"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-030"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20020613 wp-02-0007: Microsoft SQLXML ISAPI Overflow and Cross Site Scripting",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=102397345410856&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,30 +57,30 @@
|
|||||||
"refsource": "SGI",
|
"refsource": "SGI",
|
||||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20020601-01-P"
|
"url": "ftp://patches.sgi.com/support/free/security/advisories/20020601-01-P"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "VU#430419",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/430419"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "M-087",
|
"name": "M-087",
|
||||||
"refsource": "CIAC",
|
"refsource": "CIAC",
|
||||||
"url": "http://www.ciac.org/ciac/bulletins/m-087.shtml"
|
"url": "http://www.ciac.org/ciac/bulletins/m-087.shtml"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "irix-rpcpasswd-gain-privileges(9261)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "http://www.iss.net/security_center/static/9261.php"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "4939",
|
"name": "4939",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/4939"
|
"url": "http://www.securityfocus.com/bid/4939"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#430419",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/430419"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "834",
|
"name": "834",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/834"
|
"url": "http://www.osvdb.org/834"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "irix-rpcpasswd-gain-privileges(9261)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "http://www.iss.net/security_center/static/9261.php"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20020305 Considerations for IIS Authentication (#NISR05032002C)",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=101535399100534&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "4235",
|
"name": "4235",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "iis-authentication-error-messages(8382)",
|
"name": "iis-authentication-error-messages(8382)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "http://www.iss.net/security_center/static/8382.php"
|
"url": "http://www.iss.net/security_center/static/8382.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20020305 Considerations for IIS Authentication (#NISR05032002C)",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=101535399100534&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,25 +57,25 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0272.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0272.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20020413 Nortel CVX 1800s will dump all local user names and passwords via SNMP",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://online.securityfocus.com/archive/1/267627"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#403315",
|
"name": "VU#403315",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/403315"
|
"url": "http://www.kb.cert.org/vuls/id/403315"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "nortel-default-snmp-string(8848)",
|
"name": "20020413 Nortel CVX 1800s will dump all local user names and passwords via SNMP",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.iss.net/security_center/static/8848.php"
|
"url": "http://online.securityfocus.com/archive/1/267627"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "4507",
|
"name": "4507",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/4507"
|
"url": "http://www.securityfocus.com/bid/4507"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "nortel-default-snmp-string(8848)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "http://www.iss.net/security_center/static/8848.php"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,35 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20021112 KDE Security Advisory: rlogin.protocol and telnet.protocol URL KIO Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=103712550205730&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.kde.org/info/security/advisory-20021111-1.txt",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.kde.org/info/security/advisory-20021111-1.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "CSSA-2003-012.0",
|
"name": "CSSA-2003-012.0",
|
||||||
"refsource": "CALDERA",
|
"refsource": "CALDERA",
|
||||||
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-012.0.txt"
|
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-012.0.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDKSA-2002:079",
|
"name": "kde-rlogin-command-execution(10602)",
|
||||||
"refsource" : "MANDRAKE",
|
"refsource": "XF",
|
||||||
"url" : "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-079.php"
|
"url": "http://www.iss.net/security_center/static/10602.php"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2002:220",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2002-220.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-204",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2002/dsa-204"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20021114 GLSA: kdelibs",
|
"name": "20021114 GLSA: kdelibs",
|
||||||
@ -93,9 +73,29 @@
|
|||||||
"url": "http://secunia.com/advisories/8298"
|
"url": "http://secunia.com/advisories/8298"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "kde-rlogin-command-execution(10602)",
|
"name": "http://www.kde.org/info/security/advisory-20021111-1.txt",
|
||||||
"refsource" : "XF",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.iss.net/security_center/static/10602.php"
|
"url": "http://www.kde.org/info/security/advisory-20021111-1.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2002:079",
|
||||||
|
"refsource": "MANDRAKE",
|
||||||
|
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-079.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20021112 KDE Security Advisory: rlogin.protocol and telnet.protocol URL KIO Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=103712550205730&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-204",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2002/dsa-204"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2002:220",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2002-220.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "6182",
|
"name": "6182",
|
||||||
|
@ -53,9 +53,19 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://search.alphanet.ch/cgi-bin/search.cgi?msgid=20021125142338.E12094%40greenie.muc.de&max_results=1&type=long&domain=ml-mgetty",
|
"name": "mgetty-faxspool-worldwritable-directory(11070)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://search.alphanet.ch/cgi-bin/search.cgi?msgid=20021125142338.E12094%40greenie.muc.de&max_results=1&type=long&domain=ml-mgetty"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11070"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "7302",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/7302"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2003:036",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-036.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "CSSA-2003-021.0",
|
"name": "CSSA-2003-021.0",
|
||||||
@ -73,19 +83,9 @@
|
|||||||
"url": "http://www.redhat.com/support/errata/RHSA-2003-008.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-008.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2003:036",
|
"name": "http://search.alphanet.ch/cgi-bin/search.cgi?msgid=20021125142338.E12094%40greenie.muc.de&max_results=1&type=long&domain=ml-mgetty",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2003-036.html"
|
"url": "http://search.alphanet.ch/cgi-bin/search.cgi?msgid=20021125142338.E12094%40greenie.muc.de&max_results=1&type=long&domain=ml-mgetty"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "7302",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/7302"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "mgetty-faxspool-worldwritable-directory(11070)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/11070"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20020112 IE Clipboard Stealing Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/250248"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20020115 Re: IE Clipboard Stealing Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://online.securityfocus.com/archive/1/250387/2002-10-11/2002-10-17/2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "3862",
|
"name": "3862",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -71,6 +61,16 @@
|
|||||||
"name": "ie-clipboarddata-view-clipboard(7906)",
|
"name": "ie-clipboarddata-view-clipboard(7906)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7906"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7906"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20020112 IE Clipboard Stealing Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/250248"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20020115 Re: IE Clipboard Stealing Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://online.securityfocus.com/archive/1/250387/2002-10-11/2002-10-17/2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -62,35 +62,35 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://use.perl.org/articles/02/04/09/000212.shtml?tid=5"
|
"url": "http://use.perl.org/articles/02/04/09/000212.shtml?tid=5"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20020411 SOAP::Lite hole",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://online.securityfocus.com/archive/1/267051"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FreeBSD-SN-02:02",
|
"name": "FreeBSD-SN-02:02",
|
||||||
"refsource": "FREEBSD",
|
"refsource": "FREEBSD",
|
||||||
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A02.asc"
|
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A02.asc"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.phrack.com/show.php?p=58&a=9",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.phrack.com/show.php?p=58&a=9"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.soaplite.com/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.soaplite.com/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "4493",
|
"name": "4493",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/4493"
|
"url": "http://www.securityfocus.com/bid/4493"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.phrack.com/show.php?p=58&a=9",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.phrack.com/show.php?p=58&a=9"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "soap-perl-execute-functions(8838)",
|
"name": "soap-perl-execute-functions(8838)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8838"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8838"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20020411 SOAP::Lite hole",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://online.securityfocus.com/archive/1/267051"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.soaplite.com/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.soaplite.com/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20021226 Full Disclosure: Windows File Protection Old Security Catalog Vulnerability",
|
"name": "6483",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-12/0250.html"
|
"url": "http://www.securityfocus.com/bid/6483"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "wfp-security-catalogs(10957)",
|
"name": "wfp-security-catalogs(10957)",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.iss.net/security_center/static/10957.php"
|
"url": "http://www.iss.net/security_center/static/10957.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "6483",
|
"name": "20021226 Full Disclosure: Windows File Protection Old Security Catalog Vulnerability",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/6483"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-12/0250.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-11/0272.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-11/0272.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "6219",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/6219"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openbsd-syslogd-incorrect-reporting(10702)",
|
"name": "openbsd-syslogd-incorrect-reporting(10702)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10702"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10702"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "6219",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/6219"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[freebsd-security] 20021109 Security issue in net/cvsup-mirror port",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/freebsd/2002-11/0011.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "6150",
|
"name": "6150",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/6150"
|
"url": "http://www.securityfocus.com/bid/6150"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[freebsd-security] 20021109 Security issue in net/cvsup-mirror port",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/freebsd/2002-11/0011.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "cvsup-cvsupd-out-symlink(10610)",
|
"name": "cvsup-cvsupd-out-symlink(10610)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20030508 Fw: [rt-users] [rt-announce] RT 1.0.7 vulnerable to Cross Site Scripting attacks",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=105240947225275&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://lists.fsck.com/pipermail/rt-announce/2003-May/000071.html",
|
"name": "http://lists.fsck.com/pipermail/rt-announce/2003-May/000071.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://lists.fsck.com/pipermail/rt-announce/2003-May/000071.html"
|
"url": "http://lists.fsck.com/pipermail/rt-announce/2003-May/000071.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20030508 Fw: [rt-users] [rt-announce] RT 1.0.7 vulnerable to Cross Site Scripting attacks",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=105240947225275&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,35 +57,20 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=105259038503175&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=105259038503175&w=2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.info-zip.org/FAQ.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.info-zip.org/FAQ.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "CSSA-2003-031.0",
|
|
||||||
"refsource" : "CALDERA",
|
|
||||||
"url" : "ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-031.0.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "CLA-2003:672",
|
"name": "CLA-2003:672",
|
||||||
"refsource": "CONECTIVA",
|
"refsource": "CONECTIVA",
|
||||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000672"
|
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000672"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-344",
|
"name": "unzip-dotdot-directory-traversal(12004)",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "XF",
|
||||||
"url" : "http://www.debian.org/security/2003/dsa-344"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12004"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "IMNX-2003-7+-017-01",
|
"name": "http://www.info-zip.org/FAQ.html",
|
||||||
"refsource" : "IMMUNIX",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://download.immunix.org/ImmunixOS/7+/Updates/errata/IMNX-2003-7+-017-01"
|
"url": "http://www.info-zip.org/FAQ.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2003:073",
|
|
||||||
"refsource" : "MANDRAKE",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2003:073"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2003:199",
|
"name": "RHSA-2003:199",
|
||||||
@ -93,14 +78,9 @@
|
|||||||
"url": "http://www.redhat.com/support/errata/RHSA-2003-199.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-199.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2003:200",
|
"name": "MDKSA-2003:073",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "MANDRAKE",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2003-200.html"
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:073"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "CSSA-2003-031.0",
|
|
||||||
"refsource" : "SCO",
|
|
||||||
"url" : "ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-031.0.txt"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "TLSA-2003-42",
|
"name": "TLSA-2003-42",
|
||||||
@ -108,29 +88,49 @@
|
|||||||
"url": "http://www.turbolinux.com/security/TLSA-2003-42.txt"
|
"url": "http://www.turbolinux.com/security/TLSA-2003-42.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20030710 [OpenPKG-SA-2003.033] OpenPKG Security Advisory (infozip)",
|
"name": "oval:org.mitre.oval:def:619",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "OVAL",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=105786446329347&w=2"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A619"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "N-111",
|
"name": "N-111",
|
||||||
"refsource": "CIAC",
|
"refsource": "CIAC",
|
||||||
"url": "http://www.ciac.org/ciac/bulletins/n-111.shtml"
|
"url": "http://www.ciac.org/ciac/bulletins/n-111.shtml"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "CSSA-2003-031.0",
|
||||||
|
"refsource": "CALDERA",
|
||||||
|
"url": "ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-031.0.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "7550",
|
"name": "7550",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/7550"
|
"url": "http://www.securityfocus.com/bid/7550"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:619",
|
"name": "CSSA-2003-031.0",
|
||||||
"refsource" : "OVAL",
|
"refsource": "SCO",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A619"
|
"url": "ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-031.0.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "unzip-dotdot-directory-traversal(12004)",
|
"name": "20030710 [OpenPKG-SA-2003.033] OpenPKG Security Advisory (infozip)",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/12004"
|
"url": "http://marc.info/?l=bugtraq&m=105786446329347&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2003:200",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-200.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "IMNX-2003-7+-017-01",
|
||||||
|
"refsource": "IMMUNIX",
|
||||||
|
"url": "http://download.immunix.org/ImmunixOS/7+/Updates/errata/IMNX-2003-7+-017-01"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-344",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2003/dsa-344"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2005-1761",
|
"ID": "CVE-2005-1761",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,49 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.1",
|
"name": "18056",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.1"
|
"url": "http://secunia.com/advisories/18056"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-922",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2005/dsa-922"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1018",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2006/dsa-1018"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FLSA:157459-3",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/427980/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2005:514",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-514.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2005:551",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-551.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2005:663",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-663.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SA:2005:044",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2005_44_kernel.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ea78729b8dbfc400fe165a57b90a394a7275a54",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ea78729b8dbfc400fe165a57b90a394a7275a54"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "14051",
|
"name": "14051",
|
||||||
@ -103,24 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/14051"
|
"url": "http://www.securityfocus.com/bid/14051"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:10487",
|
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.1",
|
||||||
"refsource" : "OVAL",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10487"
|
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.1"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2005-1878",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/1878"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1014275",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1014275"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18056",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/18056"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "17073",
|
"name": "17073",
|
||||||
@ -132,10 +77,65 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/19369"
|
"url": "http://secunia.com/advisories/19369"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:10487",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10487"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ea78729b8dbfc400fe165a57b90a394a7275a54",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ea78729b8dbfc400fe165a57b90a394a7275a54"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1018",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2006/dsa-1018"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-922",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2005/dsa-922"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2005:551",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-551.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1014275",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1014275"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2005:514",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-514.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "17002",
|
"name": "17002",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/17002"
|
"url": "http://secunia.com/advisories/17002"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SA:2005:044",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2005_44_kernel.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FLSA:157459-3",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2005:663",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-663.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2005-1878",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2005/1878"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,65 +52,65 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20090323 CVE request -- ucd-snmp / net-snmp, libnss-ldapd / nss_ldap",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2009/03/23/3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20090324 Re: CVE request -- ucd-snmp / net-snmp, libnss-ldapd / nss_ldap",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2009/03/24/2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20090324 Re: CVE request -- ucd-snmp / net-snmp, libnss-ldapd / nss_ldap",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2009/03/25/3"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20090324 Re: CVE request -- ucd-snmp / net-snmp, libnss-ldapd / nss_ldap",
|
"name": "[oss-security] 20090324 Re: CVE request -- ucd-snmp / net-snmp, libnss-ldapd / nss_ldap",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2009/03/25/4"
|
"url": "http://www.openwall.com/lists/oss-security/2009/03/25/4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://launchpad.net/bugs/cve/2009-1073",
|
"name": "[oss-security] 20090323 CVE request -- ucd-snmp / net-snmp, libnss-ldapd / nss_ldap",
|
||||||
"refsource" : "MISC",
|
"refsource": "MLIST",
|
||||||
"url" : "http://launchpad.net/bugs/cve/2009-1073"
|
"url": "http://www.openwall.com/lists/oss-security/2009/03/23/3"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476",
|
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476"
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1758",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2009/dsa-1758"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "34211",
|
"name": "34211",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/34211"
|
"url": "http://www.securityfocus.com/bid/34211"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20090324 Re: CVE request -- ucd-snmp / net-snmp, libnss-ldapd / nss_ldap",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2009/03/24/2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20090324 Re: CVE request -- ucd-snmp / net-snmp, libnss-ldapd / nss_ldap",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2009/03/25/3"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "34523",
|
"name": "34523",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/34523"
|
"url": "http://secunia.com/advisories/34523"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://launchpad.net/bugs/cve/2009-1073",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://launchpad.net/bugs/cve/2009-1073"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1758",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2009/dsa-1758"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2012-0118",
|
"ID": "CVE-2012-0118",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "USN-1397-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-1397-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "53372",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/53372"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201308-06",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "48250",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/48250"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,26 +86,6 @@
|
|||||||
"name": "DSA-2429",
|
"name": "DSA-2429",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2012/dsa-2429"
|
"url": "http://www.debian.org/security/2012/dsa-2429"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201308-06",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-1397-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1397-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "53372",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/53372"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "48250",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/48250"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "78066",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/78066"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.op5.com/view.php?id=5094",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.op5.com/view.php?id=5094"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "47344",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/47344"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20120107 OP5 Monitor - Multiple Vulnerabilities",
|
"name": "20120107 OP5 Monitor - Multiple Vulnerabilities",
|
||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
@ -61,26 +81,6 @@
|
|||||||
"name": "http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf",
|
"name": "http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf"
|
"url": "http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugs.op5.com/view.php?id=5094",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.op5.com/view.php?id=5094"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "78066",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/78066"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "47344",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/47344"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2012-0494",
|
"ID": "CVE-2012-0494",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201308-06",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-1397-1",
|
"name": "USN-1397-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1397-1"
|
"url": "http://www.ubuntu.com/usn/USN-1397-1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "78375",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/78375"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "53372",
|
"name": "53372",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/53372"
|
"url": "http://secunia.com/advisories/53372"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201308-06",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "mysql-serveruns16-dos(72540)",
|
"name": "mysql-serveruns16-dos(72540)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72540"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72540"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "78375",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/78375"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2012-0584",
|
"ID": "CVE-2012-0584",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2012-03-12-1",
|
"name": "48377",
|
||||||
"refsource" : "APPLE",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
|
"url": "http://secunia.com/advisories/48377"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "80088",
|
"name": "80088",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.securitytracker.com/id?1026785"
|
"url": "http://www.securitytracker.com/id?1026785"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "48377",
|
"name": "APPLE-SA-2012-03-12-1",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "APPLE",
|
||||||
"url" : "http://secunia.com/advisories/48377"
|
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2012-0850",
|
"ID": "CVE-2012-0850",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20120201 Re: CVE Requests for FFmpeg 0.9.1",
|
"name": "ffmpeg-sbrqmfsynthesis-dos(78934)",
|
||||||
"refsource" : "MLIST",
|
"refsource": "XF",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2012/02/01/11"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78934"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
|
"name": "[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
|
"url": "http://www.openwall.com/lists/oss-security/2012/02/14/4"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://ffmpeg.org/security.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://ffmpeg.org/security.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=944f5b2779e4aa63f7624df6cd4de832a53db81b",
|
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=944f5b2779e4aa63f7624df6cd4de832a53db81b",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=944f5b2779e4aa63f7624df6cd4de832a53db81b"
|
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=944f5b2779e4aa63f7624df6cd4de832a53db81b"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ffmpeg-sbrqmfsynthesis-dos(78934)",
|
"name": "http://ffmpeg.org/security.html",
|
||||||
"refsource" : "XF",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/78934"
|
"url": "http://ffmpeg.org/security.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20120201 Re: CVE Requests for FFmpeg 0.9.1",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2012/02/01/11"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||||
"ID": "CVE-2012-1977",
|
"ID": "CVE-2012-1977",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2012-3160",
|
"ID": "CVE-2012-3160",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,24 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
|
"name": "51177",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html"
|
"url": "http://secunia.com/advisories/51177"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2581",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2012/dsa-2581"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201308-06",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2013:150",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2012:1462",
|
"name": "RHSA-2012:1462",
|
||||||
@ -78,9 +63,29 @@
|
|||||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-1621-1",
|
"name": "53372",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1621-1"
|
"url": "http://secunia.com/advisories/53372"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201308-06",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "mysqlserver-serverinstallation-info-disc(79394)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79394"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-2581",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2012/dsa-2581"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "51309",
|
"name": "51309",
|
||||||
@ -88,19 +93,14 @@
|
|||||||
"url": "http://secunia.com/advisories/51309"
|
"url": "http://secunia.com/advisories/51309"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "51177",
|
"name": "USN-1621-1",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://secunia.com/advisories/51177"
|
"url": "http://www.ubuntu.com/usn/USN-1621-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "53372",
|
"name": "MDVSA-2013:150",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MANDRIVA",
|
||||||
"url" : "http://secunia.com/advisories/53372"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "mysqlserver-serverinstallation-info-disc(79394)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/79394"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2012-3373",
|
"ID": "CVE-2012-3373",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,26 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://wicket.apache.org/2012/09/06/cve-2012-3373.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://wicket.apache.org/2012/09/06/cve-2012-3373.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "55445",
|
"name": "55445",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/55445"
|
"url": "http://www.securityfocus.com/bid/55445"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "85249",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/85249"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1027508",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1027508"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "50555",
|
"name": "50555",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -81,6 +66,21 @@
|
|||||||
"name": "apache-wicket-unspecified-xss(78321)",
|
"name": "apache-wicket-unspecified-xss(78321)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78321"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78321"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://wicket.apache.org/2012/09/06/cve-2012-3373.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://wicket.apache.org/2012/09/06/cve-2012-3373.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "85249",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/85249"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1027508",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1027508"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2012-3691",
|
"ID": "CVE-2012-3691",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://support.apple.com/kb/HT5400",
|
"name": "APPLE-SA-2012-09-19-1",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "APPLE",
|
||||||
"url" : "http://support.apple.com/kb/HT5400"
|
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT5503",
|
"name": "http://support.apple.com/kb/HT5503",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2012-09-19-1",
|
"name": "http://support.apple.com/kb/HT5400",
|
||||||
"refsource" : "APPLE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
"url": "http://support.apple.com/kb/HT5400"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2012-3749",
|
"ID": "CVE-2012-3749",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,20 +53,20 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20121101 APPLE-SA-2012-11-01-1 iOS 6.0.1",
|
"name": "56361",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-11/0012.html"
|
"url": "http://www.securityfocus.com/bid/56361"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "51445",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/51445"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT5567",
|
"name": "http://support.apple.com/kb/HT5567",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.apple.com/kb/HT5567"
|
"url": "http://support.apple.com/kb/HT5567"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT5598",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT5598"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2012-11-01-1",
|
"name": "APPLE-SA-2012-11-01-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
@ -78,14 +78,14 @@
|
|||||||
"url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
|
"url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "56361",
|
"name": "20121101 APPLE-SA-2012-11-01-1 iOS 6.0.1",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/56361"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-11/0012.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "51445",
|
"name": "http://support.apple.com/kb/HT5598",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/51445"
|
"url": "http://support.apple.com/kb/HT5598"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2012-4154",
|
"ID": "CVE-2012-4154",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:15479",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15479"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.adobe.com/support/security/bulletins/apsb12-16.html",
|
"name": "http://www.adobe.com/support/security/bulletins/apsb12-16.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "GLSA-201308-03",
|
"name": "GLSA-201308-03",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-201308-03.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-201308-03.xml"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:15479",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15479"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20120905 Cross-Site Scripting (XSS) Vulnerabilities in Flogr",
|
"name": "flogr-index-any-xss(78311)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-09/0021.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78311"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.htbridge.com/advisory/HTB23110",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.htbridge.com/advisory/HTB23110"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "55418",
|
"name": "55418",
|
||||||
@ -68,14 +63,19 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/55418"
|
"url": "http://www.securityfocus.com/bid/55418"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "flogr-index-any-xss(78311)",
|
"name": "20120905 Cross-Site Scripting (XSS) Vulnerabilities in Flogr",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/78311"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0021.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "flogr-index-xss(78310)",
|
"name": "flogr-index-xss(78310)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78310"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78310"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.htbridge.com/advisory/HTB23110",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.htbridge.com/advisory/HTB23110"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,39 +53,39 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://packetstormsecurity.org/files/117504/OTRS-3.1-Cross-Site-Scripting.html",
|
"name": "openSUSE-SU-2013:0145",
|
||||||
"refsource" : "MISC",
|
"refsource": "SUSE",
|
||||||
"url" : "http://packetstormsecurity.org/files/117504/OTRS-3.1-Cross-Site-Scripting.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00036.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.otrs.com/en/open-source/community-news/security-advisories/security-advisory-2012-03/",
|
"name": "56093",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://www.otrs.com/en/open-source/community-news/security-advisories/security-advisory-2012-03/"
|
"url": "http://www.securityfocus.com/bid/56093"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://znuny.com/assets/proof_of_concept_cve_2012-4751-znuny.py",
|
"name": "http://znuny.com/assets/proof_of_concept_cve_2012-4751-znuny.py",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://znuny.com/assets/proof_of_concept_cve_2012-4751-znuny.py"
|
"url": "http://znuny.com/assets/proof_of_concept_cve_2012-4751-znuny.py"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.otrs.com/en/open-source/community-news/security-advisories/security-advisory-2012-03/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.otrs.com/en/open-source/community-news/security-advisories/security-advisory-2012-03/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://znuny.com/en/#!/advisory/ZSA-2012-03",
|
"name": "http://znuny.com/en/#!/advisory/ZSA-2012-03",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://znuny.com/en/#!/advisory/ZSA-2012-03"
|
"url": "http://znuny.com/en/#!/advisory/ZSA-2012-03"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2013:0145",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-01/msg00036.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#603276",
|
"name": "VU#603276",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/603276"
|
"url": "http://www.kb.cert.org/vuls/id/603276"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "56093",
|
"name": "http://packetstormsecurity.org/files/117504/OTRS-3.1-Cross-Site-Scripting.html",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/56093"
|
"url": "http://packetstormsecurity.org/files/117504/OTRS-3.1-Cross-Site-Scripting.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2012-6229",
|
"ID": "CVE-2012-6229",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "larry0@me.com",
|
||||||
"DATE_ASSIGNED": "2017-05-21",
|
"DATE_ASSIGNED": "2017-05-21",
|
||||||
"ID": "CVE-2017-1002020",
|
"ID": "CVE-2017-1002020",
|
||||||
"REQUESTER": "kurt@seifried.org",
|
"REQUESTER": "kurt@seifried.org",
|
||||||
@ -56,6 +56,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://wpvulndb.com/vulnerabilities/8833",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpvulndb.com/vulnerabilities/8833"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.vapidlabs.com/advisory.php?v=193",
|
"name": "http://www.vapidlabs.com/advisory.php?v=193",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -65,11 +70,6 @@
|
|||||||
"name": "https://wordpress.org/plugins/surveys/",
|
"name": "https://wordpress.org/plugins/surveys/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://wordpress.org/plugins/surveys/"
|
"url": "https://wordpress.org/plugins/surveys/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://wpvulndb.com/vulnerabilities/8833",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://wpvulndb.com/vulnerabilities/8833"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT207797",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT207797"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1038484",
|
"name": "1038484",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1038484"
|
"url": "http://www.securitytracker.com/id/1038484"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT207797",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT207797"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-931064.pdf",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-931064.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "96208",
|
"name": "96208",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/96208"
|
"url": "http://www.securityfocus.com/bid/96208"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-931064.pdf",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-931064.pdf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://git.ghostscript.com/?p=ghostpdl.git;h=ecceafe3abba2714ef9b432035fe0739d9b1a283",
|
"name": "1037899",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://git.ghostscript.com/?p=ghostpdl.git;h=ecceafe3abba2714ef9b432035fe0739d9b1a283"
|
"url": "http://www.securitytracker.com/id/1037899"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugs.ghostscript.com/show_bug.cgi?id=697596",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.ghostscript.com/show_bug.cgi?id=697596"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201708-06",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201708-06"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "96428",
|
"name": "96428",
|
||||||
@ -73,9 +63,19 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/96428"
|
"url": "http://www.securityfocus.com/bid/96428"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1037899",
|
"name": "http://git.ghostscript.com/?p=ghostpdl.git;h=ecceafe3abba2714ef9b432035fe0739d9b1a283",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1037899"
|
"url": "http://git.ghostscript.com/?p=ghostpdl.git;h=ecceafe3abba2714ef9b432035fe0739d9b1a283"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201708-06",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201708-06"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=697596",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=697596"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20170228 Linux: packet: fix races in fanout_add() (CVE-2017-6346)",
|
"name": "96508",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2017/02/28/6"
|
"url": "http://www.securityfocus.com/bid/96508"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d199fab63c11998a602205f7ee7ff7c05c97164b",
|
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d199fab63c11998a602205f7ee7ff7c05c97164b",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d199fab63c11998a602205f7ee7ff7c05c97164b"
|
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d199fab63c11998a602205f7ee7ff7c05c97164b"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.android.com/security/bulletin/2017-09-01",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.android.com/security/bulletin/2017-09-01"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.13",
|
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.13",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.13"
|
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.13"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/torvalds/linux/commit/d199fab63c11998a602205f7ee7ff7c05c97164b",
|
"name": "[oss-security] 20170228 Linux: packet: fix races in fanout_add() (CVE-2017-6346)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MLIST",
|
||||||
"url" : "https://github.com/torvalds/linux/commit/d199fab63c11998a602205f7ee7ff7c05c97164b"
|
"url": "http://www.openwall.com/lists/oss-security/2017/02/28/6"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.android.com/security/bulletin/2017-09-01",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.android.com/security/bulletin/2017-09-01"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3804",
|
"name": "DSA-3804",
|
||||||
@ -83,9 +83,9 @@
|
|||||||
"url": "http://www.debian.org/security/2017/dsa-3804"
|
"url": "http://www.debian.org/security/2017/dsa-3804"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "96508",
|
"name": "https://github.com/torvalds/linux/commit/d199fab63c11998a602205f7ee7ff7c05c97164b",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/96508"
|
"url": "https://github.com/torvalds/linux/commit/d199fab63c11998a602205f7ee7ff7c05c97164b"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-csm",
|
"name": "1038738",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-csm"
|
"url": "http://www.securitytracker.com/id/1038738"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "99205",
|
"name": "99205",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/99205"
|
"url": "http://www.securityfocus.com/bid/99205"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1038738",
|
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-csm",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1038738"
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-csm"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,13 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"DATE_PUBLIC" : "2017-03-10T00:00:00",
|
|
||||||
"ID": "CVE-2017-7473",
|
"ID": "CVE-2017-7473",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -76,9 +76,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1357090",
|
"name": "99057",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1357090"
|
"url": "http://www.securityfocus.com/bid/99057"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.mozilla.org/security/advisories/mfsa2017-15/",
|
"name": "https://www.mozilla.org/security/advisories/mfsa2017-15/",
|
||||||
@ -86,14 +86,14 @@
|
|||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2017-15/"
|
"url": "https://www.mozilla.org/security/advisories/mfsa2017-15/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-16/",
|
"name": "DSA-3918",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "DEBIAN",
|
||||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-16/"
|
"url": "https://www.debian.org/security/2017/dsa-3918"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-17/",
|
"name": "1038689",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-17/"
|
"url": "http://www.securitytracker.com/id/1038689"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3881",
|
"name": "DSA-3881",
|
||||||
@ -101,9 +101,9 @@
|
|||||||
"url": "https://www.debian.org/security/2017/dsa-3881"
|
"url": "https://www.debian.org/security/2017/dsa-3881"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-3918",
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1357090",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://www.debian.org/security/2017/dsa-3918"
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1357090"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:1440",
|
"name": "RHSA-2017:1440",
|
||||||
@ -116,14 +116,14 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2017:1561"
|
"url": "https://access.redhat.com/errata/RHSA-2017:1561"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "99057",
|
"name": "https://www.mozilla.org/security/advisories/mfsa2017-17/",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/99057"
|
"url": "https://www.mozilla.org/security/advisories/mfsa2017-17/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1038689",
|
"name": "https://www.mozilla.org/security/advisories/mfsa2017-16/",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1038689"
|
"url": "https://www.mozilla.org/security/advisories/mfsa2017-16/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -76,9 +76,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1360309",
|
"name": "99057",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1360309"
|
"url": "http://www.securityfocus.com/bid/99057"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.mozilla.org/security/advisories/mfsa2017-15/",
|
"name": "https://www.mozilla.org/security/advisories/mfsa2017-15/",
|
||||||
@ -86,9 +86,14 @@
|
|||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2017-15/"
|
"url": "https://www.mozilla.org/security/advisories/mfsa2017-15/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-16/",
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1360309",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-16/"
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1360309"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1038689",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1038689"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.mozilla.org/security/advisories/mfsa2017-17/",
|
"name": "https://www.mozilla.org/security/advisories/mfsa2017-17/",
|
||||||
@ -96,14 +101,9 @@
|
|||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2017-17/"
|
"url": "https://www.mozilla.org/security/advisories/mfsa2017-17/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "99057",
|
"name": "https://www.mozilla.org/security/advisories/mfsa2017-16/",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/99057"
|
"url": "https://www.mozilla.org/security/advisories/mfsa2017-16/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1038689",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1038689"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/Monetra/mstdlib/commit/db124b8f607dd0a40a9aef2d4d468fad433522a7",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/Monetra/mstdlib/commit/db124b8f607dd0a40a9aef2d4d468fad433522a7"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/Monetra/mstdlib/issues/2",
|
"name": "https://github.com/Monetra/mstdlib/issues/2",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/Monetra/mstdlib/issues/2"
|
"url": "https://github.com/Monetra/mstdlib/issues/2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/Monetra/mstdlib/commit/db124b8f607dd0a40a9aef2d4d468fad433522a7",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/Monetra/mstdlib/commit/db124b8f607dd0a40a9aef2d4d468fad433522a7"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://zerodayinitiative.com/advisories/ZDI-18-761",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://zerodayinitiative.com/advisories/ZDI-18-761"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
|
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
|
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://zerodayinitiative.com/advisories/ZDI-18-761",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://zerodayinitiative.com/advisories/ZDI-18-761"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "sfowler@redhat.com",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2018-14627",
|
"ID": "CVE-2018-14627",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -67,6 +67,16 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14627"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14627"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2018:3528",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2018:3528"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2018:3527",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2018:3527"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://issues.jboss.org/browse/WFLY-9107",
|
"name": "https://issues.jboss.org/browse/WFLY-9107",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -78,24 +88,14 @@
|
|||||||
"url": "https://security.netapp.com/advisory/ntap-20181221-0002/"
|
"url": "https://security.netapp.com/advisory/ntap-20181221-0002/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2018:3527",
|
"name": "RHSA-2018:3595",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:3527"
|
"url": "https://access.redhat.com/errata/RHSA-2018:3595"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2018:3528",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:3528"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3529",
|
"name": "RHSA-2018:3529",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3529"
|
"url": "https://access.redhat.com/errata/RHSA-2018:3529"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2018:3595",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:3595"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://seclists.org/fulldisclosure/2018/Aug/9",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://seclists.org/fulldisclosure/2018/Aug/9"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/trippo/ResponsiveFilemanager/blob/master/changelog.txt",
|
"name": "https://github.com/trippo/ResponsiveFilemanager/blob/master/changelog.txt",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/trippo/ResponsiveFilemanager/blob/master/changelog.txt"
|
"url": "https://github.com/trippo/ResponsiveFilemanager/blob/master/changelog.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2018/Aug/9",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2018/Aug/9"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html",
|
"name": "1041809",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html"
|
"url": "http://www.securitytracker.com/id/1041809"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "105439",
|
"name": "105439",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/105439"
|
"url": "http://www.securityfocus.com/bid/105439"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1041809",
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1041809"
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2018-9550",
|
"ID": "CVE-2018-9550",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://source.android.com/security/bulletin/2018-12-01",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.android.com/security/bulletin/2018-12-01"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "106137",
|
"name": "106137",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/106137"
|
"url": "http://www.securityfocus.com/bid/106137"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.android.com/security/bulletin/2018-12-01",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-12-01"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user